Daily Cyber News – September 25, 2025
This is the Bare Metal Cyber Daily Brief for September the 25th, two thousand and twenty five. You can also listen on the go at daily cyber dot news. In the next fifteen minutes, the most compelling cyber stories, clearly explained.
Let’s start with the GeoServer breach because it captures the speed of modern exploitation. Within days of disclosure, adversaries weaponized a critical flaw to break into a U.S. federal civilian agency that relies on geospatial mapping. That window isn’t theoretical—patching now happens on disclosure-time, not attacker-toolkit time. If you publish maps or layers with GeoServer or similar Java stacks, take a full inventory of public endpoints, including “temporary” pilots that never got retired. Gate everything behind authentication, shrink the blast radius with tight egress rules, and comb logs for odd Java process trees, hastily added scheduled tasks, and big outbound transfers. The operational takeaway is simple: treat internet-facing data services like applications, not infrastructure—you need the same release discipline, the same rollback plans, and the same rapid mitigation muscle.
There’s also an active influence operation as Moldova heads into elections, and it reuses a familiar playbook. Investigators are tying the current push to campaigns that date back to 2022: recycled narratives, fake local personas, and coordinated amplification designed less to persuade than to exhaust trust. If your people work in the region, share a one-pager on media hygiene—verify primary sources, pause before resharing, and be suspicious of sudden, synchronized storylines arriving from newly created accounts. Comms teams should prep short, factual counters and identify credible outside voices who can deliver them. Security can help by watching for clusters of look-alike bios, synchronized posting windows, and link infrastructure that points back to the same operators. These aren’t single events; they’re iterative campaigns that learn from every round. Plan for a season, not a weekend.
Python maintainers are being phished with emails that look official and threaten account suspension, pushing them to a convincing PyPI login clone. If anyone typed credentials or tokens there, assume they’re compromised and rotate immediately. Lock down who can publish, enable hardware-key two-factor on high-impact accounts, and consider allow-listing real domains in your password manager so the impostors never autofill. For organizations, watch your software bill of materials for maintainers that suddenly change, unusual release cadences, or packages that sprout new dependencies. If you run an internal index, require reviews for version bumps and sign artifacts so downstream consumers can verify provenance. One compromised maintainer can taint thousands of builds before lunch—identity around your build chain is production, not convenience.
Cisco confirmed active exploitation of a high-severity bug in the Simple Network Management Protocol—S N M P—stack of IOS and IOS X E. Many networks still expose S N M P more broadly than intended, and that’s the foot in the door. Start by discovering every device with S N M P enabled, restrict reachability to a management enclave, and drop to read-only wherever possible with strong community strings or, better, v3 with proper auth. Move patches up your change calendar and stage maintenance windows to avoid going blind during business-critical hours. In parallel, watch for spikes in S N M P traffic, unexplained reboots, config drift after hours, or surprise admin accounts. If you can’t explain device instability, escalate—not as a nuisance ticket but as a probable intrusion. The network is the skeleton of the enterprise; protect the bones.
Researchers also detailed a China-nexus cluster now called RedNovember. The pattern they describe will sound familiar: initial access through edge devices and perimeter appliances, a lightweight loader—here nicknamed Pantegana—and then a pivot to commercially available red-team tooling like Cobalt Strike for command and control. It’s patient, opportunistic tradecraft that thrives on misconfigurations and stale firmware. The response is to pull your management plane out of the blast radius. Lock down remote admin, patch aggressively, and disable services you don’t use. Watch for low-and-slow beacons that blend into routine traffic and for credential harvesting that targets service accounts. If an appliance touches identity or traffic flow, treat its credentials like gold—rotate them, log their use, and consider egress allowlists so a foothold can’t phone home. Attribution helps leadership understand risk, but it’s the boring work—inventory and change control—that breaks these chains.
There’s a mobile angle today as well. A permissions bypass in OxygenOS on certain OnePlus phones allows any installed app to read and send text messages without the user’s say-so. That has obvious ramifications for multi-factor authentication, since many services still fall back to SMS. Until a fix lands, personal users should avoid sideloading, prune unused apps, and keep an eye out for unexplained outgoing texts. Enterprise mobility admins can reduce exposure by blocking new installs, enforcing work profiles that isolate SMS, and flagging devices with unusual messaging activity. If your organization relies on text-based codes, this is another nudge toward phishing-resistant factors like FIDO2 security keys or passkeys. When a patch is released, plan a rapid rollout with verification that the permission model enforces as expected. The lesson isn’t just about one vendor—it’s a reminder that mobile OS variants carry their own attack surface and deserve the same rigor you bring to laptops.
Investigators also expanded on a long-running campaign using a backdoor dubbed BRICKSTORM, attributed to a China-linked cluster labeled UNC5221. The malware is written in Go and plays multiple roles: web server, file mover, SOCKS relay, and shell executor. That makes it a versatile foothold, especially when paired with access from edge devices that don’t always feed into centralized logging. Reports suggest dwell times over a year at legal services, SaaS providers, business process outsourcers, and tech firms. Defensive moves start with visibility: baseline traffic from management subnets and alert on TLS destinations you’ve never seen. Segment sensitive tiers and enforce egress allowlists so even a successful implant can’t wander the internet. Rotate credentials touched by any suspected host and raise the bar on admin access with phishing-resistant factors. It’s also worth scheduling targeted threat hunts that look for BRICKSTORM-like behaviors rather than signatures—quiet persistence is the point, and you won’t trip over it by accident.
That’s the Bare Metal Cyber Daily Brief for September 24, 2025. For more, visit daily cyber dot news, and listen daily with our morning audio episode. Thanks for listening!
