SOC Goulash<p>Alright team, it's been a pretty packed 24 hours in the cyber world! We've got some critical zero-days under active exploitation, a flurry of nation-state activity, new ransomware strains, and a deep dive into how attackers are weaponising browsers. Let's get into it:</p><p>Actively Exploited Vulnerabilities & Zero-Days 🛡️</p><p>- WhatsApp has patched a zero-day, CVE-2025-55177, actively exploited in sophisticated, targeted attacks, potentially chained with Apple's CVE-2025-43300, likely by commercial surveillanceware vendors.<br>- FreePBX issued an emergency patch for a critical RCE flaw (CVSS 10, CVE-2025-57819) actively exploited since August 21st, allowing database manipulation and remote code execution. Users are urged to upgrade and check for suspicious 'ampuser' accounts.<br>- Docker Desktop on Windows and Mac has a critical vulnerability (CVE-2025-9074) allowing attackers to break container isolation and potentially take over the host system by exploiting an unauthenticated Docker Engine API.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/01/infosec_in_brief/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/01/infosec_in_brief/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p>Recent Cyber Attacks & Breaches 🚨</p><p>- A widespread supply chain attack via Salesloft Drift, an AI chat agent, compromised Salesforce instances of numerous organisations, including Zscaler, leading to the theft of customer information and sensitive credentials like AWS access keys and Snowflake tokens.<br>- Nissan's design subsidiary, Creative Box Inc., was hit by the Qilin ransomware group, confirming data leakage, while the city of Baltimore lost $1.5 million in a procurement scam where a fraudster changed vendor payment details.<br>- New ransomware strains like Cephalus, Underground, NightSpire, and Sinobi (a Lynx rebrand) are active, with Sinobi exploiting compromised SonicWall SSL VPN credentials for initial access and lateral movement.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/01/infosec_in_brief/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/01/infosec_in_brief/</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/zscaler-data-breach-exposes-customer-info-after-salesloft-drift-compromise/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/zscaler-data-breach-exposes-customer-info-after-salesloft-drift-compromise/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p>Nation-State Threat Actor Activity 🌍</p><p>- Amazon disrupted a watering hole campaign by Russian state-sponsored group Midnight Blizzard (APT29), which compromised legitimate websites to redirect targets to malicious Microsoft device code authentication flows, aiming to steal credentials.<br>- North Korea-linked ScarCruft (APT37) is using RokRAT malware in "Operation HanKook Phantom," targeting South Korean academics and former government officials via spear-phishing with LNK files to steal sensitive information and conduct espionage.<br>- The Spanish government cancelled a €10 million contract with Telefónica to use Huawei equipment in its national academic and research network (RedIRIS), citing "reasons of digital strategy and strategic autonomy" amidst ongoing concerns from allies about Chinese vendor risks.</p><p>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/amazon-disrupts-russian-apt29-hackers-targeting-microsoft-365/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/amazon-disrupts-russian-apt29-hackers-targeting-microsoft-365/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/scarcruft-uses-rokrat-malware-in.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/scar</span><span class="invisible">cruft-uses-rokrat-malware-in.html</span></a><br>🗞️ The Record | <a href="https://therecord.media/spain-cancels-10-million-euro-huawei-contract" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/spain-cancels-</span><span class="invisible">10-million-euro-huawei-contract</span></a></p><p>New Malware & Attack Techniques 🛠️</p><p>- Android dropper apps are shifting from delivering banking Trojans to simpler SMS stealers and spyware, often masquerading as government or banking apps, to bypass Google Play Protect's new security measures.<br>- Threat actors are using new methods like MixShell malware delivered via website contact forms, physical side-channel attacks (SleepWalk) exploiting CPU power consumption, and financially motivated ShadowCaptcha campaigns leveraging fake CAPTCHA pages.<br>- Other notable techniques include malvertising campaigns pushing the Brokewell banking trojan, fake recipe/guide sites dropping malware, proxyware distribution via fake YouTube download sites, and social media accounts laundering Chinese state media news.</p><p>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/android-droppers-now-deliver-sms.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/andr</span><span class="invisible">oid-droppers-now-deliver-sms.html</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p>Threat Landscape Commentary 📈</p><p>- Distributed Denial of Service (DDoS) remains a "profoundly unsexy" but rampant cybercrime, with Netscout reporting 8 million attacks globally in the first half of 2025, peaking at over 3 Tbps.