IT-ISAC Daily Cyber ​​Report - June 30, 2025

 IT-ISAC Emergency 24/7 Contact: 571-210-2118

Table of Contents

  • Contact Information
  • Recordings/Slides
  • Attachments
  • ISAC Threat Bulletin
  • Vulnerabilities/Updates
  • Trending CVEs
  • Analytical Reporting


Contact Information

  • IT-ISAC Operations:

RFI submissions/Technical assistance/Food and Ag ISAC/Security Intel SIG/Insider Threat SIG/Technical Committee, please email:


Technical Committee Recordings and Slides:


Attachments:

CISA and Partners Urge Critical Infrastructure to Stay Vigilant in the Current Geopolitical Environment

Today, CISA, in collaboration with the Federal Bureau of Investigation (FBI), the Department of Defense Cyber Crime Center (DC3), and the National Security Agency (NSA), released a Fact Sheet urging organizations to remain vigilant against potential targeted cyber operations by Iranian state-sponsored or affiliated threat actors.


Over the past several months, there has been increasing activity from hacktivists and Iranian government-affiliated actors, which is expected to escalate due to recent events. These cyber actors often exploit targets of opportunity based on the use of unpatched or outdated software with known Common Vulnerabilities and Exposures or the use of default or common passwords on internet-connected accounts and devices.


At this time, we have not seen indications of a coordinated campaign of malicious cyber activity in the U.S. that can be attributed to Iran. However, CISA, FBI, DC3, and NSA strongly urge critical infrastructure asset owners and operators to implement the mitigations recommended in the joint Fact Sheet, which include:


  • Identifying and disconnecting operational technology and industrial control systems devices from the public internet,
  • Protecting devices and accounts with strong, unique passwords,
  • Applying the latest software patches, and
  • Implementing phishing-resistant multifactor authentication for access to OT networks.


Review the joint Fact Sheet: Iranian Cyber Actors May Target Vulnerable US Networks and Entities of Interest and act now to understand the Iranian state-backed cyber threat, assess and mitigate cybersecurity weaknesses, and review and update incident response plans to strengthen your network against malicious cyber actors.

ISAC Threat Bulletin

Adversary Playbook

To access the IT-ISAC’s Adversary Playbooks please contact:

join-playbook@it-isac.org

Vulnerabilities:

Cisco Identity Services Stored Cross-Site Scripting Vulnerability

A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials.


CISA Adds One Known Exploited Vulnerability to Catalog

06/30/2025 02:00 PM EDT

CISA has added one new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation.

  • CVE-2025-6543 Citrix NetScaler ADC and Gateway Buffer Overflow Vulnerability


Vulnerability Summary for the Week of June 23, 2025


  • CVE-2025-6877: A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been classified as critical. This affects an unknown part of the file /panel/edit-category.php. The manipulation of the argument editid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
  • CVE-2025-6878: A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /panel/search-appointment.php. The manipulation of the argument searchdata leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
  • CVE-2025-6879: A vulnerability was found in SourceCodester Best Salon Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /panel/add-tax.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
  • CVE-2025-6880: A vulnerability classified as critical has been found in SourceCodester Best Salon Management System 1.0. Affected is an unknown function of the file /panel/edit-tax.php. The manipulation of the argument editid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
  • CVE-2025-0634: Use After Free vulnerability in Samsung Open Source rLottie allows Remote Code Inclusion.This issue affects rLottie: V0.2.


Updates:

  • N/A

Trending CVEs:

  1. CVE-2025-53074: Out-of-bounds Read vulnerability in Samsung Open Source rLottie allows Overflow Buffers.This issue affects rLottie: V0.2.
  2. CVE-2025-6886: A critical stack-based buffer overflow vulnerability in Tenda AC5 router firmware version 15.03.06.47, specifically affecting the /goform/openSchedWifi file. The vulnerability can be exploited by manipulating the schedStartTime/schedEndTime arguments, allowing remote attackers to potentially execute malicious code.
  3. CVE-2025-6881: A critical vulnerability in D-Link DI-8100 (version 16.07.21) affecting the /pppoe_base.asp file in the jhttpd component. The vulnerability involves a buffer overflow triggered by manipulating the 'mschap_en' argument.
  4. CVE-2024-8419: The endpoint hosts a script that allows an unauthorized remote attacker to put the system in a fail-safe state over the network due to missing authentication.
  5. CVE-2025-53415: Delta Electronics DTM Soft Project File Parsing Deserialization of Untrusted Data Remote Code Execution.

