Lovense ignored app vulnerabilities for eight years | Kaspersky official blog

Our blog has covered vulnerabilities in some unusual gadgets — from smart mattress covers and robot vacuums to traffic signal audio buttons, children’s toys, pet feeders, and even bicycles. But the case we’re discussing today might just be the most… exotic yet. Recently, cybersecurity researchers uncovered two extremely serious vulnerabilities in the remote control apps for… Lovense sex toys.

Everything about this story is wild: the nature of the vulnerable gadgets, the company’s intention to take 14 months (!) to fix the problems, and the scandalous details that emerged after researchers published their findings. So let’s… get stuck straight in to right into this tale, which is as absurd as it is fantastic.

The Lovense online ecosystem

The first thing that makes this story so unusual is that Lovense, a maker of intimate toys, caters to both long-distance couples and cam models (human models that use webcams) working on streaming platforms.

To control devices and enable user interaction, the company has developed an entire suite of software products tailored for a variety of scenarios:

  • Lovense Remote: the main mobile app for controlling intimate devices.
  • Lovense Connect: a companion app that acts as a bridge between Lovense devices and other apps or online services. It’s installed on a smartphone or computer and allows a toy to connect via Bluetooth, and then relays control commands from external sources.
  • Lovense Cam Extension: a browser extension for Chrome and Edge that links Lovense devices with streaming platforms. It’s used with the Lovense Connect app and the OBS Toolset streaming software for interactive control during live broadcasts.
  • Lovense Stream Master: an all-in-one app for streamers and cam models combining device control features with live streaming functionality.
  • Cam101: Lovense’s online educational platform for models working on streaming sites.

Of course, this whole setup also includes APIs, SDKs, an internal platform for mini-apps, and more. In short, Lovense isn’t just about internet-connected intimate toys — it’s a full-fledged ecosystem.

Lovense Stream Master: a service for webcam models

UI of the Stream Master app, which combines device management and video streaming. Source

If you create an account in the Lovense infrastructure, you’re required to provide an email address. Whereas some services offer the option to sign in with Google or Apple, an email address is the primary sign-up method for a Lovense account. This detail might seem insignificant, but it’s at the core of the vulnerabilities that were discovered.

Two vulnerabilities in Lovense online products

So, how did this all unfold? In late July 2025, a researcher known as BobDaHacker published on his blog a detailed post about two vulnerabilities in Lovense’s online products. Many of the products (including Lovense Remote) have social-interaction features. These features allow users to chat, add friends, send requests and subscribe to other users, including people they don’t know.

While using the social-interaction features of one of the Lovense apps, BobDaHacker spotted the first vulnerability: when he disabled notifications from another user, the app sent an API request to the Lovense server. After examining the body of this request, BobDaHacker was surprised to find that, instead of the user’s ID, the request contained their actual email address.

Lovense API vulnerability exposing user emails

When a simple action (like disabling notifications) was performed, the app would send a request to the server that included another user’s real email address. Source

Upon further investigation, the researcher found that Lovense’s API architecture was designed so that for any action that concerned another user (like disabling their notifications), the app sends a request to the server. And in this request the user’s account is always identified by the real email address they signed up with.

In practice, this meant that any user who intercepted their own network traffic could get access to the real email addresses of other people on the app. It’s important to remember that the Lovense apps have social-interaction features and allow communication with cam models. In many cases, users don’t know each other outside of the platform, and exposing the email addresses linked to their profiles could lead to deanonymization.

BobDaHacker discussed his findings with another cybersecurity researcher named Eva, and together they examined the Lovense Connect app. This led them to discover an even more serious vulnerability: generating an authentication token in the app only required the user’s email address — no password was needed.

This meant that any technically skilled person could gain access to any Lovense user’s account — as long as they knew the user’s email address. And as we just learned, that address could easily be obtained by exploiting the first vulnerability.

Second vulnerability: account takeover using only an email address

To generate an authentication token in the Lovense app, only the user’s email was required — without the password. Source

These tokens were used for authentication across various products in the Lovense ecosystem, including:

  • Lovense Cam Extension
  • Lovense Connect
  • Stream Master
  • Cam101

Furthermore, the researchers successfully used this method to gain access to not only regular user profiles but also accounts with administrator privileges.

Lovense’s response to vulnerability reports

In late March 2025, BobDaHacker and Eva reported the vulnerabilities they’d discovered in Lovense products through The Internet Of Dongs Project — a group dedicated to researching and improving the security of internet-connected intimate devices. The following month, in April 2025, they also posted both vulnerabilities on HackerOne, a more traditional platform for engaging with security researchers and paying bug bounties.

Lovense, the adult-toy manufacturer, acknowledged the report and even paid BobDaHacker and Eva a total of $4000 in bounties. However, in May and then again in June, the researchers noticed the vulnerabilities still hadn’t been fixed. They continued talking to Lovense, which is when the most bizarre part of the story began to unfold.

First, Lovense told the researchers that the account takeover vulnerability had been fixed on April. But BobDaHacker and Eva checked and confirmed this was false: it was still possible to get an authentication token for another user’s account without a password.

The situation with the email disclosure vulnerability was even more absurd. The company stated it’d take 14 months to fully resolve the issue. Lovense admitted they had a fix that could be implemented in just one month, but they decided against it to avoid compatibility problems and maintain support for older app versions.

The back-and-forth between the researchers and the manufacturer continued for several more months. The company would repeatedly claim the vulnerabilities were fixed, and the researchers would just as consistently prove they could still access both emails and accounts.

Finally, in late July, BobDaHacker published a detailed blogpost describing the vulnerabilities and Lovense’s inaction, but only after giving the company advance notice. Journalists from TechCrunch and other outlets contacted BobDaHacker and were able to confirm that in early August — four months after the company was first notified — the researcher could still ascertain any user’s email address.

And that was far from the end of it. The most scandalous details were revealed to BobDaHacker and Eva only after their research was published.

A history of negligence: who warned Lovense and when

BobDaHacker’s work made waves across media, blogs, and social networks. As a result, just two days after the report was published, Lovense finally patched both vulnerabilities — and this time, it seems, for real.

However, it soon came to light that this story started long before BobDaHacker’s report. Other researchers had already warned Lovense about the very same vulnerabilities for years, but their messages were either ignored or hushed up. These researchers shared their stories with BobDaHacker and the publications that covered his investigation.

To truly grasp the extent of Lovense’s indifference to user security and privacy, you just need to look at the timeline of these reports:

  • 2023: a researcher known as @postypoo reported both bugs to Lovense, and was offered… two free adult toys in response, but the vulnerabilities were never fixed.
  • Also2023: researchers @Krissy and @SkeletalDemise discovered the vulnerability related to account takeovers. Lovense claimed the issue had been fixed, and paid a bounty in the same month. However, @Krissy’s follow-up message stating that the vulnerability was still present went unanswered.
  • 2022: a researcher named @radiantnmyheart discovered the bug that exposed emails, and reported it. The message was ignored.
  • 2017: the company Pen Test Partners reported the email exposure vulnerability and the lack of chat encryption in the Lovense Body Chat app, and published its study on this. The report was ignored.
  • 2016: The Internet Of Dongs Project identified three similar email exposure vulnerabilities. This all means that Lovense asked BobDaHacker to give it 14 months to patch vulnerabilities they’d known about for at least eight years!

What’s more, after BobDaHacker’s report was published, they heard not only from the ethical hackers who’d previously reported these bugs, but also from the creator of an OSINT website and their friends, who were anything but happy. These individuals had apparently been exploiting the vulnerabilities for their own purposes — specifically, harvesting user emails and subsequent deanonymization. This isn’t surprising though given that the Pen Test Partners report had been publicly available since 2017.

Protecting your privacy

Lovense’s approach to user privacy and security clearly leaves a lot to be desired — to put it mildly. Whether to continue using the brand’s devices after this — especially connecting them to the company’s online services — is a decision each user needs to make for themselves.

For our part, we offer some tips on how to protect yourself and maintain your privacy should you interact with adult online services.

  • Always create a separate email address when you register for these types of services. It shouldn’t contain any information that can be used to identify you.
  • Don’t use this email address for any other activities.
  • When registering, don’t use your real first name, surname, age, date of birth, city of residence, or any other data that could identify you.
  • Don’t upload real photos of yourself that could easily be used to recognize you.
  • Protect your account with a strong password. It should contain at least 16 characters and ideally include a mix of uppercase and lowercase letters, numbers, and special characters.
  • This password must be unique. Never use it for other services so you don’t put them at risk in the event of a data leak.
  • To avoid forgetting the password and email address you created specifically for this service, use a reliable password manager. KPM can also help you generate a random, strong, and unique password.

And if you want to be more… boned up when it comes to choosing adult toys and relevant services, we recommend looking at specialized resources like The Internet Of Dongs Project, where you can find information about brands that interest you.

Check out our other posts on how to protect your private life from prying eyes:

Kaspersky official blog – ​Read More

Fighting Telecom Cyberattacks: Investigating a Campaign Against UK Companies

Telecommunications companies are the digital arteries of modern civilization. Compromise a major telecom operator, and you don’t just steal data — you gain the power to intercept communications, manipulate network traffic, and bring entire regions offline. 
 
Every day, ANY.RUN’s solutions process thousands of threat samples, and hidden within them are patterns of activity targeting telecom operators. Some are opportunistic, others are advanced and carefully orchestrated.   

In this report, we’ll walk through real-world attacks where threat actors weaponized telecom brand trust to launch attacks. We’ll also show how analysts can detect these threats, extract indicators of compromise (IOCs), and strengthen defenses. 

Key Takeaways 

  • Telecommunications under siege: The telecom sector faced sustained growth in malicious activity from May-July 2025, with 56% of observed APT campaigns targeting telecom and media companies.  
  • Brand impersonation is weaponized trust: Attackers systematically abuse telecom brand recognition, using familiar logos, official-looking domains, and corporate communication styles to bypass human skepticism and technical filters. 
  • Pattern recognition defeats mass campaigns: Simple YARA rules can expose large-scale operations.  
  • Tycoon2FA phishing kit remains active: The phishing framework designed to steal Microsoft credentials and bypass two-factor authentication is a critical concern for enterprise telecom environments. 
  • Interactive Sandbox reveals multi-stage attack progression: ANY.RUN’s Interactive Sandbox captured the complete attack flow from the initial PDF attachment to the final phishing page. This real-time analysis exposed the redirection chain from legitimate-looking emails to DGA-generated domains (xjrsel.ywnhwmard[.]es), enabling early detection before credentials could be harvested. 
  • Proactive hunting scales defense: Combining YARA Search with Threat Intelligence Lookup transforms reactive incident response into proactive threat hunting, enabling security teams to build comprehensive defense before attacks succeed. 

