company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Data Breach

MailChimp

loading..
loading..
loading..

MailChimp Suffers Another Major Data Breach: Hackers Steal Data of 133 Customers!

MailChimp suffers another data breach with 133 customers affected. Attackers accessed internal customer support and account administration tools through a socia...

19-Jan-2023
4 min read

No content available.

Related Articles

loading..

Entra ID

Azure

The CVE-2025-55241 saga: how unsigned Actor token impersonation broke tenant iso...

CVE-2025-55241 exposed a design intersection where Microsoft’s internal Actor tokens met a tenant-validation gap in the legacy Azure AD Graph API, enabling cross-tenant impersonation up to Global Admin with minimal telemetry and no Conditional Access enforcement. The flaw allowed an attacker to request a legitimate Actor token in any tenant, craft an unsigned impersonation token, and have Azure AD Graph accept it for a different tenant when presented with that tenant’s ID and a valid user netId. Microsoft rapidly mitigated in July 2025 and formalized the CVE in September, reporting no detected abuse while urging migration away from Azure AD Graph to Microsoft Graph. ### Threat model The trust model assumed service-to-service delegation mechanisms would stay within tightly controlled execution paths and tenant boundaries. Actor tokens, intended for backend S2S flows, conferred _“trusted for delegation,”_ enabling a service to operate on behalf of users for specific resources for 24 hours. The boundary violation occurred when Azure AD Graph accepted an unsigned, client-constructed impersonation envelope carrying a valid Actor token, without strictly binding the asserted tenant to the Actor token’s issuing [context](https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/). This shifted the effective trust anchor from verifiable, signed tokens to an unsigned wrapper, collapsing tenant isolation. ### Token anatomy Actor tokens are standard RS256-signed JWTs from Microsoft’s legacy Access Control Service, containing audience claims for the target resource and a delegation indicator. The service that holds one can embed it in an “alg: none” impersonation token where identity is asserted via the nameid/netId tuple, rather than through another signed artifact. The validation break was not in the Actor token itself but in the resource’s acceptance of an unsigned impersonation JWT that supplied a victim tenant ID and a valid netId from that tenant. In effect, the resource treated the unsigned envelope as authoritative context selection, while relying on the embedded Actor token only as a capability grant, rather than as a tenant-bound proof, thereby enabling cross-tenant identity assumption. ### The role of netId/puid The netId (surfacing as puid in access tokens) is a legacy, incremental identifier historically tied to Microsoft account plumbing and used in Entra to map identities, including B2B guests, across tenants. Because netId values are enumerable and not cryptographically random, an attacker could feasibly discover valid netIDs for a target tenant, either by brute force or by harvesting from B2B guest attributes like alternativeSecurityIDs. Once a valid netId was known, the unsigned impersonation envelope could assert that identity inside the victim tenant while the Actor token acted as the generic capability key to Azure AD Graph. ### Why defenses didn’t engage Conditional Access policies did not apply, because the flow never required an interactive user sign-in nor a standard signed access token minted under the victim tenant’s policy regime. Revocation could not help, because the Actor token coursed through the attacker’s tenant and the impersonation token was unsigned and constructed locally. Telemetry was insufficient because Azure AD Graph historically lacked a comprehensive read API logging; read operations could therefore remain invisible, while write operations surfaced in audit logs with confusing principals (user UPN from the impersonation, service display names like Exchange), blending with legitimate system actions. ### Practical Attacker Sequence An attacker would mint an Actor token in a controlled tenant, resolve the target tenant ID, and acquire a valid netId for any user in that tenant. The attacker would then construct an unsigned impersonation token pointing to Azure AD Graph for the victim tenant and issue directory queries. From there, they could enumerate privileged roles, select a Global Admin, reconstruct a new impersonation for that principal, and perform state-changing actions such as creating users, app credentials, or role assignments. A high-leverage variant used B2B trusts to read a guest’s alternativeSecurityIds in one tenant, pivoting to the guest’s home tenant with near-zero API calls per hop, allowing exponential spread across interconnected tenants. ### Observable Traces & Hunting Read-only reconnaissance left no artifacts in the victim tenant due to the legacy API’s limited telemetry, which is precisely why this path was so dangerous. State changes generated audit events, but with a telltale mismatch: InitiatedBy reflected the impersonated user, while display names indicated Microsoft services, such as “Office 365 Exchange Online.” Hunting should prioritize those anomalous combinations while excluding known, legitimate group-creation flows that do use Actor tokens on behalf of users. This signature serves more as a tripwire for past misuse than a comprehensive detector of reconnaissance. ### Remediation Microsoft’s response severed the acceptance path by fixing Azure AD Graph’s tenant validation behavior and subsequently restricting issuance of Actor tokens for Azure AD Graph when requested via service principal credentials. Organizations should retire dependencies on Azure AD Graph in favor of Microsoft Graph, which provides superior API-level logging and policy integration. Posture reviews should include privileged role assignments, application and service principal credentials, and recent administrative actions whose initiators align with user UPNs but bear service display names, with a particular focus on identity-plane modifications that could enable durable persistence. ### Architectural lessons Unsigned, client-assembled impersonation envelopes create an un-auditable control surface that undermines the very purpose of signed tokens and tenant scoping. Service-to-service delegation must preserve cryptographic binding across all layers: the resource should verify both capability and context—audience, tenant, and subject—only from signed artifacts, and reject any unsigned augmentation. Identity-plane resources deserve first-class, comprehensive read telemetry because stealthy directory reconnaissance routinely precedes impactful attacks; absent that, defenders face “perfect-crime” conditions even when perimeter controls appear robust. ### Current State The specific cross-tenant path under [CVE-2025-55241](https://nvd.nist.gov/vuln/detail/CVE-2025-55241) has been closed, and Microsoft reported no evidence of exploitation in the wild during its response window. The durable fix is not merely patching a legacy endpoint but tightening the delegation model: shorten token lifetimes, ensure revocability, enforce tenant-bound validation, and keep all identity-critical traffic on instrumented APIs. Security programs should treat identity-provider APIs as crown-jewel surfaces, subject to the same rigor applied to production data planes, because compromise there cascades into SaaS suites and cloud subscriptions with outsized blast radius.