IT-ISAC Analytical Reports

'Disgruntled' British IT Worker Jailed for Hacking Employer After Being Suspended


Summary:

A British IT worker, Mohammed Umar Taj, has been jailed for seven months and 14 days after carrying out what police described as a deliberate cyberattack against his employer. The incident began in July 2022, when Taj was suspended from his job at an unidentified company with clients in the UK, Germany, and Bahrain. Within hours of his suspension, he accessed the company’s systems without authorization to alter login credentials and disrupt daily business operations.


The next day, Taj escalated his actions by changing the company’s access credentials and multi-factor authentication settings, making it harder for the firm to regain control. As a result, the company suffered significant operational disruption and financial losses of at least £200,000 (around $275,000). The attack also caused reputational harm, affecting relationships with clients abroad.


Investigators from West Yorkshire Police’s cybercrime team recovered recordings of Taj discussing his plans and documenting his activities. This evidence proved crucial in court. Taj pleaded guilty to an offense under the UK’s Computer Misuse Act and was sentenced on June 26 at Leeds Crown Court.


Analyst comments:

This is one instance of how dangerous it is when someone who has access to the secrets of a company chooses to use the information to cause harm. Mohammed Umar Taj was angered at being suspended, and he tried to get revenge on his company by hacking into their computer systems. Through this, the company lost a lot of money and credibility with their customers. It teaches us that companies need to protect their computers and data carefully, and that people should not use their skills to hurt others, even when they are upset or feel they are being treated unfairly. Cybersecurity is very important today because so much depends on technology.


Mitigation:

Detective Sergeant Lindsey Brants, who led the investigation, stated that Taj had abused his privileged access to the company’s IT systems to take revenge, causing a ripple effect of disruption that extended far beyond the UK. She emphasized that the case highlights the importance for all businesses to protect their networks, prevent data loss, and maintain trust with clients and stakeholders.


Source:

https://therecord.media/uk-it-worker-jailed-hacking-former-employer

_______________________________________________________________________


Criminals Posing as Legitimate Health Insurers and Fraud Investigators to Commit Health Care Fraud


Summary:

The FBI has issued a warning to the public about a rising scam involving criminals who impersonate legitimate health insurance companies and their investigative teams. These fraudsters are targeting both patients and healthcare providers by sending deceptive emails and text messages that appear to be from trusted medical organizations. The messages often use urgent or official language to create pressure and gain the recipient’s trust. Victims are then manipulated into disclosing sensitive information, including protected health data, personal medical records, and financial details. In some cases, the scammers request payments by falsely claiming there were service overpayments or charges for non-covered procedures.


Analyst comments:

The impact of these scams can have over lasting consequences. Falling victim to such lures can lead to identity theft, financial loss, and the misuse of private medical information. With access to protected health data and personal medical record, actors can use this data to file false insurance claims or commit other types of fraud. Healthcare providers may also face reputational damage and legal consequences if patient data is compromised. The FBI emphasizes the importance of verifying communications before sharing any personal or financial information and encourages reporting suspicious activity to authorities.


Mitigation:

  • Be suspicious of unsolicited messages emails, texts, and calls requesting personal information.
  • Never click on links that are included in suspicious and/or unsolicited emails.
  • Use strong passwords and enable Multi-Factor Authentication for all accounts.
  • Keep operating system software updated and use antivirus software on all devices.
  • Always contact your health insurance provider directly to verify the legitimacy of any messages before sharing personal or health care information.


Source:

https://www.ic3.gov/PSA/2025/PSA250627

_______________________________________________________________________


Adversary-in-the-Middle Attacks that Target Microsoft 365


Summary:

Adversary-in-the-Middle attacks are an advanced evolution of man-in-the-middle techniques, exploiting weaknesses in credential-based security and legacy MFA systems by intercepting and relaying traffic between victims and legitimate services. Unlike standard phishing that only steals credentials, AiTM allows attackers to capture real-time session cookies, enabling them to bypass MFA prompts entirely and maintain persistent access. A notable example is the Tycoon 2FA phishing-as-a-service platform, which automates the deployment of realistic phishing pages that closely mimic Microsoft 365 login flows, including organization-specific Entra ID branding, tricking users into entering both passwords and MFA codes.


