{"id":19464,"date":"2025-06-06T13:24:56","date_gmt":"2025-06-06T11:24:56","guid":{"rendered":"https:\/\/kordon.app\/?p=19464"},"modified":"2025-06-06T13:24:57","modified_gmt":"2025-06-06T11:24:57","slug":"13-cybersecurity-news-worth-your-attention-1st-week-of-june-2025","status":"publish","type":"post","link":"https:\/\/kordon.app\/et\/13-cybersecurity-news-worth-your-attention-1st-week-of-june-2025\/","title":{"rendered":"13 Cybersecurity News Worth Your Attention &#8211; 1st Week of June 2025"},"content":{"rendered":"<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>Each week&nbsp;I spend hours going throguh 20+ different cybersecurity news sources to find and summarise most interesting news from the week so you can quickly catch up on only the most interesting cyber news quickly.&nbsp;<\/p>\n\n\n\n<p>This weeks keyword is definitely<strong> captcha gate,<\/strong> it&#8217;s a type of attack that is gaining a lot of momentum and dominating the news. <\/p>\n\n\n\n<p>Also,<strong> if you are at all related to information security in the retail space, you need to be alert,<\/strong> the attack wave that originally started in the UK with Co-Op and Marks &amp; Spencier has reached the U.S. and continues strong.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">1. Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Globally<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>CFOs are receiving convincing fake recruitment emails<\/strong> from \"Rothschild &amp; Co.\" o<strong>ffering strategic career opportunities,<\/strong> but clicking the supposed PDF attachment leads to a clever trap: a custom CAPTCHA puzzle that, once solved, secretly downloads and installs the legitimate NetBird remote access tool as a backdoor. The sophisticated campaign targets financial executives globally and <strong>has been active for nearly a year<\/strong>.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Targets banks, energy companies, insurers, and investment firms across Europe, Africa, Canada, Middle East, and South Asia<\/li>\n\n\n\n<li>Part of growing trend of threat actors abusing legitimate remote access tools like ConnectWise, ScreenConnect and Atera to evade detection<\/li>\n<\/ul>\n\n\n\n<p><strong>Next steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Audit legitimate remote access tools:<\/strong> Implement application whitelisting to prevent unauthorized remote access tool installations<\/li>\n\n\n\n<li><strong>Warn executives in your organisations<\/strong><\/li>\n<\/ul>\n\n\n\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/thehackernews.com\/2025\/06\/fake-recruiter-emails-target-cfos-using.html\">The Hacker News &#8211; Fake Recruiter Emails Target CFOs Using Legit NetBird Tool Across 6 Global Regions<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">2. Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Security teams are drowning in a sea of threat actor nicknames <strong>the same Russian group might be called APT29, Cozy Bear, Midnight Blizzard,<\/strong> or any of a dozen other names depending on which vendor's report you're reading. <strong>Microsoft and CrowdStrike have launched a joint cross-reference mapping that works like a \"Rosetta Stone,\" showing which different vendor names refer to the same threat actor<\/strong> without forcing anyone to change their existing naming systems.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The initiative has already mapped over 80 threat actors, confirming matches like Microsoft&#8217;s &#8220;Volt Typhoon&#8221; = CrowdStrike&#8217;s &#8220;VANGUARD PANDA&#8221; and &#8220;Secret Blizzard&#8221; = &#8220;VENOMOUS BEAR&#8221;<\/li>\n\n\n\n<li>Rather than creating a unified naming standard, the project preserves each vendor&#8217;s existing taxonomy while providing translation between systems<\/li>\n\n\n\n<li>Google\/Mandiant and Palo Alto Networks are joining the effort, with plans to expand to other cybersecurity vendors<\/li>\n\n\n\n<li>The mapping is available through Microsoft&#8217;s documentation, downloadable files, and programmatic APIs for automated lookups<\/li>\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>See the mapping here: https:\/\/learn.microsoft.com\/en-us\/unified-secops-platform\/microsoft-threat-actor-naming<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/thehackernews.com\/2025\/06\/microsoft-and-crowdstrike-launch.html\">The Hacker News<\/a> | <a href=\"https:\/\/www.securityweek.com\/microsoft-crowdstrike-lead-effort-to-map-threat-actor-names\/\">SecurityWeek<\/a> | <a href=\"https:\/\/learn.microsoft.com\/en-us\/unified-secops-platform\/microsoft-threat-actor-naming\">Microsoft Threat Actor Mapping Resource<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">3. Fake DocuSign, Gitcode Sites Spread NetSupport RAT using Clipboard poisoning<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>Users visiting fake DocuSign and Gitcode websites are being tricked into \"proving they're not a robot\" by completing CAPTCHA challenges that secretly copy malicious PowerShell commands to their clipboard. <\/strong>When victims follow the instructions to paste and run the command (Win+R, Ctrl+V, Enter), they unknowingly trigger a multi-stage infection chain that ultimately installs NetSupport RAT on their systems.