Recent Telecom Attack Dynamics 

Attacks on communication operators can disrupt critical services, lead to leaks of confidential information, and be used as a springboard for large-scale cyber espionage operations. 

According to Cyfirma, telecommunications and media industry were targeted in 9 out of 16 observed APT campaigns in May–July 2025, accounting for 56% of all cases. The peak activity occurred in May, followed by a slight decline in June and a renewed increase in July. 

We at ANY.RUN have observed a steady increase in telecom-targeting attacks in May–July 2025. The Sandbox data shows a smoother continuous growth, reaching a maximum in July. This reflects the constant pressure of mass attacks. 

ANY.RUN’s data shows steady growth of telecom attacks 

In our Threat Intelligence Reports highlighting the activity of top APT groups, we also see an increased targeting of media and telecom campaigns in the recent attacks.  

Analysis of Threats Targeting a Major Telecom Holding 

Let’s take the perspective of an information security specialist at a huge British telecommunications holding company operating in approximately 180 countries and providing fixed-line, broadband internet, mobile communications, and pay-TV services. 

Our goal is to determine how attackers spread malware, which families they use, which indicators can be collected, and the frequency, dynamics, and technical details of the attacks.   

The results of a YARA rule scan 

We will start with Threat Intelligence Lookup, which allows SOC teams to navigate a database of live attack data from 15,0000 organizations. Using TI Lookup’s YARA Search, we can create a simple rule to find all emails uploaded into the sandbox where the recipient field contains the holding’s domain. This allows us to identify malicious attachments and links aimed at its employees. 

As a result of executing the YARA rule, dozens of files were discovered containing addresses with the corporation’s domain in the recipient field. Each of these files was linked to one or more analyses in ANY.RUN’s Sandbox, which also featured this domain, confirming the presence of potentially significant malicious activity directed at company employees.

Catch attacks early with instant IOC enrichment in TI Lookup
Power your proactive defense with data from 15K SOCs 



Request trial for your team


ANY.RUN’s Interactive Sandbox allows security analysts to safely execute suspicious files and observe their behavior in real-time, capturing network communications, file modifications, and malicious redirections before they can impact production systems. This controlled environment reveals attack chains from initial email delivery through credential harvesting attempts.

Let us analyze one of the found emails.  

View sandbox analysis of the malicious email 

A phishing email sample detonated in ANY.RUN’s Sandbox

A Phishing Message Through a SOC Analyst Lens 

On July 9, 2025, an email addressed to giova[xx.xx]stantini@[thedomain dot]com was uploaded to ANY.RUN. The sender was listed as Bt_Bt_xu86@ksi.com.pk with the display name “DocSgn.” The domain ksi[.]com[.]pk belongs to Khatib Sons International, a Pakistani metal company, and has no relation to the email content. Coupled with the “DocSgn” branding, this impersonated a well-known electronic document signature service to trick the recipient. 

View sandbox analysis of the email 

A phishing email with characteristic sender and subject

The subject line — “Re: Re: Completed: For Sales contract (h4nc)” — mimicked an ongoing conversation, a common social engineering tactic to reduce suspicion. 

The email contained a PDF attachment and a form with a “Review and Sign” button in the body, luring the recipient to view and sign a supposed document. 

Additionally, at least five similar emails were detected targeting other employees, with generic content not tailored to specific recipients — indicating a mass campaign. 

The redirect to a generated domain 

Clicking the “Review and Sign” button redirected the user to a fake Microsoft login page hosted on xjrsel.ywnhwmard[.]es, a domain resembling a DGA-generated address, a common indicator of phishing or malicious resources. 

This threat was identified as the Tycoon2FA phishing kit, known for spoofing Microsoft login pages and harvesting credentials. 

Reduce MTTR and minimize risks with ANY.RUN’s solutions
Request a quote or trial for your SOC  



Contact us


Network-Level Detection 

Suricata rules triggered on network activity associated with the Tycoon2FA kit. The alerts provided details such as MITRE ATT&CK technique T1566 (Phishing), the suspicious DGA-like domain, and connection metadata. 

Suricata rule with domain and telemetry data detected in the sandbox

That’s exactly how ANY.RUN’s solutions help detect threats early, exposing phishing attempts before they do damage.  

Searching for Similar Threats Targeting UK Companies 

Using ANY.RUN’s Threat Intelligence Lookup, we’ve searched for samples uploaded from the UK containing the same PDF attachment. The query returned about 40 sandbox analyses, mostly from July 2025, including emails targeting a number of UK companies. 

sha256:”689cdb319d8cae155516d9f8ddfbd0c99de048252e84f529e0ccc538523a5eba” and submissionCountry:”GB” 

File hash TI Lookup search results 

We’ve also identified repeating sender address patterns across multiple phishing emails, indicating automated mass distribution. 

Sorting Out Emails with Specific Sender Pattern 

Many malicious emails sent to telecom companies have fixed patterns for forming sender addresses in the From field. The structure looks as follows: 

“._*” <*_*_*@*.com> 

The display name usually began with “._” followed by a word in capital letters. The email address repeated a word twice, separated by underscores, followed by random characters before the @, and ending in .com. 

Email with sender name generated with a specific pattern 

This structure strongly suggests automated mass phishing. 

Email with characteristic sender name from another campaign 

Such a pattern is highly likely created automatically for mass mailings, so it can be used as a basis for a filtering rule that blocks similar emails. 

A YARA rule was created to detect such emails in ANY.RUN’s database of malware samples. The rule revealed 16 files with the sender pattern, linked to multiple sandbox analyses. From these, we can extract senders’ addresses, email and attachment hashes, URLs, phishing domains, IPs, subjects, and other indicators. 

YARA rule for searching emails with the sender pattern

This data allows analysts to assess the relevance of the threat, determine its timeframe and target organizations and countries. Based on this, you can prioritize this threat for your company and add indicators to the detection and response systems. 

Tracking Telecom Impersonation Attacks 

Let’s build a threat landscape where attackers use domains containing the element “telecom” in their names. We are interested in cases where such activity is classified as phishing to assess the scale, frequency, and targets of these attacks.

The search returned 86 analysis sessions, 70 related domains, and enriched context data such as headers, attachments, network artifacts, timelines, and submission geographies. 

domainName:”telecom” AND threatName:”phishing” and threatLevel:”malicious” 

Search for malware samples featuring domains with “telecom” in name 

These insights allow security teams to enrich TI sources, prioritize threats, identify campaign clusters, track temporal dynamics, update detection rules, and map related infrastructure. 

How ANY.RUN Helps Telecom Companies Withstand the Growing Pressure of Phishing Attacks 

Telecom companies are under constant fire from phishing campaigns that combine brand impersonation, malicious attachments, and fake domains. While attackers automate and scale their operations, security teams often struggle to keep up. ANY.RUN’s ecosystem of services provides telecom defenders with the tools to detect, investigate, and respond to these threats more effectively: 

Interactive Sandbox 

Set up your virtual environment and run safe malware analysis in the Sandbox 

Quickly detonate suspicious emails, attachments, or links in a safe, interactive environment. Observe behavior in real time, identify phishing kits like Tycoon2FA, and capture artifacts such as malicious redirects, domains, or dropped files. 

Threat Intelligence Feeds 

TI Feeds: get real-time indicators from 15K SOC incident investigations 

Get continuously updated, actionable indicators of compromise (IOCs) drawn from global malware submissions. Telecom SOCs can integrate Threat Intelligence Feeds directly into SIEM or EDR systems to block known phishing infrastructure before it reaches employees or customers. 

Threat Intelligence Lookup 

Click the search bar and use tips on parameters and operators to look up IOCs and TTPs 

Go beyond single-sample analysis by exploring related campaigns. With Threat Intelligence Lookup, analysts can pivot on domains, file hashes, or sender patterns to uncover broader phishing clusters targeting telecom brands. This makes it easier to map attacker infrastructure, understand campaign scope, and strengthen detection rules. 

By combining these services, telecom companies gain both the depth to analyze individual phishing attempts and the breadth to track large-scale campaigns. This layered approach enables faster detection, better prioritization, and ultimately stronger resilience against persistent phishing pressure. 

Conclusion 

The analysis confirms that phishing attacks against telecom companies’ employees remain highly relevant, often used to steal credentials and bypass 2FA. 

ANY.RUN’s TI Lookup and YARA Search allow analysts to research the attacks and the employed malware, find samples linked to a targeted company’s email addresses, and expose domains utilized for phishing. Security teams are able to gather valuable indicators (hashes, domains, IPs, headers) to enrich internal threat intelligence sources. 

Pattern-based detection methods tailored to telecom-sector targeting can help identify new campaigns faster and reduce organizational risk. 

About ANY.RUN

Over 500,000 cybersecurity professionals and 15,000+ companies in finance, manufacturing, healthcare, and other sectors rely on ANY.RUN. Our services streamline malware and phishing investigations for organizations worldwide.   

  • Speed up triage and response: Detonate suspicious files using ANY.RUN’s Interactive Sandbox to observe malicious behavior in real time and collect insights for faster and more confident security decisions.   
  • Improve threat detection: ANY.RUN’s Threat Intelligence Lookup and TI Feeds provide actionable insights into cyber attacks, improving detection and deepening understanding of evolving threats.  

Start 14-day trial of ANY.RUN’s solutions in your SOC today 

The post Fighting Telecom Cyberattacks: Investigating a Campaign Against UK Companies appeared first on ANY.RUN’s Cybersecurity Blog.

ANY.RUN’s Cybersecurity Blog – ​Read More

What happens when you engage Cisco Talos Incident Response?

What happens when you engage Cisco Talos Incident Response?

In today’s world, cybersecurity incidents are not a matter of if, but when and how. From ransomware attacks to data breaches exposing sensitive information, organizations face a changing threat landscape. As a result of cybersecurity attacks, organizations can experience downtime, financial losses, reputational damage and regulatory penalties. That’s when it really helps to have a team like Cisco Talos Incident Response (Talos IR) by your side. But what exactly happens when you bring in a team of cybersecurity responders? How do we turn chaos into control, and what is the long-term value that Talos IR provides to the organizations we work with?

