Cyber OSINT Overview, Nov 3 - Nov 9, 2025 #
This brief consolidates key updates from 80+ sources, including government organizations, cybersecurity vendors, threat intelligence teams, security research labs, and blogs from cybersecurity communities and professionals. It highlights the most significant threats, vulnerabilities, and developments from the past week to keep you informed.
Most Discussed Topics #
- The integration and weaponization of Artificial Intelligence in cybersecurity is a dominant theme, with new reports detailing both offensive and defensive applications. Threat actors are now deploying AI-enabled malware like PROMPTFLUX and PROMPTSTEAL, which use LLMs at runtime to generate malicious code and evade detection. Concurrently, defenders are moving towards an “Agentic SOC” model, using AI for threat hunting, analysis, and response automation. This dual-use evolution is also creating new attack surfaces, with vulnerabilities being discovered in AI platforms like ChatGPT and threat actors using AI to enhance social engineering campaigns.
- news thecyberexpress.com: AI Malware Detected in the Wild as Threats Evolve
- vendor cloud.google.com: Preparing for Threats to Come: Cybersecurity Forecast 2026
- vendor cloud.google.com: GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
- vendor sentinelone.com: LABScon25 Replay | LLM-Enabled Malware In the Wild
- vendor tenable.com: HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage
- Vulnerabilities in foundational open-source software and core infrastructure components continue to be a major focus, impacting a vast ecosystem of products. Numerous advisories highlighted critical flaws in the Linux Kernel, leading to risks such as denial of service, privilege escalation, and remote code execution. Similarly, multiple vulnerabilities were reported in the widely used cURL library, potentially causing information disclosure and security bypasses. Containerization technologies were also affected, with several high-severity vulnerabilities discovered in the runC container runtime that could allow for container escape and host compromise.
- gov cyber.gc.ca: Red Hat security advisory (AV25-717)
- gov cyber.gc.ca: Ubuntu security advisory (AV25-716)
- gov wid.cert-bund.de: [UPDATE] [hoch] cURL: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [mittel] Red Hat Enterprise Linux: Mehrere Schwachstellen
- gov wid.cert-bund.de: [UPDATE] [hoch] Linux Kernel: Mehrere Schwachstellen
- vendor fortiguard.fortinet.com: runC Container Escape Vulnerabilities
- Security concerns related to Industrial Control Systems (ICS) and Operational Technology (OT) are prominent, with numerous advisories from CISA detailing vulnerabilities in widely used equipment. Flaws were identified in products from vendors such as Advantech, ABB, Radiometrics, and Fuji Electric. These vulnerabilities could allow for remote code execution, unauthorized access via hardcoded credentials, and data manipulation. The risks highlighted include disruption of airport operations through weather system manipulation and unauthorized control of industrial controllers, emphasizing the need for robust security in critical infrastructure.
- gov cyber.gc.ca: [Control systems] CISA ICS security advisories (AV25–718)
- gov cisa.gov: CISA Releases Four Industrial Control Systems Advisories
- gov cisa.gov: Radiometrics VizAir
- gov cisa.gov: ABB FLXeon Controllers
- Software supply chain security remains a critical area of focus, with attacks targeting developers and CI/CD pipelines through various vectors. Malicious npm packages were discovered delivering the Vidar infostealer by executing postinstall scripts, masquerading as legitimate SDKs. A critical remote code execution vulnerability (CVE-2025-11953) was also found in the widely-used React Native CLI package. Additionally, research highlighted the risk of AI assistants hallucinating non-existent software packages, which could lead to “slopsquatting” attacks if an adversary registers the package with malicious code.
- community reddit.com: Built SlopGuard - open-source defense against AI supply chain attacks (slopsquatting)
- news hackread.com: Severe React Native Flaw Exposes Developer Systems to Remote Attacks
- vendor securitylabs.datadoghq.com: MUT-4831: Trojanized npm packages deliver Vidar infostealer malware
- vendor securitylabs.datadoghq.com: A runtime security approach to detecting supply chain attacks
Critical Vulnerabilities #
- Multiple vulnerabilities in Cisco products are being actively exploited, posing significant risks of remote code execution and denial of service. Critical flaws in Cisco Unified Contact Center Express (CVE-2025-20354 and CVE-2025-20358) allow unauthenticated attackers to upload arbitrary files and execute commands with root permissions. Additionally, a new attack variant targets Cisco Secure Firewall ASA and FTD devices by chaining vulnerabilities CVE-2025-20333 and CVE-2025-20362, which can cause an unexpected reload and lead to a DoS condition on unpatched systems.
