SOC Goulash<p>Alright team, it's been a pretty packed 24 hours in the cyber world! We've got some critical zero-days under active exploitation, a surge in ransomware activity, new malware discoveries, and some interesting discussions around government cyber initiatives and data privacy. Let's dive in:</p><p>Ransomware Surges & Government Data Leaks 🚨</p><p>- Akira ransomware is actively exploiting a year-old vulnerability (CVE-2024-40766) in SonicWall SSL VPNs, with a significant number of attacks observed since July, often due to unpatched or misconfigured devices where local passwords weren't reset after upgrades.<br>- Vietnam's National Credit Information Center (CIC) was breached by Scattered Spider and Shiny Hunters, leading to the theft and sale of 160 million records including credit card history and government IDs, while Panama's Ministry of Economy and Finance was hit by INC ransomware, claiming 1.5 TB of data.<br>- Aleksanteri Kivimäki, convicted of extorting 20,000 Vastaamo psychotherapy patients, has been released on appeal, highlighting the ongoing legal complexities and victim suffering in this significant data privacy case.<br>- In a less critical but still impactful incident, over a thousand University of Amsterdam students are without working laundry facilities after an attacker jailbroke smart machines to allow free washes, with the management company refusing to cover costs.</p><p>🤫 CyberScoop | <a href="https://cyberscoop.com/sonicwall-akira-ransomware-attacks-surge/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/sonicwall-akira</span><span class="invisible">-ransomware-attacks-surge/</span></a><br>🗞️ The Record | <a href="https://therecord.media/vietnam-cic-panama-finance-ministry-cyberattacks" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/vietnam-cic-pa</span><span class="invisible">nama-finance-ministry-cyberattacks</span></a><br>🗞️ The Record | <a href="https://therecord.media/finland-vastaamo-hacker-free-during-appeal-conviction" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/finland-vastaa</span><span class="invisible">mo-hacker-free-during-appeal-conviction</span></a><br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/12/jailbroken_laundry_machines/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/12/jailbroken_laundry_machines/</span></a></p><p>Zero-Days & RCEs Under Active Exploitation 🛡️</p><p>- Samsung has patched CVE-2025-21043, a critical out-of-bounds write zero-day in its libimagecodec.quram.so library, actively exploited on Android 13+ devices and reported by Meta/WhatsApp, allowing remote code execution.<br>- CISA has added CVE-2025-5086, a critical deserialization RCE flaw in Dassault Systèmes' DELMIA Apriso, to its KEV catalog due to active exploitation, with observed attacks involving malicious SOAP requests executing .NET executables.<br>- The Cursor AI code editor has a security weakness where Workspace Trust is disabled by default, allowing silent code execution via malicious .vscode/tasks.json files when a project is opened, posing a significant supply chain risk.<br>- Apple has issued its fourth spyware alert this year to French users, indicating highly-targeted attacks, following a recent WhatsApp zero-click flaw (CVE-2025-55177) chained with an Apple iOS bug (CVE-2025-43300) in advanced spyware campaigns.</p><p>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/samsung-patches-actively-exploited-zero-day-reported-by-whatsapp/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/samsung-patches-actively-exploited-zero-day-reported-by-whatsapp/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/samsung-fixes-critical-zero-day-cve.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/sams</span><span class="invisible">ung-fixes-critical-zero-day-cve.html</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/cursor-ai-code-editor-flaw-enables-silent-code-execution-via-malicious-repositories.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/curs</span><span class="invisible">or-ai-code-editor-flaw-enables-silent-code-execution-via-malicious-repositories.html</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-actively-exploited-dassault-rce-vulnerability/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisa-warns-of-actively-exploited-dassault-rce-vulnerability/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/09/apple-warns-french-users-of-fourth-spyware-campaign-in-2025-cert-fr-confirms.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/09/appl</span><span class="invisible">e-warns-french-users-of-fourth-spyware-campaign-in-2025-cert-fr-confirms.html</span></a></p><p>New Malware & Attacker Tradecraft Insights 🕵️♀️</p><p>- Huntress gained unique insights into an attacker's tradecraft after they mistakenly installed a trial EDR, revealing their use of automation, AI, phishing kits, and Google Translate for targeting, sparking an ethical debate within the infosec community.