This blog post takes you behind the scenes of engaging an incident response (IR) firm like Talos IR. We will walk through what really happens during an IR engagement, from the moment you pick up a phone and call for help in the middle of a crisis to the long-term changes that make your organization stronger and more secure.

Why engage an IR team? 

Before diving into the process, let’s address the fundamental question: Why engage an IR firm? Cybersecurity incidents are complex, often requiring specialized skills, tools and experience that internal teams may lack. The Talos Year In Review Report highlights the rising frequency and sophistication of attacks; as a result, many security teams are struggling to address emergencies due to resource constraints or the complexity of response at scale. 

Engaging an IR firm like Talos IR brings several key advantages: 

  • Speed and availability: We provide 24/7 global support, with response times often under a few hours for remote engagements and on-site support wherever needed. Engaging an IR firm is like calling in a S.W.A.T. team for a cybersecurity crisis. We bring the tools, tactics and experience to contain the threat and minimize damage while guiding the organization toward recovery and increasing future resilience. 
  • Expertise: With numerous incident responders and threat intelligence analysts, all of whom have access to industry-leading Talos threat intelligence, the team has deep experience handling diverse threats, from ransomware to business email compromise (BEC). We handle it all, from “small” attacks on a single organization to a country-level threats. We don’t focus just on typical IT environments — we work with ICS/OT, cloud or mobile forensic, as well.  
  • Vendor-agnostic approach: Talos IR works with customers’ existing infrastructure and tooling, whether you use Cisco products or not. We simply don’t like to wait for deployment of tools before getting our hands dirty in all the logs, consoles and forensic artifacts. At a time when you are already resource-constrained, the last thing we want to do is make you replace an existing security solution, such as endpoint detection and response (EDR), on the endpoints. 
  • Comprehensive services: Beyond emergency response, Talos IR provides proactive services like Threat Hunting and IR Planning to strengthen your security posture before an incident happens or after to build up resilience.

Overview of the IR lifecycle 

The IR process typically follows a structured lifecycle, based on frameworks such as NIST SP 800-61 or the SANS Institute’s model. Talos IR aligns with these best practices, tailoring its approach to organization’s unique needs at the time of crisis and beyond. Handling incidents day in and day out has given Talos IR a deep well of experience, and we’ve built that knowledge into processes to support every organization we work with. The lifecycle of our IR typically includes: 

  1. Preparation 
  2. Identification 
  3. Containment 
  4. Eradication 
  5. Recovery 
  6. Lessons learned 

When you engage Talos IR, we apply this lifecycle with a blend of technical prowess, threat intelligence and collaborative teamwork. Let’s walk through each phase in detail.

Phase 1: Preparation (before the incident) 

Preparation is the foundation of effective IR. While many organizations only engage IR firms during a crisis, proactive engagement with Talos IR can significantly reduce the impact of future incidents. With a Talos IR retainer, you secure an agreement that ensures rapid response during an emergency and access to proactive services tailored to your organization’s risk profile and needs, offering: 

  • Emergency response: Guaranteed access to a global team within a short time of experiencing of an incident. During major global cybersecurity events like Wannacry, Heartbleed or Log4J or others, an existing retainer can be the difference between receiving immediate help and waiting days to weeks.
  • Proactive services: Access to proactive services for Threat Hunting, Tabletop Exercises or Purple Teaming
  • Relationship building: Familiarity with your environment, reducing response time during a crisis

These services build trust and familiarity, ensuring Talos IR can hit the ground running during an emergency.

Phase 2: Identification (beginning of incident) 

When a cybersecurity incident occurs, the first step is identifying and confirming the threat, whether it’s a ransomware attack, phishing campaign, or data breach. This is often when organizations reach out to Talos IR. Talos IR’s emergency response team is available 24/7 and can be reached via phone or email, but phone is the fastest and most direct way to reach our dedicated IR team.  

Initial call

During the first call, Talos IR gathers critical information to help us move onto analysis as soon as possible: 

  • Nature of the incident: What symptoms were observed (e.g., encrypted files, suspicious emails, new files on the webserver that were committed outside of the development lifecycle)? 
  • Affected systems: Which servers, endpoints, or networks are impacted? 
  • Business impact: Is the incident disrupting operations or exposing sensitive data? 
  • Existing actions: What steps have been taken so far? 
  • Visibility: What existing systems and tools can we access to handle the incident? Would complimentary Cisco tools help close a current gap, such as no EDR solution on a specific network? 

Triage, scoping and analysis 

Talos IR deploys a team led by an Incident Commander, who coordinates efforts and communicates with the stakeholders. The Incident Commander is supported by a skilled team of responders, threat analysts and project managers who keep everything moving and progress analysis 24/7. We typically start our work with in-depth triage of your environment which often involves: 

  • Log analysis: Reviewing logs from security information and event management (SIEM) systems, EDR tools, or network devices to identify indicators of compromise (IOCs)
  • Threat intelligence: Leveraging Talos global telemetry to match IOCs against known adversary tactics, techniques and procedures (TTPs)
  • Digital forensics: Collecting and analyzing evidence, such as memory dumps or disk images, to understand the attack’s scope

What makes IR truly effective is having access to as much relevant data as possible from the very beginning. The earlier our team can review endpoint telemetry, network traffic, identity logs and other critical data points, the faster we can determine what happened, how far the threat spread and what needs to be done to contain the threat. We often use the triage process to understand and search for: 

  • Initial access vector: Common vectors include phishing, exploited vulnerabilities (e.g., Microsoft Exchange Server flaws), or misconfigured VPN servers. You can read all about the trends we see each quarter here
  • Adversary goals: Is the attacker after data theft, ransomware deployment, or persistent access? 
  • Scope: How many systems, users, or networks are affected? 
  • Persistence mechanisms: Are there backdoors, scheduled tasks, or web shells that allow re-entry? 
  • Data exfiltration: Was sensitive data stolen? 

Talos IR provides an initial assessment, outlining the incident’s severity and recommended next steps, and keeps you updated daily. This phase sets the stage for containment, where speed is critical to limit damage. This analysis goes on for a number of days and typically uncovers additional information that adds to the picture during each 24-hour cycle.

Phase 3: Containment (stopping the attack) 

Containment focuses on preventing the threat from spreading further while preserving evidence for analysis. Talos IR employs a technology-agnostic approach, working with existing tools to implement short-term and long-term containment strategies while simultaneously looking to minimize business impact. 

Short-term containment 

Immediate actions to isolate the threat typically include: 

  • Network segmentation: Isolating affected systems or subnets to prevent lateral movement
  • Account lockdown and/or password changes: Disabling compromised accounts, changing compromised passwords, or enforcing multi-factor authentication (MFA). Talos IR frequently observes incidents where the lack of MFA enables ransomware or business email compromise (BEC) attacks. 
  • Process termination: Isolating malicious processes, such as ransomware encryptors or command-and-control (C2) beacons, when identified. Reimaging devices is often a recommended step, but it depends on the extent of the breach.
  • Firewall rules: Blocking malicious IPs or domains identified through Talos’ threat intelligence

Long-term security hardening 

While short-term countermeasures stop immediate damage, long-term security hardening ensures the attacker can’t regain access. By working together with an organization on emergency response, Talos IR gains a great understanding of what needs to be applied to build long term resistance. Some of these recommendations would be: 

  • Patching vulnerabilities: Addressing exploited flaws, such as unpatched servers or vulnerable web applications
  • Endpoint protection: Extending EDR deployments to monitor for residual threats on systems that were previously unprotected
  • Strengthening resilience: Taking a long-term, strategic approach to uncover and address weaknesses in your organization’s security posture to better prepared for future threats
  • Improving efficiency and consistency: Developing clear policies and procedures, while automating routine tasks such system hardening to reduce risk

Phase 4: Eradication (removing the threat) 

Once the threat is contained, Talos IR focuses on recommendations for completely removing all remnants of the adversary from the environment. Eradication is a delicate process that needs to balance business needs with recovery operations. Eradication typically involves: 

  • Account remediation: Resetting passwords and revoking compromised credentials. This may sound familiar from the containment phase, but often it is necessary to do two or more credential purges during a major incident. 
  • System rebuilds: In severe cases, rebuilding affected systems from clean backups to eliminate hidden threats.
  • Reverting adversary changes: Some sophisticated adversaries will do things like change firewall rules, embed fileless malware in the registry, or create future scheduled tasks as “sleeper agents.” Detecting, documenting and reverting these changes can be the most difficult and important part of eradication. 

Before wrapping up this phase, Talos IR verifies eradication through: 

  • Threat hunting: Scanning for residual IOCs or anomalous behavior
  • Log reviews: Confirming no further malicious activity

This process minimizes the risk of the adversary returning, as seen in cases where adversaries used tools like Cobalt Strike to maintain persistence. A single overlooked persistence mechanism is enough to let the adversary back in at a later date, which is why a thorough forensic review by an experienced IR team is critical. 

Phase 5: Recovery (restoring operations) 

Recovery aims to restore systems and operations to normal while enhancing security to prevent recurrence. Talos IR collaborates with IT and business teams to ensure a smooth transition. If it is necessary to accept some risk in order to get business operations back online, the Talos IR Incident Commander will work with your organizational leadership to ensure that the risk is minimized and understood, and that compensating controls are applied.  

