=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 09-10-2025 18:01 − Freitag 10-10-2025 18:01
Handler: Guenes Holler
Co-Handler: n/a
=====================
= News =
=====================
∗∗∗ Discord says hackers stole government IDs of 70,000 users ∗∗∗
---------------------------------------------
Discord says that hackers made off with images of 70,000 users’ government IDs that they were required to provide in order to use the site.
---------------------------------------------
https://arstechnica.com/security/2025/10/discord-says-hackers-stole-governm…
∗∗∗ RondoDox botnet targets 56 n-day flaws in worldwide attacks ∗∗∗
---------------------------------------------
A new large-scale botnet called RondoDox is targeting 56 vulnerabilities in more than 30 distinct devices, including flaws first disclosed during Pwn2Own hacking competitions. The attacker focuses on a wide range of exposed devices, including DVRs, NVRs, CCTV systems, and web servers and have been active since June.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/rondodox-botnet-targets-56-n…
∗∗∗ GitHub Copilot CamoLeak AI Attack Exfiltrates Data ∗∗∗
---------------------------------------------
Every week or two nowadays, researchers come up with new ways of exploiting agentic AI tools built crudely into software platforms. Since companies are far more concerned with providing AI functionality than they are securing that functionality, there's been ample opportunity for mischief.
---------------------------------------------
https://www.darkreading.com/application-security/github-copilot-camoleak-ai…
∗∗∗ From LFI to RCE: Active Exploitation Detected in Gladinet and TrioFox Vulnerability ∗∗∗
---------------------------------------------
Cybersecurity company Huntress said it has observed active in-the-wild exploitation of an unpatched security flaw impacting Gladinet CentreStack and TrioFox products. The zero-day vulnerability, tracked as CVE-2025-11371 (CVSS score: 6.1), is an unauthenticated local file inclusion bug that allows unintended disclosure of system files. It impacts all versions of the software prior to and including 16.7.10368.56560.
---------------------------------------------
https://thehackernews.com/2025/10/from-lfi-to-rce-active-exploitation.html
∗∗∗ 175 Malicious npm Packages with 26,000 Downloads Used in Credential Phishing Campaign ∗∗∗
---------------------------------------------
Cybersecurity researchers have flagged a new set of 175 malicious packages on the npm registry that have been used to facilitate credential harvesting attacks as part of an unusual campaign. The packages have been collectively downloaded 26,000 times, acting as an infrastructure for a widespread phishing campaign codenamed Beamglea targeting more than 135 industrial, technology, and energy companies across the world, according to Socket.
---------------------------------------------
https://thehackernews.com/2025/10/175-malicious-npm-packages-with-26000.html
∗∗∗ Cops nuke BreachForums (again) amid cybercrime supergroup extortion blitz ∗∗∗
---------------------------------------------
US authorities have seized the latest incarnation of BreachForums, the cybercriminal bazaar recently reborn under the stewardship of the so-called Scattered Lapsus$ Hunters, with help from French cyber cops and the Paris prosecutor's office.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2025/10/10/cops_seize_b…
∗∗∗ Pro-Russian hackers caught bragging about attack on fake water utility ∗∗∗
---------------------------------------------
A pro-Russian hacker group has been caught boasting about a cyberattack that unfolded entirely inside a decoy system set up by researchers.
---------------------------------------------
https://therecord.media/fake-water-utility-honeypot-hacked-pro-russian-group
∗∗∗ More Than DoS (Progress Telerik UI for ASP.NET AJAX Unsafe Reflection CVE-2025-3600) ∗∗∗
---------------------------------------------
Welcome back. We’re excited to yet again publish memes under the guise of research and inevitably receive hate mail. But today, we’ll be doing something slightly different to normal. Today, instead of pulling apart “just one” enterprise-grade solution, we have inadvertently ripped apart a widely used ASP.NET library.
---------------------------------------------
https://labs.watchtowr.com/more-than-dos-progress-telerik-ui-for-asp-net-aj…
∗∗∗ New Stealit Campaign Abuses Node.js Single Executable Application ∗∗∗
---------------------------------------------
FortiGuard Labs has encountered a new and active Stealit malware campaign that leverages Node.js’ Single Executable Application (SEA) feature to distribute its payloads. This campaign was uncovered following a spike in detections of a particular Visual Basic script, which was later determined to be a component for persistence.
---------------------------------------------
https://feeds.fortinet.com/~/926060729/0/fortinet/blogs~New-Stealit-Campaig…
=====================
= Vulnerabilities =
=====================
∗∗∗ Claroty Product Security Advisory: OIDC Configurations in Claroty Secure Access ∗∗∗
---------------------------------------------
This advisory provides important information regarding a security vulnerability affecting on-premise Claroty Secure Access (formerly known as Claroty Secure Remote Access or SRA) when configured with OpenID Connect (OIDC) authentication, either currently or previously. Fixes for affected products are available in the customer portal. There are no known public exploits or a public proof of concept (POC) of this vulnerability.
---------------------------------------------
https://claroty.com/product-security/oidc-configurations-in-claroty-secure-…
∗∗∗ Monitoring-Software Checkmk: Rechteausweitungslücke in Windows-Version ∗∗∗
---------------------------------------------
Checkmk warnt vor Sicherheitslücken in der gleichnamigen Netzwerk-Überwachungssoftware. Eine betrifft den Windows-Agent und verpasst eine Einordnung als kritisches Sicherheitsrisiko nur knapp, eines der weiteren Lecks dürfte Admins hingegen keinen Schlaf rauben.
---------------------------------------------
https://www.heise.de/news/Monitoring-Software-Checkmk-Rechteausweitungsluec…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (redis and valkey), Fedora (docker-buildkit, ibus-bamboo, pgadmin4, webkitgtk, and wordpress), Mageia (kernel-linus, kmod-virtualbox & kmod-xtables-addons, and microcode), Oracle (compat-libtiff3 and udisks2), Red Hat (rsync), Slackware (python3), SUSE (chromium, cJSON, digger-cli, glow, go1.24, go1.25, go1.25-openssl, grafana, libexslt0, libruby3_4-3_4, pgadmin4, python311-python-socketio, and squid), and Ubuntu (dpdk, libhtp, vim, and webkit2gtk).
---------------------------------------------
https://lwn.net/Articles/1041564/
∗∗∗ Ivanti Endpoint Manager: Zero Day Initiative veröffentlicht 13 Zero-Days ∗∗∗
---------------------------------------------
In Ivantis Endpoint Manager (EPM) steckten schwere Sicherheitslücken, die das Unternehmen seit Monaten kennt – und dennoch erst in einem halben Jahr beheben wollte. Das war Trend Micros Zero Day Initiative (ZDI) zu lang – sie veröffentlicht die Lücken nun als "Zero Days". Im Fehlerkatalog tummeln sich elf SQL Injections, eine Pfadlücke und einmal Deserialisierung nicht vertrauenswürdiger Daten.
---------------------------------------------
https://heise.de/-10749054
∗∗∗ Schadcode-Lücken in Nvidia-GPU-Treiber geschlossen ∗∗∗
---------------------------------------------
Nvidias Entwickler haben mehrere Sicherheitslücken in verschiedenen Grafikkartentreibern geschlossen. Im schlimmsten Fall kann Schadcode Systeme vollständig kompromittieren. Davon sind Linux- und Windows-Computer bedroht.
---------------------------------------------
https://heise.de/-10749431
∗∗∗ 7-Zip: Infos zu geschlossenen Sicherheitslücken verfügbar ∗∗∗
---------------------------------------------
Mit der Version 25.00 von 7-Zip hat der Entwickler im Juli einige Sicherheitslücken geschlossen. Bislang war jedoch unklar, welche. Die Zero-Day-Initiative (ZDI) von Trend Micro hat nun Informationen zu einigen der darin gestopften Sicherheitslecks veröffentlicht.
---------------------------------------------
https://heise.de/-10749900
∗∗∗ Juniper Security Director: Angreifer können Sicherheitsmechanismus umgehen ∗∗∗
---------------------------------------------
Mehrere Produkte des Netzwerkausrüsters Juniper sind verwundbar. Sind Attacken erfolgreich, können Angreifer etwa manipulierte Images installieren oder Hintertüren in Switches verankern. Sicherheitspatches stehen zum Download bereit.
