• The History of CMMC

    The Cybersecurity Maturity Model Certification (CMMC) has become one of the most significant compliance requirements for companies operating within the Defense Industrial Base (DIB). Contractors across the supply chain are now being asked not only if they are compliant, but how quickly they can prove it. Understanding where CMMC came from and how it has evolved provides valuable context for organizations preparing to meet the latest requirements.


    Early Foundations

    The roots of CMMC stretch back to 2010, when Executive Order 13556 formally established the concept of Controlled Unclassified Information (CUI). The order defined what constitutes CUI and laid the groundwork for consistent handling requirements across government and industry.

    By 2017, defense contractors were already expected to comply with NIST SP 800-171, a set of 110 security controls designed to protect CUI. Under this model, contractors could self-attest to their compliance, but it quickly became clear that self-attestation did not provide the level of assurance the Department of Defense (DoD) required.


    The Birth of CMMC

    In 2019, the DoD announced the Cybersecurity Maturity Model Certification as a way to strengthen accountability and verification. The idea was to move beyond self-attestation and introduce third-party assessments where necessary.

    The first formal version, CMMC 1.0, arrived in November 2020 alongside an interim DFARS rule that added new clauses (252.204-7019 and 252.204-7020). These required contractors to post their NIST SP 800-171 self-assessment scores in the Supplier Performance Risk System (SPRS). CMMC 1.0 included five maturity levels ranging from Basic to Advanced Cyber Hygiene. While Level 1 was intended for contractors handling only Federal Contract Information (FCI), higher levels applied to organizations dealing with CUI.


    Streamlining to CMMC 2.0

    By November 2021, the DoD responded to industry feedback by introducing CMMC 2.0. The model reduced complexity by consolidating the five levels down to three:

    • Level 1 (Foundational): Focused on protecting FCI with basic practices, allowing for annual self-assessment and affirmation.
    • Level 2 (Advanced): Built directly on the 110 NIST SP 800-171 requirements. Depending on the solicitation, this level may require either a self-assessment or a third-party assessment by a Certified Third-Party Assessor Organization (C3PAO).
    • Level 3 (Expert): Intended for the most sensitive defense programs, this level requires controls beyond NIST 800-171 and audits performed by the Defense Industrial Base Cybersecurity Assessment Center (DIBCAC).

    Rulemaking and Finalization

    The DoD began the formal rulemaking process in 2023 under Title 32 and Title 48 of the Code of Federal Regulations. After extensive reviews and public feedback, the final program rule for CMMC was published on October 15, 2024, and became effective on December 16, 2024. This rule formally codified the structure of CMMC 2.0.

    A second rule followed on September 10, 2025, when the DoD published a final DFARS rule making CMMC a contractual requirement. That DFARS rule is scheduled to take effect on November 10, 2025. Beginning then, solicitations can include DFARS clauses such as 252.204-7021 and 252.204-7025, specifying the CMMC level required. Contractors that cannot meet the designated level at the time of award risk being deemed ineligible.


    What Has Changed for Contractors

    Under the most recent rules, CMMC requirements will be phased into contracts over a three-year period, with gradual expansion until full application across the DIB. The rule also introduces the option for Plans of Action and Milestones (POA&Ms) at Levels 2 and 3. Contractors can achieve conditional certification while closing gaps, but remediation must be completed within 180 days or the certification will lapse.

    Service providers remain in scope of a contractor’s audit if they process, store, transmit, or can affect the security of CUI systems. While these providers may not be required to hold independent certification in every case, contractors are strongly advised to work with C3PAO-validated partners. If a provider lacks sufficient security controls, it can still impact the outcome of the contractor’s assessment.


    Looking Ahead

    CMMC has evolved from an idea in 2019 into a fully codified requirement now tied directly to DoD contracting. What began as a five-level model has been streamlined to three, but the intent remains the same: to enforce stronger protection of CUI and Federal Contract Information across the entire defense supply chain.

    For contractors, the path forward is clear. Compliance is no longer optional, and preparation must begin well before contracts are awarded. Mapping CUI boundaries, documenting controls, engaging with accredited C3PAOs, and selecting trustworthy service providers are now baseline requirements for maintaining eligibility in the defense market.

    CMMC’s history shows how quickly compliance expectations can shift. Its future will continue to shape the way the defense industrial base approaches cybersecurity, risk management, and trust with the Department of Defense.


    How Can Netizen Help?

    Founded in 2013, Netizen is an award-winning technology firm that develops and delivers innovative cybersecurity and technology solutions for government, defense, and commercial clients worldwide. Our mission is to transform complex security and compliance challenges into strategic advantages by safeguarding and optimizing digital infrastructure. One example is our “CISO-as-a-Service” offering, which enables organizations of any size to access executive-level cybersecurity expertise at a fraction of the cost of hiring internally.

    Netizen operates a state-of-the-art 24x7x365 Security Operations Center (SOC) and provides a full suite of services including vulnerability assessments, penetration testing, software assurance, managed detection and response, and compliance advisory. For organizations preparing for CMMC, we currently provide CMMC pre-assessments to help contractors evaluate their readiness, map gaps against requirements, and build a remediation roadmap before undergoing a third-party audit. This proactive approach allows companies to address deficiencies early and approach certification with greater confidence.

    Our organization holds ISO 27001, ISO 9001, ISO 20000-1, and CMMI Level III SVC certifications, demonstrating the maturity of our own operations. We are also a Service-Disabled Veteran-Owned Small Business (SDVOSB) recognized by the U.S. Small Business Administration, and we’ve been named to the Inc. 5000 and Vet 100 lists of the fastest-growing private companies in the nation. Netizen has been recognized as a national “Best Workplace” by Inc. Magazine and is a multi-year recipient of the U.S. Department of Labor’s HIRE Vets Platinum Medallion for veteran hiring and retention.

    If your organization is preparing for CMMC compliance, Netizen can help you start with a clear picture of your current state. Our pre-assessments provide the guidance needed to plan effectively, reduce risks of failed audits, and ensure long-term alignment with DoD cybersecurity requirements.

    Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.


  • Hidden Prompts in Images Threaten Gemini, Vertex AI, and Other Platforms

    Researchers at Trail of Bits have unveiled a novel attack that leverages image downscaling artifacts to perform hidden prompt injections against large language models (LLMs). The attack embeds malicious instructions into high-resolution images that appear harmless to the human eye but become visible when the image is downscaled, a process most AI systems perform automatically for efficiency.

    This allows attackers to execute prompt injections without the user’s knowledge, potentially leading to data exfiltration, unauthorized tool execution, or manipulation of outputs across AI platforms.


    How the Attack Works

    When users upload images into AI systems, the images are often downscaled using algorithms like nearest neighbor, bilinear, or bicubic interpolation. These resampling methods unintentionally introduce aliasing artifacts, which attackers can exploit by carefully crafting pixel arrangements.

    In practice:

    • The full-resolution image looks benign.
    • Once downscaled, hidden instructions appear (for example, dark areas shifting to red and text appearing in black).
    • The AI model interprets the hidden text as part of the user’s instructions and executes it.

    Trail of Bits demonstrated this by exfiltrating Google Calendar data via Gemini CLI using Zapier MCP with trust=True. The attack required no user confirmation since the tool calls were automatically approved.


    Affected Platforms

    The researchers confirmed that their attack is feasible against multiple production AI systems, including:

    • Google Gemini CLI
    • Vertex AI Studio (Gemini backend)
    • Gemini’s web interface and API
    • Google Assistant (Android)
    • Genspark

    To aid reproducibility, they released Anamorpher, an open-source tool capable of generating crafted images for different downscaling algorithms.


