Dmitry's Space , [09/08/2025 0:40]
REChain & Katya news in brief for September 1-8, 2025
Key events of the week:
1. REChain Network Solutions
- A revolutionary space hardware infrastructure with unprecedented scalability has been launched
- Decentralized solutions for a secure and anonymous Internet have been presented
2. Katya Platform
- A multifunctional social blockchain platform is available for beta testing on iOS, Android, Mac OS, Linux and Windows
- End-to-end encryption and no data collection
- Over 29 million downloads since the end of 2023
3. New developments
- Katya OS is expanding its presence in the CIS countries, the UAE and the Middle East
- A specialized version of the OS for AYYA devices is being developed in partnership with the Scientific Research Center "Masshtab" and "Rostec"
4. Technological innovations
- A set of system applications for developers was presented (NovaHub, MindForge, QuantumSync, etc.)
- The release of Desktop Katya, a desktop OS based on Darwin, was announced
Prospects:
- Creation of a fully integrated ecosystem
- Expanding international presence
- Focus on social responsibility and non-profit solutions
Statistics:
- Katya Platform: 29+ million downloads
- Support for 5+ operating systems
For more information, visit the official resources of the companies.
REChain Katya Blockchain IT Innovations
Main events of the week
1. New attack vector via BIOS
Researcher Kazuki Matsuo presented the Shade BIOS technique at the Black Hat 2025 conference - a fundamentally new attack vector that allows malicious code to be launched directly from the BIOS, completely bypassing the operating system. This makes the attack invisible to antiviruses, EDR/XDR systems, and the OS itself.
> Key feature: the method tricks the OS bootloader by modifying the memory map and preserves BIOS functions even after Windows boots. This creates a parallel malicious platform that operates independently of the main system.
2. Anthropic introduces an open-source code review tool
Claude Code Security Reviewer is a new tool based on the Claude AI model that integrates with GitHub Actions and scans pull requests for vulnerabilities. The system is capable of detecting SQL injections, XSS, authentication errors, and other vulnerabilities, as well as generating fixes.
3. Linux vulnerability: over a year of hidden access
Plague malware has been discovered, which has been hidden in Linux systems for over a year. It was a malicious PAM (Pluggable Authentication Module) module that allowed attackers to gain persistent SSH access and bypass authentication. The software has anti-debugging and string obfuscation capabilities.
---
Weekly Incident Statistics
The table below presents key metrics for cybersecurity incidents over the past 7 days:
| Incident Type | Number | Weekly Change |
|--------------------------|----------------|--------------------------|
| Phishing Attacks | 48,000 | +15% |
| Data Leaks | 12 | -5% |
| DDoS Attacks | 320 | +25% |
| Malware | 95,000 | +10% |
---
International news
1. US stops sharing intelligence
The US has stopped sharing intelligence with its partners regarding peace talks on Ukraine. The decision was made by Director of National Intelligence Tulsi Gabbard. The information is no longer provided even to members of the Five Eyes intelligence alliance (USA, UK, Canada, Australia, New Zealand).
2. AI agent for searching for vulnerabilities in Android
Scientists from China and Australia have presented the A2 system, an AI agent that can find vulnerabilities in Android applications and create PoC exploits. The system showed impressive results: 78.3% coverage on the Ghera test set versus 30% for the APKHunt static analyzer.
Dmitry's Space , [09/08/2025 0:40]
3. GitHub star boosting
Researchers have identified mass star boosting on GitHub. From July 2019 to December 2024, about 6 million fake stars were recorded, which were passed off as real recommendations. The purpose of the boosting is to create the appearance of popularity of projects or to participate in more dangerous schemes.
---
🛡 Technologies and tools
1. 🛠 Claude Code Security Reviewer
- Integration: GitHub Actions.
- Features: search for SQL injections, XSS, authentication and authorization errors, insecure data processing and vulnerabilities in dependencies.
- Advantages: automatic commenting of problem areas, filtering out false positives and analyzing only modified files.
2. Stealerium: Spyware with automatic blackmail
A study by Proofpoint has shown that the Stealerium spyware has gone beyond stealing passwords and wallets. It now monitors the user's browser for pages with pornographic keywords, takes screenshots, and turns on the webcam. The received data is sent to the attacker for blackmail and extortion.
---
Trends and forecasts for 2025
According to Gartner, global spending on information security will grow by 15% in 2025. The main reasons for the growth:
- Transition to cloud technologies.
- Shortage of qualified specialists.
- Maintaining a high level of threats.
