• Netizen: Monday Security Brief (4/14/2024)

    Today’s Topics:

    • Chrome 136 Patches 20-Year Privacy Loophole Linked to Visited Link Styling
    • Tycoon2FA Phishing Kit Evolves With Advanced MFA Bypass and Evasion Tactics
    • How can Netizen help?

    Chrome 136 Patches 20-Year Privacy Loophole Linked to Visited Link Styling

    Google has resolved a long-standing web privacy flaw in Chrome that allowed websites to detect a user’s browsing history by exploiting the browser’s styling of visited links. The fix, which lands in Chrome version 136, closes a gap that’s existed for over two decades and has been used in multiple real-world tracking techniques.

    Web browsers traditionally allow websites to visually distinguish between visited and unvisited links by applying different styles using the CSS :visited selector. A visited link often appears in purple instead of blue, which serves as a helpful user interface cue.

    However, this visual feedback creates an opportunity for malicious sites to check if certain links have been visited by measuring how they render. This side channel can be abused to reconstruct parts of a user’s browsing history.

    Even though browsers like Chrome blocked access to certain styling properties to mitigate this, researchers still demonstrated successful privacy attacks using techniques such as:

    • Timing-based inference
    • Pixel inspection
    • User interaction tracking
    • Process-level attacks

    These tactics made it possible to confirm whether a visitor had previously accessed certain URLs — across different sites — without any user interaction.

    Starting in Chrome 136, visited links are no longer treated globally. Instead, Chrome applies triple-key partitioning to store visited status using:

    1. The destination URL (the actual link)
    2. The top-level site (domain in the address bar)
    3. The frame origin (the frame or iframe where the link is displayed)

    With this change, a visited link will only appear as visited if it was clicked on the same site and within the same frame origin. This eliminates cross-site leakage while preserving the feature’s utility for single-site navigation.

    To maintain usability, Chrome includes a self-link exception. If a user visits a link on a given site, that link will still show as visited when viewed on that same site, even if it was originally clicked from a different domain. Since the site already knows which of its pages were visited, this doesn’t introduce new privacy risks.

    Google considered alternatives, including:

    • Deprecating :visited entirely: ruled out due to its UX value
    • Permissions models: considered too easy to exploit or mislead users

    Instead, partitioning provided the best balance of security and usability.

    This fix was introduced as an experimental flag in Chrome 132 and will be enabled by default in Chrome 136. Until then, users can manually activate it via the following flag:

    pgsqlCopychrome://flags/#partition-visited-link-database-with-self-links
    

    After setting the flag to “Enabled”, restart Chrome to apply the change. Note that this experimental version may still show unstable behavior in some contexts.

    As of now, other major browsers like Firefox and Safari have only partially mitigated the :visited link leakage issue. Chrome 136 sets a new benchmark in addressing this subtle but impactful privacy concern.


    Tycoon2FA Phishing Kit Evolves With Advanced MFA Bypass and Evasion Tactics

    The Tycoon2FA phishing kit—known for its ability to bypass multi-factor authentication (MFA) for Microsoft 365 and Gmail accounts—has received major updates that improve its stealth, obfuscation, and evasive capabilities.

    Originally identified by Sekoia in late 2023, the Tycoon2FA phishing-as-a-service (PhaaS) platform continues to evolve, with the latest findings from Trustwave detailing how its updated toolkit now evades detection more effectively and targets victims with increased precision.

    Key Technical Enhancements

    1. Unicode Obfuscation in JavaScript Tycoon2FA operators are now using invisible Unicode characters to embed binary data inside JavaScript payloads. This data is then decoded and executed at runtime, making static pattern detection and manual code inspection significantly more difficult. First reported by Juniper Threat Labs, this technique helps the payload fly under the radar of most email filters and endpoint detection tools.

    2. Self-Hosted CAPTCHA Using HTML5 Canvas The kit has moved away from using Cloudflare Turnstile in favor of a self-hosted CAPTCHA rendered via HTML5 canvas. The visual elements are randomized to avoid fingerprinting, allowing attackers to bypass domain reputation systems and detection based on CAPTCHA frameworks.

    3. Advanced Anti-Debugging and Analysis Evasion New anti-debugging logic detects common analysis tools like Burp Suite and PhantomJS. If these tools are identified, or if the CAPTCHA interaction fails (a potential sign of an automated scanner), the user is redirected either to a legitimate site like rakuten.com or is served a decoy page to break the analysis flow.

    These improvements make it more difficult for defenders to analyze infrastructure, reverse engineer payloads, or automate detection via browser-based sandboxing.

    In parallel with toolkit updates, Trustwave has observed a dramatic increase in the use of malicious SVG files in phishing campaigns—an 1,800% jump from April 2024 to March 2025. This surge is being fueled by Tycoon2FA and other PhaaS platforms like Mamba2FA and Sneaky2FA.

    SVG files are being disguised as voicemail alerts, logos, or shared documents and are weaponized with embedded JavaScript. These scripts often use multiple layers of obfuscation—such as base64, ROT13, XOR, and junk code—to evade detection by email scanners and endpoint tools.

    Upon rendering, the embedded code redirects the victim to fake Microsoft 365 login portals designed to harvest credentials.

    A recent campaign spoofed Microsoft Teams notifications, using an SVG file disguised as a voicemail message. When opened, the file launched a browser and executed obfuscated JavaScript to redirect the user to a phishing page mimicking the Office 365 login screen.

    The combination of SVG-based delivery and advanced obfuscation represents a notable evolution in phishing operations, especially those offered as turnkey services to lower-tier cybercriminals. These changes point to a broader trend: phishing campaigns are becoming more modular, evasive, and automated—targeting enterprise platforms with precision tools that bypass both MFA and modern email defenses.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Why Dark Web Monitoring is Essential for Data Security

    Dark web monitoring is the practice of continuously scanning hidden parts of the internet—often inaccessible through standard browsers—for signs that an organization’s sensitive data has been leaked, stolen, or exposed. Unlike standard search engines, dark web monitoring tools are tailored to identify compromised credentials, source code, intellectual property, and other confidential data circulating in criminal marketplaces, forums, and data dumps.