---------------------------------------------
https://heise.de/-10750030
∗∗∗ DSA-6022-1 valkey - security update ∗∗∗
---------------------------------------------
https://lists.debian.org/debian-security-announce/2025/msg00188.html
∗∗∗ CISA Adds One Known Exploited Vulnerability to Catalog: CVE-2021-43798 Grafana Path Traversal Vulnerability ∗∗∗
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2025/10/09/cisa-adds-one-known-expl…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 08-10-2025 18:00 − Donnerstag 09-10-2025 18:01
Handler: Guenes Holler
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ Crimson Collective hackers target AWS cloud instances for data theft ∗∗∗
---------------------------------------------
The Crimson Collective threat group has been targeting AWS (Amazon Web Services) cloud environments for the past weeks, to steal data and extort companies.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/crimson-collective-hackers-t…
∗∗∗ New FileFix attack uses cache smuggling to evade security software ∗∗∗
---------------------------------------------
A new variant of the FileFix social engineering attack uses cache smuggling to secretly download a malicious ZIP archive onto a victims system and bypassing security software.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/new-filefix-attack-uses-cach…
∗∗∗ Hacktivists target critical infrastructure, hit decoy plant ∗∗∗
---------------------------------------------
A pro-Russian hacktivist group called TwoNet pivoted in less than a year from launching distributed denial-of-service (DDoS) attacks to targeting critical infrastructure.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hacktivists-target-critical-…
∗∗∗ SonicWall: Firewall configs stolen for all cloud backup customers ∗∗∗
---------------------------------------------
SonicWall has confirmed that all customers that used the companys cloud backup service are affected by last months security breach.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/sonicwall-firewall-configs-s…
∗∗∗ Sicherheitsleck: Millionen Gästedaten in Hotelsoftware öffentlich einsehbar ∗∗∗
---------------------------------------------
In der Hotelsoftware Sihot ließen sich Millionen Gästedaten einsehen. Die Sicherheitslücken sind laut Hersteller aber bereits geschlossen.
---------------------------------------------
https://www.golem.de/news/sicherheitsleck-millionen-gaestedaten-in-hotelsof…
∗∗∗ Hackers Exploit WordPress Sites to Power Next-Gen ClickFix Phishing Attacks ∗∗∗
---------------------------------------------
Cybersecurity researchers are calling attention to a nefarious campaign targeting WordPress sites to make malicious JavaScript injections that are designed to redirect users to sketchy sites.
---------------------------------------------
https://thehackernews.com/2025/10/hackers-exploit-wordpress-themes-to.html
∗∗∗ localmind.ai: KI-Sicherheitsvorfall, es ist noch nicht vorbei – Teil 3 ∗∗∗
---------------------------------------------
Der Sicherheitsvorfall beim KI-Anbieter localmind.ai scheint noch nicht ausgestanden. Der Anbieter schreibt zwar, dass die Kernsysteme der Localmind-Plattform selbst nicht kompromittiert wurden, und man glaubt, die Infrastruktur gesichert zu haben. Es hat aber den Anschein, dass dies nicht ganz zutreffend ist.
---------------------------------------------
https://www.borncity.com/blog/2025/10/09/localmind-ai-ki-sicherheitsvorfall…
∗∗∗ Velociraptor leveraged in ransomware attacks ∗∗∗
---------------------------------------------
Cisco Talos has confirmed that ransomware operators are leveraging Velociraptor, an open-source digital forensics and incident response (DFIR) tool that had not previously been definitively tied to ransomware incidents.
---------------------------------------------
https://blog.talosintelligence.com/velociraptor-leveraged-in-ransomware-att…
∗∗∗ Fake Teams Installers Dropping Oyster Backdoor (aka Broomstick) ∗∗∗
---------------------------------------------
Hackers are using fake Microsoft Teams installers found in search results and ads to deploy the Oyster backdoor. Learn how to protect your PC from this remote-access threat.
---------------------------------------------
https://hackread.com/fake-teams-installers-oyster-backdoor-broomstick/
∗∗∗ New Chaos-C++ Ransomware Targets Windows by Wiping Data, Stealing Crypto ∗∗∗
---------------------------------------------
FortiGuard Labs reveals Chaos-C++, a new Chaos ransomware variant that deletes files over 1.3 GB instead of encrypting them and uses clipboard hijacking to steal cryptocurrency.
---------------------------------------------
https://hackread.com/chaos-c-ransomware-windows-data-crypto/
∗∗∗ Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign ∗∗∗
---------------------------------------------
Google Threat Intelligence Group (GTIG) and Mandiant began tracking a new, large-scale extortion campaign by a threat actor claiming affiliation with the CL0P extortion brand. The actor began sending a high volume of emails to executives at numerous organizations, alleging the theft of sensitive data from the victims Oracle E-Business Suite (EBS) environments.
---------------------------------------------
https://cloud.google.com/blog/topics/threat-intelligence/oracle-ebusiness-s…
∗∗∗ SVG Phishing hits Ukraine with Amatera Stealer, PureMiner ∗∗∗
---------------------------------------------
FortiGuard Labs recently observed a phishing campaign designed to impersonate Ukrainian government agencies and deliver additional malware to targeted systems. The phishing emails contain malicious Scalable Vector Graphics (SVG) files designed to trick recipients into opening harmful attachments.
---------------------------------------------
https://feeds.fortinet.com/~/925395818/0/fortinet/blogs~SVG-Phishing-hits-U…
=====================
= Vulnerabilities =
=====================
∗∗∗ Severe Framelink Figma MCP Vulnerability Lets Hackers Execute Code Remotely ∗∗∗
---------------------------------------------
Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol (MCP) server that could allow attackers to achieve code execution. The vulnerability, tracked as CVE-2025-53967 (CVSS score: 7.5), is a command injection bug stemming from the unsanitized use of user input, opening the door to a scenario where an attacker can send arbitrary system commands.
---------------------------------------------
https://thehackernews.com/2025/10/severe-figma-mcp-vulnerability-lets.html
∗∗∗ Update: Schadcode-Lücke bedroht IBM Data Replication VSAM ∗∗∗
---------------------------------------------
Angreifer können IBM Data Replication VSAM for z/OS Remote Source attackieren. Nun wurde die Lücke geschlossen.
---------------------------------------------
https://www.heise.de/news/Update-Schadcode-Luecke-bedroht-IBM-Data-Replicat…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (gnutls, kernel, kernel-rt, and open-vm-tools), Debian (chromium, python-django, and redis), Fedora (chromium, insight, mirrorlist-server, oci-seccomp-bpf-hook, rust-maxminddb, rust-prometheus, rust-prometheus_exporter, rust-protobuf, rust-protobuf-codegen, rust-protobuf-parse, rust-protobuf-support, turbo-attack, and yarnpkg), Oracle (iputils, kernel, open-vm-tools, redis, and valkey), Red Hat (perl-File-Find-Rule and perl-File-Find-Rule-Perl), SUSE (expat, ImageMagick, matrix-synapse, python-xmltodict, redis, redis7, and valkey), and Ubuntu (fort-validator and imagemagick).
---------------------------------------------
https://lwn.net/Articles/1041404/
∗∗∗ A Cascade of Insecure Architectures: Axis Plugin Design Flaw Expose Select Autodesk Revit Users to Supply Chain Risk ∗∗∗
---------------------------------------------
We discovered Azure Storage Account credentials exposed in Axis Communications’ Autodesk Revit plugin, allowing unauthorized modification of cloud-hosted files. This exposure, combined with vulnerabilities in Autodesk Revit, could enable supply-chain attacks targeting end users.
---------------------------------------------
https://www.trendmicro.com/en_us/research/25/j/axis-plugin-flaw-autodesk-re…
∗∗∗ CISA Releases Four Industrial Control Systems Advisories ∗∗∗
---------------------------------------------
CISA released four Industrial Control Systems (ICS) Advisories on October 9, 2025. ICSA-25-282-01 Hitachi Energy Asset Suite, ICSA-25-282-02 Rockwell Automation Lifecycle Services with Cisco, ICSA-25-282-03 Rockwell Automation Stratix and ICSA-25-128-03 Mitsubishi Electric Multiple FA Products.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2025/10/09/cisa-releases-four-indus…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 07-10-2025 18:00 − Mittwoch 08-10-2025 18:00
Handler: Michael Schlagenhaufer
Co-Handler: Guenes Holler
=====================
= News =
=====================
∗∗∗ Severe Figma MCP Vulnerability Lets Hackers Execute Code Remotely — Patch Now ∗∗∗
---------------------------------------------
Cybersecurity researchers have disclosed details of a now-patched vulnerability in the popular figma-developer-mcp Model Context Protocol (MCP) server that could allow attackers to achieve code execution. The vulnerability, tracked as CVE-2025-53967 (CVSS score: 7.5), is a command injection bug [..] The vulnerability has been addressed in version 0.6.3 of figma-developer-mcp, which was released on September 29, 2025.
