Svoboda Cybersecurity Brief December 16, 2025
Askul Confirms Data Theft in RansomHouse Attack
Japanese e-commerce firm Askul confirmed 740k customer records were stolen in an October ransomware attack by RansomHouse. Attackers leveraged compromised credentials of an outsourced partner’s admin account lacking MFA, disabled EDR, and encrypted systems. Multiple ransomware variants were deployed simultaneously.
Impact: Data breach affecting business/individual customers, partners, and employees; operational disruptions continue.
Mitigation: Reset admin passwords, enforce MFA, isolate infected systems, and update EDR signatures.
Source: BleepingComputer
SantaStealer Malware Targets Browser Data and Crypto Wallets
A new MaaS stealer, SantaStealer, rebranded from BluelineStealer, is advertised on Telegram with Basic ($175/month) and Premium ($300/month) tiers. It steals browser data (passwords, cookies), crypto wallets, and documents, evading Chrome’s App-Bound Encryption. Samples analyzed show poor anti-analysis features.
Impact: Data theft from browsers, crypto wallets, and files; targets Windows users via phishing/pirated software.
Mitigation: Avoid unverified email attachments/links, monitor for suspicious PowerShell activity.
Source: BleepingComputer
PornHub Premium Members’ Activity Data Stolen via Mixpanel Breach
ShinyHunters extorted PornHub after stealing 94GB of historical analytics data (201M records) from Mixpanel. Data includes search/watch history, email addresses, and video metadata of Premium users. PornHub confirmed no passwords/payment details were exposed.
Impact: Sensitive user activity exposed; potential blackmail/phishing risks.
Mitigation: Monitor accounts for suspicious activity; avoid reusing credentials.
Source: BleepingComputer
700Credit API Breach Exposes 5.8M Dealer Customers
A compromised API via a third-party partner exposed names, SSNs, addresses, and DOBs of 5.8M individuals. Attackers exploited May–October 2025 data before 700Credit terminated the API.
Impact: High-risk identity theft; targeted automotive/finance sector.
Mitigation: Free credit monitoring offered; enforce API request validation.
Source: SecurityWeek
React2Shell Exploited by 5 Chinese APTs for Malware Delivery
Google linked UNC6600, UNC6586, UNC6588, UNC6603, and UNC6595 to exploiting CVE-2025-55182 (React RCE). Attacks delivered MINOCAT, SNOWLIGHT, COMPOOD, HISONIC, and ANGRYREBEL.LINUX. Shadowserver tracks 116k vulnerable IPs, primarily in the US.
Impact: Unauthenticated RCE via HTTP requests; widespread malware deployment.
Mitigation: Patch React/Next.js; monitor for suspicious HTTP traffic.
Source: SecurityWeek
FreePBX Authentication Bypass and RCE Flaws Patched
Critical flaws in FreePBX included CVE-2025-66039 (AUTHTYPE bypass), CVE-2025-61675 (SQLi), and CVE-2025-61678 (file upload to RCE). Default configs are safe, but webserver AUTHTYPE is risky.
Impact: Unauthenticated admin access; full system compromise.
Mitigation: Update to FreePBX 16.0.44/17.0.23; disable webserver AUTHTYPE.
Source: TheHackerNews
Urban VPN Chrome Extension Secretly Harvests AI Chat Data
The “Featured” Urban VPN extension (6M users) intercepted ChatGPT, Claude, and Gemini chats via injected JavaScript. Data was sent to analytics.urban-vpn[.]com. Parent company BiScience previously collected browsing history via SDK.
Impact: Sensitive AI prompts/responses exfiltrated; potential privacy violations.
Mitigation: Uninstall Urban VPN/related extensions; audit third-party SDKs.
Source: TheHackerNews
VolkLocker Ransomware Master Key Exposed
The pro-Russian CyberVolk group’s VolkLocker RaaS had a critical flaw: hard-coded AES-256 master keys saved in %TEMP%. The Go-based ransomware targets Windows/Linux, encrypts files (.locked/.cvolk), and wipes data after 48 hours.
Impact: Free decryption possible; initial test builds were flawed.
Mitigation: Check for system_backup.key; block Telegram C2 communications.
Source: TheHackerNews
French Interior Ministry Email Servers Hacked
Attackers breached French Interior Ministry email servers, accessing documents. Origin unknown (foreign/activist/cybercrime). The ministry oversees police/internal security.
Impact: Potential data theft; operational disruption.
Mitigation: Tighten access controls; investigate spear-phishing origins.
Source: BleepingComputer
Phantom Stealer Targets Russian Finance via ISO Phishing
Operation MoneyMount-ISO used bank transfer lures to deliver Phantom Stealer via malicious ISO files. The malware steals crypto wallets, browser data, and credentials, exfiltrating via Telegram/Discord.
Impact: Financial sector targeted; session/cookie theft risks.
Mitigation: Block ISO attachments; monitor for CreativeAI.dll executions.
Source: TheHackerNews
Apple Patches WebKit Zero-Days Linked to Chrome Flaw
CVE-2025-14174 (memory corruption) and CVE-2025-43529 (use-after-free) in WebKit were exploited in targeted iOS attacks. CVE-2025-14174 also affects Chrome’s ANGLE library (patched Dec 5).
Impact: Arbitrary code execution via malicious web content.
Mitigation: Update iOS/macOS/Safari; patch Chromium-based browsers.
Source: SecurityWeek
Share this brief: https://svo.bz/lmwE