    These tools act as a critical layer in security programs by identifying risks that traditional antivirus software or endpoint protection can’t catch—namely, post-exfiltration activity. They help both organizations and individuals respond faster to incidents like breaches, data leaks, and credential thefts by alerting relevant stakeholders when data appears in underground channels.


    How It Works

    Dark web monitoring platforms operate by crawling and indexing dark web sources in real time or near real time. These include forums, marketplaces, encrypted chat platforms, peer-to-peer leak sites, and other areas used by cybercriminals to distribute or sell stolen data. Organizations can configure these tools to monitor specific keywords or indicators such as employee email addresses, company domains, customer records, or proprietary technology identifiers.

    When a match is detected, the tool generates an alert, which is usually integrated with a broader security incident response system. This alert can then be acted upon by relevant teams, such as security, legal, fraud prevention, or communications, depending on the nature of the exposure.


    Core Capabilities

    • Threat intelligence enrichment: Dark web monitoring feeds raw data into threat intelligence systems, helping analysts correlate exposure events with broader attack campaigns or known threat actors.
    • Threat hunting acceleration: By offering early indicators of compromise, these tools allow threat hunters to identify possible intrusions or leaks before traditional tools pick them up.
    • Incident response readiness: Integrated alerting and automated triage workflows reduce the time between detection and response, allowing teams to act before exposed information is weaponized.
    • Cross-platform integration: Data from dark web monitoring tools can be shared with SIEM, SOAR, or XDR platforms, offering a more complete security picture.

    Why It’s Essential

    Monitoring the dark web provides visibility into threats that don’t always manifest on the surface. Not every breach involves malware or unauthorized access—sometimes data leaks through vendors, accidental misconfigurations, or insider threats. These incidents may only become visible once the data is sold or discussed on dark web forums.

    In addition to stolen credentials, dark web chatter can reveal that an organization is being targeted or has already been compromised. This early warning can be critical, especially when attackers exploit third-party relationships to pivot across supply chains. It’s not just a post-breach tool—it’s an early detection system.


    Risks Uncovered by Dark Web Monitoring

    • Third-party data breaches
    • Corporate credential leaks
    • Impersonation campaigns
    • Domain spoofing
    • Insider data sales or accidental exposure
    • Trade secrets or source code being offered for sale
    • Fraudulent use of corporate branding

    Benefits of Implementation

    Dark web monitoring provides organizations with the ability to:

    • Detect and mitigate credential leaks before they’re used in attacks
    • Identify malicious activity tied to their brand or assets
    • Shorten the exposure window for stolen data
    • Improve threat intelligence accuracy by correlating underground signals with internal security telemetry

    Organizations can also discover whether they’ve been indirectly affected by supply chain breaches and determine if sensitive data has made its way into criminal hands.


    Who Should Use It?

    Any organization responsible for safeguarding sensitive data—including personally identifiable information, intellectual property, or access credentials—should consider deploying dark web monitoring. This includes financial institutions, healthcare providers, SaaS companies, public sector entities, and any business that manages customer records or proprietary technology.


    How Data Ends Up on the Dark Web

    Stolen data lands on the dark web through several techniques:

    • Phishing attacks that trick users into handing over login credentials
    • Malware infections, often deployed through loaders or botnets
    • Exploits targeting known vulnerabilities in unpatched systems
    • Man-in-the-middle attacks on insecure public networks
    • Keyloggers and screen scrapers embedded in infected endpoints

    Once acquired, these data sets are packaged and sold as “fullz” (full identity bundles), with pricing based on their value to cybercriminals.


    What to Do if Data Is Found

    If an organization receives an alert from a dark web monitoring service:

    • Initiate a password reset or account recovery for affected credentials
    • Investigate internal systems for signs of compromise
    • Notify affected parties if personal data is involved
    • Consider whether to notify regulators under applicable laws
    • Adjust defensive controls to prevent recurrence

    For consumers, the right move is to change passwords, enable two-factor authentication, and monitor for signs of identity theft. For businesses, the stakes are higher and the response must be swift to minimize reputational and legal fallout.


    Integrating Dark Web Monitoring Into Your Security Stack

    To get the most value from dark web monitoring:

    • Pair it with a strong asset inventory and vulnerability management program
    • Integrate alerts into your SIEM or SOAR for automated triage
    • Use it to validate threat actor tactics discussed in threat intelligence briefings
    • Combine it with identity and access management platforms to immediately revoke access when stolen credentials are found

    Dark web monitoring isn’t a silver bullet—but it fills a critical blind spot in many security programs. As cybercriminals increasingly rely on living-off-the-land tactics, credential theft, and supply chain compromise, visibility into the dark web becomes essential for early detection and effective defense.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Log4j Explained: What It Is, How It Works, and How to Fix It

    In December 2021, the cybersecurity community faced a major crisis when a critical zero-day vulnerability in Log4j, an open-source logging library widely used in Java-based systems, was discovered. Known as Log4Shell, this flaw exposed countless systems and applications to potential remote code execution (RCE) attacks. Below, we explain how the vulnerability works, the response it triggered, and best practices to mitigate its impact.


    What Is Log4j?

    Log4j is an open-source Java-based logging utility, maintained by Apache, that allows developers to integrate logging functionality into their applications. Logging enables software to track actions, errors, and performance issues, providing important insights for debugging and monitoring. The vulnerability resides in the communication feature of Log4j, which handles these logs and interacts with other services on the system.