---------------------------------------------
https://thehackernews.com/2025/10/severe-figma-mcp-vulnerability-lets.html
∗∗∗ LockBit, Qilin, and DragonForce Join Forces to Dominate the Ransomware Ecosystem ∗∗∗
---------------------------------------------
Three prominent ransomware groups DragonForce, LockBit, and Qilin have announced a new strategic ransomware alliance, once underscoring continued shifts in the cyber threat landscape.
---------------------------------------------
https://thehackernews.com/2025/10/lockbit-qilin-and-dragonforce-join.html
∗∗∗ Employees regularly paste company secrets into ChatGPT ∗∗∗
---------------------------------------------
Employees could be opening up to OpenAI in ways that put sensitive data at risk. According to a study by security biz LayerX, a large number of corporate users paste Personally Identifiable Information (PII) or Payment Card Industry (PCI) numbers right into ChatGPT, even if theyre using the bot without permission.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2025/10/07/gen_ai_shado…
∗∗∗ “Can you test my game?” Fake itch.io pages spread hidden malware to gamers ∗∗∗
---------------------------------------------
A convincing itch-style page can drop a stealthy stager instead of a game. Here’s how to spot it and what to do if you clicked.
---------------------------------------------
https://www.malwarebytes.com/blog/threat-intel/2025/10/can-you-test-my-game…
∗∗∗ Is your computer mouse eavesdropping on you? ∗∗∗
---------------------------------------------
Researchers have found a method they called Mic-E-Mouse, which turns your computer mouse into a spy that can listen in on your conversations. [..] The method uses high-performance optical sensors in optical mice, combined with artificial intelligence, to filter out background noise and: “achieve intelligible reconstruction of user speech.”
---------------------------------------------
https://www.malwarebytes.com/blog/news/2025/10/is-your-computer-mouse-eaves…
∗∗∗ Der Klimabonus ist wieder da?! Nein, nur ein neuer Phishing-Versuch! ∗∗∗
---------------------------------------------
Betrügerische SMS-Nachrichten versuchen den Eindruck einer Rückkehr des Klimabonus zu erwecken. Eine frühzeitige Registrierung bringe Informationsvorteile und bessere Chancen für eine Auszahlung. Nichts davon ist wahr. Wir haben es vielmehr mit klassischem Phishing zu tun.
---------------------------------------------
https://www.watchlist-internet.at/news/klimabonus-neuer-phishing-versuch/
∗∗∗ Salesforce data breach: what you need to know ∗∗∗
---------------------------------------------
The Scattered LAPSUS$ Hunters hacking group claims to have accessed data from around 40 customers of Salesforce, the cloud-based customer relationship management service, stealing almost one billion records. [..] The hacker are demanding payment by this Friday, 10 October 2025. [..] Allen Tsai, a Salesforce spokesperson, said the company won’t engage, negotiate with or pay any extortion demand.
---------------------------------------------
https://www.fortra.com/blog/salesforce-data-breach-what-need-know
∗∗∗ The ClickFix Factory: First Exposure of IUAM ClickFix Generator ∗∗∗
---------------------------------------------
Unit 42 discovers ClickFix phishing kits, commoditizing social engineering. This kit presents a lowered barrier for inexperienced cybercriminals.
---------------------------------------------
https://unit42.paloaltonetworks.com/clickfix-generator-first-of-its-kind/
∗∗∗ Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing ∗∗∗
---------------------------------------------
This article will be devoted to explaining how I reached arbitrary code execution from the crash point shown above. Of particular interest is the technique I used to achieve ROP execution.
---------------------------------------------
https://www.thezdi.com/blog/2025/10/6/crafting-a-full-exploit-rce-from-a-cr…
∗∗∗ Windows 11-Setup: Microsoft blockiert künftig das Anlegen lokaler Konten ∗∗∗
---------------------------------------------
Es deutet sich an, dass lokale Benutzerkonten in Windows 11 zukünftig nicht, oder nur noch mit großen Tricks beim Setup eingerichtet werden können. In der neuesten Insider Preview Build 26220.6772 (KB5065797) vom 06. Oktober 2025 gab Microsoft bekannt, dass die Befehle, um beim Setup doch noch lokale Benutzerkonten einzurichten, gestrichen werden.
---------------------------------------------
https://www.borncity.com/blog/2025/10/08/windows-11-setup-microsoft-blockie…
∗∗∗ Introducing HoneyBee: How We Automate Honeypot Deployment for Threat Research ∗∗∗
---------------------------------------------
HoneyBee takes popular cloud-deployed applications such as databases, storage services, and web apps, and automatically generates intentionally insecure Dockerfiles and Docker Compose manifests. [..] We know we aren't the only ones working on these challenges, which is why we’re open-sourcing HoneyBee with the hope that it can be just as useful to others in the security community.
---------------------------------------------
https://www.wiz.io/blog/honeybee-threat-research
=====================
= Vulnerabilities =
=====================
∗∗∗ Ivanti Endpoint Manager Multible 0Day Vulnerabilities ∗∗∗
---------------------------------------------
(ZDI-25-934 - ZDI-25-947) This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ivanti Endpoint Manager. Authentication is required to exploit this vulnerability. Mitigation: Given the nature of the vulnerability, the only salient mitigation strategy is to restrict interaction with the product.
---------------------------------------------
https://www.zerodayinitiative.com/advisories/published/
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (apptainer, civetweb, mod_http2, openssl, pandoc, and pandoc-cli), Oracle (kernel), Red Hat (gstreamer1-plugins-bad-free, iputils, kernel, open-vm-tools, and podman), SUSE (cairo, firefox, ghostscript, gimp, gstreamer-plugins-rs, libxslt, logback, openssl-1_0_0, openssl-1_1, python-xmltodict, and rubygem-puma), and Ubuntu (gst-plugins-base1.0, linux-aws-6.8, linux-aws-fips, linux-azure, linux-azure-nvidia, linux-gke, linux-nvidia-tegra-igx, and
---------------------------------------------
https://lwn.net/Articles/1041243/
∗∗∗ Windows und Android: Google schließt schwerwiegende Lücken in Chrome ∗∗∗
---------------------------------------------
https://www.golem.de/news/windows-und-android-google-schliesst-schwerwiegen…
∗∗∗ ZDI-25-895: (0Day) Wondershare Repairit Incorrect Permission Assignment Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-895/
∗∗∗ B&R Automation Runtime DoS Vulnerability in System Diagnostics Manager (SDM) CVE ID: CVE-2025-3450 ∗∗∗
---------------------------------------------
https://www.br-automation.com/fileadmin/SA25P002-f6a69e61.pdf
∗∗∗ B&R Automation Runtime Vulnerabilities in System Diagnostic Manager (SDM) CVE ID: CVE-2025-3449, CVE-2025-3448 ∗∗∗
---------------------------------------------
https://www.br-automation.com/fileadmin/SA25P003-178b6a20.pdf
∗∗∗ ABB: LVS MConfig Insecure memory handling CVE ID: CVE-2025-9970 ∗∗∗
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=4TZ00000006008&Lang…
∗∗∗ Tenable: [R1] Security Center Version 6.7.0 Fixes One Vulnerability ∗∗∗
---------------------------------------------
https://www.tenable.com/security/tns-2025-21
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Montag 06-10-2025 18:00 − Dienstag 07-10-2025 18:30
Handler: Guenes Holler
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ Kritische Redis Sicherheitslücke (CVE-2025-49844) erlaubt Authenticated Remote Code Execution ∗∗∗
---------------------------------------------
Die kritische Redis Sicherheitslücke erlaubt Remote Code Execution, wenn LUA-Scripting aktiviert ist und ein speziell präpariertes Script im Kontext eines authentifiziertem Benutzer ausgeführt wird.
---------------------------------------------
https://www.cert.at/de/aktuelles/2025/10/kritische-redis-sicherheitslucke-c…
∗∗∗ Red Hat Consulting breach puts over 5000 high profile enterprise customers at risk — in detail ∗∗∗
---------------------------------------------
Last week, a little known extortion group called Crimson Collective caught my attention. At the time they only had 22 followers on Telegram. Red Hat confirmed the breach later that day, and started notifying impacted customers. Red Hat Consulting are consultants who come in to large enterprises to deal with complex technology problems. It is pretty clear their documentation and source code around customers has been stolen.
---------------------------------------------
https://doublepulsar.com/red-hat-consulting-breach-puts-over-5000-high-prof…
∗∗∗ Microsoft Links Storm-1175 to GoAnywhere Exploit Deploying Medusa Ransomware ∗∗∗
---------------------------------------------
Microsoft on Monday attributed a threat actor it tracks as Storm-1175 to the exploitation of a critical security flaw in Fortra GoAnywhere software to facilitate the deployment of Medusa ransomware.
