Cyber OSINT Overview, Sep 22 - Sep 28, 2025 #
This brief consolidates key updates from 80+ sources, including government organizations, cybersecurity vendors, threat intelligence teams, security research labs, and blogs from cybersecurity communities and professionals. It highlights the most significant threats, vulnerabilities, and developments from the past week to keep you informed.
Most Discussed Topics #
- Cisco vulnerabilities in Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) software are a major concern, with multiple zero-day flaws being actively exploited by nation-state actors. These vulnerabilities, including critical remote code execution issues, enable full system compromise, malware deployment, and data exfiltration. Urgent patching and forensic analysis are mandated for affected devices.
- gov advisories.ncsc.nl: NCSC-2025-0298 [1.00] [H/H] Kwetsbaarheden verholpen in Cisco Secure Firewall ASA en FTD
- gov ctoatncsc.substack.com: CTO at NCSC Summary: week ending September 28th
- gov cyber.gc.ca: AL25-012 - Vulnerabilities impacting Cisco ASA and FTD devices – CVE-2025-20333, CVE-2025-20362 and CVE-2025-20363
- gov cyber.gc.ca: Cisco security advisory (AV25-616)
- gov cyber.gc.ca: Cisco security advisory (AV25-619)
- gov wid.cert-bund.de: [NEU] [kritisch] Cisco ASA, FTD, IOS, IOS XE, IOS XR: Mehrere Schwachstellen
- gov www.cert.at: Schwerwiegende Sicherheitslücken in Cisco Adaptive Security Appliance - aktiv ausgenutzt - Updates verfügbar
- gov www.cisa.gov: CISA Directs Federal Agencies to Identify and Mitigate Potential Compromise of Cisco Devices
- gov www.cisecurity.org: Multiple Vulnerabilities in Cisco Products Could Allow for Remote Code Execution
- gov www.jpcert.or.jp: 注意喚起: Cisco ASAおよびFTDにおける複数の脆弱性(CVE-2025-20333、CVE-2025-20362)に関する注意喚起 (公開)
- news cyberscoop.com: CISA alerts federal agencies of widespread attacks using Cisco zero-days
- news cyberscoop.com: CISA says it observed nearly year-old activity tied to Cisco zero-day attacks
- news cyberscoop.com: Cisco uncovers new SNMP vulnerability used in attacks on IOS devices
- news cybersecuritynews.com: Cybersecurity Newsletter Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More
- news gbhackers.com: Cisco ASA 0-Day RCE Flaw Actively Exploited in the Wild
- news gbhackers.com: Hackers Exploit Cisco ASA 0-Day to Deploy RayInitiator and LINE VIPER Malware
- news thecyberexpress.com: Agencies Around the Globe Urge Patching of Cisco ASA Bug Under Active Exploit
- news thecyberexpress.com: Cisco Confirms Critical CVE-2025-20352 Zero-Day RCE Vulnerability Under Active Exploitation
- news www.darkreading.com: Cisco's Wave of Actively Exploited Zero-Day Bugs Targets Firewalls, IOS
- vendor arcticwolf.com: Cisco Patches ASA, FTD, and IOS Vulnerabilities, Including Critical and Exploited Flaws
- vendor fortiguard.fortinet.com: ArcaneDoor Attack (Cisco ASA Zero-Day)
- vendor unit42.paloaltonetworks.com: Threat Insights: Active Exploitation of Cisco ASA Zero Days
- vendor www.tenable.com: CVE-2025-20333, CVE-2025-20362: Frequently Asked Questions About Zero-Day Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) Vulnerabilities
- vendor www.tenable.com: Cybersecurity Snapshot: CISA Highlights Vulnerability Management Importance in Breach Analysis, as Orgs Are Urged To Patch Cisco Zero-Days
- Supply chain attacks, particularly targeting the npm ecosystem, are a growing threat. The ‘Shai-Hulud’ worm compromised over 500 npm packages, exfiltrating GitHub Personal Access Tokens and cloud service API keys. These attacks leverage phishing to gain initial access, then automate the spread of malicious code by injecting it into other packages, highlighting the need for robust dependency controls and credential hygiene.
- community www.reddit.com: Supply-Chain Guardrails for npm, pnpm, and Yarn
- gov www.cisa.gov: Widespread Supply Chain Compromise Impacting npm Ecosystem
- gov www.cisecurity.org: A Vulnerability in Nx (build system) Package Could Allow for Sensitive Data Exfiltration
- personal grahamcluley.com: Smashing Security podcast #436: The €600,000 gold heist, powered by ransomware
- personal newsletter.blockthreat.io: BlockThreat - Week 37, 2025
- vendor blog.pulsedive.com: NPM Compromise: The Wrath of the Shai-Hulud Supply Chain Attack
- vendor fortiguard.fortinet.com: npm Supply Chain Attack
- vendor securelist.com: Massive npm infection: the Shai-Hulud worm and patient zero
- vendor unit42.paloaltonetworks.com: "Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack (Updated September 23)
- vendor www.koi.security: Live Updates: Shai-Hulud, The Most Dangerous NPM Breach In History Affecting CrowdStrike and Hundreds of Popular Packages
- Ransomware campaigns, such as Akira, are becoming increasingly aggressive and rapid, with dwell times sometimes under an hour. These attacks often target VPN infrastructure (e.g., SonicWall SSL VPNs) and can bypass MFA, likely using previously exfiltrated credentials. The financial and operational impacts are significant, affecting various sectors including retail and local governments, necessitating swift detection and response strategies.