    While Log4j itself is a common and useful tool, the flaw within it introduced severe security risks. Cybercriminals could exploit this weakness to inject malicious code into the log files, leading to arbitrary code execution on affected systems.


    How Does the Log4j Vulnerability Work?

    The Log4j vulnerability was first identified in the popular game Minecraft, where attackers found they could input malicious commands in the game’s chat system. These commands, once logged by Log4j, could trigger remote code execution (RCE) on the backend servers. This type of attack allows hackers to take control of systems remotely, a serious threat in any network environment.

    What made Log4Shell especially dangerous was its ease of exploitation. Attackers did not need to authenticate or have access to the system beforehand. They could exploit the vulnerability simply by entering specially crafted payloads into various input fields—such as chat boxes, forms, or even login screens—on a vulnerable platform.

    The vulnerability was given the highest Common Vulnerability Scoring System (CVSS) score of 10, indicating its severity. It impacted millions of devices, including widely used enterprise software, web servers, and cloud applications.


    The Technical Details of the Exploit

    Hackers exploited Log4j by taking advantage of its JNDI (Java Naming and Directory Interface) functionality. JNDI allows Java applications to fetch and load Java objects remotely. Normally, this feature is secure, but the vulnerability allowed attackers to direct JNDI lookups to malicious servers, which would then execute arbitrary code on the target system.

    To carry out the exploit, an attacker could use public Proof of Concept (PoC) code shared on platforms like GitHub. This code enabled attackers to set up fake LDAP servers and inject crafted payloads into vulnerable systems. Once the payload was processed by Log4j, the attacker could remotely execute commands, steal data, or deploy malware.


    Response to the Log4j Vulnerability

    The discovery of the Log4j vulnerability sent shockwaves through the cybersecurity community. Within days, security teams around the world scrambled to assess their environments and implement mitigations. The complexity and widespread impact of the flaw required immediate action across many sectors.

    As the flaw was disclosed, organizations were urged to quickly assess which systems were vulnerable and to disconnect internet-facing systems that weren’t essential for business operations. Simultaneously, security teams worked to identify patches from software vendors to address the vulnerability.

    The rapid nature of this crisis underscored the importance of coordinated responses from both internal IT teams and external technology providers. Many organizations spent several days applying patches, updating vulnerable systems, and testing security measures to ensure they were protected from exploitation.


    Impact of the Log4j Vulnerability

    The Log4j vulnerability had a far-reaching impact. Cybersecurity researchers quickly identified the vast number of systems affected, from enterprise software to consumer applications. While waiting for patches, security teams advised organizations to disable any non-essential, internet-facing systems. This was a critical step in preventing exploitation of the vulnerability before official fixes were made available.

    In the aftermath, millions of exploit attempts were recorded, with many resulting in successful Denial of Service (DoS) attacks. The massive scale of the issue prompted extensive collaboration among cybersecurity experts, vendors, and government agencies to manage the threat and minimize damage.


    How to Fix the Log4j Vulnerability

    To address the Log4j vulnerability, security teams should take the following steps:

    1. Update Log4j: The most straightforward mitigation step is to update Log4j to the latest version, which includes patches to resolve the vulnerability. Apache provided fixes that disable the vulnerable features and block the exploit.
    2. Apply Vendor Patches: In addition to updating Log4j itself, organizations should ensure that any third-party applications or frameworks that use Log4j are updated to patched versions. Many software vendors released their own patches, which must be applied as soon as possible.
    3. Use Workarounds: If an immediate patch isn’t feasible, Apache provided temporary workarounds, such as disabling certain features of Log4j or configuring systems to reject certain types of malicious input.
    4. Conduct a Vulnerability Assessment: Organizations should conduct thorough vulnerability assessments to identify any systems or software impacted by the Log4j flaw. This includes scanning for any instances of Log4j running in production systems and ensuring they are properly updated or remediated.
    5. Monitor for Exploitation: Finally, organizations should actively monitor their networks for signs of exploitation. This may include reviewing logs for suspicious activity, deploying intrusion detection systems, and investigating any unexpected system behavior.

    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Meta’s Controversial AI Training: Piracy Allegations Explained

    Meta is facing new allegations of digital piracy after reports surfaced that the company reuploaded 30% of the pirated books it downloaded for training its AI models. The findings suggest that beyond merely using shadow library content, Meta may have played an active role in sustaining the distribution of pirated books. This raises cybersecurity concerns, particularly regarding the integrity of AI training datasets, the security risks associated with using illicit sources, and the broader implications for intellectual property protection in an era of large-scale AI development.


    How Meta’s AI Training Contributed to Piracy

    Meta has been known to train its AI models, including the Llama series, on a dataset that reportedly included books from piracy sites such as Library Genesis (LibGen) and Z-Library. These shadow libraries have long been controversial due to their role in distributing copyrighted materials without authorization.

    Recent analysis indicates that when Meta downloaded these books through BitTorrent, its upload rate was unusually high, raising concerns that it contributed to ongoing piracy rather than merely consuming the content for training purposes. BitTorrent’s peer-to-peer structure means that when users download files, they also upload portions of them to other users. While this occurs automatically, Meta’s reupload volume suggests a significant level of participation in these piracy networks, whether intentional or not.

    This revelation underscores a broader cybersecurity risk: by sourcing data from shadow libraries, Meta’s AI training processes may have unknowingly incorporated manipulated or malicious files. Attackers frequently use these platforms to distribute trojanized PDFs or embedded malware, posing potential security threats to organizations handling such data.


    LibGen in Cybersecurity and Digital Piracy

    Library Genesis, commonly known as LibGen, emerged in the early 2000s as a resource for academic and scientific materials that were otherwise locked behind expensive paywalls. Initially, it was lauded by researchers and students for democratizing access to knowledge. However, it soon became a hub for widespread copyright infringement, hosting millions of pirated books across various genres.

