Week in review

AUSCERT Week in Review for 9th May 2025

Greetings, Mother’s Day is coming up this weekend and while flowers and chocolates are always nice, a more meaningful gift might help your parents to stay safe online. Older generations are increasingly targeted by scammers, often due to limited familiarity with digital technology. Cyber criminals exploit this lack of understanding through phishing emails, fake calls, and deceptive websites designed to steal personal or financial information. Taking the time to show your parents how to spot scams, use strong passwords, and update their devices can go a long way to protect them. It’s a gift that offers peace of mind and empowers them to navigate the digital world more confidently. We’re thrilled to announce that Jess Modini has joined our lineup of keynote speakers for AUCERT2025! Jess is a highly accomplished technology leader, academic, and security researcher. She brings a wealth of experience as a global keynote speaker, inventor, and advisory board member. Jess is currently the Head of Technology and Security at a stealth-mode startup set to launch in 2025. Her impressive career includes senior roles at Amazon Web Services, the Australian Cyber Security Centre, and the Australian Department of Defence. Jess holds five masters degrees and is completing a Doctorate in Cyber Security at UNSW’s Australian Defence Force Academy, where she also teaches and conducts cutting-edge research. Her current work focuses on advanced persistent threat (APT) detection and cyber epidemiology in collaboration with global partners. We’re honoured to have Jess share her insights and expertise at AUCERT 2025. With less than a couple of weeks to go, excitement is building as we prepare to reconnect with our community and hear from an outstanding lineup of speakers. Second Wave of Attacks Hitting SAP NetWeaver After Zero-Day Compromise Date: 2025-05-06 Author: Security Week Threat actors have been observed launching a second wave of attacks against SAP NetWeaver instances that were compromised via a recent zero-day vulnerability, enterprise application security firm Onapsis warns. The zero-day, tracked as CVE-2025-31324 (CVSS score of 10/10), was disclosed on April 24, after SAP updated its April 2025 Security Patch Day bulletin to add a fresh note addressing it. Microsoft Warns of Attackers Exploiting Misconfigured Apache Pinot Installations Date: 2025-05-06 Author: Security Week Research conducted by Microsoft into the security of Kubernetes installations revealed that threat actors have targeted misconfigured Apache Pinot instances. Apache Pinot is an open source real-time analytics platform designed for querying large datasets with high speed and low latency. Pinot is used by some of the world’s biggest companies, including Walmart, Uber, Slack, LinkedIn, Wix and Stripe. In the case of Kubernetes installations, the official Apache Pinot documentation does not inform users that the default configuration is highly insecure and can expose sensitive user data. Second Ransomware Group Caught Exploiting Windows Flaw as Zero-Day Date: 2025-05-07 Author: Security Week [Please see AUSCERT bulletins: https://portal.auscert.org.au/bulletins/ASB-2025.0059/, https://portal.auscert.org.au/bulletins/ASB-2025.0053/] Multiple ransomware groups appear to have exploited a recently patched Windows vulnerability as a zero-day, Symantec reported. The vulnerability in question is tracked as CVE-2025-29824 and it was patched by Microsoft with its April 2025 Patch Tuesday updates. The flaw impacts the Windows Common Log File System (CLFS) and it can be exploited by an attacker to escalate privileges. PoC Published for Exploited SonicWall Vulnerabilities Date: 2025-05-05 Author: Security Week The US cybersecurity agency CISA added two SonicWall flaws to the Known Exploited Vulnerabilities (KEV) catalog on the same day that proof-of-concept (PoC) exploit code targeting them was published. The exploitation of the two security defects, tracked as CVE-2023-44221 and CVE-2024-38475, came to light last week, when SonicWall updated its advisories to flag them as targeted in attacks. Healthcare Sector Becomes a Major Target for Cyber Attacks in 2025 Date: 2025-05-07 Author: GB Hackers The healthcare sector has emerged as a prime target for cyber attackers, driven by the increasing reliance on cloud applications and the rapid integration of generative AI (genAI) tools into organizational workflows. According to the Netskope Threat Labs Report for Healthcare 2025, cybercriminals are exploiting trusted platforms like GitHub, with 13% of healthcare organizations experiencing malware downloads from the developer hub each month. ESB-2025.2740 – Google Android: CVSS (Max): 8.1* Google's May 2025 Android update patches 47 vulnerabilities, including an actively exploited zero-day (CVE-2025-27363) in the FreeType library that could allow remote code execution. The update applies to Android versions 13, 14, and 15, and users are urged to update immediately to stay protected. The zero-day, as confirmed by Google, may be under limited, targeted exploitation. ESB-2025.2790 – Google Chrome: CVSS (Max): None Google has released a critical Chrome update (version 136.0.7103.92/.93) to patch CVE-2025-4372, a Use-After-Free vulnerability in the WebAudio component. The flaw allows remote code execution via malicious HTML with minimal user interaction and no special privileges.Chrome's WebAudio component has been targeted before, with past vulnerabilities like CVE-2023-6345 and CVE-2024-0224 revealing ongoing security challenges tied to the complexity of audio processing in web browsers. ESB-2025.2902 – Cisco IOS XE Wireless Controller Software: CVSS (Max): 10.0 Cisco has patched a critical vulnerability (CVE-2025-20188) in IOS XE for Wireless LAN Controllers, caused by a hard-coded JSON Web Token. This flaw allows unauthenticated remote attackers to fully compromise affected devices by impersonating authorised users. Rated CVSS 10.0, the issue affects the Out-of-Band AP Image Download feature and poses a severe security risk. ESB-2025.2899 – GitLab Community and Enterprise Edition: CVSS (Max): 6.8 GitLab has released versions 17.11.2, 17.10.6, and 17.9.8 for CE and EE with critical bug and security fixes. These updates patch three medium-severity vulnerabilities: a Device OAuth bypass (CVE-2025-0549), a GitHub import DoS exploit (CVE-2024-8973), and a group IP restriction bypass (CVE-2025-1278). Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for 2nd May 2025