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The attack uses &#8220;clipboard poisoning&#8221; where fake CAPTCHA verification secretly copies obfuscated PowerShell scripts to victims&#8217; clipboards<\/li>\n\n\n\n<li>Multi-stage infection downloads intermediate scripts from external servers, establishes persistence via GitHub-hosted payloads, and deploys the final NetSupport RAT<\/li>\n\n\n\n<li>NetSupport Manager is a legitimate remote administration tool frequently abused by threat groups including FIN7, Scarlet Goldfinch, and Storm-0408<\/li>\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Monitor clipboard activities:<\/strong> Deploy endpoint detection rules specifically targeting clipboard modification events followed by PowerShell execution<\/li>\n\n\n\n<li><strong>Block legitimate tools used maliciously:<\/strong> Audit and restrict NetSupport Manager installations to authorized use cases only<\/li>\n\n\n\n<li><strong>Update CAPTCHA awareness:<\/strong> Include fake CAPTCHA clipboard poisoning techniques in security awareness training as this is a newer attack vector<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/thehackernews.com\/2025\/06\/fake-docusign-gitcode-sites-spread.html\">The Hacker News &#8211; Fake DocuSign, Gitcode Sites Spread NetSupport RAT via Multi-Stage PowerShell Attack<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">4. ClickFix Email Scam Alert: Fake Booking.com Emails Deliver Malware using Clipboard poisoning<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Hotel employees are receiving what looks like legitimate Booking.com emails with broken CAPTCHA verifications that need to be \"fixed.\" When victims click to solve the fake CAPTCHA, malicious PowerShell commands are secretly copied to their clipboard, and they're instructed to press Win+R, Ctrl+V, Enter\u2014unknowingly executing malware that installs remote access trojans like XWorm RAT.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Campaign surged dramatically with 47% of total volume occurring in March 2025, specifically targeting food and accommodation sector businesses<\/li>\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Monitor Windows+R executions:<\/strong> Implement endpoint detection for Run dialog usage immediately following clipboard modifications<\/li>\n\n\n\n<li><strong>Educate on fake CAPTCHA mechanics:<\/strong> Train users that legitimate CAPTCHAs never require copying\/pasting commands or using keyboard shortcuts<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/hackread.com\/clickfix-email-scam-fake-booking-com-emails-malware\/\">HackRead &#8211; ClickFix Email Scam Alert: Fake Booking.com Emails Deliver Malware<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">5. Compliance Firm Vanta Leaks Customer Data to Other Clients<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>Companies using Vanta<\/strong> for security compliance suddenly found other organizations' <strong>sensitive employee data mixed into their own dashboards <\/strong>due to a product code change gone wrong. The irony is stark: a company trusted to help hundreds of businesses manage their security compliance accidentally exposed customer data to competitors through an internal software bug.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Incident was caused by a recent product code change affecting third-party integrations<\/strong>, not an external attack or credential compromise<\/li>\n\n\n\n<li>Bug discovered May 26 affected fewer than 4<strong>% of customers but still impacted hundreds of organizations across sensitive compliance data<\/strong><\/li>\n\n\n\n<li><strong>Exposed data included employee names, account configurations, MFA usage details, and third-party integration settings <\/strong>&#8211; all visible to other Vanta customers.<\/li>\n\n\n\n<li>Vanta committed to complete remediation by June 4 and is updating their integration APIs and access control testing<\/li>\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Assess SaaS multi-tenancy risks:<\/strong> Review data isolation practices for SaaS vendors and assess the associated risks.<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/hackread.com\/code-bug-compliance-vanta-customer-data-leak\/\">HackRead &#8211; Code Bug at Compliance Firm Vanta Leaks Customer Data to Other Clients<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">6. Crocodilus Malware Adds Fake Entries To Victims&#8217; Contact Lists In New Scam Campaign<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>Android users <\/strong>across Europe, South America and Asia are discovering <strong>fake bank support numbers mysteriously appearing in their contact lists<\/strong>, courtesy of the Crocodilus banking trojan. <strong>When victims call these numbers<\/strong> thinking they're reaching their real bank, <strong>they're actually speaking to scammers <\/strong>who can bypass fraud detection systems that typically flag calls from unknown numbers.