company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Data Breach

Healthcare

loading..
loading..
loading..

23andMe's DNA Relatives Feature Temporarily Disabled Following Data Breach

23andMe took prompt action by disabling specific features within its DNA Relatives service in response to a recent data breach.

27-Oct-2023
7 min read

No content available.

Related Articles

loading..

Bouygues

Bouygues Telecom confirms a massive cyberattack affecting 6.4 million customers,...

Bouygues Telecom announced that on **August 4, 2025**, its cybersecurity team detected **unauthorized access to a customer database**. An internal review revealed **6.4 million customer accounts** were compromised — a scale that **eclipses the 2020 Orange Spain breach** (5.1M) and is comparable to **[T-Mobile’s](https://www.secureblink.com/cyber-security-news/25-million-illegal-scheme-pulled-off-compromising-t-mobile-employees) 2021 incident** (7.8M). ### What Was Stolen? * **Personal Identifiers:** Names, phone numbers, emails, postal addresses * **Contractual Data:** Plan types, subscription dates, and service terms * **Business Client Data:** Company names, registration details * **Financial Info:** **IBANs** — a key risk factor for targeted fraud > 💡 *No payment card numbers, passwords, or direct debit authorizations were accessed.* #### Summary * **Date Detected:** August 4, 2025 * **Operator:** Bouygues Telecom, France’s third-largest telecom provider * **Impact:** 6.4M customer accounts — largest French telecom breach in the last 10 years * **Data Exposed:** Names, contact info, contractual details, IBANs (no card numbers/passwords) * **Risk:** High for phishing, invoice scams, and identity fraud * **Authorities Involved:** CNIL & ANSSI * **Global Context:** Second major French telecom attack in 30 days; follows an incident at Orange in July ## How Did This Happen? *Official details are limited, but cybersecurity analysts outline possible scenarios.* * **Third-Party Vendor Breach:** Common in telecom due to outsourced billing & CRM systems * **Credential Compromise:** Phishing or brute force targeting employee admin accounts * **API Vulnerability:** Unpatched APIs exposing customer data endpoints * **Insider Threat:** Disgruntled employees with privileged access Jean-Luc Moreau, a Paris-based cybersecurity consultant, warns: > “In 80% of telecom breaches, attackers exploit human error or third-party weaknesses. Bouygues will need to prove they closed those gaps.” ## Official Statements **Bouygues Telecom Spokesperson:** > “We immediately blocked the intrusion, notified all affected customers, and strengthened our system monitoring. We are cooperating fully with CNIL and ANSSI to ensure transparency.” **CNIL Representative:** > “Our role is to determine whether adequate security measures were in place under GDPR Article 32. The presence of financial identifiers like IBANs raises compliance concerns.” ## Why This Breach Is a Big Deal for France & the EU This is **the largest telecom breach in France in a decade** and **the second in a month** after Orange’s July incident. The timing and sector targeting raise concerns about: * **Coordinated Cyber Campaigns:** Possible state-linked or organized crime operations * **GDPR Enforcement Risks:** Fines up to 4% of annual turnover * **EU-Wide Telecom Vulnerability:** Could trigger NIS2 Directive-driven reforms in telecom cybersecurity Marie Dubois, telecom risk analyst, notes: > “The EU’s NIS2 Directive, coming into force in 2025, mandates higher resilience standards. This breach will accelerate compliance pressure on operators.” **Global telecom breaches (last 5 years):** * T-Mobile (2021, USA): 7.8M accounts * Optus (2022, Australia): 9.8M accounts * Orange Spain (2020): 5.1M accounts * Bouygues Telecom (2025, France): 6.4M accounts This shows **telecoms are prime targets** due to: * Massive customer datasets * Financial and identity information * Critical infrastructure importance The Bouygues breach is more than a corporate crisis — it’s a **wake-up call for France’s telecom sector** and a **case study for EU-wide cyber resilience**. With regulators already engaged, the fallout will likely influence policy, corporate governance, and consumer trust for years to come.

loading..   09-Aug-2025
loading..   3 min read
loading..

Golang

Socket uncovers 11 malicious Go packages with obfuscated payloads targeting Linu...