---------------------------------------------
https://thehackernews.com/2025/10/microsoft-links-storm-1175-to.html
∗∗∗ Das passiert, wenn der KI-Betreiber die Sicherheit vernachlässigt ∗∗∗
---------------------------------------------
Verträge, Rechnungen und weitere sensible Daten erreichten uns via E-Mail. Die Quelle: eine österreichische KI-Firma, die demnach bei der Sicherheit schlampte.
---------------------------------------------
https://www.heise.de/news/Sensible-Unternehmensdaten-ueber-Sicherheitsprobl…
∗∗∗ Phishers target 1Password users with convincing fake breach alert ∗∗∗
---------------------------------------------
Attackers are using realistic-looking 1Password emails to trick users into handing over their vault logins.
---------------------------------------------
https://www.malwarebytes.com/blog/news/2025/10/phishers-target-1password-us…
∗∗∗ Well, Well, Well. It’s Another Day. (Oracle E-Business Suite Pre-Auth RCE Chain - CVE-2025-61882) ∗∗∗
---------------------------------------------
We bet you thought you’d be allowed to sit there, breathe, and savour the few moments of peace you’d earned after a painful week in cyber security. Obviously, you were horribly wrong, and you need to wake up now.
---------------------------------------------
https://labs.watchtowr.com/well-well-well-its-another-day-oracle-e-business…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Fedora (chromium), Red Hat (kernel, open-vm-tools, and postgresql), SUSE (chromedriver and chromium), and Ubuntu (haproxy and pam-u2f).
---------------------------------------------
https://lwn.net/Articles/1041069/
∗∗∗ CISA Releases Two Industrial Control Systems Advisories ∗∗∗
---------------------------------------------
CISA released two Industrial Control Systems (ICS) advisories on October 7, 2025. ICSA-25-280-01 Delta Electronics DIAScreen and ICSA-25-226-31 Rockwell Automation 1756-EN4TR, 1756-EN4TRXT.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2025/10/07/cisa-releases-two-indust…
∗∗∗ Critical CVE-2025-27237 Vulnerability in Zabbix Agent for Windows Enables Privilege Escalation via OpenSSL Misconfiguration ∗∗∗
---------------------------------------------
A security vulnerability has been identified in Zabbix Agent and Agent2 for Windows, potentially allowing local users to escalate their privileges to the SYSTEM level. Tracked as CVE-2025-27237, the flaw originates from the way these agents handle the OpenSSL configuration file on Windows systems.
---------------------------------------------
https://thecyberexpress.com/zabbix-agent-cve-2025-27237/
∗∗∗ Attackers Actively Exploiting Critical Vulnerability in Service Finder Bookings Plugin ∗∗∗
---------------------------------------------
On June 8th, 2025, we received a submission through our Bug Bounty Program for an Authentication Bypass vulnerability in Service Finder Bookings, a WordPress plugin bundled with the Service Finder theme. This theme has been sold to approximately 6,000 customers. This vulnerability makes it possible for an unauthenticated attacker to gain access to any account on a site including accounts with the ‘administrator’ role.
---------------------------------------------
https://www.wordfence.com/blog/2025/10/attackers-actively-exploiting-critic…
∗∗∗ ABB Security Advisory: EIBPORT Reflected XSS (CVE-2021-22291) ∗∗∗
---------------------------------------------
https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A7808&Lan…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 03-10-2025 18:00 − Montag 06-10-2025 18:00
Handler: Guenes Holler
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ Schwerwiegende Sicherheitslücke in Oracle E-Business Suite - aktiv ausgenutzt - Updates verfügbar ∗∗∗
---------------------------------------------
Oracle hat einen Security Alert zu einer schwerwiegenden Schwachstelle, CVE-2025-61882, in Oracle E-Business Suite veröffentlicht. Die Sicherheitslücke erlaubt es Angreifer:innen auf betroffenen Systemen ohne jedwede Authentifizierung Code auszuführen. Laut Oracle wird die Lücke bereits aktiv durch Bedrohungsakteure missbraucht.
---------------------------------------------
https://www.cert.at/de/warnungen/2025/10/schwerwiegende-sicherheitslucke-in…
∗∗∗ Hackers exploited Zimbra flaw as zero-day using iCalendar files ∗∗∗
---------------------------------------------
Researchers monitoring for larger .ICS calendar attachments found that a flaw in Zimbra Collaboration Suite (ZCS) was used in zero-day attacks at the beginning of the year.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/hackers-exploited-zimbra-fla…
∗∗∗ XWorm malware resurfaces with ransomware module, over 35 plugins ∗∗∗
---------------------------------------------
New versions of the XWorm backdoor are being distributed in phishing campaigns after the original developer, XCoder, abandoned the project last year.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/xworm-malware-resurfaces-wit…
∗∗∗ Scattered Lapsus$ Hunters Returns With Salesforce Leak Site ∗∗∗
---------------------------------------------
After claiming it would shut down, the cybercriminal collective reemerged and threatened to publish the stolen data of Salesforce customers by Oct. 10 if its demands are not met.
---------------------------------------------
https://www.darkreading.com/cyberattacks-data-breaches/scattered-lapsus-hun…
∗∗∗ Rhadamanthys Stealer Evolves: Adds Device Fingerprinting, PNG Steganography Payloads ∗∗∗
---------------------------------------------
The threat actor behind Rhadamanthys has also advertised two other tools called Elysium Proxy Bot and Crypt Service on their website, even as the flagship information stealer has been updated to support the ability to collect device and web browser fingerprints, among others.
---------------------------------------------
https://thehackernews.com/2025/10/rhadamanthys-stealer-evolves-adds.html
∗∗∗ Angreifer kopierten Kundendaten von Red-Hat-GitLab-Instanz ∗∗∗
---------------------------------------------
Beim Softwarehersteller Red Hat kam es zu einem IT-Sicherheitsvorfall. Die Angreifer geben an, 570 GB an Daten kopiert zu haben.
---------------------------------------------
https://www.heise.de/news/Angreifer-kopierten-Kundendaten-von-Red-Hat-GitLa…
∗∗∗ Datenleck bei Discord: Support-Dienstleister erfolgreich attackiert ∗∗∗
---------------------------------------------
Kriminelle konnten persönliche Daten von bestimmten Discord-Nutzern erbeuten. Diese könnten für Phishing-Attacken missbraucht werden.
---------------------------------------------
https://www.heise.de/news/Datenleck-bei-Discord-Support-Dienstleister-erfol…
∗∗∗ Palo Alto Scanning Surges ~500% in 48 Hours, Marking 90-Day High ∗∗∗
---------------------------------------------
On October 3, 2025, GreyNoise observed a ~500% increase in IPs scanning Palo Alto Networks login portals, the highest level recorded in the past 90 days. The activity was highly targeted and involved multiple, potentially coordinated scanning clusters.
---------------------------------------------
https://www.greynoise.io/blog/palo-alto-scanning-surges
=====================
= Vulnerabilities =
=====================
∗∗∗ Oracle Security Alert for CVE-2025-61882 - 4 October 2025 ∗∗∗
---------------------------------------------
This Security Alert addresses vulnerability CVE-2025-61882 in Oracle E-Business Suite. This vulnerability is remotely exploitable without authentication, i.e., it may be exploited over a network without the need for a username and password. If successfully exploited, this vulnerability may result in remote code execution.
---------------------------------------------
https://www.oracle.com/security-alerts/alert-cve-2025-61882.html
∗∗∗ Redis warns of critical flaw impacting thousands of instances ∗∗∗
---------------------------------------------
The Redis security team has released patches for a maximum severity vulnerability that could allow attackers to gain remote code execution on thousands of vulnerable instances.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/redis-warns-of-max-severity-…
∗∗∗ ZDI-25-932: MLflow Weak Password Requirements Authentication Bypass Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to bypass authentication on affected installations of MLflow. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.1. The following CVEs are assigned: CVE-2025-11200.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-932/
∗∗∗ ZDI-25-930: win-cli-mcp-server resolveCommandPath Command Injection Remote Code Execution Vulnerability ∗∗∗
---------------------------------------------
This vulnerability allows remote attackers to execute arbitrary code on affected installations of win-cli-mcp-server. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 9.8. The following CVEs are assigned: CVE-2025-11202.
---------------------------------------------
http://www.zerodayinitiative.com/advisories/ZDI-25-930/
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (kernel), Debian (dovecot, git, log4cxx, and openssl), Fedora (containernetworking-plugins, firebird, firefox, jupyterlab, mupdf, and thunderbird), Oracle (ipa), Red Hat (container-tools:rhel8, firefox, gnutls, kernel, kernel-rt, multiple packages, mysql, mysql:8.0, nginx, podman, and thunderbird), Slackware (fetchmail), SUSE (afterburn, chromium, firefox, haproxy, libvmtools-devel, logback, python311-Django, python311-Django4, and redis), and Ubuntu (linux-gcp, linux-gcp-6.14, linux-oem-6.14, linux-nvidia-tegra-igx, linux-oracle, mysql-8.0, poppler, and squid).
