It's been a busy 24 hours in the cyber world with significant updates on supply chain attacks, ongoing major breaches, critical vulnerability research, and important regulatory shifts. Let's dive in:
JLR Cyberattack Continues to Cause Major Disruption 🚗
- Jaguar Land Rover (JLR) has extended its global production shutdown until at least September 24th, bringing the total downtime to nearly four weeks following a cyberattack.
- The incident, claimed by "Scattered Lapsus$ Hunters," has led to significant financial losses (estimated £5-10 million daily) and temporary layoffs across JLR's extensive supply chain.
- JLR confirmed data theft, highlighting the severe business continuity and economic security implications, with calls for government support for affected workers.
🗞️ The Record | https://therecord.media/jaguar-land-rover-another-week-shutdown-cyberattack
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/09/16/jlr_global_shutdown/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/jaguar-land-rover-extends-shutdown-after-cyberattack-by-another-week/
Google LERS Portal Accessed by Threat Actors 🚨
- Google confirmed that a fraudulent account was created in its Law Enforcement Request System (LERS) portal, used by government agencies to request user data.
- The "Scattered Lapsus$ Hunters" group, also linked to the JLR attack, posted screenshots claiming access to LERS and the FBI's NICS, though Google states no requests were made or data accessed via the fraudulent LERS account.
- This incident, coupled with the group's "retirement" announcement (met with skepticism by analysts), underscores the persistent threat of sophisticated social engineering and credential compromise against high-value targets.
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/09/16/google_confirms_crims_accessed_lers/
Self-Propagating Worm Hits npm Supply Chain ⛓️
- An ongoing, worm-style supply chain attack, dubbed 'Shai-Hulud,' has compromised at least 187 npm packages, including some from CrowdStrike's npm namespace.
- The attackers are using a self-propagating mechanism: malicious bundle.js scripts are injected into packages, which then use the legitimate TruffleHog tool to scan developer machines for secrets (e.g., AWS, GitHub, npm tokens).
- Stolen credentials are used to create GitHub Actions workflows and exfiltrate data, and valid npm tokens are then abused to update other packages by the same maintainer, perpetuating the attack. Developers should audit environments, rotate tokens, and pin dependencies.
📰 The Hacker News | https://thehackernews.com/2025/09/40-npm-packages-compromised-in-supply.html
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/09/16/npm_under_attack_again/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/self-propagating-supply-chain-attack-hits-187-npm-packages/
FileFix Social Engineering Delivers StealC Infostealer 🎣
- A new variant of the FileFix social engineering attack is actively tricking victims into running the StealC information stealer malware via fake Facebook security alerts.
- Unlike previous ClickFix variants, FileFix leverages a web browser's file upload feature, prompting users to copy and paste a malicious command into File Explorer's address bar, which then executes a multi-stage PowerShell script.
- The attack uses steganography, embedding a second-stage payload within seemingly innocuous JPG images downloaded from Bitbucket, making detection harder and allowing for flexible payload changes.
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/09/16/filefix_attacks_facebook_security_alert/
📰 The Hacker News | https://thehackernews.com/2025/09/new-filefix-variant-delivers-stealC.html
SlopAds Android Ad Fraud Ring Disrupted 📱
- A massive ad fraud operation, "SlopAds," involving 224 Android apps with 38 million downloads, has been disrupted by Google after generating 2.3 billion daily ad bids at its peak.
- The apps used sophisticated evasion tactics, including steganography to conceal a malicious "FatModule" APK within PNG images, and conditional fraud execution (only activating if installed via an ad click).
- The FatModule created hidden WebViews to navigate to attacker-owned game and news sites, continuously serving ads to generate fraudulent impressions and clicks, highlighting the evolving sophistication of mobile ad fraud.
📰 The Hacker News | https://thehackernews.com/2025/09/slopads-fraud-ring-exploits-224-android.html
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/google-nukes-224-android-malware-apps-behind-massive-ad-fraud-campaign/
RaccoonO365 Phishing Kit Disrupted by Microsoft & Cloudflare 🚫
- Microsoft, with Cloudflare's help, has disrupted RaccoonO365, a rapidly growing subscription phishing kit used to steal Microsoft 365 credentials, seizing 338 associated websites.
- The service, led by Nigerian national Joshua Ogundipe, offered kits for $365/month, targeting up to 9,000 emails daily, bypassing MFA, and stealing credentials from 5,000 victims in 94 countries.
- The operation highlights the increasing sophistication of phishing-as-a-service, with RaccoonO365 recently advertising an AI-backed service to scale attacks, underscoring the need for robust MFA and user awareness.
🗞️ The Record | https://therecord.media/microsoft-cloudflare-disrupt-raccoono365-credential-stealing-tool
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/09/16/microsoft_cloudflare_shut_down_raccoono365/
Phoenix RowHammer Attack Bypasses DDR5 Protections 💥
- Academics from ETH Zürich and Google have unveiled "Phoenix" (CVE-2025-6202), a new RowHammer attack variant capable of bypassing advanced Target Row Refresh (TRR) protections on SK Hynix DDR5 memory chips.
- The attack can reliably trigger bit flips on DDR5 devices, leading to a privilege escalation exploit that obtains root on a standard desktop system in as little as 109 seconds.
- This research confirms that on-die ECC is insufficient and end-to-end RowHammer attacks are still viable on DDR5, recommending increased refresh rates (3x) as a mitigation for unpatchable DRAM devices.
📰 The Hacker News | https://thehackernews.com/2025/09/phoenix-rowhammer-attack-bypasses.html
Apple Backports Zero-Day Patches to Older Devices 🍎
- Apple has released security updates for older iPhones and iPads (iOS/iPadOS 15.8.5 / 16.7.12) to backport patches for CVE-2025-43300, a zero-day out-of-bounds write vulnerability in Image I/O.
- This flaw was previously exploited in "extremely sophisticated attacks against specific targeted individuals," often chained with a WhatsApp zero-click vulnerability (CVE-2025-55177).
- While Apple's latest OS updates (iOS/iPadOS 26, macOS 26) address numerous other vulnerabilities without active exploitation warnings, this backport ensures critical protection for a wide range of older, unsupported devices.
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/apple-backports-zero-day-patches-to-older-iphones-and-ipads/
🤫 CyberScoop | https://cyberscoop.com/apple-security-updates-september-2025/
China Imposes Strict 1-Hour Cyber Incident Reporting Deadline 🇨🇳
- From November 1st, China's Cyberspace Administration (CAC) will enforce new rules requiring network operators to report "serious" cyber incidents within 60 minutes, and "particularly major" events within 30 minutes.
- "Particularly major" incidents include data loss threatening national security, leaks of over 100 million personal records, or outages of key government/news sites for over 24 hours, with penalties for non-compliance.
- This stringent deadline, significantly shorter than Europe's 72-hour rule, will force Chinese organisations to invest heavily in real-time monitoring and rapid response capabilities.
🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2025/09/16/china_1hour_cyber_reporting/
US Lawmakers Extend Key Cyber Programs 🏛️
- A short-term government funding bill proposes extending the 2015 Cybersecurity Information Sharing Act (CISA 2015) and the State and Local Cybersecurity Grant Program for another seven weeks, until November 21st.
- This temporary reprieve aims to give House and Senate lawmakers more time to align on long-term renewals for these critical initiatives, which provide legal safeguards for threat intelligence sharing and support local cyber defences.
- The Senate's proposed version of the threat-sharing legislation is expected to differ from the House's, potentially offering a shorter renewal and fewer safeguards for private entities.
🗞️ The Record | https://therecord.media/house-lawmakers-move-to-extend-two-cyber-laws
FBI Cyber Division Personnel & Arrests Under Scrutiny 🇺🇸
- A contentious Senate Judiciary Committee hearing saw Senator Dick Durbin warn of potential 50% personnel cuts to the FBI's cyber division under the Trump administration, despite increasing foreign threats.
- FBI Director Kash Patel countered, stating that cyber-related arrests have risen by 42% (409 arrests) and convictions by 169% compared to the previous year, asserting no diversion of resources from critical cyber missions.
- The debate highlights ongoing concerns about the FBI's resource allocation and its ability to combat nation-state threats, ransomware, and AI-generated election interference amidst political scrutiny.
🤫 CyberScoop | https://cyberscoop.com/senators-fbi-director-patel-clash-over-cyber-division-personnel-arrests/
Microsoft to Remove WMIC from Windows 11 25H2 💻
- Microsoft has announced that the Windows Management Instrumentation Command-line (WMIC) tool will be removed after upgrading to Windows 11 25H2 and later versions.
- IT administrators are advised to transition to Windows PowerShell for WMI tasks, as WMIC has been deprecated since Windows Server 2012 and Windows 10 21H1.
- This removal aims to reduce system complexity and boost security by eliminating a common "living-off-the-land binary" (LOLBIN) exploited by malware for tasks like deleting Shadow Volume Copies or disabling antivirus.
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/microsoft/microsoft-wmic-will-be-removed-after-windows-11-25h2-upgrade/
BreachForums Founder Resentenced to Three Years Prison ⚖️
- Conor Brian Fitzpatrick, alias "Pompompurin," founder of the notorious BreachForums hacking forum, has been resentenced to three years in prison after his initial lenient sentence was overturned.
- Fitzpatrick pleaded guilty to conspiracy to commit access device fraud, solicitation, and possession of child sexual abuse material, but violated pretrial release conditions by using unmonitored internet access and expressing a lack of remorse.
- The resentencing underscores the severity of operating such platforms, which facilitated the trade of stolen data from over 330,000 members and 14 billion individual records.
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/breachforums-hacking-forum-admin-resentenced-to-three-years-in-prison/
🤫 CyberScoop | https://cyberscoop.com/conor-fitzpatrick-resentenced-pompompurin-breachforums/
Check Point Acquires AI Security Firm Lakera 🤝
- Check Point Software Technologies is acquiring Lakera, an AI security platform, to deliver an "end-to-end AI security solution" for enterprises, with the deal expected to close in Q4 2025.
- Lakera's platform offers real-time protection for AI applications, with high detection rates and low false positives, and operates Gandalf, an adversarial AI network generating over 80 million attack patterns.
- This acquisition reflects a growing trend of established cybersecurity companies expanding into AI security to address new attack vectors like data exposure and model manipulation introduced by generative AI and LLMs.
🤫 CyberScoop | https://cyberscoop.com/check-point-lakera-acquistion-ai-security/
#CyberSecurity #ThreatIntelligence #SupplyChainAttack #npm #Ransomware #DataBreach #ZeroDay #Vulnerability #RowHammer #Phishing #SocialEngineering #Malware #AdFraud #AndroidSecurity #RegulatoryCompliance #GovernmentCyber #FBI #AI #InfoSec #CyberAttack #IncidentResponse