Cloudflare and Ivanti vulnerabilities, MikroTik Routers hijacked, Tesla charger exploits found, top malware threats in 2025...
Welcome to this week's Cyber Security News. Our security team have handpicked the best articles from the around the internet and put them all into one place for you to digest. Subscribe for weekly updates!
Cloudflare CDN Vulnerability Exposes User Locations on Signal and Discord
A flaw in Cloudflare’s CDN allows attackers to infer user locations within a 250-mile radius by exploiting the caching mechanism on platforms like Signal and Discord. This can compromise anonymity, particularly for vulnerable groups. The attack uses malicious images delivered via zero-click or one-click methods, requiring no user awareness.
CISA Warns of Chained Exploitation of Ivanti Vulnerabilities
The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI have issued a joint advisory highlighting that threat actors are chaining multiple vulnerabilities in Ivanti's Cloud Service Appliance (CSA) to gain unauthorized access, execute remote code, steal credentials, and install web shells on victim networks.
Affected Vulnerabilities:
These vulnerabilities affect Ivanti CSA version 4.6x prior to build 519. Additionally, CVE-2024-9379 and CVE-2024-9380 impact CSA versions 5.0.1 and earlier; however, Ivanti reports that these CVEs have not been exploited in version 5.0.
Cisco Patches Critical Vulnerability in Meeting Management
Cisco has released a patch for a critical vulnerability in its Meeting Management software, identified as CVE-2025-20156 with a CVSS score of 9.9. This flaw affects the REST API and allows remote attackers to escalate privileges to administrator level due to improper authorization enforcement. Exploiting this vulnerability could grant attackers full control over edge nodes managed by the software.
AT&T Data Breach Poses Risk to FBI Informants
In April 2024, AT&T experienced a data breach that compromised call and text logs of approximately 100 million customers, including FBI agents. While the content of communications was not exposed, the metadata—such as phone numbers contacted—was accessed. This exposure raises concerns that threat actors could analyse these logs to identify confidential informants, potentially jeopardizing ongoing investigations and informant safety.
13,000 MikroTik Routers Hijacked by Botnet for Malspam and Cyberattacks
A botnet of approximately 13,000 compromised MikroTik routers has been hijacked for cyberattacks, including malware distribution and spam campaigns. The attackers likely exploited CVE-2023-30799, a critical privilege escalation vulnerability, turning the routers into SOCKS proxies to disguise malicious traffic. The botnet was also used in a malspam campaign, where freight invoice-themed emails with ZIP file attachments delivered malware via PowerShell scripts, establishing connections to a command-and-control server. Additionally, the attackers took advantage of misconfigured Sender Policy Framework (SPF) records in around 20,000 domains, using overly permissive "+all" settings to spoof email addresses and bypass security measures. To mitigate this, organizations should ensure MikroTik routers are updated to the latest firmware, change default router credentials, and correct SPF record configurations.
Hackers Earn $129,000 for Tesla Charger Exploits at Pwn2Own Automotive 2025
During the Pwn2Own Automotive 2025 hacking competition in Tokyo, researchers were awarded $129,000 for successfully exploiting vulnerabilities in Tesla's Wall Connector chargers. The event, organized by Trend Micro’s Zero Day Initiative (ZDI), saw a total of $718,250 distributed over the first two days for various exploits targeting electric vehicle (EV) chargers and infotainment systems.
Notable Tesla Charger Exploits:
The competition continues, with further attempts to exploit Tesla's Wall Connector scheduled, potentially increasing the total rewards. Notably, no attempts to hack Tesla vehicles themselves are planned for this year's event, despite significant incentives offered for such exploits. These findings underscore the importance of ongoing security assessments in EV infrastructure to ensure user safety and system integrity.
Top 5 Malware Threats to Prepare Against in 2025
As cyber threats continue to evolve, it's crucial for organizations to stay informed about prevalent malware families. Here are five significant threats identified for 2025:
Check out previous editions and find out how we can help your organisation by visiting our website: https://www.d2na.com