company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

PyPi

Colorama

loading..
loading..
loading..

Colorama PyPI Attack Exposes Critical Cross-Platform Supply Chain Risks

Sophisticated PyPI attack targets Colorama users with cross-platform malware, evading detection and compromising 170k+ developers. Learn mitigation strategies. ...

02-Jun-2025
3 min read

No content available.

Related Articles

loading..

API

Energy giant faces unprecedented cyber escalation as threat actors target API in...

**TotalEnergies** has experienced a catastrophic escalation in cybersecurity incidents, with breaches jumping from **210,715 customer records** in 2024 to an alleged **22.25 million records** offered on dark web markets in 2025‚ representing a staggering **105x increase** in attack scale that highlights critical vulnerabilities in the energy sector’s digital infrastructure. The recent TotalEnergies data breaches underscore systemic API and web application vulnerabilities plaguing critical energy infrastructure. With **API-related security issues costing organisations up to $87 billion annually** and **46% of Account Takeover attacks targeting API endpoints**, TotalEnergies incidents exemplify why automated security solutions are imperative for [energy sector protection](https://www.akamai.com/site/en/documents/white-paper/2025/api-security-study-asia-pacific-2025.pdf). ![TotalEnergies Data Breach Escalation: 105x Increase from 2024 to 2025](https://sb-cms.s3.ap-south-1.amazonaws.com/image_10_40a2deb785.png) ***TotalEnergies Data Breach Escalation: 105x Increase from 2024 to 2025*** ## Critical Timeline Analysis ### Confirmed Incident TotalEnergies Clientes SAU detected unauthorized access to sales management systems on **August 31, 2024**, exposing customer names, contact details, and service information across **210,715 accounts**. The company immediately collaborated with Spanish Police and Data Protection Agency, emphasizing data protection as an "absolute priority" while initiating legal action against perpetrators. ### Dark Web Intelligence Threat actor **"icikevin"** allegedly advertised **22.25 million TotalEnergies Power & Gas records** on underground forums, including names, phone numbers, addresses, energy usage categories, and tariff structures. The dataset was marketed as exclusive to five buyers, indicating high-value commercial exploitation targeting billing portal APIs and customer-facing interfaces. ## Technical Vulnerability Assessment ### Primary Attack Vectors Identified **API Security Gaps**: The dramatic escalation suggests exploitation of **OWASP Top 10 API vulnerabilities**, particularly broken object-level authorization and excessive data exposure. Research indicates **33% of API vulnerabilities are associated with authentication and access control issues**, directly correlating with TotalEnergies breach patterns. **Web Application Weaknesses**: The 2024 sales system compromise exploited authentication mechanisms and access controls in customer-facing platforms. With **68% of organisations failing to implement proper API authentication**, TotalEnergies incidents reflect industry-wide security deficiencies. **Cloud Infrastructure Misconfigurations**: Similar to recent **[Gravy Analytics breaches](https://www.secureblink.com/cyber-security-news/gravy-analytics-hack-millions-location-data-exposed-privacy-at-risk)**, TotalEnergies likely experienced unauthorised access through improperly secured cloud storage or exposed API endpoints, highlighting the risks of rapid digital transformation without adequate security frameworks. ## Energy Sector Under Attack Current intelligence reveals **90% of the world’s largest energy companies suffered cybersecurity breaches in 2023**, with critical infrastructure becoming primary targets for state-sponsored hackers. The average data breach cost reached **$4.8 million in 2024**, a 10% increase, representing the highest recorded total. **Industry-Specific Vulnerabilities**: Energy companies' extensive use of **IoT devices, smart grids, and billing systems** creates expanded API attack surfaces. With **API traffic constituting over 71% of web traffic** and enterprises managing an average of **613 API endpoints**, the sector faces unprecedented exposure requiring specialized protection. ### Advanced Detection Capabilities [Threatspy](https://www.secureblink.com/threatspy)'s AI-powered platform identifies vulnerabilities through both authenticated and unauthenticated endpoint analysis, addressing the API exploitation vectors that enabled TotalEnergies breaches. The system provides comprehensive **OWASP Top 10 coverage**, specifically targeting broken access controls and injection flaws. Continuous assessment capabilities detect anomalous API behaviour patterns, essential for identifying the sophisticated attacks that resulted in the 105x escalation between TotalEnergies incidents. Machine learning algorithms analyses traffic patterns for signs of misuse or unauthorised access attempts. ### Automated Remediation Framework **Playbook-Driven Fixes**: Curated remediation steps streamline vulnerability fixes across complex API ecosystems, addressing the scale challenges evident in TotalEnergies' extensive digital infrastructure. **CI/CD integration** enables seamless security testing within development workflows, preventing vulnerabilities from reaching production environments. **SLA-Based Notifications**: Timely alert systems ensure rapid response to critical security issues, directly addressing the escalation timeline observed between TotalEnergies incidents. ### Threat Intelligence Integration **Dark Web Monitoring**: Early detection of data sales and threat actor activities would have potentially identified the "icikevin" threat actor before public disclosure, providing crucial response time for incident containment. The TotalEnergies incidents demonstrate that reactive security approaches are insufficient against sophisticated API-targeting attacks. With **27% of API attacks targeting business logic vulnerabilities** and energy sector digitalisation accelerating, comprehensive solutions like Threatspy provide the proactive detection, automated remediation, and continuous monitoring capabilities necessary to prevent similar catastrophic escalations across critical infrastructure sectors. ***Experience Threatspy in action—request your free [demo](https://www.secureblink.com/threatspy#request-demo) now and secure your APIs today!***