In April 2025, Proofpoint detected a significant spike in global AiTM campaigns leveraging Tycoon’s platform, targeting thousands of organizations across multiple sectors, including healthcare, finance, and education. These campaigns employed advanced evasion tactics such as invisible Unicode characters embedded in URLs, custom CAPTCHAs to defeat automation, and anti-debugging scripts to slow analysis and bypass traditional email security gateways.


The typical attack chain began with phishing emails containing links to a fake Microsoft 365 login page designed to appear identical to legitimate portals, often including the target’s organizational logos and colors. Once victims entered their credentials, the fake page prompted for MFA tokens, capturing them in real time alongside session cookies via a reverse proxy setup, allowing attackers to authenticate as the user without triggering additional MFA challenges. This session hijacking enabled attackers to access sensitive services, exfiltrate data, and establish persistent footholds within victim environments.


Analyst comments:

Notably, Proofpoint observed these attacks successfully bypassing the defenses of six other major email security vendors, including three recognized as Leaders in the 2024 Gartner Magic Quadrant, underscoring the sophistication and effectiveness of these campaigns. Proofpoint identified the use of “precision-validated phishing,” where attackers validate the user’s existence or activity before executing the attack, enhancing the likelihood of success while narrowing the target scope.


Mitigation:

To safeguard against threats like the one described in this post, here’s what we recommend:


  • Use enhanced authentication methods. MFA remains a key defense, but it’s not foolproof. Consider implementing additional authentication methods, such as hardware tokens, like FIDO2. These methods are resistant to session cookie theft and are harder for attackers to bypass.
  • Educate users. Training employees to recognize phishing emails is crucial. Users should learn how to carefully inspect URLs in email messages. And they should be taught to verify the authenticity of login pages, especially those with custom branding.
  • Improve your email filtering. Advanced email security solutions can detect suspicious behavior. They can also identify the use of uncommon domains that are used, unusual sender information, and other indicators of a phishing attack.
  • Get advanced threat detection. The use of advanced threat detection tools is critical for defending against AiTM and other identity-based attacks. These tools not only prevent attackers from stealing credentials, but they also stop them from moving laterally across your environment and escalating the privileges of stolen accounts.


Source:

https://www.proofpoint.com/us/blog/email-and-cloud-threats/aitm-phishing-attacks-evolving-threat-microsoft-365

_______________________________________________________________________


Scattered Spider Hackers Shift Focus to Aviation, Transportation Firms


Summary:

Hackers associated with Scattered Spider” have expanded from targeting insurance and retail sectors to now attacking aviation and transportation industries in North America. Previously, the group focused on retail companies such as M&S and Co-op in the UK and US before shifting to insurance firms, including Aflac, Erie Insurance, and Philadelphia Insurance Companies, where they leveraged social engineering and identity attacks to gain access to corporate networks.


On June 12, Canada’s second-largest airline, WestJet, suffered a cyberattack attributed to Scattered Spider. The attackers reportedly gained access by performing a self-service password reset for an employee, registering their own MFA, and accessing the network through Citrix. This aligns with the group's well-known tactics of targeting help desks and MFA infrastructure to bypass defenses. Following the breach, Palo Alto Networks and Microsoft assisted in the response efforts.


Shortly after, Hawaiian Airlines disclosed it had also been attacked, with sources indicating Scattered Spider was likely responsible, although the airline did not officially confirm the attribution. Currently, American Airlines is facing an IT outage, but it remains unclear if this is related to Scattered Spider activity.


Analyst comments:

Experts from Palo Alto Networks’ Unit 42 and Mandiant (Google Cloud) have confirmed that Scattered Spider has shifted focus to the aviation and transportation sectors, with Mandiant urging organizations to tighten identity verification processes, protect self-service password reset platforms, and limit help desk actions that can facilitate unauthorized MFA changes. Organizations are also advised to monitor for suspicious MFA reset requests, new device registrations, and identity-related changes that could signal intrusion attempts. Scattered Spider, also tracked as UNC3944, 0ktapus, and Octo Tempest, is not a single group but a loose network of young, English-speaking threat actors using overlapping tactics including phishing, SIM swapping, MFA fatigue attacks, and real-time social engineering via help desks to compromise large organizations. They often frequent Telegram channels, hacker forums, and Discord servers to coordinate attacks and have a history of partnering with Russian-speaking ransomware groups such as BlackCat, RansomHub, Qilin, and DragonForce for extortion operations.