loading..   24-Sep-2025
loading..   6 min read
loading..

Shineyhunters

Stellantis reveals unauthorized access occurred at a third-party service provide...

In a development that underscores the staggering challenges of digital security in the automotive sector, **Stellantis**, the world’s fourth-largest car manufacturer, confirmed a **data breach involving one of its third-party customer service providers**. While the company asserts there is no evidence that personal account credentials or financial data were stolen, the revelation has ignited concerns about the safety of sensitive customer information and the broader risks of vendor-related cyberattacks. ## How the Stellantis Breach Happened The breach was not a direct attack on Stellantis’ own IT infrastructure but instead occurred through a **vendor system used for customer contact services**. Cybersecurity experts warn that such **supply chain vulnerabilities** have become a favored entry point for attackers. Hackers increasingly exploit weaker links within large corporate ecosystems, gaining access through contracted service providers who may lack the same stringent security defenses. Stellantis reported that once it became aware of the unauthorized access, it **swiftly disabled the compromised vendor’s connection**, launched an immediate forensic investigation, and began working with external cybersecurity specialists to contain the incident. ## What Data Could Be at Risk? Although Stellantis has emphasized that **no payment information, passwords, or personal login credentials appear compromised**, some **customer service records may have been exposed**. These records often contain personal details such as names, email addresses, phone numbers, and service interaction histories. While these data points may seem less sensitive than financial credentials, cybersecurity analysts caution that **attackers can weaponize such information for phishing campaigns**. Armed with names and customer service history, criminals can craft highly convincing scams designed to trick individuals into revealing further personal or financial details. ## Stellantis’ Response to Customers To reassure customers and maintain transparency, Stellantis has: * **Disabled all access** to the affected vendor platform. * **Engaged digital forensic experts** to trace the source and scale of the breach. * **Notified law enforcement agencies**, cooperating fully with ongoing investigations. * **Launched a customer notification program**, informing potentially affected individuals of the risks. * **Encouraged customers** to remain vigilant, avoid suspicious communications, and regularly monitor their online accounts. ## Why This Incident Matters to the Auto Industry The Stellantis breach is part of a troubling pattern: **cybercriminals targeting third-party providers** linked to global corporations. With automakers expanding into digital ecosystems that include **connected cars, subscription services, and customer support platforms**, their exposure to cyber threats grows exponentially. This case reinforces that **data security is no longer confined to company firewalls**. Automakers must scrutinize the cybersecurity measures of every vendor they work with, from IT services and cloud platforms to call centers and marketing agencies. ## Expert Reactions on Vendor-Related Cybersecurity Risks Cybersecurity analysts note that the Stellantis breach reflects the same risks exposed in previous high-profile incidents such as the **SolarWinds attack** and other **supply chain compromises**. These breaches often bypass the fortified defenses of major corporations by slipping in through outsourced contractors or technology partners. According to [specialists](https://media.stellantisnorthamerica.com/newsrelease.do?id=27079&mid=1), **vendor risk management and zero-trust security models** are now essential for corporations handling millions of customer records. This means continuous monitoring of third-party systems, mandatory encryption standards, and contractual obligations to maintain cybersecurity parity with parent companies. ## Protecting Yourself as a Stellantis Customer Stellantis advises customers to take the following proactive steps: 1. **Beware of phishing attempts** that reference Stellantis, Chrysler, Jeep, Dodge, Ram, or related services. 2. **Avoid clicking unknown links** in texts or emails claiming to represent Stellantis customer care. 3. **Check your credit reports** and set up fraud alerts with your bank if unusual activity occurs. 4. **Update your online passwords regularly**, using strong combinations that differ across accounts. Stellantis has promised to **tighten its cybersecurity oversight** and **enhance safeguards for customer data** across all third-party partnerships. As the company continues to expand its digital services, the challenge will be ensuring that every vendor in its global network adheres to the same rigorous standards of data protection. The Stellantis data breach, though reportedly limited in scope, is a wake-up call for the automotive sector. As customer trust hinges on secure data handling, both automakers and their partners face mounting pressure to **prioritize cybersecurity at every level of their supply chain**.

loading..   22-Sep-2025
loading..   4 min read
loading..

