Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

Loading...

Amnpardaz

Iran

Wiper

loading..
loading..
loading..

Rootkits hiding in HP iLO used for routine destruction of servers

Rootkits discovered inside the firmware of HP iLO contains a wiper malware to perform routine destruction of Iranian servers...

03-Jan-2022
3 min read

No content available.

Related Articles

loading..

React2Shell

Critical React flaw CVE-2025-55182 is actively exploited. Over 30 organizations ...

The global technology community is facing a severe and urgent security crisis. A maximum-severity vulnerability in React, one of the world's most popular web development libraries, is being actively exploited by nation-state hackers and criminal groups, compromising thousands of servers within days of its disclosure. Designated CVE-2025-55182 and dubbed "React2Shell," the flaw has drawn direct comparisons to the 2021 Log4Shell event for its ease of exploitation and widespread impact. This technical deep-dive explores the intricate mechanics of the vulnerability, the sophisticated multi-stage attacks already unfolding, and the critical steps every organization must take immediately. ### A Deserialization Betrayal At its heart, React2Shell is a fundamental flaw in the "Flight" protocol, the system React uses to communicate between server and client components. It stems from **insecure deserialization**—the unsafe process of converting serialized data from an HTTP request back into executable objects on the server. **How the Exploit Works:** Attackers craft a malicious HTTP POST request containing a specially formatted payload. This payload abuses self-referencing JSON structures to trick the server's deserialization logic. By manipulating object properties, attackers can hijack the JavaScript event loop, attaching malicious code to a special `.then` property. When the server automatically attempts to process this, it executes the attacker's commands, resulting in unauthenticated Remote Code Execution (RCE) with a CVSS score of 10.0. ### From Disclosure to Exploitation: The timeline underscores the extreme urgency: * **November 29:** Researcher Lachlan Davidson responsibly discloses the flaw to Meta. * **December 3:** Public disclosure and patch release occur simultaneously. * **Within Hours:** Amazon Web Services (AWS) threat intelligence observes exploitation attempts from infrastructure linked to Chinese state-nexus threat groups **Earth Lamia** and **Jackpot Panda**. * **December 4-5:** Fully weaponized public proof-of-concept (PoC) exploits are released, leading to a surge in global scanning and compromise. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds it to its Known Exploited Vulnerabilities (KEV) catalog. ### Beyond Simple Cryptomining Real-world exploitation has moved rapidly from reconnaissance to sophisticated post-compromise activities. Security firm Wiz has observed attackers using initial access to launch multi-stage campaigns: | Attack Phase | Common Activities & Goals | | :--- | :--- | | **Initial Reconnaissance** | Running commands like `whoami`, `hostname`, and dumping environment variables to understand the compromised system. | | **Credential & Secret Harvesting** | Systematically scouring filesystems for `.env` files, cloud credentials (AWS, Azure), SSH keys, and npm configurations. A primary goal is accessing cloud metadata services to steal IAM roles. | | **Payload Deployment** | Installing **cryptominers** (like XMRig), deploying remote access trojans (RATs) such as **VShell**, or installing full-featured backdoor frameworks like **Sliver** for persistent control. | | **Lateral Movement** | Using the compromised web server as a beachhead to scan and move into internal corporate networks. | ### A Broader Ecosystem at Risk While the popular Next.js framework has been a primary target due to its default vulnerable configuration, the vulnerability's root lies in core React packages. This means the threat extends across the modern web development ecosystem. **Affected and Patched Versions:** | Component | Vulnerable Versions | Patched Versions | | :--- | :--- | :--- | | **React Packages** (`react-server-dom-webpack`, `-parcel`, `-turbopack`) | 19.0, 19.1.0, 19.1.1, 19.2.0 | 19.0.1, 19.1.2, 19.2.1 | | **Next.js** (Using App Router) | 15.x (prior to 15.5.7), 16.x (prior to 16.0.7) | 15.5.7, 16.0.7, or later | | **Other Frameworks** | Waku, Vite (with RSC plugin), Parcel, RedwoodJS are also confirmed vulnerable. | Consult framework-specific advisories. | ### Detection, Response, and the Critical Patch Mandate Given the active exploits, organizations must operate under an "assume breach" mindset for any unpatched, internet-facing React/Next.js application. **1. Immediate Patching is Non-Negotiable:** Updating to the patched versions is the only complete remedy. For Next.js applications, note that updating the React package alone is insufficient; you must update the Next.js framework itself. **2. Hunt for Compromise:** Review server logs for Indicators of Compromise (IoCs), such as: * HTTP POST requests with `next-action` or `rsc-action-id` headers. * Request bodies containing unusual patterns like `"$1:a:a"` or `"status":"resolved_model"`. * Suspicious child processes spawned from Node.js applications or unexpected file writes to `/tmp/`. **3. Implement Interim Protections (Not a Substitute for Patching):** * **Web Application Firewalls (WAF):** Deploy emergency rules. AWS WAF's `AWSManagedRulesKnownBadInputsRuleSet` (v1.24+) includes detection. Similar rules are available from Google Cloud Armor and Cloudflare. * **Network Segmentation:** Restrict outbound traffic from web servers to break reverse-shell connections and contain potential lateral movement. As attackers continue to refine their exploits, the window for defensive action—measured in hours, not days—has nearly closed. For countless organizations worldwide, the immediate and complete remediation of this vulnerability is the most critical IT task at hand.

loading..   08-Dec-2025
loading..   4 min read
loading..