Mitigation:

To defend against these threats, Google Threat Intelligence Group and Palo Alto Networks recommend organizations secure identity and MFA platforms, implement strict help desk protocols, ensure logging and monitoring of identity-related activities, and provide user training to recognize social engineering attempts. Given Scattered Spider’s expanding focus on critical sectors, the aviation and transportation industries are urged to adopt these mitigation steps promptly to reduce the risk of compromise and operational disruptions.


Source:

https://www.bleepingcomputer.com/news/security/scattered-spider-hackers-shift-focus-to-aviation-transportation-firms/

_______________________________________________________________________


Odyssey Stealer: The Rebrand of Poseidon Stealer


Summary:

A formidable threat, Odyssey Stealer (rebranded from Poseidon Stealer, which was forked from AMOS Stealer), has emerged within the macOS-targeting malware landscape, specifically targeting users in Western nations while avoiding CIS nations, through highly deceptive social engineering tactics. Leveraging fake App Store prompts and expertly crafted typosquatted domains, Odyssey Stealer employs a "Clickfix" technique to trick users into executing malicious AppleScripts. This sophisticated infostealer is designed to surreptitiously exfiltrate a comprehensive array of sensitive data, including browser cookies, password credentials, cryptocurrency wallet keys, private keys, session tokens, and various common document types. It achieves this by displaying fake password prompts, copying macOS keychain files, and targeting popular cryptocurrency wallet applications and browser extensions. The stolen data is then meticulously zipped and exfiltrated to a C2 server, with built-in retry mechanisms for persistence. Operated via a sophisticated web-based command-and-control panel, Odyssey Stealer is a direct descendant of AMOS Stealer, representing a continuous evolution in macOS-specific MaaS offerings, with its author, "Rodrigo," reportedly still actively involved.


Analyst comments:

The discovery of campaigns utilizing Odyssey Stealer signifies a notable increase in the sophistication and targeting of macOS malware. Its reliance on human-factor vulnerabilities through "Clickfix" social engineering, particularly the instruction to paste terminal commands from seemingly legitimate CAPTCHA pages, highlights the persistent efficacy of user manipulation in breaching security perimeters. The breadth of data exfiltration, encompassing not only standard credentials but also cryptocurrency wallet files, seed phrases, and session tokens, clearly indicates a financially motivated actor with a highly focused target demographic. The avoidance of victims in CIS nations underscores the likelihood of this malware being associated with Russia-aligned threat groups. The re-emergence of codebases from AMOS Stealer and the suspected continued involvement of "Rodrigo" points to a maturing macOS malware-as-a-service ecosystem where established developers are continuously iterating and rebranding their offerings with enhanced capabilities. This professionalization, exhibited by the advanced C2 panel capabilities like "Google Cookies Restore," underscores their shift from opportunistic attacks to well-orchestrated and well-resourced long-term espionage campaigns.


Mitigation:

IOCs are available here.


CYFIRMA recommendations:


  • Implement threat intelligence to proactively counter the threats associated with the Odyssey stealer.
  • To protect the endpoints, use robust endpoint security solutions for real-time monitoring and threat detection, such as an Anti-malware security suite and a host-based intrusion prevention system.
  • Continuous monitoring of the network activity with NIDS/NIPS and using the web application firewall to filter/block suspicious activity provides comprehensive protection from compromise due to encrypted payloads.
  • Configure firewalls to block outbound communication to known malicious IP addresses and domains associated with Odyssey stealer command and control servers.
  • Implement behavior-based monitoring to detect unusual activity patterns, such as suspicious processes attempting to make unauthorized network connections.
  • Employ application whitelisting to allow only approved applications to run on endpoints, preventing the execution of unauthorized or malicious executables.
  • Only install apps from the official Mac App Store or verified developer sites.
  • Block osascript execution unless explicitly required for business operations.
  • The use of security benchmarks to create baseline security procedures and organizational security policies is also recommended.
  • Develop a comprehensive incident response plan that outlines steps to take in case of a malware infection, including isolating affected systems and notifying relevant stakeholders.
  • Security awareness and training programs help to protect from security incidents such as social engineering attacks. Organizations should remain vigilant and continuously adapt their defenses to mitigate the evolving threats posed by the Odyssey Stealer malware.


Source:

https://www.cyfirma.com/research/odyssey-stealer-the-rebrand-of-poseidon-stealer/

X  Linkedin