Key recovery recommendations often include: 

  • Restoring from backups: Deploying clean backups to affected systems, ensuring they’re free of malware
  • Application testing: Verifying critical applications (e.g., ERP systems) function correctly post-recovery
  • User access: Gradually restoring user access with strengthened controls, such as MFA
  • Alternative processes: Implementing manual or temporary workflows if systems remain offline
  • Stakeholder communication: Coordinating with PR and legal teams to manage external messaging and regulatory notifications
  • Employee training: Educating staff on phishing awareness or secure practices to prevent future incidents
  • Logging improvements: Enhancing visibility to overcome the logging deficiencies
  • Patch management: Establishing processes to prevent exploitation of known vulnerabilities

Phase 6: Lessons learned (building resilience) 

The final phase of IR involves analyzing the incident to extract lessons and improve future preparedness. Talos IR’s approach ensures that insights translate into actionable strategies. Talos IR delivers a comprehensive incident report, including: 

  • Incident summary: A timeline of events, from initial detection to resolution 
  • Findings: Details on the attacker’s TTPs, entry points and impact
  • Recommendations: Specific actions to ensure long-term and short-term improvements

Ongoing partnership 

At Talos IR, we believe IR isn’t only a service we provide; it’s a relationship and the ultimate team sport. We’re not here just for the crisis; we’re here to support before, during and long after the incident is resolved. As many of our long-term retainer customers like Veradigm have observed, those multi-year relationships pay great dividends during incidents:  

“With the [Talos IR] retainer service we really appreciate established and met Service Level Agreements (SLAs). Plus, the knowledge of Cisco’s IR team on our unique environment, prior incidents, and their intelligence on the latest threats ensure we smoothly navigate, and balance preparation exercises and incidents based on our unique needs. Time to response in our SLA along with the unique knowledge, there isn’t a delay as one would expect. They are ready and we have ‘muscle memory’ from both tabletop scenarios and real-life situations. As a result of being in the highly regulated world of healthcare and with the constant need to consider patient safety, our circumstances can be tense from the start. They know how we need to react based on both exercises and incidents and can navigate smoothly in delicate situations/balances with our unique needs in mind,” Jeremy Maxwell, Veradigm CISO. 

This is one of many stories we observe during our engagements with different organizations. For Talos IR, once the immediate threat is handled, the real work begins. We help to strengthen your defenses through ongoing support, so your organization is better prepared for the future. We keep the defenders in the loop with up-to-date threat intelligence, and we run regular training and drills to make sure that various teams know exactly what to do if something happens again. 

It’s a partnership built on trust, experience and a shared goal: keeping your organization resilient in a constantly evolving threat landscape.

Cisco Talos Blog – ​Read More

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking

  • Cisco Talos discovered a new campaign active since 2022, targeting the telecommunications and manufacturing sectors in Central and South Asian countries, delivering a new variant of PlugX.
  • Talos discovered that the new variant’s features overlap with both the RainyDay and Turian backdoors, including abuse of the same legitimate applications for DLL sideloading, the XOR-RC4-RtlDecompressBuffer algorithm used to encrypt/decrypt payloads and the RC4 keys used.
  • The configuration associated with this new variant of PlugX differs significantly from the standard PlugX configuration format. Instead, it adopts the same structure as RainyDay, enabling us to assess with medium confidence that this variant of PlugX can be attributed to Naikon.
  • Although these malware families have historically been associated with campaigns attributed to Naikon or BackdoorDiplomacy, our analysis of the victimology and technical malware implementation has uncovered evidence that indicates a potential connection between the two threat actors and suggests that they are the same group or that both are sourcing their tools from the same vendor.

Overview

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking

Cisco Talos has identified an ongoing campaign targeting the telecommunications and manufacturing sectors in Central and South Asian countries. Based on our analysis of collected evidence, we assess with medium confidence that this campaign can be attributed to Naikon, an active Chinese-speaking threat actor that has been operating since 2010. This assessment is based on analysis of the PlugX configuration format used during this campaign as well as the malware infection chain involved, which was very similar to their previous malware, RainyDay. 

During the investigation and hunting efforts for RainyDay backdoors, Talos uncovered two significant findings. First, we found that several instances of the Turian backdoor and newly identified variants of the PlugX backdoor were abusing the same legitimate Mobile Popup Application as RainyDay to load themselves into memory. Second, we observed that the three malware families leverage loaders which not only have a similar XOR decryption function but also use the same RC4 key to decrypt the encrypted payload. Although we did not observe any activity associated with RainyDay or Turian during this campaign, this finding enables us to make assessments regarding attribution. 

Attribution

Naikon

Naikon is a well-known Chinese-speaking cyber espionage group that has been active since at least 2010. This threat group has primarily targeted government, military, and civil organizations across Southeast Asia. 

Naikon employs a variety of backdoors, including Aira-body, Nebulae and RainyDay, along with numerous customized hacking tools to maintain persistence and exfiltrate data from victims’ network environments. Notably, Symantec reported the group has been using the RainyDay backdoor to target telecom operators in several Asian countries as part of a prolonged espionage campaign, which they traced back to 2020.

BackdoorDiplomacy

BackdoorDiplomacy is a threat group that has been active since at least 2017. The group has primarily targeted Ministries of Foreign Affairs and telecommunication companies across Africa, Europe, the Middle East and Asia.

Their primary tool of choice is Turian, believed to be an upgraded version of Quarian. ESET has noted similarities in the network encryption methods of Turian and a backdoor known as Backdoor.Whitebird.1. Bitdefender has suggested that Quarian, Turian and Whitebird may be different versions of the same backdoor. Bitdefender has also published a blog on attacks against telecommunication companies in the Middle East, which began in February 2022.

Talos compares Naikon and BackdoorDiplomacy using the diamond model in Figure 1.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 1. Comparison between the Naikon and the BackdoorDiplomacy by using the diamond model.

Relations in recent campaigns

While investigating the DLL search order hijacking abuse used in this campaign, Talos discovered that RainyDay, Turian and the PlugX variant all abused the same legitimate software to execute their malicious loaders. Although these malware families are seemingly operated by different threat groups ( Naikon and BackdoorDiplomacy), our analysis uncovered evidence suggesting a potential connection between them.

First, there are consistent targeting patterns observed in campaigns Naikon and BackdoorDiplomacy conducted, with similar countries and industries affected by these campaigns, which could indicate a possible connection . Both primarily focus on telecommunications companies, with their most recent campaigns continuing this trend. In a recent campaign we observed, Naikon targeted a telecommunications company in Kazakhstan, which borders Uzbekistan — another country previously victimized by BackdoorDiplomacy . Prior reporting suggests that targeting of countries in this region aligns with historical BackdoorDiplomacy activity. Additionally, both Naikon and BackdoorDiplomacy have been observed targeting South Asian countries.

Furthermore, the malware loaders and shellcode structures used by both groups show significant similarities, and Talos has observed the use of the same RC4 keys, as well as the XOR-RC4-RtlDecompressBuffer algorithm, for decrypting malware payloads across RainyDay (Naikon), PlugX (Naikon) and Turian (BackdoorDiplomacy). These overlaps will be explored further in the next section. Talos created a timeline of intrusion activity associated with these three malware families (Figure 2) by analyzing data from:

  • Campaigns we observed
  • Third-party reporting
  • Malware compilation timestamps
  • Timestamps present in keystroke logs generated during infections
How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 2. Timeline of RainyDay, new variant PlugX and Turian backdoor.

While we cannot conclude that there is a clear connection between Naikon and BackdoorDiplomacy, there are significant overlapping aspects — such as the choice of targets, encryption/decryption payload methods, encryption key reuse and use of tools supported by the same vendor. These similarities suggest a medium confidence link to a Chinese-speaking actor in this campaign.

Malware attack flow

RainyDay, Turian and the new variant of PlugX identified in this campaign are all executed via DLL search order hijacking.

Although there are differences among the three pieces of malware, the behavior of the loaders themselves is similar. The loaders for RainyDay, PlugX and Turian, which are loaded by abusing legitimate executables, read encrypted shellcode files located in the same directory as the executables and decrypt the data to execute their respective malware. The decrypted RainyDay and PlugX payloads are unpacked into memory and inject code into the calling process to execute the malware. Turian injects into a new legitimate process (either wabmig.exe or explorer.exe) to execute the malware. After execution, it loads the Config data, which defines the command and control (C2) destination and an INI file containing an “AntiVir” section.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 3. RainyDay malware flow.
How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 4. New PlugX variant malware flow.
How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 5. Turian malware flow.

RainyDay, new PlugX variant and Turian loaders

These three loaders are designed to read, decrypt and execute the encrypted shellcode for their respective malware from the Initial directory.
Let’s examine the decryption routines for the RainyDay, PlugX and Turian loaders. The three loaders share a significant amount of common code. First, they use the GetModuleFileNameA API to obtain the full path of the executable. Then, they read data from the Initial directory using hardcoded filenames within the malware.
The initial RainyDay loader Talos observed in 2016 did not encrypt the data. However, in subsequent malware samples, each loader includes a decryption routine. As illustrated in Figures 6 – 8, the RainyDay loader decrypts data from “rdmin.src”, the PlugX loader from “Mcsitesdvisor.afx” and the Turian loader from “winslivation.dat”, each using XOR encryption. The decrypted shellcode is then unpacked in memory and executed using CALL or JMP instructions.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 6. RainyDay loader.
How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 7. PlugX loader.
How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 8. Turian loader.

The format of the shellcode each of the three malware loaders decrypts is the same. It contains data that has been encrypted and compressed using RC4 and LZNT1, respectively. This data is then decompressed and decrypted, ultimately providing code to be executed in memory.

After the transition via a CALL or JMP instruction, code like that shown in the figure below is repeatedly executed. Control Flow Flattening (CFF) may be implemented in some cases.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 9. A portion of the code used by RainyDay and Turian to implement CFF.

As shown in the image, it uses the ROL25-based additive API hash function to resolve Windows APIs. Then, the code is decrypted using RC4, as indicated in the illustration below.

After decryption, the code is compressed using LZNT1 and call the RtlDecompressBuffer API to decompress and deploy RainyDay, PlugX or Turian.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 10. ROL25-based additive API hash function.
How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 11. RC4 decryption and LZNT1 decompression code.

The DLL file decompressed by LZNT1, as indicated in Figure 12 below, has its file header bytes removed. In this example, the e_lfanew value (which indicates the location of the PE header) is set to an abnormally large value of 0x01240120, clearly showing that an invalid value has been inserted.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 12. Part of the DLL file decompressed by LZNT1.

RC4 key used for malware decryption

Figure 13 below shows the RC4 keys used by each of the three different malware families and their corresponding samples. RainyDay uses “8f-2;g=3/c?1wf+c92rv.a” as its RC4 key. This same key is also used in PlugX and Turian. In early versions of RainyDay, this string was used for encrypting communications, not the malware itself. Another RC4 key specified in RainyDay, “jfntv`1-m0vt801tyvqaf_)U89chasv”, is also used in PlugX. We can conclude that the same RC4 keys are shared across RainyDay, PlugX and Turian. We can also infer that the attackers are operating multiple malware families simultaneously, and that the use of shared RC4 keys across multiple malware families suggests these activities are carried out by the same or connected attacker groups.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 13. RC4 key by malware family.

