F5 Threat Report - December 24th, 2025
CISA Warns ASUS Live Update Backdoor Is Still Exploitable, Seven Years On
The Cybersecurity and Infrastructure Security Agency (CISA) has added a vulnerability in ASUS Live Update, tracked as CVE-2025-59374 with a CVSS score of 9.3, to its catalog of Known Exploited Vulnerabilities (KEV), indicating active exploitation. This utility, preinstalled on ASUS devices for firmware and software updates, was previously compromised in a sophisticated 2018 supply chain attack attributed to Chinese state-sponsored actors, which inserted a backdoor. Although the attack initially targeted a small, specific group of approximately 600 devices based on hashed MAC addresses, millions may have downloaded the backdoored utility. While support for ASUS Live Update has been discontinued, it continues to provide updates, making the legacy software a persistent risk for unintended actions on affected devices. Users are urged to update ASUS Live Update to version 3.6.8 or later, either through the utility itself or by manually downloading the latest version from the official ASUS website for their specific device model, to mitigate known security issues and avoid third-party sources due to the history of supply chain abuse.
Severity: Critical
Sources
- https://gbhackers.com/actively-exploited-asus-vulnerability-added-to-cisas-kev-list/
- https://thehackernews.com/2025/12/cisa-flags-critical-asus-live-update.html
- https://www.malwarebytes.com/blog/news/2025/12/cisa-warns-asus-live-update-backdoor-is-still-exploitable-seven-years-on
- https://www.securityweek.com/cisa-warns-of-exploited-flaw-in-asus-update-tool/
Threat Details and IOCs
| Malware: | Backdoor:Win32/Shadowpad.AA!MSR, PassCV, ShadowHammer, ShadowPad, Trojan.Win32.Agentb.jqco, Winnti |
| CVEs: | CVE-2025-59374 |
| Technologies: | ASUS, Microsoft Windows |
| Threat Actors: | APT41, Barium, BrassTyphoon, WickedPanda, Winnti |
| Attacker Countries: | China |
| Attacker IPs: | 141.105.71.116 |
| Attacker Domains: | asushotfix.com, liveupdate01.asus.com |
| Attacker URLs: | hxxp://liveupdate01.asus.com/pub/ASUS/nb/Apps_for_Win8/LiveUpdate/Liveupdate_Test_VER365.zip |
| Victim Industries: | Gaming, Government, Healthcare, Pharmaceuticals, Sports and Entertainment, Technology Hardware, Telecommunications |
| Victim Countries: | South Korea, Taiwan, United States |
Mitigation Advice
- Use asset inventory systems to generate a report of all ASUS-manufactured devices operating within the environment.
- Uninstall the ASUS Live Update utility from all identified corporate ASUS devices.
- Add the domain 'asushotfix[.]com' to network firewall and web proxy blocklists.
- Run a full endpoint scan with your EDR or antivirus solution to detect infections related to the 'ShadowHammer' campaign, ensuring signatures are updated to detect 'HEUR:Trojan.Win32.ShadowHammer.gen'.
Compliance Best Practices
- Develop and implement a software lifecycle management policy to audit, track, and remove end-of-life and unsupported applications from all corporate systems on a recurring basis.
- Establish a supply chain risk management program to formally assess the security posture of software vendors and validate the integrity of third-party software updates before enterprise-wide deployment.
- Deploy an application control solution, such as Windows AppLocker or a similar tool, to enforce an allowlist of approved software and block the execution of unauthorized or non-essential utilities.
- Configure perimeter firewalls to enforce a default-deny egress filtering policy, allowing outbound connections only for explicitly approved services, protocols, and destinations required for business operations.
UK Government Confirms Foreign Office Cyber Attack
The UK government confirmed a cyber attack on the Foreign, Commonwealth and Development Office (FCDO) in October, stating there was a low risk of personal data compromise, though Trade Minister Chris Bryant indicated the perpetrator was unclear despite reports attributing it to the China-based Storm 1849 group. This group was previously linked to exploiting zero-day vulnerabilities in Cisco Adaptive Security Appliance (ASA) equipment, known as the "ArcaneDoor" campaign, which led to a National Cyber Security Centre (NCSC) warning in September about the risks of end-of-life Cisco systems. The FCDO breach reportedly involved access to confidential data and documents, potentially including visa details, and has fueled criticism regarding a national digital ID scheme and the government's "One Login" system. The year 2025 was marked by numerous high-profile cyber attacks, including ransomware incidents affecting Jaguar Land Rover (which impacted the UK economy), Co-op, Marks & Spencer, Oxford City Council, Harrods, multiple airports, Glasgow City Council, Adidas, and Peter Green Chilled, in addition to attacks on four London councils, with Westminster confirming data exfiltration.
