Cyber News Roundup for April 11, 2025 - RedSeal
RedSeal
  • Platform
    • RedSeal Platform
    • Capabilities
      • Hybrid Environment Modeling
      • Attack Path Analysis
      • Risk Prioritization
      • Continuous Compliance
    • Integrations
    • CTEM
  • Services
    • CTEM
    • Professional Services
    • Customer Support
    • RedSeal University
  • Solutions
    • Business Use Cases
      • Breach Impact Reduction
      • Mergers & Acquisitions
      • Cyber Insurance Optimization
    • Industries
    • CTEM
  • Partners
    • RedSeal Partners
    • Partner Portal
  • Company
    • About RedSeal
    • Leadership
    • Careers
  • Resources
    • Blog
    • Events
    • Resource Center
  • Contact Us
  • GET A DEMO
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

Cyber News Roundup for April 11, 2025

2025-04-11
/  byWayne Lloyd, Federal CTO, RedSeal

This week’s Cyber News Roundup brings you the latest cybersecurity headlines, where new risks and vulnerabilities continue to emerge. From Forescout’s report on the riskiest connected devices to advanced phishing campaigns, these incidents highlight the need for stronger, more proactive security strategies. RedSeal helps organizations mitigate these evolving threats by offering robust network visibility and risk exposure management to stay ahead of cybercriminals. Read on to catch up on the critical threats making waves this week.

 

A new report reveals routers’ riskiness  

Forescout’s 2025 Riskiest Connected Devices report reveals routers are now the riskiest devices in enterprise networks, responsible for over half of the most critical vulnerabilities. Device risk overall has jumped 15% from last year. While computers hold the most bugs, routers, firewalls, and ADCs top the list for severity, often exploited as zero-days. The top 20 riskiest device types now include 12 newcomers like PoS systems and healthcare workstations. IoMT devices also carry major threats. Retail leads in risk exposure, followed by finance, government, healthcare, and manufacturing. Over 50% of non-legacy Windows devices across sectors still run Windows 10, nearing end-of-support. There’s also a shift away from encrypted SSH to unencrypted Telnet. Forescout warns modern threats span IT, IoT, OT, and IoMT, demanding broader, cross-domain security strategies. (SecurityWeek)

 

Windows Defender Antivirus Bypassed Using Direct Syscalls & XOR Encryption  

Researchers have uncovered a method to bypass Windows Defender antivirus by using direct system calls (syscalls) combined with XOR encryption, as detailed in a recent cybersecurity study. By employing shellcode encryption and injecting malicious code into both local and remote processes, they avoided detection from Defender’s static and dynamic analysis. Direct syscalls allowed them to bypass user-mode API monitoring, while XOR encryption obscured the shellcode, making it harder to detect. The approach, tested in a controlled lab, highlights the need for stronger defenses against such advanced evasion tactics, as traditional antivirus solutions struggle to counter these sophisticated methods. (Cyber Security News)

 

Nissan Leaf cars can be hacked for remote spying and physical takeover  

Researchers at PCAutomotive, a pentesting and threat intelligence company specializing in the automotive and financial sectors, services industries revealed the hacking potential last week at Black Hat Asia 2025. Focusing on the second generation Nissan Leaf made in 2020, they were able to “use the infotainment system’s Bluetooth capabilities to infiltrate the car’s internal network. They were then able to escalate privileges and establish a command and control channel over cellular communications to maintain stealthy and persistent access to the EV directly over the internet, up to and including being able to control the steering when while a car was in motion. (Security Week)

 

Infosec experts warn of China Typhoon retaliation against tariffs  

Referring to the White House imposition of tariffs on China, cybersecurity advisor Tom Kellermann warns that China may “retaliate with systemic cyber attacks as tensions simmer over.” Speaking to The Register, he points out how the various “Typhoon” campaigns “have given them a robust foothold within critical infrastructure that will be used to launch destructive attacks. Trade wars were a historical instrument of soft power. Cyber is and will be the modern instrument of choice.” In a separate interview with The Register, Annie Fixler, director of the Center on Cyber and Technology Innovation at the Foundation for Defense of Democracies, said, “to the extent that China is holding back on conducting certain types of cyberattacks, it may feel less restrained now.” (The Register)

 

U.S. Comptroller suffers ‘major incident’  

On Tuesday, the U.S. Treasury Department’s Office of the Comptroller of the Currency (OCC) characterized their recent email system breach as a “major incident.” In late February, Microsoft alerted officials to the incident which abused an OCC email administrator account. The initial investigation found no evidence of impact on the financial sector and concluded that only a “limited number” of email accounts were affected. However, new reports from Bloomberg and Microsoft indicate that 103 email accounts with emails totaling 150,000 were compromised and contained highly sensitive financial information. The attack commenced in May of last year, nine months prior to its discovery. It remains unclear who is behind the attack. (SecurityWeek)

