company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Automotive

loading..
loading..
loading..

Major Cyberattack Cripples Jaguar Land Rover Operations Worldwide

Jaguar Land Rover crippled by cyberattack; production halted, staff sent home, and recovery may take weeks amid supply-chain turmoil and NCSC probe.

09-Sep-2025
14 min read

No content available.

Related Articles

loading..

iCloud

Attackers exploit iCloud Calendar invites via Apple servers to deliver phishing ...

Attackers are creating **iCloud Calendar events** whose **Notes/DESCRIPTION** field contains a classic **refund/billing lure** (e.g., fake **\$599 [PayPal](https://www.secureblink.com/cyber-security-news/35-000-pay-pal-users-data-exposed-in-credential-stuffing-attack-1)** charge) plus a **“call us”** number. They invite a **Microsoft 365 address that’s a forwarding list**, so Apple’s servers send the calendar invite, and **Microsoft’s SRS** preserves SPF alignment when it gets forwarded. Result: the email shows **From: [noreply@email.apple.com](mailto:noreply@email.apple.com)** with **SPF, DKIM, DMARC all passing**; many gateways and users treat it as trusted. Calling the number leads to **callback social engineering** and potential **remote-access malware/financial theft**. ### Why it’s hard to block: * **Authentic infrastructure:** Source IP 17.23.6.69 is in Apple’s **17.0.0.0/8** network; DKIM=pass, DMARC=pass for `email.apple.com`. Gateways often soften inspection when major brands fully authenticate. * **Forwarding resiliency via SRS:** Microsoft 365 rewrites the **envelope sender** on forwarded mail (not the visible header), so **SPF keeps passing** after list forwarding. ([Microsoft Learn][3]) * **Legitimate feature abuse, not an exploit:** It’s a normal **iCalendar** (RFC 5545) invite with **METHOD\:REQUEST** and phishing text in the **DESCRIPTION** (Notes). No vulnerability required. ## What’s actually happening (annotated) **Observed message traits:** * Visible sender: `noreply@email.apple.com` * **Authentication-Results** example: ``` spf=pass (sender IP is 17.23.6.69) smtp.mailfrom=email.apple.com; dkim=pass (signature was verified) header.d=email.apple.com; dmarc=pass action=none header.from=email.apple.com; ``` * Body content carried in the **iCloud Calendar invite** (Notes/DESCRIPTION) with a **callback number** (e.g., +1-786-902-8579) and a **fake PayPal charge (\$599)**. * Target recipient: a Microsoft 365 address (likely a **mailing list**) that forwards to many recipients; Microsoft 365 applies **SRS** so **Return-Path** shows an SRS-rewritten value while the visible **From:** remains Apple. **Why the signals are green:** * **SPF** authorizes Apple IPs to send for `email.apple.com` (the envelope MAIL FROM). * **DKIM** cryptographically ties the message to `email.apple.com`. * **DMARC** aligns the visible From: with at least one passing mechanism, so it **passes**. (SPF: RFC 7208; DKIM: RFC 6376; DMARC: RFC 7489). **About Apple IP 17/8:** The sender example **17.23.6.69** sits in Apple’s long-held **17.0.0.0/8** allocation (ARIN/Apple guidance), so IP reputation alone won’t flag it. **About the calendar format:** The payload is a standard **iCalendar** object per **RFC 5545**; the **DESCRIPTION** (aka “Notes”) is simply text and can contain phone numbers, URLs, or scare-copy. Nothing exotic—just a trustworthy wrapper. ## Threat model & kill chain 1. **Setup** — Attacker creates an iCloud Calendar event; puts **lure text + callback** in DESCRIPTION (Notes). 2. **Targeting** — Invites a **Microsoft 365 list** (e.g., `Billing3@...onmicrosoft.com`) so Apple’s system sends the invite email. 3. **Delivery** — Email originates from Apple, passes **SPF/DKIM/DMARC**; after list forwarding, **SRS** retains SPF pass. 4. **Social engineering** — Victim calls; attacker escalates to **remote-access “refund” support** flow → risk of **funds theft/malware/data exfiltration**. ## What **doesn’t** work well * **Blocking by sender domain/IP**: `apple.com` + **17/8** are legitimate; you’ll break real Apple traffic. ([whois.arin.net][2]) * **Relying solely on DMARC/SPF/DKIM**: These prove **authenticity of the sender domain**, not **legitimacy of the content**. (That’s by design in the RFCs.) * **Attachment-only inspection**: Not all calendar invites are attachments (`.ics`); many are inline with **`Content-Type: text/calendar`**, so “attachment-content” rules can miss them. (Use header/content checks too.) ## Pragmatic defenses > Aim for **context-aware detections** that target *calendar messages with financial/urgent callback language*, not “Apple” as a brand. ### 1) Mail flow rules that target **calendar content** * **Condition:** *Message header includes* `Content-Type` with `text/calendar` (or *matches pattern* `text/calendar`). * **AND**: *Message body or headers include words/patterns* like `PayPal`, `charged`, `refund`, `call`, currency amounts, or phone numbers. * **Action:** prepend a warning, add high-risk SCL, or quarantine for moderation. Microsoft 365 supports **message-header** predicates and **regex** in rules; use them to key off `Content-Type` and suspicious phrases. **Example (conceptual) rule logic** * *If* `A message header includes` → Header name: `Content-Type` → Value contains `text/calendar` * *And* `The subject or body matches` → regex set (see below) * *Then* → Quarantine or prepend banner **Regex snippets (common English lures)** # US phone numbers (+1 optional), allow separators/spaces (?i)\b(\+?1[\s\-\.]