Severity: Critical
Sources
Threat Details and IOCs
| Malware: | AquaPurge, AquaShell, AquaTunnel, Line Dancer, Line Runner, LINE VIPER, RayInitiator, ReverseSSH |
| CVEs: | CVE-2024-20353, CVE-2024-20359, CVE-2025-20333, CVE-2025-20362, CVE-2025-20363, CVE-2025-20393 |
| Technologies: | Cisco Adaptive Security Appliance, Cisco AsyncOS, Cisco Firepower Threat Defense Software |
| Threat Actors: | STORM1849, Uat4356, UAT9686 |
| Attacker Countries: | China |
| Victim Industries: | Automotive, Defense, Financial Services, Government, Healthcare, Logistics, Public Sector, Retail, Telecommunications, Transportation |
| Victim Countries: | Belgium, Germany, United Kingdom |
Mitigation Advice
- Apply the latest security patches to all Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) devices to mitigate the vulnerabilities associated with the ArcaneDoor campaign.
- Review logs and system configurations on all Cisco ASA devices for indicators of compromise related to the ArcaneDoor campaign, such as unexpected reboots, unauthorized configuration changes, or suspicious credential activity.
Compliance Best Practices
- Create an inventory of all network perimeter devices and prioritize the replacement of any Cisco Adaptive Security Appliance (ASA) models that are at or near their end-of-life (EoL) date.
- Establish and enforce a formal hardware and software lifecycle management policy that mandates the replacement of any network or security appliance before it reaches its end-of-support date.
- Implement network segmentation to create security zones that isolate critical servers and data from user workstations and other less-sensitive areas, thereby limiting an attacker's lateral movement capabilities.
CVE-2025-68260: First Rust Vulnerability in Linux Kernel's Android Binder Driver
A vulnerability, designated CVE-2025-68260, has been identified and fixed in the Linux kernel, marking the first CVE formally assigned to Rust code in the mainline kernel. This issue, reported by Greg Kroah-Hartman, affects the Android Binder driver, which was rewritten in Rust. The core of the bug is an unsafe operation within the Rust-based Binder implementation where an element is removed from a linked list while another thread concurrently manipulates the same `prev/next` pointers. Specifically, the `Node::release` function's logic involved moving elements to a temporary stack-based list before releasing a lock, creating a race condition if another thread performed an unsafe removal on the original list. This could lead to memory corruption, ultimately causing kernel crashes, exemplified by "Unable to handle kernel paging request" errors in the `rust_binder` module. The vulnerability was introduced in Linux 6.18 (commit `eafedbc7c050c44744fbdf80b7513`) and resolved in 6.18.1 (commit `3428831264096d32f830a7fcfc7885dd263e511a`) and 6.19-rc1 (commit `3e0ae02ba831da2b707905f4e602e43f8507b8cc`), with the fix involving a rewrite of `Node::release` to extract elements directly from the original list. Upgrading to a current stable kernel release is strongly recommended as a mitigation.
Severity: Critical
Sources
- https://cyberpress.org/linux-kernel-rust-component-hit-by-vulnerability/
- https://gbhackers.com/new-linux-kernel-rust-vulnerability/
- https://securityonline.info/rusts-first-breach-cve-2025-68260-marks-the-first-rust-vulnerability-in-the-linux-kernel/
- https://www.cyberkendra.com/2025/12/first-rust-vulnerability-in-linux.html
- https://www.phoronix.com/news/First-Linux-Rust-CVE
Threat Details and IOCs
| Malware: | Akira, Akira_v2, Aqua, AquaShell, Cl0p, Clop, CryptoMix, Megazord |
| CVEs: | CVE-2025-68260 |
| Technologies: | Google Android, Linux |
| Attacker Hashes: | 3428831264096d32f830a7fcfc7885dd263e511a, 3e0ae02ba831da2b707905f4e602e43f8507b8cc |
| Victim Industries: | Consumer Electronics, Information Technology, Manufacturing, Retail, Technology Hardware, Telecommunications, Transportation |
| Victim Countries: | United States |
Mitigation Advice
- Execute the command 'uname -r' on all Linux hosts to create an inventory of running kernel versions and identify all systems running version 6.18.
- For all systems identified with the vulnerable kernel version 6.18, schedule and apply an upgrade to a patched stable version (6.18.1 or newer) and reboot the system to activate the new kernel.
Compliance Best Practices
- Implement a formal patch management policy that mandates the review, testing, and deployment of operating system security updates on a defined, recurring schedule (e.g., monthly).
