Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

UK NCSC Warns Of Cisco Firewall Exploits

September 29, 2025
Reading Time: 3 mins read
in Alerts
Ransomware Hits Ohio Union County

The U.K. NCSC has issued a critical alert regarding an ongoing cyber campaign orchestrated by a state-sponsored threat actor. This group has been actively exploiting recently disclosed zero-day vulnerabilities (CVE-2025-20362 and CVE-2025-20333) in Cisco ASA firewalls to deploy two new, highly sophisticated malware families, RayInitiator and LINE VIPER. These attacks represent a significant evolution in the threat landscape, demonstrating advanced evasion techniques and a high degree of complexity. The NCSC and Cisco strongly recommend that organizations follow vendor best practices for detection and remediation, stressing the urgent need to migrate away from end-of-life devices, which are particularly vulnerable to these types of attacks.

The core of the attack chain is a new, persistent GRUB bootkit called RayInitiator. This bootkit is specifically designed to target and flash firmware on older Cisco ASA 5500-X devices that lack Secure Boot or Trust Anchor protections. RayInitiator is notable for its ability to survive reboots and even firmware upgrades, ensuring a persistent foothold on the compromised device. Once loaded, its primary function is to deploy the second stage of the attack: a user-mode loader known as LINE VIPER. The presence of this multi-stage malware highlights the attackers’ focus on stealth and long-term access, making it incredibly difficult for standard security tools to detect and remove.

LINE VIPER is a highly versatile and dangerous shellcode loader. It can receive commands through multiple channels, including WebVPN client authentication and specially crafted network packets. To secure its operations and the exfiltration of stolen data, the malware uses unique tokens and RSA keys for each victim. Once activated, its capabilities are extensive: it can execute device commands, capture network traffic, bypass authentication controls, and even manipulate system logs to hide its activity. In an effort to frustrate forensic analysis, the malware can also record command-line input and trigger delayed reboots. This level of functionality allows the threat actor to maintain control and covertly collect sensitive information.

The investigation into these attacks began in May 2025 when multiple government agencies reported suspicious activity on their Cisco ASA 5500-X firewalls. Cisco’s subsequent analysis confirmed a state-backed hacking campaign linked to their previously reported ArcaneDoor campaign. The attackers exploited a memory corruption flaw in the ASA software and utilized multiple zero-day vulnerabilities in a chained attack. Their advanced evasion techniques included disabling logging, intercepting CLI commands, and intentionally crashing devices to prevent diagnostic analysis. This level of sophistication, according to Cisco, required an extensive, multidisciplinary response across their engineering and security teams.

The attackers specifically targeted Cisco ASA 5500-X models (running software versions 9.12/9.14) with enabled VPN web services but without Secure Boot or Trust Anchor protections. The compromised devices include several models that are either already end-of-support or are scheduled to be by September 30, 2025. This underscores the critical risk associated with running outdated hardware. In response to these findings, Cisco has also patched an additional critical vulnerability (CVE-2025-20363) with a CVSS score of 8.5/9.0, which could enable remote code execution across multiple Cisco platforms, further highlighting the urgency for organizations to apply all available security updates.

Reference:

  • UK NCSC Warns Attackers Used Cisco Firewall Zero Days To Deploy RayInitiator And Line Viper Malware
Tags: Cyber AlertsCyber Alerts 2025CyberattackCybersecuritySeptember 2025
ADVERTISEMENT

Related Posts

Ransomware Hits Ohio Union County

MacOS XCSSET Variant Hits Firefox

September 29, 2025
Ransomware Hits Ohio Union County

Akira Ransomware Beats SonicWall VPN MFA

September 29, 2025
Fake PyPI Login Site Steals Credentials

Fake PyPI Login Site Steals Credentials

September 26, 2025
Fake PyPI Login Site Steals Credentials

Google Warns of BRICKSTORM Malware

September 26, 2025
Fake PyPI Login Site Steals Credentials

Hidden WordPress Backdoors Create Admins

September 26, 2025
BadIIS Malware Spreads Via SEO Poisoning

Hackers Target AWS and Steal Credentials

September 24, 2025

Latest Alerts

MacOS XCSSET Variant Hits Firefox

Akira Ransomware Beats SonicWall VPN MFA

UK NCSC Warns Of Cisco Firewall Exploits

Fake PyPI Login Site Steals Credentials

Google Warns of BRICKSTORM Malware

Hidden WordPress Backdoors Create Admins

Subscribe to our newsletter

    Latest Incidents

    Medusa Ransomware Hits Comcast Data

    Ransomware Hits Ohio Union County

    DataCenter Fire Shuts South Korea Sites

    Indian Bank Transfer Records Exposed

    Chinese Cyberspies Hit US Defense Firms

    Neon App Shuts Down After Data Leak

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial