Transcript
CISO Series Host (0:00)
From the CISO series. It's Cybersecurity Headlines.
Sarah Lane (0:07)
These are the cybersecurity headlines for Wednesday, June 18, 2025. I'm Sarah Lane. Hackers exploit critical lang flow flaw to unleash flawedrix botnet Attackers are actively exploiting a critical vulnerability in Langflow, a python based AI workflow tool to deploy the floodric Spotnet and enabling full System compromise and DDoS attacks. The flaw is present in versions before 1.3.0 and allows unauthenticated code execution due to missing input validation. Trend Micro and CISA both urge immediate patching and restricted access since the malware uses stealth techniques to evade detection and is being deployed widely in the wild. Organizations warned Vulnerability exploited against discontinued TP link routers CISA has warned that attackers are exploiting a critical command injection flaw affecting multiple discontinued TP Link router models. Agencies must remove affected devices by July 7. CISA also flagged active exploitation of Apple products, a media processing flaw used in targeted attacks patched in February with iOS, 3-1-18 andMacOS 15. Russia detects its first Supercard malware attacks skimming bank data via NFC Russian cybersecurity firm F6 has identified the first local attacks using Supercard, a malicious variant of the NFC Gate app designed to steal payment card data via nfc. It was first seen in Italy, but Supercard is now being marketed as a malware as a service by Chinese speaking actors and sold on Telegram and then harvests card data to enable fraudulent transactions. F6 reports 175,000 devices infected in Russia with 5.5 million in damages in Q1 of this year. Silver Fox Apt targets Taiwan with complex Ghost cringe and holding hands rat malware Researchers at Fortinet warn of a phishing campaign by China linked group Silver Fox Apt targeting Taiwan with two Ghost RAT variants, Ghost Cringe and Holding Hands delivered via fake emails posted as government or business communications. The malware uses PDF and zip attachments to deploy shellcode through DLL sideloading, enabling remote access, data theft and additional payload downloads. The attackers use sophisticated anti VM and privilege escalation techniques, continuously refining their tools and methods across recent campaigns, including the earlier WN 4.0 attacks. Huge thanks to our sponsor Adaptive Security, OpenAI's first cybersecurity investments as deepfake scams and gen AI phishing evolve Adaptive equips security teams with AI powered phishing simulations featuring realistic personalized deepfakes and engaging security awareness training. Their new AI content creator turns threat intel and policy updates into interactive multilingual training instantly trusted by Fortune 500s and backed by Andreessen Horowitz and OpenAI Adaptive helps you stay ahead of AI driven threats. Learn more at adaptive security.com pro Israel hackers claim breach of Iranian bank amid military escalation Predatory Sparrow, a group linked to Israeli military intelligence, claimed responsibility for a cyber attack on Iran's bank sepa, allegedly in retaliation for the bank's role in funding Iran's military and nuclear programs. The attack disrupted banking services and may have also impacted gas stations and salary distributions. Iranian officials haven't confirmed the breach, but the bank was previously sanctioned by the US back in 2007 for missile development support. Microsoft fixes Surface Hub boot issues with emergency updates Microsoft released an out of ban update to fix a secure boot violation error that was preventing surface hub version 1 devices running Windows 10 22H2 from starting after installing the June security update. The issue doesn't affect Surface Hub 2S or 3. Microsoft had paused the problematic update on June 11 and advised users that the emergency fix would prevent further failures.