- Audit the kernel configuration of production Linux servers to identify and disable non-essential kernel modules, creating a hardened baseline configuration that reduces the overall attack surface.
- Configure system logging and monitoring tools to collect kernel logs from all Linux hosts and create high-priority alerts for messages containing terms like 'kernel panic', 'Oops', or 'Unable to handle kernel paging request'.
APT35 Leak Unveils Spreadsheets Containing Domain, Payment, and Server Information
A recent data leak, dubbed Episode 4, has exposed the operational infrastructure of the Iran-linked threat actor APT35 (Charming Kitten), revealing a bureaucratic and meticulously managed cyber apparatus rather than a loose hacker collective. The leaked files, including `0-SERVICE-Service.csv`, `0-SERVICE-payment BTC.csv`, and `1-NET-Sheet1.csv`, detail the group's procurement, funding, and administration processes. `0-SERVICE-Service.csv` contains over 170 rows linking domains, registrars like EDIS Global, NameSilo, and ImprezaHost, along with more than 50 ProtonMail aliases and 80 email-password pairs, complete with pricing and renewal information. `0-SERVICE-payment BTC.csv` documents 55 Bitcoin transactions, averaging $56 (0.0019 BTC) each, processed via Cryptomus between October 2023 and December 2024, with small, recurring transfers designed to evade regulatory scrutiny. Finally, `1-NET-Sheet1.csv` lists network ranges and IP allocations, including blocks under AS203391 and AS21340, across European hosting providers, with several traced to active VPS rentals. These records also link APT35's procurement network to the Moses Staff hacktivist group, with the domain "moses" appearing in the service ledger and shared ProtonMail accounts, indicating administrative support for Moses Staff's operations. This leak highlights the "economic engine" behind Iranian cyber operations, demonstrating how long-term intrusion campaigns are sustained through spreadsheet-managed budgets and micro-crypto payments.
Severity: High
Sources
Threat Details and IOCs
| Malware: | DCrSrv, DCSrv, PyDCrypt, StrifeWater, StrifeWater RAT |
| CVEs: | CVE-2012-1823, CVE-2018-13379, CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-31207, CVE-2021-34473, CVE-2021-34523, CVE-2021-44228, CVE-2022-30190, CVE-2024-1709 |
| Technologies: | Ivanti Connect Secure, Microsoft 365, Microsoft Exchange Server, Microsoft Windows |
| Threat Actors: | AbrahamsAx, APT35, CharmingKitten, MosesStaff |
| Attacker Countries: | Iran |
| Attacker IPs: | 109.125.132.66, 109.230.93.128, 109.230.93.128/29, 1.235.222.140, 128.199.237.132, 185.103.130.16, 185.103.130.16/30, 185.212.193.240, 185.212.193.240/29, 195.191.44.73, 212.12.178.178, 212.175.168.58, 83.96.77.227 |
| Attacker Emails: | 3cx@protonmail.com, abrahamsax@protonmail.com, ali.rezaei@protonmail.com, amir.hossein@protonmail.com, bashiriansul@proton.me, bbmovement@protonmail.com, bbmovement@protonmail.com, b.laws32@proton.me, bulgaria@protonmail.com, carlos.patel@protonmail.com, clark.norman@protonmail.com, clarknorman@protonmail.com, clark.norman@proton.me, cou.nic@protonmail.com, cybersonix@protonmail.com, cybersonix@protonmail.com, edgar.evseev@protonmail.com, edgarevseev@protonmail.com, edgar.evseev@proton.me, fatemeh.hashemi@protonmail.com, gdavies007@proton.me, hossein.alizadeh@protonmail.com, jhjbmuugtfftdd@proton.me, john.porter857@protonmail.com, julius.yermolayev@protonmail.com, juliusyermolayev@protonmail.com, julius.yermolayev@proton.me, kanplus@protonmail.com, karaj@protonmail.com, kashef@protonmail.com, leviscross@protonmail.com, levis.cross@proton.me, lolita259@proton.me, mahabosman@protonmail.com, maja.bosman@protonmail.com, maja.bosman@proton.me, maryam.safari@protonmail.com, mehdi.karimi@protonmail.com, mekhaeel.kalashnikova@protonmail.com, mekhaeelkalashnikova@protonmail.com, mekhaeel.kalashnikova@proton.me, mekhaeelkalashnikova@proton.me, meriyalee@protonmail.com, meriyalee@protonmail.com, misvps@protonmail.com, mlw.services.313@protonmail.com, molden5@protonmail.com, mosesstaff.io@protonmail.com, mosesstaff@protonmail.com, nansi.morad@protonmail.com, narges.moradi@protonmail.com, reza.mohammadi@protonmail.com, rona_yanga@proton.me, sanjilankopylova@proton.me, sara.ahmadi@protonmail.com, secnetdc@protonmail.com, serversamane@protonmail.com, sheldon.bayer@protonmail.com, sheldonbayer@protonmail.com, sheldon.bayer@proton.me, shirley7070@proton.me, shirley.bishop@protonmail.com, shirleybishop@protonmail.com, shirley.bishop@proton.me, sskmt@protonmail.com, tecret@protonmail.com, termite@protonmail.com, timothyefimov@protonmail.com, vpn@protonmail.com, zahra.ebrahimi@protonmail.com |