Ransomware

Pharma Research Firm Inotiv Confirms Massive Data Breach Following Qilin Ransomw...

**WEST LAFAYETTE, Ind. & BOSTON, Mass.** — Inotiv Inc. (NOTV), a pivotal contract research organization in the pharmaceutical development pipeline, has formally confirmed a significant data breach impacting nearly 10,000 individuals. The breach stems from a ransomware attack executed by the Qilin cybercrime group in early August 2025, culminating in the theft of highly sensitive personal, financial, and health information. The disclosure, made through mandatory regulatory filings with the U.S. Securities and Exchange Commission (SEC) and a detailed notice to the Maine Attorney General, provides a stark case study in the modern cyber threat landscape. It illustrates a targeted assault on a scientific enterprise where the compromise of data carries profound ethical, legal, and operational consequences beyond immediate financial ransom. #### **Timeline of a Targeted Intrusion** The incident unfolded through a precise sequence of intrusion, discovery, and investigation, characteristic of a professionally executed ransomware operation. | **Date** | **Event Phase** | **Key Action & Details** | | :--- | :--- | :--- | | **Aug 5-8, 2025** | **Initial Compromise & Encryption** | Qilin operatives gained access, deployed ransomware, and exfiltrated data. | | **Aug 8, 2025** | **Discovery & Containment** | Inotiv’s internal security team identified the attack, contained affected systems, and initiated forensic procedures. | | **Aug 18, 2025** | **Regulatory Disclosure** | Inotiv filed an 8-K form with the SEC, publicly acknowledging a cybersecurity incident that disrupted operations. | | **Oct 21, 2025** | **Data Analysis Completed** | Forensic investigators concluded data review, confirming the scope and sensitivity of stolen information. | | **Dec 2-3, 2025** | **Individual Notification** | Inotiv began notifying 9,542 affected individuals and submitted official breach details to the Maine AG. | #### **The Core of the Breach: A Treasure Trove of Sensitive Data** Moving beyond operational disruption, the forensic investigation revealed the attack's true severity: the successful exfiltration of approximately 162,000 files totaling 176 GB. The stolen data constitutes a comprehensive dossier on affected individuals, including: * **Personally Identifiable Information (PII):** Full names, addresses, and crucially, Social Security Numbers (SSNs) and government-issued identification numbers. * **Financial Data:** Credit and debit card numbers. * **Protected Health Information (PHI):** Medical records, health insurance details, and associated medical data. The population impacted includes current and former employees, their family members, and other associated individuals, indicating that the attackers exfiltrated data from broad-based human resources and administrative systems. #### **Corporate and Legal Response** In response, Inotiv has engaged a multi-pronged strategy focusing on remediation, legal compliance, and victim support: 1. **Technical Remediation:** The company contained the incident, restored systems from secure backups, and implemented "additional enhanced security measures." Law enforcement, including the FBI, was notified. 2. **Regulatory Compliance:** The company fulfilled its obligation under the SEC's new cybersecurity disclosure rules and state laws, formally reporting to the Maine Attorney General—a common requirement when breaches affect over 1,000 residents of a state. 3. **Victim Mitigation:** Inotiv is offering affected individuals **24 months of complimentary credit monitoring and identity restoration services** through Kroll, a standard but critical remediation step. The offer notably exceeds the 12-month period seen in many other breaches, such as the contemporaneous incident at Jack's Family Restaurants. #### **Nuanced Implications: Why This Breach Resonates** The Inotiv breach is not an isolated IT failure but a symptom of systemic vulnerabilities within high-stakes industries: * **Strategic Targeting of Life Sciences:** Attackers increasingly focus on pharmaceutical and research organizations due to their valuable intellectual property, sensitive human trial data, and pressing operational timelines, which may increase pressure to pay ransoms. * **The "Double Extortion" Playbook:** Qilin's method—encrypting systems *and* stealing data—represents the now-standard double-extortion model. The threat of leaking sensitive health data adds a powerful layer of coercion against a HIPAA-regulated entity. * **The Expanding Surface of Third-Party Risk:** As a Contract Research Organization (CRO), Inotiv is a vital third-party partner to numerous pharmaceutical companies. This breach exposes the cascading risk within the industry's ecosystem, where a compromise at one service provider can threaten the security posture of multiple major firms. The incident has already triggered investigations by plaintiff's law firms for potential class-action litigation, citing possible failures to implement adequate cybersecurity measures. This legal aftermath, combined with regulatory scrutiny, will define the long-term cost of the breach far beyond the initial ransom demand. *For individuals notified by Inotiv, cybersecurity experts strongly recommend enrolling in the offered credit monitoring, placing fraud alerts with national credit bureaus, and remaining vigilant against sophisticated phishing attempts that may leverage the stolen personal data.*

loading..   05-Dec-2025
loading..   4 min read