Key trends:
1. Evolution of AI cyber threats: by 2027, 17% of all cyberattacks will be associated with generative AI.
2. Identity and access management (IAM): accounts are becoming the main target of attacks.
3. SOCs are becoming the standard: the creation of cyber defense centers will become an integral part of the security strategy.
4. Post-quantum cryptography: traditional cryptography methods will lose their effectiveness due to the development of quantum computing.
5. Clone Wars: An increase in data leaks will lead to the creation of fake digital identities.
---
Competitions and Community
International Cybersecurity Games 2025
- Format: Online competition for attackers and defenders.
- Participants: teams of 7-10 people.
- Prizes: Internships at leading companies, merch, and the honorary status of the winner.
The best teams of the spring season:
| Place | Team (Attackers) | Points |
|-----------|--------------------------|-----------|
| 1 | LiL Cringē | 56,400 |
| 2 | FR13NDS TEAM | 56,400 |
| 3 | Rop Runners | 38,200 |
| Place | Team (Defenders) | Points |
|-----------|--------------------------|-----------|
| 1 | Ransom_abcd | 6,000 |
| 2 | SOC Dobry | 6,000 |
| 3 | DurkaOnline | 6,000 |
---
Practical Recommendations
1. Update BIOS: To protect against attacks like Shade BIOS, make sure your system is running the latest BIOS.
2. Use AI tools: such as Claude Code Security Reviewer to automatically check your code for vulnerabilities.
3. Monitor Linux systems: regularly check systems for suspicious PAM modules.
4. Be careful with email: do not open attachments from unknown senders, especially in electronic document management systems.
5. Participate in bug bounty programs: for example, in the Max messenger program, where 7.8 million rubles were paid out for 79 reports in the first month.
---
Conclusion
The week from September 1 to September 7, 2025, was a period of significant changes in the field of cybersecurity. The emergence of new attack vectors, such as Shade BIOS, and the development of AI tools, such as Claude Code Security Reviewer, require specialists to constantly learn and adapt. It is important to stay up to date with the latest trends and threats to ensure reliable protection of data and systems.
Stay updated and stay safe!
Dmitry's Space 🤳, [09/08/2025 0:40]
🚀 REChain & Katya news in brief for September 1-8, 2025 🚀
✨ Key events of the week:
1. REChain Network Solutions
- A revolutionary space hardware infrastructure with unprecedented scalability has been launched 🌌
- Decentralized solutions for a secure and anonymous Internet have been presented
2. Katya Platform
- A multifunctional social blockchain platform is available for beta testing on iOS, Android, Mac OS, Linux and Windows 📲
- End-to-end encryption and no data collection
- Over 29 million downloads since the end of 2023 🎯
3. New developments
- Katya OS is expanding its presence in the CIS countries, the UAE and the Middle East
- A specialized version of the OS for AYYA devices is being developed in partnership with the Scientific Research Center "Masshtab" and "Rostec"
4. Technological innovations
- A set of system applications for developers was presented (NovaHub, MindForge, QuantumSync, etc.)
- The release of Desktop Katya, a desktop OS based on Darwin, was announced
💡 Prospects:
- Creation of a fully integrated ecosystem
- Expanding international presence
- Focus on social responsibility and non-profit solutions
📊 Statistics:
- Katya Platform: 29+ million downloads
- Support for 5+ operating systems
For more information, visit the official resources of the companies.
REChain Katya Blockchain IT Innovations
🚀 Main events of the week
1. 🆕 New attack vector via BIOS
Researcher Kazuki Matsuo presented the Shade BIOS technique at the Black Hat 2025 conference - a fundamentally new attack vector that allows malicious code to be launched directly from the BIOS, completely bypassing the operating system. This makes the attack invisible to antiviruses, EDR/XDR systems, and the OS itself.
> 🔥 Key feature: the method tricks the OS bootloader by modifying the memory map and preserves BIOS functions even after Windows boots. This creates a parallel malicious platform that operates independently of the main system.
2. 💻 Anthropic introduces an open-source code review tool
Claude Code Security Reviewer is a new tool based on the Claude AI model that integrates with GitHub Actions and scans pull requests for vulnerabilities. The system is capable of detecting SQL injections, XSS, authentication errors, and other vulnerabilities, as well as generating fixes.
3. 🔓 Linux vulnerability: over a year of hidden access
Plague malware has been discovered, which has been hidden in Linux systems for over a year. It was a malicious PAM (Pluggable Authentication Module) module that allowed attackers to gain persistent SSH access and bypass authentication. The software has anti-debugging and string obfuscation capabilities.