| Attacker Domains: | bbmovements.com, cavinet.org, dreamy-jobs.com, israel-talent.com, israel-talent.xyz, kanplus.org, misvps.io, modernizmir.net, moses-staff.io, moses-staff.se, moses-staff.to, secnetdc.com, sskmt.com, tecret.com, termite.nu, wazayif-halima.org |
| Attacker URLs: | http://dreamy-jobs.com |
| Victim Industries: | Aerospace, Defense, Education, Energy, Financial Services, Government, Information Technology, Legal Services, Manufacturing, Multimedia, Transportation & Logistics, Utilities |
| Victim Countries: | Afghanistan, Bulgaria, Chile, Cyprus, Germany, India, Israel, Italy, Jordan, Kuwait, Netherlands, Russia, Saudi Arabia, South Korea, Turkey, United Arab Emirates, United Kingdom, United States |
Mitigation Advice
- Block all inbound and outbound traffic to and from IP ranges associated with Autonomous System Numbers AS203391 and AS21340 at the network firewall.
- Conduct an emergency scan for and prioritize patching of vulnerabilities known to be exploited by APT35, including ProxyShell (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065) and Log4Shell (CVE-2021-44228).
- Configure email security gateways to block or quarantine emails originating from ProtonMail domains to mitigate phishing attempts from this threat actor.
- Obtain the list of 80 leaked email-password pairs from threat intelligence providers and immediately search all authentication logs and systems for any matches, forcing password resets and investigating any accounts found.
- Use EDR or other system scanning tools to perform a targeted search across all endpoints and file shares for the filenames `0-SERVICE-Service.csv`, `0-SERVICE-payment BTC.csv`, and `1-NET-Sheet1.csv`.
Compliance Best Practices
- Implement a continuous security awareness training program that includes phishing simulations based on APT35's known TTPs, such as credential harvesting from fake login pages.
- Develop a phased rollout plan to enforce phishing-resistant Multi-Factor Authentication (MFA), such as FIDO2 security keys, for all user accounts, prioritizing externally-facing services and privileged access.
- Implement a strict network egress filtering policy that denies outbound traffic by default and only allows connections required for business operations through an explicit approval process.
- Establish a formal vendor risk management program to assess and monitor the security posture of third-party service providers, including domain registrars and hosting companies.
NuGet Malware Mimic: .NET Integration Library Steals Crypto Wallets and OAuth Tokens
ReversingLabs researchers have identified a sophisticated malware campaign targeting the .NET developer ecosystem through the NuGet package manager, active since July 2025. This campaign involves 14 malicious packages designed to mimic legitimate cryptocurrency libraries, employing social engineering tactics like homoglyph attacks (e.g., "Netherеum.All" impersonating "Nethereum"), version bumping, and artificially inflated download counts. The packages are categorized into three groups: "Wallet Stealers" (e.g., Netherеum.All, SolnetPlus) exfiltrate private keys, seed phrases, and Wallet Import Format (WIF) keys via a `Shuffle` function to a dynamically generated URL like solananetworkinstance[.]info; "Funds Redirectors" (e.g., Coinbase.Net.Api) inject a `MapAddress` function into `SendMoneyAsync` to silently overwrite destination addresses for transactions exceeding $100; and "OAuth Credential Theft" packages (e.g., GoogleAds.API) exfiltrate Google Ads OAuth Client IDs, secrets, and developer tokens, enabling fraudulent ad spending. Despite NuGet's mandatory two-factor authentication, attackers bypassed defenses through social engineering, with packages published by authors such as AngelDev, DamienMcdougal, and jackfreemancodes. Developers are advised to scrutinize package publish dates and author histories rather than relying solely on download metrics.