Greetings, This week, Verizon Business released its much-anticipated 2025 Data Breach Investigations Report (DBIR), and the findings should serve as a wake-up call for the cyber security community. The report analysed over 22,000 incidents and more than 12,000 confirmed breaches, painting a sobering picture of the current threat landscape. Key Takeaways: • Third-party breaches have doubled, now linked to 30% of incidents, raising supply chain concerns. • Vulnerability exploitation is up 34%, often targeting perimeter devices and zero-day flaws. • Ransomware features in 44% of breaches, hitting SMBs hardest—88% of ransomware breaches affected this group. • Credential abuse (22%) and vulnerability exploitation (20%) remain dominant attack vectors. • Human error and social engineering continue to play a critical role in breaches. The report strongly urges organisations to prioritise strong password policies, prompt patching, and comprehensive security awareness training. Espionage-driven attacks are on the rise in the Manufacturing and Healthcare sectors, while Education, Financial, and Retail continue to face persistent threats. With increasing zero-day and third-party threats, businesses should strengthen patching practices, assess vendor risk, and reinforce human-centric defences. Proactive resilience is key. Read more insights and guidance from the report Verizon DBIR site Final reminder to register for our upcoming webinar —The New Competitive Edge? Cyber Security in Value Propositions on Tuesday, 6 May from 12:00–1:00pm. Join AUSCERT General Manager Ivano Bongiovanni and a panel of leading experts as they explore how cyber security is emerging as a powerful strategic differentiator. Discover how it’s reshaping trust, purchasing behaviour, and value creation — and what organisations need to do to stay ahead in a trust-driven economy. Register now to secure your spot. Storm-1977 targets education sector with password spraying Date: 2025-04-27 Author: Security Affairs Over the past year, Microsoft Threat Intelligence researchers observed a threat actor, tracked as Storm-1977, using AzureChecker.exe to launch password spray attacks against cloud tenants in the education sector. AzureChecker.exe connected to sac-auth[.]nodefunction[.]vip to download AES-encrypted data, which, once decrypted, revealed password spray targets. It also accepted an accounts.txt file with username and password pairs, using both datasets to validate credentials against target tenants. Microsoft observed a successful account breach where a threat actor used a guest account to create a resource group and over 200 containers for cryptomining. SentinelOne Uncovers Chinese Espionage Campaign Targeting Its Infrastructure and Clients Date: 2025-04-29 Author: The Hacker News Cybersecurity company SentinelOne has revealed that a China-nexus threat cluster dubbed PurpleHaze conducted reconnaissance attempts against its infrastructure and some of its high-value customers. "We first became aware of this threat cluster during a 2024 intrusion conducted against an organization previously providing hardware logistics services for SentinelOne employees," security researchers Tom Hegel, Aleksandar Milenkoski, and Jim Walter said in an analysis published Monday. PurpleHaze is assessed to be a hacking crew with loose ties to another state-sponsored group known as APT15, which is also tracked as Flea, Nylon Typhoon (formerly Nickel), Playful Taurus, Royal APT, and Vixen Panda. Thousands of Australian bank login details leaked on dark web, and banks can’t stop it Date: 2025-04-30 Author: 7news Thousands of Australians’ bank login details are being passed around on the dark web and banks say there’s little they can do to stop it. More than 31,000 sets of credentials — including those of at least 14,000 Commonwealth Bank customers, 7000 ANZ customers, 5000 NAB customers and 4000 Westpac customers — have been stolen from personal devices infected with malware, the ABC reported. The stolen details are now circulating on the messaging platform Telegram and dark web forums, according to Australian cyber intelligence firm Dvuln. Cloudflare mitigates record number of DDoS attacks in 2025 Date: 2025-04-28 Author: Bleeping Computer Internet services giant Cloudflare says it mitigated a record number of DDoS attacks in 2024, recording a massive 358% year-over-year jump and a 198% quarter-over-quarter increase. These figures come from Cloudflare's 2025 Q1 DDoS Report, where the company says it mitigated a total of 21.3 million DDoS attacks in 2024. Melbourne Airport aims to ‘predict the future’ with enhanced cyber visibility Date: 2025-04-28 Author: iTnews Melbourne Airport is building up its cyber detection and response capabilities in order to secure 30 million annual passenger journeys, which are enabled by multiple technology systems. Speaking on the iTnews Podcast, head of cyber security Cheuk Wong said he is heavily focused on having visibility across the airport’s technology ecosystem, from its internal IT to baggage handling systems and even its wi-fi networks. ESB-2025.2665 – Tenable Identity Exposure Several of the third-party components (Erlang OTP, OpenSSL) were found to contain vulnerabilities, and updated versions have been made available by the providers. ESB-2025.2623 – Linux kernel Michael Randrianantenaina discovered that the Bluetooth driver in the Linux Kernel contained an improper access control vulnerability ESB-2025.2650 – Mozilla Firefox Modification of specific WebGL shader attributes could trigger an out-of-bounds read, which, when chained with other vulnerabilities, could be used to escalate privileges. ESB-2025.2652 – Node.js Node.js could be made to crash if it received specially crafted network traffic. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for 24th April 2025

Greetings, As we approach the ANZAC Day long weekend, it’s a time to reflect, remember, and honour those who served. Whether you're attending a dawn service, spending time with loved ones, or taking a well-earned break, please remember to prioritise your safety—including your cyber safety. Public holidays often see a spike in online activity, making them a prime time for cyber threat actors to strike. If you're shopping, scrolling, or streaming over the break, stay vigilant online. Be cautious of suspicious links, scams, and unexpected messages. Enable multi-factor authentication wherever possible and keep your devices and software up to date. Only 4 Weeks to go until AUSCERT2025! Don’t miss your chance to grab the exclusive AUSCERT2025 hoodie — available for just $60 until midnight on Sunday, 27 April! Whether you're after a cosy conference keepsake or a stylish nod to the cyber security community, now’s the perfect time to order. Stock is limited, so secure yours before they’re gone! Simply add your hoodie to your event registration, and you can collect it onsite at the event. Also a reminder of our webinar coming up —The New Competitive Edge? Cyber Security in Value Propositions on Tuesday, 6 May from 12:00–1:00pm. Join AUSCERT General Manager Ivano Bongiovanni and a panel of leading experts as they explore how cyber security is emerging as a powerful strategic differentiator. Discover how it’s reshaping trust, purchasing behaviour, and value creation — and what organisations need to do to stay ahead in a trust-driven economy. Register now to secure your spot. Australians Brace For Potential Cyberattacks Targeting Voter Engagement Date: 2025-04-21 Author: Tech Business News As political campaigns ramp up and voter engagement spikes, scammers are expected to seize the opportunity — often disguising malicious messages as official communications or leveraging political content to lure unsuspecting victims. The message from cybersecurity professionals is clear: vigilance is key. Australians are urged to scrutinise unsolicited messages, avoid clicking on suspicious links, and stay informed about the latest scam tactics as the election season heats up. Mark Gorrie, Managing Director APAC for Norton, warns that Australian voters are now prime targets. They’re coming for your data: What are infostealers and how do I stay safe? Date: 2025-04-16 Author: We Live Security In the world of cybercrime, information is a means to an end. And that end, more often than not, is to make money. That’s why information-stealing (infostealer) malware has risen to become a major driver of identity fraud, account takeover and digital currency theft. But there are also plenty of people that live much of their daily lives online and manage to stay safe. The key is to understand how to manage digital risk effectively. Here’s what you need to know to keep your personal and financial information out of harm’s way. Zscaler Identifies New Mustang Panda Cyber Activity Date: 2025-04-22 Author: Australian Cyber Security Magazine Following a recent US-led court-authorised operation that removed malware from over 4,200 infected networks, new activity has emerged from the same Chinese state-sponsored threat group called Mustang Panda (also known as Twill Typhoon). The Zscaler ThreatLabz team has discovered new activity associated with Mustang Panda, originating from two machines from a targeted organisation in Myanmar. This research led to the discovery of new ToneShell variants and several previously undocumented tools. Phishers Exploit Google Sites and DKIM Replay to Send Signed Emails, Steal Credentials Date: 2025-04-22 Author: The Hacker News In what has been described as an "extremely sophisticated phishing attack," threat actors have leveraged an uncommon approach that allowed bogus emails to be sent via Google's infrastructure and redirect message recipients to fraudulent sites that harvest their credentials. "The first thing to note is that this is a valid, signed email – it really was sent from no-reply@google.com," Nick Johnson, the lead developer of the Ethereum Name Service (ENS), said in a series of posts on X. "It passes the DKIM signature check, and Gmail displays it without any warnings – it even puts it in the same conversation as other, legitimate security alerts." Clearer cyber risk benchmarks for Australian SMEs pushed Date: 2025-04-24 Author: Insurance Asia Australia should tighten cybersecurity rules to ease the blowback from attacks especially on small and medium enterprises (SME), many of which are not insured, analysts said. “The financial fallout from a single cyber event can be devastating,” Susie Amos, principal and head of commercial lines at Finity Consulting Pty Ltd., told Insurance Asia. “For an SME, in some cases, even a fraction of this cost could lead to insolvency.” ESB-2025.2558 – GitLab Community and Enterprise Editions: CVSS (Max): 8.7 GitLab has released versions 17.11.1, 17.10.5, and 17.9.7 for CE and EE, addressing several critical security and bug issues. Immediate upgrades are strongly recommended for all self-managed instances. These patches fix high-severity vulnerabilities including XSS in Maven Dependency Proxy, NEL header injection, and a DoS issue via issue preview. ESB-2025.2525 – Erlang/OTP SSH server: CVSS (Max): 10.0 Cisco has issued an advisory regarding a critical unauthenticated remote code execution vulnerability (CVE-2025-32433) in the Erlang/OTP SSH server, affecting multiple Cisco products. This flaw arises from improper handling of SSH messages during the authentication phase. Cisco recommends upgrading to fixed software versions to mitigate potential risks. ESB-2025.2524 – Google Chrome: CVSS (Max): None Google Chrome has released version 135.0.7049.114/.115 for Windows and Mac, and 135.0.7049.114 for Linux. This update includes one key security fix alongside various improvements from internal audits and fuzzing tools. Bug details remain restricted until most users are updated to ensure security. ESB-2025.2482 – Tenable Nessus: CVSS (Max): 9.1* Nessus 10.8.4 addresses vulnerabilities in third-party libraries (libxml2, expat) by upgrading them to secure versions. It also fixes two major flaws: insecure directory permissions on Windows (CVE-2025-24914) and log manipulation via HTTP requests (CVE-2025-36625). Users are urged to upgrade to the latest version, available on the Tenable Downloads Portal. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for 17th April 2025

