Svoboda Cybersecurity Brief May 14, 2025
May 14, 2025bulletproof VPN - stay anonymous
FBI and Dutch Police Dismantle Anyproxy Cybercriminal Infrastructure
International law enforcement took down the Anyproxy proxy service, operational since 2004, used for phishing, ransomware, and data theft. The service abused end-of-life routers (6,000+ IPs) for anonymity, hosted partly in Dutch data centers.
Impact: Enabled global cybercrime, including financial theft and network disruptions.
Mitigation: Replace outdated routers; enforce KYC policies for hosting services.
Source: DataBreaches.net
SAP Patches Second Zero-Day (CVE-2025-42999) Exploited with CVE-2025-31324
Attackers chained CVE-2025-42999 (deserialization flaw) with CVE-2025-31324 (unauthenticated upload) to execute remote commands on SAP NetWeaver. Chinese group Chaya_004 linked to attacks on 1,284+ vulnerable instances.
Impact: RCE on unpatched systems; Fortune 500 companies compromised.
Mitigation: Apply SAP Notes 3594142 & 3604119; disable Visual Composer service.
Source: BleepingComputer
Ivanti EPMM Zero-Days (CVE-2025-4427 & CVE-2025-4428) Exploited for RCE
Two flaws in Ivanti Endpoint Manager Mobile allowed unauthenticated RCE via API abuse. Servers were compromised globally, with indicators like fcgi debugging logs.
Impact: Full system compromise; limited customer breaches confirmed.
Mitigation: Update to EPMM 11.12.0.5/12.3.0.2/12.4.0.2/12.5.0.1.
Source: BleepingComputer
Fortinet Fixes Critical Zero-Day (CVE-2025-32756) in FortiVoice
A stack overflow in FortiVoice, FortiMail, and other products allowed RCE via malicious HTTP requests. Attackers deployed malware, credential harvesters, and network scanners.
Impact: Full device takeover; scans from IPs like 218.187.69.244.
Mitigation: Patch immediately or disable HTTP/HTTPS admin interfaces.
Source: BleepingComputer
Intel CPU Flaw (CVE-2024-45332) Leaks Kernel Memory
“Branch Privilege Injection” bypasses Spectre v2 mitigations, leaking 5.6 KB/sec of kernel data (e.g., /etc/shadow
) on 9th-gen+ Intel CPUs (Coffee Lake to Raptor Lake).
Impact: Sensitive data exposure; low-risk for average users.
Mitigation: Apply microcode updates (2.7% performance hit).
Source: BleepingComputer
M&S Confirms Data Stolen in DragonForce Ransomware Attack
Attackers exfiltrated customer names, addresses, order history, and masked payment details. Online orders halted; password resets enforced for all accounts.
Impact: Phishing risks; business disruption.
Source: BleepingComputer
North Korean Konni Group Targets Ukraine with Phishing
TA406 sent think tank-themed emails with MEGA-hosted .RAR archives, deploying PowerShell/VBScript for espionage. Aimed to assess war risks for DPRK troops in Ukraine.
Impact: Credential theft; intelligence gathering.
Source: BleepingComputer
Moldovan Police Arrest Suspect in €4.5M Dutch Ransomware Attack
A 45-year-old suspect allegedly attacked Netherlands Organization for Scientific Research, laundering funds via crypto. €84,000 cash and devices seized.
Impact: Financial and research disruption.
Source: DataBreaches.net
Twilio Denies Breach After Alleged Steam 2FA Code Leak
Threat actor Machine1337 claimed to sell 89M Steam records, but Twilio found no evidence of compromise. Leak may stem from an SMS provider intermediary.
Impact: Potential account hijacking via leaked OTPs.
Mitigation: Enable Steam Guard Authenticator.
Source: BleepingComputer
NWT Health System Reports Employee Snooping in Medical Records
Two NTHSSA employees accessed records without authorization. Privacy commissioner confirmed intentional breaches.
Impact: Patient privacy violations.
Source: DataBreaches.net
Share this brief: https://svo.bz/hplG