Severity: Critical
Sources
- https://cyberpress.org/malicious-nuget-package/
- https://gbhackers.com/nuget-malware/
- https://hackread.com/nuget-malicious-packages-steal-crypto-ad-data/
- https://securityonline.info/poisoned-dependencies-how-nethereum-all-and-10m-fake-downloads-looted-net-crypto-developers/
- https://www.reversinglabs.com/blog/nuget-malware-crypto-oauth-tokens
Threat Details and IOCs
| Malware: | GachiLoader, NBitcoin.Unified, Nethereum.All, Netherеum.All, Phantom Stealer, SolnetAll, Stealerium |
| Technologies: | Coinbase Wallet, Google Ads, Google Ads API, Microsoft .NET Framework, Microsoft NuGet, NBitcoin, Nethereum, NuGet, Solana, Solnet |
| Attacker IPs: | 176.113.82.163 |
| Attacker Domains: | solananetworkinstance.info |
| Attacker URLs: | hxxps://solananetworkinstance.info/api/gads |
| Attacker Hashes: | 03ff8f5352e42dbb0f2e60ae9bc36b27c35860b3, 05a29102d2769834b87cf8505cf64fb910625d1e, 08aeac51c5af03a3dd769d339fb8a4b08729a4de, 0907e15fceae4ac81383ea576a44b71ed1a9643a, 09618bc8f2dde467890403b5ad71ab8349dd7339, 0a70ea53f4ade70ce2616522ffb601ee1778c0ea, 0ad97d12add68d0e998d40d69c9e4b189f4a9588, 0b267bc5cbba9a96b3c7ecf56222776fccf8d13e, 0efe44b572d3fd481cb16a47dd3b7516c104d4d2, 10094b31992f597142dff3a01b16874459ca9d4b, 10206b3d71e972a415c26d8275080a2b1d91554d, 10e6d3c4bc327409b7f2af76be4153dbe470e0af, 1128c17ebe42617d75277987b384a6a15f1d7000, 11c46b9a5235b24370dec636e0bc2f8d8cfbc0ba, 130b16b10b1e6a5e235097630f9b8fa2251fb7ce, 14a567ef4b0c4cc480056d951dcca6d3648c5a73, 157c0f2d09621c37d638fcc42d9c6bc7107f018f, 16553a6418a4035c5a3c5b66482fad3189039beb, 169539b741d054a01e91707d8ac0008474785b58, 174716911ef4bec98a2defd165a27eb4752e61ad, 182de4f79db336e706391ef7a3431a5a4cbfde77, 1876c5cc5cb5d8c10aab3d4b479e1561f3fd5e6a, 18df861bbf1b00ce4046dce4d952be5bf6f3f825, 19774417312a7204716176d86101a53e1ec7de83, 1a8549071a86de50bb78f51ed3e5ebfcd4c3942b, 1a9493f509371d9dc1056958337d7b74798f5661, 1a986ac0865ee9c34227b049d3959e3de14a6509, 1c0d4ecd29ea197b41cd65409b89d9b8620812fe, 1c9bd2aed6739155d256981990cfa814ce0f77b6, 1cde8da0dd07326657eba749806541b767d93aac, 1cf71a5de91d7a90673b389a15cffdfb3915682d, 1f6dbf2a29e85ee6b31d57004125d42b73e079b5, 20c146f2205a96925b14f18059aca1ff38d5dcb8, 232a17f920a526ea6ef57b854589f97faeb53994, 232f619a8444cd8b484ece901accb45a6be2df1e, 29c4f29a2c6d7929eba10301f6d861a5591cbe56, 2a32919bffc04b3c4c124b8383f5eedad457c4d5, 2ce05bc2380a97fca39f84c54fc14f8c9a26545a, 2d1007c76962cac395abb38a20216b7b02feae4a, 310cdb353ba2dda94989f65b20de4f67e0cff93a, 316a9b6cd308d2de74cf3bfcf51e75919b71e8ea, 32876e3127fbbd329ba10ff2e2844aa8d5205b29, 32ea26acb233b573b3e4f1b874f9768d11751e38, 345a8837b87936cedf37f62e4a2014481a4e0d24, 34da48fa43e4325ed448f47bd4570079b320dd22, 36276d55f741825d42eff099d4f79b9c1b19a5a6, 3654ff5509d494b29f418b042c7c8a02fe46a127, 