?)?\(?\d{3}\)?[\s\-\.]?\d{3}[\s\-\.]?\d{4}\b # Urgent payment/cancellation lexicon (?i)\b(paypal|charged|debited|invoice|refund|cancel|billing|transaction)\b # Currency amounts like $599.00 (?i)\$\s?\d{2,4}(\.\d{2})? ``` > Tip: Keep a separate allow-list exception **only** for known calendar partners to limit false positives. ### 2) Inspect attachments **and** inline calendar parts Where invites **are** `.ics` files, you can still use **attachment inspection** in Exchange Online; but also add **header/body** rules so inline invites are covered. (See attachment inspection & predicates docs.) ### 3) Advanced Hunting (Defender for O365/M365) Hunt for **calendar messages** with callback indicators. **KQL (illustrative)** ```kusto EmailEvents | where Timestamp > ago(14d) | where SenderFromDomain =~ "email.apple.com" or NetworkMessageId in ( EmailHeaders | where Name =~ "Content-Type" and tostring(Value) contains "text/calendar" | distinct NetworkMessageId ) | extend hasCallbackPhone = iff(Subject has "call", true, false) | summarize count(), any(Subject), any(SenderFromAddress) by RecipientEmailAddress | order by count_ desc ``` > Swap in body inspection via `EmailUrlInfo`/`EmailAttachmentInfo` joins where available, or use `EmailHeaders` to key on `Content-Type`. (Field availability varies by license/telemetry tier.) ### 4) User-experience hardening * **Banner external calendar messages** and teach users **“DMARC pass ≠ safe.”** * **Optional (high-risk groups):** Turn off **auto-processing** of meeting requests so invites aren’t silently added; users must accept manually, improving scrutiny. (Outlook setting under *File → Options → Mail → Tracking*). ([Microsoft Support][10]) ### 5) SOC playbook (callback phish) 1. **Contain**: Block the **callback number** at voice gateways; add to TI. 2. **Hunt**: Search for the number in **mail & chat**, and for **remote-tool beacons** post-call. 3. **Notify**: Targeted users; emphasize **do not call** unsolicited numbers. 4. **Eradicate**: Remove invites, revoke any installed remote tools, reset creds if screen-sharing occurred. ## Technical appendix ### A) Why this survives forwarding **Sender Rewriting Scheme (SRS)** in Microsoft 365 rewrites the **P1 (envelope) MAIL FROM** when a message is forwarded externally, preserving **SPF** when the forwarder sends on someone’s behalf. The **P2 (visible From:)** stays as the original (Apple), so **DMARC still aligns**. ([Microsoft Learn][3]) **Observed in the wild:** ``` Original Return-Path: noreply@email.apple.com Rewritten Return-Path: bounces+SRS=...@<tenant>.onmicrosoft.com ``` ### B) iCalendar anatomy you can key on Core elements from **RFC 5545** (typical malicious invites will have these): ``` BEGIN:VCALENDAR METHOD:REQUEST BEGIN:VEVENT SUMMARY: <often a fake order/charge> DESCRIPTION: <lure text with phone # or link> ORGANIZER;CN=<iCloud user>:mailto:<...> ATTENDEE;CN=<list or target>:mailto:<...> END:VEVENT END:VCALENDAR ``` Focus your rules on `Content-Type: text/calendar`, `METHOD:REQUEST`, and **DESCRIPTION** keywords. ([IETF Datatracker][4]) ### C) Why email auth won’t save you * **SPF** authorizes the sending server for the *envelope* domain. * **DKIM** attests message integrity & signer domain. * **DMARC** checks alignment of visible From: with SPF/DKIM results and applies a sender-published policy. None of these assess **message intent**; a **legit sender can send malicious content** (abuse). ([IETF Datatracker][6]) ## Indicators (from the report; rotate fast in practice) * **Sender/Domain:** `noreply@email.apple.com` * **Auth-Results:** `spf=pass` (IP like **17.23.6.69**), `dkim=pass` (`d=email.apple.com`), `dmarc=pass` * **Lure keywords:** “PayPal”, “\$599”, “refund”, “call/support” * **Callback example:** `+1 (786) 902-8579` Treat these as **patterns**, not fixed IOCs. | Step | Risk Factor | Your Defensive Action | | ---- | ---------------------------------------------------------------- | --------------------------------------------------------- | | 1⃣ | iCloud Calendar invite with purchase notification in Notes | Treat unexpected invites with high suspicion | | 2⃣ | From email appears to be legitimate Apple address | Don’t trust just the sender—analyze content and context | | 3⃣ | Microsoft 365 forwarding preserves deliverability & authenticity | Recognize SRS behavior but focus on suspicious content | | 4⃣ | Callback phishing leads to remote access/malware installation | Never install tools or provide access based on such calls | This method combines the trust in Apple’s email infrastructure with Microsoft 365's SRS mechanism to create phishing messages that appear both legitimate and technically authenticated. It’s a step beyond usual phishing tactics, blending familiarity with advanced email spoofing to successfully bypass defenses.