    Why This Works: The Image-Scaling Blind Spot

    This attack builds on earlier academic research (2020, TU Braunschweig) that described the possibility of image-scaling attacks in machine learning. While originally focused on computer vision, Trail of Bits weaponized the idea for multi-modal prompt injection.

    The vulnerability arises because:

    1. AI systems enforce fixed image sizes, making downscaling inevitable.
    2. Interpolation creates predictable patterns that attackers can reverse-engineer.
    3. Users see the high-resolution input, but the LLM sees the downscaled version, creating a mismatch between perception and processing.

    Security Implications

    The attack is particularly dangerous because it exploits a fundamental preprocessing step in AI pipelines rather than relying on a single bug. It highlights:

    • A mismatch between what the user sees and what the model processes.
    • The risk of silent prompt injection hidden inside non-textual data.
    • The potential for cross-system exploitation, as the same crafted image may work against multiple AI systems using similar algorithms.

    This expands the attack surface for AI, particularly in multi-modal systems that handle both text and images.


    Mitigation Strategies

    Trail of Bits recommends several defensive measures:

    1. Avoid automatic downscaling when possible; enforce fixed input dimensions instead.
    2. Preview the downscaled image to users so they can see what the model sees.
    3. Require explicit confirmation for sensitive tool calls, especially if hidden text is detected within images.
    4. Adopt secure design patterns that mitigate prompt injection across modalities, rather than patching single attack vectors.

    How Can Netizen Help?

    Founded in 2013, Netizen is an award-winning technology firm that develops and leverages cutting-edge solutions to create a more secure, integrated, and automated digital environment for government, defense, and commercial clients worldwide. Our innovative solutions transform complex cybersecurity and technology challenges into strategic advantages by delivering mission-critical capabilities that safeguard and optimize clients’ digital infrastructure. One example of this is our popular “CISO-as-a-Service” offering that enables organizations of any size to access executive level cybersecurity expertise at a fraction of the cost of hiring internally. 

    Netizen also operates a state-of-the-art 24x7x365 Security Operations Center (SOC) that delivers comprehensive cybersecurity monitoring solutions for defense, government, and commercial clients. Our service portfolio includes cybersecurity assessments and advisory, hosted SIEM and EDR/XDR solutions, software assurance, penetration testing, cybersecurity engineering, and compliance audit support. We specialize in serving organizations that operate within some of the world’s most highly sensitive and tightly regulated environments where unwavering security, strict compliance, technical excellence, and operational maturity are non-negotiable requirements. Our proven track record in these domains positions us as the premier trusted partner for organizations where technology reliability and security cannot be compromised.

    Netizen holds ISO 27001, ISO 9001, ISO 20000-1, and CMMI Level III SVC registrations demonstrating the maturity of our operations. We are a proud Service-Disabled Veteran-Owned Small Business (SDVOSB) certified by U.S. Small Business Administration (SBA) that has been named multiple times to the Inc. 5000 and Vet 100 lists of the most successful and fastest-growing private companies in the nation. Netizen has also been named a national “Best Workplace” by Inc. Magazine, a multiple awardee of the U.S. Department of Labor HIRE Vets Platinum Medallion for veteran hiring and retention, the Lehigh Valley Business of the Year and Veteran-Owned Business of the Year, and the recipient of dozens of other awards and accolades for innovation, community support, working environment, and growth.

    Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.


  • Microsoft September 2025 Patch Tuesday Fixes 81 Flaws, Two Publicly Disclosed Zero-Days

    Microsoft’s September 2025 Patch Tuesday delivers fixes for 81 vulnerabilities, including two publicly disclosed zero-days. Nine flaws are classified as critical, with five involving remote code execution, one tied to information disclosure, and two to elevation of privilege.


    Breakdown of Vulnerabilities

    • 41 Elevation of Privilege vulnerabilities
    • 22 Remote Code Execution vulnerabilities
    • 16 Information Disclosure vulnerabilities
    • 2 Security Feature Bypass vulnerabilities
    • 3 Denial of Service vulnerabilities
    • 1 Spoofing vulnerability

    These totals do not include earlier fixes for three Azure flaws, one Dynamics 365 FastTrack Implementation Assets flaw, two Mariner bugs, five Microsoft Edge issues, and one Xbox vulnerability. Non-security updates released this month include Windows 11 KB5065426 and KB5065431, and Windows 10 KB5065429.


    Zero-Day Vulnerability

    CVE-2025-55234 | Windows SMB Elevation of Privilege Vulnerability

    This vulnerability can be exploited through relay attacks. Depending on configuration, an attacker could relay SMB sessions and gain elevated privileges. Microsoft recommends enabling SMB Server Signing and Extended Protection for Authentication (EPA) to mitigate risk, though both may introduce compatibility issues with older devices. September updates introduce new auditing capabilities to help administrators assess client compatibility with SMB hardening.

    CVE-2024-21907 | Newtonsoft.Json Denial of Service Vulnerability in SQL Server

    This flaw arises from mishandling exceptional conditions in Newtonsoft.Json prior to version 13.0.1. Passing crafted data to the JsonConvert.DeserializeObject method can trigger a StackOverflow exception, causing denial of service. Updates for SQL Server now integrate the patched Newtonsoft.Json library. This vulnerability was originally disclosed in 2024.


    Other Critical Vulnerabilities

    Microsoft also patched multiple remote code execution flaws across Windows components and Microsoft Office, as well as high-severity information disclosure and privilege escalation vulnerabilities. These issues remain attractive targets for attackers and should be prioritized in patching schedules.


    Adobe and Other Vendor Updates

    Other vendors issuing security updates in September 2025 include:

    • Adobe: Patched a Magento flaw called “SessionReaper” impacting eCommerce sites
    • Argo: Fixed an Argo CD bug allowing low-privileged tokens to access repository credentials
    • Cisco: Released updates for WebEx, Cisco ASA, and related products
    • Google: Issued September Android updates addressing 84 flaws, including two zero-days under active exploitation
    • SAP: Released updates across multiple products, including a maximum-severity command execution flaw in NetWeaver
    • Sitecore: Addressed an actively exploited zero-day tracked as CVE-2025-53690
    • TP-Link: Confirmed a zero-day in certain router models, with patches in development for US customers

    Recommendations for Users and Administrators

    Organizations should prioritize applying patches for systems using SMB Server and SQL Server given the public disclosure of both zero-days. Administrators are advised to test and enable SMB Server Signing and EPA where possible and use the new auditing capabilities to prepare for enforcement. SQL Server deployments should be updated to versions incorporating Newtonsoft.Json 13.0.1 or later.

    Security teams should also review vendor advisories from Adobe, Cisco, Google, SAP, and Sitecore, particularly where vulnerabilities are confirmed to be under active attack.


    How Can Netizen Help?

    Founded in 2013, Netizen is an award-winning technology firm that develops and leverages cutting-edge solutions to create a more secure, integrated, and automated digital environment for government, defense, and commercial clients worldwide. Our innovative solutions transform complex cybersecurity and technology challenges into strategic advantages by delivering mission-critical capabilities that safeguard and optimize clients’ digital infrastructure. One example of this is our popular “CISO-as-a-Service” offering that enables organizations of any size to access executive level cybersecurity expertise at a fraction of the cost of hiring internally. 

    Netizen also operates a state-of-the-art 24x7x365 Security Operations Center (SOC) that delivers comprehensive cybersecurity monitoring solutions for defense, government, and commercial clients. Our service portfolio includes cybersecurity assessments and advisory, hosted SIEM and EDR/XDR solutions, software assurance, penetration testing, cybersecurity engineering, and compliance audit support. We specialize in serving organizations that operate within some of the world’s most highly sensitive and tightly regulated environments where unwavering security, strict compliance, technical excellence, and operational maturity are non-negotiable requirements. Our proven track record in these domains positions us as the premier trusted partner for organizations where technology reliability and security cannot be compromised.