37b17099788e0b5b3f7b5c4a9175c271f43bc1f2, 3841005cd1aacc0ae8f8f5907d38daefd1582b20, 385b8a72dbd18dae1b8e4e310fcdbb38ed288307, 3c094cd90d2f83b1c4e3f0a391ef0871d2ffaf95, 3da74f705246b95e07c5d459488e5f48befe10f7, 3e29b26f141cfb7532b6cfb277f32c7191b4b915, 3f98fb94b3268e9c6e2c6cad120d762bd2c136bb, 3fe9db489407533718e6246c4a56994561326da7, 40cd8703d940c4f3fe880c7292a6b92a099a7f5e, 456eecf8311491a242c0984918936d422185a881, 457136952da8784d6c4cede431d816d99b60c327, 461a9192674bdf2c29fa586cdb7c2cd733d66663, 4697e60cc77722eb3e7567899fb4a6d56db2487d, 476411c66c27227574a51466d44a05d14c5cf647, 47fa246f312ae447fa3849a33644fbdc91c1b3c5, 4a43f89ce32f3c4c7dedfbd782c2cb4d3834478c, 4d21fbe0c099b9e21db89fef5d167ba6593265ec, 4e38e286139bdb93d9760279171634745e1f531d, 4eb148d83d9a3f5c1187a9d8d5a0e85459fa9c87, 5149d3e9eda7ae65116d7e0780294191c153de5c, 51c5304ac9cb69505bc6182d05b0aa18356d01c7, 52620426caf465180318147db633f2ce26efe35d, 528adc0d2e7a6e1357aa3676a69bc43648f99776, 52b078c85b5a76d8f97feb3701d9d6ff0de4e284, 52fd4d3a3e1f62fdffb94d5745bb0a543a3ff780, 53997fafbe623aa5bda1ea56db224c8d8827d860, 53d099e308b65232f2a878730ce01af9b85ea08c, 5469b29c9848b785d9f993973f0fc59dff993dcd, 5558c729ce1d1b0a9b7d9567bfc825686d4d13cc, 56da8268211cd9b3806e8ad4a3d9f6b017773872, 575dc8c4e7fb9deb3826f546c442c0c96364a0d7, 57ec7112931de3ce7ba4502e1fa5299ad148085d, 5853de4cfbbbf9313d0c07ed5f54d00acc57cec8, 5882be86bda0108432d74f8b00364ef57bf7864f, 58e42f6d7762505f5ef7d70caee8fe4fb3e6939f, 59ccbc15564036c46447e510b040e9f0b3d65fe4, 5cefe3a11a27572136c1363f963b7d3205c47915, 5d337ae9885c310d02512e4fbdd80d4012410c4b, 5dd1ed264cede60268515aaa4fedb4bb7c39e1f0, 5f52ae106239e4f38ba278f575216736a3541ae0, 5fc1b9d3d1bfc8033cd22e59dc3b0e1084c2abb1, 5fcaa9633c79ee0fe0b92d1a50e0c855a7a339ac, 60a10913c7209c169c08cc95415501228ed6c190, 61b9de7fcc3e50533afbe6684bfadc8a7a3116e4, 62d0408d04580c9269f18efc5f6ef77b138d6c07, 667422e49dd772521d98afdb5e3d1b28932ef92e, 67b720c373f2f419c1a9dfa9076623676d0d9e9a, 6911ebd9335115c217ad996c66d3cf283b03503d, 6933371ae2bf4cf4fa5af8fb22b8d7a5afdf1334, 6a46ddaa83ca62ba5051741b9c7d3ca0821b7592, 6a482d405135104991292e75b1c1483463a3fc64, 6aa4a534ced10e137992ff514fbdccc590032899, 6ab4ea8808fbeca07b627d93b4623ed7a8c855f1, 6b01128dd88845de610cbcc95b61930cefab5fdd, 6e6416fe7df1febc384301d1e57d6d6d0fe419a5, 70fd70c3b07899c472724e08af492c07fba02f4f, 716142789814a181bd0b207e36255c0eacae3918, 71f5b45a7ea86737fd83e7af3edc549244e1143a, 73b20663a3e8605c09c11842809d78cce829eb0e, 73dcf1d461b0d2b3ebeee56c61458475e2c22575, 74083896f0c74c87b8e951880b40b98edd0829ab, 746620fd7a2e95935afbe299ded82fd88c108ca7, 746cfd19100f7c33e3c459d68fa98849bfb4774c, 78aee77335e800a51d7bce8cfd8d7da272e32750, 7a0304bbde9782b6a903c67b0ebc4684aff21692, 7a39bf8e572fce19a18909f3d022b231e0e14eb7, 7add61312ddd21f524c253a67ae2d85be4f99d19, 7b5b190ca5778fa1d3116734c0cbc1ccdb883817, 