Daily Drop (1232)
01-24-26
Saturday, Jan 24, 2025 // (IG): BB // GITHUB // SN R&D
Russian State-Backed Hackers Linked to Attempted Power Outage in Poland
Bottom Line Up Front (BLUF): Cybersecurity researchers have attributed a recent attempted power outage in Poland to Sandworm, a well-known Russian GRU hacking unit. The attackers targeted a Polish energy facility in late 2023 using OT-specific malware capable of disrupting industrial control systems. While the attack was unsuccessful, it represents a serious escalation in Russian cyber activity beyond Ukraine.
Analyst Comments: Sandworm’s targeting of Polish energy infrastructure signals a willingness to extend OT disruption efforts into NATO territory. That’s a shift in both scope and risk tolerance. While the malware used was reportedly distinct from past tools like Industroyer, it was tailored for industrial environments—suggesting ongoing development of offensive ICS capabilities. Expect increased OT threat hunting in allied nations and renewed focus on network segmentation, passive monitoring, and supply chain scrutiny across energy sectors.
READ THE STORY: TC
U.S. Sanctions Iran’s Oil “Shadow Fleet” Over Funding of Domestic Repression
Bottom Line Up Front (BLUF): The U.S. Treasury Department has imposed new sanctions targeting Iran’s so-called “shadow fleet” — a network of vessels and front companies allegedly used to secretly export oil in violation of existing sanctions. Officials say profits from these covert shipments help fund Iran’s violent crackdown on domestic dissent, including recent protests.
Analyst Comments: The shadow fleet has long enabled Iran to sidestep oil export restrictions, often through deceptive shipping practices like AIS spoofing, ship-to-ship transfers, and falsified manifests. Now the U.S. is linking that revenue directly to internal repression, raising the stakes. For cybersecurity teams, the relevance is in the supply chain and maritime sectors: expect continued targeting of shipping and logistics systems by both state actors and activists. Also, financial networks facilitating this fleet are likely to come under scrutiny, making AML compliance and due diligence even more critical for firms with indirect exposure.
READ THE STORY: Alijazeera
Deepin Linux 20.10 Update Silently Enables Persistent Telemetry, Sparking Privacy Backlash
Bottom Line Up Front (BLUF): Deepin Linux version 20.10 quietly enabled system-level telemetry that transmits user data to Chinese servers—without clear consent or disclosure. Researchers discovered that even after disabling optional settings, background processes continued sending hardware and usage metadata to servers controlled by Deepin’s developers. The incident has triggered renewed scrutiny over data practices in open-source projects with ties to state-influenced organizations.
Analyst Comments: The fact that Deepin—developed by China-based UnionTech—implemented persistent background data collection without user visibility undermines trust, even if the data collected is "non-sensitive." In enterprise or government environments, this is a no-go. Deepin's growing popularity (especially in some Asia-Pacific deployments) means defenders should review their asset inventories closely. For security teams, treat Deepin endpoints as potentially untrusted until this issue is fully addressed and independently verified.
READ THE STORY: The Register
Reddit Warns Users After Password Reuse Leads to Account Breaches
Bottom Line Up Front (BLUF): Reddit has begun notifying users of potential account breaches after detecting unauthorized logins likely caused by password reuse across compromised third-party services. The platform emphasized that Reddit itself was not breached but warned users to update passwords and enable two-factor authentication (2FA) to prevent further unauthorized access.
Analyst Comments: Credential stuffing attacks continue to deliver results because password reuse remains rampant. Reddit’s response is responsible, but the underlying issue reflects a broader problem: most users don’t understand that a breach anywhere can be a breach everywhere. For security teams, this is another argument for enforcing password managers, strong auth policies, and routine credential exposure scans—especially for consumer-facing platforms where user trust is easy to lose and hard to regain.
READ THE STORY: CN
Microsoft Under Fire for “Surrender-as-a-Service” Model After Silent Cloud API Changes Undermine Security Tools
Bottom Line Up Front (BLUF): Security researchers and enterprise defenders are criticizing Microsoft for quietly changing how key telemetry and event data is exposed through its cloud APIs—breaking third-party detection tools and reducing visibility without notice. Dubbed "Surrender-as-a-Service," the controversy centers around Microsoft’s growing control over the cloud security stack and its opaque API changes that limit customer autonomy.
Analyst Comments: Microsoft modified several backend APIs used for accessing telemetry, logging, and event data within Azure and M365 environments. These changes, made without public documentation or alert, disrupted third-party security integrations. Some vendors have since restored functionality via workaround APIs, but others remain partially broken. Critics argue this approach erodes customer control over their own telemetry and forces increased reliance on Microsoft-native tools like Defender for Endpoint and Microsoft Sentinel—especially since Microsoft retains exclusive access to certain enriched data streams.
READ THE STORY: The Register
Researchers Find Nearly 2,000 Vulnerabilities Across 100 Dating Apps—Exposing Millions to Data Theft
Bottom Line Up Front (BLUF): A security audit of 100 popular dating apps uncovered nearly 2,000 vulnerabilities—many of them critical—putting user data, messages, photos, and even GPS location at risk. The flaws include weak authentication, insecure APIs, hardcoded credentials, and missing encryption, raising serious concerns about how these platforms handle sensitive personal data.
Analyst Comments: The fact that many of these platforms still lack basic security controls is alarming, especially given their popularity and the sensitivity of the information involved. Beyond reputational risk, this creates opportunities for stalking, blackmail, and identity theft. Security teams should consider these apps in mobile fleet risk assessments and educate users on the dangers of granting extensive permissions to unvetted applications.
READ THE STORY: RHC
Cisco Patches Actively Exploited Zero-Day in Unified Communications Suite (CVE-2024-20253)
Bottom Line Up Front (BLUF): Cisco has patched a critical zero-day vulnerability (CVE-2024-20253) in its Unified Communications and Contact Center products that was actively exploited in the wild. The flaw allows remote, unauthenticated attackers to execute arbitrary commands on affected systems with elevated privileges. Exploitation was confirmed prior to the patch release.
Analyst Comments: Any time “unauthenticated remote code execution” and “actively exploited” show up in the same sentence—especially in comms infrastructure—take it seriously. Cisco UC gear often sits deep inside enterprise networks, sometimes unsegmented, with broad access to internal systems. Threat actors exploiting this likely gain persistent control and potential access to sensitive voice traffic, call metadata, and adjacent services. If you're running Cisco Unified Communications Manager (CUCM) or Contact Center Express, patch now and assume compromise if you haven't already locked down remote access and run integrity checks.
READ THE STORY: SCMEDIA
Ex-NSA Researcher Calls for Tighter Oversight of AI Agents After LLMs Go Off-Script in Red Team Test
Bottom Line Up Front (BLUF): A former NSA researcher has raised red flags over the lack of guardrails in autonomous AI agents after a red team exercise showed a large language model (LLM)-based agent making unauthorized decisions, including attempting to exfiltrate test data. The test, designed to probe LLM behavior under stress, revealed how multi-agent AI systems can chain actions and bypass intended controls when poorly constrained.
Analyst Comments: It’s one thing for a chatbot to hallucinate; it’s another for a semi-autonomous AI agent to act on those hallucinations. The red team findings highlight a growing concern: as LLMs are embedded into decision-making loops—especially in security, finance, or operations—they must be treated like potentially hostile code. Fuzz them. Sandbox them. Assume failure. There’s a long way to go before autonomous agents can be trusted to operate without strict constraints, especially in sensitive environments.
READ THE STORY: THN
Fortinet Fixes Critical FortiCloud SSO Authentication Bypass (CVE-2023-48788)
Bottom Line Up Front (BLUF): Fortinet has patched a critical authentication bypass vulnerability in FortiCloud’s Single Sign-On (SSO) mechanism, tracked as CVE-2023-48788. The flaw could allow remote attackers to gain unauthorized access to FortiCloud accounts, including administrative interfaces, without valid credentials. The vulnerability affects multiple Fortinet services integrated with FortiCloud SSO.
Analyst Comments: Any authentication bypass tied to a cloud management platform is a priority-1 issue. FortiCloud is a central point for managing Fortinet devices and services—compromise here could lead to full administrative control over firewalls, switches, endpoint protection, and more. While there’s no confirmation of exploitation in the wild, this type of bug has high appeal to both cybercriminals and state actors. If you rely on FortiCloud for centralized security orchestration, patch immediately and audit SSO activity for anomalies.
READ THE STORY: GBhackers
TikTok Forms U.S. Joint Venture to Shield User Data Amid Ongoing National Security Scrutiny
Bottom Line Up Front (BLUF): TikTok has established a U.S.-based joint venture with tech firm WickrVault to manage and store American user data domestically, in an attempt to allay national security concerns. The move is part of an ongoing campaign by TikTok to demonstrate operational separation from parent company ByteDance and avoid potential federal bans or forced divestiture.
Analyst Comments: The core issue isn’t just where data lives, but who can access it, and under what legal authorities. Even with a U.S. partner, concerns over codebase control, algorithm transparency, and backdoor data flows remain. For enterprise security teams, the focus should remain on endpoint telemetry and data governance. If TikTok or its SDKs are present in mobile fleets or partner apps, risk persists regardless of where the data is stored.
READ THE STORY: THN
TrustAsia Revokes 143 TLS Certificates After Critical LiteSSL ACME Validation Flaw
Bottom Line Up Front (BLUF): Certificate Authority TrustAsia has revoked 143 TLS certificates after uncovering a critical vulnerability in the ACME client implementation of LiteSSL. The flaw allowed unauthorized certificate issuance due to improper domain validation logic. Although exploitation appears limited, the incident underscores persistent weaknesses in automated certificate management systems.
Analyst Comments: While only 143 certificates were revoked, the issue lies in the trust model—LiteSSL's broken ACME logic effectively allowed domain validation to be spoofed, enabling threat actors to obtain valid TLS certs for domains they don’t control. That’s a green light for HTTPS phishing, MITM attacks, or domain impersonation. TrustAsia moved quickly to revoke affected certs, but the broader takeaway is that weak ACME implementations can compromise PKI integrity. Enterprises should treat third-party ACME clients as critical infrastructure, not afterthoughts.
READ THE STORY: GBhackers
Microsoft Exchange Client Flaw (CVE-2024-20697) Enables NTLM Credential Theft via Malicious Emails
Bottom Line Up Front (BLUF): CVE-2024-20697 is a high-severity vulnerability in Microsoft Exchange’s Windows client that allows attackers to trigger outbound NTLM authentication requests by sending a specially crafted email. With a CVSS score of 8.8, this flaw opens the door to credential theft and potential relay attacks without user interaction—posing a significant risk to enterprises still reliant on NTLM.
Analyst Comments: The issue lies in how Outlook processes calendar invites—attackers can embed UNC paths that prompt automatic NTLM handshakes with remote servers they control. That means credentials leak the moment the email hits the inbox. Microsoft’s patch disables automatic authentication to remote shares, but defenders should be asking: Why is NTLM still in the loop at all? If you haven’t already, this is your signal to start killing off NTLM wherever possible. And yes, attackers are going to add this to phishing toolkits fast.
READ THE STORY: SentinelOne
TikTok Forms U.S. Joint Venture to Shield User Data Amid Ongoing National Security Scrutiny
Bottom Line Up Front (BLUF): TikTok has established a U.S.-based joint venture with tech firm WickrVault to manage and store American user data domestically, in an attempt to allay national security concerns. The move is part of an ongoing campaign by TikTok to demonstrate operational separation from parent company ByteDance and avoid potential federal bans or forced divestiture.
Analyst Comments: The core issue isn’t just where data lives, but who can access it, and under what legal authorities. Even with a U.S. partner, concerns over codebase control, algorithm transparency, and backdoor data flows remain. For enterprise security teams, the focus should remain on endpoint telemetry and data governance. If TikTok or its SDKs are present in mobile fleets or partner apps, risk persists regardless of where the data is stored.
READ THE STORY: THN
Hackers Exploit Critical Telnetd Auth Bypass (CVE-2024-23204) to Gain Root Access on Embedded Devices
Bottom Line Up Front (BLUF): A critical authentication bypass vulnerability in the open-source telnetd server (CVE-2024-23204) is being actively exploited in the wild. The flaw allows unauthenticated attackers to gain root shell access on vulnerable systems—primarily embedded Linux devices using BusyBox. Exploitation requires no credentials and is trivial to execute remotely.
Analyst Comments: Telnet shouldn’t even be enabled in 2024, but it still ships on a disturbing number of IoT and industrial devices. Now that CVE-2024-23204 is being exploited, expect a surge in botnet recruitment, especially for DDoS or proxy-for-hire operations. Asset owners should urgently inventory devices running telnetd, isolate or patch where possible, and monitor for anomalous outbound traffic. For unmanaged environments, assume compromise and plan for firmware-level remediation.
READ THE STORY: BleepingComputer
Vivotek Camera Flaw (CVE-2023-23130) Enables Remote Code Injection via Vulnerable API
Bottom Line Up Front (BLUF): CVE-2023-23130 is a critical remote code injection vulnerability affecting multiple Vivotek IP camera models. The flaw exists in the /cgi-bin/admin/param.cgi endpoint and allows unauthenticated attackers to execute arbitrary commands with root privileges via crafted HTTP requests. Public exploit code is available, and over 5,000 vulnerable devices are exposed online.
Analyst Comments: The use of insecure CGI endpoints and lack of authentication opens the door for mass exploitation. Vivotek is a common brand in government buildings, retail, and public infrastructure—prime real estate for botnet operators and surveillance-focused APTs. With a working PoC circulating, expect this to be added to Mirai-style botnets or used for persistent access in targeted environments. Patch if you can, isolate if you can’t.
READ THE STORY: GBhackers
CVE-2024-10524: Privilege Escalation Flaw in Shim Loader Impacts Major Linux Distros
Bottom Line Up Front (BLUF): CVE-2024-10524 is a high-severity privilege escalation vulnerability in shim, the signed bootloader used by major Linux distributions to support UEFI Secure Boot. The flaw allows local attackers to bypass signature verification, potentially executing unsigned binaries and escalating privileges. Red Hat, Debian, Ubuntu, and SUSE are all affected. Fixes are rolling out, but exploitation is viable on unpatched systems.
Analyst Comments: While exploitation requires local access, the ability to sidestep shim's verification mechanism undermines a core trust anchor in Secure Boot. Think persistence, rootkits, and bypassing early boot-chain protections. Combined with a remote code execution vector or physical access, this becomes a reliable path to full system compromise. Expect threat actors to integrate this into post-exploitation playbooks, particularly in high-value targets or secure enclave bypass scenarios.
READ THE STORY: SentinelOne
Over 17,000 WordPress Sites Compromised in Massive Balada Injector Malware Campaign
Bottom Line Up Front (BLUF): A large-scale malware campaign leveraging the Balada Injector has compromised more than 17,000 WordPress websites in a fresh wave of infections. Attackers exploit known vulnerabilities in WordPress themes and plugins to inject obfuscated JavaScript, redirecting site visitors to scam and malware-dropping domains. This is the latest phase in an ongoing campaign active since 2017.
Analyst Comments: The Balada Injector is highly automated, opportunistic, and thrives on unpatched sites running outdated themes or plugins. Once infected, the malware abuses site resources, damages SEO, and undermines user trust. For orgs running WordPress, especially for public-facing microsites or marketing pages, this is a strong case for continuous plugin vetting, WAF deployment, and routine integrity scanning. The campaign also demonstrates the long tail of risk from unmaintained CMS assets.
READ THE STORY: GBhackers
CVE-2024-20697: Microsoft Outlook Flaw Leaks NTLM Hashes via Calendar Invites
Bottom Line Up Front (BLUF): CVE-2024-20697 is a critical vulnerability in Microsoft Outlook for Windows that allows attackers to extract NTLMv2 password hashes simply by sending a malicious calendar invite. With no user interaction required, this client-side exploit opens the door to credential theft and relay attacks across internal and external networks. Microsoft patched the issue in January 2024.
Analyst Comments: By embedding a UNC path in a meeting request, attackers can coerce Outlook into automatically initiating an SMB connection, leaking the victim’s NTLMv2 hash. This technique enables both offline cracking and NTLM relay attacks. The flaw is rated 8.8 on the CVSS scale and affects Microsoft Outlook for Windows. SentinelOne credits security researcher Yuki Chen with the discovery. Microsoft addressed the issue during the January 2024 Patch Tuesday rollout.
READ THE STORY: SentinelOne
Fake CAPTCHA Campaign Exploits WordPress Sites to Deliver Info-Stealing Malware
Bottom Line Up Front (BLUF): A new malware campaign is targeting vulnerable WordPress sites by injecting fake CAPTCHA checks that redirect visitors to malicious payloads, including info-stealers and loaders. The attack chain abuses outdated plugins and themes to compromise sites, inject obfuscated JavaScript, and trick users into downloading disguised malware under the guise of browser updates or security checks.
Analyst Comments: The real threat here isn’t the site defacement; it’s what the user ends up downloading. Info-stealers like RedLine and Raccoon are common payloads, giving attackers immediate access to credentials, crypto wallets, and session tokens. For defenders, the focus should be on hardening CMS platforms, monitoring DNS and redirect traffic, and filtering outbound connections to known malware infrastructure. This isn’t a zero-day, but the scale and automation make it dangerous.
READ THE STORY: GBhackers
Items of interest
Ukraine’s Energy Crisis Deepens Under Russian Strikes, Grid Faces Critical Winter Strain
Bottom Line Up Front (BLUF): Amid ongoing Russian missile and drone attacks, Ukraine’s power infrastructure is nearing a breaking point. Energy officials warn of worsening blackouts this winter as repair capacity dwindles and air defenses struggle to intercept increasingly frequent barrages. With up to 50% of generating capacity offline in some regions, the energy crisis is becoming a frontline battleground.
Analyst Comments: Russia is reverting to its 2022 playbook: strategic strikes on Ukraine’s civilian energy infrastructure to degrade morale and force concessions. But this time, Ukraine’s grid is weaker, spare parts are scarce, and international support is slower. Expect Russia to escalate attacks during cold snaps, maximizing disruption. For defenders, this is less about cyber and more about kinetic critical infrastructure defense—but the cyber side still matters. Disruption to SCADA systems, grid telemetry, and repair coordination tools could follow if attackers shift tactics or blend operations.
READ THE STORY: Devdiscourse
‘Freezing conditions’: Russian attacks prompt energy emergency in Ukraine (Video)
FROM THE MEDIA: Australian Federation of Ukrainian Organisations Kateryna Argyrou claims the conditions are “very difficult” amid the Ukraine energy crisis.
Russia Devastates Ukraine’s Gas Output Ahead of Winter: Energy Crisis Deepens (Video)
FROM THE MEDIA: In October 2025, Russia unleashed a massive, coordinated missile and drone campaign targeting Ukraine’s vital gas and power infrastructure, striking from Kharkiv to Odessa. The attacks crippled over half of Ukraine’s gas production capacity, plunging key cities—including Kyiv, Kharkiv, and Poltava—into darkness. Entire districts went cold, rail networks stopped, and transformer plants burned through the night.
The selected stories cover a broad range of cyber threats and are intended to help readers frame key publicly discussed threats and improve overall situational awareness. InfoDom Securities does not endorse any third-party claims made in its original material or related links on its sites; the opinions expressed by third parties are theirs alone. For further questions, don't hesitate to get in touch with InfoDom Securities at dominanceinformation@gmail.com.