    Despite repeated attempts to take it down, LibGen has survived through a decentralized structure, multiple domain mirrors, and support from the hacking and open-access communities. Over the years, law enforcement agencies, publishers, and cybersecurity experts have flagged the risks associated with these platforms.

    Several cybersecurity concerns stem from the use of shadow libraries like LibGen:

    • Malware Distribution: Cybercriminals have been known to embed malicious code in PDF and EPUB files, leading to credential theft, remote access trojans (RATs), and ransomware infections.
    • Data Integrity Issues: AI models trained on datasets from illicit sources may inherit inaccuracies, biases, or even manipulated information inserted by malicious actors.
    • Legal and Compliance Risks: Organizations using unauthorized datasets risk violating data protection laws, intellectual property regulations, and ethical AI development standards.

    Meta’s alleged role in reuploading pirated books only amplifies these risks, as it suggests a large-scale, corporate involvement in sustaining digital piracy ecosystems.


    Internal Concerns About Legality

    Court filings in the U.S. District Court for the Northern District of California reveal that Meta executives were aware of the legal risks associated with these datasets. Internal emails included in the lawsuit show employees expressing concerns about the company’s practices.

    One engineer remarked: “Torrenting from a [Meta-owned] corporate laptop doesn’t feel right.” Another suggested obtaining approval before proceeding, fearing legal consequences.

    Despite these concerns, Meta moved forward with its AI training, a decision that could have implications beyond copyright infringement, including potential cybersecurity threats arising from integrating unverified sources into its AI models.


    Legal and Ethical Implications

    Meta has attempted to justify its data collection under fair use, arguing that training AI models on copyrighted books transforms the material rather than reproducing it verbatim. However, copyright experts argue that reuploading pirated books, even unintentionally, weakens this defense.

    From a cybersecurity standpoint, the incident highlights the dangers of relying on data from shadowy sources. The practice of scraping content from piracy networks increases the risk of data poisoning, where adversarial modifications are introduced to compromise machine learning models. If AI training datasets are polluted with harmful inputs, the resulting models may exhibit biases, security vulnerabilities, or even hidden backdoors exploitable by threat actors.

    While AI companies like OpenAI and Microsoft have also leaned on the fair use argument in legal disputes, the act of redistributing copyrighted material—whether deliberate or incidental—could push Meta into more serious legal and security territory.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • April 2025 Patch Tuesday Review Fixes 134 Vulnerabilities and One Exploited Zero-Day

    Microsoft’s April 2025 Patch Tuesday addresses a total of 134 vulnerabilities, including one actively exploited zero-day. This month’s release includes 11 critical vulnerabilities, all of which are remote code execution (RCE) flaws affecting widely deployed Microsoft services and components.


    Breakdown of Vulnerabilities

    The month’s patches address vulnerabilities in the following categories:

    • 49 Elevation of Privilege (EoP) vulnerabilities
    • 31 Remote Code Execution (RCE) vulnerabilities
    • 17 Information Disclosure vulnerabilities
    • 14 Denial of Service (DoS) vulnerabilities
    • 9 Security Feature Bypass vulnerabilities
    • 3 Spoofing vulnerabilities

    These totals do not include Mariner-related vulnerabilities or the 13 Microsoft Edge vulnerabilities that were addressed earlier in April. Non-security updates released today include the Windows 11 KB5055523 and KB5055528 cumulative updates, and the Windows 10 KB5055518 update.


    Zero-Day Vulnerabilities

    This month’s Patch Tuesday includes one zero-day vulnerability that was actively exploited in the wild.

    CVE-2025-29824 | Windows Common Log File System Driver Elevation of Privilege Vulnerability

    • Affects: Windows Server and Windows 11 (Windows 10 updates pending release)
    • This vulnerability allows a local attacker to gain SYSTEM-level privileges by exploiting a flaw in the Windows Common Log File System (CLFS) driver.
    • Microsoft has confirmed that this vulnerability was used in real-world attacks by the RansomEXX ransomware group.
    • The vulnerability was discovered by the Microsoft Threat Intelligence Center.
    • Microsoft has stated that the security updates for Windows 10 are not yet available but will be released soon, with customers notified via a CVE revision once published.

    Other Critical Vulnerabilities

    The other 11 critical vulnerabilities addressed this month are all categorized as remote code execution flaws. While specific CVEs were not highlighted in Microsoft’s early public documentation, they are expected to affect commonly targeted services and components, making timely patching especially important for enterprise systems.

    Adobe and Other Vendor Updates

    Other major vendors have also issued significant security updates this month:

    • Apache: Patched a maximum severity RCE vulnerability in Apache Parquet.
    • Apple: Released backported fixes for actively exploited flaws on older iOS and macOS devices.
    • Google: Published security updates addressing 62 Android vulnerabilities, including two zero-days used in targeted attacks.
    • Ivanti: Issued updates for April and previously patched a critical Connect Secure RCE vulnerability exploited by Chinese threat actors.
    • Fortinet: Released fixes for multiple products, including a serious bug in FortiSwitch allowing unauthorized admin password changes.
    • MikroTik: Rolled out updates as part of their April 2025 bulletin.
    • MinIO: Addressed a flaw involving incomplete signature validation, which impacted unsigned-trailer uploads.
    • SAP: Shipped fixes for several products, including three critical vulnerabilities.
    • WinRAR: Disclosed an issue where Mark of the Web attributes failed to propagate to extracted files, potentially weakening download protections.

    Recommendations for Users and Administrators

    Users and administrators are strongly encouraged to apply the April 2025 security updates without delay. Systems that rely on Windows Server and Windows 11 should receive immediate attention due to the active exploitation of CVE-2025-29824. Windows 10 users should monitor for the pending update release.

    Given the number of critical RCE vulnerabilities and the presence of a confirmed zero-day tied to ransomware activity, organizations should prioritize patch deployment, particularly on internet-facing systems and user workstations. As always, security teams should verify patch success through centralized management tools and remain alert for anomalies that may indicate pre-patch exploitation.