7ce96efdf37c1b98b7f801363dd4c639a46663a2, 7dcf458ce124b1ef88ab456c052a5989c213818a, 7e01e044c480c7e3647be88da1b8741e3304a561, 7e55a5e24829ab196ff26f6d8ee40d2c9ff45343, 82f96da4cf96d076848e7358f6dd24c089bbf5e2, 83bf02af6b681182a274c0d60e35b5bf3cdcfefa, 86819f74f2c0c97a69266cb0a17c63bb31b9651a, 86b1d3712644631b1b363e74a393816646232816, 87c22069e002f28cd5ae615c8d603b8e4c67a817, 87c46a3997de4c5c8b51bab0e3b5021726237fac, 8a2ac011763b06aaf566d23892391e563bda7c36, 8b1a06de6635be56009d8eec236bdad18734f9ab, 8b264896adeca78c1bd653c288321800a16e1f95, 8b53f692a1bbc0be65cfc161f0cf90c6be3c698e, 8c69d88224b6b7a1e3069ad44e07dcf6c1fc9696, 8e88e49530b464e5d22a03b57cd47b03d5af30d9, 8ea2556c2e0b3a36acbaf6397977cd9888ebc222, 8f812048e7471867c2322481a3c4ebdcbe9fb8d6, 8fe92eb9e875a51629dd48660cf6d3fbbf28df01, 901151376b9c44b8d25dfa55d9e35a6862bcd808, 90a3fba12c7c394b5b6e60d68f5fc0dea8a1994f, 90d272a5e53d9d128e826216742ab7e149055e72, 916a5f26c3ae694620dd69c3d9c807907982aaf4, 916ad2a01cef76047ef622e7701f79c671710202, 92bc8caa5a736faaa9a576763cd8fa04ce627702, 953491446afeb169c0247c3afe9df83ff1c3c860, 96342bf9937286e863fb794ed3a74dd18e8dfc07, 971715a2a50fd2ec54a50f2679fc4cbca2306fc0, 9812aac1de9c57b006cb3355ec3cc1d879c8e3b6, 9891b0fae7769adbe3fb986748d5dc84202169cc, 991ba17dc340c3a33dded6199ee2529a06b41674, 994a072c85febd71f65ca470b0fbf6fafce64b38, 99a80f47cf5439877088c23b061331ddac8f346f, 99b88373d48273c2a2d2e9ac4b4680f19312f3aa, 9a020d9727e3ef215c5aba35e68ec420ce892d78, 9a084686fb5dd62aefd59a9c8bddb07e8eb6fbe9, 9a18401c7d8aff223c5b0cd7d4ee6a989afdbf63, 9bef50f330c4f6bbd62897b320847418688afe10, 9d3d7573979e22fb11da05db3ec004b18aae08d5, 9fe95bc153e64854c8c3c11ff406f8df1db5b00c, a02ed8ef30323f3cdd54df42d564a035ab52317e, a16281e36ac1376268f90f8c9656dcafb02f418b, a301153605eee5a2ffb80728d9c8d4d122026e76, a3a8e75f7b6c66373a38820296f1837026988734, a3e7690e1af94641351aab1e2203674dcd5c768a, a3f3b9ce5e89ccb36de9566d4f12b0c495554a18, a4c70c1803b9a81f88c967b738c36830c8555a66, a5e35d3b9ef6766bac1d66103788c5595d47953c, a6a0452dded3a963fa403fc5ade9a89acf92bb74, a845202d5040185974d1a986eb42380d4c1662f6, aa23a65caddade19ade5c99122dff8a5bd5ec513, aa7f08a8def57c9adfa04174d0730139303fb9a1, ab0eb4dbc78441868951a03d0cc639ec8eaf2e8d, ab6557c3b350facfef4abbd351365368e38017c5, ac1bf32b2ebe1cb70622fa3fdc65a066001e16e4, ad14acc3862e0ef5a096d6f744358131a8be0fae, ad5869daa3a63889f953158f84e0f1a99de2c516, ad77ae6f47d60a5218d5fcab7fcd0fc7ddfc5d44, ae33843dfe79475f3f58374a16eec7b175392d3b, ae908e3dab4a228b03b2e32156ace35e7bad79ce, b146df7b3b0b162e2d5e4aa9cdffce21c854b541, b179f7979143d2ce07f3837099fd2940506d4f12, b1f3ad0a7e4b8173baf9866d39807ceab0fa4ffe, b269c1d6c4e2aea61ee7d8358e2f1a2408adf7df, b314482e6346be36a4fae3a965dc4d21be5af020, b42b7fb966498104e726eb675065a7590d765aa8, b730bd077801f57a7e827ea00ec7fd964dfbaf7b, b7fa31a6da1c95e599ce3078