<br>- A new ransomware strain, HybridPetya, has been discovered, capable of bypassing UEFI Secure Boot by exploiting CVE-2024-7344 to install a malicious bootkit on the EFI System Partition, mimicking Petya/NotPetya's destructive style.<br>- Bitdefender uncovered EggStreme, a novel multi-stage, fileless malware framework attributed to a China-linked APT, used in an espionage campaign against a Philippine military company for over a year, demonstrating advanced evasion techniques.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/12/huntress_attacker_surveillance/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/12/huntress_attacker_surveillance/</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/new-hybridpetya-ransomware-can-bypass-uefi-secure-boot/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-hybridpetya-ransomware-can-bypass-uefi-secure-boot/</span></a><br>🗞️ The Record | <a href="https://therecord.media/philippines-military-company-suspected-china-espionage-eggstreme-malware" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/philippines-mi</span><span class="invisible">litary-company-suspected-china-espionage-eggstreme-malware</span></a></p><p>Insider Threat in Schools 🏫</p><p>- The UK's Information Commissioner's Office (ICO) reports that over half of school cyberattacks are caused by students, with nearly a third stemming from stolen login details, often due to poor staff practices.<br>- The ICO and National Crime Agency (NCA) are urging parents to intervene early if they suspect children are engaging in cybercrime, as seemingly minor acts can escalate into serious offenses targeting critical infrastructure.<br>- Real-world cases include Year 11 students breaking into school IMS systems and college students manipulating data, highlighting the need for better GDPR training for staff and removing temptation for students.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/12/students_school_cyberattacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/12/students_school_cyberattacks/</span></a></p><p>Digital ID & Surveillance Concerns 🔒</p><p>- Big Brother Watch warns that a national digital ID in the UK, proposed to tackle illegal immigration, risks creating a "checkpoint society" and enabling mass surveillance, with 63% of Brits distrusting the government with their data.<br>- The civil liberties group argues the government's rationale is poorly substantiated and that the plan's scope could easily expand beyond initial checks to cover everyday activities like banking or GP appointments.<br>- Concerns are also raised about the existing One Login system's cybersecurity weaknesses and the potential for "voluntary" enrolment to become mandatory, excluding individuals from essential services due to errors or refusal.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/09/12/privacy_activists_warn_uk_digital_id_risks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/09/12/privacy_activists_warn_uk_digital_id_risks/</span></a></p><p>CISA's Funding & Talent Challenges 🏛️</p><p>- Despite significant personnel and funding cuts proposed by the Trump administration, CISA's new Executive Assistant Director of Cybersecurity, Nick Andersen, asserts the agency's operational capabilities remain strong and focused on core missions.<br>- Andersen also urged Congress to renew the 2015 Cybersecurity Information Sharing Act (CISA 2015) before its September 30th expiry, emphasising its importance for voluntary threat intelligence sharing with the federal government.<br>- However, a DHS Inspector General report found CISA mismanaged its Cyber Incentive program, wasting over $138 million by paying ineligible employees and failing to track recipients, risking attrition of critical cyber talent.</p><p>🤫 CyberScoop | <a href="https://cyberscoop.com/cisa-operational-strength-despite-cuts-nicholas-andersen-billington-cybersecurity-summit/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/cisa-operationa</span><span class="invisible">l-strength-despite-cuts-nicholas-andersen-billington-cybersecurity-summit/</span></a><br>🗞️ The Record | <a href="https://therecord.media/cisa-official-calls-on-lawmakers-renew-cisa2015" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/cisa-official-</span><span class="invisible">calls-on-lawmakers-renew-cisa2015</span></a><br>🤫 CyberScoop | <a href="https://fedscoop.com/cisa-cyber-incentive-program-dhs-inspector-general-report/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fedscoop.com/cisa-cyber-incent</span><span class="invisible">ive-program-dhs-inspector-general-report/</span></a><br>🗞️ The Record | <a href="https://therecord.media/cisa-cybersecurity-retention-incentives-dhs-ig-audit" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/cisa-cybersecu</span><span class="invisible">rity-retention-incentives-dhs-ig-audit</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RCE</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a></p>