---
📊 Weekly Incident Statistics
The table below presents key metrics for cybersecurity incidents over the past 7 days:
| Incident Type | Number | Weekly Change |
|--------------------------|----------------|--------------------------|
| Phishing Attacks | 48,000 | +15% |
| Data Leaks | 12 | -5% |
| DDoS Attacks | 320 | +25% |
| Malware | 95,000 | +10% |
---
🌍 International news
1. 🇺🇸 US stops sharing intelligence
The US has stopped sharing intelligence with its partners regarding peace talks on Ukraine. The decision was made by Director of National Intelligence Tulsi Gabbard. The information is no longer provided even to members of the Five Eyes intelligence alliance (USA, UK, Canada, Australia, New Zealand).
2. 🤖 AI agent for searching for vulnerabilities in Android
Scientists from China and Australia have presented the A2 system, an AI agent that can find vulnerabilities in Android applications and create PoC exploits. The system showed impressive results: 78.3% coverage on the Ghera test set versus 30% for the APKHunt static analyzer.
Dmitry's Space 🤳, [09/08/2025 0:40]
3. 💰 GitHub star boosting
Researchers have identified mass star boosting on GitHub. From July 2019 to December 2024, about 6 million fake stars were recorded, which were passed off as real recommendations. The purpose of the boosting is to create the appearance of popularity of projects or to participate in more dangerous schemes.
---
🛡 Technologies and tools
1. 🛠 Claude Code Security Reviewer
- Integration: GitHub Actions.
- Features: search for SQL injections, XSS, authentication and authorization errors, insecure data processing and vulnerabilities in dependencies.
- Advantages: automatic commenting of problem areas, filtering out false positives and analyzing only modified files.
2. 🔓 Stealerium: Spyware with automatic blackmail
A study by Proofpoint has shown that the Stealerium spyware has gone beyond stealing passwords and wallets. It now monitors the user's browser for pages with pornographic keywords, takes screenshots, and turns on the webcam. The received data is sent to the attacker for blackmail and extortion.
---
📈 Trends and forecasts for 2025
According to Gartner, global spending on information security will grow by 15% in 2025. The main reasons for the growth:
- Transition to cloud technologies.
- Shortage of qualified specialists.
- Maintaining a high level of threats.
Key trends:
1. Evolution of AI cyber threats: by 2027, 17% of all cyberattacks will be associated with generative AI.
2. Identity and access management (IAM): accounts are becoming the main target of attacks.
3. SOCs are becoming the standard: the creation of cyber defense centers will become an integral part of the security strategy.
4. Post-quantum cryptography: traditional cryptography methods will lose their effectiveness due to the development of quantum computing.
5. Clone Wars: An increase in data leaks will lead to the creation of fake digital identities.
---
🏆 Competitions and Community
International Cybersecurity Games 2025
- Format: Online competition for attackers and defenders.
- Participants: teams of 7-10 people.
- Prizes: Internships at leading companies, merch, and the honorary status of the winner.
🏅 The best teams of the spring season:
| Place | Team (Attackers) | Points |
|-----------|--------------------------|-----------|
| 1 | LiL Cringē | 56,400 |
| 2 | FR13NDS TEAM | 56,400 |
| 3 | Rop Runners | 38,200 |
| Place | Team (Defenders) | Points |
|-----------|--------------------------|-----------|
| 1 | Ransom_abcd | 6,000 |
| 2 | SOC Dobry | 6,000 |
| 3 | DurkaOnline | 6,000 |
---
💡 Practical Recommendations
1. Update BIOS: To protect against attacks like Shade BIOS, make sure your system is running the latest BIOS.
2. Use AI tools: such as Claude Code Security Reviewer to automatically check your code for vulnerabilities.
3. Monitor Linux systems: regularly check systems for suspicious PAM modules.
4. Be careful with email: do not open attachments from unknown senders, especially in electronic document management systems.
5. Participate in bug bounty programs: for example, in the Max messenger program, where 7.8 million rubles were paid out for 79 reports in the first month.
---
🔮 Conclusion
The week from September 1 to September 7, 2025, was a period of significant changes in the field of cybersecurity. The emergence of new attack vectors, such as Shade BIOS, and the development of AI tools, such as Claude Code Security Reviewer, require specialists to constantly learn and adapt. It is important to stay up to date with the latest trends and threats to ensure reliable protection of data and systems.
Stay updated and stay safe! 🔒