 

Phishing kits now vet victims in real-time  

Threat actors have been spotted employing a new evasion tactic called ‘Precision-Validated Phishing.’ This new technique uses real-time email validation through either validation service API calls or JavaScript code to ensure phishing content is shown only to pre-verified, high-value targets. If an invalid target is identified, they are either presented with an error message or directed to benign sites. Email security firm Cofense said this new tactic is blocking visibility for researchers who typically enter fake or controlled email addresses to map the credential theft campaign. Ultimately, this reduces detection rates and prolongs the lifespan of phishing operations. (Bleeping Computer)

 

Hackers target bugs in EC2 sites to steal AWS credentials  

F5 Labs has observed hackers exploiting Server-Side Request Forgery (SSRF) vulnerabilities in websites hosted on AWS Elastic Cloud Compute (EC2) instances. The attackers are using credentials from extracted EC2 Metadata to escalate their privileges and access S3 buckets and other AWS services. The attacks are targeting instances running on AWS’s older metadata service, IMDSv1, that allows anyone with access to retrieve the metadata. The system has been superseded by IMDSv2, which requires session token authentication to protect websites. F5 researchers said that the malicious activity culminated between March 13 and 25, 2025 and behavioral patterns strongly suggest that it was carried out by a single threat actor. (Bleeping Computer)

 

Google’s latest Android update addresses two zero-days  

Google’s April 2025 Android Security Bulletin addresses multiple critical vulnerabilities, including two zero-days—CVE-2024-53150 and CVE-2024-53197—actively exploited in targeted attacks. Both impact the Linux kernel’s ALSA USB-audio driver and pose serious risks to Android devices running versions 12 through 15. CVE-2024-53150 allows information disclosure via an out-of-bounds read, while CVE-2024-53197 enables privilege escalation through memory corruption triggered by malicious USB devices. These flaws may bypass standard device locks and resemble methods used by surveillance firms. Google and Samsung have released urgent patches, with fixes included in the 2025-04-05 security level. The continued targeting of Android underscores the ecosystem’s security challenges, with Google reporting a significant rise in zero-day attacks. Users are urged to update devices immediately to avoid exploitation. (Cyber Security News)

 

AI outphishes human red teams  

Move over chess grandmasters—AI has now leveled up to out-hustle human red teams in the world of phishing. According to cybersecurity firm Hoxhunt, their AI phishing agent, code-named JKR (yes, like “Joker”), beat human-crafted phishing attempts by 24% in March. That’s a glow-up from last year, when JKR lagged 31% behind. Think of it as a Skynet-meets-email moment. JKR adapts like a social engineering ninja, customizing bait with user-specific context like job roles and locations. It’s not just phishing—it’s precision phishing, in bulk. Hoxhunt says this could make mass phishing campaigns as effective as today’s spear-phishing attempts. Great.

The Anti-Phishing Working Group also reported a global spike in phishing sites and smishing scams, including hilariously off-target toll collection texts. So, while humans still bring creativity, AI brings scale, 24/7 hustle, and zero need for coffee. Experts say defending against AI-driven threats will still require one vital element: human judgment. We’d have more good judgment if it weren’t constantly busy cleaning up after bad judgment.

(GovInfo Security)

 

Windows Remote Desktop Service Vulnerability Let Attackers Execute Malicious Code Remotely  

Critical vulnerabilities in Windows Remote Desktop Services (RDS), specifically CVE-2025-24035 and CVE-2025-24045, both rated with a CVSSv3 score of 8.1. These Remote Code Execution (RCE) flaws could allow unauthorized attackers to execute malicious code over a network, potentially compromising entire systems. CVE-2025-24035 stems from improper memory handling, while CVE-2025-24045 requires an attacker to win a race condition, though Microsoft deems exploitation “more likely” for both. Successful attacks could severely impact confidentiality, integrity, and availability. The article notes additional vulnerabilities addressed by Microsoft, including six actively exploited flaws, urging organizations to apply patches and follow security best practices like enabling Network Level Authentication and restricting RDP access to mitigate risks.

