Svoboda Cybersecurity Brief December 13, 2025
Apple Patches Two Zero-Day Exploits in Active Attacks
Apple released emergency updates for CVE-2025-43529 (WebKit use-after-free RCE) and CVE-2025-14174 (WebKit memory corruption), both exploited in targeted attacks. The flaws affect iPhones, iPads, and Macs, with patches in iOS/iPadOS 26.2+. Google’s Threat Analysis Group discovered the vulnerabilities.
Impact: Remote code execution via malicious web content.
Mitigation: Update to latest OS versions.
Source: BleepingComputer
Coupang Data Breach: 33.7M Records Leaked via Ex-Employee
A former Coupang employee retained system access after leaving, exfiltrating names, emails, addresses, and order data of 33.7M customers in June 2025. The breach triggered phishing surges in South Korea, leading to the CEO’s resignation.
Source: BleepingComputer
GeoServer XXE Flaw (CVE-2025-58360) Actively Exploited
CISA mandates patching by Jan 1, 2026, for unauthenticated XXE in GeoServer ≤2.26.1, allowing file theft, SSRF, or DoS via /geoserver/wms XML input. Shadowserver identifies 14,000+ exposed instances.
Impact: Arbitrary data access and system compromise.
Mitigation: Upgrade to v2.25.6/2.26.2/2.27.0+.
Source: SecurityWeek
Virginia Urology Patient Data Leaked by MS13-089 Hackers
927GB of sensitive patient records (including PHI, medical histories, and insurance details) was exfiltrated in November 2025. The ransomware group claimed Virginia Urology ignored their demands, but the clinic has not acknowledged the breach.
Source: DataBreaches
Fake “One Battle After Another” Torrent Delivers Agent Tesla RAT
Malicious subtitles in a fake movie torrent execute PowerShell loaders to deploy Agent Tesla, stealing credentials via scheduled tasks and evading detection by checking for Falcon/Cybereason AV.
Impact: Credential theft and system compromise.
Mitigation: Avoid pirated content; inspect suspicious .lnk files.
Source: BleepingComputer
MITRE Releases 2025 Top 25 Most Dangerous Software Weaknesses
XSS remains #1, followed by SQLi and CSRF. New entries include buffer overflows (CWE-120/121/122) and improper access control (CWE-284). Based on 39,080 CVEs from 2024–2025.
Source: SecurityWeek
PyStoreRAT Spreads via Fake GitHub OSINT Repositories
Attackers upload malicious Python/JS loaders posing as developer tools, delivering a modular RAT via HTA files. The malware steals crypto wallet data and evades analysis with Falcon AV checks.
Impact: Remote code execution and data theft.
Mitigation: Audit GitHub repo commits; block mshta.exe execution.
Source: TheHackerNews
New Phishing Kits (BlackForce, GhostFrame) Bypass MFA
BlackForce ($234–$351 on Telegram) steals OTPs via MitB attacks, while GhostFrame uses iframes to evade detection. Both target Microsoft 365/Google accounts.
Impact: Credential theft despite MFA.
Mitigation: Educate users; monitor for suspicious iframe loads.
Source: TheHackerNews
Notepad++ Updater Hijacked in Supply-Chain Attacks
A flaw in WinGUp allowed attackers to push malicious binaries by intercepting traffic. Patched in v8.8.9 with signature verification for updates.
Impact: System compromise via trojanized updates.
Mitigation: Upgrade to v8.8.9+.
Source: SecurityWeek
Doxers Impersonate Police to Steal Data from Big Tech
Hackers sent fake emergency data requests to companies like Charter Communications, obtaining personal data within 20 minutes.
Source: DataBreaches
Share this brief: https://svo.bz/a48F