company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

WazirX

Lazarus

Crypto

loading..
loading..
loading..

HACKED WazirX Launches Bug Bounty to Recover $234.9M Stolen Crypto

Discover how WazirX's new bug bounty program aims to recover $234.9M stolen crypto. Learn about the hack, its impact on exchange security, and the Indian crypto...

22-Jul-2024
5 min read

No content available.

Related Articles

loading..

TATA Motors

JLR cyberattack wipes ₹21,000 crore; Tata Motors slides as phased recovery begin...

Tata Motors’ market value fell sharply after [reports](https://www.secureblink.com/cyber-security-news/major-cyberattack-cripples-jaguar-land-rover-operations-worldwide) suggested JLR could face losses of around ₹21,000 crore from the cyberattack, with shares dropping 3–4% intraday as investors priced in extended production halts and uninsured impact risk. Fresh coverage indicates that the projected financial hit from the JLR cyberattack could reach approximately £2 billion, exceeding JLR’s FY25 profit. Some reports note that the lack of finalized cyber insurance has heightened exposure to operational and financial losses during the shutdown window. ### Share price reaction Tata Motors’ stock fell 3–4% intraday to the ₹655–₹683 range on September 25 amid uncertainty around restart timelines and supply-chain stress, before recovering about 2% on September 26 as JLR began phased restoration of systems and operations. ### Production recovery JLR extended its global production pause until at least October 1 following the early-September incident, then announced a controlled restart with key IT, logistics, and financial systems coming back online to support a safe ramp of manufacturing. ### Supplier strain Analysts and surveys flagged material strain on suppliers tied to JLR’s volumes, warning of job cuts, reduced hours, and solvency risks if shutdowns persisted, prompting policymakers to monitor the spillover closely as restarts progress. ### Why the loss estimates matter The potential £2 billion impact, combined with weekly cash burn estimates near £50 million during the outage, implies a multi-quarter earnings drag and heightened working-capital needs, particularly given JLR’s ~70% contribution to Tata Motors’ consolidated revenue base. ### Insurance and attribution Reports suggest JLR had not finalized cyber insurance arrangements prior to the incident, a factor amplifying potential direct losses, while attribution remains fluid in public reporting, with references to criminal groups but no formal confirmation from authorities or the company. ### Near-term watchlist - Phased restart cadence across Solihull, Halewood, and Wolverhampton, and knock-on effects on model mix and regional deliveries in Q3–Q4. - Supplier stabilization measures and any government support mechanisms to cushion several weeks of disrupted call-offs and payments. - Updated guidance from Tata Motors on working-capital normalization and any disclosure on insured versus uninsured components of the incident’s cost. ### Market’s recalibration Following the sell-off, incremental recovery in the share price tracked news of system restorations and restart plans, but broader sentiment remains tethered to the speed of plant ramps, supplier resilience, and clarity on the final financial charge relative to FY25 profitability benchmarks.

loading..   27-Sep-2025
loading..   3 min read
loading..

Scattered Spider

A 2025 attack cut Co-op’s revenue by £206m and profit by £80m, revealing identit...