---------------------------------------------
https://lwn.net/Articles/1040991/
∗∗∗ Unzählige Sicherheitslücken in Dell PowerProtect Data Domain geschlossen ∗∗∗
---------------------------------------------
Stimmen die Voraussetzungen, können Angreifer Dell PowerProtect Data Domain attackieren und Systeme als Root kompromittieren. Sicherheitspatches stehen zum Download bereit.
---------------------------------------------
https://heise.de/-10712169
∗∗∗ Spiele-Engine Unity: Lücke bedroht Android, Linux, macOS und Windows ∗∗∗
---------------------------------------------
Die Laufzeitumgebung für die Spiele-Engine Unity steckt in diversen populären Spielen. Microsoft meldet nun eine schwerwiegende Sicherheitslücke darin, die Angreifern das Ausführen von Schadcode erlaubt. Bis zur Verfügbarkeit von Updates sollen Nutzerinnen und Nutzer betroffene Software deinstallieren, rät der Hersteller.
---------------------------------------------
https://heise.de/-10713427
∗∗∗ Multiple Vulnerabilities in Qsync Central ∗∗∗
---------------------------------------------
https://www.qnap.com/en-us/security-advisory/QSA-25-35
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Donnerstag 02-10-2025 18:00 − Freitag 03-10-2025 18:00
Handler: Guenes Holler
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ Oracle links Clop extortion attacks to July 2025 vulnerabilities ∗∗∗
---------------------------------------------
Oracle has linked an ongoing extortion campaign claimed by the Clop ransomware gang to E-Business Suite (EBS) vulnerabilities that were patched in July 2025.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/oracle-links-clop-extortion-…
∗∗∗ CommetJacking attack tricks Comet browser into stealing emails ∗∗∗
---------------------------------------------
A new attack called CometJacking exploits URL parameters to pass to Perplexitys Comet AI browser hidden instructions that allow access to sensitive data from connected services, like email and calendar.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/commetjacking-attack-tricks-…
∗∗∗ Sicherheitslücke in Zahnarztpraxen-System ∗∗∗
---------------------------------------------
Bei einem von einigen Zahnarztpraxen eingesetzten Praxisverwaltungssystem hat es gravierende Schwachstellen gegeben - dadurch hätten Patientendaten gelesen und verändert werden können.
---------------------------------------------
https://www.golem.de/news/security-sicherheitsluecke-in-zahnarztpraxen-syst…
∗∗∗ Coordinated Grafana Exploitation Attempts on 28 September ∗∗∗
---------------------------------------------
GreyNoise observed a sharp one-day surge of exploitation attempts targeting CVE-2021-43798 — a Grafana path traversal vulnerability that enables arbitrary file reads. All observed IPs are classified as malicious.
---------------------------------------------
https://www.greynoise.io/blog/coordinated-grafana-exploitation-attempts
∗∗∗ Its Never Simple Until It Is (Dell UnityVSA Pre-Auth Command Injection CVE-2025-36604) ∗∗∗
---------------------------------------------
Welcome back, and what a week! We’re glad that happened for you and/or sorry that happened to you. It will get better and/or worse, and you will likely survive. Today, we’re walking down the garden path and digging into the archives, publishing our analysis of a vulnerability we discovered and disclosed to Dell in March 2025 within their UnityVSA solution.
---------------------------------------------
https://labs.watchtowr.com/its-never-simple-until-it-is-dell-unityvsa-pre-a…
=====================
= Vulnerabilities =
=====================
∗∗∗ DrayTek warns of remote code execution bug in Vigor routers ∗∗∗
---------------------------------------------
Networking hardware maker DrayTek released an advisory to warn about a security vulnerability in several Vigor router models that could allow remote, unauthenticated actors to execute perform arbitrary code.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/draytek-warns-of-remote-code…
∗∗∗ Security updates for Friday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (idm:DL1), Debian (gegl and haproxy), Fedora (ffmpeg, firefox, freeipa, python-pip, rust-astral-tokio-tar, sqlite, uv, webkitgtk, and xen), Oracle (idm:DL1, ipa, kernel, perl-JSON-XS, and python3), Red Hat (git), SUSE (curl, frr, jupyter-jupyterlab, and libsuricata8_0_1), and Ubuntu (linux-aws, linux-lts-xenial, linux-aws-fips, linux-fips, linux-gcp-fips, linux-azure, linux-azure, linux-azure-6.8, linux-fips, linux-gcp-fips, and linux-intel-iot-realtime, linux-realtime).
---------------------------------------------
https://lwn.net/Articles/1040729/
∗∗∗ CISA Releases Two Industrial Control Systems Advisories ∗∗∗
---------------------------------------------
CISA released two Industrial Control Systems (ICS) advisories on October 2, 2025: ICSA-25-275-01 Raise3D Pro2 Series 3D Printers and ICSA-25-275-02 Hitachi Energy MSM Product.
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2025/10/02/cisa-releases-two-indust…
∗∗∗ Critical Splunk Vulnerabilities Expose Platforms to Remote JavaScript Injection and More ∗∗∗
---------------------------------------------
Splunk has disclosed six critical security vulnerabilities impacting multiple versions of both Splunk Enterprise and Splunk Cloud Platform. These Splunk vulnerabilities, collectively highlighting serious weaknesses in Splunk’s web components, could allow attackers to execute unauthorized JavaScript code remotely, access sensitive information, and perform server-side request forgery (SSRF) attacks.
---------------------------------------------
https://thecyberexpress.com/critical-splunk-vulnerabilities/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Mittwoch 01-10-2025 18:00 − Donnerstag 02-10-2025 18:00
Handler: Guenes Holler
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ That annoying SMS phish you just got may have come from a box like this ∗∗∗
---------------------------------------------
Smishers looking for new infrastructure are getting creative.
---------------------------------------------
https://arstechnica.com/security/2025/10/that-annoying-sms-phish-you-just-g…
∗∗∗ Adobe Analytics bug leaked customer tracking data to other tenants ∗∗∗
---------------------------------------------
Adobe is warning its Analytics customers that an ingestion bug caused data from some organizations to appear in the analytics instances of others for approximately one day.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/adobe-analytics-bug-leaked-c…
∗∗∗ Clop extortion emails claim theft of Oracle E-Business Suite data ∗∗∗
---------------------------------------------
Mandiant and Google are tracking a new extortion campaign where executives at multiple companies received emails claiming that sensitive data was stolen from their Oracle E-Business Suite systems.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/clop-extortion-emails-claim-…
∗∗∗ Android spyware campaigns impersonate Signal and ToTok messengers ∗∗∗
---------------------------------------------
Two new spyware campaigns that researchers call ProSpy and ToSpy lured Android users with fake upgrades or plugins for the Signal and ToTok messaging apps to steal sensitive data.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/android-spyware-campaigns-im…
∗∗∗ Shutdown Threatens US Intel Sharing, Cyber Defense ∗∗∗
---------------------------------------------
Lapse of critical information sharing and mass furloughs at CISA are just some of the concerns.
---------------------------------------------
https://www.darkreading.com/cyber-risk/shutdown-us-intel-sharing-cyber-defe…
∗∗∗ Datenleck: Schufa-Tochter Bonify bestätigt Sicherheitsvorfall ∗∗∗
---------------------------------------------
Unbekannte erbeuten Identifizierungsdaten von Bonify-Nutzern. Darunter sind auch Ausweisdaten und Fotos.
---------------------------------------------
https://www.golem.de/news/datenleck-schufa-tochter-bonify-bestaetigt-sicher…
∗∗∗ 570 GByte Github-Daten: Red Hat meldet Sicherheitsvorfall ∗∗∗
---------------------------------------------
Die Erpressergruppe Crimson Collective ist angeblich im Besitz vertraulicher Kundendaten von Red Hat - und verlangt ein Lösegeld.
---------------------------------------------
https://www.golem.de/news/570-gbyte-github-daten-red-hat-meldet-sicherheits…
∗∗∗ New WireTap Attack Extracts Intel SGX ECDSA Key via DDR4 Memory-Bus Interposer ∗∗∗
---------------------------------------------
In yet another piece of research, academics from Georgia Institute of Technology and Purdue University have demonstrated that the security guarantees offered by Intels Software Guard eXtensions (SGX) can be bypassed on DDR4 systems to passively decrypt sensitive data.
