company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Supply Chain Attack

loading..
loading..
loading..

Zscaler Hit by Supply-Chain Breach via Salesloft Drift, Customers Exposed

Zscaler warns of support-case and contact data exposure after Salesloft Drift breach—no service impact, but phishing risk rising.

01-Sep-2025
3 min read

No content available.

Related Articles

loading..

DDoS Attack

Cloudflare auto-mitigated a record 11.5 Tbps UDP flood from Google Cloud in 35s ...

Cloudflare says it has automatically blocked the largest volumetric DDoS attack ever observed, a **UDP flood that spiked to 11.5 terabits per second** and **lasted \~35 seconds**. The company added that the traffic **mostly originated from Google Cloud** and arrived amid **“hundreds” of hyper-volumetric attacks** seen in recent weeks. *(Note: despite the article slug reading “115,” the reported peak is **11.5** Tbps.)* ## Why this is historic At **11.5 Tbps**, the new peak surpasses Cloudflare’s **7.3 Tbps** record disclosed in June 2025 and the **3.8 Tbps** bar set in October 2024. Microsoft previously reported a **3.47 Tbps** mitigation in 2022. The fresh milestone shows attack capacity is still climbing, fast. ## Anatomy of the blast * **Vector:** **UDP flood** (bandwidth-saturating, connectionless packets). * **Burstiness:** **\~35s** duration, consistent with recent short, high-intensity “hyper-volumetric” surges. * **Scale:** Cloudflare noted **peaks of 5.1 Bpps** (billions of packets per second) alongside **11.5 Tbps** during the recent wave. * **Source profile:** “Mainly” from **Google Cloud**—typical of today’s DDoS where abused cloud instances can marshal enormous, transient firepower. ## How Cloudflare absorbed it—at wire speed Cloudflare’s mitigation is **autonomous and distributed**. Each edge server runs the in-house **`dosd`** (denial-of-service daemon) for instant detection and filtering, complemented by **`flowtrackd`** for stateful protection of complex flows. Decisions happen at the edge without centralized consensus, cutting reaction times to seconds. The scale rides on a **405 Tbps Anycast network** designed to soak bandwidth floods before they localize impact. ## The broader trend: hyper-volumetric is the new normal Cloudflare’s recent threat reports chart an aggressive rise in volumetric events. In **Q2 2025**, it recorded **the then-largest 7.3 Tbps** and **4.8 Bpps** attacks while blocking **6,500+ hyper-volumetric** events that quarter. Earlier, Cloudflare tallied **21.3 million** DDoS mitigations across **2024** and **20.5 million** in **Q1 2025** alone, including **6.6 million** strikes directly against its own backbone in an **18-day** multi-vector campaign. The new 11.5 Tbps spike extends that arc. ## How it compares—recent records at a glance * **Sep 2025:** **11.5 Tbps** UDP flood, mostly from Google Cloud; \~35s. * **May/Jun 2025:** **7.3 Tbps** attack on a hosting provider; \~45s; largely UDP; “carpet-bombing” across many ports. * **Oct 2024:** **3.8 Tbps / \~65s** hyper-volumetric L3/4 campaign. * **Jan 2022:** **3.47 Tbps** on an Azure customer (Microsoft). ## What this means for defenders (actionable takeaways) 1. **Assume bursts, not sieges.** Modern floods compress devastating throughput into sub-minute windows; tune detection & alerting for **seconds-level** granularity. 2. **Push filtering to the edge.** On-prem scrubbing alone can be too late. Prefer **always-on, autonomous mitigation** with global Anycast capacity. 3. **Harden UDP exposure.** Inventory UDP services, restrict to business-critical ports, and apply **stateless filters / rate limits** close to ingress. 4. **Spoofing resistance upstream.** Work with ISPs and cloud partners on **ingress filtering** and abuse handling to blunt reflection/amplification potential. *(Industry best practice; aligns with provider guidance.)* 5. **Exercise runbooks for 30–60s shocks.** Simulate hyper-volumetric bursts to validate telemetry, auto-mitigation, and comms in the first minute. ## Open questions we’re watching * **Victim & motive:** The target of the 11.5 Tbps surge wasn’t named; attribution and motive remain unconfirmed. * **Abuse pathways in cloud:** How attackers marshalled such momentary scale from Google Cloud—and what countermeasures follow—will shape future resilience. ## Bottom line The 11.5 Tbps peak is a **step-change, not a blip**. Short, furious floods launched from powerful cloud footprints are redefining DDoS economics. Cloudflare’s autonomous edge and massive Anycast backbone proved decisive this time; everyone else should calibrate defenses to **match the new tempo**.

loading..   02-Sep-2025
loading..   4 min read
loading..