Greetings, Easter is one of Australia’s most popular times for a getaway—whether it’s a beachside escape, a cosy countryside retreat, or an overseas adventure. But while you’re planning a well-earned break, scammers are planning how to steal your holiday and money. As travel bookings surge over the Easter period, so too do reports of travel-related scams. Cyber criminals know many people are on the hunt for last-minute deals and accommodation—and they’re ready to take advantage. Here are some common travel scams to watch out for this holiday season. Fraudulent Listings & Accounts Scammers often create fake accounts and listings on trusted booking platforms like Airbnb and Booking.com, using stunning photos and prices that seem too good to be true. Some go further by hacking legitimate host accounts, changing payment details, or moving communication off-platform to make easier to steal money and harder to trace them. Phishing Scams Phishing is a common tactic where scammers send malicious emails or text messages that appear to be from legitimate sources. These messages often include fake booking confirmations, flight cancellations, or requests to "verify" your information. Travel prize scams are also on the rise—offering fake giveaways or competitions to lure victims in. Fake Passport Schemes A more targeted scam aimed at Australians involves emails impersonating the Australian Passport Office. The Department of Foreign Affairs and Trade (DFAT) warned last year that these emails may contain malicious links or QR codes designed to steal personal information. DFAT stresses it will never send unsolicited emails or texts asking you to click a link—though it may send one if you request a password reset or other action. Public Wi-Fi Risks Public Wi-Fi in airports, cafes, or hotels might be convenient—but it's often unsecured and can be malicious. Hackers can exploit these networks to steal sensitive data like passwords, credit card numbers, and travel documents. If you need to connect while travelling, use a VPN and avoid accessing personal or financial accounts over public networks. Concerns were raised this week about the future of the Common Vulnerabilities and Exposures (CVE) program due to a lack of certainty of the US government’s funding of the MITRE contract to deliver the service. A last minute reprieve was subsequently announced to extend funding for a further 11 months but doubts remains of the long term future of this critically important program. SonicWall Patches Multiple Vulnerabilities in NetExtender VPN Client For Windows Date: 2025-04-10 Author: Cybersecurity News SonicWall has released security updates addressing three critical vulnerabilities in its NetExtender VPN client for Windows. The flaws, which could potentially allow attackers to escalate privileges and manipulate system files, affect both 32-bit and 64-bit versions of the software prior to version 10.3.2. Fortinet Warns Attackers Retain FortiGate Access Post-Patching via SSL-VPN Symlink Exploit Date: 2025-04-11 Author: The Hacker News [Please see AUSCERT's bulletins issued for the 3 CVEs in question- https://portal.auscert.org.au/bulletins/ESB-2024.0849/, https://portal.auscert.org.au/bulletins/ESB-2023.3340/, https://portal.auscert.org.au/bulletins/ESB-2022.6458.2/] [AUSCERT urges its members to consider the mitigation measures listed by the vendor – https://www.fortinet.com/blog/psirt-blogs/analysis-of-threat-actor-activity] Fortinet has revealed that threat actors have found a way to maintain read-only access to vulnerable FortiGate devices even after the initial access vector used to breach the devices was patched. Palo Alto Networks Warns of Brute-Force Attempts Targeting PAN-OS GlobalProtect Gateways Date: 2025-04-11 Author: The Hacker News Palo Alto Networks has revealed that it's observing brute-force login attempts against PAN-OS GlobalProtect gateways, days after threat hunters warned of a surge in suspicious login scanning activity targeting its appliances. "Our teams are observing evidence of activity consistent with password-related attacks, such as brute-force login attempts, which does not indicate exploitation of a vulnerability," a spokesperson for the company told The Hacker News. "We continue to actively monitor this situation and analyze the reported activity to determine its potential impact and identify if mitigations are necessary." Australian Cyber Network releases inaugural State of the Industry 2024 report Date: 2025-04-16 Author: Cyber Daily The Australian Cyber Network (ACN) has released a first-of-its-kind, benchmark report into the state of the nation’s cyber security industry, and while some of the figures paint a picture of a growing and vital sector of the economy, others reveal a far darker truth – Australia needs to do a lot more to keep pace with rising threats. The inaugural State of the Industry 2024 report reveals an industry that contributes $9.99 billion to Australia’s gross value added (GVA) and attracted $348 million in investment in 2024 alone. It’s also home to more than 137,000 cyber security workers and professionals. MITRE's CVE program given last-minute reprieve Date: 2025-04-17 Author: iTNews A last-minute change of plan has lead to US officials extending support for MITRE's Common Vulnerabilities and Exposures (CVE) database for an additional 11months. The database acts as a catalogue for cyber weaknesses and allows IT administrators to quickly flag and triage the different bugs and hacks discovered daily. ESB-2025.2434 – Apple iOS 18.4.1 and iPadOS 18.4.1: CVSS (Max): 7.5 Apple released urgent updates to address two security vulnerabilities (CVE-2025-31200 and CVE-2025-31201) that had been exploited in sophisticated attacks against specific iOS targets. The flaws included a code execution issue related to CoreAudio and a mitigation bypass in the RPAC feature. Although the vulnerabilities affect iOS, iPadOS, and macOS, Apple reported limited exploitation on iPhones and did not disclose further details on the attacks. ESB-2025.2399 – Mozilla Firefox: CVSS (Max): None Mozilla has released Firefox 137.0.2 to address a high-severity security vulnerability (CVE-2025-3608) in the nsHttpTransaction component that could lead to memory corruption and potential code execution by attackers. Discovered by the Mozilla Fuzzing Team, the flaw involves a race condition that may cause browser instability under specific network conditions. Users are urged to update to the latest version to mitigate risks associated with this vulnerability. ESB-2025.2389 – Google Chrome: CVSS (Max): None Google confirmed two serious Chrome vulnerabilities: CVE-2025-3619, a heap buffer overflow in Codecs, and CVE-2025-3620, a critical use-after-free issue in USB functionality. CVE-2025-3620 poses the greatest risk, as it could allow attackers to execute arbitrary code. Users are urged to update their Chrome browsers to the latest version for protection. ASB-2025.0067 – Oracle Commerce: CVSS (Max): 9.8 Multiple high-risk vulnerabilities have been reported for Oracle Commerce, with a CVSS of 9.8, indicating significant potential for exploitation. These vulnerabilities could be exploited remotely by attackers to compromise the system's confidentiality, integrity, and availability. Affected systems include various versions of Oracle Commerce running on Linux, UNIX, and Windows operating systems. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for 11th April 2025

Greetings Register now for our upcoming webinar examining the evolving role of cyber security in shaping organisational value propositions, led by AUSCERT general manager Ivano Bongiovanni. Taking place on Tuesday, 6 May, from 12:00pm to 1:00pm AEST, this dynamic panel discussion will feature leading industry experts sharing insights, challenges, and strategies connecting cyber security and business value. Panellists include Charles McDermid (BOQ), Rob Nobilo (Google), Lukasz Gogolkiewicz (Accent Group Ltd), and Dr Jodie Siganto (Privacy108). Don’t miss this opportunity to gain valuable perspectives from some of the most influential voices in the field—register today to secure your spot. The session will explore the evolution of Cyber Security-as-a-Service (CSaaS), with a spotlight on the rising influence of end-customers as a third market force. While still much smaller than the traditional B2B space, consumer demand is accelerating as individuals become more informed about cyber risks and increasingly value cyber security in their purchasing choices. This shift is evident in the widespread adoption of tools such as multi-factor authentication (MFA) and VPNs, as well as in marketing strategies that now frame cyber security as a core value-add. For providers such as MSSPs, this trend presents both opportunities and responsibilities—the need to remain ethical, innovative, and trusted is more important than ever. On the other side, demand-side organisations must navigate vendor complexity and ensure their cyber security investments align with overarching business objectives. Looking ahead, emerging B2B2C models—offering cyber security support not only to employees but also to their families—are opening new market opportunities while encouraging safer digital behaviours across work and home environments. As servitisation, trust, and adaptability continue to shape the future of CSaaS, this timely and thought-provoking discussion is one you won’t want to miss. Register now! Australian pension funds hit by wave of credential stuffing attacks Date: 2025-04-04 Author: Bleeping Computer Over the weekend, a massive wave of credential stuffing attacks hit multiple large Australian super funds, compromising thousands of members’ accounts. The Association of Superannuation Funds of Australia (ASFA), Australia's advocacy body for the superannuation industry, said today that "a number of members were affected" even though the "majority of the attempts were repelled." Reuters has learned from a source familiar with the matter that over 20,000 accounts were breached in this massive wave of attacks targeting Australia's superannuation industry, with some members reportedly losing some of their savings. China-backed espionage group hits Ivanti customers again Date: 2025-04-03 Author: CyberScoop [AUSCERT has identified the impacted members (where possible) and contacted them via email] UNC5221 has a knack for exploiting defects in Ivanti products. The group has exploited at least four vulnerabilities in the vendor’s products since 2023, according to Mandiant. Ivanti customers are confronting another string of attacks linked to an actively exploited vulnerability in the company’s VPN products. Mandiant said a nation-state backed espionage group linked to China has been exploiting the critical vulnerability, CVE-2025-22457, since mid-March. CISA Warns of CrushFTP Vulnerability Exploitation in the Wild Date: 2025-04-08 Author: Infosecurity Magazine [AUSCERT contacted the potentially vulnerable members via email on 26 March 2025] The US top cybersecurity agency has confirmed that the critical vulnerability in file transfer solution provider CrushFTP’s product is being exploited in the wild. The authentication bypass vulnerability, CVE-2025-31161, was added to the Cybersecurity and Infrastructure Security Agency’s (CISA) Known Exploited Vulnerabilities (KEV) catalog on April 7. SAP April 2025 Update Fixes Critical Code Injection Vulnerabilities Date: 2025-04-09 Author: gbhackers SAP Security Patch Day has introduced a critical update to address vulnerabilities in SAP products, including high-severity code injection weaknesses. A total of 18 new Security Notes, along with 2 updates to existing notes, were released to tackle serious risks such as unauthorized access, code injection, and directory traversal. SAP recommends customers promptly apply these patches to safeguard their systems and ensure the robustness of their SAP landscapes. Oracle says "obsolete servers" hacked, denies cloud breach Date: 2025-04-09 Author: Bleeping Computer Oracle finally confirmed in email notifications sent to customers that a hacker stole and leaked credentials that were stolen from what it described as "two obsolete servers." However, the company added that its Oracle Cloud servers were not compromised, and this incident did not impact customer data and cloud services. "Oracle would like to state unequivocally that the Oracle Cloud—also known as Oracle Cloud Infrastructure or OCI—has NOT experienced a security breach," Oracle says in a customer notification shared with BleepingComputer. ESB-2025.2224.2 – FortiSwitch: CVSS (Max): 9.3 A recently revealed critical vulnerability in Fortinet’s FortiSwitch product line is sparking serious security concerns. Identified as CVE-2024-48887, the flaw allows remote, unauthenticated attackers to reset administrator passwords without needing prior access—posing a significant risk to organizations that depend on FortiSwitch for their network infrastructure. ESB-2025.2214 – Google Chrome: CVSS (Max): 8.8 Google has released an important security update for its Chrome browser, addressing a serious vulnerability that could potentially allow attackers to execute code remotely. The issue, tracked as CVE-2025-3066, affects Chrome's Site Isolation feature, highlighting the critical role regular browser updates play in defending against cyber threats. The update, rolled out on April 8, 2025, updates the Chrome Stable Channel to version 135.0.7049.84/.85 for Windows and Mac, and 135.0.7049.84 for Linux. ASB-2025.0059 – Microsoft Windows: CVSS (Max): 8.8 Microsoft has released security fixes to address a massive set of 125 flaws affecting its software products, including an active exploitation of a zero-day vulnerability in the Windows Common Log File System (CLFS) driver, tracked as CVE-2025-29824. ESB-2025.2191 – Android: CVSS (Max): 8.8* The April 2025 Android Security Bulletin details multiple vulnerabilities affecting Android devices, all addressed by the 2025-04-05 security patch level. The most severe is a critical System vulnerability that allows remote privilege escalation without user interaction or extra permissions, especially dangerous if mitigations are bypassed or disabled. ESB-2025.2242 – Juniper Junos OS: CVSS (Max): 10.0 Juniper Networks' April 2025 Security Bulletin addresses multiple vulnerabilities in Junos Space, Junos OS, and related products including CVE-2024-36971. The Junos Space 24.1R3 release resolves several critical and high-severity vulnerabilities, including remote code execution and denial-of-service issues. Users are advised to upgrade to Junos Space 24.1R3 and Junos OS versions 21.4R3-S10 or later to mitigate these risks. ESB-2025.2317 – Adobe ColdFusion: CVSS (Max): 9.1 Adobe's April 2025 Patch Tuesday release addresses 54 security vulnerabilities, including critical flaws in products like ColdFusion, FrameMaker, Photoshop, and Adobe Commerce. The most urgent fix is for ColdFusion, with 15 vulnerabilities that could allow arbitrary code execution, file system access, and security feature bypasses. Eleven of these vulnerabilities are ranked as critical, with CVSS scores between 7.5 and 9.1. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for 4th April 2025

Greetings, We’re excited to introduce two new courses to our training offerings this year, designed to help organisations tackle key cyber security challenges. Due to high demand, we’ve added the Understanding and Implementing the ASD Essential Eight course to help security managers and technical specialists navigate the Essential Eight—a set of critical cyber security strategies published by the Australian Government. By completing this course, participants will gain a solid understanding of the ASD Essential Eight (E8), valuable insights into implementation options, and a clear grasp of the E8 maturity model. The course also covers how to prepare for an E8 assessment by an ASD-certified assessor. The next session for this course is coming up on July 29 &30—register now before it books out! Another course we’ve recently introduced is Managing Third-Party Cyber Security Risk, designed for professionals across various industries. This course focuses on securing organisations against risks posed by third-party suppliers and partners. Participants will gain a comprehensive understanding of third-party cyber risks, their impact on business operations and data security, and how to effectively identify and assess supplier risks. The course also covers mitigation strategies, industry best practices, and continuous monitoring techniques to strengthen an organisation’s cyber security posture. The next session is on August 5 & 6—register now! Looking for a streamlined approach to staff training? Our in-house training and volume booking options provide flexible, tailored solutions to meet your organisation’s needs. Contact us today to discuss how we can align our training with your organisation’s objectives for maximum impact! Hackers abuse WordPress MU-Plugins to hide malicious code Date: 2025-03-31 Author: Bleeping Computer [AUSCERT has identified the impacted members (where possible) and contacted them via email] Hackers are utilizing the WordPress mu-plugins ("Must-Use Plugins") directory to stealthily run malicious code on every page while evading detection. The technique was first observed by security researchers at Sucuri in February 2025, but adoption rates are on the rise, with threat actors now utilizing the folder to run three distinct types of malicious code. "The fact that we've seen so many infections inside mu-plugins suggests that attackers are actively targeting this directory as a persistent foothold," explains Sucuri's security analyst Puja Srivastava. CISA Analyzes Malware Used in Ivanti Zero-Day Attacks Date: 2025-03-31 Author: Security Week The US cybersecurity agency CISA on Friday published its analysis of the malware used by Chinese hackers in attacks exploiting an Ivanti Connect Secure zero-day patched in January 2025. The issue, tracked as CVE-2025-0282 (CVSS score of 9.0), is described as a stack-based buffer overflow enabling attackers to execute arbitrary code remotely, without authentication. 24,000 unique IP addresses target PAN-OS GlobalProtect gateways Date: 2025-04-01 Author: SC Media A significant surge in scanning activity targeting Palo Alto Networks PAN-OS GlobalProtect gateway portals was observed in which over the last 30 days, nearly 24,000 unique IP addresses have attempted to access the PAN-OS devices. The increased activity suggests a coordinated effort to probe network defenses and identify vulnerable systems, potentially as a precursor to targeted exploitation. GitHub expands security tools after 39 million secrets leaked in 2024 Date: 2025-04-02 Author: Bleeping Computer GitHub announced updates to its Advanced Security platform after it detected over 39 million leaked secrets in repositories during 2024, including API keys and credentials, exposing users and organizations to serious security risks. In a new report by GitHub, the development company says the 39 million secrets were found through its secret scanning service, a security feature that detects API keys, passwords, tokens, and other secrets in repositories. "Secret leaks remain one of the most common—and preventable—causes of security incidents," reads GitHub's announcement. U.S. CISA adds Apache Tomcat flaw to its Known Exploited Vulnerabilities catalog Date: 2025-04-02 Author: Security Affairs [See AUSCERT Bulletin https://portal.auscert.org.au/bulletins/ESB-2025.1669.2] The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added an Apache Tomcat path equivalence vulnerability, tracked as CVE-2025-24813, to its Known Exploited Vulnerabilities (KEV) catalog. The Apache Tomcat vulnerability CVE-2025-24813 was recently disclosed and is being actively exploited just 30 hours after a public PoC was released. The issue is a path equivalence flaw in Apache Tomcat that allows remote code execution or information disclosure if specific conditions are met. ESB-2025.2011 – Apple iOS 15.8.4 and iPadOS 15.8.4: CVSS (Max): 8.8 Apple addressed two zero-day vulnerabilities: CVE-2025-24201 in WebKit, which allows attackers to escape the Web Content sandbox, and CVE-2025-24200, which lets attackers with physical access disable USB Restricted Mode on a locked device. Both were exploited in a sophisticated attack on specific targets. Security updates were released for iOS and iPadOS to fix these issues. ESB-2025.2035 – Google Chrome: CVSS (Max): None Chrome 135 has been released with 14 security fixes, including nine from external researchers. The most severe is a high-risk use-after-free flaw (CVE-2025-3066) in Navigations. The update also addresses medium- and low-severity issues in areas like Custom Tabs, Extensions, and Autofill. ESB-2025.2095 – Jenkins (core) and Jenkins Plugins: CVSS (Max): 8.8 Jenkins released a high-priority security advisory addressing multiple vulnerabilities in its core platform and plugins. The most critical issue, CVE-2025-31722, allows arbitrary code execution via the Templating Engine Plugin, with a CVSSv3 score of 8.8. ESB-2025.2048 – VMware Products: CVSS (Max): 7.8 VMware has released a critical security advisory (VMSA-2025-0006) for a high-severity privilege escalation vulnerability (CVE-2025-22231) in its Aria Operations platform, affecting multiple products. The flaw, rated 7.8 on the CVSSv3 scale, allows attackers with local admin access to gain root control over the system. Patches are now available for affected VMware platforms. ESB-2025.2045 – Firefox ESR: CVSS (Max): 8.1 Mozilla released Firefox 137 fixing critical vulnerabilities. The update addresses a high-impact use-after-free bug (CVE-2025-3028) and memory safety issues (CVE-2025-3030), which could lead to arbitrary code execution. Users are urged to update immediately to protect against these severe risks. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for 28th March 2025

Greetings, This week has been an exciting one with the release of AUSCERT’s 2024 Year in Review! This report provides our members with a valuable snapshot of our efforts behind the scenes, offering insights into the services available and the opportunities they can take advantage of. It also offers valuable insights into industry trends and the ongoing progress across key areas. These milestones highlight our unwavering commitment to equipping members with the tools, knowledge, and support needed to navigate the ever-evolving cyber security landscape with confidence. Read the full report here Oracle has rejected claims that its cloud systems were compromised after a cyber criminal advertised the alleged theft of sensitive data from Oracle Cloud. The attacker claimed to have exploited a vulnerability in Oracle’s Single Sign-On (SSO) login servers, but Oracle denied this, stating no breach occurred and that the leaked credentials were unrelated to Oracle Cloud. The situation intensified when the threat actor released a 10,000-line sample of the purportedly stolen data, apparently to substantiate their claim of exfiltrating 6 million records from Oracle Cloud. Bleeping Computer contacted some of the alleged victim organisations, some of whom reportedly validated the stolen information was theirs. AUSCERT has issued a Critical Member Security Information Notification to potentially impacted members. We are actively monitoring the situation and will continue to update members as it unfolds. Despite these developments, Oracle maintains there has been no breach and is proceeding with its investigation. Critical ‘IngressNightmare’ Vulns Imperil Kubernetes Environments Date: 2025-03-25 Author: Dark Reading The maintainers of Kubernetes have released patches for four critical vulnerabilities in the Ingress NGINX Controller, affecting 6,500, or 41%, of all Internet-facing container orchestration clusters, including those used by several Fortune 500 companies. The vulnerabilities allow a remote, unauthenticated attacker to execute arbitrary commands in affected environments and completely take over Kubernetes clusters, according to researchers at Wiz who discovered the flaws. Researchers raise alarm about critical Next.js vulnerability Date: 2025-03-24 Author: CyberScoop [AUSCERT has identified the impacted members (where possible) and contacted them via email] The software defect in the widely used open-source JavaScript framework allows attackers to bypass middleware-based authorization. Researchers warn that attackers could exploit a recently discovered critical vulnerability in the open-source JavaScript framework Next.js to bypass authorization in middleware and gain access to targeted systems. Vercel, the San Francisco-based company that created and maintains Next.js, released a patch for CVE-2025-29927 in Next.js 15.2.3 on March 18 and published a security advisory on March 21. Google Patches Chrome Sandbox Escape Zero-Day Caught by Kaspersky Date: 2025-03-25 Author: Security Week [Please also see AUSCERT bulletin: https://portal.auscert.org.au/bulletins/ESB-2025.1867/] Google late Tuesday rushed out a patch a sandbox escape in its flagship Chrome browser after researchers at Kaspersky caught a professional hacking operation launching drive-by download exploits. The vulnerability, tracked as CVE-2025-2783, was chained with a second exploit for remote code execution in what appears to be a nation-state sponsored cyberespionage campaign targeting organizations in Russia. CrushFTP warns users to patch unauthenticated access flaw immediately Date: 2025-03-25 Author: Bleeping Computer [AUSCERT has identified the impacted members (where possible) and contacted them via email] CrushFTP warned customers of an unauthenticated HTTP(S) port access vulnerability and urged them to patch their servers immediately. As the company also explained in an email sent to customers on Friday (seen by BleepingComputer), the security flaw enables attackers to gain unauthenticated access to unpatched servers if they are exposed on the Internet over HTTP(S). “Please take immediate action to patch ASAP. A vulnerability has been addressed today (March 21st, 2025). All CrushFTP v11 versions were affected. (No earlier versions are affected.) A CVE will be generated soon,” the company warned. VMware Patches Authentication Bypass Flaw in Windows Tools Suite Date: 2025-03-25 Author: Security Week [Please also see AUSCERT bulletin: https://portal.auscert.org.au/bulletins/ESB-2025.1852/] Virtualization technology giant VMware on Tuesday released an urgent fix for an authentication bypass security defect affecting its VMware Tools for Windows utilities suite. The vulnerability, tagged as CVE-2025-22230, opens the door for a malicious actor with non-administrative privileges on a Windows guest virtual machine to perform certain high-privilege operations within that VM. Oracle customers confirm data stolen in alleged cloud breach is valid Date: 2025-03-26 Author: Bleeping Computer Despite Oracle denying a breach of its Oracle Cloud federated SSO login servers and the theft of account data for 6 million people, BleepingComputer has confirmed with multiple companies that associated data samples shared by the threat actor are valid. Last week, a person named ‘rose87168’ claimed to have breached Oracle Cloud servers and began selling the alleged authentication data and encrypted passwords of 6 million users ASB-2025.0050 – AUSCERT Bulletin Service – Oracle Cloud breach AUSCERT released an advisory regarding an alleged Oracle Cloud breach, where a threat actor claims to have stolen 6 million sensitive records. Oracle has denied the breach despite data samples appearing legitimate. The impact remains unclear, and mitigation measures should be evaluated based on the organisation’s policies. ESB-2025.1921 – GitLab Community and Enterprise Editions: CVSS (Max): 8.7 GitLab issued a security advisory urging users to upgrade to versions 17.10.1, 17.9.3, or 17.8.6 to address multiple vulnerabilities, including two high-severity XSS flaws (CVSS 8.7): CVE-2025-2255, which allows XSS via merge-request error messages, and CVE-2025-0811, caused by improper rendering of certain file types, both affecting versions prior to 17.8.6, 17.9.3, and 17.10.1. ESB-2025.1867 – Google Chrome: CVSS (Max): None Google fixed a high-severity Chrome zero-day vulnerability (CVE-2025-2783) exploited to escape the browser’s sandbox and deploy malware in espionage attacks targeting Russian media and education organisations. The flaw was related to an incorrect handle in Mojo on Windows. The fix is rolling out globally for Windows users in Chrome version 134.0.6998.178, with automatic updates available. ESB-2025.1852 – VMware Tools: CVSS (Max): 7.8 Broadcom issued security patches for a high-severity authentication bypass vulnerability in VMware Tools for Windows, tracked as CVE-2025-22230, rated 7.8 CVSS. The flaw allows attackers with non-admin privileges to perform high-privilege operations within a Windows guest VM. The vulnerability affects VMware Tools versions 11.x.x and 12.x.x and is fixed in version 12.5.1. ESB-2025.1840 – F5 Products: CVSS (Max): 9.8 Multiple vulnerabilities were discovered in the Ingress NGINX Controller for Kubernetes, exposing over 6,500 clusters to remote code execution. These vulnerabilities, including CVE-2025-1974 (CVSS 9.8), allow unauthenticated attackers to execute arbitrary code and access all secrets in the Kubernetes cluster. F5 Networks has released an advisory and is actively investigating the issue to assess how these flaws may impact their products. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for 21st March 2025