<br>- DDoS-as-a-Service makes these sophisticated attacks accessible to anyone, targeting critical infrastructure sectors and even niche businesses like classical music websites, often for unclear motives.<br>- An infrastructural defence is needed, moving beyond filtering to automatically detect and take compromised botnet nodes offline, treating them as "broken" devices that require fixing to permanently disrupt DDoS operations.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/01/ddos_opinion/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/01/ddos_opinion/</span></a></p><p>Regulatory & Policy Updates ⚖️</p><p>- Microsoft will begin requiring multi-factor authentication (MFA) for all non-read-only access to Azure systems from October 1st, with extensions available until July 1st next year for complex environments.<br>- Microsoft is implementing email throttling from October 15th, limiting external recipients to 100 per organisation per 24-hour window, to combat spam originating from newly created '.onmicrosoft.com' tenants.<br>- OpenSSH will start showing warnings for connections to SSH servers lacking post-quantum cryptography protections from version 10.1, urging server updates to support sntrup761x25519-sha512 or mlkem768x25519-sha256.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/01/infosec_in_brief/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/01/infosec_in_brief/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p>AI Security & Prompt Injection 🧠</p><p>- Researchers discovered "LegalPwn," a novel prompt injection attack that tricks Large Language Models (LLMs) into ignoring guardrails by embedding adversarial instructions within legal documents, making them appear legitimate.<br>- This technique successfully bypassed AI-driven security analysis in models like OpenAI's GPT-4o, Google's Gemini 2.5, and xAI's Grok, even leading to recommendations for executing reverse shells on user systems.<br>- AI systems are also vulnerable to prompt injection via image scaling attacks, where malicious instructions are hidden in high-resolution images, becoming visible and executable when the AI agent downscales them for processing.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/01/legalpwn_ai_jailbreak/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/01/legalpwn_ai_jailbreak/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p>Useful Tools & Resources 💡</p><p>- PcapXray is an open-source tool designed to speed up packet capture investigations by visualising PCAP files into clear network diagrams, highlighting hosts, traffic flows, Tor usage, and potential malicious activity.<br>- Kopia is an open-source backup and restore tool that creates encrypted snapshots of selected files and directories to various destinations, offering deduplication, compression, and end-to-end encryption for efficient and secure backups.<br>- The "Weekly Recap" also highlights tools and strategies for securing Model Context Protocol (MCP) servers used by AI tools like GitHub Copilot, recommending auditing, stress-testing, policy enforcement, and Zero-Trust access.</p><p>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p>Sponsored Content & Insights 🤝</p><p>- "When Browsers Become the Attack Surface: Rethinking Security for Scattered Spider" highlights how over 80% of security incidents now originate from web applications, detailing Scattered Spider's browser-targeting techniques and advocating for multi-layered browser security.<br>- Other sponsored insights from The Hacker News cover "Code-to-Cloud Security" for AppSec leaders, practical steps to secure AI agents from cyberattacks, methods for hunting down "Shadow AI," and strategies for locking down Model Context Protocol (MCP) servers.<br>- These articles collectively emphasise the evolving attack surface, from browsers to AI agents and cloud-native applications, urging CISOs to adapt defence strategies with runtime protection, contextual policies, and integrated security stacks.</p><p>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/when-browsers-become-attack-surface.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/when</span><span class="invisible">-browsers-become-attack-surface.html</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/weekly-recap-whatsapp-0-day-docker-bug.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/week</span><span class="invisible">ly-recap-whatsapp-0-day-docker-bug.html</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/NationState" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NationState</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/DDoS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DDoS</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/PromptInjection" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PromptInjection</span></a> <a href="https://infosec.exchange/tags/SupplyChain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SupplyChain</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/BrowserSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BrowserSecurity</span></a> <a href="https://infosec.exchange/tags/MFA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MFA</span></a> <a href="https://infosec.exchange/tags/Regulatory" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Regulatory</span></a></p>