---------------------------------------------
https://thehackernews.com/2025/10/new-wiretap-attack-extracts-intel-sgx.html
∗∗∗ Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown ∗∗∗
---------------------------------------------
Cybersecurity researchers have flagged a malicious package on the Python Package Index (PyPI) repository that claims to offer the ability to create a SOCKS5 proxy service, while also providing a stealthy backdoor-like functionality to drop additional payloads on Windows systems. The deceptive package, named soopsocks, attracted a total of 2,653 downloads before it was taken down.
---------------------------------------------
https://thehackernews.com/2025/10/alert-malicious-pypi-package-soopsocks.ht…
∗∗∗ EU funds are flowing into spyware companies, and politicians are demanding answers ∗∗∗
---------------------------------------------
Experts say Commission is ‘fanning the flames’ of the continent’s own Watergate. An arsenal of angry European Parliament members (MEPs) is demanding answers from senior commissioners about why EU subsidies are ending up in the pockets of spyware companies.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2025/10/02/eu_spyware_f…
∗∗∗ ENISA Threat Landscape 2025 ∗∗∗
---------------------------------------------
Through a more threat-centric approach and further contextual analysis, this latest edition of the ENISA Threat Landscape analyses 4875 incidents over a period spanning from 1 July 2024 to 30 June 2025.
---------------------------------------------
https://www.enisa.europa.eu/publications/enisa-threat-landscape-2025
∗∗∗ Meet SpamGPT and MatrixPDF, AI Toolkits Driving Malware Attacks ∗∗∗
---------------------------------------------
Cybersecurity researchers at Varonis have discovered two new plug-and-play cybercrime toolkits, MatrixPDF and SpamGPT. Learn how these AI-powered tools make mass phishing and PDF malware accessible to anyone, redefining online security risks.
---------------------------------------------
https://hackread.com/spamgpt-matrixpdf-ai-toolkits-malware-attacks/
∗∗∗ Malicious ZIP Files Use Windows Shortcuts to Drop Malware ∗∗∗
---------------------------------------------
Cybersecurity firm Blackpoint Cyber reveals a new spear phishing campaign targeting executives. Learn how attackers use fraudulent document ZIPs containing malicious shortcut files, leveraging living off the land tactics, and a unique Anti-Virus check to deliver a custom payload.
---------------------------------------------
https://hackread.com/malicious-zip-files-windows-shortcuts-malware/
∗∗∗ $20 YoLink IoT Gateway Vulnerabilities Put Home Security at Risk ∗∗∗
---------------------------------------------
Four critical zero-day flaws found in the $20 YoLink Smart Hub allow remote physical access, threatening your home security. See the urgent steps you must take now.
---------------------------------------------
https://hackread.com/20-yolink-iot-gateway-vulnerabilities-home-security/
∗∗∗ Confucius Espionage: From Stealer to Backdoor ∗∗∗
---------------------------------------------
The Confucius group is a long-running cyber-espionage actor operating primarily across South Asia. First identified in 2013, the group is believed to have links to state-sponsored operations in the region.
---------------------------------------------
https://feeds.fortinet.com/~/925674278/0/fortinet/blogs~Confucius-Espionage…
=====================
= Vulnerabilities =
=====================
∗∗∗ Chrome 141: Google schließt schwerwiegende Sicherheitslücken ∗∗∗
---------------------------------------------
Google hat seinen Browser Chrome auf die Version 141 aktualisiert. Das Update beinhaltet den Versionshinweisen zufolge Patches für 21 Sicherheitslücken. Von mindestens zwei Anfälligkeiten geht demnach ein hohes Risiko aus. Sie erlauben unter Umständen das Einschleusen und Ausführen von Schadcode aus der Ferne und innerhalb der Sandbox des Browsers.
---------------------------------------------
https://www.golem.de/news/chrome-141-google-schliesst-schwerwiegende-sicher…
∗∗∗ Security updates for Thursday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (perl-JSON-XS), Debian (chromium and openssl), Fedora (bird, dnsdist, firefox, mapserver, ntpd-rs, python-nh3, rust-ammonia, skopeo, sqlite, thunderbird, and xen), Oracle (perl-JSON-XS), Red Hat (kernel, kernel-rt, and libvpx), SUSE (afterburn, cairo, docker-stable, firefox, nginx, python-Django, snpguest, and warewulf4), and Ubuntu (libmspack, libxslt, linux, linux-aws, linux-aws-5.15, linux-gcp, linux-gcp-5.15, linux-gkeop, linux-hwe-5.15, linux-ibm, linux-ibm-5.15, linux-intel-iotg, linux-intel-iotg-5.15, linux-lowlatency, linux-lowlatency-hwe-5.15, linux-nvidia, linux-nvidia-tegra, linux-nvidia-tegra-5.15, linux-oracle, linux-raspi, linux-xilinx-zynqmp, linux, linux-aws, linux-aws-5.4, linux-bluefield, linux-gcp, linux-gcp-5.4, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-iot, linux-kvm, linux-raspi, linux-xilinx-zynqmp, linux, linux-aws, linux-aws-6.14, linux-hwe-6.14, linux-realtime, linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp, linux-gcp-4.15, linux-hwe, linux-oracle, linux, linux-aws, linux-gcp, linux-gcp-6.8, linux-gke, linux-gkeop, linux-ibm, linux-ibm-6.8, linux-lowlatency, linux-lowlatency-hwe-6.8, linux-nvidia, linux-nvidia-6.8, linux-nvidia-lowlatency, linux, linux-kvm, linux-aws-fips, linux-fips, linux-gcp-fips, linux-azure, linux-hwe-6.8, linux-kvm, linux-oracle-5.15, linux-oracle-6.14, linux-raspi, linux-raspi-realtime, linux-realtime, linux-realtime-6.8, linux-realtime-6.14, and python-django).
---------------------------------------------
https://lwn.net/Articles/1040591/
∗∗∗ Stand-alone Security Patch Available for Tenable Security Center versions 6.5.1 and 6.6.0 ∗∗∗
---------------------------------------------
Tenable has released Security Center Patch SC-202509.2.1 to address these issues.
---------------------------------------------
https://www.tenable.com/security/tns-2025-20
∗∗∗ Sicherheitspatches: OpenSSL für Schadcode-Attacken anfällig ∗∗∗
---------------------------------------------
In aktuellen OpenSSL-Versionen haben die Entwickler drei Sicherheitslücken geschlossen. Bislang gibt es keine Berichte zu Attacken.
---------------------------------------------
https://www.heise.de/news/OpenSSL-Angreifer-koennen-auf-ARM-Systemen-privat…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Dienstag 30-09-2025 18:00 − Mittwoch 01-10-2025 18:00
Handler: Guenes Holler
Co-Handler: Alexander Riepl
=====================
= News =
=====================
∗∗∗ China Imposes One-Hour Reporting Rule for Major Cyber Incidents ∗∗∗
---------------------------------------------
The sweeping new regulations show that Chinas serious about hardening its own networks after launching widespread attacks on global networks.
---------------------------------------------
https://www.darkreading.com/cybersecurity-operations/china-one-hour-reporti…
∗∗∗ MatrixPDF: Neues Hacker-Tool macht PDF-Dateien zu Phishing-Ködern ∗∗∗
---------------------------------------------
Schädliche PDF-Dateien lassen sich damit so gestalten, dass sie den Phishing-Filter von Gmail umgehen.
---------------------------------------------
https://www.golem.de/news/matrixpdf-neues-hacker-tool-macht-pdf-dateien-zu-…
∗∗∗ New Android Banking Trojan “Klopatra” Uses Hidden VNC to Control Infected Smartphones ∗∗∗
---------------------------------------------
A previously undocumented Android banking trojan called Klopatra has compromised over 3,000 devices, with a majority of the infections reported in Spain and Italy.Italian fraud prevention firm Cleafy, which discovered the sophisticated malware ..
---------------------------------------------
https://thehackernews.com/2025/10/new-android-banking-trojan-klopatra.html
∗∗∗ Hackers Exploit Milesight Routers to Send Phishing SMS to European Users ∗∗∗
---------------------------------------------
Unknown threat actors are abusing Milesight industrial cellular routers to send SMS messages as part of a smishing campaign targeting users in European countries since at least February 2022.French cybersecurity company SEKOIA said the attackers are exploiting ..
---------------------------------------------
https://thehackernews.com/2025/10/hackers-exploit-milesight-routers-to.html
∗∗∗ Red Hat OpenShift AI Flaw Exposes Hybrid Cloud Infrastructure to Full Takeover ∗∗∗
---------------------------------------------
A severe security flaw has been disclosed in the Red Hat OpenShift AI service that could allow attackers to escalate privileges and take control of the complete infrastructure under certain conditions.OpenShift AI is a platform for managing the lifecycle ..