    Netizen holds ISO 27001, ISO 9001, ISO 20000-1, and CMMI Level III SVC registrations demonstrating the maturity of our operations. We are a proud Service-Disabled Veteran-Owned Small Business (SDVOSB) certified by U.S. Small Business Administration (SBA) that has been named multiple times to the Inc. 5000 and Vet 100 lists of the most successful and fastest-growing private companies in the nation. Netizen has also been named a national “Best Workplace” by Inc. Magazine, a multiple awardee of the U.S. Department of Labor HIRE Vets Platinum Medallion for veteran hiring and retention, the Lehigh Valley Business of the Year and Veteran-Owned Business of the Year, and the recipient of dozens of other awards and accolades for innovation, community support, working environment, and growth.

    Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.


  • Netizen: Monday Security Brief (9/8/2024)

    Today’s Topics:

    • Not Just Research: Threat Actors Are Weaponizing AI for Ransomware
    • CVE-2025-42957: Critical SAP S/4HANA Code Injection Vulnerability Actively Exploited
    • How can Netizen help?

    Not Just Research: Threat Actors Are Weaponizing AI for Ransomware

    AI-powered ransomware is no longer a distant possibility. Although the recently surfaced PromptLock turned out to be a research prototype created at NYU Tandon School of Engineering, attackers are already using tools like Claude Code to automate reconnaissance, exploitation, and extortion in the wild. What began as an academic demonstration of “Ransomware 3.0” has already been mirrored by real threat actors targeting healthcare, defense, and financial organizations

    When PromptLock samples first appeared on VirusTotal in August 2025, security researchers suspected a new form of ransomware. Analysis by ESET showed it relied on OpenAI’s GPT-OSS:20b model, dynamically generating Lua scripts to perform reconnaissance and execute malicious actions. Soon after, academics confirmed that PromptLock was in fact a controlled proof-of-concept. Their goal was to demonstrate how large language models could coordinate an entire ransomware chain, from surveying a victim’s environment to deploying customized payloads and even writing tailored extortion notes. The research highlighted how easily a benign-looking AI utility could conceal hidden instructions, making detection increasingly difficult.

    The fact that PromptLock was only a lab project does not mean the threat is hypothetical. Anthropic’s August 2025 threat intelligence report revealed real-world misuse of its Claude Code agent. According to the report, attackers were able to use the tool for reconnaissance, lateral movement, and large-scale data theft, embedding their preferred tactics and playbooks into configuration files so the assistant would respond in ways that supported their campaign. The same system generated ransom notes, packaged malware with evasion techniques, and analyzed stolen data to set extortion demands, some of which exceeded half a million dollars. Victims ranged from a defense contractor to financial institutions and healthcare providers, with stolen material including social security numbers, banking details, patient records, and ITAR-controlled documentation.

    Anthropic responded by banning the malicious accounts and working to strengthen its detection capabilities. Security experts stress that although the core techniques of ransomware have not changed, AI drastically lowers the barrier to entry and accelerates every phase of an attack. As Exabeam’s Steve Povolny observed, what once required teams of skilled operators can now be achieved faster and cheaper through modular, AI-driven tasks, in the same way non-coders now build enterprise applications with AI assistance.

    PromptLock itself may be only a proof-of-concept, but its design reflects tactics that are already active in the wild. The lesson for defenders is clear: AI is now serving attackers not just as a consultant, but as an operator, compressing the time it takes to plan and launch ransomware campaigns. Security teams will need to assume that adversaries can rapidly construct large-scale, tailored attacks with the same ease that businesses now adopt AI to streamline development and operations.


    CVE-2025-42957: Critical SAP S/4HANA Code Injection Vulnerability Actively Exploited

    A newly confirmed wave of exploitation is targeting CVE-2025-42957, a critical code injection flaw in SAP’s S/4HANA ERP platform. First disclosed and patched in SAP’s August 2025 security updates, the vulnerability was discovered by SecurityBridge and carries a CVSS v3 score of 9.9. The issue affects both on-premises and private cloud deployments of S/4HANA and is now being abused in the wild, with exploitation attempts spiking after the release of SAP’s patch.

    The vulnerability allows attackers with only low-privileged user access to inject ABAP code into the system, ultimately giving them complete control of both the SAP environment and the host operating system. Although a valid account is required, the complexity of the attack is minimal and can be carried out remotely over the network. According to SecurityBridge, the patch is relatively easy to reverse engineer, which means attackers can quickly develop working exploits.

    Reports from both SecurityBridge and Pathlock confirm that malicious actors are already testing and abusing this flaw. Once exploited, an attacker could directly manipulate or delete corporate data in the SAP database, create persistent backdoor accounts with administrative privileges, steal hashed passwords, and extend control into the host operating system. The fact that a single compromised user account can lead to full system compromise makes this vulnerability especially dangerous.

    SAP customers are strongly urged to apply the August 2025 patches without delay. Beyond patching, SecurityBridge advises enabling the Unified Connectivity framework (UCON) to restrict remote function call (RFC) usage, and monitoring logs carefully for unusual RFC activity or newly created administrative accounts. Organizations should also audit privileged accounts and system activity to ensure attackers have not already established persistence.

    CVE-2025-42957 highlights how attackers continue to focus on SAP environments as high-value targets. The vulnerability requires little effort to exploit, provides complete system access, and has already been weaponized in real-world attacks. Organizations that delay remediation face the risk of data theft, operational disruption, and potentially long-lasting compromise.


    How Can Netizen Help?

    Founded in 2013, Netizen is an award-winning technology firm that develops and leverages cutting-edge solutions to create a more secure, integrated, and automated digital environment for government, defense, and commercial clients worldwide. Our innovative solutions transform complex cybersecurity and technology challenges into strategic advantages by delivering mission-critical capabilities that safeguard and optimize clients’ digital infrastructure. One example of this is our popular “CISO-as-a-Service” offering that enables organizations of any size to access executive level cybersecurity expertise at a fraction of the cost of hiring internally. 

    Netizen also operates a state-of-the-art 24x7x365 Security Operations Center (SOC) that delivers comprehensive cybersecurity monitoring solutions for defense, government, and commercial clients. Our service portfolio includes cybersecurity assessments and advisory, hosted SIEM and EDR/XDR solutions, software assurance, penetration testing, cybersecurity engineering, and compliance audit support. We specialize in serving organizations that operate within some of the world’s most highly sensitive and tightly regulated environments where unwavering security, strict compliance, technical excellence, and operational maturity are non-negotiable requirements. Our proven track record in these domains positions us as the premier trusted partner for organizations where technology reliability and security cannot be compromised.

    Netizen holds ISO 27001, ISO 9001, ISO 20000-1, and CMMI Level III SVC registrations demonstrating the maturity of our operations. We are a proud Service-Disabled Veteran-Owned Small Business (SDVOSB) certified by U.S. Small Business Administration (SBA) that has been named multiple times to the Inc. 5000 and Vet 100 lists of the most successful and fastest-growing private companies in the nation. Netizen has also been named a national “Best Workplace” by Inc. Magazine, a multiple awardee of the U.S. Department of Labor HIRE Vets Platinum Medallion for veteran hiring and retention, the Lehigh Valley Business of the Year and Veteran-Owned Business of the Year, and the recipient of dozens of other awards and accolades for innovation, community support, working environment, and growth.

    Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.


  • What is ISO 27001 and How Can It Benefit Your Organization?

    Cybersecurity leaders know that technical defenses alone are not enough. To truly safeguard sensitive information, organizations need a structured framework that brings together people, processes, and technology. That’s where ISO/IEC 27001 comes in. As the most widely recognized international standard for information security management, ISO 27001 helps organizations build a resilient Information Security Management System (ISMS) that reduces risk, ensures compliance, and inspires trust across clients and partners.