- gov cyber.gc.ca: Cisco security advisory (AV25-619) – Update 1
- gov wid.cert-bund.de: [NEU] [hoch] Cisco Unified Contact Center Express (UCCX): Mehrere Schwachstellen
- gov cisecurity.org: Multiple Vulnerabilities in Cisco Products Could Allow for Remote Code Execution
- news thecyberexpress.com: Cisco Issues Critical Warning Over New Unified Contact Center Express Vulnerabilities
- A zero-day vulnerability in Samsung’s Android image processing library (CVE-2025-21042) was exploited in the wild for months to deliver the ‘LANDFALL’ commercial spyware. The attack, possibly a zero-click exploit, used malicious DNG image files sent via WhatsApp to compromise Samsung Galaxy devices. Once installed, the spyware enabled comprehensive surveillance, including microphone recording, location tracking, and exfiltration of photos, contacts, and call logs. The campaign primarily targeted individuals in the Middle East and highlights an emerging attack vector in mobile device image processing libraries.
- gov wid.cert-bund.de: [NEU] [hoch] Samsung Android: Mehrere Schwachstellen
- news cyberscoop.com: New Landfall spyware apparently targeting Samsung phones in Middle East
- news cybersecuritynews.com: Hackers Hijack Samsung Galaxy Phones via 0-Day Exploit Using a Single WhatsApp Image
- vendor unit42.paloaltonetworks.com: LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices
- CISA has added two actively exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, indicating an immediate risk to organizations. The first, CVE-2025-48703, is an unauthenticated remote code execution flaw in CWP (Control Web Panel) that allows attackers to inject shell commands. The second, CVE-2025-11371, is a vulnerability in Gladinet CentreStack and Triofox that permits external parties to access files and directories. Federal agencies are required to remediate these vulnerabilities, and all organizations are strongly urged to prioritize patching.
- Multiple vulnerabilities have been discovered in OpenAI’s ChatGPT, posing significant risks for data exfiltration and prompt injection. Tenable Research identified seven flaws, including some in the latest GPT-5 model, that could allow attackers to steal private user data from chat history and memories, bypass safety mechanisms, and achieve persistence. Separately, Microsoft detailed a side-channel attack named ‘Whisper Leak,’ which enables attackers to infer the topics of encrypted AI chat sessions by analyzing network traffic patterns like packet size and timing.
- news cybersecuritynews.com: New Whisper Leak Toolkit Exposes User Prompts to Popular AI Agents within Encrypted Traffic
- news hackread.com: New ChatGPT Vulnerabilities Let Hackers Steal Data, Hijack Memory
- news securityaffairs.com: AI chat privacy at risk: Microsoft details Whisper Leak side-channel attack
- vendor tenable.com: HackedGPT: Novel AI Vulnerabilities Open the Door for Private Data Leakage
- A critical unauthenticated remote code execution vulnerability (CVE-2025-59287, CVSS 9.8) in Microsoft’s Windows Server Update Services (WSUS) is being actively exploited. The flaw is due to unsafe deserialization of untrusted data and allows attackers to execute arbitrary code with system privileges. Given that WSUS is a core component for patch management in enterprise networks, a compromise can provide a foothold for widespread network compromise. CISA has added the vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, mandating immediate action for federal agencies.
- vendor fortiguard.fortinet.com: Microsoft Windows Server Update Service Remote Code Execution Vulnerability
- vendor unit42.paloaltonetworks.com: Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited in the Wild (Updated November 3)
- Multiple high-severity vulnerabilities have been discovered in runC, the underlying container runtime for Docker, Kubernetes, and other platforms, which could allow for container escape. The flaws (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) involve incorrect handling of masked paths and bind-mounts. A malicious or compromised container could exploit these issues to gain write access to the host filesystem, leading to remote code execution on the host, persistence, or denial-of-service attacks across a cluster. Users are urged to patch runC and update node images immediately.
