End-of-Day report
Timeframe: Montag 15-12-2025 18:30 - Dienstag 16-12-2025 19:10
Handler: Felician Fuchs
Co-Handler: Michael Schlagenhaufer
News
Arctic Wolf Observes Malicious SSO Logins on FortiGate Devices Following Disclosure of CVE-2025-59718 and CVE-2025-59719
In December 12, 2025, Arctic Wolf began observing intrusions involving malicious SSO logins on FortiGate appliances. Fortinet had previously released an advisory for two critical authentication bypass vulnerabilities (CVE-2025-59718 and CVE-2025-59719) on December 9, 2025. Arctic Wolf had also sent out a security bulletin for the vulnerabilities shortly thereafter.
https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-sso-logins-following-disclosure-cve-2025-59718-cve-2025-59719/
AWS Blames Russia-s GRU for Years-Long Espionage Campaign Targeting Western Energy Infrastructure
Amazon Web Services (AWS) has attributed a persistent multi-year cyber espionage campaign targeting Western critical infrastructure, particularly the energy sector, to a group strongly linked with Russia-s Main Intelligence Directorate (GRU), known widely as Sandworm (or APT44).
https://thecyberexpress.com/espionage-western-critical-infrastructure/
New SantaStealer malware steals data from browsers, crypto wallets
A new malware-as-a-service (MaaS) information stealer named SantaStealer is being advertised on Telegram and hacker forums as operating in memory to avoid file-based detection.
https://www.bleepingcomputer.com/news/security/new-santastealer-malware-steals-data-from-browsers-crypto-wallets/
Google is shutting down its dark web report feature in January
Google is discontinuing its "dark web report" security tool, stating that it wants to focus on other tools it believes are more helpful.
https://www.bleepingcomputer.com/news/google/google-is-shutting-down-its-dark-web-report-feature-in-january/
SoundCloud confirms breach after member data stolen, VPN access disrupted
Audio streaming platform SoundCloud has confirmed that outages and VPN connection issues over the past few days were caused by a security breach in which threat actors stole a database containing user information.
https://www.bleepingcomputer.com/news/security/soundcloud-confirms-breach-after-member-data-stolen-vpn-access-disrupted/
European authorities dismantle call center fraud ring in Ukraine
European law enforcement authorities dismantled a fraud network operating call centers in Ukraine that scammed victims across Europe out of more than 10 million euros.
https://www.bleepingcomputer.com/news/security/european-authorities-dismantle-call-center-fraud-ring-in-ukraine/
Microsoft to block Exchange Online access for outdated mobile devices
Microsoft announced on Monday that it will soon block mobile devices running outdated email software from accessing Exchange Online services until theyre updated.
https://www.bleepingcomputer.com/news/microsoft/microsoft-to-block-exchange-online-access-for-outdated-mobile-devices/
Cyberattack disrupts Venezuelan oil giant PDVSAs operations
Petróleos de Venezuela (PDVSA), Venezuelas state-owned oil company, was hit by a cyberattack over the weekend that disrupted its export operations.
https://www.bleepingcomputer.com/news/security/cyberattack-disrupts-venezuelan-oil-giant-pdvsas-operations/
Updaten: Warnung vor Angriffen auf Apple-Lücken und Gladinet
Die CISA warnt vor laufenden Angriffen auf Schwachstellen in Apples iOS und macOS sowie auf Gladinet CentreStack und Triofox.
https://www.heise.de/news/Updaten-Warnung-vor-Angriffen-auf-Apple-Luecken-und-Gladinet-11116020.html
Defender-Problem nach Windows Update KB5072033 - Get-MPComputerStatus leer
Das kumulative Update KB5072033 vom 9. Dezember 2025 kann unter Windows 11 24H2 und 25H2, sowie ggf. unter Windows Server 2025, Probleme verursachen. Die Statusabfrage, ob der Windows Defender noch korrekt arbeitet, funktioniert per PowerShell eventuell nicht.
https://www.borncity.com/blog/2025/12/16/defender-fehler-nach-windows-update-kb5072033-in-powershell/
The Detection & Response Chronicles: Exploring Telegram Abuse
Adversaries utilizing popular messaging apps throughout different attack phases is nothing new. Telegram, in particular, has constantly been the subject of abuse by multiple threat actors, favoured for its anonymity, accessibility, resilience, and operational advantages. In this blog, we explore popular Telegram Bot APIs, recent campaigns involving Telegram abuse, and provide detection and hunting opportunities.
