company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Signzy

Data Security

loading..
loading..
loading..

Indian ID Verification Startup Faces Cyberattack, Impact Under Investigation

Signzy, an online ID verification company, has confirmed a cybersecurity incident that may have exposed customer data. While some clients, including PayU and IC...

03-Dec-2024
4 min read

No content available.

Related Articles

loading..

CWMP

RCE

A critical zero-day flaw in TP-Link routers allows remote code execution. CISA w...

The cybersecurity landscape for consumer and small business networking equipment is under intense scrutiny following the disclosure of a new, unpatched zero-day vulnerability in TP-Link routers. This discovery is critically contextualized by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) simultaneously warning of active, in-the-wild exploitation of two older TP-Link flaws. This confluence of events underscores a persistent and systemic challenge: the fragility of widely deployed network infrastructure and the sophisticated economy of botnets that prey upon it. ### **New CWMP Zero-Day** #### **Core Vulnerability Mechanics** * **Nature of the Flaw:** A **classical stack-based buffer overflow** vulnerability located within the firmware's implementation of the CPE WAN Management Protocol (CWMP), also known as TR-069. * **Root Cause:** Improper bounds checking in critical C library functions (`strncpy`) when processing SOAP-based `SetParameterValues` messages. This allows data exceeding the allocated stack buffer size (~3072 bytes) to overwrite adjacent memory. * **Exploitation Pathway:** 1. **Server Redirection:** An attacker must first redirect the target router to a malicious CWMP server. This could be achieved through: * DNS spoofing or poisoning. * Exploitation of a separate vulnerability or misconfiguration. * Compromise of the legitimate Auto Configuration Server (ACS). 2. **Payload Delivery:** The malicious ACS server responds to the router's request with a specially crafted SOAP message containing an oversized value for a specific parameter. 3. **Execution Flow Hijack:** The overflow corrupts the call stack, potentially allowing an attacker to overwrite the return address and seize control of the program's execution flow, leading to Remote Code Execution (RCE). #### **Affected Components and Scope** * **Vulnerable Function:** The `sscanf` function within the `tddp` (TP-Link Device Debug Protocol) component or a related service parsing CWMP instructions. * **Confirmed Impacted Devices:** Archer AX10 (v1.6 and prior), Archer AX1500 (v1.2 and prior). * **Potentially Vulnerable Models:** Analysis of binary code suggests similar code structures in EX141, Archer VR400, and TD-W9970 models, implying a broader potential impact across TP-Link's product lines. #### **Patch Timeline** * **Disclosure:** Reported to TP-Link by researcher **Mehrun (@ByteRay0)** on May 11, 2024. * **Patch Discrepancy:** A patch has been developed and released for **European firmware versions**, highlighting regional fragmentation in update pipelines. A fix for **U.S. and global firmware versions remains in development**, leaving a significant portion of the user base exposed indefinitely. * **CVE Assignment:** As of this writing, the vulnerability has not been assigned a CVE identifier, complicating tracking and mitigation efforts for organizations. ### **CISA's KEV Catalog and Active Exploitation** #### **CVE-2023-50224 & CVE-2025-9377** CISA [added](https://www.cisa.gov/news-events/alerts/2025/09/03/cisa-adds-two-known-exploited-vulnerabilities-catalog) these two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, mandating remediation for federal agencies and signaling urgent broader importance. * **CVE-2023-50224 (Auth Bypass):** An authentication bypass flaw in the `httpd` service on certain routers. Exploitation allows an unauthenticated attacker to retrieve sensitive files, including the password file (`/tmp/dropbear/dropbearpwd`) for the router's SSH service. * **CVE-2025-9377 (Command Injection):** A command injection vulnerability in the `wl_band_switch` function. By injecting malicious commands into a POST request, attackers can execute arbitrary code on the device. * **Chained Impact:** These vulnerabilities are not exploited in isolation. Attackers first use **[CVE-2023-50224](https://www.cve.org/CVERecord?id=CVE-2023-50224)** to steal legitimate admin credentials. They then leverage these credentials to authenticate and trigger **[CVE-2025-9377](https://nvd.nist.gov/vuln/detail/CVE-2025-9377)**, achieving unauthenticated remote code execution with high privileges. #### **Quad7 Botnet** * **Attribution:** This activity is attributed to a cybercriminal group tracked as **Storm-0940** (Microsoft) and their infrastructure, the **Quad7 botnet**. * **Operational Objectives:** The primary goal is not to disrupt the routers but to conscript them into a resilient proxy network. * **Attack Lifecycle:** 1. **Initial Compromise:** Exploit the chained vulnerabilities to gain root shell access. 2. **Persistence & Malware Deployment:** Install a custom binary that maintains a persistent connection to a Command and Control (C2) server. 3. **Proxyization:** The compromised router is transformed into a SOCKS5 proxy node, blending its traffic with legitimate user traffic. 4. **Weaponization:** This proxy network is then sold or rented to other threat actors to launch attacks, such as credential stuffing and password sprays against high-value targets like Microsoft 365, effectively obfuscating the attack source. ### **A Layered Defense Approach** #### **Immediate Compensating Controls** * **Disable CWMP/TR-069:** If this feature is not explicitly required by your Internet Service Provider (ISP) for management, disable it immediately in the router's administration interface. * **Credential Hygiene:** Change all default administrator passwords to complex, unique passphrases. This mitigates against easy post-exploitation lateral movement. * **Network Segmentation:** Place routers in a dedicated network segment, isolating them from critical internal LAN assets. This contains potential lateral movement following a compromise. * **Firmware Updates:** Apply the latest available firmware for your specific model and region immediately. For EoL devices, replacement is the only secure option. #### **Proactive Security Posturing** * **Supply Chain Vigilance:** Prefer vendors with a public and transparent commitment to "Secure by Design" principles, long-term support guarantees, and rapid response to disclosures. * **Continuous Monitoring:** Implement network monitoring to detect anomalies such as unexpected outbound connections, DNS queries to suspicious domains, or changes to router configuration. * **Policy Enforcement:** Enforce MFA on all cloud services (e.g., Office 365) to neutralize the threat of password spray attacks originating from such proxy botnets. ### **Broader Analysis** #### **Vendor Accountability and the IoT Security Crisis** This incident exemplifies the chronic security challenges in the consumer IoT space: * **Patch Fragmentation:** The delayed and region-locked patch rollout creates a fractured defense posture, leaving millions vulnerable. * **End-of-Life Problems:** Many exploited devices are technically EoL, yet their widespread deployment creates a massive, persistent attack surface that cannot be easily remediated. * **Systemic Risks:** Vulnerabilities in network edge devices provide a perfect launchpad for large-scale attacks against critical infrastructure and cloud services, representing a clear supply chain risk. #### **Evolving Botnet Economy** The Quad7 campaign illustrates a shift from disruptive DDoS-focused botnets to stealthy, profit-driven operations. These modern botnets prioritize persistence and anonymity, turning compromised devices into a commodity for other cybercriminals, thereby increasing the sophistication and scale of the overall threat landscape. The TP-Link vulnerabilities are not an isolated incident but a symptom of a larger systemic issue. It necessitates a paradigm shift from both vendors and consumers. Vendors must embrace radical transparency, invest in secure development lifecycles, and guarantee consistent support. Consumers and organizations must treat network infrastructure not as simple appliances but as critical, internet-facing endpoints, applying rigorous security hygiene and demanding higher standards from manufacturers. The security of the internet's edge depends on it.

loading..   05-Sep-2025
loading..   6 min read
loading..

Chess

Chesscom confirms data breach via third-party app affecting 4,500 users, raising...