Co-op contained a sophisticated intrusion that avoided ransomware encryption but still triggered prolonged systems downtime, widespread operational disruption, and the exfiltration of member data. The incident resulted in a £206m reduction in revenue and a £80m decrease in first-half operating profit, combining one-off response costs with margin compression from lost sales during outages. Management signaled continued second-half impact; liquidity remained robust, yet insurance did not fully offset losses. ### Timeline of incident overview Late April brought intrusions linked to a ransomware affiliate, prompting a rapid shutdown of critical systems to limit blast radius. Containment averted encryption but required rebuilding core identity infrastructure, extending unavailability. Subsequent investigation confirmed the theft of personal data from 6.5 million members, thereby increasing privacy, phishing, and fraud risks. The response focused on restoring trust in identity, stabilizing store operations, and coordinating with national authorities on an ongoing investigation. ### Operational impact The outages reverberated across payments, allocation, and supply flows, producing empty shelves, skewed category availability, and rural store stress where branches function as essential services. Co-op implemented manual workarounds, prioritized deliveries, and issued targeted member discounts to preserve loyalty. Category volatility was sharp in tobacco and other fast-moving lines, reflecting how allocation logic failures can cascade into outsized sales shocks. ### Financial Impact First-half operating profit declined by £80m, comprising approximately £20m in one-off incident costs and around £60m from lost sales while systems were offline. Top-line revenue reduced by £206m tied to containment and recovery. Management guided to continued second-half headwinds as remediation, hardening, and customer support progressed. Insurance coverage existed but did not make the enterprise whole, underscoring a structural protection gap for cyber-driven business interruption. Governance response posture The company rebuilt Windows domain controllers, tightened identity controls, and expanded member communication around credential hygiene and fraud risks. It coordinated with law enforcement in parallel with sector-wide investigations, while internal recovery teams focused on restoring allocation engines, store systems, and supplier portals. Leadership emphasized balance sheet resilience and access to liquidity, supporting uninterrupted essential services and future network hardening. Sector context and why it matters The event illustrates that retail cyber risk is operational risk: identity, payments, allocation, and logistics are tightly coupled, so containment decisions can stall revenue. Traditional business interruption policies often omit the breadth of cyber scenarios, revealing insurance shortfalls precisely when outages inflate costs. For large retailers, resilient-by-design architectures, offline modes, and privileged access controls are now core to continuity, not optional improvements. Actionable resilience priorities Retailers should ring-fence identity with phishing-resistant MFA, just-in-time privilege elevation, and continuous session risk scoring for administrators. Store systems need pre-built offline modes for POS and inventory so trading continues during isolation. Logistics should maintain a simplified fallback allocation logic to avoid category wipeouts. Telemetry from edge, cloud, and data centers must converge into a unified detection pipeline that automates containment while preserving store function. Treasury buffers and tailored cyber riders should reflect realistic downtime and recovery scenarios rather than narrow operational clauses. Member trust and data stewardship Restoring confidence requires clear notification, practical guidance on passwords and phishing, and stronger authentication for loyalty accounts. Programs should adopt tokenized identifiers, data minimization, and breach-resistant recovery flows to reduce future blast radius. Transparent progress updates, measurable remediation milestones, and visible upgrades to account security help rebuild long-term trust. Strategic outlook Co-op’s planned changes to its commercial and logistics structures, along with targeted growth investments, indicate a “build back stronger” approach centered on operational resilience. For peers, the prudent stance is to assume intrusions are possible, architect for swift isolation with revenue continuity, and align risk financing to the true contours of cyber-driven operational disruption.

loading..   26-Sep-2025
loading..   4 min read
loading..

Entra ID

Azure

The CVE-2025-55241 saga: how unsigned Actor token impersonation broke tenant iso...