- news cybersecuritynews.com: Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins
- news thecyberexpress.com: Co-op Cyberattack Causes £80 Million Profit Loss and Data Breach Impact
- vendor arcticwolf.com: September 2025 Update on Aggressive Ongoing Akira Ransomware Campaign
- vendor arcticwolf.com: Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs, Deploys Ransomware in an Hour or Less
- vendor blog.barracuda.com: The SOC case files: Akira ransomware turns victim’s remote management tool on itself
- vendor therecord.media: Ransomware attack on Ohio county impacts over 45,000 residents, employees
- vendor therecord.media: Cyberattack on British retailer Co-op shaved about $275 million from revenues, company says
- vendor www.paloaltonetworks.com: The Ransomware Speed Crisis
- Linux Kernel vulnerabilities are a recurring concern, with numerous advisories detailing flaws that can lead to Denial of Service (DoS), privilege escalation, and other unspecified attacks. Both local and remote attackers can exploit these weaknesses, emphasizing the need for continuous patching and robust security practices for Linux-based systems.
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Linux Kernel: Mehrere Schwachstellen ermöglichen Denial of Service
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [NEU] [hoch] Linux Kernel: Mehrere Schwachstellen
- gov wid.cert-bund.de: [NEU] [mittel] Linux Kernel: Mehrere Schwachstellen
Critical Vulnerabilities #
- Multiple critical vulnerabilities (CVE-2025-20333, CVE-2025-20362, CVE-2025-20363) exist in Cisco Adaptive Security Appliance (ASA) and Firewall Threat Defense (FTD) Software, with two actively exploited zero-days. These flaws, with CVSS scores up to 9.9, allow unauthenticated remote access to restricted URL endpoints and authenticated remote code execution as root, potentially leading to complete system compromise. Organizations must apply patches immediately and conduct forensic analysis.
- gov advisories.ncsc.nl: NCSC-2025-0298 [1.00] [H/H] Kwetsbaarheden verholpen in Cisco Secure Firewall ASA en FTD
- gov cyber.gc.ca: AL25-012 - Vulnerabilities impacting Cisco ASA and FTD devices – CVE-2025-20333, CVE-2025-20362 and CVE-2025-20363
- gov cyber.gc.ca: Cisco security advisory (AV25-619)
- gov wid.cert-bund.de: [NEU] [kritisch] Cisco ASA, FTD, IOS, IOS XE, IOS XR: Mehrere Schwachstellen
- gov www.cert.at: Schwerwiegende Sicherheitslücken in Cisco Adaptive Security Appliance - aktiv ausgenutzt - Updates verfügbar
- gov www.cisecurity.org: Multiple Vulnerabilities in Cisco Products Could Allow for Remote Code Execution
- gov www.jpcert.or.jp: 注意喚起: Cisco ASAおよびFTDにおける複数の脆弱性(CVE-2025-20333、CVE-2025-20362)に関する注意喚起 (公開)
- news gbhackers.com: Cisco ASA 0-Day RCE Flaw Actively Exploited in the Wild
- vendor arcticwolf.com: Cisco Patches ASA, FTD, and IOS Vulnerabilities, Including Critical and Exploited Flaws
- vendor unit42.paloaltonetworks.com: Threat Insights: Active Exploitation of Cisco ASA Zero Days
- A critical, actively exploited vulnerability (CVE-2025-20352) impacts the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE software. This stack-based buffer overflow allows authenticated remote attackers to cause Denial of Service (DoS) with low privileges or execute arbitrary code with root-level permissions on affected IOS XE devices. All devices with SNMP enabled are vulnerable if not explicitly excluding the affected OID, necessitating immediate software updates.
- gov advisories.ncsc.nl: NCSC-2025-0297 [1.01] [M/H] Kwetsbaarheden verholpen in Cisco IOS en Cisco IOS XE Software
- gov cyber.gc.ca: Cisco security advisory (AV25-616)
- news cyberscoop.com: Cisco uncovers new SNMP vulnerability used in attacks on IOS devices
- news thecyberexpress.com: Cisco Confirms Critical CVE-2025-20352 Zero-Day RCE Vulnerability Under Active Exploitation
- vendor arcticwolf.com: Cisco Patches ASA, FTD, and IOS Vulnerabilities, Including Critical and Exploited Flaws
- SolarWinds Web Help Desk (WHD) is vulnerable to a critical remote code execution (RCE) flaw (CVE-2025-26399) arising from an unauthenticated AjaxProxy deserialization issue. This vulnerability is a second bypass of a previously disclosed flaw, allowing an attacker to execute code in the context of SYSTEM. Applying the latest hotfix (12.8.7 Hotfix 1) is strongly recommended.
