โŒ

Reading view

There are new articles available, click to refresh the page.

Latvian national involved with Karakurt and other ransomware gangs sentenced for his role in ransomware organization

From the DOJโ€™s press release: A Latvian national was sentenced today to 102 months in prison for his role in a major Russian ransomware organization that stole from and extorted over 54 companies. According to court documents, Deniss Zolotarjovs (ะ”ะตะฝะธัั ะ—ะพะปะพั‚ะฐั€ั‘ะฒั), 35, of Moscow, Russia, was a member of a ransomware organization led by former...

Source

Kentwood, Michigan, schools say student malware disrupted Wi-Fi

DysruptionHub reports: Kentwood Public Schools said districtwide Wi-Fi was disrupted after a student used malicious software designed to interfere with the school systemโ€™s network. The district said outside experts helped isolate the issue, which affected Wi-Fi connectivity across its schools, and that the problems โ€œappearโ€ to have been resolved. Kentwood Public Schools serves students in...

Source

Two Americans Sentenced to Prison for Using BlackCat Ransomware to Attack Multiple Entities

There is an update on the criminal cases against Ryan Goldberg and Kevin Martin, security professionals who turned to the dark side and cut a deal with ALPHV/BlackCat operators to use their ransomware and pay BlackCat 20% of whatever they collected in ransom. From the DOJโ€™s press release today: Two American cybersecurity professionals were sentenced...

Source

VECT Ransomware is a Wiper, Not Ransomware โ€” Donโ€™t Bother Paying, Says Check Point Research

Check Point Researchers recently dug into all three versions of VECTโ€™s ransomware. And what they found should concern anyone who discovers they have been locked by it. From their blog post: Ransomware is supposed to be reversible. The attacker locks your files, holds the key, and returns it when you pay.ย Thatโ€™sย the business model. VECTโ€™s software...

Source

Over 200 Japanese firms have paid ransomware attackers; 60% fail to recover data

Data from Japanese firms indicates that paying ransom is unlikely to enable full recovery of encrypted data. Japan Today reports: At least 222 Japanese companies have paid ransomware attackers in the past, yet about 60 percent of them still failed to recover their data, according to a recent survey. Of 1,107 firms that responded to...

Source

Cherry Health continues to experience issues, but hasnโ€™t publicly acknowledged ransomware attack (Updated)

Michael Martin reports: ย Cherry Health says it is dealing with ongoing technology issues, but days into the disruption, officials have not explained whatโ€™s causing them. In a notice posted to their website, the health system said it is โ€œexperiencing technology issues across Cherry Health, including our phone system.โ€ Their clinics remain open for scheduled visits....

Source

One ransomware crew now drives half of all cyber claims: At-Bay

Kenneth Araullo reports: A single ransomware crew exploiting a single brand of firewall is now driving nearly half of all cyber insurance claims, At-Bay has warned, in a finding that recasts how underwriters and brokers should be thinking about risk selection. The cyber carrierโ€™s 2026 InsurSec Report, drawn from more than 6,500 claims and 100,000...

Source

KR: Data of 100,000 leaked from Lee & Lee Country golf club; N. Korean hacking suspected

Oh Seok-min reports: Personal information of around 100,000 customers has been leaked from a golf course, prompting a police investigation, sources said Sunday. The Korean National Police Agency is probing the case after the website of Lee & Lee Country Club in the county of Gapyeong, about 55 kilometers northeast of Seoul, was hacked, with...

Source

UNC6692 Uses Email Bombing, Social Engineering to Deploy โ€˜Snowโ€™ Malware

The threat actor infected victims with the Snow malware family โ€“ Snowbelt, Snowglaze, and Snowbasin โ€“ for persistent access.

The post UNC6692 Uses Email Bombing, Social Engineering to Deploy โ€˜Snowโ€™ Malware appeared first on SecurityWeek.

US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied

A state-sponsored hacking group has implanted a custom backdoor on Cisco network security devices that can survive firmware updates and standard reboots, U.S. and British cybersecurity authorities disclosed Thursday, marking a significant escalation in a campaign that has targeted government and critical infrastructure networks since at least late 2025.