- vendor fortiguard.fortinet.com: runC Container Escape Vulnerabilities
- Multiple vulnerabilities have been patched in Apple products including iOS, iPadOS, macOS, tvOS, watchOS, and Safari, with the most severe allowing for arbitrary code execution. The flaws could be exploited by processing maliciously crafted web content, media files, or other inputs, potentially leading to memory corruption or unexpected system termination. Other issues could allow an app to bypass privacy preferences, break out of its sandbox, or access protected user data. While none are reported as actively exploited, users are urged to apply the updates immediately to mitigate risks.
- community isc.sans.edu: Apple Patches Everything, Again, (Tue, Nov 4th)
- gov cyber.gc.ca: Apple security advisory (AV25-722)
- gov cyber.gc.ca: Apple security advisory (AV25-727)
- gov cisecurity.org: Multiple Vulnerabilities in Apple Products Could Allow for Arbitrary Code Execution
Major Incidents #
- The DeFi platform Balancer V2 suffered a massive exploit resulting in the loss of $128.64 million across six different blockchain networks. The attack, which took place in under 30 minutes, leveraged a sophisticated exploit targeting a rounding error vulnerability in the platform’s ComposableStablePool contracts. Attackers were able to manipulate arithmetic precision loss during pool invariant calculations through a series of carefully crafted batchSwap operations, allowing them to artificially suppress token prices and drain liquidity.
- vendor research.checkpoint.com: How an Attacker Drained $128M from Balancer Through Rounding Error Exploitation
- SonicWall confirmed that a nation-state actor was responsible for a security breach of its MySonicWall customer portal in September. The attackers gained access to the cloud backup service and stole firewall configuration files for every customer using the service. While SonicWall stated the attack was contained and did not impact its products or source code, the stolen configuration files contain sensitive data such as firewall rules and encrypted credentials, posing a significant risk to affected customers.
- news cyberscoop.com: SonicWall pins attack on customer portal to undisclosed nation-state
- news securityaffairs.com: SonicWall blames state-sponsored hackers for September security breach
- The U.S. Congressional Budget Office (CBO) confirmed it was breached by a “complex foreign actor,” leading to an ongoing investigation. The incident may have exposed messages and chats between Congressional offices and CBO staffers. The agency has taken immediate containment actions and implemented new security controls. This attack follows a pattern of nation-state actors targeting U.S. federal agencies involved in finance and policy, including recent breaches at the Treasury Department and the Office of the Comptroller of the Currency (OCC).
- news cyberscoop.com: Agency that provides budget data to Congress hit with security incident
- news therecord.media: Congressional Budget Office implementing new security controls following cyberattack
- Japanese media giant Nikkei Inc. disclosed a data breach resulting from a malware infection on an employee’s computer. The attackers used stolen credentials to gain unauthorized access to Nikkei’s internal Slack workspace. The incident exposed the names, email addresses, and chat histories of 17,368 individuals, including employees and business partners. The company has reset passwords and reported the incident to Japan’s Personal Information Protection Commission.
- news hackread.com: Hackers Steal Personal Data and 17K Slack Messages in Nikkei Data Breach
- news darkreading.com: Nikkei Suffers Breach Via Slack Compromise
- The University of Pennsylvania confirmed a data breach after an attacker used social engineering to compromise a single sign-on account. The unauthorized access affected systems related to development and alumni activities, resulting in data theft. The attacker also sent an offensive mass email to the university community from official addresses, falsely claiming a more extensive breach of student data. The university has since secured the systems and is investigating the extent of the data theft.
- news thecyberexpress.com: University of Pennsylvania Confirms Cyberattack and Data Theft Following Social Engineering Breach
- news bleepingcomputer.com: Students and alumni of the University of Pennsylvania have received a wave of offensive emails sent from compromised university email addresses, falsely claiming that sensitive student and alumni data was stolen.
