End-of-Day report
Timeframe: Mittwoch 06-08-2025 18:00 - Donnerstag 07-08-2025 18:00
Handler: Felician Fuchs
Co-Handler: Guenes Holler
News
New Ghost Calls tactic abuses Zoom and Microsoft Teams for C2 operations
A new post-exploitation command-and-control (C2) evasion method called Ghost Calls abuses TURN servers used by conferencing apps like Zoom and Microsoft Teams to tunnel traffic through trusted infrastructure.
https://www.bleepingcomputer.com/news/security/new-ghost-calls-tactic-abuses-zoom-and-microsoft-teams-for-c2-operations/
Wave of 150 crypto-draining extensions hits Firefox add-on store
A malicious campaign dubbed GreedyBear has snuck onto the Mozilla add-ons store, targeting Firefox users with 150 malicious extensions and stealing an estimated $1,000,000 from unsuspecting victims.
https://www.bleepingcomputer.com/news/security/wave-of-150-crypto-draining-extensions-hits-firefox-add-on-store/
Critical Zero-Day Bugs Crack Open CyberArk, HashiCorp Password Vaults
Secrets managers hold all the keys to an enterprises kingdom. Two popular ones had longstanding, critical, unauthenticated RCE vulnerabilities.
https://www.darkreading.com/cybersecurity-operations/critical-zero-day-bugs-cyberark-hashicorp-password-vaults
Researchers Uncover ECScape Flaw in Amazon ECS Enabling Cross-Task Credential Theft
Cybersecurity researchers have demonstrated an "end-to-end privilege escalation chain" in Amazon Elastic Container Service (ECS) that could be exploited by an attacker to conduct lateral movement, access sensitive data, and seize control of the cloud environment.
https://thehackernews.com/2025/08/researchers-uncover-ecscape-flaw-in.html
How To Find SQL Injection Vulnerabilities in WordPress Plugins and Themes
SQL Injection (SQLi), a vulnerability almost as old as database-driven web applications themselves (CWE-89), persists as a classic example of failing to neutralize user-supplied input before its used in a SQL query. So why does this well-understood vulnerability type continue to exist?
https://www.wordfence.com/blog/2025/08/how-to-find-sql-injection-vulnerabilities-in-wordpress-plugins-and-themes/
New Promptware Attack Hijacks User-s Gemini AI Via Google Calendar Invite
Cybersecurity researchers demonstrate a new attack on Google Gemini AI for Workspace. Discover how a simple calendar invite can be used to perform phishing, steal emails, and even control home appliances.
https://hackread.com/promptware-attack-hijack-gemini-ai-google-calendar-invite/
Unveiling a New Variant of the DarkCloud Campaign
In early July 2025, a new DarkCloud campaign was observed in the wild by Fortinet-s FortiGuard Labs team. It began with a phishing email containing an attached RAR archive. I subsequently investigated this campaign and conducted a step-by-step analysis.
https://feeds.fortinet.com/~/922857380/0/fortinet/blogs~Unveiling-a-New-Variant-of-the-DarkCloud-Campaign
HTTP/1.1 must die: the desync endgame
Upstream HTTP/1.1 is inherently insecure and regularly exposes millions of websites to hostile takeover. Six years of attempted mitigations have hidden the issue, but failed to fix it. This paper introduces several novel classes of HTTP desync attack capable of mass compromise of user credentials.
https://portswigger.net/research/http1-must-die
Malicious npm Packages Target WhatsApp Developers with Remote Kill Switch
Two npm packages masquerading as WhatsApp developer libraries include a kill switch that deletes all files if the phone number isn-t whitelisted.
https://socket.dev/blog/malicious-npm-packages-target-whatsapp-developers-with-remote-kill-switch?utm_medium=feed
Vulnerabilities
6,500 Axis Servers Expose Remoting Protocol, 4,000 in U.S. Vulnerable to Exploits
Cybersecurity researchers have disclosed multiple security flaws in video surveillance products from Axis Communications that, if successfully exploited, could expose them to takeover attacks.
https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html
Security updates for Thursday
Security updates have been issued by AlmaLinux (glibc, kernel, libxml2, python-requests, and python-setuptools), Debian (chromium), Fedora (chromium, firefox, gdk-pixbuf2, iputils, libsoup3, libssh, perl, perl-Devel-Cover, perl-PAR-Packer, polymake, and poppler), Gentoo (Composer and Spreadsheet-ParseExcel), Oracle (glibc, kernel, libxml2, python-setuptools, sqlite, and virt:rhel and virt-devel:rhel), Red Hat (libxml2), SUSE (grub2, libarchive, libgcrypt, and python311), and Ubuntu (cifs-utils and poppler).
https://lwn.net/Articles/1032861/
Erhöhte Bedrohungsaktivität gegen SonicWall Gen 7 Firewalls mit SSLVPN - Sofortmaßnahmen empfohlen
Update: 07. August 2025 Ergänzung von technischen Indikatoren für eine forensische Untersuchung möglicherweise betroffener Geräte sowie Informationen zu der angeblich relevanten Schwachstelle.
https://www.cert.at/de/warnungen/2025/8/erhohte-bedrohungsaktivitat-gegen-sonicwall-gen-7-firewalls-mit-sslvpn-sofortmassnahmen-empfohlen
Sicherheitslücken: Angreifer können IBM Tivoli Monitoring crashen lassen
IBMs IT-Verwaltungssoftware Tivoli Monitoring ist verwundbar und Angreifer können an zwei Sicherheitslücken ansetzen. Ein Update zum Schließen der Lücken steht zum Download bereit.
https://heise.de/-10513072
EG4 Electronics EG4 Inverters
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-07
Dreame Technology iOS and Android Mobile Applications
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-06
Packet Power EMX and EG
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-05
Rockwell Automation Arena
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-04
Burk Technology ARC Solo
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-03
Johnson Controls FX80 and FX90
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-02
Delta Electronics DIAView
https://www.cisa.gov/news-events/ics-advisories/icsa-25-219-01