The Cybersecurity and Infrastructure Security Agency and National Cyber Security Centre have uncovered a significant intrusion involving a government network device powered by Cisco Adaptive Security Appliance (ASA) software. The incident, traced back to September 2025, revolves around a stealthy backdoor known as FIRESTARTER, deployed through a coordinated advanced persistent threat campaign. Attackers leveraged two serious vulnerabilities—CVE-2025-20333 and CVE-2025-20362—to gain initial access. These weaknesses enabled unauthorized execution of code and access to restricted interfaces, effectively allowing attackers to breach perimeter defenses and maintain hidden control over critical network infrastructure. After gaining access, the threat actors introduced a secondary toolkit called LINE VIPER, significantly expanding their operational control. This toolkit allowed them to run commands remotely, intercept network traffic, disable logging mechanisms, and bypass VPN authentication controls. It also enabled surveillance of administrative actions and manipulation of system behavior. FIRESTARTER was then deployed as a persistent implant, embedding itself deeply into the system’s startup routines. By integrating with core processing components, it ensures execution at every reboot, surviving even firmware upgrades. Its ability to inject and execute malicious code through crafted network requests highlights a high level of sophistication, suggesting a well-resourced and technically advanced adversary. The activity, tracked by Cisco under the cluster UAT4356, has been tentatively linked to state-backed threat operations with similarities to earlier campaigns targeting network infrastructure. Investigations indicate that traditional patching alone cannot fully remove this threat, as the malware maintains persistence beyond standard remediation steps. Effective recovery requires complete device reimaging and physical power cycling to eliminate the implant. This incident also reflects a broader shift in attacker strategy, where compromised routers and IoT systems are repurposed into covert relay networks. Such infrastructure allows attackers to mask their movements, making detection and attribution increasingly difficult while sustaining long-term espionage operations.
Hackers are exploiting fake CAPTCHA pages to trick users into sending large volumes of international SMS messages, turning routine “prove you’re human” checks into a profitab...
A critical vulnerability has been identified in the Breeze Cache plugin for WordPress, actively exploited by attackers to upload arbitrary files without authentication. Tracked as ...
UNC6692 is a threat cluster conducting targeted social engineering campaigns by impersonating IT helpdesk staff through Microsoft Teams. Instead of exploiting software vulnerabilit...