Security researchers from Socket have identified a sophisticated supply chain attack involving **eleven malicious Go packages** that utilize string-array obfuscation techniques to silently execute remote payloads at runtime. The campaign, discovered in August 2025, represents a significant escalation in supply chain compromise tactics, targeting both Linux CI servers and Windows development workstations. ### Attack Analysis The malicious packages employ advanced **obfuscation methodologies** that conceal shell commands and leverage system utilities including `/bin/sh` on Linux systems and `certutil.exe` on Windows environments. At runtime, the compromised code spawns shells and retrieves second-stage ELF binaries and Portable Executable (PE) files from command-and-control endpoints using interchangeable .icu and .tech domains. **Compromised Package Inventory:** - `github.com/stripedconsu/linker` - `github.com/agitatedleopa/stm` - `github.com/expertsandba/opt` - `github.com/wetteepee/hcloud-ip-floater` - `github.com/weightycine/replika` - `github.com/ordinarymea/tnsr_ids` - `github.com/ordinarymea/TNSR_IDS` - `github.com/cavernouskina/mcp-go` - `github.com/lastnymph/gouid` - `github.com/sinfulsky/gouid` - `github.com/briefinitia/gouid` **Eight of the eleven packages represent typosquatting attempts**, designed to exploit developer confusion and typing errors when searching for legitimate modules. The attack leverages the decentralized nature of the Go ecosystem, where modules can be directly imported from GitHub repositories, creating significant opportunities for malicious actors to distribute compromised code. ### Advanced Persistent Threat CharacteristicsThe second-stage payloads demonstrate sophisticated capabilities for **system enumeration and credential exfiltration**. The malware maintains persistence through automatic reinitialization routines that restart compromised systems if the backdoor crashes or fails. Most concerning, the majority of payload URLs remain active, indicating an ongoing campaign with continued threat actor infrastructure investment. Analysis reveals the packages are likely the work of a **single coordinated threat actor**, evidenced by C2 infrastructure reuse and consistent code formatting patterns. The campaign exploits the Go Module Mirror's caching mechanism, similar to tactics previously observed in the BoltDB compromise that persisted undetected for over three years. ## Broader Supply Chain Threat Landscape ### AI-Generated Malware Targets Cryptocurrency Ecosystem The npm package **@kodane/patch-manager** represents a concerning evolution in supply chain attacks, utilizing **AI-generated code** to create sophisticated cryptocurrency wallet draining malware. Published on July 28, 2025, the package accumulated over 1,500 downloads before takedown, demonstrating the effectiveness of AI-assisted social engineering. Security researchers identified telltale signs of AI generation, including excessive console logs, emojis in code comments, and the repeated use of terms like "Enhanced" - patterns characteristic of Claude AI assistance. The malware employed post-install scripts to rename and hide files across macOS, Linux, and Windows systems, achieving persistence through the background execution of connection pooling scripts. ### WhatsApp Developer Tools Weaponized with Kill Switch Functionality Two malicious npm packages, **naya-flore** and **nvlore-hsc**, masquerade as WhatsApp development libraries while incorporating destructive data-wiping capabilities. The packages implement a **phone number-based kill switch** mechanism that recursively deletes files using the `rm -rf *` command for systems not matching predefined Indonesian phone number lists. The packages contain dormant data exfiltration functions capable of stealing device identifiers, phone numbers, and authentication tokens. Despite Socket filing takedown requests, both packages remain available on the npm registry, highlighting persistent gaps in repository security oversight. ### RubyGems Ecosystem Compromised in Telegram API Hijacking Campaign Security researchers discovered two malicious RubyGems packages - **fastlane-plugin-telegram-proxy** and **fastlane-plugin-proxy_telegram** - that redirect Telegram API traffic through attacker-controlled Cloudflare Workers infrastructure. The packages closely mimic legitimate Fastlane plugins while surreptitiously rerouting communications to **rough-breeze-0c37[.]buidanhnam95[.]workers[.]dev**. The campaign targets mobile application CI/CD pipelines, intercepting bot tokens, chat identifiers, message content, and uploaded files. The timing of the attack, occurring shortly after Vietnam's nationwide Telegram ban, suggests a **geopolitically motivated targeting strategy**. ## Critical Vulnerability Disclosures ### Chrome DevTools Race Condition Enables Privileged Code Injection**CVE-2024-6778** represents a critical race condition vulnerability in Chrome DevTools that allows attackers to inject malicious HTML or JavaScript into privileged browser pages via compromised extensions. The vulnerability scores **8.8 on the CVSS scale** and affects Chromium-based browsers worldwide.