AI-Powered GitHub Attacks, Phishing in SVGs, Crypto Heists and Nation-State Hacks: Top Cybersecurity News for Sept 6, 2025

```html Top Tech Headlines for September 6, 2025

Top Tech Headlines for September 6, 2025

Happy Friday, everyone! We’ve got a packed roundup of today’s biggest stories: stealthy phishing campaigns hiding in image files, AI-driven attacks on GitHub, crypto heists via compromised npm packages, and a politically charged hack in Kazakhstan. Let’s break down what’s happening and how to stay ahead of the game.

Phishing Campaign Disguised in SVG Files Uncovered by VirusTotal

SVG Malware Attack

VirusTotal has exposed a sneaky phishing campaign hiding malware inside SVG files. The malicious files appear as authentic Colombian judiciary login portals, tricking victims into downloading malware. This discovery highlights the growing sophistication of phishing threats hiding in plain sight — even in image-based file formats.

"S1ngularity" Attack Hits Over 2,000 GitHub Accounts via AI-Powered Malware

GitHub Malware Attack

A massive AI-driven attack dubbed “s1ngularity” has compromised 2,180 GitHub accounts, exposing tokens and secrets across popular repositories. The attack leveraged the NPM package supply chain, signaling how developer-focused platforms are increasingly targeted. Developers: now’s a great time to double-check your access keys and enable two-factor authentication.

Noisy Bear Hacks Kazakhstan’s Energy Sector Using BarrelFire

Kazakhstan Hack

The cyber-espionage actor “Noisy Bear” targeted Kazakhstan’s national oil and gas company with a phishing campaign in May 2025. The attack used a payload dubbed “BarrelFire” and infrastructure hosted by Aeza Group. This campaign is being viewed through a geopolitical lens, showing how cyber attacks are often fueled by international tensions.

Fake Flashbots npm Packages Stealing Ethereum Wallet Keys

Ethereum Wallet Theft

Security researchers have flagged four npm packages that impersonate the Flashbots project to steal Ethereum wallet keys and seed phrases. Once installed, the malware exfiltrates sensitive data to attackers via Telegram. If you’re a web3 developer or crypto enthusiast, inspect your packages closely — malicious clones are getting better at flying under the radar.

Want to stay ready for anything? From data recovery to bootable OS installs, our Ultimate USBs have your back. Check out our tools today.

```

RELATED ARTICLES