loading..   09-Sep-2025
loading..   7 min read
loading..

NPM

Supply Chain

Hijacked npm packages with 2.6B weekly downloads spread crypto-stealing malware,...

JavaScript ecosystem experienced one of its most severe supply-chain compromises to date. Attackers infiltrated the npm account of a prominent maintainer and inserted malicious code into **18 popular packages**, including *chalk*, *debug*, and *ansi-styles*. Together, these libraries are downloaded more than **2.6 billion times every week**, meaning the poisoned code had the potential to propagate across countless applications, frameworks, and enterprises worldwide. Unlike previous incidents where malware reached [npm](https://www.secureblink.com/cyber-security-news/top-npm-package-is-hijacked-secret-malware-spreads-in-dev-supply-chain-attack) through newly published typosquats, this breach leveraged the credibility of **high-trust maintainers**. The attackers’ strategy demonstrates both the fragility of open-source distribution channels and the sophistication of modern adversaries targeting developers. ## How the Attack Transpired The breach began with a **spear-phishing email** sent to [Josh Junon](https://bsky.app/profile/bad-at-computer.bsky.social/post/3lydmyzpwa22s) (known online as *[Qix](https://www.npmjs.com/~qix)*), maintainer of several foundational JavaScript packages. The email came from a spoofed domain, `npmjs.help`, and [warned](https://bsky.app/profile/bad-at-computer.bsky.social/post/3lydioq5swk2y) of an impending account lockout scheduled for September 10. To “resolve” the issue, the maintainer was directed to a convincing clone of the official [npm](https://bsky.app/profile/bad-at-computer.bsky.social/post/3lydje4zqis2y) login portal. Once credentials and two-factor authentication codes were harvested, the attackers logged into the legitimate npm account and began publishing new versions of widely used packages. Because the versions appeared authentic and came from a trusted maintainer, automated dependency resolution tools quickly propagated the tainted updates into developer environments. ## Malicious Payload Analysis of the injected code reveals a **lightweight but effective cryptocurrency stealer**. Hidden in initialization routines, the payload executed only under specific conditions: * **Targeted Execution**: Triggered when `NODE_ENV=production`, reducing the chance of detection during development. * **Network Hooking**: Intercepted `XMLHttpRequest` and `WebSocket` calls to wallet providers such as MetaMask. * **Transaction Hijacking**: Substituted legitimate destination wallet addresses with attacker-controlled ones. * **Stealth Features**: No external requests or large dependencies were added, minimizing observable changes in behavior. This design shows an acute awareness of how developers audit code: subtle, conditional, and deeply embedded, it blended seamlessly with legitimate logic. ## Scope of Impact The scale of potential impact is staggering. *chalk* alone is a ubiquitous dependency for styling terminal [output](https://github.com/orgs/community/discussions/172738), embedded in countless tools from build systems to testing frameworks. *debug* underpins logging across major Node.js applications. Through **transitive dependencies**, millions of developers and organizations could have unknowingly introduced the malware into their build pipelines and runtime environments. While npm security teams acted quickly to unpublish the compromised versions, the window of exposure—measured in hours, not weeks—was sufficient for global uptake. Whether the payload successfully redirected cryptocurrency transactions at scale remains under investigation. This attack is not just another data point in the long history of supply-chain compromises. It underscores several systemic issues: 1. **Human Factors Outpace Technical Safeguards** Even with two-factor authentication, phishing can capture live codes and bypass protections. Hardware keys with WebAuthn provide far stronger resistance. 2. **Dependency Chains Multiply Risk** Developers rarely import these packages directly. Instead, they flow transitively through larger frameworks. That makes risk assessment and mitigation far harder. 3. **Trust Model Limitations** npm’s security relies heavily on the assumption that verified maintainers will remain uncompromised. This single point of trust creates a wide attack surface. ## Defensive Measures For developers and organizations concerned about exposure, immediate steps include: * **Audit and Pin**: Check dependency trees for the specific compromised versions and downgrade or pin to safe releases. Avoid using loose semantic ranges until ecosystems stabilize. * **Use Internal Registries**: Proxy packages through controlled artifact repositories like Artifactory, Nexus, or Verdaccio. This ensures malicious versions can be quarantined before internal use. * **Adopt Runtime Scanning**: Apply sandbox analysis or dynamic behavior detection to new dependencies before they reach production environments. * **Strengthen Authentication**: Encourage maintainers and internal teams to migrate from TOTP-based 2FA to phishing-resistant hardware keys. At the ecosystem level, greater adoption of **cryptographic package signing (e.g., Sigstore)** could provide an additional verification layer, ensuring consumers can detect tampering even if a maintainer account is compromised.