[9] The flaw exploits the `chrome.devtools.inspectedWindow.reload` function's inadequate verification mechanisms, allowing malicious extensions to execute code on about:blank pages that inherit WebUI permissions. Security researchers demonstrated practical exploitation scenarios involving malicious Chrome extensions that leverage DevTools APIs for **remote code execution in browser privilege contexts**.[9] ### Microsoft SharePoint Zero-Day Exploitation Campaign Targets African InfrastructureA global zero-day exploitation campaign targeting **Microsoft SharePoint Server** has significantly impacted African organizations, with South Africa experiencing the most severe compromise rates. The attacks exploit legacy SharePoint features through **fileless execution and anti-forensic techniques**, making detection extremely challenging. South Africa's National Treasury confirmed compromise of its Infrastructure Reporting Model platform, though swift isolation prevented service disruption. The campaign demonstrates advanced threat actor capabilities in exploiting unpatched enterprise systems across developing digital infrastructures. ## State-Sponsored and Advanced Persistent Threat Activity ### Chinese-Nexus Exploitation of Zero-Day Vulnerabilities Darktrace Threat Research documented extensive exploitation of multiple zero-day vulnerabilities by Chinese-nexus threat actors throughout early 2025. Notable exploits include: - **CVE-2025-0282** (Ivanti Connect Secure & Policy Secure) - **CVE-2025-0994** (Trimble Cityworks) - exploitation detected January 19, weeks before February 6 public disclosure - **CVE-2024-57727/57728** (SimpleHelp Remote Monitoring) - **CVE-2025-31324** (SAP NetWeaver) - **CVE-2025-4427/4428** (Ivanti Endpoint Manager Mobile)[11] The Trimble Cityworks exploitation particularly concerns critical national infrastructure, as the asset management system serves local governments, utilities, airports, and public works agencies. Darktrace observed suspicious file downloads from **192.210.239[.]172:3219/z44.exe**, later linked to Chinese threat actors targeting U.S. government entities. ### BlindEagle APT Targets Latin American Organizations The BlindEagle (APT-C-36) group demonstrated sustained targeting of Latin American organizations from February through June 2025, according to Darktrace threat intelligence. The campaign involved sophisticated social engineering and custom malware deployment against regional government and private sector targets. ## Ransomware and Cybercriminal Operations ### BlackSuit Infrastructure Seized in International Law Enforcement Operation International law enforcement agencies successfully dismantled BlackSuit ransomware infrastructure, seizing .onion domains and negotiation portals. The operation involved collaboration between U.K., U.S., German, Dutch, Ukrainian authorities, Europol, and Bitdefender's Draco Team. Visitors to previously active BlackSuit domains now encounter seizure notices from U.S. Homeland Security Investigations, marking a significant disruption to ransomware-as-a-service operations. The takedown demonstrates increasing effectiveness of **public-private collaboration** in combating dark web criminal infrastructure. ### Minnesota Activates National Guard Following Saint Paul Cyber Attack Governor Tim Walz activated Minnesota's National Guard cyber defense team following a **"deliberate and coordinated" cyberattack** on Saint Paul city systems. The attack, occurring July 25, 2025, crippled municipal IT infrastructure and disrupted online services affecting over 311,000 residents. Emergency services remained operational through manual processes while digital services including online payments and library operations were taken offline. The attack's scale overwhelmed both internal IT resources and commercial cybersecurity providers, necessitating military cyber support. ## Artificial Intelligence Security Threats### AI-Powered Threat Evolution Accelerates Attack SophisticationCybersecurity professionals report that **74% of organizations** identify AI-powered threats as major operational challenges. The 2025 RSA Conference highlighted how AI technologies enable attackers to craft personalized, realistic phishing messages and develop adaptive malware capable of real-time security protocol evasion. **Generative AI adoption in cybercrime** includes: - Automated social engineering at unprecedented scale - Deepfake audio/video for executive impersonation attacks - Real-time attack strategy adaptation using machine learning algorithms - Convincing multilingual phishing campaigns targeting global audiences McKinsey research indicates that **47% of organizations** cite advancement of adversarial capabilities as their primary GenAI security concern, while **42% experienced successful social engineering attacks** in the past year. ### AI Model Poisoning and Prompt Injection Vectors Security researchers document increasing sophistication in **AI system compromise techniques**, including adversarial inputs designed to trick AI models into incorrect decisions, data poisoning attacks targeting training datasets, and model inversion techniques revealing sensitive information. **Prompt injection attacks** against generative AI systems use harmful instructions disguised as legitimate prompts to manipulate outputs and potentially leak sensitive data. The widespread deployment of AI across business functions - with **78% of organizations** using AI in at least one business function according to McKinsey - significantly expands organizational attack surfaces.

