Svoboda Cybersecurity Brief January 23, 2026

Private VPN — just $1.2/mo

Okta SSO Targeted in Sophisticated Vishing Attacks

Hackers are using custom phishing kits to conduct voice-based social engineering (vishing) attacks against Okta SSO credentials. These attacks bypass MFA by synchronizing phishing pages with real-time MFA challenges, allowing attackers to intercept TOTP codes.
Impact: Compromised SSO credentials give attackers access to multiple enterprise platforms, leading to data theft and extortion.
Mitigation: Use phishing-resistant MFA like Okta FastPass, FIDO2 keys, or passkeys.
Source: BleepingComputer

Fortinet FortiGate Firewalls Breached via SSO Exploit

Attackers are exploiting an unknown flaw in FortiGate’s SSO feature to create rogue accounts and steal firewall configs. The campaign resembles earlier attacks leveraging CVE-2025-59718, an authentication bypass vulnerability.
Impact: Unauthorized VPN access and firewall config theft, potentially enabling further network compromise.
Mitigation: Disable FortiCloud SSO or apply CLI command set admin-forticloud-sso-login disable.
Source: BleepingComputer

SmarterMail Auth Bypass Exploited to Hijack Admin Accounts

A critical authentication bypass flaw in SmarterMail (CVE-less) allows attackers to reset admin passwords via the force-reset-password API endpoint. Evidence shows exploitation began two days after patching.
Impact: Full system compromise via admin account takeovers and remote code execution.
Mitigation: Upgrade to Build 9511 (released Jan 15).
Source: BleepingComputer

INC Ransomware OpSec Fail Exposes Victim Data

Researchers recovered data from 12 U.S. organizations due to INC ransomware’s misuse of the Restic backup tool. Attackers left unsecured infrastructure traces, enabling forensic analysis.
Impact: Sensitive data exfiltration and extortion, with potential recovery from exposed backups.
Source: BleepingComputer

Critical GNU InetUtils telnetd Flaw Bypasses Authentication (CVE-2026-24061)

A 11-year-old vulnerability in GNU InetUtils telnetd allows root access via a crafted USER=-f root environment variable. Attacks are already underway from global IPs.
Impact: Remote authentication bypass leading to root access on vulnerable systems.
Mitigation: Patch immediately or disable telnetd; restrict access to trusted clients.
Source: TheHackerNews

Zendesk Support Systems Abused for Global Spam Wave

Attackers are flooding inboxes by exploiting unsecured Zendesk ticket systems to send spam emails. The abuse leverages automated confirmation emails triggered by fake support submissions.
Impact: Spam deluge causing confusion and potential phishing risks.
Source: BleepingComputer

Malicious PyPI Package “sympy-dev” Drops XMRig Miner

A fake SymPy package on PyPI (1,100+ downloads) deploys an XMRig cryptominer via Linux memfd_create to evade disk detection. Attacks target polynomial function calls.
Impact: Cryptojacking and potential secondary payload execution.
Mitigation: Verify package authenticity and monitor for unusual CPU usage.
Source: TheHackerNews

Kazakhstan Proposes Criminal Liability for Data Leaks

The country plans stricter penalties, including criminal charges, for mass personal data leaks as part of a “zero tolerance” policy. Fines for non-compliance will also increase.
Source: DataBreaches.net

GDPR Fines Reach €1.2B in 2025 Amid Rising Breaches

European regulators issued record fines under GDPR, with 443 daily breach notifications—a 22% YoY increase. Total fines since 2018 now exceed €7.1B.
Source: DataBreaches.net

Curl Ends Bug Bounty Over AI-Generated “Slop” Reports

The curl project shutdown its HackerOne program due to an influx of low-quality, likely AI-generated vulnerability reports overwhelming maintainers.
Source: BleepingComputer

Share this brief: https://svo.bz/l9KW

If you want to support us, you can donate here: Donate