loading..   04-Jun-2025
loading..   4 min read
loading..

WLC

Cisco

Critical CVE-2025-20188: Unauthenticated RCE in Cisco IOS XE WLCs. Exploits publ...

Technical details revealing how to exploit a maximum-severity vulnerability (**CVE-2025-20188**) in Cisco IOS XE Wireless LAN Controllers (WLC) have been publicly released, significantly raising the risk of imminent attacks. Horizon3 researchers published a deep dive into the flaw, enabling skilled threat actors—or even advanced AI systems—to weaponize it within hours. ### Why This Flaw Is Critical Disclosed by Cisco on May 7, 2025, this 9.8-CVSS vulnerability allows **unauthenticated attackers to upload malicious files, traverse directories, and execute arbitrary commands with root privileges**. The attack exploits a hardcoded JSON Web Token (JWT) secret (`notfound`) used by Cisco’s OpenResty backend when the `/tmp/nginx_jwt_key` file is missing. Attackers can forge valid tokens to bypass authentication entirely. **Affected Devices**: - Catalyst 9800-CL WLCs (Cloud) - Catalyst 9800 Embedded WLC (Catalyst 9300/9400/9500 Switches) - Catalyst 9800 Series WLCs - Embedded WLC on Catalyst APs > **Key Trigger**: The ‘Out-of-Band AP Image Download’ feature **must be enabled** for devices to be vulnerable. ### Horizon3’s Weaponization Blueprint Horizon3’s analysis demonstrates how attackers can: 1. **Forge JWT tokens** using the hardcoded `notfound` secret. 2. Upload files via the `/ap_spec_rec/upload/` endpoint (port 8443) using **path traversal** (e.g., `../../`). 3. Overwrite critical files (e.g., configs, scripts) to achieve **Remote Code Execution (RCE)**. In their example, attackers overwrite configurations monitored by the `pvp.sh` service, triggering a reload to execute malicious payloads with **root privileges**. ![Diagram: Exploit flow showing JWT forgery and file upload to RCE](https://example.com/cisco-cve-2025-20188-exploit-flow.png) *Source: Horizon3 Attack Breakdown* ### Mitigation Steps: Act Now Cisco confirms active exploits are expected within days. Take **immediate action**: 1. **PATCH**: Upgrade to IOS XE **17.12.04 or later**. 2. **TEMPORARY FIX**: Disable **‘Out-of-Band AP Image Download’** via: ```bash config t > wireless profile ap-download > no out-of-band ap-image-download enable ``` ### The Bottom Line This flaw transforms a simple file upload into full device takeover. With technical roadmaps now public, unpatched networks face severe ransomware, espionage, and botnet recruitment risks. Cisco administrators must treat this as an **emergency patch scenario**. > **Update Status**: Cisco confirms no public exploits yet, but warns weaponization is imminent. Monitor [CVE-2025-20188 Bulletin](https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory) for updates.

loading..   31-May-2025
loading..   2 min read
loading..

RMM

ConnectWise

ConnectWise confirms nation-state cyberattack exploiting ScreenConnect flaw (CVE...