loading..   08-Aug-2025
loading..   7 min read
loading..

ShinyHunters

Cisco confirms July 2025 voice phishing attack compromised third-party CRM syste...

Cisco Systems, one of the world's largest manufacturers of networking equipment, has become the latest victim in an escalating wave of voice phishing (vishing) attacks targeting enterprise CRM systems. The breach, discovered on July 24, 2025, compromised a third-party cloud-based Customer Relationship Management system through a sophisticated social engineering attack that required no malware, no system vulnerabilities, and no technical exploits—just a convincing phone call that tricked a single employee. The attack exposed basic profile information for approximately **137,000 Cisco.com users**, including names, organization details, email addresses, phone numbers, and account metadata. While Cisco has not disclosed the exact number of affected individuals, cybersecurity researchers estimate the breach could cost the company up to **$4.9 million** based on current data breach averages, highlighting how human psychology has become the most exploited vulnerability in modern cybersecurity. This incident represents more than an isolated security lapse—it exemplifies a fundamental shift in cybercrime tactics where attackers have moved beyond exploiting technical vulnerabilities to weaponizing human trust and organizational processes. ## Anatomy of a Perfect Social Engineering Campaign ### Voice Phishing Methodology The Cisco breach demonstrates the sophisticated evolution of voice phishing attacks from crude cold-calling schemes to precision-targeted social engineering campaigns. According to the company's official statement, the attack began when a cybercriminal contacted a Cisco representative via telephone, impersonating a trusted entity to manipulate the employee into granting unauthorized access to the third-party CRM system. **Attack Timeline:** - **July 24, 2025**: Cisco discovers the breach and identifies vishing as the attack vector - **Immediate Response**: Company terminates attacker access and launches investigation - **August 5, 2025**: Public disclosure confirms scope and attribution ### Human Firewall Failure The success of this attack underscores a critical reality in modern cybersecurity: **traditional technical defenses are increasingly irrelevant when attackers can simply call employees and ask for access**. Voice phishing success rates have reached alarming levels, with research indicating: - **37% success rate** for standalone vishing attacks - **75% success rate** when vishing is combined with email phishing campaigns - **442% increase** in vishing attack frequency during Q2 2024 alone - **30% annual increase** in vishing incidents globally, with financial losses exceeding $1.2 billion in 2023 ### Third-Party Risk Amplification The Cisco incident highlights how third-party CRM systems have become prime targets for cybercriminals seeking high-value data with lower security oversight. Unlike internal corporate systems that typically receive intensive security attention, third-party platforms often operate with: - **Reduced security monitoring** from client organizations - **Simplified access controls** for ease of use - **Broader user permissions** for operational efficiency - **Limited incident response integration** with client security teams ## ShinyHunters Connection: Industrial-Scale CRM Targeting ### Attribution and Campaign Analysis While Cisco has not officially attributed the attack, cybersecurity researchers have linked the breach to the **ShinyHunters extortion group** (also tracked as UNC6040), which has orchestrated an unprecedented campaign targeting Salesforce and other CRM platforms throughout 2025. This attribution is based on: - **Tactical similarities** to confirmed ShinyHunters operations - **Target profile alignment** with the group's CRM-focused strategy - **Attack timing** correlating with peak ShinyHunters activity - **Social engineering methodology** matching established UNC6040 patterns ### Campaign Scale and Sophistication The ShinyHunters campaign represents one of the most systematic attacks on enterprise CRM systems ever documented, affecting major corporations across multiple industries: **Confirmed Victims (2025):** - **Allianz Life**: 1.4 million customer records exposed (July 2025) - **Chanel**: US customer database compromised (July 2025) - **LVMH Brands**: Louis Vuitton, Dior, Tiffany & Co. systems breached - **Adidas**: Customer information accessed via CRM platform - **Qantas**: Passenger data stolen from Salesforce instance - **Cisco**: 137,000+ user profiles compromised (July 2025) ### Economic Impact Assessment The cumulative impact of the