    Full details on these updates can be found in Microsoft’s Security Update Guide and corresponding KB articles.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Netizen: Monday Security Brief (4/7/2024)

    Today’s Topics:

    • WinRAR Vulnerability Enables Mark of the Web Bypass and Silent Code Execution
    • Carding Tool Abusing WooCommerce API Downloaded 34,000 Times on PyPI
    • How can Netizen help?

    WinRAR Vulnerability Enables Mark of the Web Bypass and Silent Code Execution

    A newly disclosed vulnerability in the popular file archiver WinRAR allows attackers to bypass Windows’ built-in Mark of the Web (MotW) protections, enabling the stealthy execution of potentially malicious code. Tracked as CVE-2025-31334, the flaw affects all versions of WinRAR prior to the latest release, version 7.11.

    Mark of the Web is a Windows security feature that flags files downloaded from the internet by tagging them with an alternate data stream called Zone.Identifier. When a user attempts to run a file tagged with MotW, Windows displays a security warning, prompting the user to confirm whether the file should be executed. This helps prevent accidental execution of malware and is one of the OS’s primary mechanisms for defending against internet-delivered threats.

    The issue in WinRAR arises when a symbolic link (symlink) is embedded within an archive. If the symlink points to an executable file and the archive is opened using the WinRAR shell, the MotW flag is ignored entirely—even if the original file was downloaded from the internet and should have triggered a security warning.

    This means an attacker could craft an archive containing a symlink to a malicious executable and distribute it online. When the user extracts and runs the file using WinRAR, the system would execute the code without any MotW-based warning.

    It’s important to note that creating a symlink on a Windows system requires administrator-level permissions. While this adds some friction, it does not fully mitigate the risk—particularly in environments with weak privilege separation or systems already compromised in earlier stages of an attack.

    The vulnerability has been rated with a CVSS score of 6.8, placing it in the medium severity range. The bug was responsibly disclosed to WinRAR’s developer RARLAB by researcher Shimamine Taihei of Mitsui Bussan Secure Directions. The coordination was managed through Japan’s Information Technology Promotion Agency (IPA) and Japan’s Computer Security Incident Response Team (JPCERT/CC).

    WinRAR’s changelog for version 7.11 notes the fix simply:
    “If symlink pointing at an executable was started from WinRAR shell, the executable Mark of the Web data was ignored.”

    MotW bypasses have been increasingly targeted by both criminal and state-sponsored threat actors in recent years. Similar tactics have been used in other compression tools. For example, Russian cybercriminals recently exploited a bug in 7-Zip that failed to propagate MotW when using double compression techniques—allowing them to deploy malware like Smokeloader without triggering Windows alerts.

    MotW bypasses are attractive to attackers because they help sidestep one of the final lines of defense in environments where users download and open untrusted files. These flaws are especially valuable in phishing campaigns, drive-by downloads, or watering hole attacks.

    SOC teams should prioritize upgrading all endpoints to WinRAR 7.11 or later to ensure MotW tags are honored properly during archive extraction. While the CVSS score might not immediately suggest a critical risk, the potential to disable a key Windows security feature in user-facing workflows makes this bug particularly attractive to attackers focused on social engineering.

    Security teams should also monitor for symlink usage within archive contexts, especially in user-writable directories. Consider implementing detection logic for non-standard execution paths involving archive tools, and review telemetry for execution of binaries extracted from archives that should have been flagged with MotW.

    Lastly, this vulnerability serves as a reminder that endpoint protection strategies should not rely solely on operating system features like MotW. Defense-in-depth approaches—including behavior-based monitoring, application allowlisting, and user training—remain essential, especially when commonly used utilities like WinRAR can be used to subvert expected safeguards.


    Carding Tool Abusing WooCommerce API Downloaded 34,000 Times on PyPI

    A malicious Python package designed to validate stolen credit cards using legitimate WooCommerce stores has been downloaded more than 34,000 times from the Python Package Index (PyPI), highlighting the ongoing abuse of open-source ecosystems in support of cybercrime. The package, named disgrasya, was discovered by researchers at Socket and has since been removed from the repository—but not before it enabled wide-scale carding activity through automated abuse of online stores.

    Unlike typical supply chain attacks that rely on deception or typo-squatting to trick developers into installing fake libraries, the disgrasya package made no effort to disguise its purpose. In fact, the PyPI listing clearly stated: “A utility for checking credit cards through multiple gateways using multi-threading and proxies.” This bold description signaled that the authors weren’t concerned with flying under the radar, using PyPI as a high-traffic distribution platform to reach carding actors across the globe.

    According to Socket’s analysis, the malicious behavior was introduced in version 7.36.9—likely an intentional move to bypass security scans that are stricter for initial submissions. By delaying the addition of malicious code until a later version, attackers may have evaded automated analysis tools and code reviewers.

    The script targets WooCommerce stores that use the CyberSource payment gateway, a common configuration for online businesses. The tool automates a process that would normally require human interaction by programmatically emulating a full online shopping session.

    Here’s how the attack works:

    • The script crawls legitimate WooCommerce stores and collects product IDs.
    • It adds those products to a shopping cart using the site’s backend API.
    • It moves to the checkout page and harvests critical session data: a CSRF token and a capture context, which is a dynamic key used by CyberSource to tokenize credit card data securely.
    • Instead of sending the credit card details directly to CyberSource, the script transmits them to an attacker-controlled server (railgunmisaka.com), which mimics the payment gateway and returns a fake token.
    • That token is used to complete the checkout process on the WooCommerce site. If the transaction goes through, the card is logged as valid; if not, it’s discarded and the next card in the list is tested.

    This method allows the actor to verify thousands of stolen credit card numbers in a short time while leveraging legitimate infrastructure to avoid detection.

