Daily Recap, A ransomware attack impacted Conduent and 10.5 million people, highlighting extortion and data-exfiltration risks, while law enforcement and threat groups drive attribution updates across Conti, AdaptixC2, and exploits sales networks. The week also covered China-linked APT intrusions, Bronze Butler, Ribbon breaches, and diverse vulnerability advisories affecting VMware, XWiki, Docker, Jenkins, and iMessage, with ongoing ICS disruptions in Canada and rising NFC relay malware across Europe.
#Conduent #Conti #AdaptixC2 #BronzeButler #Ribbon #XWiki #VMware #Docker #Jenkins #iMessage #ICS #BadCandy #Meduza #EclipseOpenVSX
#Conduent #Conti #AdaptixC2 #BronzeButler #Ribbon #XWiki #VMware #Docker #Jenkins #iMessage #ICS #BadCandy #Meduza #EclipseOpenVSX
Ransomware & Data Breaches
- Ransomware gang claims a breach and BPO giant Conduent confirms a data incident impacting 10.5 million people, raising extortion and data-exfiltration concerns β Conduent Breach, Conduent Impact
- Law enforcement and attribution developments: a Ukrainian was extradited from Ireland on Conti charges, Russian gangs are weaponizing open-source AdaptixC2, and a defense contractor pleaded guilty to selling cyber exploits to a Russian broker β Conti Extradition, AdaptixC2, Exploits Sale
APT & State-linked Attacks
- Multiple China-linked APTs exploited an unpatched Windows flaw and a VMware zero-day in active intrusions, prompting CISA alerts and wider concern β Chinese APTs, VMware Zero-day
- BRONZE BUTLER exploited a Lanscope zero-day for SYSTEM control while CISA ordered federal patching of a VMware Tools flaw exploited since Oct 2024 β BRONZE BUTLER, VMware Tools
- Russian-linked APTs used living-off-the-land techniques and a Sandworm-linked webshell in Ukraine, and a major telecom services provider Ribbon was breached by state hackers β Russian APTs, Ribbon Breach
- Diplomatic entities in Belgium and Hungary were hacked in a China-linked espionage campaign, expanding the remit of recent state-linked intrusions β Diplomatic Hacks
Vulnerabilities & Guidance
- CISA added exploited XWiki and VMware flaws to its KEV catalog and, together with NSA, issued urgent guidance to secure WSUS and Microsoft Exchange, while new Exchange best-practice guidance was released β KEV Update, WSUS/Exchange, Exchange Guidance
- Critical product flaws and advisories: Docker Compose CVE-2025-62725 allows host-level writes (upgrade to 2.40.2) and Docker fixed a Windows DLL hijack, Jenkins published advisory AV25-707, and Full Disclosure exposed the zero-click iMessage βGlass Cageβ (CVE-2025-24085 / 24201) β Docker Compose, Jenkins AV25-707, Glass Cage
ICS & OT Attacks
- Hacktivists have been abusing internet-accessible industrial control systems across Canada, disrupting water, energy and farms and triggering AL25-016 advisories and media coverage β ICS Advisory, Canadian ICS, Hacktivist ICS
Malware & Infostealers
- Russian authorities detained developers behind the Meduza infostealer in a major cybercrime crackdown β Meduza Bust
- About 150 Australian devices were found implanted with BadCandy, indicating targeted post-compromise tooling in the region β BadCandy
- There is a massive surge of NFC relay malware stealing Europeansβ credit cards, signaling growing physical-digital payment fraud β NFC Malware
Market, Industry & Defenses
- Indiaβs cybersecurity market hit $20 billion powered by 400+ startups, and the Middle East cybersecurity market is forecast to double by 2030 β India Cyber, Middle East Market
- Jamf will go private after a $2.2 billion acquisition by Francisco Partners β Jamf Acquisition
- Googleβs built-in AI defenses on Android now block about 10 billion scam messages per month, reflecting AI-driven anti-fraud scaling β Google AI
- A new security layer for macOS is designed to intercept admin errors before attackers can exploit them, adding defense-in-depth for endpoint admins β macOS Layer
Privacy & Exploits
- The new βBrashβ exploit can crash Chromium browsers instantly with a single malicious URL, posing widespread browsing availability risks β Brash Exploit
- Research shows a single photo could enable AI to clone your voice, threatening voice-based authentication and deepfake risks β Face-to-Voice
Supply Chain & Tokens
- The Eclipse Foundation revoked leaked Open VSX tokens after a discovery by Wiz, closing a potential supply-chain token exposure β Open VSX Tokens