ShinyHunters CRM campaign has reached unprecedented levels: - **Estimated 3+ million individuals** affected across all confirmed breaches - **$30+ million in direct breach costs** based on industry averages - **Immeasurable reputational damage** to affected global brands - **Regulatory compliance costs** spanning multiple jurisdictions - **Customer notification and credit monitoring expenses** exceeding $10 million collectively ## Voice Phishing Epidemic ### Statistical Landscape Voice phishing has emerged as one of the fastest-growing cybercrime vectors, with 2025 marking a watershed year for the technique's mainstream adoption: **Global Vishing Statistics:** - **30% of organizations** report weekly or daily vishing attempts - **59.4 million Americans** fell victim to voice phishing in 2021 alone - **168 million** phone-based scam attempts recorded in Thailand (2024) - **1,530% increase** in deepfake-assisted vishing cases (2022-2023) - **26.9% increase** in targeted voice attacks across APAC region ### Corporate Vulnerability Factors Modern organizations face unprecedented vulnerability to vishing attacks due to structural and cultural changes: **Organizational Risk Factors:** - **Remote work normalization** reducing in-person verification opportunities - **Outsourced IT support** creating legitimate pretexts for unsolicited calls - **Cloud service proliferation** expanding potential impersonation scenarios - **Digital transformation speed** outpacing security awareness programs ### Executive Targeting Trends Recent research reveals that senior executives face disproportionate vishing risk, with **23% higher susceptibility** to AI-driven personalized attacks. This increased vulnerability stems from: - **Busy schedules** limiting verification time - **Authority trust patterns** making executives more likely to comply with urgent requests - **High-value targets** providing greater financial incentive for attackers - **Public information availability** enabling detailed social engineering research ## CRM Attack Vector ### Salesforce Ecosystem Vulnerabilities The concentration of attacks on Salesforce-based systems reflects both the platform's market dominance and its particular susceptibility to social engineering: **Platform Risk Factors:** - **Connected app architecture** enabling OAuth token abuse - **Data Loader functionality** providing legitimate pretext for malicious apps - **Administrative delegation** allowing broad access permissions - **Integration complexity** creating multiple attack pathways ### Attack Methodology Evolution The ShinyHunters campaign has demonstrated remarkable tactical sophistication: **Phase 1: Reconnaissance** - Social media mining for organizational structure - Employee role identification and contact information gathering - IT support process research and documentation **Phase 2: Initial Contact** - Sophisticated vishing calls impersonating IT personnel - Creation of urgent, plausible scenarios requiring immediate action - Exploitation of remote work communication norms **Phase 3: Technical Exploitation** - Guidance to Salesforce connected app setup pages - Installation of malicious OAuth applications disguised as legitimate tools - Data exfiltration using authorized API connections **Phase 4: Persistence and Expansion** - Long-term data access through OAuth token abuse - Lateral movement to additional cloud platforms - Credential harvesting for future operations ## Financial and Regulatory Impact ### Cost Analysis Framework The financial impact of vishing-based CRM breaches extends far beyond initial response costs: **Direct Costs:** - **Incident response**: $280,000 average per breach - **Legal and regulatory**: $1.2 million average compliance costs - **Customer notification**: $150 per affected individual - **Credit monitoring**: $50-100 per individual annually **Indirect Costs:** - **Reputational damage**: 5-15% customer churn rates - **Business disruption**: $50,000 per day average downtime - **Regulatory fines**: Up to 4% annual revenue under GDPR - **Competitive disadvantage**: Long-term market position impacts ### Regulatory Landscape Evolution The wave of CRM-targeted attacks has prompted increased regulatory attention: **Emerging Requirements:** - **Third-party risk management** mandatory disclosure requirements - **Voice authentication controls** for sensitive system access - **Social engineering resistance** incorporated into compliance frameworks - **Incident response coordination** between vendors and clients ## Defensive Strategies and Mitigation Approaches ### Immediate Technical Controls Organizations can implement several technical measures to reduce vishing vulnerability: **Authentication