PDB paths included in the loader

There are a few PDB paths found in the loader samples which explain the role of the DLL loader files.

Turian loader:

C:vc_codeNo.33-2hao3-2hao-211221dlltoshellcode_and_shellcodeloader_211221Resourcespc2msupp.pdb

C:vc_codecode_test26.icmpsh-master(tigong wangzhiban)shellcodeloader_vs2008Releaseshellcodeloader_vs2008.pdb

Possible PlugX loader:

C:UsersadminDesktopDesktop_baksuccess_baiMicrosoftEdgeUpdate.exeshellcode_xordll-MicrosoftEdgeUpdateRelease2-dll-MicrosoftEdgeUpdate.pdb

A deeper analysis of the PDB strings reveals a few key points. First, all the loaders contain shellcode structures that are consistent across both backdoors, which is extracted and injected into memory. Second, the Turian loader PDB path (also mentioned by Bitdefender), “No.33-2hao3-2hao-211221,” seems to reference project names, versions, and a timestamp, with “211221” possibly representing the date Dec. 21, 2021.

Additionally, another Turian loader PDB path includes “icmpsh-master,” likely referring to ICMP Shell (icmpsh), a well-known tool or malware technique used for covert C2 communication. In the PDB string, the phrase “(tigong wangzhiban) ” in parentheses translates from Chinese to “provide web version” (提供网页版), suggesting that this version of icmpsh might have been modified for web-based use, possibly to interact with a remote server or web-based C2 infrastructure.

Finally, the RainyDay loader PDB path points to a project involving a DLL associated with “MicrosoftEdgeUpdate”. This DLL could be malicious and designed to be injected into the legitimate MicrosoftEdgeUpdate.exe process.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 14. Loader for each malware family that includes a PDB.

RainyDay and new PlugX variant from same infection chain

This section examines the history and technical details of the RainyDay backdoor. This malware was first discovered in 2021 by Bitdefender, and may be tracked by Kaspersky as FoundCore, based on the behavior they describe in their analysis. By combining insights from both research reports, we can outline the key characteristics and behavior of the RainyDay backdoor:

  • It uses legitimate DLL sideloading to run the malware.
  • The payload includes shellcode, which is responsible for extracting the final payload.
  • The payload is encrypted using XOR-RC4-RtlDecompressBuffer and its configuration is encrypted using a simple single-byte XOR key.
  • Most importantly, the configuration holds critical details like the C2 server address, folder name, service description, mutex, registry key path and other information.

From the information above, Talos was able to find several RainyDay backdoor loaders and payloads in various malware repositories. While all of the samples matched RainyDay backdoor signatures, we found that the final backdoors actually belonged to two different malware families: the previously reported RainyDay backdoor and a new variant of the notorious Chinese remote access trojan (RAT), PlugX. Figures 15 – 17 display the different malware families which both contain the same code responsible for configuration decryption.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 15. Bitdefender’s identified RainyDay configuration decryption code.
How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 16. Oldest RainyDay configuration decryption code.
How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 17. PlugX variant configuration decryption code.

Older version of RainyDay backdoor

Following a detailed analysis, Talos identified an older variant of the RainyDay backdoor. The code structure aligns closely with newer variants described in other cybersecurity vendors’ publications. This older variant employs the same code logic to determine the target machine’s Windows version and CPU architecture. Notably, the debug logs exhibit significant similarities between the variants. As illustrated in Figure 18, it is evident that the threat actor has not only enhanced the functionality of the RainyDay backdoor but has also refined the debug log output. This enhancement likely facilitates more efficient debugging of individual functions by the malware’s developers. However, this older variant closely mirrors what has been detailed in Bitdefender’s previous reports , with the primary differences being the absence of C2 HTTP communication capabilities and file manipulation functions.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 18. Left: Bitdefender-described RainyDay. Right: Talos-discovered older variant of RainyDay.

Talos uncovered two additional compelling pieces of evidence to support the conclusion that this is an earlier version of the RainyDay backdoor. First, the loader for this variant was compiled on Feb. 27, 2018 at 12:32:40 UTC, making it the oldest sample identified to date. Second, the configuration file contains a timestamp dating back to Dec. 28, 2016. Based on this information, we assess with high confidence that the RainyDay backdoor has likely been in operation since at least 2016.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 19. Old version of RainyDay configuration.

Talos also discovered a PDB string path embedded in the malware, which discloses the backdoor’s original file name.


C:UsersQsDesktopWorkspace1qazbincore.pdb

The file names are the same; therefore, this finding further strengthens the link between this older variant of the RainyDay backdoor and the 2021 FoundCore version.

PlugX variant backdoor

The other final payload Talos identified is a customized variant of the PlugX backdoor, which we believe has become the primary backdoor used by the threat actor in recent campaigns. While this variant of PlugX is not particularly new and its plug-in functionalities have been documented in previous reports, it stands out for a key reason: its configuration differs significantly from the previously-identified PlugX configuration. Instead, it adopts the same configuration structure as the RainyDay backdoor. This anomaly strongly suggests that the threat actors likely have access to the original source code of PlugX, enabling them to modify it in this manner. However, it is still necessary to be aware that the threat actor might further patch the PlugX backdoor configuration part to fit their preferred configuration structure.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 20. PlugX configuration.

Talos has high confidence that the PlugX variant observed in this campaign is a customized version of BackDoor.PlugX.38. Like the original variant, it utilizes the “SetUnhandledExceptionFilter exception handler to identify the thread ID responsible for triggering the exception within the “threads_container” and subsequently generates the associated strings. However, this variant introduces a modification to employ an additional XOR operation to encrypt those strings. When the malware executes the relevant function, it decrypts the strings dynamically during runtime.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 21. Exception filter setting.

After completing its preparation procedures, the trojan escalates its privileges by acquiring SeDebugPrivilege and SeTcbPrivilege. It then initializes its main routine and determines the folder path, specified in its configuration, where it will drop the infection chain files. The malware creates a DoImpUserProc thread to manage plug-in operations or execute a function named OnlineMainDump. To evade detection, the threat actor conceals the SeDebugPrivilege and SeTcbPrivilege strings by encrypting them using a modified Tiny Encryption Algorithm (TEA).

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 22. Escalation privileges.

If the PlugX backdoor executes the OnlineMainDump function, it first attempts to elevate its privileges to grant high-level access for its own process. It then retrieves three specific plug-ins: KeylogDump, Nethood and PortMap. Following this, it employs the same techniques as BackDoor.PlugX.38 to hide its malicious service within the services.exe process. Once this is completed, the OnlineNotifyDump thread is initiated, and the configuration is re-initialized. The malware then utilizes the OlProcManager thread to manage the execution of the three plug-ins within the framework of the current process.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 23. PlugX main function.

Once all initialization procedures are complete, the malware begins a recurring cycle of connections to its C2 server. While the connection methodology remains identical to that of BackDoor.PlugX.38, this variant specifically utilizes the HTTPS protocol for communication. Additionally, we identified the library version name “VTCP 10.12.08” embedded within this PlugX backdoor. The VTCP library has already been confirmed in previous analyses as a component commonly associated with PlugX, further supporting the attribution of this variant to the same malware family.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 24. PlugX protocol.

Furthermore, Talos observed that the threat actor embedded a keylogger plug-in in all analyzed PlugX backdoor payloads. The keylogger’s functionality and data-writing format remain consistent with those described in previous reports. However, there are notable differences: The file name has been altered and the drop file path adjusted to match the current location of the PlugX backdoor. These modifications suggest that the threat actor aimed to better integrate the keylogger with this specific variant.

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking
Figure 25. Keylogger log file path.

Additionally, by pivoting on several keylogger log files discovered on VirusTotal, Talos observed timestamps indicating that these files were actively generated throughout 2022. Notably, one of the log files demonstrated successful persistence within the victim’s environment, recording activity from late 2022 through December 2024 — spanning nearly two years of ongoing compromise.

Coverage

How RainyDay, Turian and a new PlugX variant abuse DLL search order hijacking

Cisco Secure Endpoint (formerly AMP for Endpoints) is ideally suited to prevent the execution of the malware detailed in this post. Try Secure Endpoint for free here.

Cisco Secure Email (formerly Cisco Email Security) can block malicious emails sent by threat actors as part of their campaign. You can try Secure Email for free here.

Cisco Secure Firewall (formerly Next-Generation Firewall and Firepower NGFW) appliances such as Threat Defense Virtual, Adaptive Security Appliance and Meraki MX can detect malicious activity associated with this threat.

Cisco Secure Network/Cloud Analytics (Stealthwatch/Stealthwatch Cloud) analyzes network traffic automatically and alerts users of potentially unwanted activity on every connected device.

Cisco Secure Malware Analytics (Threat Grid) identifies malicious binaries and builds protection into all Cisco Secure products.

Cisco Secure Access is a modern cloud-delivered Security Service Edge (SSE) built on Zero Trust principles.  Secure Access provides seamless transparent and secure access to the internet, cloud services or private application no matter where your users work.  Please contact your Cisco account representative or authorized partner if you are interested in a free trial of Cisco Secure Access.

Umbrella, Cisco’s secure internet gateway (SIG), blocks users from connecting to malicious domains, IPs and URLs, whether users are on or off the corporate network.

Cisco Secure Web Appliance (formerly Web Security Appliance) automatically blocks potentially dangerous sites and tests suspicious sites before users access them.

Additional protections with context to your specific environment and threat data are available from the Firewall Management Center.

Cisco Duo provides multi-factor authentication for users to ensure only those authorized are accessing your network.

Open-source Snort Subscriber Rule Set customers can stay up to date by downloading the latest rule pack available for purchase on Snort.org.

ClamAV detections are also available for this threat:

Win.Loader.RainyDay-10045411-0

Indicators of compromise (IOCs)

The IOCs can also be found in our GitHub repository here.

Cisco Talos Blog – ​Read More

VMScape attack | Kaspersky official blog

A team of researchers at the Swiss Federal Institute of Technology in Zurich (ETH Zurich) has published a research paper demonstrating how a Spectre v2 attack can be used for a sandbox escape in a virtualized environment. With access to only a single isolated virtual machine, the researchers were able to steal valuable data normally accessible only to the server administrator. Servers based on AMD CPUs (including AMD’s newest – with Zen 5 architecture) or Intel’s Coffee Lake are susceptible to the attack.