---------------------------------------------
https://thehackernews.com/2025/10/critical-red-hat-openshift-ai-flaw.html
∗∗∗ OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps ∗∗∗
---------------------------------------------
A high-severity security flaw has been disclosed in the One Identity OneLogin Identity and Access Management (IAM) solution that, if successfully exploited, could expose sensitive OpenID Connect (OIDC) application client secrets under certain ..
---------------------------------------------
https://thehackernews.com/2025/10/onelogin-bug-let-attackers-use-api-keys.h…
∗∗∗ Neue Phishing-Wellen im Namen der WKO ∗∗∗
---------------------------------------------
Kriminelle versuchen aktuell über zwei Maschen im Namen der Wirtschaftskammer Österreich für Schaden zu sorgen. Dabei geht es um die Aktualisierung von Unternehmensdaten und Zahlungsinformationen zum Mitgliedsbeitrag. Besonders gefährlich: Für ..
---------------------------------------------
https://www.watchlist-internet.at/news/phishing-wellen-wko/
∗∗∗ TOTOLINK X6000R: Three New Vulnerabilities Uncovered ∗∗∗
---------------------------------------------
Researchers identified vulnerabilities in TOTOLINK X6000R routers: CVE-2025-52905, CVE-2025-52906 and CVE-2025-52907. We discuss root cause and impact.
---------------------------------------------
https://unit42.paloaltonetworks.com/totolink-x6000r-vulnerabilities/
∗∗∗ North Korea IT worker scheme expanding to more industries, countries outside of US tech sector ∗∗∗
---------------------------------------------
Okta said their new research into the scheme revealed that North Korea has honed its skills on U.S.-based companies and has expanded into dozens of different countries and industries.
---------------------------------------------
https://therecord.media/north-korea-it-worker-scheme-expands-outisde-us-tech
∗∗∗ Detour Dog’s DNS Hijacking Infects 30,000 Websites with Strela Stealer ∗∗∗
---------------------------------------------
Infoblox reveals how the Detour Dog group used server-side DNS to compromise 30,000+ sites across 89 countries, installing the stealthy Strela Stealer malware.
---------------------------------------------
https://hackread.com/detour-dog-dns-hijacking-websites-strela-stealer/
∗∗∗ Sicherheitsupdate: Schadcode-Lücke bedroht NAS-Modelle von Western Digital ∗∗∗
---------------------------------------------
Angreifer können bestimmte Netzwerkspeicher von Western Digital mit My Cloud OS attackieren.
---------------------------------------------
https://heise.de/-10696726
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Wednesday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (kernel, kernel-rt, mysql:8.0, and openssh), Debian (libcommons-lang-java, libcommons-lang3-java, libcpanel-json-xs-perl, libjson-xs-perl, libxml2, open-vm-tools, and u-boot), Fedora (bird, dnsdist, mapserver, ntpd-rs, python-nh3, and rust-ammonia), Oracle (kernel and mysql:8.0), Red Hat (cups, postgresql:12, and postgresql:13), SUSE (cJSON-devel, gimp, kernel-devel, kubecolor, open-vm-tools, openssl-1_1, openssl-3, and ruby3.4-rubygem-rack), ..
---------------------------------------------
https://lwn.net/Articles/1040375/
∗∗∗ CISA Releases Ten Industrial Control Systems Advisories ∗∗∗
---------------------------------------------
CISA released ten Industrial Control Systems (ICS) advisories on September 30, 2025. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.ICSA-25-273-01 MegaSys Enterprises Telenium Online Web ApplicationICSA-25-273-02 Festo SBRD-Q/SBOC-Q/SBOI-QICSA-25-273-03 Festo CPX-CEC-C1 and ..
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2025/09/30/cisa-releases-ten-indust…
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Montag 29-09-2025 18:00 − Dienstag 30-09-2025 18:00
Handler: n/a
Co-Handler: Guenes Holler
=====================
= News =
=====================
∗∗∗ Ransomware gang sought BBC reporter’s help in hacking media giant ∗∗∗
---------------------------------------------
Threat actors claiming to represent the Medusa ransomware gang tempted a BBC correspondent to become an insider threat by offering a significant amount of money.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/ransomware-gang-sought-bbc-r…
∗∗∗ AI-Powered Voice Cloning Raises Vishing Risks ∗∗∗
---------------------------------------------
A researcher-developed framework could enable attackers to conduct real-time conversations using simulated audio to compromise organizations and extract sensitive information.
---------------------------------------------
https://www.darkreading.com/cyberattacks-data-breaches/ai-voice-cloning-vis…
∗∗∗ Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits ∗∗∗
---------------------------------------------
Cybersecurity researchers have disclosed three now-patched security vulnerabilities impacting Googles Gemini artificial intelligence (AI) assistant that, if successfully exploited, could have exposed users to major privacy risks and data theft.
---------------------------------------------
https://thehackernews.com/2025/09/researchers-disclose-google-gemini-ai.html
∗∗∗ Google’s Latest AI Ransomware Defense Only Goes So Far ∗∗∗
---------------------------------------------
Google has launched a new AI-based protection in Drive for desktop that can shut down an attack before it spreads—but its benefits have their limits.
---------------------------------------------
https://www.wired.com/story/googles-latest-ai-ransomware-defense-only-goes-…
∗∗∗ Auf GitHub: Zahlreiche Fakes bekannter Mac-Apps kursieren ∗∗∗
---------------------------------------------
In einer offenbar konzertierten Aktion versuchen Scammer, gefälschte Apps für Mac-Nutzer zu verbreiten. Unklar ist, was das bezwecken soll.
---------------------------------------------
https://www.heise.de/news/Auf-GitHub-Zahlreiche-Fakes-bekannter-Mac-Apps-ku…
∗∗∗ Vorsicht vor Festnetz-Spoofing: Kriminelle nutzen (teilweise) reale Telefonnummern! ∗∗∗
---------------------------------------------
Wer aktuell Anrufe von vermeintlichen Bank-Berater:innen bekommt, sollte besonders misstrauisch und vorsichtig sein! Kriminellen gelingt es immer öfter, real existierende Service-Festnetznummern als Deckmantel für ihre Betrugsmaschen zu nutzen. Ziel des „Spoofings“ ist der Zugriff auf das Konto des Opfers.
---------------------------------------------
https://www.watchlist-internet.at/news/vorsich-festnetz-spoofing/
∗∗∗ Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite ∗∗∗
---------------------------------------------
Phantom Taurus is a previously undocumented Chinese threat group. Explore how this groups distinctive toolset lead to uncovering their existence.The post Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite appeared first on Unit 42.
---------------------------------------------
https://unit42.paloaltonetworks.com/phantom-taurus/
∗∗∗ XiebroC2 Identified in MS-SQL Server Attack Cases ∗∗∗
---------------------------------------------
AhnLab SEcurity intelligence Center (ASEC) monitors attacks targeting poorly managed MS-SQL servers and recently confirmed a case involving the use of XiebroC2. XiebroC2 is a C2 framework with open-source code that supports various features such as information collection, remote control, and defense evasion, similar to CobaltStrike.
---------------------------------------------
https://asec.ahnlab.com/en/90369/
∗∗∗ Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations ∗∗∗
---------------------------------------------
Protecting software-as-a-service (SaaS) platforms and applications requires a comprehensive security strategy. Drawing from analysis of UNC6040’s specific attack methodologies, this guide presents a structured defensive framework encompassing proactive hardening measures, comprehensive logging protocols, and advanced detection capabilities.
---------------------------------------------
https://cloud.google.com/blog/topics/threat-intelligence/unc6040-proactive-…
∗∗∗ When Audits Fail: Four Critical Pre-Auth Vulnerabilities in TRUfusion Enterprise ∗∗∗
---------------------------------------------
In early 2025, we encountered a mission-critical software component called TRUfusion Enterprise on the perimeter of one of our customers that is used to transfer highly sensitive data. Since Rocket Software claims that they are undergoing regular audits and also follow secure coding guidelines, we didn’t expect to find much but to our surprise, it took us just two minutes to discover the first totally unsophisticated, but critical pre-auth path traversal vulnerability that already gave us admin rights.
---------------------------------------------
https://www.rcesecurity.com/2025/09/when-audits-fail-four-critical-pre-auth…
=====================
= Vulnerabilities =
=====================
∗∗∗ Broadcom fixes high-severity VMware NSX bugs reported by NSA ∗∗∗
---------------------------------------------
Broadcom has released security updates to patch two high-severity VMware NSX vulnerabilities reported by the U.S. National Security Agency (NSA).