Hardening:** - **Multi-factor authentication** mandatory for all administrative functions - **Hardware security keys** for high-privilege accounts - **IP address restrictions** for CRM administrative access - **Session monitoring** for unusual activity patterns **Communication Security:** - **Callback verification** requirements for all IT support requests - **Digital channels** for sensitive administrative communications - **Voice authentication** systems for phone-based verification - **Call recording** and monitoring for security purposes ### Organizational Process Improvements **Human-Centered Defenses:** - **Regular vishing simulations** to test employee response - **Authority verification** protocols for unusual requests - **Escalation procedures** for suspicious communications - **Cross-functional validation** for high-risk activities **Vendor Management:** - **Security requirements** incorporated into all third-party contracts - **Incident response coordination** agreements with CRM providers - **Access monitoring** and logging requirements - **Regular security assessments** of vendor environments ### Advanced Countermeasures **Behavioral Analytics:** - **AI-powered detection** of unusual administrative activities - **User behavior modeling** to identify compromised accounts - **Anomaly detection** for data export patterns - **Predictive threat intelligence** integration **Communication Monitoring:** - **Voice pattern analysis** to detect impersonation attempts - **Call metadata analysis** for suspicious communication patterns - **Social engineering attempt** documentation and sharing - **Threat intelligence integration** for known vishing campaigns ## Industry Response and Future Outlook ### Vendor Security Enhancements Major CRM providers have begun implementing enhanced security measures in response to the attack wave: **Salesforce Initiatives:** - Enhanced monitoring for unusual OAuth app installations - Improved detection of bulk data export activities - Strengthened user verification requirements - Expanded security awareness resources **Industry-Wide Changes:** - **Zero-trust architecture** adoption across CRM platforms - **Enhanced audit logging** for administrative activities - **Real-time security alerts** for suspicious behavior - **Improved incident response** coordination with customers ### Regulatory and Policy Responses The scale and sophistication of the ShinyHunters campaign has prompted regulatory action: **Legislative Developments:** - **Enhanced third-party liability** requirements under consideration - **Mandatory vishing prevention** training in some jurisdictions - **Stricter data handling** requirements for CRM platforms - **Coordinated response** requirements for multi-victim attacks ### Technology Evolution Trends The vishing threat is driving innovation in defensive technologies: **Emerging Solutions:** - **AI-powered voice authentication** to detect synthetic audio - **Behavioral biometrics** for continuous user verification - **Deepfake detection** systems for communication security - **Automated social engineering** detection platforms ## Lessons Learned and Strategic Implications ### The Human Element Paradox The Cisco breach exemplifies a fundamental paradox in modern cybersecurity: as technical defenses become more sophisticated, attackers increasingly target the human elements that these systems depend upon. This trend suggests that: - **Security investment** must balance technical and human-focused defenses - **Employee training** requires continuous evolution to address new social engineering tactics - **Organizational culture** must emphasize security skepticism without impeding operational efficiency - **Verification processes** must be both robust and practical for daily use ### Supply Chain Security Imperatives The concentration of attacks on third-party CRM systems highlights critical gaps in supply chain security: - **Vendor due diligence** must include comprehensive social engineering assessments - **Shared responsibility models** require clear delineation of security obligations - **Incident response coordination** between vendors and clients is essential - **Continuous monitoring** of third-party environments is increasingly necessary ### Future Threat Evolution The success of the ShinyHunters campaign suggests several concerning trends: - **Industrialization of social engineering** with professional-grade operations - **AI enhancement** of vishing attacks using deepfake and voice synthesis technology - **Cross-platform coordination** combining vishing with other attack vectors - **Extended persistence** with attacks continuing for months before detection

loading..   06-Aug-2025
loading..   9 min read