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Malware spreads via Facebook ads that stay online only 1-2 hours but get 1,000+ views each, primarily targeting users over 35 for maximum financial impact<\/li>\n\n\n\n<li>Campaign uses region-specific lures: Polish bank\/shopping app mimics, Turkish online casino overlays, Spanish browser updates, and Brazilian banking trojans<\/li>\n\n\n\n<li>Can bypass Android 13+ security restrictions for app installations and overlays real financial apps with fake login screens<\/li>\n\n\n\n<li>Geographic expansion and technical sophistication suggest involvement of well-resourced, organized threat actors<\/li>\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Educate on contact verification:<\/strong> Train users to verify bank contact numbers through official websites rather than trusting stored contacts<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/therecord.media\/crocodilus-malware-adds-fake-entries-to-victims-contact-lists-in-new-scam-campaign\">The Record &#8211; Crocodilus malware adds fake entries to victims&#8217; contact lists in new scam campaign<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">7. Malaysian home minister&#8217;s WhatsApp hacked, used to scam contacts<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>Malaysia's top security official<\/strong> the home affairs minister, who oversees law enforcement and immigration,<strong> discovered his WhatsApp account had been hijacked by attackers who used it to send malicious links to his entire contact list.<\/strong> The embarrassing breach sparked public ridicule and questions about Malaysia's cybersecurity capabilities when even the country's chief security minister couldn't protect his own messaging app.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Attackers used a VPN to compromise Datuk Seri Saifuddin Nasution Ismail&#8217;s account and sent malicious links targeting financial and personal information<\/li>\n\n\n\n<li>Part of escalating pattern: parliamentary speaker targeted in March, former PM&#8217;s Telegram\/Signal accounts compromised in 2022, police social media hijacked in 2015<\/li>\n\n\n\n<li>Mobile phishing has become increasingly common in Malaysia with citizens frequently targeted by fraudsters posing as police, bank officials, or court representatives<\/li>\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Executive protection awareness:<\/strong> Provide specialized cybersecurity training on mobile security and social engineering tactics, specially for executive teams.<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/therecord.media\/malaysian-home-ministers-whatsapp-hacked-used-to-scam-contacts\">The Record &#8211; Malaysian home minister&#8217;s WhatsApp hacked, used to scam contacts<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">8. Security News This Week: A Hacker May Have Deepfaked Trump&#8217;s Chief of Staff in a Phishing Campaign<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">The FBI is investigating a sophisticated attack where<strong> someone impersonated Susie Wiles, Trump's chief of staff, using both text messages and AI-generated voice calls<\/strong> that may represent one of the first significant deepfake phishing campaigns. The attackers accessed Wiles' contact list to target high-profile Republican figures and business executives, with <strong>some calls attempting financial fraud while others sought political intelligence <\/strong>like pardon lists.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>FBI ruled out foreign nation involvement, suggesting this was cybercriminal fraud rather than espionage, despite targeting the president&#8217;s closest adviser<\/li>\n\n\n\n<li>Uncertainty remains over how attackers obtained Wiles&#8217; contacts &#8211; could be device compromise or public\/gray-market data aggregation<\/li>\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Implement voice verification protocols:<\/strong> Establish independent authentication methods for high-level communications, especially for sensitive requests<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/www.wired.com\/story\/security-news-this-week-hacker-deepfaked-trump-chief-of-staff-phishing-campaign\/\">WIRED &#8211; Security News This Week: A Hacker May Have Deepfaked Trump&#8217;s Chief of Staff in a Phishing Campaign<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">9. Retail Cyberattack Wave Escalates with Three Major Breaches This Week<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Security teams across the retail sector are reeling from three significant cyberattacks this week alone, as Cartier, Victoria's Secret, and North Face all disclosed breaches affecting thousands of customers. The incidents represent an escalation of the coordinated campaign that began with UK retailers in April and has now spread globally, with attackers targeting everything from luxury jewelers to outdoor gear companies using sophisticated social engineering tactics.