- gov cyber.gc.ca: SolarWinds security advisory (AV25-613)
- gov www.cisecurity.org: A Vulnerability in SolarWinds Web Help Desk Could Allow for Remote Code Execution
- news cybersecuritynews.com: Critical RCE Flaw in SolarWinds Web Help Desk
- news thecyberexpress.com: SolarWinds Issues Third Patch to Address Persistent Web Help Desk RCE Vulnerability
- vendor arcticwolf.com: CVE-2025-26399: Critical Unauthenticated RCE in SolarWinds Web Help Desk Through Second Bypass
- Fortra GoAnywhere MFT has a maximum severity vulnerability (CVE-2025-10035) in its License Servlet that allows remote command injection due to deserialization of untrusted data. This flaw, rated 10.0 CVSS, could enable a system takeover of enterprise file transfer infrastructure. Although the vendor’s official reports are inconsistent regarding active exploitation, independent researchers have found credible evidence of exploitation dating back to September 10.
- community www.reddit.com: Is This Bad? This Feels Bad. (GoAnywhere CVE-2025-10035) - watchTowr Labs
- gov wid.cert-bund.de: [UPDATE] [kritisch] Fortra GoAnywhere MFT: Schwachstelle ermöglicht Command Injection
- news cyberscoop.com: Worries mount over max-severity GoAnywhere defect
- news hackread.com: Critical CVSS 10 Flaw in GoAnywhere File Transfer Threatens 20,000 Systems
- A supply chain compromise in the npm ecosystem, dubbed ‘Shai-Hulud,’ has impacted hundreds of software packages, including popular ones with millions of weekly downloads. Attackers phished an npm maintainer to gain access, then deployed a self-replicating worm to scan for and exfiltrate sensitive credentials (e.g., GitHub PATs, cloud API keys), leading to public exposure of stolen secrets. This highlights the need for robust credential hygiene and dependency management.
- gov www.cisa.gov: Widespread Supply Chain Compromise Impacting npm Ecosystem
- gov www.cisecurity.org: A Vulnerability in Nx (build system) Package Could Allow for Sensitive Data Exfiltration
- vendor blog.pulsedive.com: NPM Compromise: The Wrath of the Shai-Hulud Supply Chain Attack
- vendor fortiguard.fortinet.com: npm Supply Chain Attack
- vendor securelist.com: Massive npm infection: the Shai-Hulud worm and patient zero
- vendor unit42.paloaltonetworks.com: "Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack (Updated September 23)
- A Google Chromium V8 Type Confusion Vulnerability (CVE-2025-10585) has been actively exploited as a zero-day. This high-severity flaw, often used in campaigns targeting cryptocurrency wallets and espionage operations, allows for remote code execution. Google has released emergency patches for Chrome, and users are urged to update immediately.
- gov cyber.gc.ca: Google Chrome security advisory (AV25-622)
- gov www.cisa.gov: CISA Adds One Known Exploited Vulnerability to Catalog
- gov www.jpcert.or.jp: Weekly Report: Google Chromeに複数の脆弱性
- news cybersecuritynews.com: Google Project Zero Details ASLR Bypass on Apple Devices Using NSDictionary Serialization
- news cybersecuritynews.com: Cybersecurity Newsletter Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More
- A critical vulnerability (CVE-2025-55232) in Microsoft High Performance Compute (HPC) Pack could allow remote code execution. Additionally, a flaw (CVE-2025-55322) in OmniParser related to binding to an unrestricted IP address in GitHub also allows unauthorized remote code execution over a network.
- vendor msrc.microsoft.com: CVE-2025-55232 Microsoft High Performance Compute (HPC) Pack Remote Code Execution Vulnerability
- vendor msrc.microsoft.com: CVE-2025-55322 OmniParser Remote Code Execution Vulnerability
- Salesforce Agentforce, an AI-driven CRM agent platform, had a critical vulnerability dubbed ‘ForcedLeak’ (CVSS 9.4). This indirect prompt injection flaw allowed attackers to inject malicious instructions into Web-to-Lead form submissions. When processed by the AI agent, this could force the exfiltration of sensitive CRM data like customer contacts and sales strategies to external servers. Salesforce has issued patches to enforce ‘Trusted URLs’ for Agentforce and Einstein AI.