(Cyber Security News)

 

WhatsApp vulnerability could facilitate remote code execution  

Meta has patched a serious vulnerability in the WhatsApp desktop app for Windows that could let attackers trick users into executing malicious code via spoofed file types. The flaw involved MIME type manipulation, making harmful files appear safe (like images or documents). While there’s no evidence it has been exploited in the wild, users are urged to update to version 2.2450.6 to stay protected. (SecurityWeek)

 

CISA Warns of CrushFTP Vulnerability Exploitation in the Wild  

A critical authentication bypass vulnerability in CrushFTP, identified as CVE-2025-31161, has been actively exploited by remote attackers following a disrupted disclosure process, prompting the U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add it to its Known Exploited Vulnerabilities (KEV) catalog. The flaw, affecting unpatched versions of CrushFTP v10 and v11, allows unauthenticated access with a CVSSv3.1 severity score of 9.8, posing a significant risk of full system compromise. Initially disclosed responsibly by Outpost24 with a 90-day non-disclosure period, the process was undermined when VulnCheck published a separate CVE (CVE-2025-2825) without coordination, accelerating exploitation after a proof-of-concept exploit emerged. As of March 30, 2025, 815 systems remained unpatched, down from 1,800 two days prior, highlighting the urgency for organizations to apply updates as federal agencies face a mitigation deadline of April 28, 2025. This incident follows a pattern of file transfer software vulnerabilities, with CrushFTP previously targeted by a zero-day exploit in April 2024. (Infosecurtiy Magazine)

 

PoisonSeed campaign weaponizes CRM system  

Researchers at Silent Push found a new campaign that uses customer relationship management and bulk email systems to send out phishing emails with crypto seed phrases to potential victims. These emails claim to be from Coinbase, urging users with self-custodial wallets to transfer assets. The seed phrases are included in transfer instructions for setting up new wallets, which grants threat actors access to them. It’s estimated that Coinbase users have lost roughly $46 million in crypto assets since mid-March. The campaign has used a variety of providers to spam people, including Hubspot, Mailchimp, Mailgun, SendGrid, and Zoho. (Security Week)

 

State-backed actors could have exploited ESET flaw  

The cybersecurity firm ESET confirmed a flaw reported by Kaspersky researchers that could be used by threat actors to plant a malicious DLL and execute it with ESET’s antivirus scanner to bypass system defenses. ESET patched the issue and maintains it didn’t find any evidence of it being exploited in the wild. However, Kaspersky researchers claim the suspected state-backed threat group ToddyCat used the flaw in a campaign, using a modified version of EDRSandBlast to load the malicious DLL under the name TCDSB to execute payloads. ESET said it hasn’t seen the suspected DLLs to review them, but regardless, the approach would have required admin privileges to perform the attack. (The Record)

 

Have questions? Reach out to RedSeal today to chat with one of our cybersecurity experts or schedule a demo today.

 

Share this entry

Recent Posts

  • Drowning in Vulnerabilities? Here’s How to Finally Know What to Fix First

    2025-12-09
  • RedSeal recognized in the 2025 Gartner® Magic Quadrant™ for Exposure Assessment Platforms: A Strong Position in a Rapidly Expanding Market

    2025-12-01
  • You can’t patch what you don’t understand…

    2025-11-21
  • RedSeal Recognized in the 2025 Gartner® Magic Quadrant™ for Exposure Assessment Platforms

    2025-11-13
  • Close the Gap: How RedSeal Workflow Turns Exposure Insights into Action

    2025-11-13

Blog Archive

Get the latest news, invites to events, and threat alerts

Platform

  • RedSeal Platform
  • Capabilities
  • Integrations
  • CTEM

Services

  • CTEM
  • Professional Services
  • Customer Support
  • RedSeal University

Solutions

  • Business Use Cases
  • Industries
  • CTEM

Partners

  • RedSeal Partners
  • Partner Portal

Company

  • About RedSeal
  • Leadership
  • Careers

Resources

  • Blog
  • Events
  • Resource Center
CONTACT US
RedSeal Japan
Distinguished Vendor badge 2025

© Copyright by RedSeal, Inc. All Rights Reserved.
  • Link to X
  • Link to LinkedIn
  • Link to Youtube
  • Link to Rss this site
  • Standard Agreements
  • Terms of Use
  • Privacy Policy
  • Section 508 Policy
Link to: RedSeal Named Finalist for 2025 SC Awards: Best Continuous Threat Exposure Management (CTEM) Solution Link to: RedSeal Named Finalist for 2025 SC Awards: Best Continuous Threat Exposure Management (CTEM) Solution RedSeal Named Finalist for 2025 SC Awards: Best Continuous Threat Exposure Management... Link to: Transforming Threat Detection: The Power of CTEM and RedSeal in Cybersecurity Link to: Transforming Threat Detection: The Power of CTEM and RedSeal in Cybersecurity Transforming Threat Detection: The Power of CTEM and RedSeal in Cybersecuri...
Scroll to top Scroll to top Scroll to top

In order to provide you with the best experience possible we might sometimes track information about you. Sometimes this may involve writing a cookie. We use this information for things like experience enrichment, analytics and targeting advertising. We recommend allowing these functions to get the most out of your experience.

OK

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Accept settingsHide notification only
Footer
Connect on LinkedIn