    For companies operating in highly regulated sectors such as healthcare, finance, and defense, ISO 27001 certification has quickly become a prerequisite for doing business. But even beyond compliance, the standard offers strategic advantages that extend well into daily operations.


    Understanding ISO 27001

    ISO 27001 establishes a clear framework for managing information security by requiring organizations to identify risks, implement controls, and continuously refine their defenses. At its foundation is the CIA triad:

    • Confidentiality – protecting sensitive information from unauthorized access.
    • Integrity – ensuring that data remains accurate and unaltered.
    • Availability – guaranteeing that systems and data are accessible when needed.

    Certification requires more than paperwork; it demands organizational commitment, executive buy-in, and third-party audits to confirm that security is not just documented but operationalized.


    Why ISO 27001 Matters

    Strengthened Security and Reduced Breach Risk

    The structured risk assessments required by ISO 27001 uncover blind spots in existing security programs and ensure that controls evolve alongside new threats. This makes breaches less likely and less damaging when they occur.

    Increased Trust With Clients and Partners

    Certification demonstrates to customers that their data is handled responsibly. In a climate where supply chain security is under constant scrutiny, ISO 27001 signals maturity and accountability.

    Competitive Advantage in the Marketplace

    For many contracts, particularly in government and critical infrastructure, ISO 27001 is not optional. Organizations without certification risk being sidelined, while certified entities gain a competitive edge.

    Cost Savings Through Prevention

    Data breaches are expensive, with costs extending well beyond regulatory fines. By reducing the likelihood and impact of incidents, ISO 27001 helps organizations protect both reputation and bottom line.

    Streamlined Compliance Across Frameworks

    Because ISO 27001 aligns closely with frameworks like NIST CSF, GDPR, and SOC 2, certification can reduce the burden of overlapping audits and improve efficiency for compliance teams.


    Building a Culture of Security

    One of ISO 27001’s most impactful benefits is cultural. By embedding information security into every layer of operations, organizations move beyond check-the-box compliance and foster a security-first mindset. Employees receive ongoing training, human error is reduced, and decision-making increasingly considers risk alongside business goals.


    How Netizen Can Help

    Achieving ISO 27001 certification requires expertise and sustained effort, but you don’t have to go it alone. Netizen has guided government, defense, and commercial organizations through complex compliance initiatives, helping them align security programs with business objectives.

    Our CISO-as-a-Service offering gives organizations of any size access to executive-level expertise, while our 24x7x365 Security Operations Center (SOC) provides continuous monitoring and incident response. From compliance gap assessments to audit readiness, penetration testing, and security engineering, Netizen delivers the capabilities needed to not only meet ISO 27001 requirements but exceed them.

    Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.


  • ClickFix Attack Uses AI Summaries to Spread Malware

    Researchers have detailed a new proof-of-concept attack showing how adversaries can use AI-generated summaries to push ransomware and other malicious commands directly to unsuspecting users.


    How ClickFix Works

    The tactic, called ClickFix, manipulates victims into running self-sabotaging commands under the guise of resolving an error or fixing an issue. In past incidents, attackers impersonated Booking.com or injected fake reCAPTCHA prompts, tricking users into pasting commands into the Windows Run prompt. In one campaign, over 100 automotive dealership websites briefly displayed malicious instructions to visitors.

    The new proof-of-concept from CloudSEK takes ClickFix a step further by abusing AI summarization tools. Researchers showed how attackers could embed malicious instructions into HTML content using techniques like invisible white-on-white text, zero-width characters, tiny font sizes, and off-screen text placement. While these elements remain invisible to a human reader, they dominate an AI model’s context window, surfacing prominently in generated summaries.

    When an AI assistant, browser extension, or email summarizer processes the content, the summary may end up displaying the hidden payload as if it were legitimate advice. CloudSEK demonstrated how such a summary could instruct a victim to paste a PowerShell command into the Run prompt, initiating a ransomware infection. Because the instructions appear to come from the AI summarizer itself, not an external attacker, the victim is far less likely to question them.


    CSS Obfuscation and Prompt Overload

    The success of this attack relies on a blend of CSS obfuscation and what researchers call “prompt overdose.” By repeating hidden payloads multiple times in the HTML, the attacker ensures that the malicious instructions outweigh legitimate context during summarization.

    This manipulation effectively turns the AI tool from a passive summarizer into an active participant in the social engineering chain. What looks like a harmless article, blog post, or email to a human user may, once summarized, output only the attacker’s malicious instructions.


    Defensive Recommendations

    CloudSEK’s guidance for defenders focuses on improving how AI pipelines preprocess and handle content:

    • Summarizers should normalize or strip suspicious CSS attributes before processing inputs.
    • Enterprises should implement prompt sanitizers that filter hidden payloads before they reach summarization models.
    • Detection rules should be created for repeated, hidden text patterns that could dominate AI outputs.
    • Organizations deploying internal AI summarizers should enforce strict preprocessing policies at gateways, content systems, and browser extensions.

    Most importantly, researchers emphasize the need for enterprise-level AI policy enforcement and secure design patterns that prevent AI outputs from triggering sensitive actions without explicit user approval.


    How Can Netizen Help?

    Founded in 2013, Netizen is an award-winning technology firm that develops and leverages cutting-edge solutions to create a more secure, integrated, and automated digital environment for government, defense, and commercial clients worldwide. Our innovative solutions transform complex cybersecurity and technology challenges into strategic advantages by delivering mission-critical capabilities that safeguard and optimize clients’ digital infrastructure. One example of this is our popular “CISO-as-a-Service” offering that enables organizations of any size to access executive level cybersecurity expertise at a fraction of the cost of hiring internally. 

    Netizen also operates a state-of-the-art 24x7x365 Security Operations Center (SOC) that delivers comprehensive cybersecurity monitoring solutions for defense, government, and commercial clients. Our service portfolio includes cybersecurity assessments and advisory, hosted SIEM and EDR/XDR solutions, software assurance, penetration testing, cybersecurity engineering, and compliance audit support. We specialize in serving organizations that operate within some of the world’s most highly sensitive and tightly regulated environments where unwavering security, strict compliance, technical excellence, and operational maturity are non-negotiable requirements. Our proven track record in these domains positions us as the premier trusted partner for organizations where technology reliability and security cannot be compromised.

    Netizen holds ISO 27001, ISO 9001, ISO 20000-1, and CMMI Level III SVC registrations demonstrating the maturity of our operations. We are a proud Service-Disabled Veteran-Owned Small Business (SDVOSB) certified by U.S. Small Business Administration (SBA) that has been named multiple times to the Inc. 5000 and Vet 100 lists of the most successful and fastest-growing private companies in the nation. Netizen has also been named a national “Best Workplace” by Inc. Magazine, a multiple awardee of the U.S. Department of Labor HIRE Vets Platinum Medallion for veteran hiring and retention, the Lehigh Valley Business of the Year and Veteran-Owned Business of the Year, and the recipient of dozens of other awards and accolades for innovation, community support, working environment, and growth.

    Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.


  • Netizen: August 2025 Vulnerability Review

    Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing the outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five critical vulnerabilities from August that should be immediately patched or addressed if present in your environment. Detailed writeups below:


    CVE-2025-7775

    CVE-2025-7775 describes a critical memory overflow vulnerability affecting NetScaler ADC and NetScaler Gateway when configured in several modes, including Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy), AAA virtual server, and load balancing virtual servers bound with IPv6 services or DBS IPv6 servers, as well as CR virtual servers of type HDX. The vulnerability arises from improper memory handling that can be triggered remotely, allowing an attacker to achieve remote code execution or denial of service depending on the exploitation path. With network-based access, an attacker could craft malicious packets targeting exposed NetScaler services, leading either to the execution of arbitrary code on the device or the crash and disruption of critical VPN and proxy services.