CVE-2025-55241 exposed a design intersection where Microsoft’s internal Actor tokens met a tenant-validation gap in the legacy Azure AD Graph API, enabling cross-tenant impersonation up to Global Admin with minimal telemetry and no Conditional Access enforcement. The flaw allowed an attacker to request a legitimate Actor token in any tenant, craft an unsigned impersonation token, and have Azure AD Graph accept it for a different tenant when presented with that tenant’s ID and a valid user netId. Microsoft rapidly mitigated in July 2025 and formalized the CVE in September, reporting no detected abuse while urging migration away from Azure AD Graph to Microsoft Graph. ### Threat model The trust model assumed service-to-service delegation mechanisms would stay within tightly controlled execution paths and tenant boundaries. Actor tokens, intended for backend S2S flows, conferred _“trusted for delegation,”_ enabling a service to operate on behalf of users for specific resources for 24 hours. The boundary violation occurred when Azure AD Graph accepted an unsigned, client-constructed impersonation envelope carrying a valid Actor token, without strictly binding the asserted tenant to the Actor token’s issuing [context](https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/). This shifted the effective trust anchor from verifiable, signed tokens to an unsigned wrapper, collapsing tenant isolation. ### Token anatomy Actor tokens are standard RS256-signed JWTs from Microsoft’s legacy Access Control Service, containing audience claims for the target resource and a delegation indicator. The service that holds one can embed it in an “alg: none” impersonation token where identity is asserted via the nameid/netId tuple, rather than through another signed artifact. The validation break was not in the Actor token itself but in the resource’s acceptance of an unsigned impersonation JWT that supplied a victim tenant ID and a valid netId from that tenant. In effect, the resource treated the unsigned envelope as authoritative context selection, while relying on the embedded Actor token only as a capability grant, rather than as a tenant-bound proof, thereby enabling cross-tenant identity assumption. ### The role of netId/puid The netId (surfacing as puid in access tokens) is a legacy, incremental identifier historically tied to Microsoft account plumbing and used in Entra to map identities, including B2B guests, across tenants. Because netId values are enumerable and not cryptographically random, an attacker could feasibly discover valid netIDs for a target tenant, either by brute force or by harvesting from B2B guest attributes like alternativeSecurityIDs. Once a valid netId was known, the unsigned impersonation envelope could assert that identity inside the victim tenant while the Actor token acted as the generic capability key to Azure AD Graph. ### Why defenses didn’t engage Conditional Access policies did not apply, because the flow never required an interactive user sign-in nor a standard signed access token minted under the victim tenant’s policy regime. Revocation could not help, because the Actor token coursed through the attacker’s tenant and the impersonation token was unsigned and constructed locally. Telemetry was insufficient because Azure AD Graph historically lacked a comprehensive read API logging; read operations could therefore remain invisible, while write operations surfaced in audit logs with confusing principals (user UPN from the impersonation, service display names like Exchange), blending with legitimate system actions. ### Practical Attacker Sequence An attacker would mint an Actor token in a controlled tenant, resolve the target tenant ID, and acquire a valid netId for any user in that tenant. The attacker would then construct an unsigned impersonation token pointing to Azure AD Graph for the victim tenant and issue directory queries. From there, they could enumerate privileged roles, select a Global Admin, reconstruct a new impersonation for that principal, and perform state-changing actions such as creating users, app credentials, or role assignments. A high-leverage variant used B2B trusts to read a guest’s alternativeSecurityIds in one tenant, pivoting to the guest’s home tenant with near-zero API calls per hop, allowing exponential spread across interconnected tenants. ### Observable Traces & Hunting Read-only reconnaissance left no artifacts in the victim tenant due to the legacy API’s limited telemetry, which is precisely why this path was so dangerous. State changes generated audit events, but with a telltale mismatch: InitiatedBy reflected the impersonated user, while display names indicated Microsoft services, such as “Office 365 Exchange Online.” Hunting should prioritize those anomalous combinations while excluding known, legitimate group-creation flows that do use Actor tokens on behalf of users. This signature serves more as a tripwire for past misuse than a comprehensive detector of reconnaissance. ### Remediation Microsoft’s response severed the acceptance path by fixing Azure AD Graph’s tenant validation behavior and subsequently restricting issuance of Actor tokens for Azure AD Graph when requested via service principal credentials. Organizations should retire dependencies on Azure AD Graph in favor of Microsoft Graph, which provides superior API-level logging and policy integration. Posture reviews should include privileged role assignments, application and service principal credentials, and recent administrative actions whose initiators align with user UPNs but bear service display names, with a particular focus on identity-plane modifications that could enable durable persistence. ### Architectural lessons Unsigned, client-assembled impersonation envelopes create an un-auditable control surface that undermines the very purpose of signed tokens and tenant scoping. Service-to-service delegation must preserve cryptographic binding across all layers: the resource should verify both capability and context—audience, tenant, and subject—only from signed artifacts, and reject any unsigned augmentation. Identity-plane resources deserve first-class, comprehensive read telemetry because stealthy directory reconnaissance routinely precedes impactful attacks; absent that, defenders face “perfect-crime” conditions even when perimeter controls appear robust. ### Current State The specific cross-tenant path under [CVE-2025-55241](https://nvd.nist.gov/vuln/detail/CVE-2025-55241) has been closed, and Microsoft reported no evidence of exploitation in the wild during its response window. The durable fix is not merely patching a legacy endpoint but tightening the delegation model: shorten token lifetimes, ensure revocability, enforce tenant-bound validation, and keep all identity-critical traffic on instrumented APIs. Security programs should treat identity-provider APIs as crown-jewel surfaces, subject to the same rigor applied to production data planes, because compromise there cascades into SaaS suites and cloud subscriptions with outsized blast radius.

loading..   24-Sep-2025
loading..   6 min read