- A successful ransomware attack against Jaguar Land Rover (JLR) was significant enough to negatively impact the UK’s overall GDP growth, according to the Bank of England. The incident highlights the systemic economic risk posed by major cyberattacks on critical manufacturing and supply chain entities. While specific details of the attack were not provided, the acknowledgment from a central bank underscores the macroeconomic consequences that can result from a single corporate breach.
- community reddit.com: Bank of England says JLR's cyberattack damaged UK GDP growth
Emerging Threats #
- A novel commercial-grade Android spyware named LANDFALL has been identified targeting Samsung Galaxy devices in the Middle East. The spyware was delivered by exploiting a zero-day vulnerability (CVE-2025-21042) in Samsung’s image processing library. Attackers sent malicious DNG image files via WhatsApp, possibly enabling a zero-click infection that grants full surveillance capabilities, including microphone access, location tracking, and data exfiltration. The campaign has been active since mid-2024 and shows tactical overlaps with private-sector offensive actor (PSOA) operations.
- community reddit.com: New 'Landfall' spyware exploited a Samsung 0-day delivered through WhatsApp messages
- news cyberscoop.com: New Landfall spyware apparently targeting Samsung phones in Middle East
- vendor unit42.paloaltonetworks.com: LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices
- Google’s Threat Intelligence Group (GTIG) has identified the first instances of malware using Large Language Models (LLMs) during execution in active operations. Malware families such as PROMPTFLUX and PROMPTSTEAL dynamically generate malicious scripts and obfuscate their own code at runtime. This marks a shift from using AI for productivity to deploying novel, adaptive malware that creates malicious functions on demand, representing a significant evolution in threat capabilities. Researchers at SentinelOne also detailed hunting techniques for this new class of threat, which they term “LLM-enabled malware.”
- news securityaffairs.com: Google sounds alarm on self-modifying AI malware
- news thecyberexpress.com: AI Malware Detected in the Wild as Threats Evolve
- vendor cloud.google.com: GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools
- vendor sentinelone.com: LABScon25 Replay | LLM-Enabled Malware In the Wild
- The North Korean threat group Kimsuky has been observed using a new multi-stage infection chain initiated by a JavaScript dropper. The initial dropper is unobfuscated and serves to download additional payloads from adversary-controlled infrastructure. This activity is part of the group’s ongoing espionage operations, which primarily target government entities and subject matter experts. Researchers analyzed the dropper and its associated network traffic to detail the infection process.
- news darkreading.com: Kimsuky Debuts HTTPTroy Backdoor Against South Korea Users
- vendor blog.pulsedive.com: Dissecting the Infection Chain: Technical Analysis of the Kimsuky JavaScript Dropper
- Cephalus, a new financially motivated ransomware group, is gaining initial access by exploiting stolen Remote Desktop Protocol (RDP) credentials for accounts that do not have multi-factor authentication (MFA) enabled. The group uses customized, Go-based ransomware that disables security tools like Windows Defender and deletes volume shadow copies to prevent recovery. To pressure victims, Cephalus proves data exfiltration by providing links to stolen data in their ransom notes.
- news cybersecuritynews.com: Threat Actors Leveraging RDP Credentials to Deploy Cephalus Ransomware
- vendor asec.ahnlab.com: An Unerring Spear: Cephalus Ransomware Analysis
- The Gootloader malware has resurfaced with updated obfuscation and persistence techniques. Recent infections show the threat actor using custom WOFF2 web fonts with glyph substitution to hide malicious filenames and moving from scheduled tasks to the Startup folder for persistence. Post-infection, access is often transferred to the Vanilla Tempest group, which has been observed compromising domain controllers within hours of initial access to deploy ransomware such as Rhysida and BlackCat.
- news securityaffairs.com: Gootloader Returns: What Goodies Did They Bring?
- vendor huntress.com: Gootloader | Threat Detection Overview
- China-linked threat actors are maintaining a focus on U.S. organizations involved in policy-making, demonstrating a persistent interest in espionage. In a recent campaign, attackers compromised a U.S. non-profit for several weeks, using tactics like DLL sideloading with a legitimate Vipre Antivirus executable (vetysafe.exe). The TTPs observed in the attack have been previously associated with various Chinese APT groups, including Kelp (Salt Typhoon), Space Pirates, and subgroups of APT41, indicating a shared or overlapping operational playbook.