    This flaw is particularly dangerous in enterprise and cloud environments where NetScaler appliances serve as critical access gateways, since exploitation could result in full compromise of infrastructure, service outages, and lateral movement into internal networks. The vulnerability has been assigned a CVSS v3 base score of 9.8, with a vector of AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, reflecting its low attack complexity, lack of required privileges, and ability to compromise confidentiality, integrity, and availability. Under CVSS v4, the score remains severe at 9.2, further underscoring the risk in production environments. Public reporting confirms that this issue has already been exploited as a zero-day, with CISA adding it to the Known Exploited Vulnerabilities (KEV) catalog and multiple security researchers tracking widespread attacks. Reports indicate that over 28,000 NetScaler appliances remained exposed to the flaw at the time of disclosure, amplifying the urgency for remediation.

    Citrix addressed CVE-2025-7775 in emergency updates released on August 26, 2025, as part of a security bulletin that also included two additional NetScaler vulnerabilities. Organizations running affected versions of NetScaler ADC and Gateway should immediately apply the patches provided by Citrix, or implement compensating controls such as disabling IPv6 bindings and restricting external exposure of management and gateway interfaces until patching is complete. Exploitation of this flaw can grant attackers direct access to internal systems by hijacking critical VPN or load balancing infrastructure, making rapid patching and hardening of NetScaler environments an operational priority. More detailed guidance and official mitigation steps are available from Citrix’s advisory and the CISA KEV catalog.


    CVE-2025-53771

    CVE-2025-53771 describes a medium-severity improper authentication vulnerability in Microsoft Office SharePoint that allows an unauthorized attacker to perform spoofing attacks over a network. The flaw stems from insufficient validation within SharePoint’s authentication mechanisms, which permits a malicious actor to manipulate requests and impersonate legitimate users or services. By exploiting this weakness, an attacker could craft specially designed network requests to trick SharePoint into granting them access under a falsified identity, undermining the trust model of the platform. This can allow further exploitation when chained with other vulnerabilities, particularly in the ToolShell exploit chain where spoofing was used to bypass protections and gain entry into sensitive administrative interfaces.

    The vulnerability poses a significant risk in enterprise environments because SharePoint often serves as a central hub for collaboration, document storage, and workflow automation. Spoofing attacks targeting SharePoint can compromise the confidentiality of business-critical data and may facilitate privilege escalation or lateral movement if an attacker manages to impersonate privileged users. While this issue requires network access, the attack complexity is low and no user interaction is necessary, meaning it can be reliably executed once the attacker identifies a vulnerable system. The vulnerability has been assigned a CVSS v3 base score of 6.5 with a vector of AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N, highlighting the impacts to confidentiality and integrity but not availability. Under CVSS v2 scoring, the base score is listed at 7.5 due to differences in weighting methodology.

    Microsoft patched CVE-2025-53771 in July 2025 as part of updates addressing the ToolShell exploit chain, which included several interlinked SharePoint flaws. The vulnerability is actively monitored in security advisories and was quickly added to exploitation watchlists because of its role in enabling bypasses of earlier mitigations. Organizations running affected SharePoint environments should apply Microsoft’s July 2025 security updates without delay and ensure that their SharePoint instances are not directly exposed to the internet. CISA and Microsoft advisories emphasize the importance of restricting external access, applying network segmentation, and enabling strict authentication controls to reduce the impact of any spoofing attempts. Since this flaw fits into broader exploit chains, especially those demonstrated during Pwn2Own and later expanded by attackers in the wild, administrators should consider it a priority to patch and monitor for signs of exploitation.


    CVE-2025-54948

    CVE-2025-54948 is a critical command injection vulnerability affecting the Trend Micro Apex One on-premises management console. The flaw allows a pre-authenticated remote attacker to upload malicious code and execute arbitrary commands on affected systems. Since this vulnerability does not require prior authentication, exploitation is trivial once an attacker can reach the exposed management console, making it particularly dangerous for organizations that have not restricted external access. Exploitation can lead to full compromise of the endpoint security platform, granting adversaries administrative control over large fleets of protected systems.

    Trend Micro confirmed that this vulnerability, alongside CVE-2025-54987, was exploited in the wild as zero-days in August 2025. Reports indicated active targeting of enterprises, with attackers leveraging the flaw to gain persistence, disable defenses, and deploy secondary payloads. Security researchers and CISA flagged the issue as part of the Known Exploited Vulnerabilities (KEV) catalog, further underscoring its active use in attacks. Temporary mitigation tools were released by Trend Micro to limit exposure until full security patches could be applied, but these mitigations should be treated only as stopgaps.

    The vulnerability has been assigned a CVSS v3 base score of 9.8 (vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its critical nature across confidentiality, integrity, and availability. Under CVSS v2, the vulnerability carries a base score of 10. The EPSS probability sits at 0.18488, indicating a significant likelihood of widespread exploitation.

    Organizations using Apex One should immediately apply Trend Micro’s latest patches or, at minimum, deploy the mitigation tools provided while restricting console access to trusted networks. Network monitoring for suspicious uploads, reviewing Apex One administrative activity logs, and implementing compensating controls such as firewall rules and intrusion prevention signatures are recommended until systems are fully remediated. Given its exploitation in the wild, unpatched instances remain high-value targets and should be prioritized for immediate remediation.


    CVE-2025-8088

    CVE-2025-8088 is a high-severity path traversal vulnerability in the Windows version of WinRAR that enables attackers to execute arbitrary code by crafting malicious archive files. Discovered by security researchers Anton Cherepanov, Peter Košinár, and Peter Strýček from ESET, the flaw was confirmed to be exploited in the wild before disclosure, which led to its addition to the CISA Known Exploited Vulnerabilities (KEV) catalog.

    The attack vector relies on specially crafted archive files that bypass WinRAR’s intended directory restrictions. When a user extracts such a file, the embedded payload can overwrite critical files or be executed outside the intended extraction path. Because WinRAR is widely used to handle compressed files, especially in enterprise environments where email attachments and downloads are common, this flaw presents a strong opportunity for attackers to distribute malware, gain persistence, or escalate access within targeted networks. Social engineering campaigns could easily weaponize the vulnerability by disguising malicious archives as legitimate content, tricking users into extraction.

    The vulnerability has been rated as critical under CVSS v2 with a score of 10, while CVSS v3 assigned it a high score of 8.8 (vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). Under the updated CVSS v4 framework, it carries a score of 8.4, with the primary risk centered on confidentiality, integrity, and availability impacts through unauthorized code execution. EPSS data places its exploitation probability at 0.05624, underscoring that active use has been observed and further exploitation is likely.

    Organizations should prioritize mitigation by ensuring they are running patched versions of WinRAR and restricting the use of outdated builds. Since exploitation requires users to interact with malicious archives, endpoint detection and monitoring of suspicious archive extraction behavior should also be employed. Where possible, implementing application control, disabling automatic script execution, and limiting the use of WinRAR in high-risk environments can reduce exposure. Security advisories also suggest deploying Windows Software Restriction Policies (SRP) or Image File Execution Options (IFEO) to mitigate exploitation attempts until full remediation is in place.


    CVE-2025-21479

    CVE-2025-21479 describes a high-severity memory corruption vulnerability affecting Qualcomm GPU micronodes, where unauthorized command execution during the processing of a specific sequence of GPU instructions can lead to code execution. This flaw allows an attacker to trigger memory corruption by exploiting improperly validated GPU command streams, potentially resulting in arbitrary command execution within the GPU environment. Since GPUs are heavily leveraged for both graphics rendering and compute workloads, exploitation could allow an attacker to interfere with trusted processes, inject malicious operations, or escalate their control over the device.