CreditUnion

TransUnion hack exposed 4.4M users’ SSNs & personal data. Learn what happened, w...

In late July 2025, TransUnion, one of the "Big Three" U.S. credit bureaus, disclosed a significant cyber incident impacting **4.4 million individuals**. While the company insists that its core credit database remained untouched, the breach nevertheless exposed **personally identifiable information (PII)** — including **names, Social Security numbers, dates of birth, and contact details**. This event adds another chapter to the growing pattern of large-scale identity-driven cyberattacks exploiting **third-party applications** and **cloud ecosystems**. ## Anatomy of the Breach ### Timeline of Events * **July 28, 2025**: Unauthorized access detected in a third-party application supporting TransUnion’s U.S. consumer services. * **Within hours**: TransUnion claims the intrusion was “contained.” * **July 30, 2025**: Internal forensics and law enforcement were engaged. * **August 28, 2025**: Public disclosure revealed the scale — **4.4 million impacted individuals**. The breach was not directly within TransUnion’s credit systems, but rather within an **externally hosted application**, aligning with a recent wave of **Salesforce-related breaches** seen across enterprises such as **Google, Allianz Life, Cisco, and Workday**. ## What Hackers Accessed ### Exposed Data * Full Names * Dates of Birth * Social Security Numbers * Residential Addresses * Contact Information (email, phone numbers) This type of PII is highly valuable for **identity theft, account takeover, and social engineering campaigns**. ### Not Compromised * Credit histories * Core credit bureau databases * Financial account data While the exclusion of credit files offers some relief, the **leakage of foundational identity markers (SSNs, DOBs, addresses)** is still devastating, as these cannot be easily changed or reset. ## Who’s Behind the Attack? Evidence links the breach to **campaigns exploiting OAuth misconfigurations** in Salesforce-related environments. Security analysts attribute several of these attacks to the group **UNC6395**, while other sources suggest possible ties to **ShinyHunters**, a notorious hacking collective specializing in mass data theft and resale on dark web marketplaces. The technical vector appears to involve: 1. **Compromised OAuth tokens** used by legitimate third-party applications. 2. Unauthorized lateral access to sensitive consumer data hosted externally. 3. Rapid data exfiltration before containment measures triggered. This reflects a growing **supply-chain attack paradigm**, where **trusted SaaS tools become the weak link** in otherwise secure organizations. ## Why This Matters ### For Consumers * **4.4 million individuals** face heightened risks of identity fraud. * Fraudulent tax filings, false loan applications, and SIM-swap attacks are realistic downstream threats. * Even outside the U.S., leaked data may fuel **phishing attacks** worldwide. ### For Enterprises * Highlights the **perils of third-party dependency**. * Regulatory compliance pressure increases, especially under **U.S. state breach laws** and emerging **global data sovereignty frameworks**. * Reputation damage can undermine consumer trust — especially for a company whose business model rests on safeguarding credit data. ## Regulatory Under data protection laws in **Texas and Maine**, TransUnion filed formal breach notifications. Other states are expected to follow. Impacted consumers are being offered **two years of free credit monitoring and identity theft protection**. However, regulators may scrutinize whether TransUnion: * Conducted sufficient vendor risk assessments. * Had adequate detection controls in its **cloud supply chain**. * Appropriately minimized data exposure within third-party platforms. The breach may further accelerate calls for **federal-level U.S. data privacy laws** — a long-debated gap compared to the **GDPR in Europe**.

loading..   29-Aug-2025
loading..   3 min read
loading..

Qilin Ransomware

Qilin ransomware hits Nissan design hub; 4TB of car blueprints and IP leaked in ...

Nissan’s Tokyo design subsidiary **Creative Box Inc. (CBI)** detected unauthorized server access on **Aug 16, 2025**, and later **confirmed a data breach**. The **Qilin (aka “Agenda”) ransomware-as-a-service** operation listed CBI on its leak site on **Aug 20**, claiming **\~405,882 files / \~4 TB** exfiltrated (3D models, VR workflows, internal reports, financials, photos/videos) and posted **16 proof-of-theft images**. This is a classic **double-extortion** play—data theft plus public shaming—to force payment. The exposed assets are **innovation-grade IP**, heightening competitive, regulatory, and supply-chain risks. ## What happened (fact pattern & timeline) * **Aug 16, 2025 (JST):** CBI detects “suspicious access” on a data server, blocks access, and notifies authorities. * **Aug 20, 2025:** Qilin adds “Nissan CBI” to its Tor leak portal, threatens publication, and releases **16 screenshots/photos** of alleged stolen material. * **Aug 26–27, 2025:** Nissan confirms a breach and that **“some design data has been leaked,”** stating impact is limited to Nissan, with investigation ongoing. * **Data claimed:** \~**4.0 TB (4,037 GB)** / **\~405,882 files**, including **3D design models & VR workflows, internal reports, spreadsheets, photos, and videos**. ## Adversary profile: Qilin (“Agenda”) RaaS * **Business model:** Ransomware-as-a-Service: core operators provide malware + infrastructure; **affiliates** execute intrusions for a profit share. * **Tradecraft:** **Double extortion** (encrypt + exfiltrate + public shaming on a **leak portal**), selective leak “proof packs,” and negotiation pressure. * **Initial access & tooling (observed across cases):** * **Phishing** with malware droppers and social engineering; * **Valid credentials** from stealer logs/markets; * Opportunistic use of public-facing service exploits; * Credential theft (e.g., **Chrome credential stealer** observed in Qilin activity). **Why target CBI?** IP-rich environments (CAD/PLM/VR pipelines) often blend legacy file servers, shared assets, and vendor tools—**high-value data, heterogeneous controls, and complex privileges**, making them ideal for exfil-first ransomware. (Inference based on the data types claimed and typical design-studio architectures.) ## Impact analysis (beyond “data breach”) 1. **IP exposure & competitive intelligence:** Early-stage concepts, 3D assemblies, material specs, and VR workflows can reveal **roadmaps, design language, and engineering constraints**—a durable competitive loss even without encryption. 2. **Supply-chain & co-innovation risk:** Even if Nissan says third parties weren’t impacted, **shared models and joint prototypes** may be referenced in the stolen corpus, raising trust and contractual issues. 3. **Adversary leverage:** Leak-site posts + samples create **public market pressure** (investors, media, regulators) to escalate negotiations. 4. **Repeatability:** RaaS affiliates reuse working playbooks against other design/R\&D shops (auto, aero, med-devices), increasing sectoral risk. ## TTPs mapped to MITRE ATT\&CK (what to hunt for) > Not every technique occurred here; this is a **most-probable** map for Qilin-style intrusions in design estates. * **Initial Access:** Phishing (T1566), Exploit Public-Facing App (T1190), Valid Accounts (T1078). * **Execution:** PowerShell (T1059.001), Scripting (T1059), Malicious Office Macros (T1204.002). * **Privilege Escalation / Persistence:** Abuse of admin shares & scheduled tasks (T1053), Credential dumping (T1003). * **Discovery & Lateral Movement:** Network share discovery (T1135), Remote Services—RDP/SMB (T1021.001/.002). * **Credential Access:** Browser credential theft (Chrome stealer linked to Qilin) (T1555). * **Collection & Exfiltration:** Archive staging (T1560), Exfiltration over web services/cloud (T1567). * **Impact:** **Data Encrypted for Impact** (T1486), **Exfiltration to leak site** (extortion). ## Design-studio kill-chain specifics (where defenders often lose) * **Data gravity on SMB/NAS/PLM:** Monolithic shares (\design\projects\*\CAD) and PLM export folders are low-friction **exfil reservoirs**. * **Render farms & VR rigs:** Often run **elevated service accounts** and legacy drivers; EDR visibility can be uneven. * **Large binaries (CAD/point-cloud/FBX):** High-entropy, high-volume traffic to unfamiliar ASNs or cloud buckets is a telltale of **pre-encryption exfiltration**. * **Toolchain sprawl:** Mix of vendor apps (Autodesk, Dassault, Unity/Unreal), license servers, and custom scripts—**control gaps** and **bypass paths** abound. ## Detection & hunting playbook (actionable) **Network/Proxy (KQL-style heuristics)** ```text // Unusual bulk egress of large binaries outside business hours Proxy | where UrlCategory !in ("Corp_Storage","Corp_CDN") | where ResponseBodyBytes > 50MB | summarize total_bytes=sum(ResponseBodyBytes), conns=dcount(ClientIP) by bin(TimeGenerated, 15m), ClientIP, DestinationIp | where total_bytes > 5GB and conns > 20 ``` **EDR/Host** * Flag **7-zip/WinRAR** invoked by **non-packaging apps** in design shares (T1560). * Alert on **RDP service enablement** + new local admins within 1h window. * Detect **lsass** access by non-signed tools; block untrusted **minidump** patterns (T1003). * Hunt for **Chrome Login Data** access by non-browser processes (T1555). **Identity** * Impossible travel & atypical MFA denials for **service designers** / **render accounts**. * High-risk authentications into **license servers** or **render controllers**. **Data** * DLP patterns for **CAD/PLM extensions** (e.g., .CATPart, .CATProduct, .SLDPRT, .FBX, .MAX, .OBJ, .STEP, .IGES) with **volume + novelty** thresholds. ## Response runbook (first 72 hours) 1. **Containment** * Isolate affected servers/shares; cut off **egress to Tor/proxy/VPS ASNs**; freeze **service tokens**. * Snapshot VMs, collect **volatile memory**, preserve **NetFlow**, **proxy**, and **EDR telemetry**. 2. **Scope & eradication** * Golden image rebuild for **bastions, license servers, render controllers**; rotate **KRBTGT**/privileged creds if AD touched. * Remove backdoors, reset **IdP app secrets**, and **invalidate OAuth refresh tokens**. 3. **Negotiation posture** * Prepare for **proof-of-data ask**; assume partial leaks may be public. Align legal/regulatory and insurer guidance. * Treat any “call-a-lawyer” intimidation tactics as **pressure theater**; keep comms channelized. 4. **Comms & legal** * Message around **IP loss** (vs. PII) clearly; engage OEM/partners under NDA if shared designs are implicated. 5. **Recovery & hardening** * Restore from **immutable backups**; enable **AD tiering**, **PAWs** for design admins, and **Zero Trust** access to PLM/VR. ## Preventive controls (prioritized, design-estate aware) 1. **Segment for IP:** Put **CAD/PLM/VR** zones behind **identity-aware proxies**; default-deny egress; permit only **approved cloud storage**. 2. **Least privilege for pipelines:** Service accounts for render/convert nodes use **per-job short-lived credentials**; no standing domain admin. 3. **Exfil controls:** DLP + CASB with **size, type, and destination** policies tuned for CAD/3D assets; **TLS inspection** for egress from design VLANs. 4. **EDR everywhere (really):** Ensure sensor coverage on **render farms**, **license servers**, **Unity/Unreal workstations**; block unsigned drivers. 5. **Credential hygiene:** Mandatory **FIDO2** for admins; block **password autofill**; clear **browser credential stores** on design rigs. (Qilin has targeted browser creds.) 6. **Email & stealer-log risk:** **Attachment detonation** + **link isolation**; ingest **stealer-log telemetry** from threat intel to auto-revoke exposed accounts. 7. **Leak-site monitoring:** Subscribe to leak-site mirrors/feeds; **pre-draft takedown notices** and partner comms. ## Key unanswered questions (tracking list) * **Initial vector:** Phish? Valid creds? Public-facing service? (Investigators have not disclosed.) * **Encryption stage:** Was encryption deployed or was this **exfil-only**? (Qilin often encrypts post-exfil.) * **Supplier collateral:** Any third-party design artifacts present in the stolen set? Nissan says others aren’t impacted, but artifacts may reference partners. * **Data authenticity/volume:** Qilin posted **16 samples**; full corpus remains unverified publicly. This is **not** a customer-PII story—it’s a **strategic IP story**. Qilin’s RaaS playbook weaponizes **exfiltration + publicity** to monetize R\&D. Treat design/R\&D networks as **crown-jewel zones** with bespoke controls, not just “another office segment.” The defensive priority is **exfil-prevention and privileged-path hardening**, not only anti-encryption backups.

loading..   28-Aug-2025
loading..   6 min read