loading..   09-Sep-2025
loading..   4 min read
loading..

CWMP

RCE

A critical zero-day flaw in TP-Link routers allows remote code execution. CISA w...

The cybersecurity landscape for consumer and small business networking equipment is under intense scrutiny following the disclosure of a new, unpatched zero-day vulnerability in TP-Link routers. This discovery is critically contextualized by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) simultaneously warning of active, in-the-wild exploitation of two older TP-Link flaws. This confluence of events underscores a persistent and systemic challenge: the fragility of widely deployed network infrastructure and the sophisticated economy of botnets that prey upon it. ### **New CWMP Zero-Day** #### **Core Vulnerability Mechanics** * **Nature of the Flaw:** A **classical stack-based buffer overflow** vulnerability located within the firmware's implementation of the CPE WAN Management Protocol (CWMP), also known as TR-069. * **Root Cause:** Improper bounds checking in critical C library functions (`strncpy`) when processing SOAP-based `SetParameterValues` messages. This allows data exceeding the allocated stack buffer size (~3072 bytes) to overwrite adjacent memory. * **Exploitation Pathway:** 1. **Server Redirection:** An attacker must first redirect the target router to a malicious CWMP server. This could be achieved through: * DNS spoofing or poisoning. * Exploitation of a separate vulnerability or misconfiguration. * Compromise of the legitimate Auto Configuration Server (ACS). 2. **Payload Delivery:** The malicious ACS server responds to the router's request with a specially crafted SOAP message containing an oversized value for a specific parameter. 3. **Execution Flow Hijack:** The overflow corrupts the call stack, potentially allowing an attacker to overwrite the return address and seize control of the program's execution flow, leading to Remote Code Execution (RCE). #### **Affected Components and Scope** * **Vulnerable Function:** The `sscanf` function within the `tddp` (TP-Link Device Debug Protocol) component or a related service parsing CWMP instructions. * **Confirmed Impacted Devices:** Archer AX10 (v1.6 and prior), Archer AX1500 (v1.2 and prior). * **Potentially Vulnerable Models:** Analysis of binary code suggests similar code structures in EX141, Archer VR400, and TD-W9970 models, implying a broader potential impact across TP-Link's product lines. #### **Patch Timeline** * **Disclosure:** Reported to TP-Link by researcher **Mehrun (@ByteRay0)** on May 11, 2024. * **Patch Discrepancy:** A patch has been developed and released for **European firmware versions**, highlighting regional fragmentation in update pipelines. A fix for **U.S. and global firmware versions remains in development**, leaving a significant portion of the user base exposed indefinitely. * **CVE Assignment:** As of this writing, the vulnerability has not been assigned a CVE identifier, complicating tracking and mitigation efforts for organizations. ### **CISA's KEV Catalog and Active Exploitation** #### **CVE-2023-50224 & CVE-2025-9377** CISA [added](https://www.cisa.gov/news-events/alerts/2025/09/03/cisa-adds-two-known-exploited-vulnerabilities-catalog) these two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, mandating remediation for federal agencies and signaling urgent broader importance. * **CVE-2023-50224 (Auth Bypass):** An authentication bypass flaw in the `httpd` service on certain routers. Exploitation allows an unauthenticated attacker to retrieve sensitive files, including the password file (`/tmp/dropbear/dropbearpwd`) for the router's SSH service. * **CVE-2025-9377 (Command Injection):** A command injection vulnerability in the `wl_band_switch` function. By injecting malicious commands into a POST request, attackers can execute arbitrary code on the device. * **Chained Impact:** These vulnerabilities are not exploited in isolation. Attackers first use **[CVE-2023-50224](https://www.cve.org/CVERecord?id=CVE-2023-50224)** to steal legitimate admin credentials. They then leverage these credentials to authenticate and trigger **[CVE-2025-9377](https://nvd.nist.gov/vuln/detail/CVE-2025-9377)**, achieving unauthenticated remote code execution with high privileges. #### **Quad7 Botnet** * **Attribution:** This activity is attributed to a cybercriminal group tracked as **Storm-0940** (Microsoft) and their infrastructure, the **Quad7 botnet**. * **Operational Objectives:** The primary goal is not to disrupt the routers but to conscript them into a resilient proxy network. * **Attack Lifecycle:** 1. **Initial Compromise:** Exploit the chained vulnerabilities to gain root shell access. 