    The attack vector is local in nature, as exploitation requires the attacker to execute crafted GPU command sequences on a vulnerable system. This can occur through malicious applications distributed via app stores or sideloaded APKs on Android devices. Once executed, the malicious commands can corrupt GPU memory structures, allowing an attacker to achieve code execution in the context of GPU processes, which can then be leveraged for persistence or to escape into higher-privilege components of the operating system. Reports have confirmed that this vulnerability has been actively exploited in the wild, leading to its inclusion in the CISA Known Exploited Vulnerabilities (KEV) catalog, underscoring the likelihood of targeted attacks against Android and other Qualcomm-powered devices.

    The vulnerability carries a CVSS v3 base score of 8.6 (vector: AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H), reflecting its high impact across confidentiality, integrity, and availability once triggered. Under CVSS v2, it is rated 7.2, with exploitation requiring local access but relatively low complexity. EPSS data places the probability of exploitation at 0.12787, reinforcing the fact that attackers are already using it against exposed devices.

    Google addressed the flaw in the August 2025 Android security bulletin, patching affected devices through firmware updates. Qualcomm also issued fixes for impacted Adreno GPU drivers and urged OEMs to push updates to their devices as quickly as possible. Organizations and end-users are strongly encouraged to apply the latest Android security updates immediately, as devices running outdated GPU firmware remain at significant risk. Mitigations such as restricting the installation of untrusted apps and monitoring for abnormal GPU behavior should be applied until patches are fully deployed.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.


  • Netizen Cybersecurity Bulletin (August 28th, 2025)

    Overview:

    • Phish Tale of the Week
    • NetScaler ADC and Gateway Security Bulletin: CVE-2025-7775, CVE-2025-7776, CVE-2025-8424
    • PromptLock: The First AI-Powered Ransomware Emerges Using OpenAI’s gpt-oss:20b
    • How can Netizen help?

    Phish Tale of the Week

    Often times phishing campaigns, created by malicious actors, target users by utilizing social engineering. For example, in this email, the actors are appearing as Coinbase. They’re sending us a text message, telling us that our Coinbase account was logged into, and we need to call support if it wasn’t us. It seems both urgent and genuine, so why shouldn’t we? Luckily, there’s plenty of reasons that point to this being a scam.

    Here’s how we can tell not to call this number:

    1. The first warning sign for this SMS is the context in which it was sent. When I recieved this SMS, I immediately knew not to click on the link due to the fact that I do not have a Coinbase account. On top of that, it’s very apparent that this message was blasted out to random numbers: the message doesn’t even include my name or attempt to provide any level of familiarity.
    2. The second warning signs in this email is the messaging. This message tries to create a sense of urgency in order to get you to take action by using language such as “If this was not you.” Phishing and smishing scams commonly attempt to create a sense of urgency/confusion in their messages in order to get you to click their link without thinking about it first. Always be sure to thoroughly inspect the style and tone of all texts before following a link or other attachment sent through SMS.
    3. The final warning sign for this email is the wording; in our case the smisher suggests we call a random number, something that Coinbase support would never do. All of these factors point to the above being a smishing text, and a very unsophisticated one at that.


    General Recommendations:

    smishing attack will typically direct the user to click on a link where they will then be prompted to update personal information, such as a password, credit card, social security, or bank account information. A legitimate company already has this sensitive information and would not ask for it again, especially via your text messages. 

    1. Scrutinize your messages before clicking anything. Have you ordered anything recently? Does this order number match the one I already have? Did the message come from a store you don’t usually order supplies from or a service you don’t use? If so, it’s probably a phishing attempt.
    2. Verify that the sender is actually from the company sending the message.
    3. Did you receive a message from someone you don’t recognize? Are they asking you to sign into a website to give Personally Identifiable Information (PII) such as credit card numbers, social security number, etc. A legitimate company will never ask for PII via instant message or email.
    4. Do not give out personal or company information over the internet.
    5. Do not click on unrecognized links or attachments. If you do proceed, verify that the URL is the correct one for the company/service and it has the proper security in place, such as HTTPS.

    Many smishing messages pose a sense of urgency or even aggressiveness to prompt a form of intimidation. Any SMS requesting immediate action should be vetted thoroughly to determine whether or not it is a scam. Also, beware of messages that seek to tempt users into opening an attachment or visiting a link. For example, “Fix your account now” may draw the question “What is wrong with my account?” and prompt you to click a suspicious link.


    Cybersecurity Brief

    In this month’s Cybersecurity Brief:

    NetScaler ADC and Gateway Security Bulletin: CVE-2025-7775, CVE-2025-7776, CVE-2025-8424

    Citrix has released a security bulletin addressing three high-severity vulnerabilities affecting NetScaler ADC (formerly Citrix ADC) and NetScaler Gateway (formerly Citrix Gateway). The flaws are tracked as CVE-2025-7775, CVE-2025-7776, and CVE-2025-8424. One of these, CVE-2025-7775, is confirmed to be under active exploitation in the wild, making immediate patching critical for organizations relying on these products.

    The following product versions are vulnerable:

    • NetScaler ADC and Gateway 14.1 before 14.1-47.48
    • NetScaler ADC and Gateway 13.1 before 13.1-59.22
    • NetScaler ADC 13.1-FIPS and NDcPP before 13.1-37.241-FIPS and NDcPP
    • NetScaler ADC 12.1-FIPS and NDcPP before 12.1-55.330-FIPS and NDcPP

    Secure Private Access on-premises or hybrid deployments using NetScaler instances are also affected. Citrix-managed cloud services and Adaptive Authentication have already been patched by the vendor.

    Vulnerability Details

    CVE-2025-7775

    This memory overflow flaw can lead to remote code execution or denial of service. It impacts systems configured as Gateways (VPN, ICA Proxy, CVPN, RDP Proxy), AAA vservers, or load balancers bound with IPv6 services. Content routing virtual servers with HDX are also at risk. The issue has a CVSS v4.0 base score of 9.2 and is being actively exploited.

    CVE-2025-7776

    A memory overflow vulnerability that results in unpredictable system behavior and denial of service. It is triggered when a Gateway VPN vserver has a PCoIP profile bound to it. The CVSS v4.0 base score is 8.8.

    CVE-2025-8424

    An improper access control issue impacting the management interface of NetScaler. Attackers who can reach the NSIP, cluster management IP, or SNIP with management access could exploit it. This vulnerability is rated with a CVSS v4.0 score of 8.7.

    Citrix strongly urges all affected customers to upgrade their appliances to the following fixed versions or later:

    • NetScaler ADC and Gateway 14.1-47.48
    • NetScaler ADC and Gateway 13.1-59.22
    • NetScaler ADC 13.1-FIPS and NDcPP 13.1-37.241
    • NetScaler ADC 12.1-FIPS and NDcPP 12.1-55.330

    No workarounds exist. Organizations running end-of-life versions such as 12.1 and 13.0 must migrate to supported releases that contain the fixes.

    Exploitation of CVE-2025-7775 has already been confirmed. Security teams should immediately review their NetScaler configurations for signs of compromise, paying special attention to AAA vservers, VPN vservers, IPv6-bound load balancers, and PCoIP profiles.

    The vulnerabilities were reported by Jimi Sebree of Horizon3.ai, Jonathan Hetzer of Schramm & Partner, and François Hämmerli, working with Citrix to protect customers.

    To read more about this article, click here.