The Cybersecurity and Infrastructure Security Agency and the United Kingdomโ€™s National Cyber Security Centre jointly published a malware analysis report identifying the backdoor, code-named Firestarter. Ciscoโ€™s threat intelligence division, Talos, attributed the malware to a threat actor it tracks as UAT-4356. The company attributed the same group to a 2024 espionage campaign called ArcaneDoor, which focused on compromising network perimeter devices.

CISA confirmed it discovered Firestarter on a U.S. federal civilian agencyโ€™s Cisco Firepower device after identifying suspicious connections through continuous network monitoring. The finding prompted an updated emergency directive issued Thursday, requiring all federal civilian agencies to audit their Cisco firewall infrastructure and submit device memory snapshots for analysis by Friday.

A backdoor that outlasts patches

The central concern driving the updated directive is the attack groupโ€™s ability to persist on compromised devices, even after enterprises applied security patches Cisco released in September 2025. Those patches addressed two vulnerabilities โ€” CVE-2025-20333, a remote code execution flaw in the VPN web server component, and CVE-2025-20362, an unauthorized access vulnerability โ€” that UAT-4356 exploited to gain initial entry. According to CISA, devices compromised before patching may still harbor the implant.

Firestarter allows attackers to achieve persistence by manipulating the Cisco Service Platform mount list, a configuration file that governs which programs execute during the deviceโ€™s boot sequence. When the device receives a termination signal or enters a reboot, the malware copies itself to a secondary location and rewrites the mount list to restore and relaunch itself after the system comes back online.ย 

Critically, a standard software reboot does not remove the implant. Only a hard reboot โ€” physically disconnecting the device from its power supply โ€” is sufficient to clear the persistence mechanism from memory, according to both CISA and Cisco.

From there, the malware injects malicious shellcode into LINA, the core networking and firewalling code of Ciscoโ€™s Adaptive Security Appliance and Firepower Threat Defense software. Once embedded, the malware intercepts a specific type of network request normally used for VPN authentication. When a request arrives containing a hidden trigger sequence, it executes code supplied by the attackers, giving them a backdoor into the device.

Ties to ongoing campaign

Cisco Talos noted that Firestarter shares significant technical similarities with a previously documented implant called RayInitiator, suggesting the tools share a common origin or development history within UAT-4356โ€™s arsenal.

In the federal agency incident analyzed by CISA, the attackers first deployed a separate implant, called Line Viper, to gain access to device configurations, credentials, and encryption keys. Firestarter was installed shortly after, prior to Ciscoโ€™s September 2025 patches being applied to those specific devices. When the agency patched its systems, Firestarter stayed on the devices, and the actors used it to then redeploy Line Viper in March, nearly six months after the initial breach.

Cisco and CISA did not attribute the espionage attacks to a specific nation state, but Censys researchers previously said it found compelling evidence indicating a threat group based in China was behind the ArcaneDoor campaign. Censys noted it found evidence of multiple major Chinese networks and Chinese-developed anti-censorship software during its investigation into the early 2024 attacks.

The persistence vulnerability affects a broad range of Cisco hardware, including the Firepower 1000, 2100, 4100, and 9300 series, as well as the Secure Firewall 1200, 3100, and 4200 series.

Cisco has released updated software to address the persistence mechanism, though the company strongly recommends reimaging affected devices rather than relying solely on software updates where compromise is suspected.

The incident reflects a pattern increasingly seen among state-linked hackers: targeting the network edge devices that organizations rely on to enforce security boundaries. Because these appliances sit at the perimeter of enterprise and government networks, compromising them can expose internal traffic and give attackers a position to intercept credentials and communications.

CISA acknowledged active exploitation of the underlying vulnerabilities was ongoing at the time of publication.

A Cisco spokesperson told CyberScoop that customers needing assistance should contact Cisco Technical Assistance for support. CISA did not respond to a request for comment.ย 

The post US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied appeared first on CyberScoop.

โŒ