AI Coding Assistants Secretly Copying All Code to China
Thereβs a new report about two AI coding assistants, used by 1.5 million developers, that are surreptitiously sending a copy of everything they ingest to China.
Maybe avoid using them.
Thereβs a new report about two AI coding assistants, used by 1.5 million developers, that are surreptitiously sending a copy of everything they ingest to China.
Maybe avoid using them.
The WorldLeaks cybercrime group claims to have stolen information from the footwear and apparel giantβs systems.
The post Nike Probing Potential Security Incident as Hackers Threaten to Leak Data appeared first on SecurityWeek.

Imagine: a user lands on a scam site, decides to make a purchase, and enters their bank card details, name, and address. Guess what happens next? If you think the attackers simply grab the cash and disappear β think again. Unfortunately, itβs much more complicated. In reality, the information enters a massive shadow-market pipeline, where victimsβ data circulates for years, changing hands and being reused in new attacks.
At Kaspersky, weβve studied the journey data takes after a phishing attack: who gets it, how itβs sorted, resold, and used on the shadow market. In this article, we map the route of stolen data, and explain how to protect yourself if youβve already encountered phishing, or if you want to avoid it in the future. You can read the detailed report complete with technical insights on Securelist.
Phishing sites are carefully disguised to look legitimate β sometimes the visual design, user interface, and even the domain name are almost indistinguishable from the real thing. To steal data, attackers typically employ HTML forms prompting users to enter their login credentials, payment card details, or other sensitive information.
As soon as the user hits Sign In or Pay, the information is instantly dispatched to the cybercrooks. Some malicious campaigns donβt harvest data directly through a phishing site but instead abuse legitimate services like Google Forms to hide the final destination server.
The stolen data is typically transmitted in one of three ways β or a combination of them:
The range of data sought by cybercriminals is quite extensive.
According to our research, the vast majority (88.5%) of phishing attacks conducted from January through September 2025 targeted online account credentials, and 9.5% were attempts to obtain usersβ personal data, such as names, addresses, and dates. Finally, 2% of phishing attacks were focused on stealing bank card details.
Not all stolen data is directly used by the attackers to transfer money to their own accounts. In fact, the data is seldom used instantly; more commonly, it finds its way onto the shadow market, reaching analysts and data brokers. A typical journey looks something like this.
Raw data sets are bundled into massive archives and offered in bulk on dark web forums. These dumps often contain junk or outdated information, which is why theyβre relatively cheap β starting at around US$50.
These archives are purchased by hackers who act as analysts. They categorize datasets and verify the validity of the data by checking if the login credentials work for the specified services, if they are reused on other sites, and if they match any data from past breaches. For targeted attacks, cybercriminals compile a digital dossier. It stores information gathered from both recent and older attacks β essentially a spreadsheet of data ready to be used in hacks.
The sorted datasets are offered for sale again, now at a higher price β and not only on the dark web but also on the more familiar Telegram.
According to Kaspersky Digital Footprint Intelligence, account prices are driven by a large number of factors: account age, 2FA authentication, linked bank cards, and service userbase. Itβs no surprise that the most expensive and in-demand commodity on this market is access to bank accounts and crypto wallets.
| Category | Price, US$ | Average price, US$ |
| Crypto platforms | 60β400 | 105 |
| Banks | 70β2000 | 350 |
| E-government portals | 15β2000 | 82.5 |
| Social media | 0.4β279 | 3 |
| Messaging apps | 0.065β150 | 2.5 |
| Online stores | 10β50 | 20 |
| Games and gaming platforms | 1β50 | 6 |
| Global internet portals | 0.2β2 | 0.9 |
| Personal documents | 0.5β125 | 15 |
Average account prices in JanuaryβSeptember 2025
Once a cybercriminal purchases a victimβs digital dossier, they can plan their next attack. They might use open-source intelligence to find out where the person works, and then craft a convincing email impersonating their boss. Alternatively, they could hack a social media profile, extract compromising photos, and demand a ransom for their return. However, rest assured that nearly all threatening or extortion emails are just a scare tactic by scammers.
Cybercriminals also use compromised accounts to send further phishing emails and malicious links to the victimβs contacts. So, if you receive a message asking you to vote for a niece in a contest, lend money, or click on a suspicious link, you have every reason to be wary.
More on phishing and scams:




![]()
A great place that can sometimes be overlooked on an internal penetration test are the secrets hidden in plain sight. That is, a place where no authentication is required in [β¦]
The post Auditing GitLab: Public Gitlab Projects on Internal Networks appeared first on Black Hills Information Security, Inc..