    Socket points out that this workflow is methodical, difficult to detect, and designed to blend into normal site activity. It’s particularly dangerous for merchants because traditional anti-fraud systems often can’t distinguish these fake checkouts from legitimate customer behavior—especially when the tool simulates a complete transaction path.

    Detection becomes even harder when attackers use proxies or botnets to distribute traffic across different IPs and regions, further mimicking normal web usage patterns.

    Though detection is difficult, there are several ways to make life harder for carding actors:

    • Block transactions under a certain threshold (e.g., <$5), which are commonly used for validation attempts.
    • Monitor for checkout patterns with high failure rates or sudden spikes in low-value orders.
    • Apply rate limits on checkout endpoints to slow down automated attacks.
    • Add CAPTCHA challenges during checkout to interrupt script-based submissions.
    • Track behavioral anomalies tied to repeated access from the same IP or region.

    Merchants using WooCommerce, especially those with CyberSource integration, should consider reviewing their site logs for suspicious automated checkout activity and audit past orders for signs of carding.

    Security teams should review web application logs for e-commerce properties to detect suspicious activity related to automated card validation. Look for checkout patterns involving low-value transactions, high error rates, or repeated requests originating from a limited IP pool. Integration monitoring tools and fraud prevention services should be configured to flag checkout endpoints for behavioral anomalies. SOC analysts should also ensure that payment APIs are not being indirectly abused through backend channels and should validate that session and payment token endpoints are not being exposed to external manipulation.

    Finally, any organization distributing Python packages internally or externally should closely monitor updates for malicious behavior introduced in later versions of a package—especially those with no clear use case or documentation.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Splunk Releases Patches for Several High-Severity Vulnerabilities

    Splunk has released a series of security updates to address multiple vulnerabilities across its products, including two high-severity flaws affecting Splunk Enterprise and the Splunk Secure Gateway App. These vulnerabilities, if exploited, could allow attackers to execute arbitrary code or access sensitive information. Organizations using Splunk should take immediate action to apply the necessary patches.


    Details of the High-Severity Vulnerabilities

    Remote Code Execution Vulnerability (CVE-2025-20229)

    One of the most critical flaws addressed in this update is CVE-2025-20229, a remote code execution (RCE) vulnerability that could be exploited by low-privileged users. The flaw allows attackers to upload malicious files to the $SPLUNK_HOME/var/run/splunk/apptemp directory, potentially leading to unauthorized execution of code. This vulnerability has been assigned a CVSS score of 8.0, highlighting the urgency for patching.

    To mitigate this issue, Splunk has released updates for the following versions:

    • Splunk Enterprise: 9.4.0, 9.3.3, 9.2.5, and 9.1.8
    • Splunk Cloud Platform: 9.3.2408.104, 9.2.2406.108, 9.2.2403.114, and 9.1.2312.208

    Information Disclosure Vulnerability

    Another significant flaw affects both Splunk Enterprise and the Splunk Secure Gateway App. This vulnerability exposes user session and authorization tokens in clear text within the splunk_secure_gateway.log file when calling the /services/ssg/secrets REST endpoint. Attackers could exploit this by tricking victims into making requests within their browser, potentially leading to unauthorized access to sensitive data.

    Splunk has issued patches for this vulnerability in:

    • Splunk Enterprise: 9.4.1, 9.3.3, 9.2.5, and 9.1.8
    • Splunk Secure Gateway: 3.8.38 and 3.7.23

    For organizations that do not use Splunk Secure Gateway, Splunk recommends disabling or removing the app as a precautionary measure.


    Additional Vulnerabilities Addressed

    Beyond the high-severity issues, Splunk has also patched several medium- and low-severity vulnerabilities affecting various products, including:

    • Maintenance mode modifications and safeguard bypass issues in Splunk Enterprise
    • Information disclosure risks and user data manipulation vulnerabilities
    • Third-party package vulnerabilities in Splunk Enterprise, Splunk App for Data Science, DB Connect, and the Splunk Add-on for Microsoft Cloud Services

    What SOC Teams Need to Know

    Security Operations Center (SOC) teams should act swiftly to patch all affected Splunk deployments to mitigate potential exploitation risks. Key recommendations include:

    • Apply all relevant security patches immediately. Delaying updates increases the risk of exploitation.
    • Monitor access logs for unusual activity related to file uploads or API calls to /services/ssg/secrets.
    • Review privilege settings to limit access to sensitive files and directories.
    • Disable the Splunk Secure Gateway App if it is not required to minimize attack surface.
    • Stay informed about emerging threats, as attackers may attempt to exploit unpatched systems.

    Conclusion

    While Splunk has not reported any active exploitation of these vulnerabilities, organizations should not delay in applying these critical patches. Security teams must remain vigilant and proactive in monitoring for potential threats. Keeping software up to date remains one of the most effective defenses against cyberattacks.

    For a full list of security updates and technical details, refer to Splunk’s official advisory.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Google Issues Emergency Patch for Chrome Zero-Day Flaw CVE-2025-2783

    Google has released an emergency security patch for a zero-day vulnerability in its Chrome browser after researchers at Kaspersky uncovered its use in a sophisticated cyberespionage campaign. The flaw, tracked as CVE-2025-2783, was exploited alongside a second remote code execution (RCE) exploit in attacks targeting organizations in Russia.


    Discovery and Exploit Chain

    Kaspersky researchers first identified the exploit in mid-March when investigating a series of infections linked to phishing emails. The campaign, dubbed Operation ForumTroll, targeted Russian media outlets, educational institutions, and government agencies. Victims received highly personalized phishing emails containing short-lived malicious links.

    Once a target clicked on the link using Chrome, the browser automatically executed the exploit, bypassing Chrome’s sandbox security protections. This allowed attackers to escape the browser’s restricted environment and potentially execute additional malicious code on the system.