2. **Persistence & Malware Deployment:** Install a custom binary that maintains a persistent connection to a Command and Control (C2) server. 3. **Proxyization:** The compromised router is transformed into a SOCKS5 proxy node, blending its traffic with legitimate user traffic. 4. **Weaponization:** This proxy network is then sold or rented to other threat actors to launch attacks, such as credential stuffing and password sprays against high-value targets like Microsoft 365, effectively obfuscating the attack source. ### **A Layered Defense Approach** #### **Immediate Compensating Controls** * **Disable CWMP/TR-069:** If this feature is not explicitly required by your Internet Service Provider (ISP) for management, disable it immediately in the router's administration interface. * **Credential Hygiene:** Change all default administrator passwords to complex, unique passphrases. This mitigates against easy post-exploitation lateral movement. * **Network Segmentation:** Place routers in a dedicated network segment, isolating them from critical internal LAN assets. This contains potential lateral movement following a compromise. * **Firmware Updates:** Apply the latest available firmware for your specific model and region immediately. For EoL devices, replacement is the only secure option. #### **Proactive Security Posturing** * **Supply Chain Vigilance:** Prefer vendors with a public and transparent commitment to "Secure by Design" principles, long-term support guarantees, and rapid response to disclosures. * **Continuous Monitoring:** Implement network monitoring to detect anomalies such as unexpected outbound connections, DNS queries to suspicious domains, or changes to router configuration. * **Policy Enforcement:** Enforce MFA on all cloud services (e.g., Office 365) to neutralize the threat of password spray attacks originating from such proxy botnets. ### **Broader Analysis** #### **Vendor Accountability and the IoT Security Crisis** This incident exemplifies the chronic security challenges in the consumer IoT space: * **Patch Fragmentation:** The delayed and region-locked patch rollout creates a fractured defense posture, leaving millions vulnerable. * **End-of-Life Problems:** Many exploited devices are technically EoL, yet their widespread deployment creates a massive, persistent attack surface that cannot be easily remediated. * **Systemic Risks:** Vulnerabilities in network edge devices provide a perfect launchpad for large-scale attacks against critical infrastructure and cloud services, representing a clear supply chain risk. #### **Evolving Botnet Economy** The Quad7 campaign illustrates a shift from disruptive DDoS-focused botnets to stealthy, profit-driven operations. These modern botnets prioritize persistence and anonymity, turning compromised devices into a commodity for other cybercriminals, thereby increasing the sophistication and scale of the overall threat landscape. The TP-Link vulnerabilities are not an isolated incident but a symptom of a larger systemic issue. It necessitates a paradigm shift from both vendors and consumers. Vendors must embrace radical transparency, invest in secure development lifecycles, and guarantee consistent support. Consumers and organizations must treat network infrastructure not as simple appliances but as critical, internet-facing endpoints, applying rigorous security hygiene and demanding higher standards from manufacturers. The security of the internet's edge depends on it.

loading..   05-Sep-2025
loading..   6 min read