Cybersecurity Brief – 2025-05-23
Major Incidents or Breaches
-
Chinese Threat Actor Activity:
- Chinese-speaking group UAT-6382 exploited a now-patched remote code execution vulnerability in Trimble Cityworks to breach multiple US local government networks, deploying Cobalt Strike and VShell.
- Chinese nexus actors exploited recently patched Ivanti Endpoint Manager Mobile (EPMM) vulnerabilities to target government agencies and enterprises across Europe, North America, and Asia.
-
Phishing Campaign Targeting International Students:
- The FBI reported an ongoing phishing campaign specifically targeting Middle Eastern students studying in the US, aiming to steal personal and financial information.
-
Database Exposure:
- A database containing 184 million login credentials, including those for Apple, Google, Meta, and various government services, was discovered and subsequently taken offline.
-
Cryptocurrency Theft via Fake Apps:
- Cybercriminals are distributing fake Ledger apps targeting macOS users to steal cryptocurrency seed phrases and digital assets.
Newly Discovered Vulnerabilities
-
GitLab Duo AI Prompt Injection:
- Researchers identified an indirect prompt injection vulnerability in GitLab’s AI assistant, Duo, which could enable attackers to steal source code or inject malicious content via manipulated AI prompts.
-
Windows Server 2025 Active Directory Flaw:
- A privilege escalation vulnerability in Windows Server 2025 was demonstrated, allowing attackers to compromise any Active Directory user through exploitation of delegated Manage Service Account (dMSA) permissions.
-
Versa Concerto Critical Flaws:
- Multiple unpatched critical vulnerabilities in Versa Concerto’s network security and SD-WAN orchestration platform could allow attackers to bypass authentication, achieve remote code execution, and compromise host systems.
Notable Threat Actor Activity
- Ransomware and Information Stealer Disruptions:
- Law enforcement agencies (FBI, Europol, and others) disrupted the Lumma Stealer malware network linked to over 10 million infections.
- Operation Endgame resulted in the takedown of 300 servers and 650 domains used in ransomware supply chains.
- 270 dark web vendors and buyers were arrested during Operation RapTor, targeting illicit online marketplaces.
- US authorities indicted Rustam Rafailevich Gallyamov, leader of the Qakbot botnet, and 16 Russians linked to DanaBot malware operations, which supported ransomware and espionage campaigns.
Trends, Tools, or Tactics of Interest
-
Cloud and SaaS Targeting:
- CISA warned of broader attacks against SaaS applications exploiting application secrets and cloud misconfigurations, with Commvault observing increased threat activity in Microsoft Azure environments.
-
Identity Security Automation Gaps:
- Research highlights significant automation shortcomings in identity security, with many organisations relying on manual processes that introduce risk.
-
AI Security:
- The exploitation of AI-powered assistants (e.g., GitLab Duo) via prompt injection underscores emerging risks in integrating AI tools into development pipelines.
-
Privacy Controls:
- Signal updated its Windows app to block Microsoft Recall from capturing screenshots of user conversations, reflecting growing privacy concerns around AI-powered desktop features.
Regulatory or Policy Developments
- FTC Order for GoDaddy:
- The US Federal Trade Commission finalised an order requiring GoDaddy to implement enhanced security measures for its hosting services, following multiple data breaches.
No significant aviation-related cybersecurity developments were identified in today’s reporting.