https://blog.nviso.eu/2025/12/16/the-detection-response-chronicles-exploring-telegram-abuse/
Malicious NuGet Package Typosquats Popular .NET Tracing Library to Steal Wallet Passwords
The Socket Threat Research Team uncovered a malicious NuGet package, Tracer.Fody.NLog, that typosquats and impersonates the legitimate Tracer.Fody library and its maintainer. It presents itself as a standard .NET tracing integration but in reality functions as a cryptocurrency wallet stealer.
https://socket.dev/blog/malicious-nuget-package-typosquats-popular-net-tracing-library?utm_medium=feed
PornHub Confirms Premium User Data Exposure Linked to Mixpanel Breach
PornHub is facing renewed scrutiny after confirming that some Premium users activity data was exposed following a security incident at a third-party analytics provider. The PornHub data breach disclosure comes as the platform faces increasing regulatory scrutiny in the United States and reported extortion attempts linked to the stolen data. The issue stems from a data breach linked not to PornHub-s own systems, but to Mixpanel, an analytics vendor the platform previously used.
https://thecyberexpress.com/pornhub-data-breach-premium-users/
Vulnerabilities
Security updates for Tuesday
Security updates have been issued by Debian (binwalk, glib2.0, libgd2, paramiko, and python-apt), Fedora (chromium, python3.13, python3.14, qt6-qtdeclarative, and usd), Mageia (ffmpeg, firefox, nspr, nss, and thunderbird), Oracle (kernel, mysql, mysql:8.0, mysql:8.4, ruby:3.3, wireshark, and xorg-x11-server), Red Hat (expat, mingw-expat, and rsync), SUSE (binutils, curl, glib2, gnutls, go1.24, go1.25, keylime, libmicrohttpd, libssh, openexr, postgresql15, python311, and xkbcomp), and Ubuntu (libsoup3, linux, linux-aws, linux-aws-6.8, linux-gcp, linux-gcp-6.8, linux-gke, linux-gkeop, linux-hwe-6.8, linux-ibm, linux-ibm-6.8, linux-lowlatency, linux-lowlatency-hwe-6.8, linux-nvidia, linux-nvidia-6.8, linux-nvidia-lowlatency, linux-oracle, linux-oracle-6.8, linux, linux-aws, linux-kvm, linux-lts-xenial, linux-azure, linux-azure-6.14, linux-azure, linux-azure-6.8, linux-azure-fips, linux-fips, linux-fips, linux-aws-fips, linux-gcp-fips, linux-kvm, linux-oem-6.14, linux-raspi, and linux-realtime, linux-realtime-6.8).
https://lwn.net/Articles/1050778/
Node.js Security Releases
The team is still working on a particularly challenging patch, for this reason the release is being postponed to Thursday, December 18th or shortly after.
https://nodejs.org/en/blog/vulnerability/december-2025-security-releases
[R1] Nessus Versions 10.11.1 and 10.9.6 Fix Multiple Vulnerabilities
Nessus leverages third-party software to help provide underlying functionality. Several of the third-party components (expat, libxml2, libxslt) were found to contain vulnerabilities, and updated versions have been made available by the providers.
https://www.tenable.com/security/tns-2025-24
JumpCloud Remote Assist Flaw Lets Users Gain Full Control of Company Devices
A critical vulnerability (CVE-2025-34352) found by XM Cyber in the JumpCloud Remote Assist for Windows agent allows local users to gain full SYSTEM privileges. Businesses must update to version 0.317.0 or later immediately to patch the high-severity flaw.
https://hackread.com/jumpcloud-remote-assist-flaw-full-devices-control/
Sicherheitslücken: HPE-ProLiant-Server mit Intel QuickAssist sind verwundbar
Sicherheitspatches schließen mehrere Lücken in HPE ProLiant. Server sind aber nur unter bestimmten Bedinungen angreifbar.
https://www.heise.de/news/Sicherheitsluecken-HPE-ProLiant-Server-mit-Intel-QuickAssist-sind-verwundbar-11116372.html
SEIKO EPSON printer Web Config vulnerable to stack-based buffer overflow
https://jvn.jp/en/jp/JVN51846148/
Synology-SA-25:18 C2 Identity Edge Server (PWN2OWN 2025)
https://www.synology.com/en-global/support/security/Synology_SA_25_18
Mitsubishi Electric GT Designer3
https://www.cisa.gov/news-events/ics-advisories/icsa-25-350-04
Hitachi Energy AFS, AFR and AFF Series
https://www.cisa.gov/news-events/ics-advisories/icsa-25-350-03
Johnson Controls PowerG, IQPanel and IQHub
https://www.cisa.gov/news-events/ics-advisories/icsa-25-350-02
Güralp Systems Fortimus Series, Minimus Series, and Certimus Series
https://www.cisa.gov/news-events/ics-advisories/icsa-25-350-01