- news hackread.com: ForcedLeak Flaw in Salesforce Agentforce AI Agent Exposed CRM Data
- news thecyberexpress.com: Critical Salesforce Vulnerability ‘ForcedLeak’ Exposes AI Agent Risks in AgentForce
- news www.darkreading.com: Salesforce AI Agents Forced to Leak Sensitive Data
- NVIDIA Merlin Transformers4Rec library contains a critical remote code execution vulnerability (CVE-2025-23298) due to unsafe deserialization practices. This flaw allows an attacker to execute arbitrary code with root privileges by crafting malicious model checkpoint files. The widespread reliance on Python’s pickle serialization in ML/AI frameworks contributes to this class of vulnerabilities.
- vendor www.thezdi.com: CVE-2025-23298: Getting Remote Code Execution in NVIDIA Merlin
Major Incidents #
- The Akira ransomware group is conducting an aggressive campaign targeting SonicWall SSL VPNs, deploying ransomware in under an hour. Threat actors gain initial access through malicious logins, likely using credentials exfiltrated via CVE-2024-40766, and have successfully bypassed OTP MFA. This campaign exhibits unusually short dwell times and opportunistic mass exploitation across various industries, requiring immediate credential resets and adherence to SonicWall’s recommendations.
- news cybersecuritynews.com: Threat Actors Exploiting SonicWall Firewalls to Deploy Akira Ransomware Using Malicious Logins
- vendor arcticwolf.com: September 2025 Update on Aggressive Ongoing Akira Ransomware Campaign
- vendor arcticwolf.com: Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs, Deploys Ransomware in an Hour or Less
- vendor blog.barracuda.com: The SOC case files: Akira ransomware turns victim’s remote management tool on itself
- A widespread software supply chain compromise has impacted the npm ecosystem, with a self-replicating worm dubbed ‘Shai-Hulud’ affecting over 500 packages. The attack, initiated via phishing, exfiltrated sensitive credentials like GitHub Personal Access Tokens and cloud service API keys. The malware then automatically injected malicious code into other packages maintained by the compromised developers, leading to exponential spread.
- gov www.cisa.gov: Widespread Supply Chain Compromise Impacting npm Ecosystem
- personal grahamcluley.com: Smashing Security podcast #436: The €600,000 gold heist, powered by ransomware
- personal newsletter.blockthreat.io: BlockThreat - Week 38, 2025
- vendor blog.pulsedive.com: NPM Compromise: The Wrath of the Shai-Hulud Supply Chain Attack
- vendor securelist.com: Massive npm infection: the Shai-Hulud worm and patient zero
- vendor unit42.paloaltonetworks.com: "Shai-Hulud" Worm Compromises npm Ecosystem in Supply Chain Attack (Updated September 23)
- vendor www.koi.security: Live Updates: Shai-Hulud, The Most Dangerous NPM Breach In History Affecting CrowdStrike and Hundreds of Popular Packages
- The Co-op retail chain experienced a cyberattack in April, resulting in an £80 million hit to its operating profit and approximately £206 million in revenue loss. The incident disrupted grocery and funeral services, forcing the company to take systems offline. All 6.5 million members had data stolen. Four individuals, including a teenager, linked to the Scattered Spider group were arrested in connection to this and other UK retail hacks.
- news thecyberexpress.com: Cyberattack on Co-op Causes £80 Million Profit Loss and Data Breach Impact
- vendor therecord.media: Cyberattack on British retailer Co-op shaved about $275 million from revenues, company says
- Major European airports, including Heathrow, Berlin, Brussels, Dublin, and Cork, experienced significant disruptions due to a cyberattack targeting Collins Aerospace’s MUSE software for electronic check-in and baggage drop systems. This incident led to flight delays, cancellations, and diversions, highlighting the critical impact of third-party supply chain compromises on essential infrastructure.
- news www.darkreading.com: Airport Chaos Shows Human Impact of 3rd-Party Attacks
- personal www.cybersecuritypulse.net: TCP #104: EU Airports Disrupted; Github NPM Response; Fal.Con; and Product News
- personal www.govtech.com: Cyber Incidents Take Off: Europe’s Airports Join a Growing List
- vendor research.checkpoint.com: 22nd September – Threat Intelligence Report
- SonicWall disclosed a security incident where malicious actors used brute-force techniques against the MySonicWall.com web portal to access a subset of customer preference files stored in cloud backups. These files contained encrypted credentials and other information that could be used to gain access to customers’ SonicWall Firewall devices. Customers are urged to check if their devices are at risk and implement containment and remediation immediately.
