SOC Goulash<p>Alright team, it's been a pretty packed 24 hours in the cyber world! We've got updates on some seriously costly breaches, a couple of actively exploited vulnerabilities, new malware capabilities, and a look at the evolving threat landscape. Let's dive in:</p><p>Major Cyber Attacks and Breaches 💸</p><p>- The Jaguar Land Rover (JLR) cyberattack, which began in late August 2025, is now estimated to be the UK's costliest cyber incident, with an economic impact of up to £1.9 billion ($2.5 billion) affecting over 5,000 organisations.<br>- Chinese threat actors are actively exploiting the ToolShell (CVE-2025-53770) zero-day in Microsoft SharePoint, targeting government agencies, universities, and telecoms across four continents, deploying webshells, backdoors like Zingdoor and ShadowPad, and even Warlock ransomware.<br>- A spearphishing campaign, dubbed "PhantomCaptcha," impersonated the Ukrainian President's Office to target war relief organisations (Red Cross, UNICEF) and regional governments, using a sophisticated "ClickFix" technique to trick victims into executing PowerShell scripts for RAT deployment.<br>- SpaceX has taken action against cybercrime, disabling over 2,500 Starlink devices identified in Myanmar scam compounds following calls from politicians and human trafficking advocates.<br>- Oregon-based fence manufacturer Jewett-Cameron Trading disclosed a ransomware attack that exfiltrated video meeting images and non-public financial documents, with attackers threatening public release if a ransom isn't paid.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/10/22/jaguar_lander_rover_cost/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/10/22/jaguar_lander_rover_cost/</span></a><br>🗞️ The Record | <a href="https://therecord.media/jaguar-land-rover-cyberattack-economic-impact" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/jaguar-land-ro</span><span class="invisible">ver-cyberattack-economic-impact</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/sharepoint-toolshell-attacks-targeted-orgs-across-four-continents/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/sharepoint-toolshell-attacks-targeted-orgs-across-four-continents/</span></a><br>🗞️ The Record | <a href="https://therecord.media/sharepoint-toolshell-bug-breaches-governments-africa-south-america" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/sharepoint-too</span><span class="invisible">lshell-bug-breaches-governments-africa-south-america</span></a><br>🗞️ The Record | <a href="https://therecord.media/phantomcaptcha-spearphishing-campaign-ukraine-war-relief-groups" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/phantomcaptcha</span><span class="invisible">-spearphishing-campaign-ukraine-war-relief-groups</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/phantomcaptcha-clickfix-attack-targets-ukraine-war-relief-orgs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/phantomcaptcha-clickfix-attack-targets-ukraine-war-relief-orgs/</span></a><br>🗞️ The Record | <a href="https://therecord.media/spacex-disables-starlink-kits-in-myanmar-scam-compounds" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/spacex-disable</span><span class="invisible">s-starlink-kits-in-myanmar-scam-compounds</span></a><br>🗞️ The Record | <a href="https://therecord.media/ransomware-gang-steals-meeting-video-fence-manufacturer" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/ransomware-gan</span><span class="invisible">g-steals-meeting-video-fence-manufacturer</span></a></p><p>New Threat Research 🔬</p><p>- Vidar Stealer 2.0 has been released, rewritten in C with multi-threading, improved anti-analysis checks, and a bypass for Chrome's App-Bound encryption via memory injection, likely increasing its prevalence as Lumma Stealer declines.<br>- Kaspersky researchers have identified a new, highly sophisticated APT campaign, PassiveNeuron, targeting government, financial, and industrial organisations in Asia, Africa, and Latin America with custom malware families Neursite (modular backdoor) and NeuralExecutor (.NET implant), often leveraging compromised internal servers as C2.</p><p>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/vidar-stealer-20-adds-multi-threaded-data-theft-better-evasion/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/vidar-stealer-20-adds-multi-threaded-data-theft-better-evasion/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/10/researchers-identify-passiveneuron-apt.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/10/rese</span><span class="invisible">archers-identify-passiveneuron-apt.html</span></a></p><p>Vulnerabilities and Zero-Days 🛡️</p><p>- TP-Link has patched four command injection flaws in Omada gateway devices, including two critical RCE vulnerabilities (CVE-2025-6542, CVE-2025-7850) with CVSS scores of 9.3, one of which allows unauthenticated remote exploitation.<br>- Adobe Commerce (formerly Magento) is seeing active exploitation of the critical SessionReaper vulnerability (CVE-2025-54236), an improper input validation flaw that allows attackers to take over customer accounts without interaction; 62% of stores remain unpatched.<br>- A high-severity "TARmageddon" flaw (CVE-2025-62518) in the abandoned async-tar Rust library and its forks, including the popular tokio-tar, allows unauthenticated RCE via hidden files in tar archives, posing a significant supply chain risk, with the most downloaded version still unfixed.<br>- Pwn2Own Ireland Day 2 saw hackers exploit 56 unique zero-day vulnerabilities, earning $792,750, including a chain of five flaws to hack the Samsung Galaxy S25 and exploits against QNAP, Synology, and Phillips Hue Bridge devices.</p><p>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/tp-link-warns-of-critical-command-injection-flaw-in-omada-gateways/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/tp-link-warns-of-critical-command-injection-flaw-in-omada-gateways/</span></a><br>📰 The Hacker News | <a href="https://thehackernews.com/2025/10/tp-link-patches-four-omada-gateway.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2025/10/tp-l</span><span class="invisible">ink-patches-four-omada-gateway.html</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/hackers-exploiting-critical-sessionreaper-flaw-in-adobe-magento/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/hackers-exploiting-critical-sessionreaper-flaw-in-adobe-magento/</span></a><br>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/10/22/vulnerable_rust_crate/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/10/22/vulnerable_rust_crate/</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/tarmageddon-flaw-in-abandoned-rust-library-enables-rce-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/tarmageddon-flaw-in-abandoned-rust-library-enables-rce-attacks/</span></a><br>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/samsung-galaxy-s25-hacked-on-day-two-of-pwn2own-ireland-2025/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/samsung-galaxy-s25-hacked-on-day-two-of-pwn2own-ireland-2025/</span></a></p><p>Threat Landscape Commentary 🌍</p><p>- GCHQ Director Anne Keast-Butler warned that the UK faces its "most contested and complex" threat environment in decades, with a quadrupling of significant cyberattacks over the past year (four incidents per week), driven by nation-state cooperation, AI advancements, and lower barriers for financially motivated cybercriminals.</p><p>🗞️ The Record | <a href="https://therecord.media/facing-anne-keast-decades-gchq" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/facing-anne-ke</span><span class="invisible">ast-decades-gchq</span></a></p><p>Data Privacy and Regulatory Issues ⚖️</p><p>- The UK's Information Commissioner's Office (ICO) defended its decision not to investigate a February 2022 Ministry of Defence data leak that exposed details of 33,345 Afghans, citing classified information handling difficulties and not wanting to hinder the MoD's immediate response.<br>- A new report from the Electronic Privacy Information Center (EPIC) highlights that state attorneys general in the US are increasingly active in privacy enforcement, bringing or settling over 1,200 consumer privacy cases in the last five years, filling a gap due to the absence of a comprehensive federal data privacy law.<br>- The annual Cyberspace Solarium Commission report concludes that the US is "slipping" on cybersecurity, with federal efforts failing to keep pace with technology, and recommends reversing budget/personnel cuts, strengthening the National Cyber Director's office, and expanding workforce initiatives.</p><p>🕵🏼 The Register | <a href="https://go.theregister.com/feed/www.theregister.com/2025/10/22/ico_afghan_leak_probe/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">go.theregister.com/feed/www.th</span><span class="invisible">eregister.com/2025/10/22/ico_afghan_leak_probe/</span></a><br>🗞️ The Record | <a href="https://therecord.media/state-ags-enforcement-privacy-law" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">therecord.media/state-ags-enfo</span><span class="invisible">rcement-privacy-law</span></a><br>🤫 CyberScoop | <a href="https://cyberscoop.com/cyberspace-solarium-commission-report-budget-workforce-cuts/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/cyberspace-sola</span><span class="invisible">rium-commission-report-budget-workforce-cuts/</span></a></p><p>Other Noteworthy Updates 🤖</p><p>- Meta is rolling out new anti-scam tools for WhatsApp and Messenger, including advanced AI-powered scam detection for suspicious chats on Messenger and warnings for screen sharing during video calls with unknown contacts on WhatsApp.<br>- An open letter, signed by over 700 individuals including Nobel laureates and tech leaders, calls for a prohibition on the development of "superintelligent" AI until there's broad scientific consensus on safe and controllable development, reflecting growing mainstream concern over potential societal and existential risks.</p><p>🤖 Bleeping Computer | <a href="https://www.bleepingcomputer.com/news/security/meta-launches-new-anti-scam-tools-for-whatsapp-and-messenger/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/meta-launches-new-anti-scam-tools-for-whatsapp-and-messenger/</span></a><br>🤫 CyberScoop | <a href="https://cyberscoop.com/ai-superintelligence-ban-open-letter-future-of-life-harry-meghan-tech-leaders/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/ai-superintelli</span><span class="invisible">gence-ban-open-letter-future-of-life-harry-meghan-tech-leaders/</span></a></p><p><a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/Ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ransomware</span></a> <a href="https://infosec.exchange/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://infosec.exchange/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://infosec.exchange/tags/APT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>APT</span></a> <a href="https://infosec.exchange/tags/Malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Malware</span></a> <a href="https://infosec.exchange/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://infosec.exchange/tags/Privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Privacy</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://infosec.exchange/tags/CyberAttack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberAttack</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/GCHQ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GCHQ</span></a> <a href="https://infosec.exchange/tags/AI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AI</span></a> <a href="https://infosec.exchange/tags/RustLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RustLang</span></a> <a href="https://infosec.exchange/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://infosec.exchange/tags/TPLink" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TPLink</span></a> <a href="https://infosec.exchange/tags/Magento" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Magento</span></a> <a href="https://infosec.exchange/tags/WhatsApp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WhatsApp</span></a> <a href="https://infosec.exchange/tags/Messenger" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Messenger</span></a></p>