The danger of Spectre attacks for virtual environments

We regularly write about CPU vulnerabilities that employ speculative execution, where standard hardware features are exploited to steal secrets. You can read our previous posts on this subject, which describe the general principles of these attacks in detail, here, here, and here.

Although this type of vulnerability was first discovered back in 2018, up until this paper researchers haven’t demonstrated a single realistic attack. All their efforts have culminated in the notion that, theoretically, a sophisticated and targeted Spectre-like attack is feasible. Furthermore, in most of these papers, the researchers restricted themselves to the most basic attack scenario: they’d take a computer, install malware on it, and then use the CPU hardware vulnerability to steal secrets. The drawback of this approach is that if an attacker successfully installs malware on a PC, they can steal data in numerous other, significantly simpler methods. Because of this, Spectre and similar attacks are unlikely to ever pose a threat to end-user devices. However, when it comes to cloud environments, one shouldn’t dismiss Spectre.

Imagine a provider that rents virtual servers to organizations or individuals. Each client is assigned their own virtual machine, which allows them to run any software they want. Other clients’ virtual systems can be running on the same server. Separating data-access privileges is crucial in this situation. You must prevent an attacker who has gained access to one virtual machine from reading the confidential data of an adjacent client, or compromising the provider’s infrastructure by gaining access to the host’s data. It is precisely in this scenario that Spectre attacks start appearing as a significantly more perilous threat.

VMScape: a practical look at a Spectre v2 attack

In previous research papers on the feasibility of the Spectre attack, researchers didn’t delve into a realistic attack scenario. For an academic paper, this is normal. A theoretical proof of concept for a data leak is typically enough to get CPU makers and software developers to beef up their defenses and develop countermeasures.

The authors of the new paper from ETH Zurich directly address this gap, pointing out that previously examined scenarios for attacks on virtualized environments – such as those in this paper, also by ETH Zurich – made an extremely broad assumption: that the attackers had already managed to install malware on the host. Just like with attacks on regular desktop computers, this doesn’t make much practical sense. If the server is already compromised, the damage is already done.

The new attack proposed in their paper – dubbed VMScape – uses the same branch target injection mechanism as the one found in all attacks since Spectre v2. We’ve talked about it several times before, but here’s a quick summary.

Branch target injection is a way to train a CPU’s branch prediction system, which speeds up programs by using speculative execution. This means the CPU tries to run the next set of commands before it even knows the results of the previous computations. If it guesses the right direction (branch) the software will take, the performance significantly increases. If it guesses wrong, the results are simply discarded.

Branch target injection is an attack during which an attacker can trick the CPU into accessing secret data and move it into the cache during speculative execution. The attacker then retrieves this data indirectly through a side channel.

The researchers discovered that the privilege separation between the host and guest operating systems during speculative execution is imperfect. This allows for a new version of the branch target injection attack, which they’ve named “Virtualization-based Spectre-BTI” or vBTI.

As a result, the researchers were able to read arbitrary data from the host’s memory while only having access to a virtual machine with default settings. The data reading speed was 32 bytes per second on an AMD Zen 4 CPU, with nearly 100% reliability. That’s fast enough to steal things like data encryption keys, which opens a direct path to stealing information from adjacent virtual machines.

Is VMScape a threat in the real world?

AMD CPUs with Zen architecture from the first through the latest fifth generation have proved vulnerable to this attack. This is because of the subtle differences in how these CPUs implement Spectre attack protections, as well as the unique way the authors’ vBTI primitives operate. For Intel CPUs, this attack is only possible on servers with older Coffee Lake CPUs from 2017. Newer Intel architectures have improved protections that make the current version of the VMScape attack impossible.

The researchers’ achievement was designing the first-ever Spectre v2 attack in a virtual environment that’s close to real-world conditions. It doesn’t rely on overly permissive assumptions or crutches like malicious hypervisor-level software. The VMScape attack is effective; it bypasses many standard security measures, including KASLR, and successfully steals a valuable secret: an encryption key.

Fortunately, immediately after designing the attack, the researchers also proposed a fix. The issue was assigned the vulnerability identifier CVE-2025-40300, and it was patched in the Linux kernel. This particular patch doesn’t significantly reduce computational performance, which is often a concern with software-based protections against Spectre attacks.

Methods for protecting confidential data in virtual environments have existed for a while. AMD has a technology named “Secure Encrypted Virtualization” and its subtype, SEV-SNP, while Intel has Trusted Domain Extensions (TDX). These technologies encrypt secrets, making it pointless to try to steal them directly. The researchers confirmed that SEV provides additional protection against the VMScape attack on AMD CPUs. In other words, a real-world VMScape attack against modern servers is unlikely. However, with each new study, Spectre attacks look more and more realistic.

Despite the academic nature of the research, attacks that exploit speculative execution in modern CPUs remain relevant. Operators of virtualized environments should continue to consider these vulnerabilities and potential attacks in their threat models.

Kaspersky official blog – ​Read More

Gamaredon X Turla collab

Notorious APT group Turla collaborates with Gamaredon, both FSB-associated groups, to compromise high‑profile targets in Ukraine

WeLiveSecurity – ​Read More

Put together an IR playbook — for your personal mental health and wellbeing

Put together an IR playbook — for your personal mental health and wellbeing

Welcome to this week’s edition of the Threat Source newsletter. 

This is gonna be a tough read. I’m sorry. Believe it or not, it’s even tougher for me to write. I want to talk about what it costs to be in the cybersecurity profession. Not money or time, but potentially your health, both mentally and physically. I want to move the curtain aside and show you an inside look at what happens to people when the pressure is high and the desire to succeed is not only essential, but sometimes even life and death

So, story time. 

Seven years ago, Cisco Talos disclosed a novel and new threat campaign: VPN Filter. VPN Filter was a small office/home office (SOHO) device botnet that had many new things we’d never seen before in SOHO devices: infection persistence past device reboot, modularity, victimology, and perhaps most importantly, the (later) attribution to the Russian threat actor APT28 (aka Sandworm). The platform also featured a kill switch, a module designed to cover the tracks and or destroy a device infected with VPN Filter. This could be executed en masse, if they desired. This was a methodical, clever and well-structured campaign to attack unpatched and/or vulnerable devices all over the world for state cyber operations. As I look back at that time, it was (and still is) a marvel of tradecraft and offensive cyber operations. 

Put yourself in our position at Talos. We’ve just discovered a massive campaign by a notorious threat actor. We all know what this is, who this is, and what the consequences could be — and the threat actor had a massive head start on us. We absolutely couldn’t screw this up. If we tipped our hand via our research, the threat actor might get spooked and just burn the whole thing down with the kill switch. The stakes were very high. 

We spent months reversing and analyzing the malware, the victimology, infrastructure, and understanding the scale and scope of what VPN Filter did and potentially could do. The more we peeled things back, the more ominous the implications and the harder we worked. 

As the weeks turned into months, the hours we worked grew longer and longer, and the stress began to take its toll on all of us. The raw enormity of the tasks of analyzing and responding to VPN Filter and the stress of being stealthy begin to extract a price from us personally. Attitudes grew sour, relationships frayed, and some were rent asunder completely. For me, personally, it was a very dark time and would cost me dearly – I would exit people management into an individual contributor role that I still inhabit to this day. 

In the end, the threat actor forced us to into action. We had always theorized a “break glass” moment when the threat actor might hit the gas pedal and we would have to alert the world. One day we saw a massive spike in infections in Ukraine, and we disclosed to the world VPN Filter. We still had so many unanswered questions but had no choice when we saw the spike. In a way, it was a mercy. We had long since hit our limit and were just all collectively cooked and demoralized. I know I was, and it deeply affected my relationships and career, the reverberations of which I still feel to this day.  

I’m often asked by new or potential security practitioners, “Joe, what’s a cool hacker story?!” I have plenty of those, and VPN Filter is certainly one of them. But rarely does anyone want to hear the worst days of our lives. The tales of burnout and stress. Of the long hours and constant work. There is always a breach happening somewhere, your company is always under attack, there is always a story of a someone getting hacked and sometimes people are even hurt or killed. This cadence takes a toll – from events like VPN Filter, to being in a SOC – it’s all the same. No matter where you work, we are here to keep our customers, constituents, and communities safe from some real assholes out there. It is about fighting the good fight, and the fight never stops.  

So, what can we do about it? How can you avoid being me in the middle of VPN Filter? 

  1. Learn and enforce boundaries. You must make space and time for you and firmly enforce that space and time. If that means disabling after hours comms, then do so, and do so guilt free. You must look after yourself. 
  2. Peer support. Whether it’s a therapist, a colleague, or a Slack/Discord/Bsides where you can share and vent with others in the same boat as you, you must reduce the sense of isolation this career space can give you. Others are looking for the same thing and happy to listen and share. Celebrate your wins with people who are eager to reciprocate.  
  3. Unplugged self-care. This is tough, and I’m not great at it. Exercise, paint, work in your garden and do something unrelated to your job. Put down the hell rectangle that is your phone and unplug from the news and social media. 
  4. Mandatory decompression/vacation. After an incident, be it VPN Filter or a breach, leaders: look after your people. Recognize burnout and push your directs into some enforced downtime so they can recover. At a minimum, rotate them into a less stressful role so they can take a break. It’s your responsibility to care for those who work hard for you. 

Responding after the event is just as important as responding to the event itself. Every breach, VPN Filter-like event, or emergency is an opportunity to reflect on the cost to your health and evaluate what you can do to help yourself and others. This is a tough gig sometimes, but it’s a calling we love. Just take care of yourself and each other, ya hear?

The one big thing 

In Talos’ latest blog post, we break down why having a Cisco Talos Incident Response (IR) Retainer is a game-changer for any organization facing today’s nonstop cyber threats. With a Talos IR Retainer, you get direct access to our expert team, 24/7 emergency support, and tailored plans that keep everyone — from IT to leadership — on the same page. You’ll also benefit from continuous threat intelligence and real-world guidance to help your organization bounce back stronger after any incident. 

Why do I care? 

Our team helps you hunt threats before they escalate, assess your readiness and improve your security posture over time. If a cyber incident hits, having a trusted partner already in place means you’re prepared to act decisively, with clear roles, tested procedures and experts ready to back you up every step of the way. 

So now what? 

Think about securing a Talos IR Retainer to make sure you’ve got experts on speed dial and your defenses are always up to date. Reach out to us to schedule a tabletop exercise or to talk through how prepared your organization really is.