- gov cyber.gc.ca: SonicWall security advisory (AV25-612)
- gov www.cisa.gov: SonicWall Releases Advisory for Customers after Security Incident
- gov www.jpcert.or.jp: Weekly Report: SonicWallがクラウドバックアップサービスに関連するインシデントの情報を公表
- vendor arcticwolf.com: Arctic Wolf Observes July 2025 Uptick in Akira Ransomware Activity Targeting SonicWall SSL VPN
- vendor arcticwolf.com: Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs, Deploys Ransomware in an Hour or Less
- vendor research.checkpoint.com: 22nd September – Threat Intelligence Report
- A U.S. federal agency experienced a breach due to attackers exploiting CVE-2024-36401, a critical GeoServer vulnerability, three weeks before EDR alerts were triggered. Attackers gained initial access to two GeoServers and moved laterally to other servers, deploying web shells and persistence mechanisms. This incident highlighted critical failures in prompt patching, incident response plan testing, and continuous security alert review.
- gov www.cisa.gov: CISA Releases Advisory on Lessons Learned from an Incident Response Engagement
- gov www.cisa.gov: CISA Shares Lessons Learned from an Incident Response Engagement
- news www.darkreading.com: CISA: Attackers Breach Federal Agency via Critical GeoServer Flaw
- vendor www.tenable.com: Cybersecurity Snapshot: CISA Highlights Vulnerability Management Importance in Breach Analysis, as Orgs Are Urged To Patch Cisco Zero-Days
- Over 45,000 residents and employees of Union County, Ohio, were impacted by a ransomware attack that stole names, Social Security numbers, driver’s license numbers, financial account information, fingerprint data, medical information, and passport numbers. No ransomware gang has publicly claimed responsibility, but the incident is part of a trend of cyberattacks on state, county, and city governments in 2025.
- vendor therecord.media: Ransomware attack on Ohio county impacts over 45,000 residents, employees
Emerging Threats #
- AI-powered cyberattacks are accelerating, leveraging generative AI tools like ‘SpamGPT’ to automate highly personalized phishing campaigns, find vulnerabilities faster, and evade detection. Adversaries are using AI to enhance the quality and volume of attacks, lower the entry bar for threat actors, and potentially weaponize AI agent CLIs for reconnaissance and data exfiltration. Organizations must update security awareness training to recognize AI-crafted scams.
- news gbhackers.com: Malicious MCP Server Discovered Stealing Sensitive Emails Using AI Agents
- vendor blog.barracuda.com: Confronting the Dark Side of GenAI: Recommendations for business leaders, CISOs and security teams
- vendor blog.knowbe4.com: Attackers Use AI Development Tools to Craft Phony CAPTCHA Pages
- vendor blog.knowbe4.com: New AI-Driven Phishing Platform Automates Attack Campaigns
- vendor levelblue.com: LevelBlue Spotlight Report Finds Manufacturers Struggling with the Impact of AI and Supply Chain Risk
- vendor levelblue.com: Regulatory Gaps and Legacy Systems Are Aiding AI-Powered Cyberattacks on Governments
- vendor www.malwarebytes.com: ChatGPT solves CAPTCHAs if you tell it they’re fake
- The China-nexus APT group UNC5221 is deploying ‘BRICKSTORM’ malware in stealthy, long-term espionage campaigns targeting legal services, SaaS providers, BPOs, and technology sectors in the US. This malware enables persistent access by deploying backdoors on non-EDR-supporting appliances, such as VMware vCenter and ESXi hosts, and employs advanced evasion techniques for lateral movement and data theft, resulting in an average dwell time of 393 days.
- community www.reddit.com: Chinese Hackers Lurked Nearly 400 Days in Networks With Stealthy BrickStorm Malware
- news cyberscoop.com: Brickstorm malware powering ‘next-level’ Chinese cyberespionage campaign
- news hackread.com: China-Linked Hackers Hit US Tech Firms with BRICKSTORM Malware
- news www.darkreading.com: Chinese APT Drops 'Brickstorm' Backdoors on Edge Devices
- vendor cloud.google.com: Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
- BTMOB RAT is a highly sophisticated Android malware-as-a-Service that gives attackers full control over infected devices. It combines live screen control, banking overlay attacks (targeting apps like Alipay), cryptocurrency theft, and comprehensive surveillance. The malware exploits Android’s Accessibility Service to bypass security measures and spreads primarily through phishing campaigns and malicious app stores, making it a professionalized mobile threat.
- vendor medium.com: BTMOB RAT: Malware Overview
- A new email-based attack campaign is spreading XWorm Remote Access Trojan (RAT) via fake invoice emails containing malicious Office files (.xlam). The attack uses shellcode and reflective DLL injection to load the XWorm RAT into memory, enabling full remote access and data theft. This persistent threat has previously exploited cloud misconfigurations for distribution.
- news hackread.com: Hackers Use Fake Invoices to Spread XWorm RAT via Office Files
- A high-severity phishing campaign impersonating the National Police of Ukraine is using malicious Scalable Vector Graphics (SVG) files to deliver Amatera Stealer (for data theft) and PureMiner (for cryptojacking). The SVG files trick victims into downloading password-protected ZIP archives containing a Compiled HTML Help (CHM) file, which then launches a fileless loader. This sophisticated multi-stage attack aims to steal credentials, files, and cryptocurrency.