    Google’s Response

    Kaspersky’s security tools detected the exploit in action, leading the team to reverse-engineer the attack. They promptly reported the issue to Google, which coordinated the release of a security patch late Tuesday. The update addresses the vulnerability, effectively neutralizing the attack chain.

    While Kaspersky identified the initial sandbox escape exploit, they were unable to capture the second-stage RCE payload. However, patching CVE-2025-2783 significantly disrupts the attackers’ ability to carry out further compromises.


    A State-Sponsored Attack?

    Kaspersky researchers believe the attack demonstrates a high level of sophistication, suggesting it was likely carried out by a nation-state-backed Advanced Persistent Threat (APT) group.

    “This particular exploit left us scratching our heads,” Kaspersky stated. “Without doing anything obviously malicious or forbidden, it allowed attackers to bypass Chrome’s sandbox as if it didn’t even exist.”

    Researchers attributed the flaw to a logical error in the interaction between Chrome’s sandbox and the Windows operating system, which attackers exploited to escape containment.


    What SOC Teams Need to Know

    Security Operations Center (SOC) teams should prioritize immediate deployment of Google’s latest Chrome update to mitigate CVE-2025-2783. Since this exploit was part of a targeted cyberespionage campaign, SOC teams should closely monitor traffic for any signs of attempted exploitation, particularly unusual outbound connections from Chrome processes or execution of unexpected system commands following browser activity.

    Key actions include:

    • Hunting for indicators of compromise (IOCs) by reviewing logs for any signs of execution from suspicious links related to Operation ForumTroll.
    • Enhancing phishing defenses by reinforcing email filtering and conducting phishing awareness training.
    • Implementing behavior-based detection with endpoint detection and response (EDR) rules to flag unexpected Chrome child processes, which could indicate sandbox escape attempts.
    • Ensuring all managed systems are updated to the latest Chrome version as soon as possible.

    SOC analysts should also stay vigilant for additional exploits linked to this campaign, as APT actors may shift tactics now that this vulnerability has been patched.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Today’s Topics:

    • Critical Vulnerability in Firefox Mirrors Chrome’s Exploited Zero-Day
    • Critical Vulnerability in Kubio AI Page Builder Puts WordPress Sites at Risk
    • How can Netizen help?

    Critical Vulnerability in Firefox Mirrors Chrome’s Exploited Zero-Day

    Mozilla has released security updates for its Firefox browser on Windows to patch a critical vulnerability, CVE-2025-2857. This flaw, which could allow attackers to escape the browser’s sandbox, was discovered shortly after Google addressed a similar vulnerability (CVE-2025-2783) in Chrome that had been actively exploited as a zero-day.

    Mozilla described the issue as an “incorrect handle” in the browser’s inter-process communication (IPC) code, which could enable a compromised child process to gain higher privileges by manipulating the parent process. This would allow attackers to bypass Firefox’s security sandbox, potentially leading to system compromise.

    The vulnerability affects both Firefox and Firefox Extended Support Release (ESR) versions. Mozilla has addressed the issue in:

    • Firefox 136.0.4
    • Firefox ESR 115.21.1
    • Firefox ESR 128.8.1

    The Tor Project has also released a security update for Tor Browser (version 14.0.8) to mitigate the same flaw for Windows users.

    The disclosure comes in the wake of Google’s recent fix for CVE-2025-2783 in Chrome, which was actively exploited in targeted attacks against media outlets, educational institutions, and government organizations in Russia.

    Kaspersky, which discovered the attacks in mid-March 2025, reported that victims were infected after clicking on a malicious link in phishing emails. Attackers used a specially crafted exploit chain that leveraged an unknown second vulnerability in Chrome to achieve remote code execution.

    The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-2783 to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to apply the necessary patches by April 17, 2025.

    Security Operations Center (SOC) teams should treat CVE-2025-2857 as a high-priority risk and take the following steps to ensure protection:

    • Update Browsers Immediately: Ensure all instances of Firefox, Firefox ESR, and Tor Browser are updated to the latest patched versions.
    • Monitor for Exploitation Attempts: Track any unusual activity related to browser processes, particularly unexpected privilege escalations.
    • Review Enterprise Browsing Policies: Enforce browser security settings, such as disabling unnecessary browser extensions and restricting execution of untrusted scripts.
    • Educate Users on Phishing Risks: Given the similarities to Chrome’s zero-day exploit, emphasize awareness training on phishing emails and suspicious links.

    While there is no evidence that CVE-2025-2857 has been exploited in the wild, its similarity to a recent active zero-day in Chrome makes it a significant security concern. Organizations should patch immediately to prevent potential future attacks.


    Critical Vulnerability in Kubio AI Page Builder Puts WordPress Sites at Risk

    A severe security vulnerability has been discovered in the Kubio AI Page Builder plugin for WordPress, exposing over 90,000 websites to potential attacks. Tracked as CVE-2025-2294, this flaw allows unauthenticated attackers to exploit a Local File Inclusion (LFI) vulnerability, which can lead to unauthorized file access and code execution.

    Kubio is a widely used WordPress website builder that enhances the block editor with additional features and styling options. Its ease of use and powerful customization capabilities have made it popular among website owners who want to build sites without coding knowledge.

    Security researcher mikemyers identified the vulnerability in the kubio_hybrid_theme_load_template function. This function fails to properly validate file paths, allowing attackers to include arbitrary files from the server. This oversight opens the door for several dangerous exploits, including:

    • Bypassing access controls: Attackers can access restricted files and directories.
    • Stealing sensitive data: Private server information and user data can be exposed.
    • Achieving code execution: If attackers can upload malicious files (such as disguised images), they can execute arbitrary PHP code, leading to full site compromise.

    The vulnerability has been given a critical CVSS score of 9.8, reflecting its potential for widespread exploitation. It affects all versions up to and including 2.5.1.