Airport

Cyberattack hits Collins Aerospace check-in system, crippling Heathrow, Brussels...

Europe’s busiest airports descended into disarray this weekend after a cyberattack on Collins Aerospace’s *Muse* system, a shared airline check-in and baggage platform, disrupted operations across multiple hubs. Heathrow in London, Brussels Airport, and Berlin’s Brandenburg Airport were hardest hit, forcing thousands of passengers into long queues and prompting airlines to revert to manual systems. The incident began late Friday night and cascaded into Saturday, causing *hundreds of flight delays and cancellations*. While authorities stressed that aviation safety was not compromised, the attack exposed how heavily airports rely on third-party digital infrastructure. ### What Went Wrong At the center of the disruption is Collins Aerospace’s *Multi-User System Environment (Muse)*, software that allows different airlines to share check-in desks and boarding gates. Its outage disabled electronic check-in, boarding pass scanning, and baggage drop services. RTX, Collins Aerospace’s parent company, confirmed a “cyber-related disruption” and said teams were working to restore normal operations. “The impact is limited to electronic customer check-in and baggage drop and can be mitigated with manual check-in operations,” the company said in a statement. British Airways was largely unaffected thanks to a back-up system, but most other carriers using Heathrow were caught in the digital bottleneck. EasyJet and Ryanair, which do not operate from Heathrow, confirmed they were unaffected. ### Airports in Emergency Mode * **Heathrow**: Passengers reported chaotic scenes in Terminals 3 and 4, with two-hour waits at check-in and boarding passes failing to scan at gates. Extra staff were deployed, and airlines resorted to handwriting baggage tags. Despite delays, the airport insisted that “the vast majority of flights have continued to operate.” * **Brussels Airport**: Eurocontrol, Europe’s aviation safety coordinator, ordered airlines to cancel 50% of flights in and out of Brussels until Monday. The airport warned of “large impacts on the flight schedule” with widespread cancellations. * **Berlin Brandenburg**: Officials reported longer wait times as staff manually processed passengers. * **Dublin and Cork**: Minor impacts were noted, with some carriers switching to manual check-in. ### Missed Connections in Frustration For travelers, the disruption was deeply personal. * Lucy Spencer, stuck in Heathrow’s Terminal 4, described “hundreds of people queuing” while staff manually phoned in passenger details. * Monazza Aslam missed her onward connection in Doha after sitting on the tarmac for over an hour, saying: “I’ve been here since 05:00 with my elderly parents. We are hungry and tired.” * Johnny Lal, due to fly to Mumbai for his mother-in-law’s funeral, said his family missed their flight. His mobility-impaired mother was left without support: “They keep just telling us the systems are down.” While some passengers praised airlines for moving queues efficiently and prioritizing urgent flights, overall sentiment was of exhaustion and confusion. ### Official Reactions The UK’s **National Cyber Security Centre (NCSC)** is leading investigations alongside the Department for Transport and law enforcement. A spokesperson confirmed: “We are working with Collins Aerospace and affected airports to fully understand the impact.” At the European level, the **European Commission** said it was “closely monitoring” the cyberattack but noted there was no evidence it was “widespread or severe.” Transport Secretary Heidi Alexander confirmed she was receiving “regular updates” and urged passengers to follow airline advice. ### Who Is Behind It? No group has claimed responsibility, and experts caution against premature conclusions. While some politicians speculated about Kremlin-backed hackers — noting recent Russian incursions into Estonian airspace — security analysts point to the more likely culprits: **criminal ransomware gangs**. These groups, many based in Russia or Eastern Europe, have earned billions through extortion, often disrupting critical services to demand payment in cryptocurrency. Cybersecurity researchers noted similarities to ransomware attacks that hit Las Vegas casinos and major UK retailers last year. However, until Collins Aerospace discloses more technical details, theories remain speculative. Travel journalist Simon Calder summarized the stakes: “At Heathrow, any disruption is serious. Departure control is complex, and if one node fails — in Brussels, in Berlin — pilots, planes, and passengers are all out of place. Things can get a lot worse before they get better.” Until answers emerge, airlines and passengers alike are bracing for turbulence on the ground — long before take-off.

loading..   21-Sep-2025
loading..   4 min read