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cartier disclosed that hackers accessed internal systems and stole customer names, email addresses, and countries of residence, though no financial data was compromised<\/li>\n\n\n\n<li>Victoria&#8217;s Secret proactively shut down its entire U.S. website and curtailed in-store functions during Memorial Day weekend, with the incident affecting internal systems including email servers, HR functions, and potentially payroll processes<\/li>\n\n\n\n<li>North Face revealed that 2,861 customer accounts were compromised in a credential stuffing attack, with attackers using passwords stolen from other breaches to access purchase histories, addresses, and personal information<\/li>\n\n\n\n<li>These attacks continue the pattern that began with UK retailers Marks &amp; Spencer, Co-op, and Harrods in April, attributed to the DragonForce ransomware group and Scattered Spider collective<\/li>\n<\/ul>\n\n\n\n<p><strong>Loe edasi<\/strong><br><a href=\"https:\/\/www.securityweek.com\/cartier-data-breach-luxury-retailer-warns-customers-that-personal-data-was-exposed\/\">Cartier Data Breach: Luxury Retailer Warns Customers &#8211; SecurityWeek<\/a><br><a href=\"https:\/\/apnews.com\/article\/victorias-secret-takes-website-offline-after-security-incident\">Victoria&#8217;s Secret takes website offline after security incident &#8211; AP News<\/a><br><a href=\"https:\/\/therecord.media\/north-face-website-customer-accounts-breached-retail-incidents\">Nearly 3,000 North Face website customer accounts breached &#8211; The Record<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">10. Cybercriminals Exploit Salesforce Data Loader in New Social Engineering Campaign<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>IT teams are being tricked into approving malicious versions of Salesforce's Data Loader tool during sophisticated phone calls, giving attackers extensive access to steal sensitive customer data and move through corporate networks.<\/strong> Google warns that the campaign by \"The Com\" cybercriminal collective has targeted about 20 organizations across hospitality, retail, and education sectors, with some victims facing extortion demands months after the initial breach.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fake IT support calls trick employees into installing malicious Salesforce apps that steal customer data<\/li>\n\n\n\n<li>Campaign linked to &#8220;The Com&#8221; <strong>collective behind MGM and Caesars casino attacks<\/strong><\/li>\n\n\n\n<li>Extortion <strong>demands often come months after initial breach<\/strong>, suggesting partnership with other threat actors<\/li>\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Verify caller identity through separate channels <\/strong>before approving any <s>Salesforce<\/s> app installations<\/li>\n\n\n\n<li><strong>Audit existing Salesforce connected apps<\/strong> for unauthorized Data Loader versions<\/li>\n\n\n\n<li><strong>Monitor for unusual large-scale data exports<\/strong> from <s>Salesforce<\/s> SaaS applications \/ environments<\/li>\n<\/ul>\n\n\n\n<p><strong>Loe edasi<\/strong><br><a href=\"https:\/\/therecord.media\/google-warns-cybercriminals-targeting-salesforce-app-steal-data\">Google warns of cybercriminals targeting Salesforce app to steal data &#8211; The Record<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">11. Meta and Yandex Caught Using Secret Tracking Method to Deanonymize Billions of Users<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>Android users discovered their Facebook and Instagram apps have been secretly identifying them to websites they visit in their browsers - even when not logged into social media in those browsers. <\/strong>When users visit sites with Meta tracking pixels, their installed Facebook app connects through a hidden \"localhost socket\" to reveal their real identity, allowing Meta to link anonymous web browsing to actual user profiles since 2017 for Yandex and September 2024 for Meta.