Greetings, The Australian Signals Directorate (ASD) has reported a rise in denial-of-service (DoS) attacks targeting critical online services such as banking, healthcare, and e-commerce. This increase is partly driven by insecure “Internet of Things” (IoT) devices, which cybercriminals exploit to overload websites with unsolicited and excessive packet traffic, resulting in subsequent outages. While organisations cannot fully prevent DoS attacks, they can mitigate the impact by following ASD’s Preparing for and Responding to Denial-of-Service Attacks guidance. Individuals can also play a role by securing their internet-connected devices using ASD resources like Internet of Things Devices and Secure Your Wi-Fi and Router. We are honoured to welcome Lieutenant General Michelle McGuinness as a keynote speaker for AUSCERT2025. Appointed as Australia’s National Cyber Security Coordinator in February 2024, LTGEN McGuinness leads national cyber policy, major incident response, and government-wide cyber preparedness. With 30 years of service in the Australian Defence Force, she has held key tactical, operational, and strategic roles, including Deputy Director Commonwealth Integration at the U.S. Defence Intelligence Agency. We look forward to her insights on Australia’s evolving cyber security landscape. Check out the full AUSCERT2025 program now! Ransomware hits record high, Australia among top targets Date: 2025-03-17 Author: Insurance Business Australia Australia was among the 10 most targeted nations in a record-setting month for ransomware attacks, according to a cybersecurity report from Bitdefender. The company’s March 2025 Threat Debrief found that ransomware incidents increased by 126% year-over-year, making last month the highest on record for reported attacks. New Windows zero-day exploited by 11 state hacking groups since 2017 Date: 2025-03-18 Author: Bleeping Computer At least 11 state-backed hacking groups have been exploiting a new Windows vulnerability in data theft and cyber espionage 0-day attacks since 2017. However, as security researchers Peter Girnus and Aliakbar Zahravi with Trend Micro's ZDI reported today, Microsoft tagged it as "not meeting the bar servicing" in late September and said it wouldn't release security updates to address it. "We discovered nearly a thousand Shell Link (.lnk) samples that exploit ZDI-CAN-25373; probably the total number of exploitation attempts are much higher," they said. "Subsequently, we submitted a POC exploit to Microsoft, who declined to address this vulnerability with a security patch." Should we ban DeepSeek AI from all Australian devices? Experts weigh in Date: 2025-03-15 Author: ABC News Cyber security experts say the federal government should consider banning a controversial AI chatbot with Chinese origins on all Australian devices, warning it poses a "unique risk" to national security. DeepSeek AI was banned from all government devices last month, after a directive from Australian National Security and intelligence agencies found the chatbot put the federal "technology estate" at risk. The tech was produced in Hangzhou city in China and runs at a fraction of the price of other AI products. Ramadan Scams on the Rise: Fake Giveaways, Crypto Traps & Fraudulent Donations Date: 2025-03-13 Author: CloudSEK Ramadan is a time of reflection, generosity, and heightened charitable giving. However, cybercriminals are exploiting this sacred period to launch targeted crypto scams, preying on the goodwill of individuals and organizations. From fraudulent donation requests to spreading crypto token investment schemes, these scams leverage social engineering and trust to deceive victims into transferring their digital assets. This report examines the rising trend of Ramadan-related crypto, e-commerce and donation scams, uncovering the techniques used by cybercriminals, their impact on victims, and best practices for staying secure and making awareness and vigilance more crucial than ever. Microsoft 365 Targeted in New Phishing, Account Takeover Attacks Date: 2025-03-17 Author: Security Week Security researchers warn of fresh malicious campaigns that abuse Microsoft 365 for phishing attacks, or target the service’s users to take over accounts. As part of one campaign, attackers are leveraging legitimate Microsoft domains and tenant misconfigurations in BEC attacks likely aimed at stealing credentials and performing account takeover (ATO), Guardz warns. The attackers were seen controlling multiple Microsoft 365 organization tenants (either new or compromised), creating administrative accounts, creating misleading full-text messages mimicking Microsoft transaction notifications, initiating a purchase or trial subscription event to generate a billing email, and then sending phishing emails using Microsoft’s infrastructure. ESB-2025.1767 – Google Chrome: CVSS (Max): None CVE-2025-2476 is a critical use-after-free vulnerability in the Lens component of Chrome. It allows remote attackers to exploit heap corruption through specially crafted HTML, potentially leading to arbitrary code execution. The issue arises when memory is referenced or reused after being freed, and if malicious data is injected before chunk consolidation, it could be exploited to execute arbitrary code. ESB-2025.1731 – Atlassian Products: CVSS (Max): 9.8 The March 2025 Atlassian Security Bulletin reports 13 high-severity vulnerabilities across several products, including Bamboo, Bitbucket, Crowd, Jira, and Jira Service Management. These issues, discovered via bug bounty programs and security scans, involve various vulnerabilities such as denial of service and SQL injection, with fixes available in the latest versions. Users are urged to update to the recommended fixed versions for each affected product. ESB-2025.1719 – Rockwell Automation Lifecycle Services with VMware: CVSS (Max): 9.8 Rockwell Automation products using VMware are vulnerable to critical flaws, including TOCTOU race conditions and out-of-bounds reads. Exploiting these vulnerabilities could allow local attackers to execute code or leak memory. Users are advised to update to fixed versions or implement security best practices to mitigate risks. ESB-2025.1753 – Drupal Core: CVSS (Max): None Drupal core has a moderately critical Cross Site Scripting (XSS) vulnerability in Link field attributes, affecting versions between 8.0.0 and 11.1.4. Exploitation requires edit access via core web services or a custom module, and sites with the Link module disabled are not affected. Users are advised to update to the latest versions (10.3.14, 10.4.5, 11.0.13, or 11.1.5). Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for 14th March 2025

Greetings, After last week’s whirlwind, it’s a relief to feel a sense of normality returning. However, for many still dealing with the aftermath of Cyclone Alfred, the road to recovery is far from over. Let’s stay mindful, support one another, and remain vigilant—especially as scammers continue to exploit those affected. With AI-generated scams on the rise, this week, we’re focusing on how to recognise them, spot key warning signs, and protect ourselves. Language can be a clear indicator of AI-generated content. Be on the lookout for overly formal phrasing, a lack of personal warmth, or awkward sentence structures. Similarly, when evaluating AI-generated visuals and audio, watch for unnatural movements, features that appear flawless yet artificial, and lighting inconsistencies. Backgrounds that look fabricated or hand gestures that seem stiff and unrealistic are additional warning signs. Voice cloning and scam calls are another growing threat. Watch out for any unusual pacing, voices that sound inhumanly fast or slow, or a lack of natural pauses. Speech that comes across as either too flat or overly dramatic, along with tonal or pronunciation inconsistencies, can also be red flags. To protect yourself from AI-driven scams, always stay cautious and verify unsolicited emails, calls, and messages. If an offer seems too good to be true or a request feels urgent, confirm it independently by reaching out to the person directly via a verified phone number or email. Never click on unknown links or respond without proper validation. Staying informed about the latest AI-driven scams is one of your strongest defences, as awareness helps you spot red flags before falling victim. Enabling Multi-Factor Authentication (MFA) adds an essential layer of security, making it significantly harder for scammers to access your accounts—even if they attempt to deceive you with AI-generated phishing tactics. Whenever possible, opt for phishing-resistant MFA for maximum protection. While generative AI has allowed cybercriminals to craft more convincing scams, their capabilities are often exaggerated. By staying informed, cautious, and proactive, you can recognise warning signs and stay ahead of evolving threats. Critical PHP Vulnerability Under Mass Exploitation Date: 2025-03-10 Author: Security Week Threat actors have started exploiting en masse a critical vulnerability in PHP that could allow remote code execution on vulnerable servers, threat intelligence firm GreyNoise warns. The flaw, tracked as CVE-2024-4577 (CVSS score of 9.8), can be exploited on Windows servers that are using Apache and PHP-CGI, if they are set to use certain code pages, to inject arguments remotely and execute arbitrary code. Microsoft patches 57 vulnerabilities, including 6 zero-days | CyberScoop Date: 2025-03-11 Author: Cyber Scoop [See AUSCERT Bulletins: https://portal.auscert.org.au/bulletins/ASB-2025.0049/, https://portal.auscert.org.au/bulletins/ASB-2025.0048/, https://portal.auscert.org.au/bulletins/ASB-2025.0047/, https://portal.auscert.org.au/bulletins/ASB-2025.0046/, https://portal.auscert.org.au/bulletins/ASB-2025.0045/] Microsoft patched 57 vulnerabilities affecting its foundational systems and core products, including six actively exploited zero-day vulnerabilities, the company said in its latest security update Tuesday. Four of the six zero-days, which were all added to the Cybersecurity and Infrastructure Security Agency’s known exploited vulnerabilities catalog, are high-severity on the CVSS scale. Apple fixed the third actively exploited zero-day of 2025 Date: 2025-03-11 Author: Security Affairs [See AUSCERT Bulletins: https://portal.auscert.org.au/bulletins/ESB-2025.1571/, https://portal.auscert.org.au/bulletins/ESB-2025.1570/, https://portal.auscert.org.au/bulletins/ESB-2025.1569/] Apple has released emergency security updates to address a zero-day vulnerability, tracked as CVE-2025-24201, in the WebKit cross-platform web browser engine. The vulnerability is an out-of-bounds write issue that was exploited in “extremely sophisticated” attacks. Mozilla warns users to update Firefox before certificate expires Date: 2025-03-12 Author: Bleeping Computer Mozilla is warning Firefox users to update their browsers to the latest version to avoid facing disruption and security risks caused by the upcoming expiration of one of the company's root certificates. The Mozilla certificate is set to expire this Friday, March 14, 2025, and was used to sign content, including add-ons for various Mozilla projects and Firefox itself. Users need to update their browsers to Firefox 128 (released in July 2024) or later and ESR 115.13 or later for 'Extended Support Release' (ESR) users. The Role of Differential Privacy in Protecting Sensitive Information in the Era of Artificial Intelligence Date: 2025-03-07 Author: Security Affairs Differential privacy (DP) protects data by adding noise to queries, preventing re-identification while maintaining utility, addressing Artificial Intelligence -era privacy challenges. In the era of Artificial Intelligence, confidentiality and security are becoming significant challenges. Traditional anonymization techniques, such as pseudonymization and k-anonymity, have proven inadequate against sophisticated re-identification attacks. Over 400 IPs Exploiting Multiple SSRF Vulnerabilities in Coordinated Cyber Attack Date: 2025-03-12 Author: The Hacker News Threat intelligence firm GreyNoise is warning of a "coordinated surge" in the exploitation of Server-Side Request Forgery (SSRF) vulnerabilities spanning multiple platforms. "At least 400 IPs have been seen actively exploiting multiple SSRF CVEs simultaneously, with notable overlap between attack attempts," the company said, adding it observed the activity on March 9, 2025. The countries which have emerged as the target of SSRF exploitation attempts include the United States, Germany, Singapore, India, Lithuania, and Japan. Another notable country is Israel, which has witnessed a surge on March 11, 2025. ESB-2025.1570 – Apple iOS & iPadOS: CVSS (Max): None Apple released a security update on Tuesday to address a zero-day flaw, CVE-2025-24201, in the WebKit browser engine. The vulnerability, an out-of-bounds write issue, could allow malicious web content to escape the Web Content sandbox. The update improves checks to prevent unauthorized actions. ASB-2025.0049 – Microsoft Windows: CVSS (Max): 8.8* Microsoft latest patch release fixes multiple flaws in Windows products. Several vulnerabilities are under active exploitation, including CVE-2025-26633, a security bypass in Microsoft Management Console allowing code execution through MSC files. CVE-2025-24993 and CVE-2025-24985, remote code execution flaws in NTFS and Fast FAT, are triggered by mounting a crafted VHD. Additionally, CVE-2025-24983 enables privilege escalation, while CVE-2025-24984 and CVE-2025-24991 expose sensitive information, requiring urgent patching. ESB-2025.1552 – VMware Products: CVSS (Max): 9.3 Broadcom released an advisory for three zero-day vulnerabilities in VMware products, including CVE-2025-22224 (heap overflow), CVE-2025-22225 (arbitrary write), and CVE-2025-22226 (information disclosure). These vulnerabilities, impacting ESXi, Workstation, and Fusion, were discovered by Microsoft's MSTIC and are being actively exploited. ESB-2025.1533 – Google Chrome: CVSS (Max): None Google has released a critical update for Chrome, advancing the stable channel to version 134.0.6998.88 for Windows, Mac, and Linux, and 134.0.6998.89 for the Extended Stable channel. The update includes high-priority security fixes to protect users from potential threats. ESB-2025.1628 – Adobe Acrobat Reader: CVSS (Max): 7.8 As part of its regular Patch Tuesday update, Adobe issued a bulletin highlighting a number of security vulnerabilities in Adobe Acrobat and Reader for both Windows and macOS. The company warned that successful exploitation could lead to arbitrary code execution and memory leaks. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Week in review