    PromptLock: The First AI-Powered Ransomware Emerges Using OpenAI’s gpt-oss:20b

    ESET researchers have identified a new proof-of-concept ransomware family, codenamed PromptLock, that leverages artificial intelligence to generate its malicious payloads in real time. This marks one of the first documented cases of ransomware built directly around a large language model (LLM), raising new concerns about AI’s role in accelerating cybercrime.

    PromptLock is written in Golang and integrates with OpenAI’s recently released gpt-oss:20b model using the Ollama API. Instead of relying on precompiled binaries, the ransomware dynamically generates Lua scripts during execution, guided by hardcoded prompts. These scripts are capable of:

    • Enumerating the local filesystem
    • Inspecting and selecting target files
    • Exfiltrating chosen data
    • Encrypting files across platforms

    Because the Lua payloads are created at runtime, the indicators of compromise (IoCs) may vary between infections. This variability makes detection more difficult and complicates the work of defenders.

    The ransomware uses the SPECK 128-bit encryption algorithm and can operate on Windows, Linux, and macOS environments. Analysis of current samples suggests it could also be adapted for destructive capabilities, though data-wiping functionality does not yet appear to be active.

    ESET assesses that PromptLock is currently a proof-of-concept rather than a fully weaponized strain deployed at scale. Artifacts linked to PromptLock were uploaded to VirusTotal from the United States on August 25, 2025. No active ransomware campaigns have been confirmed to date.

    One key feature is that PromptLock does not require downloading the full LLM model, which could be many gigabytes in size. Instead, attackers can configure the malware to communicate with a remote server running the model via the Ollama API. This approach reduces the footprint on infected systems while maintaining the flexibility of AI-driven payload generation.

    The appearance of PromptLock illustrates how AI can lower the barrier to entry for cybercriminals. By outsourcing payload generation to an LLM, attackers can:

    • Create variable, unpredictable payloads that evade signature-based defenses
    • Automate the customization of ransom notes and infection routines
    • Scale ransomware development even with limited technical expertise

    This trend is part of a broader shift. Earlier this month, Anthropic confirmed that it banned two groups using its Claude model to develop ransomware variants with advanced encryption and anti-recovery mechanisms. Separately, researchers have warned of novel prompt injection techniques such as PROMISQROUTE, which abuses model-routing systems to downgrade protections and bypass AI safety filters.

    Defenders should treat PromptLock as an early warning of where ransomware development may be heading. AI-powered malware offers attackers agility and adaptability that traditional static analysis will struggle to keep up with.

    To read more about this article, click here.


    How Can Netizen Help?

    Founded in 2013, Netizen is an award-winning technology firm that develops and leverages cutting-edge solutions to create a more secure, integrated, and automated digital environment for government, defense, and commercial clients worldwide. Our innovative solutions transform complex cybersecurity and technology challenges into strategic advantages by delivering mission-critical capabilities that safeguard and optimize clients’ digital infrastructure. One example of this is our popular “CISO-as-a-Service” offering that enables organizations of any size to access executive level cybersecurity expertise at a fraction of the cost of hiring internally. 

    Netizen also operates a state-of-the-art 24x7x365 Security Operations Center (SOC) that delivers comprehensive cybersecurity monitoring solutions for defense, government, and commercial clients. Our service portfolio includes cybersecurity assessments and advisory, hosted SIEM and EDR/XDR solutions, software assurance, penetration testing, cybersecurity engineering, and compliance audit support. We specialize in serving organizations that operate within some of the world’s most highly sensitive and tightly regulated environments where unwavering security, strict compliance, technical excellence, and operational maturity are non-negotiable requirements. Our proven track record in these domains positions us as the premier trusted partner for organizations where technology reliability and security cannot be compromised.

    Netizen holds ISO 27001, ISO 9001, ISO 20000-1, and CMMI Level III SVC registrations demonstrating the maturity of our operations. We are a proud Service-Disabled Veteran-Owned Small Business (SDVOSB) certified by U.S. Small Business Administration (SBA) that has been named multiple times to the Inc. 5000 and Vet 100 lists of the most successful and fastest-growing private companies in the nation. Netizen has also been named a national “Best Workplace” by Inc. Magazine, a multiple awardee of the U.S. Department of Labor HIRE Vets Platinum Medallion for veteran hiring and retention, the Lehigh Valley Business of the Year and Veteran-Owned Business of the Year, and the recipient of dozens of other awards and accolades for innovation, community support, working environment, and growth.

    Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.


  • Why Small Businesses Are Prime Targets for Ransomware —And How to Avoid Becoming One

    Ransomware attacks no longer just affect large corporations and government agencies. In fact, small and mid-sized businesses (SMBs) have become one of the most frequently targeted groups by ransomware operators. Their limited IT budgets, inconsistent patching practices, and reliance on third-party services create a perfect environment for threat actors to exploit.


    Why Ransomware Groups Target Small Businesses

    Threat actors are not only after billion-dollar payouts, they are also opportunistic. Small businesses often lack dedicated cybersecurity personnel and rely on outdated or misconfigured systems, making initial access much easier. Once inside, attackers can rapidly encrypt files or exfiltrate sensitive data for double-extortion tactics.

    1. Lower Barriers to Entry

    Many SMBs rely on legacy systems, shared credentials, weak remote desktop configurations, or improperly secured VPNs. These provide a wide attack surface with minimal resistance. Tools like Cobalt Strike, PowerShell Empire, or even off-the-shelf ransomware kits allow attackers to exploit these weaknesses with little technical sophistication.

    2. Slower Detection and Response

    Without a 24/7 security operations center (SOC) or centralized alerting, malicious activity often goes unnoticed for hours or days. This delay gives attackers ample time to disable backups, escalate privileges, and deploy ransomware payloads across endpoints and file servers.

    3. High Ransom Payment Rate

    Many small businesses cannot afford prolonged downtime. This urgency makes them more likely to pay the ransom to resume operations, especially if their data backups are incomplete, encrypted, or unavailable.

    4. Access to Supply Chain Targets

    By compromising an SMB that serves larger clients, attackers can use that access as a pivot point into more lucrative targets. Managed service providers (MSPs), legal firms, and regional logistics companies are frequently used as stepping stones in broader campaigns.


    Common Ransomware Entry Points in SMB Environments

    Understanding how ransomware is typically introduced into SMB networks is the first step toward defending against it:

    • Phishing emails containing malicious attachments or links to credential-harvesting sites
    • Exposed RDP or SSH services with weak credentials or no MFA
    • Compromised third-party software, including remote monitoring and management (RMM) tools
    • Drive-by downloads from hijacked websites or malvertising campaigns
    • Unpatched systems, especially for known vulnerabilities like ProxyShell (Exchange), PrintNightmare, or Fortinet SSL VPN flaws

    Defensive Strategies That Work

    To defend against ransomware, SMBs need a layered approach that combines prevention, detection, and response. The goal is not only to block initial access but also to reduce lateral movement and limit damage if a breach occurs.

    Implement Endpoint Detection and Response (EDR)

    Traditional antivirus tools often fail to catch modern ransomware strains or fileless attacks. EDR solutions provide behavioral analytics, process monitoring, and memory scanning to detect suspicious activity like credential dumping or PowerShell abuse. They also allow incident responders to isolate infected machines and roll back malicious changes.

    Enforce Strong Access Controls

    Limit administrative privileges to only what’s necessary. Enforce multi-factor authentication (MFA) on all remote access portals and cloud applications. Regularly audit accounts and disable stale credentials, especially service accounts with elevated rights.

    Patch High-Value Targets First

    SMBs may not have the resources to patch every system immediately, but they can prioritize. Focus first on systems exposed to the internet, VPN gateways, and assets holding sensitive data. Track patch status through a vulnerability management platform or vulnerability scanning solution.