- news securityaffairs.com: China-linked hackers target U.S. non-profit in long-term espionage campaign
- vendor security.com: China-linked Actors Maintain Focus on Organizations Influencing U.S. Policy
- Malicious actors are increasingly targeting software supply chains by publishing trojanized packages to public repositories like npm. A recent campaign involved 17 npm packages masquerading as SDKs, which contained downloader malware executed via postinstall scripts. This malware ultimately deployed the Vidar infostealer on Windows systems. This marks the first known public disclosure of Vidar being distributed through npm, highlighting the continued abuse of package managers as an initial access vector.
- vendor securitylabs.datadoghq.com: MUT-4831: Trojanized npm packages deliver Vidar infostealer malware
Regulatory and Policy Updates #
- CISA has added two new actively exploited vulnerabilities, CVE-2025-48703 and CVE-2025-11371, to its Known Exploited Vulnerabilities (KEV) Catalog. The first vulnerability is a command injection flaw in CWP Control Web Panel, while the second affects Gladinet CentreStack and Triofox, allowing unauthorized access to files. In accordance with Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies are required to remediate these vulnerabilities by the specified deadlines to protect against active threats.
- The U.S. government is increasing its strategic focus on technology competition with China, particularly in telecommunications and emerging tech sectors. Congressional leaders are pressing for a comprehensive strategy on 6G to avoid repeating past mistakes with 5G, which allowed Chinese firms like Huawei to gain significant global influence. In parallel, House GOP leaders are calling for the Commerce Department to investigate and potentially restrict Chinese-made products in over a dozen industries, including AI and industrial control systems, citing national security risks.
- news cyberscoop.com: Congressional leaders want an executive branch strategy on China 6G, tech supply chain
- news cyberscoop.com: House GOP leaders seek government probe, restrictions on Chinese-made tech
- The Pentagon has released a revised model to enhance its cyber force capabilities, focusing on talent recruitment, training, and operational readiness. The plan includes the creation of three new organizations: a Cyber Innovation Warfare Center, an Advanced Cyber Training and Education Center, and a new structure for tactical-level support. However, the implementation timeline is protracted, with some initiatives not expected to be fully operational until the early 2030s, which may intensify calls from Congress and experts for the creation of a separate U.S. Cyber Force.
- community reddit.com: Pentagon releases ‘revised’ plan to boost cyber talent, ‘domain mastery’
- news therecord.media: Don't call it Cyber Command 2.0: Master plan for digital forces will take years to implement
- The European Commission is moving to address antitrust concerns regarding SAP’s software licensing and maintenance practices. Following an investigation into potentially anti-competitive behavior in the on-premises ERP support market, SAP is expected to submit formal concessions. The investigation focuses on practices that may restrict customers from using rival support providers, such as bundling support services and charging prohibitive fees for returning to SAP support. The outcome is particularly significant for customers managing the transition from legacy SAP systems.
- news cio.com: SAP: Latest news and insights
- news cio.com: SAP to offer concessions to the EU over antitrust probe into ERP support practices
Security Operations #
- The UK’s National Cyber Security Centre (NCSC) is retiring its public Web Check and Mail Check services, signaling a shift towards reliance on commercial solutions. The agency advises that the capabilities offered by these free tools are now widely available in commercial External Attack Surface Management (EASM) products. This move encourages organizations to adopt more comprehensive, commercially supported tools for monitoring and securing their internet-facing assets.
- personal ctoatncsc.substack.com: CTO at NCSC Summary: week ending November 9th
- VirusTotal has launched its ‘#MonthOfVTSearch’ initiative for November, offering all enterprise customers uncapped manual searches through its web interface without consuming API quota. This move is designed to encourage threat hunting and exploration of the platform’s advanced search capabilities. Daily search query examples will be shared on social media to help users sharpen their threat analysis skills and uncover new insights from VirusTotal’s extensive dataset.