AUSCERT Week in Review for 7th March 2025

Greetings, It’s been a stormy week with Cyclone Alfred brewing off the coast of Brisbane! A timely reminder that scammers love to stir up trouble, preying on those seeking disaster relief, insurance claims, or opportunities to assist others. Stay alert, verify sources, and batten down the hatches against fraud. Read our blog for tips on spotting and avoiding scams before they make landfall! In the latest episode of the ‘Share Today, Save Tomorrow’ podcast, Episode 40: Securing from Insider Threats, host Anthony sits down with Sal Bowman from UQSchoolsNet to discuss one of the most pressing cyber security challenges faced by schools today—insider threats. In the second half of the episode, Bek chats with Mark Carey-Smith from AUSCERT about the exciting yet challenging process of selecting 30 standout conference sessions from nearly 200 submissions. They also dive into the challenges of gaining better representation of women in cyber. Progress is happening, but there’s still a pressing need for greater diversity to drive innovation and inclusivity in the field. With International Women’s Day just around the corner, we’re taking this opportunity to spotlight and celebrate the incredible women shaping the future of cyber security. AUSCERT has always been a strong advocate for diversity and inclusion, and we remain committed to fostering a more equitable cyber security landscape. Let’s keep breaking down barriers and driving meaningful change together. Ransomware criminals love CISA's KEV list – and that's a bug, not a feature Date: 2025-02-28 Author: The Register Fresh research suggests attackers are actively monitoring databases of vulnerabilities that are known to be useful in carrying out ransomware attacks. GreyNoise's annual Mass Internet Exploitation Report revealed this week that 28 percent of the bugs logged in CISA's Known Exploited Vulnerability (KEV) catalog were also used by ransomware criminals in 2024. It's a logical assumption to make that attackers would see the KEV list as a useful tool to help them plan their attacks. Android security update contains 2 actively exploited vulnerabilities Date: 2025-03-03 Author: Cyberscoop [See AUSCERT Bulletin https://portal.auscert.org.au/bulletins/ESB-2025.1463] Google addressed 43 vulnerabilities affecting Android devices in its March security update, including a pair of software defects reportedly under active exploitation. Google said the two vulnerabilities — CVE-2024-43093 and CVE-2024-50302 — “may be under limited, targeted exploitation.” The most severe of the flaws under active exploitation, CVE-2024-43093, carries a CVSS score of 7.8 and was added to the Cybersecurity and Infrastructure Security Agency’s known exploited vulnerabilities catalog in November. CISA tags Windows, Cisco vulnerabilities as actively exploited Date: 2025-03-03 Author: Bleeping Computer [See AUSCERT Bulletins https://portal.auscert.org.au/bulletins/ESB-2023.0171.3 and https://portal.auscert.org.au/bulletins/ASB-2018.0303.2] CISA has warned US federal agencies to secure their systems against attacks exploiting vulnerabilities in Cisco and Windows systems. While the cybersecurity agency has tagged these flaws as actively exploited in the wild, it has yet to provide specific details regarding this malicious activity and who is behind it. VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches Date: 2025-03-04 Author: The Hacker News Broadcom has released security updates to address three actively exploited security flaws in VMware ESXi, Workstation, and Fusion products that could lead to code execution and information disclosure. The list of vulnerabilities is as follows – CVE-2025-22224 (CVSS score: 9.3) – A Time-of-Check Time-of-Use vulnerability CVE-2025-22225 (CVSS score: 8.2) – An arbitrary write vulnerability CVE-2025-22226 (CVSS score: 7.1) – An information disclosure vulnerability YouTube warns of AI-generated video of its CEO used in phishing attacks Date: 2025-03-05 Author: Bleeping Computer The attackers are sharing it as a private video with targeted users via emails claiming YouTube is changing its monetization policy. "We're aware that phishers have been sharing private videos to send false videos, including an AI generated video of YouTube’s CEO Neal Mohan announcing changes in monetization," the online video sharing platform warned in a pinned post on its official community website. Over 4,000 ISP IPs Targeted in Brute-Force Attacks to Deploy Info Stealers and Cryptominers Date: 2025-03-04 Author: The Hacker News Internet service providers (ISPs) in China and the West Coast of the United States have become the target of a mass exploitation campaign that deploys information stealers and cryptocurrency miners on compromised hosts. The findings come from the Splunk Threat Research Team, which said the activity also led to the delivery of various binaries that facilitate data exfiltration as well as offer ways to establish persistence on the systems. ASB-2025.0044 – AUSCERT Bulletin Service – Cyclone Alfred AUSCERT has issued an advisory to its members about the potential cybersecurity impact of the Alfred Cyclone, highlighting risks and offering mitigation strategies to help prevent falling victim to scammers. ESB-2025.1463 – Android devices: CVSS (Max): 8.2 The Android Security Bulletin for March 2025 addresses critical security vulnerabilities in various components, including the Android Framework, system, and mediaTek components. It includes patches to resolve issues such as privilege escalation and remote code execution risks. The bulletin confirms that CVE-2024-43093 has been under limited, targeted exploitation. Users are encouraged to update their devices to mitigate potential security threats. ESB-2025.1469 – Google Chrome: CVSS (Max): None Google Chrome has released Chrome 134 to the stable channel for Windows , Mac and Linux, bringing with it a critical set of security patches. This update, which will gradually roll out to users over the coming days and weeks, addresses 14 security vulnerabilities, including a high-severity flaw in the V8 JavaScript engine. ESB-2025.1486 – Mozilla Thunderbird: CVSS (Max): 9.8* Mozilla's advisory for Thunderbird 136 addresses multiple security vulnerabilities, including high-impact use-after-free flaws and memory safety issues that could potentially allow arbitrary code execution or sandbox escapes. Key vulnerabilities include issues with AudioIPC, WebTransportChild, and WASM i32 return values on 64-bit CPUs. These flaws were fixed with the release of Thunderbird 136. Mozilla advises that in general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. ESB-2025.1479 – Cisco Webex for BroadWorks: CVSS (Max): None A flaw in Cisco Webex for BroadWorks Release 45.2 allows unauthenticated attackers to access data and credentials due to unsecure transport in SIP communication. Additionally, authenticated users could access credentials in plain text through client and server logs. Cisco has released a configuration update to address the issue and recommends restarting the Webex application to apply the fix. ESB-2025.1484 – Edimax IC-7100 IP Camera: CVSS (Max): 9.8 A vulnerability in Edimax IC-7100 IP Cameras allows remote code execution due to improper neutralization of special elements in OS commands. The flaw, identified as CVE-2025-1316, has a high CVSS score of 9.8, making it critical. Users are advised to take defensive measures to mitigate the risk. Stay safe, stay patched and have a good weekend! The AUSCERT team

Learn more

Blogs

Cyclone Alfred – Watch Out for Scams

As Cyclone Alfred approaches the SE QLD region, AUSCERT wants to remind its members that, in the wake of natural disasters, scammers can often exploit the vulnerability of those affected. Fraudulent activities can range from door-to-door scams to phone, text, mail, and email schemes. These fraudsters take advantage of the chaos and desperation following such events, frequently targeting individuals seeking disaster relief, insurance claims, or opportunities to assist others. To mitigate the risk of fraud during Cyclone Alfred and any post-cyclone recovery efforts, residents and those intending to donate to charities can take several key actions. Be cautious of scams following a disaster. Government agencies, like Services Australia and MyGov, will never ask for any sensitive information over the phone, so hang up and call their official number if in doubt. Phone scams may use caller ID spoofing to appear legitimate, so always verify calls independently. For insurance scams, never provide personal information until you have verified the contact directly with your provider. If contractors claim to be insurance partners, ensure they are licensed and insured by checking with local authorities. When donating to charities, only support trusted charities and verify their legitimacy through official websites. Be cautious with charity phone numbers, emails, or crowdfunding platforms, as scammers may pose as fake charities or misrepresent campaigns. Please see [1] and [2] for further information. Stay safe! REFERENCES [1] Avoid scams and fraud – https://www.servicesaustralia.gov.au/avoid-scams-and-fraud-when-claiming-natural-disaster-support [2] Avoid fundraising scams after an emergency – https://www.vic.gov.au/avoid-fundraising-scams-after-emergency

Learn more