CyberNews: 07/12/2025 Edition

Published by Dunateo on 2025-12-07

Today’s roundup

  • React2Shell flaw exploited to breach 30 orgs, 77k IP addresses vulnerable
  • Researchers Uncover 30+ Flaws in AI Coding Tools Enabling Data Theft and RCE Attacks
  • Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Attackers launch dual campaign on GlobalProtect portals and SonicWall APIs
  • Summary

    A critical remote code execution flaw, identified as React2Shell (CVE-2025-55182), has been actively exploited by attackers, leading to the compromise of at least 30 organizations across various sectors. Security researchers estimate that over 77,000 Internet-exposed IP addresses remain vulnerable to this RCE flaw. Organizations are urged to patch immediately to mitigate the risk of further breaches.

    Researchers have uncovered over 30 security vulnerabilities, collectively named "IDEsaster," impacting various artificial intelligence (AI)-powered Integrated Development Environments (IDEs). These flaws leverage prompt injection primitives alongside legitimate features to facilitate data exfiltration and remote code execution attacks. The discovery highlights emerging security risks in AI-assisted coding tools.

    An extensive academic cheating network, operating under brands such as Nerdify and Geekly, has generated nearly $25 million in revenue through exploiting Google Ads. Investigations reveal ties to Synergy, Russia’s largest private university, and its president, Kremlin-connected oligarch Vadim Lobov. Synergy is also implicated in developing combat drones for Russia’s war in Ukraine and has faced accusations of visa scamming.

    A dual hacking campaign commenced on December 2, 2025, targeting Palo Alto GlobalProtect portals with login attempts while simultaneously scanning SonicWall SonicOS API endpoints. Threat intelligence firm GreyNoise reported that over 7,000 IP addresses, traced to German hosting provider 3xK GmbH, are involved. This activity reuses identical client fingerprints from a prior brute-force campaign observed between late September and mid-October, indicating consistent attacker tooling despite shifting infrastructure.

    Want to dig deeper?

    Vulnerabilities

    CVE-2025-55182 Critical