---------------------------------------------
https://www.bleepingcomputer.com/news/security/broadcom-fixes-high-severity…
∗∗∗ IBM App Connect Enterprise Toolkit kann Daten leaken ∗∗∗
---------------------------------------------
Es sind wichtige Sicherheitsupdates für IBM App Connect Enterprise Toolkit, InfoSphere und WebSphere erschienen.
---------------------------------------------
https://www.heise.de/news/IBM-App-Connect-Enterprise-Toolkit-kann-Daten-lea…
∗∗∗ Security updates for Tuesday ∗∗∗
---------------------------------------------
Security updates have been issued by Debian (python-internetarchive and tiff), Fedora (nextcloud), Oracle (kernel, openssh, and squid), Red Hat (kernel, kernel-rt, and ncurses), SUSE (afterburn and chromium), and Ubuntu (open-vm-tools, ruby-rack, and tiff).
---------------------------------------------
https://lwn.net/Articles/1040152/
∗∗∗ Security Vulnerabilities fixed in Firefox 143.0.3 ∗∗∗
---------------------------------------------
Mozilla has fixed three vulnerabilities labeled as high.
---------------------------------------------
https://www.mozilla.org/en-US/security/advisories/mfsa2025-80/
∗∗∗ Critical Vulnerability Alert: CVE-2025-10035 in GoAnywhere MFT ∗∗∗
---------------------------------------------
A critical security vulnerability (CVE-2025-10035) has been identified in GoAnywhere MFT, a widely used file transfer solution developed by Fortra.
---------------------------------------------
https://www.bitsight.com/blog/critical-vulnerability-alert-cve-2025-10035-g…
∗∗∗ Apple Security Update Addresses Critical Font Parser Vulnerability Across Multiple Platforms ∗∗∗
---------------------------------------------
Apple has rolled out a series of important security updates across multiple platforms, addressing a vulnerability affecting the system font parser. These Apple security updates cover iOS, iPadOS, macOS, visionOS, watchOS, and tvOS.
---------------------------------------------
https://thecyberexpress.com/apple-security-updates/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/
=====================
= End-of-Day report =
=====================
Timeframe: Freitag 26-09-2025 18:00 − Montag 29-09-2025 18:00
Handler: Guenes Holler
Co-Handler: Felician Fuchs
=====================
= News =
=====================
∗∗∗ First Malicious MCP in the Wild: The Postmark Backdoor Thats Stealing Your Emails ∗∗∗
---------------------------------------------
This is the world’s first sighting of a real world malicious MCP server. The attack surface for endpoint supply chain attacks is slowly becoming the enterprise’s biggest attack surface.
---------------------------------------------
https://www.koi.security/blog/postmark-mcp-npm-malicious-backdoor-email-the…
∗∗∗ Akira ransomware breaching MFA-protected SonicWall VPN accounts ∗∗∗
---------------------------------------------
Ongoing Akira ransomware attacks targeting SonicWall SSL VPN devices continue to evolve, with the threat actors found to be successfully logging in despite OTP MFA being enabled on accounts. Researchers suspect that this may be achieved through the use of previously stolen OTP seeds, although the exact method remains unconfirmed.
---------------------------------------------
https://www.bleepingcomputer.com/news/security/akira-ransomware-breaching-m…
∗∗∗ Pointer leaks through pointer-keyed data structures ∗∗∗
---------------------------------------------
Some time in 2024, during a Project Zero team discussion, we were talking about how remote ASLR leaks would be helpful or necessary for exploiting some types of memory corruption bugs, specifically in the context of Apple devices.
---------------------------------------------
https://googleprojectzero.blogspot.com/2025/09/pointer-leaks-through-pointe…
∗∗∗ Microsoft Flags AI-Driven Phishing: LLM-Crafted SVG Files Outsmart Email Security ∗∗∗
---------------------------------------------
Microsoft is calling attention to a new phishing campaign primarily aimed at U.S.-based organizations that has likely utilized code generated using large language models (LLMs) to obfuscate payloads and evade security defenses. "Appearing to be aided by a large language model (LLM), the activity obfuscated its behavior within an SVG file, leveraging business terminology and a synthetic structure to disguise its malicious intent," the Microsoft Threat Intelligence team said in an analysis published last week.
---------------------------------------------
https://thehackernews.com/2025/09/microsoft-flags-ai-driven-phishing-llm.ht…
∗∗∗ Cyber threat-sharing law set to shut down, along with US government ∗∗∗
---------------------------------------------
Barring a last-minute deal, the US federal government would shut down on Wednesday, October 1, and the 2015 Cybersecurity Information Sharing Act would lapse at the same time, threatening what many consider a critical plank of US cybersecurity policy.
---------------------------------------------
https://go.theregister.com/feed/www.theregister.com/2025/09/26/government_s…
∗∗∗ Sex offenders, terrorists, drug dealers, exposed in spyware breach ∗∗∗
---------------------------------------------
RemoteCOMs monitoring software leaked the personal details of suspects, offenders, and the law enforcement officers tracking them.
---------------------------------------------
https://www.malwarebytes.com/blog/news/2025/09/sex-offenders-terrorists-dru…
∗∗∗ From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion ∗∗∗
---------------------------------------------
The intrusion took place in May 2024, when a user executed a malicious JavaScript file. This Javascipt file has been previously reported as associated with the Lunar Spider initial access group by EclecticIQ. The heavily obfuscated file, masquerading as a legitimate tax form, contained only a small amount of executable code dispersed among extensive filler content used for evasion. The JavaScript payload triggered the download of a MSI package, which deployed a Brute Ratel DLL file using rundll32.
---------------------------------------------
https://thedfirreport.com/2025/09/29/from-a-single-click-how-lunar-spider-e…
∗∗∗ Medusa Ransomware Claims Comcast Data Breach, Demands $1.2M ∗∗∗
---------------------------------------------
Medusa ransomware group claims 834 GB data theft from Comcast, demanding $1.2M ransom while sharing screenshots and file listings.
---------------------------------------------
https://hackread.com/medusa-ransomware-comcast-data-breach/
∗∗∗ CISA and UK NCSC Release Joint Guidance for Securing OT Systems ∗∗∗
---------------------------------------------
CISA, in collaboration with the Federal Bureau of Investigation, the United Kingdom’s National Cyber Security Centre, and other international partners has released new joint cybersecurity guidance: [Creating and Maintaining a Definitive View of Your Operational Technology (OT) Architecture].
---------------------------------------------
https://www.cisa.gov/news-events/alerts/2025/09/29/cisa-and-uk-ncsc-release…
∗∗∗ Supply chain security for the 0.001% (and why it won’t catch on) ∗∗∗
---------------------------------------------
After yet another supply chain issue (npm this time, but it doesn’t really matter that much), Shai-hulud, 500 packages affected and millions of downloads later, I finally wrapped up the protection system for my dev environment. I really don’t want to be the next one exploited.
---------------------------------------------
https://blog.viraptor.info/post/supply-chain-security-for-the-0001-and-why-…
=====================
= Vulnerabilities =
=====================
∗∗∗ Security updates for Monday ∗∗∗
---------------------------------------------
Security updates have been issued by AlmaLinux (avahi, cups, firefox, gnutls, golang, httpd, kernel, libtpms, mysql, opentelemetry-collector, php:8.2, podman, postgresql:13, postgresql:15, python3, python3.11, python3.12, python3.9, thunderbird, and udisks2), Debian (firefox-esr, gimp, nncp, node-tar-fs, and squid), Fedora (chromium, firebird, python-azure-keyvault-securitydomain, python-azure-mgmt-security, and python-microsoft-security-utilities-secret-masker), Red Hat (httpd:2.4, kernel, kernel-rt, and mod_http2), SUSE (aide, apache2-mod_security2, chromedriver, cloud-init, docker, gdk-pixbuf, git, google-osconfig-agent, govulncheck-vulndb, gstreamer-plugins-base, iperf, kernel, krb5, krita, luajit, net-tools, nvidia-open-driver-G06-signed, pam, postgresql17, python311, rust-keylime, sevctl, tor, tree-sitter-ruby, and udisks2), and Ubuntu (curl, ghostscript, inetutils, python2.7, and qtbase-opensource-src).
---------------------------------------------
https://lwn.net/Articles/1040058/
∗∗∗ REDCap: Multiple Cross-Site Scripting (XSS) Vulnerabilities ∗∗∗
---------------------------------------------
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/redcap-mult…
∗∗∗ DataSpider Servista improper restriction of XML external entity references ∗∗∗
---------------------------------------------
https://jvn.jp/en/jp/JVN23423519/
--
CERT.at Daily mailing list
Listinfo: https://lists.cert.at/mailman3/postorius/lists/daily.lists.cert.at/