- vendor blog.virustotal.com: November is the Month of Searches: Explore, Learn, and Share with #MonthOfVTSearch
- The MITRE ATT&CK framework has been updated to enhance its coverage of modern threat landscapes, including new intelligence on attacks targeting cloud and development environments. The latest version incorporates specific tactics and techniques related to Kubernetes, continuous integration/continuous delivery (CI/CD) pipelines, and cloud databases. This expansion provides defenders with a more comprehensive knowledge base for modeling threats and improving detection and response strategies in these increasingly targeted areas.
- The OWASP Foundation has released its updated Top 10 list for 2025, outlining the most critical security risks to web applications. This widely recognized standard serves as a key resource for developers and security professionals to prioritize their efforts in mitigating common vulnerabilities. The latest list reflects changes in the threat landscape, including risks associated with modern application architectures and development practices. Organizations are encouraged to review the new list to align their security testing and remediation strategies accordingly.
- community reddit.com: OWASP 2025 Top 10 for Web Released - What are your thoughts?
- Google’s 2026 Cybersecurity Forecast predicts a major shift in security operations, with AI agents becoming integral to the Security Operations Center (SOC). This “Agentic SOC” model will see analysts directing AI to handle routine tasks like data correlation and incident summarization, freeing them to focus on high-level strategy and validation. This evolution will necessitate new approaches to identity and access management for AI agents to ensure they operate under the principle of least privilege, transforming the roles of security analysts and the architecture of defensive tools.
- vendor cloud.google.com: Preparing for Threats to Come: Cybersecurity Forecast 2026
- vendor tenable.com: Cybersecurity Snapshot: AI Will Take Center Stage in Cyber in 2026, Google Says, as MITRE Revamps ATT&CK Framework
Wins #
- Aleksei Olegovich Volkov, a 25-year-old Russian national, pleaded guilty in a U.S. court for his role as an initial access broker for the Yanluowang ransomware group. Operating from Russia between 2021 and 2022, Volkov targeted at least seven U.S. businesses by exploiting vulnerabilities and selling network access to co-conspirators. He faces a maximum penalty of up to 53 years in prison and is required to pay nearly $9.2 million in restitution to the victims.
- In a significant international law enforcement operation, nine individuals have been arrested across Europe in connection with a €600 million cryptocurrency laundering scheme. The coordinated bust highlights a major success in combating large-scale financial cybercrime. The arrests disrupt a substantial network responsible for laundering illicit funds, demonstrating increased collaboration among European authorities to tackle complex cross-border criminal activities involving digital assets.
- news securityaffairs.com: Nine arrested in €600M crypto laundering bust across Europe
- Malwarebytes demonstrated strong performance in mobile security by achieving a 100% detection rate in the AV-Comparatives Stalkerware Test 2025. The test evaluated 13 leading Android security applications against 17 different stalkerware-type apps. Malwarebytes was the only product to detect all tested samples, showcasing its effectiveness in identifying and protecting users from covert surveillance software. This result highlights the company’s commitment as a founding member of the Coalition Against Stalkerware.
- vendor malwarebytes.com: Malwarebytes scores 100% in AV-Comparatives Stalkerware Test 2025
- A federal judge has concluded the legal proceedings against Paige Thompson, the hacker responsible for the 2019 Capital One data breach that affected over 100 million people. After an appeals court vacated her initial sentence, the judge reimposed a sentence of time served plus five years of supervised release. While prosecutors argued for a prison term, the judge cited Thompson’s mental health, acceptance of responsibility, and compliance during supervision as factors, bringing a definitive end to this high-profile case.
- news cyberscoop.com: Court reimposes original sentence for Capital One hacker
Disclaimer #
The summaries in this brief are generated autonomously by a LLM based on provided system and user prompts. While every effort is made to consolidate accurate and relevant insights, the model may occasionally misinterpret, misrepresent, or hallucinate information. Readers are strongly advised to verify all key points by consulting the original sources linked in the brief for complete context and accuracy.
The brief is created in collaboration with BlackStork and is based on a free template.
Reach out if you have questions or suggestions.