Top security headlines of the week 

New VoidProxy phishing service bypasses MFA on Microsoft and Google accounts 
An attack typically begins with a deceptive email sent from a compromised account of legitimate email service providers, like Constant Contact, Active Campaign or NotifyVisitors. (Hack Read

Shai-Hulud supply chain attack: Worm used to steal secrets, 180+ npm packages hit 
The self-spreading potential of the malicious code will likely keep the campaign alive for a few more days. To avoid being infected, users should be wary of any packages that have new versions on npm but not on GitHub, and pin dependencies. (SecurityWeek

Google nukes 224 Android malware apps behind massive ad fraud campaign 
The apps were downloaded over 38 million times and employed obfuscation and steganography to conceal the malicious behavior from Google and security tools. (Bleeping Computer

Former FinWise employee may have accessed nearly 700K customer records 
Nearly 700,000 FinWise Bank customers are being notified after a former employee may have accessed or taken personal data post-employment. The incident went undetected for over a year. (The Register)

Can’t get enough Talos? 

  • Alex Ryan: From zero chill to quiet confidence 
    Discover how a Cisco Talos Incident Response expert transitioned from philosophy to the high-stakes, emotionally intense world of incident command, and the advice that she has for aspiring cybersecurity professionals. 
  • Beers with Talos: How to ruin an APT’s day 
    The B-Team is joined by Sara McBroom from Talos’ nation-state threat intelligence and interdiction team. Sara shares her journey from a liberal arts major to tracking some of the world’s most advanced adversaries. 
  • Tampered Chef: When malvertising serves up infostealers 
    Imagine downloading a PDF Editor tool from the internet that works great… until nearly two months later, when it quietly steals your credentials. Nick Biasini explains how cybercriminals are investing in “malvertising” and challenges in defense.

Upcoming events where you can find Talos 

Most prevalent malware files from Talos telemetry over the past week 

SHA256: 9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507  
MD5: 2915b3f8b703eb744fc54c81f4a9c67f 
Talos Rep: https://talosintelligence.com/talos_file_reputation?s=9f1f11a708d393e0a4109ae189bc64f1f3e312653dcf317a2bd406f18ffcc507  
Typical Filename: executable.exe 
Claimed Product: N/A   
Example Filename:0a0dc0e95070a2b05b04c2f0a049dad8_1_Exe.exe  
Detection Name: Win.Worm.Coinminer::1201 

SHA256: 41f14d86bcaf8e949160ee2731802523e0c76fea87adf00ee7fe9567c3cec610  
MD5: 85bbddc502f7b10871621fd460243fbc  
Talos Rep: https://talosintelligence.com/talos_file_reputation?s=41f14d86bcaf8e949160ee2731802523e0c76fea87adf00ee7fe9567c3cec610  
Typical Filename: nwx3hgsl.exe 
Claimed Product: Self-extracting archive 
Detection Name: W32.41F14D86BC-100.SBX.TG 

SHA256: c0ad494457dcd9e964378760fb6aca86a23622045bca851d8f3ab49ec33978fe  
MD5: bf9672ec85283fdf002d83662f0b08b7  
Talos Rep: https://talosintelligence.com/talos_file_reputation?s=c0ad494457dcd9e964378760fb6aca86a23622045bca851d8f3ab49ec33978fe  
Typical Filename: werrx01USAHTML 
Claimed Product: N/A 
Detection Name: W32.C0AD494457-95.SBX.TG 

SHA256: 96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974  
MD5: aac3165ece2959f39ff98334618d10d9  
Talos Rep: https://talosintelligence.com/talos_file_reputation?s=96fa6a7714670823c83099ea01d24d6d3ae8fef027f01a4ddac14f123b1c9974  
Typical Filename: ~3B6A.tmp 
Claimed Product: N/A 
Detection Name: W32.Injector:Gen.21ie.1201 

SHA256: a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91 
MD5: 7bdbd180c081fa63ca94f9c22c457376  
Talos Rep: https://talosintelligence.com/talos_file_reputation?s=a31f222fc283227f5e7988d1ad9c0aecd66d58bb7b4d8518ae23e110308dbf91  
Typical Filename: img001.exe 
Claimed Product: 
Detection Name: Win.Dropper.Miner::95.sbx.tg

Cisco Talos Blog – ​Read More

Viruses on official Steam, Minecraft, and Endgame Gear sites | Kaspersky official blog

Experienced gamers are well aware of the risks of downloading games, mods, skins, and other gaming software from unofficial sources. However, infections can also originate from platforms users typically trust — developer websites and official stores.

In this post, we review several cases where attackers distributed malware through official gaming resources. We also explain how to protect your system, loot, and account — so you can keep playing on your favorite platforms without any nasty surprises.

Infected Endgame Gear mouse-configuration tool

In July 2025, Endgame Gear, a manufacturer of advanced mice aimed at esports players and seasoned gamers, reported a malware infection in its OP1w 4k v2 mouse-config utility. The Trojan remained on the company’s official site for almost two weeks, from June 26 to July 9, 2025.

Endgame Gear OP1w 4k v2 — the gaming mouse whose configuration utility was infected

The official page for the Endgame Gear OP1w 4k v2 mouse hosted a malware-infected setup tool. Source

As a result, users who downloaded the utility from the product page during that period also received malware with it. Endgame Gear did not specify what the malicious payload was, but user-scan data suggests it was an XRed backdoor.

XRed offers a wide range of capabilities for remote control of infected systems. These include a keylogger and enables attackers to access the command line, browse disks and folders, download and delete files, and take screenshots. XRed can also download additional modules and exfiltrate system data to remote servers.

It was gamers themselves who first noticed something was wrong with the OP1w 4k v2 configuration tool. They began discussing suspicious signs on Reddit nearly two weeks before Endgame Gear released an official statement. The key details that raised user suspicions were the size of the program — the infected version was 2.8MB instead of the usual 2.3MB — and the file signature, listed as “Synaptics Pointing Device Driver” instead of “Endgame Gear OP1w 4k v2 Configuration Tool”.

In its official statement on the incident, Endgame Gear clarified that users who downloaded the tool from the general downloads page (endgamegear.com/downloads), GitHub, or the company’s Discord channel are safe. The threat only affected gamers who downloaded software directly from the OP1w 4k v2 product page between June 26 and July 9, 2025. After that, the malware was removed from the company’s site.

The mouse manufacturer recommends the following steps for any potentially affected users:

  • Delete all contents of the folder C:ProgramDataSynaptics.
  • Run a full system scan with a reliable antivirus.
  • Download a clean version of the utility.

In addition, users should change passwords for all important accounts, including financial services, email, and work-related logins.

Malware in three early-access Steam games

In 2025, several cases were reported of malware being distributed through early-access games on Steam.

  • In February, this involved PirateFi, a survival sim (we covered this case on the Kaspersky Daily blog).
  • In March, a similar incident occurred with the tactical shooter Sniper: Phantom’s Resolution.
  • In July, attackers uploaded an infected version of Chemia, another survival game.

All three cases involved early-access titles — likely because Steam applies looser verification procedures for pre-release games. Let’s take a closer look at these three cases.

A few days after the beta release of PirateFi — the first game developed by a studio called Seaworth Interactive — one user reported on a Steam forum that his antivirus had prevented the game from launching. The security software detected the presence of Trojan.Win32.Lazzzy.gen malware, which the game attempted to install in the AppData/Temp directory after launch.

PirateFi: a malicious game on Steam

PirateFi promised players a pirate-themed survival sim, but in reality it stole browser cookies to hijack accounts. Source

The Trojan’s primary goal was to steal browser cookies. These cookies allowed the attackers to access victims’ accounts for financial services, social networks, and other online platforms. Several players who downloaded and ran the game reported that the criminals changed the passwords on their accounts and stole funds. PirateFi was pulled from Steam just four days after release. All users who had downloaded the game — fortunately, only around 800 people — received an official notification from the platform warning them of the malware on their devices.

Steam warning players about PirateFi

Steam users who downloaded the infected PirateFi game were warned of malware on their devices. Source

Just a month later, a similar situation occurred with another game — Sniper: Phantom’s Resolution by Sierra Six Studios. Once again, players were the first to suspect something was wrong: they noticed that the game’s description and screenshots were clearly copied from other projects. Another red flag was the developer’s offering a demo installer hosted on an external GitHub repository rather than through Steam.

Further examination of the installer’s code by Reddit users revealed suspicious software hidden inside. Like the creators of PirateFi, those behind Sniper: Phantom’s Resolution seemed to be after victims’ online accounts. Following user reports, both GitHub and Steam quickly removed the malicious game from their platforms.

Sniper: Phantom's Resolution on Steam

The game Sniper: Phantom’s Resolution was published on Steam with an installer containing malware, and was removed after user complaints. Source

The third case, involving a game called Chemia by Aether Forge Studios, was a little different: this time, it was a beta version of a legitimate game that was infected. Cybersecurity researchers believe the attack was carried out by the hacker group EncryptHub, also known as Larva-208.

It remains unclear how the attackers managed to inject malware into the game. However, players who launched the Chemia playtest unknowingly downloaded two infostealers to their devices. Both ran silently in the background without affecting gameplay, leaving gamers unaware their systems were compromised.

Chemia on Steam

The Chemia playtest on Steam was distributed with infostealing malware that ran in the background, extracting data from browsers. Source

The attackers were targeting data stored in browsers, including saved passwords, autofill info, cookies, and cryptowallet details. At the time of writing, the game is no longer available on Steam. However, neither the platform nor the game’s developer has issued an official statement.

Malicious skins on the official Minecraft website

Sometimes dangers lurk not just on Steam, but also on developers’ official sites — including the biggest names. In 2018, about fifty thousand Minecraft players fell victim to attackers who uploaded malicious skins to the official Minecraft website. That platform has a fan-interaction system where any player can share skins they create with others — and that’s what the attackers exploited.

Malicious Minecraft skins

The Minecraft skins that could reformat hard drives and delete system programs. Source

The malware was spread via PNG skin files, and was capable of deleting programs, formatting hard drives, and destroying backup data. One peculiar detail was that some victims received bizarre messages with titles such as:

  • “You Are Nailed, Buy A New Computer This Is A Piece Of Sh*t”,
  • “You have maxed your internet usage for a lifetime”,
  • “Your a** got glued.”