In June 2025, Chess.com, the world’s largest online chess platform with more than 150 million registered members, disclosed a **data breach that impacted just over 4,500 users**. On the surface, the breach appears minimal—barely 0.003% of its user base. Yet the details reveal something far more important than raw numbers: the enduring fragility of third-party integrations in modern digital ecosystems. The breach occurred through a **third-party file transfer application**, a category of software that has repeatedly served as an entry point for attackers in incidents such as MOVEit, Accellion, and GoAnywhere. According to Chess.com, the intrusion window spanned from **June 5 through June 18**, with detection occurring on **June 19**. While the company acted quickly to contain the incident, investigate with the help of forensic experts, and notify federal law enforcement, the event underscores how external dependencies continue to expand the attack surface. ### What Was Exposed The compromised dataset consisted of **Personally Identifiable Information (PII)**, such as user names and identifiers. Importantly, there was no exposure of payment data or direct access to Chess.com’s core platform infrastructure. As of this writing, there is no evidence that the data has been circulated publicly or weaponized. Still, the availability of even limited PII can provide attackers with building blocks for **credential stuffing campaigns, phishing operations, and social engineering against affected individuals**. ### A Praiseworthy but Imperfect Response To Chess.com’s credit, the organization demonstrated maturity in its **incident response posture**. Detection occurred relatively quickly compared to industry averages, where intrusions often linger for months undetected. Users were informed transparently, regulators were notified where applicable, and remediation was tangible: affected accounts were offered **one to two years of identity theft protection and credit monitoring services**. This level of transparency and speed contrasts favorably with the often opaque or delayed disclosures that characterize breaches in other industries. From a crisis management perspective, Chess.com earns high marks. However, praise must be tempered with realism. Credit monitoring is **inherently reactive**, offering a safety net after the fact rather than addressing the structural vulnerabilities that allowed the breach to occur in the first place. ### Supply-Chain Fragility What makes this breach consequential is not the scale but the **pattern it reinforces**. Third-party service providers—file transfer applications in particular—remain a **systemic risk multiplier**. Organizations may enforce rigorous controls internally, but the moment sensitive data crosses into an external platform, it inherits that vendor’s security posture. CISOs and CSOs recognize this problem all too well: * **Vendor risk assessments are often point-in-time, not continuous.** * **Telemetry from external systems rarely integrates into enterprise SIEM or SOAR pipelines.** * **Data minimization is inconsistently applied**, allowing PII to sit unnecessarily in vendor systems. In Chess.com’s case, the reliance on a file transfer service that became a breach vector mirrors the exact weaknesses exploited in the MOVEit and Accellion campaigns. For attackers, supply-chain nodes remain high-yield targets because they aggregate data across multiple clients and often lack the hardened defenses of primary enterprise infrastructure. ### Strategic Implications While the breach is small in numerical terms, it still carries **regulatory obligations under GDPR, CCPA, and other privacy frameworks**. The exposure of PII, even at limited scale, triggers compliance scrutiny. With the acceleration of **AI-driven privacy regulation** worldwide, enterprises are expected to enforce not just internal safeguards but **continuous oversight of vendor ecosystems**. From a governance standpoint, this raises difficult questions: **where does liability begin and end when the compromise originates from a vendor environment?** Boards and executive security leaders will need to scrutinize contract language, indemnification clauses, and—more importantly—risk tolerance for third-party dependencies. ### Final Analysis Chess.com’s handling of this incident was, by most measures, **effective and transparent**. But it would be misleading to frame the response as flawless. The real takeaway is that **even well-managed platforms remain vulnerable when their security is chained to external vendors**.

loading..   04-Sep-2025
loading..   4 min read
loading..

DDoS Attack

Cloudflare auto-mitigated a record 11.5 Tbps UDP flood from Google Cloud in 35s ...

Cloudflare says it has automatically blocked the largest volumetric DDoS attack ever observed, a **UDP flood that spiked to 11.5 terabits per second** and **lasted \~35 seconds**. The company added that the traffic **mostly originated from Google Cloud** and arrived amid **“hundreds” of hyper-volumetric attacks** seen in recent weeks. *(Note: despite the article slug reading “115,” the reported peak is **11.5** Tbps.)* ## Why this is historic At **11.5 Tbps**, the new peak surpasses Cloudflare’s **7.3 Tbps** record disclosed in June 2025 and the **3.8 Tbps** bar set in October 2024. Microsoft previously reported a **3.47 Tbps** mitigation in 2022. The fresh milestone shows attack capacity is still climbing, fast. ## Anatomy of the blast * **Vector:** **UDP flood** (bandwidth-saturating, connectionless packets). * **Burstiness:** **\~35s** duration, consistent with recent short, high-intensity “hyper-volumetric” surges. * **Scale:** Cloudflare noted **peaks of 5.1 Bpps** (billions of packets per second) alongside **11.5 Tbps** during the recent wave. * **Source profile:** “Mainly” from **Google Cloud**—typical of today’s DDoS where abused cloud instances can marshal enormous, transient firepower. ## How Cloudflare absorbed it—at wire speed Cloudflare’s mitigation is **autonomous and distributed**. Each edge server runs the in-house **`dosd`** (denial-of-service daemon) for instant detection and filtering, complemented by **`flowtrackd`** for stateful protection of complex flows. Decisions happen at the edge without centralized consensus, cutting reaction times to seconds. The scale rides on a **405 Tbps Anycast network** designed to soak bandwidth floods before they localize impact. ## The broader trend: hyper-volumetric is the new normal Cloudflare’s recent threat reports chart an aggressive rise in volumetric events. In **Q2 2025**, it recorded **the then-largest 7.3 Tbps** and **4.8 Bpps** attacks while blocking **6,500+ hyper-volumetric** events that quarter. Earlier, Cloudflare tallied **21.3 million** DDoS mitigations across **2024** and **20.5 million** in **Q1 2025** alone, including **6.6 million** strikes directly against its own backbone in an **18-day** multi-vector campaign. The new 11.5 Tbps spike extends that arc. ## How it compares—recent records at a glance * **Sep 2025:** **11.5 Tbps** UDP flood, mostly from Google Cloud; \~35s. * **May/Jun 2025:** **7.3 Tbps** attack on a hosting provider; \~45s; largely UDP; “carpet-bombing” across many ports. * **Oct 2024:** **3.8 Tbps / \~65s** hyper-volumetric L3/4 campaign. * **Jan 2022:** **3.47 Tbps** on an Azure customer (Microsoft). ## What this means for defenders (actionable takeaways) 1. **Assume bursts, not sieges.** Modern floods compress devastating throughput into sub-minute windows; tune detection & alerting for **seconds-level** granularity. 2. **Push filtering to the edge.** On-prem scrubbing alone can be too late. Prefer **always-on, autonomous mitigation** with global Anycast capacity. 3. **Harden UDP exposure.** Inventory UDP services, restrict to business-critical ports, and apply **stateless filters / rate limits** close to ingress. 4. **Spoofing resistance upstream.** Work with ISPs and cloud partners on **ingress filtering** and abuse handling to blunt reflection/amplification potential. *(Industry best practice; aligns with provider guidance.)* 5. **Exercise runbooks for 30–60s shocks.** Simulate hyper-volumetric bursts to validate telemetry, auto-mitigation, and comms in the first minute. ## Open questions we’re watching * **Victim & motive:** The target of the 11.5 Tbps surge wasn’t named; attribution and motive remain unconfirmed. * **Abuse pathways in cloud:** How attackers marshalled such momentary scale from Google Cloud—and what countermeasures follow—will shape future resilience. ## Bottom line The 11.5 Tbps peak is a **step-change, not a blip**. Short, furious floods launched from powerful cloud footprints are redefining DDoS economics. Cloudflare’s autonomous edge and massive Anycast backbone proved decisive this time; everyone else should calibrate defenses to **match the new tempo**.

loading..   02-Sep-2025
loading..   4 min read