Transcript
A (0:00)
From the CISO series, it's Cybersecurity Headlines.
B (0:05)
These are the cybersecurity headlines for Thursday, September 25, 2025. I'm Sarah Lane. Man arrested in connection with airport cyber attack A man was arrested in West Sussex over a cyber attack that disrupted several European airports, including Heathrow, after Collins Aerospace's baggage and check in systems were hit. The attack was discovered Friday and involved ransomware forcing some airports to use manual check ins and causing hundreds of flight delays. The suspect has been released on bail and the investigation is ongoing. Collins Aerospace is rebuilding its systems, warning airlines and ground handlers to expect at least another week of manual operations. Record breaking DDoS attack hits new highs Cloudflare blocked a record breaking DDoS attack targeting a European network infrastructure company peaking at 22.2 terabits per second and 10.6 billion packets per second over 40 seconds. The attack, possibly powered by the Acero botnet, involved over 404,000 unique IPs across 14 ASNs and used a UDP carpet bomb targeting tens of thousands of ports of on a single IP. Isuru active for over a year now, leverages compromised IoT devices and zero day vulnerabilities China linked attackers use Brickstorm backdoor to steal IP Mandian says suspected Chinese hackers are deploying a new Linux focused backdoor called Brickstorm to steal intellectual property and sensitive data from law firms, software as a service providers and tech companies. The campaign, linked to UNC5221, has been active since March and targets high value email accounts including senior executives and national security related law firms. Attackers often persist in networks for over a year, exploiting Avanti Zero Days VMware appliances and compromised routers to maintain access. How one bad password ended a 158-year-old business UK transport firm KNP Logistics, founded back in 1867, collapsed in June after the Akira ransomware group breached its systems using a weak employee Password with no MFA, attackers encrypted data, destroyed backups and demanded 5 million pounds, forcing the company to lay off 700 workers. The case underscores how poor credential hygiene can override compliance and insurance protections. Huge thanks to our sponsor Conveyor. Security reviews don't have to feel like a hurricane. Most teams are buried in back and forth emails and never ending customer requests for documentation or answers. But Conveyor takes all that chaos and turns it into calm. AI fills in the questionnaires, your trust center is always ready and sales cycles move without stalls. Breathe easier. Check out conveyor@www.conveyor.com Cisco warns of iOS zero day vulnerability exploited in attacks Cisco patched a zero day in iOS and iOS XE exploited in active attacks through the SNMP subsystem. The stack based buffer overflow lets low privileged attackers cause denial of service or with higher privileges, gain root access on iOS XE devices. Exploitation was seen after admin credentials were compromised. Cisco advises upgrading immediately since no full workarounds exist beyond restricting SNMP access. NPM package uses QR code steganography to steal credentials Socket researchers discovered a malicious NPM package called Fezbox that hid its payload inside a QR code to steal usernames and passwords from browser cookies. Posing as a JavaScript TypeScript utility, the package fetched a QR code from a remote server, waited 120 seconds, then decoded and executed the embedded malware. It used multiple obfuscation layers including string reversal and encryption before sending stolen credentials to a railway hosted server. Fezbox had 327 downloads before npm removed it at Socket's request. Chinese hackers Red November target global governments recorded Future says A Chinese state backed hacking group it now calls Red November has been breaching governments and private sector firms worldwide since mid 2024. The group exploits flaws in VPNs, firewalls and email servers from vendors including Checkpoint, Avanti and Palo Altum Networks, then deploys tools like the Go based Backdoor, Pantagona, sparkrat and Cobalt Strike. Victims reportedly include US Defense contractors, a European engine maker and ministries across Asia, Africa and South America. Unpatched flaw in OnePlus phones lets rogue apps text messages A flaw in Oxygen OS lets any app on a OnePlus device Access SMS data without permission, exploiting improperly secured telephony content providers. Rapid 7 confirmed the vulnerability on multiple models including the OnePlus AT and the 10 Pro, and published a POC after OnePlus ignored repeated disclosure attempts. The issue affects oxygen OS versions 12 through 15 and could allow blind SQL injection to reconstruct SMS content. Users are advised to limit apps, use reputable sources, switch from SMS based to FA and rely on end to end encrypted messaging until a patch is released. If you want to help make great content for the CISO series, well we've got a great way for you to participate. We need our listeners to fill out a quick five question survey. They're Family Feud style questions and your responses will be used in an upcoming live event. It should be very fun. If you've got an extra minute, we would love to hear from you head on over to cisoseries.com participate to fill it out. And if you have thoughts on the news from today or about our show in general, be sure to reach out to us@feedbacksoseries.com I am Sarah Lane, reporting for the CISO series. Thanks for being with us and we'll talk to you next time.