The malicious code’s specifics make experts believe that professional cybercriminals were likely not behind the attack. Still, the Minecraft case clearly demonstrated the vulnerability of content-sharing mechanisms on gaming platforms.

How to avoid becoming a victim

Installing games, mods, skins, and other gaming software from official sources is, of course, safer than pirating them from shady ones. However, as we’ve shown in this post, even legitimate sites require vigilance.

  • Read reviews carefully before downloading any game or gaming software. Do a quick background check — a simple search might lead you to a Reddit thread discussing suspicious issues.
  • Be cautious with early-access games on Steam. Three malicious games in a single year already signals a trend.
  • Install reliable protection on your device.

Many gamers may be skeptical about this last tip, as it’s a common belief in the gaming community that antivirus software slows down games. That may have been true years ago, but tests these days show that the latest security solutions cause no measurable drops in performance.

Moreover, Kaspersky Premium even includes a dedicated gaming mode. It turns on automatically when a game launches, postponing database updates, notifications, and routine scans until the session ends — thus minimizing system resource usage.

How else do attackers target gamers? Check out our selection of articles on this topic:

Kaspersky official blog – ​Read More

Alex Ryan: From zero chill to quiet confidence

Alex Ryan: From zero chill to quiet confidence

Welcome to another episode of Humans of Talos, our ongoing video interview series that celebrates the people powering Cisco’s threat intelligence efforts. In each episode, we dive deep into the personal journeys, motivations and lessons learned from the team members who help keep the internet safe.

This time, we sit down with Alex Ryan, a seasoned Incident Commander from Cisco Talos Incident Response. Read (or watch) on to hear her candid reflections on the emotional intensity of incident response, the critical role of a supportive team in preventing burnout, and invaluable advice for aspiring cybersecurity professionals.

Amy Ciminnisi: Alex, you were recently on the Beers with Talos podcast, and during that, we learned that you have two liberal arts degrees, but you found yourself really loving how machines and systems worked, and then you work your way through the cybersecurity ranks. I’d love to know: What brought you to Talos?

Alex Ryan: During my career inside companies doing incident response, vulnerability management, and risk management, Talos Intelligence was often one of my sources. I often looked at intelligence from vendors who were using their own datasets to generate the finished intelligence, rather than those who just took whatever intelligence was already out there, re-mashed it, and enriched it a bit. I have a lot of respect for Talos from using them as a source for guiding how I would do incident response and prioritize my defenses and things like that. When the opportunity came up to join Cisco Talos Incident Response as an Incident Commander, it was that reputation (and having used their material for so long which showed that there was really good quality people and research being done) that put this job at the top of my list of choices.

AC: You have a very difficult job as an Incident Commander, acting as the point person in situations where people are possibly going through the worst days of their careers. What’s something about your day-to-day role that people might be surprised by or interested in?

AR: Incident response is a very high pressure situation to be in. You need to exude quiet confidence and build a trust relationships quickly with your customer. But on the back end, things can be chaotic: trying to get access to machines, trying to find the right machines. “Do we have the right IOCs?” “What is this thing? Let me reverse engineer it.” Trying to distill all of that activity into larger topics and give progress to the customer on it is critical.

It’s also high risk for the business being impacted. I think that there was a statistic at one point that about 70% of small to medium businesses that paid the ransom after being compromised went out of business within a year, because the ransom was such a financial hit that they just couldn’t absorb that kind of impact. So while the customer is trying to not freak out, I’m trying to exude quiet confidence while managing the forensics analysis activity. Trying to balance all of that is quite difficult, so incident response has a very high burnout rate.

After I came back from raising my children, it took me about two years to detox completely from incident response. I was really high strung, and I had no chill. Zero chill. I had to learn how to say no and how to prioritize my family over this hero complex that I was having at work. I would say I’m a much more well-rounded person now, and perhaps I’m better at my job because of that.


Want to see more? Watch the full interview, and don’t forget to subscribe to our YouTube channel for future episodes of Humans of Talos!

Cisco Talos Blog – ​Read More

How LLMs can be compromised in 2025 | Kaspersky official blog

Developers of LLM-powered public services and business applications are working hard to ensure the security of their products, but the industry is still in its infancy. As a result, new types of attacks and cyberthreats emerge monthly. This past summer alone, we learned that Copilot or Gemini could be compromised by simply sending a victim — rather, their AI assistant — a calendar invitation or email with a malicious instruction. Meanwhile, attackers could trick Claude Desktop into sending them any user files. So what else is happening in the world of LLM security, and how can you keep up?

A meeting with a catch

At Black Hat 2025 in Vegas, experts from SafeBreach demonstrated a whole arsenal of attacks on the Gemini AI assistant. The researchers coined the term “promptware” to designate these attacks, but they all technically fall under the category of indirect prompt injections. They work like this: the attacker sends the victim regular meeting invitations in vCalendar format. Each invitation contains a hidden portion that isn’t displayed in standard fields (like title, time, or location), but is processed by the AI assistant if the user has one connected. By manipulating Gemini’s attention, the researchers were able to make the assistant do the following in response to a mundane command of “What meetings do I have today?”:

  • Delete other meetings from the calendar
  • Completely change its conversation style
  • Suggest questionable investments
  • Open arbitrary (malicious) websites, including Zoom (while hosting video meetings)

To top it off, the researchers attempted to exploit the features of Google’s smart-home system, Google Home. This proved to be a bit more of a challenge, as Gemini refused to open windows or turn on heaters in response to calendar prompt injections. Still, they found a workaround: delaying the injection. The assistant would flawlessly execute actions by following an instruction like, “open the windows in the house the next time I say ‘thank you’”. The unsuspecting owner would later thank someone within microphone range, triggering the command.

AI thief

In the EchoLeak attack on Microsoft 365 Copilot, the researchers not only used an indirect injection, but also bypassed the tools Microsoft employs to protect the AI agent’s input and output data. In a nutshell, the attack looks like this: the victim receives a long email that appears to contain instructions for a new employee, but also includes malicious commands for the LLM-powered assistant. Later, when the victim asks their assistant certain questions, it generates and replies with an external link to an image — embedding confidential information accessible to the chatbot directly into the URL. The user’s browser attempts to download the image and contacts an external server, thus making the information contained in the request available to the attacker.

Technical details (such as bypassing link filtering) aside, the key technique in this attack is RAG spraying. The attacker’s goal is to fill the malicious email (or emails) with numerous snippets that Copilot is highly likely to access when looking for answers to the user’s everyday queries. To achieve this, the email must be tailored to the specific victim’s profile. The demonstration attack used a “new employee handbook” because questions like “how to apply for sick leave?” are indeed frequently asked.

A picture worth a thousand words

An AI agent can be attacked even when performing a seemingly innocuous task like summarizing a web page. For this, malicious instructions simply need to be placed on the target website. However, this requires bypassing a filter that most major providers have in place for exactly this scenario.

The attack is easier to carry out if the targeted model is multimodal — that is, it can’t just “read”, but can also “see” or “hear”. For example, one research paper proposed an attack where malicious instructions were hidden within mind maps.

Another study on multimodal injections tested the resilience of popular chatbots to both direct and indirect injections. The authors found that it decreased when malicious instructions were encoded in an image rather than text. This attack is based on the fact that many filters and security systems are designed to analyze the textual content of prompts, and fail to trigger when the model’s input is an image. Similar attacks target models that are capable of voice recognition.

Old meets new

The intersection of AI security with classic software vulnerabilities presents a rich field for research and real-life attacks. As soon as an AI agent is entrusted with real-world tasks — such as manipulating files or sending data — not only the agent’s instructions but also the effective limitations of its “tools” need to be addressed. This summer, Anthropic patched vulnerabilities in its MCP server, which gives the agent access to the file system. In theory, the MCP server could restrict which files and folders the agent had access to. In practice, these restrictions could be bypassed in two different ways, which allowed for prompt injections to read and write to arbitrary files — and even execute malicious code.

A recently published paper, Prompt Injection 2.0:Hybrid AI Threats, provides examples of injections that trick an agent into generating unsafe code. This code is then processed by other IT systems, and exploits classic cross-site vulnerabilities like XSS and CSRF. For example, an agent might write and execute unsafe SQL queries, and it’s highly likely that traditional security measures like input sanitization and parameterization won’t be triggered by them.

LLM security seen as a long-term challenge

One could dismiss these examples as the industry’s teething issues that’ll disappear in a few years, but that’s wishful thinking. The fundamental feature — and problem — of neural networks is that they use the same channel for receiving both commands and the data they need to process. The models only understand the difference between “commands” and “data” through context. Therefore, while someone can hinder injections and layer on additional defenses, it’s impossible to solve the problem completely given the current LLM architecture.

How to protect systems against attacks on AI

The right design decisions made by the developer of the system that invokes the LLM are key. The developer should conduct detailed threat modeling, and implement a multi-layered security system in the earliest stages of development. However, company employees must also contribute to defending against threats associated with AI-powered systems.

LLM users should be instructed not to process personal data or other sensitive, restricted information in third-party AI systems, and to avoid using auxiliary tools not approved by the corporate IT department. If any incoming emails, documents, websites, or other content seem confusing, suspicious, or unusual, they shouldn’t be fed into an AI assistant. Instead, employees should consult the cybersecurity team. They should also be instructed to report any unusual behavior or unconventional actions by AI assistants.

IT teams and organizations using AI tools need to thoroughly review security considerations when procuring and implementing any AI tools. The vendor questionnaire should cover completed security audits, red-team test results, available integrations with security tools (primarily detailed logs for SIEM), and available security settings.

All of this is necessary to eventually build a role-based access control (RBAC) model around AI tools. This model would restrict AI agents’ capabilities and access based on the context of the task they are currently performing. By default, an AI assistant should have minimal access privileges.

High-risk actions, such as data export or invoking external tools, should be confirmed by a human operator.

Corporate training programs for all employees must cover the safe use of neural networks. This training should be tailored to each employee’s role. Department heads, IT staff, and information security employees need to receive in-depth training that imparts practical skills for protecting neural networks. Such a detailed LLM security course, complete with interactive labs, is available on the Kaspersky Expert Training platform. Those who complete it will gain deep insights into jailbreaks, injections, and other sophisticated attack methods — and more importantly, they’ll master a structured, hands-on approach to assessing and strengthening the security of language models.

Kaspersky official blog – ​Read More