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>JavaScript tracking scripts embedded on thousands of websites silently connect with native apps through localhost sockets to share user data<\/li>\n\n\n\n<li>Technique bypasses traditional privacy protections by linking browser cookies to Android Advertising IDs and app account identities<\/li>\n\n\n\n<li><strong>Meta&#8217;s tracking script was reportedly disabled early morning after researchers published their findings<\/strong><\/li>\n<\/ul>\n\n\n\n<p><strong>Loe edasi<\/strong><br><a href=\"https:\/\/arstechnica.com\/tech-policy\/2025\/06\/meta-and-yandex-abused-internet-protocols-to-track-billions-of-users\/\">Meta and Yandex abused Internet protocols to covertly track billions of users &#8211; Ars Technica<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">12. Microsoft Launches Free AI-Powered Cybersecurity Program for European Governments<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>Microsoft launched a new European Security Program<\/strong> that expands its existing Government Security Program which has provided <strong>free cybersecurity services to over 40 countries since 2003<\/strong> to offer enhanced AI-driven threat intelligence specifically for European governments. The program targets escalating attacks from Russia, China, Iran, and North Korea by providing real-time threat insights, early vulnerability warnings, and strengthened partnerships with Europol and other European security organizations to all 27 EU countries plus the UK, EFTA members, and several other European nations.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The existing Government Security Program serves national security agencies and cyber emergency response teams from over 40 countries with more than 100 participating agencies<\/li>\n\n\n\n<li>Governments access the program through local Microsoft representatives after meeting eligibility criteria focused on intellectual property protections and national security responsibilities<\/li>\n\n\n\n<li>New European enhancements include embedded Microsoft investigators at Europol headquarters and joint research programs with UK&#8217;s Laboratory for AI Security Research<\/li>\n<\/ul>\n\n\n\n<p><strong>Loe edasi<\/strong><br><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-unveils-free-eu-cybersecurity-program-for-governments\/\">Microsoft unveils free EU cybersecurity program for governments &#8211; BleepingComputer<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">13. 9,000 Asus Routers Compromised by Persistent SSH Backdoor That Survives Firmware Updates<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Asus router owners discovered their devices were secretly compromised by the \"AyySSHush\" botnet through a sophisticated attack that installs an SSH backdoor written to non-volatile memory, making it impossible to remove even with firmware updates. The malware-free attack exploits authentication bypasses and a known command injection vulnerability to enable remote administrative control through a hidden SSH connection on port 53282.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Attackers disable system logging and AiProtection security features to evade detection while maintaining persistent access<\/li>\n\n\n\n<li>GreyNoise&#8217;s AI tool &#8220;Sift&#8221; detected the campaign using only 30 malicious requests over three months, demonstrating the attack&#8217;s stealth<\/li>\n\n\n\n<li>Asus released firmware patches to prevent new infections, but existing backdoors remain unremovable through standard updates<\/li>\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Check for unauthorized SSH access on TCP port 53282 and review authorized_keys files for unfamiliar entries<\/li>\n\n\n\n<li>Perform factory resets on suspected compromised routers and reconfigure from scratch rather than relying on firmware updates<\/li>\n\n\n\n<li>Block known malicious IP addresses associated with the campaign and monitor for unusual outbound connections<\/li>\n<\/ul>\n\n\n\n<p><strong>Loe edasi<\/strong><br><a href=\"https:\/\/www.tomshardware.com\/tech-industry\/cyber-security\/9-000-asus-routers-compromised-by-botnet-attack-and-persistent-ssh-backdoor-that-even-firmware-updates-cant-fix\">9,000 Asus routers compromised by persistent SSH backdoor &#8211; Tom&#8217;s Hardware<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>","protected":false},"excerpt":{"rendered":"<p>Summaries of top cybersecurity news from 3rd week of May<\/p>","protected":false},"author":1,"featured_media":19478,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32,26],"tags":[],"class_list":["post-19464","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","category-blog"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts\/19464","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/comments?post=19464"}],"version-history":[{"count":13,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts\/19464\/revisions"}],"predecessor-version":[{"id":19477,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts\/19464\/revisions\/19477"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/media\/19478"}],"wp:attachment":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/media?parent=19464"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/categories?post=19464"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/tags?post=19464"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}