- news hackread.com: Fake Ukraine Police Notices Spread New Amatera Stealer and PureMiner
- vendor feeds.fortinet.com: SVG Phishing hits Ukraine with Amatera Stealer, PureMiner
- vendor www.malwarebytes.com: New SVG-based phishing campaign is a recipe for disaster
- A large-scale campaign is targeting Mac users with fake software, including Malwarebytes and LastPass, distributed via GitHub pages. These fake installers deliver information stealers like Atomic Stealer (aka AMOS). The attackers employ SEO poisoning techniques to rank their malicious GitHub pages higher in search results, tricking users into self-installing the malware.
- community www.reddit.com: New Infostealer Campaign Targeting Mac Users via GitHub Pages Claiming to Offer LastPass Premium
- news www.darkreading.com: Attackers Use Phony GitHub Pages to Deliver Mac Malware
- vendor www.malwarebytes.com: Fake Malwarebytes, LastPass, and others on GitHub serve malware
- A new botnet operation is using a Loader-as-a-Service model to weaponize internet-connected devices globally. It exploits SOHO routers, IoT devices, and enterprise applications through command injection vulnerabilities in web interfaces. The campaign targets unsanitized POST parameters and default credentials, deploying RondoDoX, Mirai, and Morte payloads with multi-architecture support, and exploiting older CVEs (e.g., CVE-2019-17574).
- news cybersecuritynews.com: New Botnet Loader-as-a-Service Exploiting Routers and IoT Devices to Deploy Mirai Payloads
- news gbhackers.com: New Botnet ‘Loader-as-a-Service’ Turns Home Routers and IoT into Mirai Farms
- news www.darkreading.com: Exposed Docker Daemons Fuel DDoS Botnet
Regulatory and Policy Updates #
- The UK government is set to announce plans for mandatory digital ID cards for all working adults, aimed at tackling illegal immigration. This initiative, referred to as a ‘Brit card,’ is expected to spark opposition from civil liberties campaigners due to concerns about personal privacy and potential cybersecurity risks associated with centralized data databases. The proposal seeks to revive a controversial policy from 21 years ago, adapting it for a modern, digitally enabled society.
- news www.theguardian.com: Digital ID cards: a versatile and useful tool or a worrying cybersecurity risk?
- news www.theguardian.com: Starmer to unveil digital ID cards in plan set to ignite civil liberties row
- India’s Digital Personal Data Protection (DPDP) Act, 2023, now mandates tougher obligations for handling personal data and imposes strict breach notification standards. Organizations must notify CERT-In within 6 hours of a cyber incident and the Data Protection Board (DPB) within 72 hours of a breach, with penalties up to ₹250 crore per instance. This law creates a new era of accountability for over 1.4 billion users, requiring businesses to adapt their data protection practices.
- news thecyberexpress.com: How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act
- A new $100,000 fee for H-1B visa applications, effective September 21, 2025, is significantly increasing talent acquisition costs for US IT companies. This policy change creates uncertainty and is prompting companies to reconsider hiring foreign talent in the US, potentially shifting recruitment to countries like Canada, India, and Mexico, thus impacting the global IT labor market and the US startup ecosystem.
- community www.reddit.com: Will the uncertainty around H1B process end up with better job opportunities for Americans?
- news www.cio.com: アメリカ H-1B 비자, 요건 강화·비용 폭등···기업과 외국 인력에 미치는 영향은?
- news www.cio.com: シリコンバレーに激震! H-1Bビザ新手数料10万ドルが招くかもしれないIT人材の大変動とは?
- The Estonian government has eased cybersecurity requirements for approximately 1200 micro and small businesses and local government agencies. This policy change introduces clearer, more manageable primary security measures, replacing the full Estonian Information Security Standard (E-ITS) or ISO/IEC 27001, to reduce administrative burden and improve resilience against phishing, data exfiltration, and ransomware attacks for organizations with limited resources.
- CISA has issued Emergency Directive 25-03, mandating federal agencies to identify, analyze, and mitigate potential compromises of Cisco Adaptive Security Appliances (ASA) and Cisco Firepower devices. The directive, prompted by actively exploited zero-day vulnerabilities (CVE-2025-20333, CVE-2025-20362), requires agencies to collect memory files for forensic analysis by September 26, 2025, and to either patch or disconnect end-of-life devices immediately. This urgent action highlights the significant risk posed by nation-state exploitation of critical perimeter network devices.