    The issue has been patched in version 2.5.2 of the Kubio AI Page Builder plugin. All users are strongly urged to update immediately to prevent exploitation.

    Security teams monitoring WordPress environments should take the following actions:

    • Ensure Immediate Patch Deployment: Verify that all instances of Kubio AI Page Builder have been updated to version 2.5.2 or later.
    • Monitor for Suspicious File Access: Look for unexpected file inclusion attempts, especially those referencing sensitive directories such as /etc/passwd or wp-config.php.
    • Restrict File Upload Permissions: Limit which files can be uploaded and execute server-side validation to prevent unauthorized PHP execution.
    • Conduct Regular Security Audits: Scan WordPress installations for outdated plugins and potential misconfigurations that could be exploited.

    With a vulnerability of this magnitude, unpatched sites could become easy targets for attackers looking to compromise WordPress websites. Updating immediately and monitoring for potential exploitation attempts should be a top priority.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Netizen: March 2025 Vulnerability Review

    Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing the outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five critical vulnerabilities from March that should be immediately patched or addressed if present in your environment. Detailed writeups below:


    CVE-2025-26633

    CVE-2025-26633 is a high-severity vulnerability affecting the Microsoft Management Console (MMC). It arises from improper neutralization, allowing an unauthorized attacker to bypass a security feature when exploiting the flaw locally.

    This vulnerability was included in Microsoft’s March 2025 Patch Tuesday, which addressed 56 CVEs. Notably, it was actively exploited in the wild before a patch was released. Reports indicate that the Russian ransomware group EncryptHub leveraged this zero-day in targeted attacks, potentially as early as 2023.

    Security researchers have linked the exploitation of CVE-2025-26633 to advanced persistent threat (APT) groups, with campaigns designed to escalate privileges and facilitate ransomware deployment. Given its active exploitation, organizations are strongly urged to apply Microsoft’s security update immediately. Additionally, endpoint monitoring, behavior-based threat detection, and access control reviews can help mitigate risks associated with privilege escalation vulnerabilities.


    CVE-2025-24983

    CVE-2025-24983 is a high-severity use-after-free vulnerability in the Windows Win32 Kernel Subsystem that allows an authorized attacker to elevate privileges locally. This flaw was part of Microsoft’s March 2025 Patch Tuesday, which addressed 56 CVEs, including seven zero-day vulnerabilities, with six actively exploited in the wild before patches were available.

    Security researchers discovered that this vulnerability had been exploited for nearly two years, dating back to 2023. Reports link its abuse to the EncryptHub ransomware group, which has been observed using zero-days in targeted attacks to escalate privileges and gain deeper access into compromised systems.

    Due to its active exploitation, organizations should immediately apply Microsoft’s security patch to mitigate risks. Additional security measures, such as restricting administrative access, enabling advanced threat detection, and monitoring for abnormal process activity, can help prevent potential exploitation of privilege escalation vulnerabilities like CVE-2025-24983.


    CVE-2025-24985

    CVE-2025-24985 is a high-severity vulnerability in the Windows Fast FAT Driver, classified as an integer overflow or wraparound issue. This flaw enables an unauthorized attacker to execute code locally, potentially leading to escalation of privileges or system compromise.

    This vulnerability was part of Microsoft’s March 2025 Patch Tuesday, which addressed 56 CVEs, including seven zero-day flaws, with six already exploited in the wild before patches were released. The vulnerability has been flagged by CISA and security researchers due to its potential use in real-world attacks, particularly by threat actors targeting Windows systems.

    Given its severity and the history of zero-day exploitation, organizations should immediately apply the Microsoft security patch to prevent possible exploitation. Additional steps, such as restricting local execution permissions, monitoring file system activity, and deploying endpoint detection tools, can further reduce the risk posed by this vulnerability.


    CVE-2025-24472

    CVE-2025-24472 is a critical authentication bypass vulnerability affecting FortiOS and FortiProxy. The flaw exists in FortiOS versions 7.0.0 through 7.0.16 and FortiProxy versions 7.2.0 through 7.2.12, as well as 7.0.0 through 7.0.19, potentially allowing a remote attacker to gain super-admin privileges by exploiting crafted CSF proxy requests.

    This vulnerability has drawn significant attention from security researchers and government agencies, including CISA, due to its potential use in ransomware attacks and other high-profile cyber intrusions. Given its severity and the likelihood of active exploitation, security teams should immediately update to patched versions provided by Fortinet.

    Additional mitigation measures include restricting access to administrative interfaces from untrusted networks, monitoring logs for unauthorized authentication attempts, implementing multi-factor authentication wherever possible, and deploying intrusion detection and prevention systems to detect anomalous activity. Organizations using affected versions should prioritize remediation efforts to prevent potential compromise.


    CVE-2025-30154

    CVE-2025-30154 is a high-severity vulnerability involving a supply chain compromise in the GitHub action reviewdog/action-setup. On March 11, 2025, between 18:42 and 20:31 UTC, malicious code was injected into reviewdog/action-setup@v1, causing it to dump exposed secrets into GitHub Actions Workflow Logs. This compromise also affected other reviewdog actions that rely on reviewdog/action-setup@v1, including reviewdog/action-shellcheck, reviewdog/action-composite-template, reviewdog/action-staticcheck, reviewdog/action-ast-grep, and reviewdog/action-typos, regardless of their specific version or pinning method.

    This incident highlights the risks associated with supply chain attacks in continuous integration and deployment (CI/CD) workflows. Developers and organizations using affected reviewdog actions should immediately verify their workflows for potential exposure, rotate any credentials or secrets that may have been leaked, and update to secure versions.

    Additional security measures, such as enforcing the use of dependency pinning, scanning for malicious code in third-party actions, and monitoring repository activity for unauthorized changes, can help mitigate future risks.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact