CyberNews: 09/10/2025 Edition
Today’s roundup
Summary
On October 8, 2025, SonicWall disclosed that an unauthorized party accessed firewall configuration backup files for all customers using its MySonicWall cloud backup service. The stolen encrypted credentials and configuration data increase the risk of targeted attacks, necessitating urgent remediation including credential resets and VPN reconfigurations.
Russia's SSSCIP reported that Russian hackers have escalated AI use in cyberattacks against Ukraine during H1 2025. AI now generates phishing messages and malware, signifying a significant advancement in their cyber warfare capabilities.
An actively exploited critical security flaw (CVE-2025-5947, CVSS 9.8) in the Service Finder WordPress theme allows authentication bypass, granting attackers administrative control. Immediate patching for users of the Service Finder Bookings plugin is crucial.
The Chaos ransomware-as-a-service operation has upgraded to an aggressive new C++ variant. This enhanced version incorporates new encryption, wiper, and cryptocurrency-stealing functionalities, making it a more potent and dangerous threat.
Ransomware groups DragonForce, LockBit, and Qilin have formed a strategic alliance to boost attack effectiveness by sharing tools and infrastructure. This collaboration, coinciding with LockBit 5.0's release, marks a significant evolution in organized cybercrime.
A critical bug, CVE-2025-53967, in the Framelink Figma MCP server (for agentic AI connections) can lead to remote code execution (RCE). Organizations using this third-party option must patch immediately to prevent compromise.
China-linked threat actors are leveraging 'Nezha,' an open-source remote monitoring and management (RMM) tool, in campaigns targeting Asian organizations. This tactic, often initiated via vulnerable web applications, highlights the use of readily available tools for sophisticated intrusions.
Japan's Asahi Group Holdings confirmed a ransomware attack by the Qilin group in late September 2025, disrupting Japanese operations. Qilin claimed responsibility and leaked 27GB of stolen employee and financial data, which Asahi confirmed appeared online.
A prominent U.S. law firm reported that hackers, suspected to be a China-linked nation-state actor, breached attorneys' email accounts. This incident highlights severe risks sophisticated state-sponsored groups pose to legal entities holding sensitive client data.
Token theft is identified as a leading cause of software-as-a-service (SaaS) breaches in 2025. Experts emphasize that overlooked OAuth and API tokens necessitate stronger token hygiene practices to prevent attacks against critical SaaS applications.
Want to dig deeper?
Vulnerabilities
CVE-2025-5947 | Critical |
CVE-2025-53967 | Critical |