**TAMPA, FL – May 31, 2025** – ConnectWise, a leading provider of IT management software for Managed Service Providers (MSPs) and IT departments, has disclosed a significant cybersecurity incident involving a suspected nation-state actor. The breach impacted a limited number of customers using its cloud-hosted ScreenConnect remote access solution, raising concerns within the MSP community reliant on the platform. In a brief advisory issued this week, ConnectWise stated: *"ConnectWise recently learned of suspicious activity within our environment that we believe was tied to a sophisticated nation state actor, which affected a very small number of ScreenConnect customers."* The company emphasized the targeted nature of the attack, suggesting only a select group of clients were compromised. **Forensics, Law Enforcement Engaged Amidst Limited Details** ConnectWise confirmed it has launched a comprehensive investigation, enlisting the expertise of premier cybersecurity forensics firm Mandiant. The company also stated it is coordinating with law enforcement agencies and has directly contacted all affected customers. However, critical details remain scarce. ConnectWise declined to answer inquiries from BleepingComputer regarding the exact number of impacted customers, the specific timeframe of the breach, or whether any malicious activity was observed within the compromised ScreenConnect customer instances themselves. **Source Points to 2024 Breach, Cloud Instances Targeted** According to a source familiar with the incident who spoke to BleepingComputer, the initial breach occurred as far back as **August 2024**, with ConnectWise discovering the suspicious activity only in **May 2025**. The source further indicated that **only cloud-based ScreenConnect instances** were impacted. BleepingComputer notes it has not been able to independently verify these dates. ConnectWise has not publicly commented on this timeline. **Link to Patched ScreenConnect Vulnerability Emerges** While ConnectWise's advisory did not specify the initial attack vector, details emerging from customer discussions on Reddit and technical analysis point strongly to the exploitation of a high-severity vulnerability in ScreenConnect, tracked as **CVE-2025-3935**. This flaw, patched by ConnectWise on **April 24, 2025**, was a ViewState code injection vulnerability caused by unsafe deserialization within the ASP.NET framework, affecting ScreenConnect versions 25.2.3 and earlier. The vulnerability, rated "High" priority by ConnectWise (indicating either active exploitation or high risk), allowed threat actors with privileged system-level access to steal secret machine keys. These keys could then be weaponized to craft malicious payloads enabling **remote code execution (RCE)** on the vulnerable ScreenConnect server. **Cloud Focus Suggests Potential Attack Path** Given ConnectWise's confirmation that only cloud-hosted ScreenConnect instances (served via `screenconnect.com` and `hostedrmm.com`) were affected, cybersecurity experts theorize a likely attack sequence: 1. **Initial Compromise:** Threat actors breached ConnectWise's own internal corporate network (the "environment" referenced). 2. **Key Theft:** Attackers stole the secret machine keys used to secure ScreenConnect cloud servers. 3. **Server Compromise:** Using the stolen keys, attackers could bypass security and execute remote code on ConnectWise's ScreenConnect cloud infrastructure. 4. **Customer Impact:** This server-level access potentially allowed attackers to pivot into the environments of the targeted customers using those specific cloud instances. *Crucially, ConnectWise has not confirmed this specific attack path or whether customer environments were actually accessed via the compromised servers.* **Frustration Mounts Over Lack of Specifics** Despite ConnectWise's outreach to affected customers, several MSPs have expressed significant frustration on forums like Reddit over the lack of detailed **Indicators of Compromise (IOCs)** and specific technical information about what occurred within their instances. This lack of transparency hinders their ability to conduct thorough internal investigations and assure their own clients. **ScreenConnect: A Repeated Target** This incident marks the second major security event involving ScreenConnect in recent years. In February 2024, a critical vulnerability (**CVE-2024-1709**) was widely exploited by ransomware gangs and a North Korean state-sponsored hacking group (APT), leading to numerous compromises before a patch was deployed. This history underscores the attractiveness of remote access tools to advanced threat actors. **ConnectWise's Response and Recommendations** ConnectWise states it has implemented "enhanced monitoring" and "hardened security" across its network. They also report seeing "no further suspicious activity in customer instances" since containment measures were enacted. The company had patched the CVE-2025-3935 vulnerability on its cloud platforms *before* publicly disclosing it to customers. **Advice for ScreenConnect Users (Especially Cloud):** 1. **Verify Patch Status:** Ensure *all* ScreenConnect instances (cloud or self-hosted) are updated to a version **later than 25.2.3**, specifically patching CVE-2025-3935. ConnectWise manages cloud instances, but confirmation of patching is prudent. 2. **Scrutinize Communications:** Affected cloud customers should closely review all communications from ConnectWise and follow any specific guidance provided. 3. **Enhanced Monitoring:** All ScreenConnect users, particularly those on cloud, should implement heightened monitoring for unusual remote access activity, privilege escalations, or unexpected processes on endpoints managed via ScreenConnect. 4. **Review Access Logs:** Conduct thorough audits of ScreenConnect access logs for the period potentially dating back to August 2024 (if the source timeline is accurate), looking for anomalies. 5. **Assume Potential Compromise (Impacted Customers):** Affected organizations should initiate incident response procedures, including credential rotations, system scans, and investigations for potential lateral movement. The investigation involving Mandiant and law enforcement is ongoing. ConnectWise has promised to provide updates as more information becomes available and can be shared. This incident highlights the persistent threat faced by IT management platforms and the critical importance of rapid patching and robust supply chain security for MSPs and their clients.

loading..   30-May-2025
loading..   5 min read