    Harden Backup Infrastructure

    A reliable and isolated backup can mean the difference between full recovery and financial collapse. Backups should be encrypted, stored offsite or offline, and regularly tested. Disable backup access from user accounts and ensure backups are not on the same domain as production systems.

    Security Awareness Training

    Human error remains a primary cause of ransomware incidents. Train employees to recognize phishing attempts, avoid macro-enabled attachments, and report suspicious activity. Simulated phishing campaigns are an effective way to test resilience and adjust training accordingly.


    How Netizen Helps SMBs Reduce Ransomware Risk

    Netizen provides tailored cybersecurity solutions to help SMBs strengthen their security posture without needing a full-time CISO. Services include:

    • Vulnerability assessments and penetration testing to identify weak points before attackers do.
    • Fully managed phishing campaigns and end-user security awareness programs.
    • Advanced endpoint protection and monitoring solutions for ransomware defense.
    • Automated vulnerability scanning and continuous compliance reporting through our assessment platform.

    Netizen is ISO 27001:2013 and CMMI Level 3 certified and is recognized by the U.S. Department of Labor for hiring and retaining military veterans.

    Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.


  • Netizen: Monday Security Brief (8/25/2024)

    Today’s Topics:

    • SDocker Fixes CVE-2025-9074: Critical Container Escape Vulnerability in Docker Desktop
    • New Attack Technique Uses RAR Filenames to Deploy VShell Backdoor on Linux
    • How can Netizen help?

    SDocker Fixes CVE-2025-9074: Critical Container Escape Vulnerability in Docker Desktop

    Docker has released an urgent patch addressing CVE-2025-9074, a critical container escape vulnerability impacting Docker Desktop for Windows and macOS. Rated CVSS 9.3, this flaw could allow a malicious container to break out of isolation, compromise host systems, and access sensitive files.

    The issue is fixed in Docker Desktop version 4.44.3, and security teams are strongly advised to update immediately.

    The flaw stems from how Docker Desktop handled access to the Docker Engine API. Researcher Felix Boulet discovered that containers could communicate with the API at 192.168.65[.]7:2375 without authentication.

    This design oversight meant that a malicious or compromised container could:

    • Launch new containers without needing the Docker socket.
    • Bind the host’s C:\ drive (on Windows) to the container, granting read/write access.
    • Escalate privileges by modifying critical system files or DLLs.

    A proof-of-concept (PoC) exploit showed that a simple web request from a container could mount the host filesystem and compromise the system.

    Researcher Philippe Dugre (zer0x64) demonstrated that attackers could escalate privileges to full administrator access. By mounting the host filesystem, an attacker could:

    • Read sensitive files, including credentials.
    • Overwrite system DLLs to persist as an admin.
    • Deploy backdoors for long-term host compromise.

    Linux systems are not impacted by CVE-2025-9074. Docker on Linux communicates with the Engine API through a named pipe rather than a TCP socket, preventing the same attack vector.

    The primary risk comes from malicious containers controlled by threat actors. However, researchers warn that an SSRF (Server-Side Request Forgery) vulnerability in a separate application could also proxy requests to the Docker API, making exploitation possible without direct container access.

    Depending on request methods available (POST, PATCH, DELETE), attackers could remotely spin up privileged containers and escape to the host.

    Mitigation and Recommendations

    • Update immediately to Docker Desktop 4.44.3 or later.
    • Avoid running untrusted containers, particularly from public sources.
    • Restrict Docker Engine API access and monitor for suspicious container launches.
    • Audit host systems for unauthorized file changes or DLL modifications (Windows).

    Organizations that rely on containers in production should treat this as a high-priority incident and integrate Docker security monitoring into their broader DevSecOps practices.


    New Attack Technique Uses RAR Filenames to Deploy VShell Backdoor on Linux

    Cybersecurity researchers have identified a new Linux malware campaign that abuses malicious RAR archive filenames to deliver the VShell backdoor. The technique allows attackers to bypass traditional antivirus detection by hiding payloads in the filename itself rather than in the file contents.

    The attack begins with phishing emails disguised as invitations to a beauty product survey offering a monetary reward. These messages include a RAR archive attachment named yy.rar. Inside the archive is a file with a specially crafted filename containing embedded Bash commands.

    Example filename:

    ziliao2.pdf`{echo,<Base64-encoded command>}|{base64,-d}|bash`
    
    

    When a shell script or command interprets the filename, the embedded payload executes. This leads to the download of an ELF binary tailored to the victim’s architecture, which then connects to a command-and-control server to retrieve and execute the encrypted VShell backdoor.

    Traditional antivirus tools scan file contents, not file names. Since the malicious logic resides in the filename, the payload slips past conventional detection methods. Execution only occurs when the filename is parsed by the shell, not when the archive is extracted, adding another layer of stealth.

    VShell is a Go-based remote access tool used by multiple threat groups, including UNC5174. It provides remote shell access, file operations, process management, port forwarding, and encrypted communication. Because it runs entirely in memory, VShell avoids leaving disk artifacts that could be detected during forensic analysis.

    In addition to VShell delivery, researchers at Picus Security detailed a Linux malware tool called RingReaper. This tool leverages the Linux kernel’s io_uring framework to evade detection by endpoint monitoring tools. By replacing traditional system calls with io_uring primitives, RingReaper avoids hooks commonly used by EDR solutions.

    RingReaper is capable of enumerating system processes, network sessions, and logged-in users, while also enabling privilege escalation through SUID binaries. It can erase traces of its activity after execution, making detection even more difficult.

    Organizations should harden their defenses by sanitizing shell input in scripts, deploying behavioral-based detection systems, and analyzing archive attachments beyond just file content. Linux EDR tools need to adapt to io_uring-based activity, while user awareness training should reinforce caution around unexpected email attachments.


    How Can Netizen Help?

    Founded in 2013, Netizen is an award-winning technology firm that develops and leverages cutting-edge solutions to create a more secure, integrated, and automated digital environment for government, defense, and commercial clients worldwide. Our innovative solutions transform complex cybersecurity and technology challenges into strategic advantages by delivering mission-critical capabilities that safeguard and optimize clients’ digital infrastructure. One example of this is our popular “CISO-as-a-Service” offering that enables organizations of any size to access executive level cybersecurity expertise at a fraction of the cost of hiring internally. 

    Netizen also operates a state-of-the-art 24x7x365 Security Operations Center (SOC) that delivers comprehensive cybersecurity monitoring solutions for defense, government, and commercial clients. Our service portfolio includes cybersecurity assessments and advisory, hosted SIEM and EDR/XDR solutions, software assurance, penetration testing, cybersecurity engineering, and compliance audit support. We specialize in serving organizations that operate within some of the world’s most highly sensitive and tightly regulated environments where unwavering security, strict compliance, technical excellence, and operational maturity are non-negotiable requirements. Our proven track record in these domains positions us as the premier trusted partner for organizations where technology reliability and security cannot be compromised.

    Netizen holds ISO 27001, ISO 9001, ISO 20000-1, and CMMI Level III SVC registrations demonstrating the maturity of our operations. We are a proud Service-Disabled Veteran-Owned Small Business (SDVOSB) certified by U.S. Small Business Administration (SBA) that has been named multiple times to the Inc. 5000 and Vet 100 lists of the most successful and fastest-growing private companies in the nation. Netizen has also been named a national “Best Workplace” by Inc. Magazine, a multiple awardee of the U.S. Department of Labor HIRE Vets Platinum Medallion for veteran hiring and retention, the Lehigh Valley Business of the Year and Veteran-Owned Business of the Year, and the recipient of dozens of other awards and accolades for innovation, community support, working environment, and growth.

    Looking for expert guidance to secure, automate, and streamline your IT infrastructure and operations? Start the conversation today.