Svoboda Cybersecurity Brief January 07, 2026

Private VPN — just $1.2/mo

Critical Dolby Vulnerability Patched in Android

A critical vulnerability (CVE-2025-54957) in Dolby Digital Plus (DD+) Unified Decoder allows zero-click remote code execution via specially crafted media files on Android devices. Google patched the flaw in December 2025 for Pixel devices and January 2026 for all Android devices.
Impact: Exploitation can lead to arbitrary code execution without user interaction.
Mitigation: Apply the latest Android security updates.
Source: SecurityWeek

CVE-2026-0625, a command injection vulnerability in D-Link DSL routers (DSL-526B, DSL-2640B, DSL-2740R, DSL-2780B), allows unauthenticated RCE via DNS configuration parameters. Exploits target devices no longer supported by D-Link.
Impact: Attackers can gain full device control.
Mitigation: Replace EoL routers or segment them in non-critical networks.
Source: BleepingComputer

Kimwolf Android Botnet Infects 2M Devices via Proxy Abuse

The Kimwolf botnet, an Android variant of Aisuru malware, exploits residential proxy networks to target devices with exposed Android Debug Bridge (ADB) services. Over 67% of proxy-pool devices are unauthenticated, enabling mass infections.
Impact: Devices are hijacked for DDoS attacks, proxy resale, and crypto-mining.
Mitigation: Avoid low-cost Android TV boxes; use Google Play-certified devices.
Source: BleepingComputer

Taiwan Reports 10x Surge in Chinese Cyberattacks on Energy Sector

Taiwan’s National Security Bureau (NSB) recorded a 1,000% increase in Chinese cyberattacks on its energy sector in 2025. Attacks targeted ICS systems during software upgrades, using malware implants. Groups like BlackTech and APT41 were implicated.
Source: BleepingComputer

Jaguar Land Rover Sales Drop 43% Post-Cyberattack

A September 2025 cyberattack by Scattered Lapsus$ Hunters disrupted Jaguar Land Rover’s production, causing a 43% decline in Q3 wholesale volumes. The attack cost £196M ($220M) and required a UK government loan guarantee.
Source: BleepingComputer

Sedgwick Government Solutions Breached by TridentLocker

Sedgwick confirmed a breach at its federal contractor subsidiary, Sedgwick Government Solutions, after TridentLocker ransomware leaked 3.39 GB of data. The attack targeted an isolated file transfer system.
Source: BleepingComputer

Critical n8n Workflow Automation Flaw Allows RCE

CVE-2025-68668 (CVSS 9.9) in n8n versions 1.0.0–1.111.0 enables authenticated attackers to execute arbitrary OS commands via Python Code Node sandbox bypass.
Impact: Full system compromise.
Mitigation: Upgrade to n8n 2.0.0 or disable Python support.
Source: The Hacker News

AdonisJS Bodyparser Flaw Enables Arbitrary File Writes

CVE-2026-21440 (CVSS 9.2) in @adonisjs/bodyparser allows path traversal via unsanitized filenames in MultipartFile.move(), leading to arbitrary file writes.
Impact: Potential RCE if sensitive files are overwritten.
Mitigation: Update to versions 10.1.2 or 11.0.0-next.6.
Source: The Hacker News

Malicious Chrome Extensions Steal ChatGPT Conversations

Two Chrome extensions (600K+ and 300K+ users) exfiltrated ChatGPT and DeepSeek chats to attacker-controlled servers. The extensions impersonated a legitimate AITOPIA add-on.
Impact: Theft of sensitive AI conversations and browsing data.
Mitigation: Remove the extensions and audit installed add-ons.
Source: The Hacker News

Desjardins Data Breach Suspect Arrested in Spain

Juan Pablo Serrano, linked to a multimillion-dollar fraud involving 4.2M Desjardins members’ data, was arrested in Spain. He faces charges for fraud, identity theft, and trafficking.
Source: DataBreaches.net

Scattered Lapsus$ Hunters Trapped in Resecurity Honeypot

Resecurity deceived the group with a synthetic data honeypot, exposing their TTPs and server IPs. The hackers falsely claimed a breach before retracting their statements.
Source: SecurityWeek

HIPAA Compliance Tips for SMBs

Rachel Klugman Seeger highlights common HIPAA pitfalls, including weak business associate oversight and outdated state law awareness. 66% of breached records in 2025 involved third-party vendors.
Source: DataBreaches.net

Fake Booking.com Emails Deliver DCRat via Fake BSOD

The PHALT#BLYX campaign targets European hospitality with phishing emails leading to a fake BSOD page. Victims execute PowerShell commands that deploy DCRat.
Impact: Remote access and data theft.
Mitigation: Train staff to recognize ClickFix lures.
Source: The Hacker News

CVE-2025-65606 in TOTOLINK EX200 routers enables authenticated attackers to start an unauthenticated root telnet service via malformed firmware uploads. No patch available.
Impact: Complete device compromise.
Mitigation: Restrict admin access to trusted networks.
Source: The Hacker News

VS Code Forks Recommend Non-Existent Extensions

AI-powered VS Code forks (Cursor, Windsurf) recommend extensions not in Open VSX, creating supply-chain risks. Attackers could register malicious packages matching the names.
Impact: Potential malware delivery.
Mitigation: Verify extension publishers before installation.
Source: The Hacker News

Zestix/Sentap Linked to Dozens of Major Breaches

The threat actor used stolen credentials from infostealers (RedLine, Lumma) to compromise 50+ organizations via file-sharing services (ShareFile, OwnCloud). Data was sold on Russian forums.
Source: SecurityWeek

NordVPN Denies Breach Despite Hacker Claims

A threat actor leaked data allegedly from NordVPN’s Salesforce/Jira servers, but the company traced it to a third-party test environment with dummy data.
Source: SecurityWeek

Cybersecurity M&A: December 2025 Roundup

Notable deals include Akamai acquiring Fermyon, ServiceNow buying Armis ($7.75B) and Veza, and Silent Push acquiring HYAS. Over 420 deals recorded in 2025.
Source: SecurityWeek

Share this brief: https://svo.bz/QnHN

If you want to support us, you can donate here: Donate