Skip to content
  Friday 12 December 2025
Trending
January 1, 2025Cybersecurity Supervisor (Administrative Supervisor 4) October 10, 2024Cybersecurity Assessment Specialist February 13, 2025<h3>Sophos Cuts Workforce by 6% After Acquiring Secureworks</h3> May 7, 2024Lead Cybersecurity Architect – M365 Security October 6, 2023Platinion Senior Consultant, Cybersecurity July 6, 2024Cybersecurity Service Delivery Manager August 26, 2024CISA Adds One Known Exploited Vulnerability to Catalog March 7, 2025Major Cybercrime Groups Utilize Ragnar Loader for Ransomware Attacks October 6, 2023GitHub’s Secret Scanning Feature Expands to Include AWS, Microsoft, Google, and Slack August 23, 2025Cybersecurity Program Manager
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  Microsoft praises hacker EncryptHub for uncovering 618+ Windows flaws!
Industry News

Microsoft praises hacker EncryptHub for uncovering 618+ Windows flaws!

SecuredyouadmSecuredyouadm—April 5, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Cloud Linux Systems Infected with DripDropper Malware through Apache ActiveMQ Vulnerability

August 19, 2025

FBI Reveals New Details on Massive Chinese Telecom Network Hack

November 14, 2024

Ohio Health System Battles Cyberattack and Fraud Scams

May 21, 2025

CISA Issues Urgent Warning: Critical Palo Alto Networks Vulnerability Under Attack

November 8, 2024



Microsoft recently acknowledged an individual operating under the persona “EncryptHub” for discovering and reporting two security vulnerabilities in Windows. This person, who has been identified as a potential lone wolf actor, seems to have a dual identity, balancing a legitimate career in cybersecurity with criminal activities. Outpost24 KrakenLabs conducted an in-depth analysis that revealed the cybercriminal’s background, indicating that they fled their hometown in Ukraine a decade ago and settled near the Romanian coast.

The vulnerabilities reported by EncryptHub, also known as SkorikARI, were promptly fixed by Microsoft in their recent Patch Tuesday update. These flaws, namely CVE-2025-24061 and CVE-2025-24071, posed significant security risks to Windows systems. EncryptHub gained notoriety in 2024 for deploying malware through a fake WinRAR site hosted on GitHub, affecting numerous victims across different industries.

More recently, EncryptHub has been linked to exploiting a zero-day vulnerability in Microsoft Management Console to distribute malicious payloads like information stealers and backdoors. The threat actor, who has compromised over 618 high-value targets, is believed to operate independently, although there are indications of potential collaboration with other cybercriminals. Outpost24 was able to trace EncryptHub’s activities and tools by analyzing their online footprint and investigating their self-infections.

The individual behind EncryptHub maintained a low profile while studying computer science and seeking employment opportunities related to technology. However, their criminal activities escalated in 2024, leading to the development of Fickle Stealer, a Rust-based malware designed to steal information. Despite the technical sophistication displayed by EncryptHub, their operational security lapses ultimately led to their exposure. The cybercriminal also utilized OpenAI’s ChatGPT for various purposes, showcasing the importance of robust security practices in thwarting cyber threats.

The case of EncryptHub serves as a reminder of the critical need for strong operational security measures in the face of evolving cyber threats. Despite the individual’s expertise in malware development and evasion techniques, basic mistakes such as password reuse and exposed infrastructure ultimately led to their detection. This highlights the ongoing challenge of balancing technical proficiency with effective security practices in the cybersecurity landscape.



Source link

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

North Korean Hackers Unleash BeaverTail Malware Through 11 Sneaky npm Packages
Associate Director, Cybersecurity Program Manager
Related posts
  • Related posts
  • More from author
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Industry News

Meta Strikes $14.2B AI Deal with CoreWeave for Cutting-Edge Infrastructure

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Threat Advisories

Siemens Energy Services | CISA

December 12, 20250
Threat Advisories

Johnson Controls iSTAR | CISA

December 12, 20250
Threat Advisories

Varex Imaging Panoramic Dental Imaging Software

December 12, 20250
Threat Advisories

CISA Adds One Known Exploited Vulnerability to Catalog

December 12, 20250
Threat Advisories

Siemens SINEMA Remote Connect Server

December 12, 20250
Threat Advisories

Siemens Building X – Security Manager Edge Controller

December 12, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Siemens Energy Services | CISA
  • Johnson Controls iSTAR | CISA
  • Varex Imaging Panoramic Dental Imaging Software
  • CISA Adds One Known Exploited Vulnerability to Catalog
  • Siemens SINEMA Remote Connect Server

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures