Skip to content

Cyber Threat Weekly – #92

Derek Krein
3 min read

The week of August 18th through August 24th, roughly 327 cyber news articles were reviewed. A very light amount of cyber threat trends and adversarial behavior news to share.  Been on vacation, so this is a short newsletter.

Was ruthless on the trends and behaviors picked. Are shorter newsletters better? Share your thoughts in the comments!

Let’s start with massive spike in RDP probing observed.  Silk Typhoon abusing trusted relationships in the cloud.  Some testing with an agentic AI browser gets interesting results.  ClickFix with an interesting twist, access-as-a-service.

QR code phishing, two new techniques. 


Broken Record Alert: Don’t get pwned by N-day vulnerabilities!!!

Known exploited software flaws are one of the top 4 initial access vectors and have increased sharply in recent months.  We continue to share n-day vulnerabilities being actively exploited.  Priority #1, start with the CISA / VulnCheck known exploited vulnerability (KEV) catalogs.  If it’s in the catalog, it should be patched.

A close #2 priority is flaws with weaponized proof of concept (PoC) code available.  Exploit chances are higher with weaponized PoC code available.  If you do nothing else with patching, have an emergency 24-to-48-hour patching process for actively exploited and weaponized PoC code available vulnerabilities.

You should consider what is exposed to the Internet.  Architecture and zero trust network access (ZTNA) can go a long way to minimizing the number of devices and services exposed to the Internet.


CISA Known Exploited Vulnerabilities – August 17th to August 24th:

CVE-2025-54948 – Trend Micro Apex One OS Command Injection Vulnerability:
Could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations.

CVE-2025-43300 – Apple iOS, iPadOS, and macOS Out-of-Bounds Write Vulnerability:
The bug is an out-of-bounds write vulnerability in the Image I/O framework.


RDP Probing, Massive Spike Observed

Well above the 3 to 5 IPs a day baseline, 1,971 IPs we’re observed targeting Microsoft RD Web Access and RDP Web Client.  The sole target country, the United States.  Roughly 92% of the IPs observed were already tagged as malicious.  If you are exposing RDP to the Internet, not a good idea, harden your systems.

https://www.greynoise.io/blog/surge-malicious-ips-probe-microsoft-remote-desktop


Trusted Relationships in the Cloud Abused by Nation State Actors

Silk Typhoon, the infamous nation state group, abuses trusted relationships to move laterally to downstream customers in the cloud.  Researchers share TTPs and observations.  Yesterday’s nation state attack is tomorrow’s commodity attack.  Cyber criminals have been adopting nation state tactics and techniques for over a decade.

https://thecyberexpress.com/silk-typhoon-hackers-target-saas-providers/

https://www.crowdstrike.com/en-us/blog/murky-panda-trusted-relationship-threat-in-cloud/


Agentic AI Browser Testing, Some Interesting Results

Using Perplexity’s Comet, researchers built and tested three scenarios.  Would like to have seen some percentages of failure rate and a more scientific testing methodology.  But the results are that the agentic AI falls for simple scams.  This underscores the need to move slow with agentic AI.

https://www.bleepingcomputer.com/news/security/perplexitys-comet-ai-browser-tricked-into-buying-fake-items-online/

https://guard.io/labs/scamlexity-we-put-agentic-ai-browsers-to-the-test-they-clicked-they-paid-they-failed


From ClickFix to Access-as-a-Service – CORNFLAKE.V3 Backdoor

Threat actor ‘A’ uses ClickFix to gain access and install malware, threat actor ‘B’ interacts with the malware and performs recon and credential harvesting.  Additional payloads are possible.  Researches analyze a sample and walk through observations.

https://cloud.google.com/blog/topics/threat-intelligence/analyzing-cornflake-v3-backdoor/


Two New QR Code Phishing Techniques

The first technique involves splitting the QR code into to two images, it looks like a single image, but looking at the visual in HTML, it’s actually two different images.  The second technique is QR code nesting, a malicious QR code is embedded within a larger QR code.

https://blog.barracuda.com/2025/08/20/threat-spotlight-split-nested-qr-codes-quishing-attacks


Member Reactions
Reactions are loading...

Sign in to leave reactions on posts

Newsletter
Comments

Sign in to join the conversation.
Just enter your email below to receive a login link.


Related Posts

Members Public

Cyber Threat Weekly – #91

The week of August 11th through August 17th, roughly 323 cyber news articles were reviewed. A moderate amount of cyber threat trends and adversarial behavior news to share.  Been thinkin about AI usage and the need for strong AI governance. The common governance pieces of the puzzle data access and

Members Public

Cyber Threat Weekly – #90

The week of August 4th through August 10th, roughly 370 cyber news articles were reviewed.  A moderate amount of cyber threat trends and adversarial behavior news to share.  Been thinkin about adversarial behavior, it is the battle ground. Really, it’s been the battle ground for years, many just didn’

Members Public

Cyber Threat Weekly – #89

The week of July 28th through August 3rd, around 386 cyber news articles were reviewed.  A moderate amount of cyber threat trends and adversarial behavior news to share.  Been thinkin about AI and its self-preservation tendencies. In an experiment, multiple models chose blackmail the majority of the time to save