- gov ctoatncsc.substack.com: CTO at NCSC Summary: week ending September 28th
- gov www.cisa.gov: CISA Directs Federal Agencies to Identify and Mitigate Potential Compromise of Cisco Devices
- news cyberscoop.com: CISA alerts federal agencies of widespread attacks using Cisco zero-days
- news cyberscoop.com: CISA says it observed nearly year-old activity tied to Cisco zero-day attacks
- A report from Senate Homeland Security and Governmental Affairs Committee Democrats concludes that the Department of Government Efficiency (DOGE) has violated cybersecurity and privacy rules at three federal agencies (GSA, OPM, SSA). Practices include bypassing cybersecurity protections, evading oversight, and operating with unchecked access to Americans’ personal data, creating unprecedented privacy and security risks. Concerns include potential data breaches with ‘catastrophic adverse effect’ and the use of Starlink to circumvent agency IT oversight.
- news cyberscoop.com: Dem report concludes Department of Government Efficiency violates cybersecurity, privacy rules
- personal www.schneier.com: Digital Threat Modeling Under Authoritarianism
- A proposed US cyber threat information-sharing bill reauthorization by Senator Rand Paul is facing backlash from Senate committee members. Lawmakers fear this version could undermine the original CISA 2015 law, which facilitates cyber threat sharing between the private sector and federal government and provides crucial liability protections. The existing law is set to expire on September 30 unless Congress agrees on reauthorization, making broad changes to the law risky.
- gov health-isac.org: Health-ISAC Hacking Healthcare 9-26-2025
- gov health-isac.org: Paul’s cyber info-sharing bill sparks backlash from Senate committee members
Security Operations #
- Migration to post-quantum cryptography is an urgent and significant challenge for the financial services sector, requiring global coordination and extensive code rewriting. Quantum computing’s potential to break current encryption standards necessitates a shift to post-quantum encryption algorithms like MLKEM in a hybrid mode (X25519 + MLKEM). This ensures that ‘harvest now, decrypt later’ attacks will not compromise sensitive data once quantum computers become viable.
- gov ctoatncsc.substack.com: CTO at NCSC Summary: week ending September 28th
- gov www.fsisac.com: FS-ISAC Urges Global Coordination for Migration to Post-Quantum Cryptography in Financial Services
- vendor blog.cloudflare.com: Automatically Secure: how we upgraded 6,000,000 domains by default to get ready for the Quantum Future
- vendor www.security.com: Billington CyberSecurity Summit: AI Takes Center Stage
- AI is increasingly trusted and integrated into threat intelligence and SOC workflows for tasks like report summarization, threat scoring, and recommended actions. Security leaders report high trust in AI-generated output (86%) and expect AI to reduce analyst workloads by a quarter or more. Effective AI-driven security operations require ‘context engineering’ to provide agents with rich, contextual intelligence from various data layers (alerts, identity, asset, enrichments) to move beyond basic processing to intelligent analysis.
- personal cisotradecraft.substack.com: AI is the Oxygen, Data is the Fuel: Why Your CISO Role is About to Become the Hottest Strategy Job on the Planet
- personal www.detectionatscale.com: The Data Your AI-Powered SOC Needs
- personal www.detectionatscale.com: D@S #67: The Crawl, Walk, Run of Agentic Security Operations with Stephen Gubenia
- vendor security.googleblog.com: Accelerating adoption of AI for cybersecurity at DEF CON 33
- vendor www.recordedfuture.com: Beyond the Hype: What 520+ Security Leaders Revealed About AI in Threat Intelligence
- Exposure management platforms are critical for effectively reducing cyber risk by unifying data from various security tools (vulnerability management, cloud security, application security, endpoint security, identity management, OT, IoT, AI). These platforms help break down silos, cut through alert noise, and prioritize the most critical threats, allowing security and IT teams to focus on fixing what matters most in their expanding attack surfaces.
- vendor www.tenable.com: Defusing Cloud Misconfiguration Risk: Finding and Fixing Hidden Cloud Security Flaws
- vendor www.tenable.com: How to Future-Proof Your Cybersecurity Spend
- The debate continues between ‘decoupled SIEM’ architectures, which separate security components, and ‘supercoupled SIEM’ or ‘EDR-ized SIEM’ with tightly integrated platforms. While decoupled SIEM with federated log search and AI agents offers automation, tightly integrated platforms bundling search, dashboards, detection, data collection, and AI capabilities are seen as the mainstream future for many organizations. The latter model often includes auxiliary decentralized elements as needed, forming a ‘90% centralized / 10% federated SIEM’ approach.
- community www.reddit.com: Implementing SIEM for my middle size company
- personal medium.com: Decoupled SIEM: Where I Think We Are Now?
- Organizations are adopting a ‘secure by default’ approach with automated guardrails to manage cloud security in complex multi-cloud environments. This involves leveraging native cloud capabilities, preventive policies, and custom auto-remediation tools (e.g., in AWS, Azure, GCP) to identify, prevent, and fix common cloud misconfigurations. The goal is to build a consistent security baseline and shift security left by scanning infrastructure as code (IaC) in CI/CD pipelines to prevent issues before deployment.
- community www.reddit.com: Serverless Security Blindspots: When Your Function's IAM Role is Too Permissive
- vendor blogs.cisco.com: Bridging the Gap: Cisco’s Blueprint for Developer-Centric Cloud Security
- vendor blogs.cisco.com: The 80/20 Rule Doesn’t Apply to Security: How Cisco SASE Bridges the Gap
- vendor www.tenable.com: Defusing Cloud Misconfiguration Risk: Finding and Fixing Hidden Cloud Security Flaws
- Adopting a positive security model with application control is crucial for strengthening defenses, moving beyond traditional antivirus. This default-deny approach decides what is allowed and blocks everything else. Effective implementation involves preparing employees for a culture shift, building a strong infrastructure with Endpoint Detection and Response (EDR) tools for granular visibility, and tailoring solutions to organizational needs. This approach significantly enhances protection even with gradual adoption, addressing issues like legacy systems and edge application access.
- news www.cio.com: How to harmonize virtualization and containerization
- vendor www.security.com: Ready to Take on Application Control? Read This First.
- A new report reveals that organizations, on average, detect only 19% of all human risk activity, leaving a majority of risky behaviors such as credential misuse and insider threats unseen. This highlights a significant gap between increased spending on security awareness training (SAT) and actual reductions in human risk exposure. Effective human risk management (HRM) requires new strategies, proven frameworks, and cross-functional collaboration to extend risk ownership beyond traditional security teams.
- news hackread.com: Living Security Unveils HRMCon 2025 Speakers as Report Finds Firms Detect Just 19% of Human Risk
- vendor www.huntress.com: SAT effectiveness: Are security awareness training programs reducing human risk?
Wins #
- A coordinated Interpol operation in Africa led to 260 arrests and the dismantling of transnational criminal networks engaged in social media-based romance and sextortion scams. The crackdown identified over 1,460 victims who collectively lost an estimated $2.8 million, with $70,000 recovered. The operation also seized over 1,200 electronic devices and targeted online infrastructures, highlighting successful international cooperation in combating cyber fraud.
- vendor therecord.media: Africa cybercrime crackdown includes hundreds of arrests, Interpol says
- Significant arrests have been made in connection with major cybercrime groups. In the UK, 19-year-old Thalha Jubair, a core member of the Scattered Spider group linked to $115 million in ransoms, was arrested and charged. Separately, two 17-year-olds were arrested in the Netherlands on suspicion of conducting cyber espionage for Russia, including using ‘wifi-sniffers’ near prominent government buildings in The Hague.
- news cyberscoop.com: Teen arrested in UK was a core figure in Scattered Spider’s operations
- news cybersecuritynews.com: 17-year-old Hacker Responsible for Vegas Casinos Hack has Been Released
- news www.darkreading.com: The Fall of Scattered Spider? Teen Member Surrenders Amid Group's Shutdown Claims
- personal krebsonsecurity.com: Feds Tie ‘Scattered Spider’ Duo to $115M in Ransoms
- vendor blog.barracuda.com: Cyber crooks getting younger — and more dangerous
- vendor therecord.media: Teen arrested by Dutch police reportedly suspected of spying for Russia
- The US Secret Service disrupted a large network of telecommunications devices, including over 300 SIM servers and 100,000 SIM cards, in the New York City area. This network had the capability to disable cellular systems, send bulk messages to the entire US population, and launch Distributed Denial of Service (DDoS) attacks. The operation prevented potential cellular network shutdowns and disrupted a ‘well-organized and well-funded’ scheme involving nation-state threat actors and organized crime groups.
- personal www.schneier.com: US Disrupts Massive Cell Phone Array in New York
- OpenAI successfully fixed a zero-click vulnerability in ChatGPT Deep Research. This addresses a critical security flaw that could have been exploited without user interaction, improving the overall security posture of the AI platform.
- vendor www.malwarebytes.com: A week in security (September 15 – September 21)
- Google removed 224 malicious apps from the Google Play Store after discovering an ad fraud campaign. This action helps to protect users from deceptive practices and maintains the integrity of the app ecosystem.
- vendor www.malwarebytes.com: A week in security (September 15 – September 21)
- A security flaw in the American Archive of Public Broadcasting (AAPB) website, which allowed unauthorized access to protected and private media for years, was fixed within 48 hours after being reported by a cybersecurity researcher. The vulnerability facilitated copyright violations and misuse of historically significant public radio and television programs. This quick remediation highlights the importance of prompt response to vulnerability disclosures.
- vendor www.malwarebytes.com: American Archive of Public Broadcasting allowed access to restricted media for years
Disclaimer #
The summaries in this brief are generated autonomously by a LLM based on provided system and user prompts. While every effort is made to consolidate accurate and relevant insights, the model may occasionally misinterpret, misrepresent, or hallucinate information. Readers are strongly advised to verify all key points by consulting the original sources linked in the brief for complete context and accuracy.
The brief is created in collaboration with BlackStork and is based on a free template.
Reach out if you have questions or suggestions.