404b3efa4668a6bb, b84bb9c557f5fa4168b09d93119b074d40df2d6b, b9702d3ca9894f2cab51de43901b7f4c4a658eab, ba79071ba7628916b4ced6ccb93d7fba82272f9a, bae1bf585ed8abd948f7b2a0f337da4d1a31b5e5, bcf22c449c1dadef96bc6042bcc18d20b4db2965, bd2d6aa6ed5f3e394ea651693b6b9c28058ab370, be8590abce6219aa6581df3d9411ecbbaa73e692, c1f03e0e76ddce47826572a91865a946fdf01204, c53b91501151fa4bb820456b5ea1253cffb5070a, c6249d3c4ea9dfbef0156c4dcf3999b0274ef270, c70c8fec3387e5f32a798c0f697ce72df45b2b0c, c71993c4c1e92a88059d1a278e29968af3aa84b2, c789b6cc93f298cf7cce2975b53a970c9c5ee3bf, c9d40e5f7effe57a16e6dfaef8aace617c82bd31, caefe957befb93e0d20e9d1b4a114c574321be89, cceca9475b29b0afe273fe1e00332e7d3ec52552, cdb2b23a7cfe9b8776e757d67f094bbfebc02de3, cdcfd4f8dfd5b815eed2b328899d1e55d8d6582d, ce8060e2401ca49e9445122f57b467c07b8e4686, ce9d108c0d0bf5a75c965b4cb04cb38b786108d4, cf7c56e73b9dd670b500ae5d50f6d37a633794d1, cfce69a52a25fd4924892dc1a1838bb196c1e3e8, cfd72a92e2ddec0954dd43df5c06fe702673e606, d11e9df40727d3ae453309c681654f07701a44e1, d14d888744c49f7a7e67e5abc0955ccec2fc31b0, d3af0cd42892e7075c31be4fd08271640c91ab90, d53651fdc3a0c3cf42b83b3d20327be3b810aff0, d8447113afb073a363aebaeea377b3d0a151f65c, d933d97e6725132ac717da4d21e3043d6406c8a8, d9357152d648bcd9f83c4bd66e22187437f19d3a, d93fc7c8b82719f0538ee33102fba689e562187e, d9998997d0186467de88c41308df1351d64825d1, dac0bfc8b9983ff1bff649d1648c8f9e30c8cb68, dad2d61356bd57d7212e81d1f1b47f5153300e07, dad97925ad91943de87879b00ec45be1ab6c29da, dc4a4579cf784be3bba98a1ab2dd08d0c00a4cb1, dd6c262538f5452a0dd343ce05eff7d0b463bbdf, dee343519ad4a9b6c8a7be36b2c9c95a17a3a347, e0b041f5ce0e4458782734dba455cc7c22927cbf, e0fe2ab98dfad287feb9b08adfcf7ea6632e7c76, e1627ed04f36c396f8d3a80ba2211429934b1e49, e1d399818a2960b83184934e9c2f431e53fb88bc, e43ad112bda98d4bd8c8c247cb37110d6e56a7a1, e7f7b50b8eb4d52d60e33b2753c969518db223ae, e8bb49debb66c90f3c82e1e2102b423889eb4560, ec381ffa97255fe6fe32f3e1c4cca0876b1c17c8, ec49820ad8ac06a60300ac77a0d0d444f2e07269, ed3525c36d61601a36e6f5908f1103ed397f111e, ed4ff3cc664afea95b072af39b750e8bf6e4d7dc, edbabb8d170d795ed9b7452e4f895e3d658f1868, ef5f6cf6c7869ee6f2cb46430e0e9e9dc0a60376, efa8335bad0bf75a130f61f7944d86ab253cba42, f0ccc91433b7e6b6d47d9813cf6d9d86a9a28baf, f12a2492385d382c11133c37265e4c3082f3b018, f15759160ee919a9f41c6adc7f68937fe8fa879f, f1936d99858a7facd6ee922073479a606844522b, f235cb9abde5e88fa647f4b41370c84e56ce3099, f39470c88f34fb639d291b59db595b1ab19a2900, f3a028991baf032ddcb62f03276f030875675e13, f48be90c73ddb5a0e273d4012ae20350495314ab, f7fa8e5b4cebb4f83b3a15b8bc72251094785eee, f80239f9376dfe08c35756910caadd49eaeae300, f81607d4db058c20c5441f8a11b56c5190feae89, f92a7fa4650d13b86693f32631ef4b6108f00125, f9e34ab400bac027b10d1262966e66fbdea7751b, fc6587c6b75c5a0ca4cf9ebd6ee1c01ac13ebb6b, fd9de8e9ea59d972e9f0e63a6c3acbca03a7e5cb, fe057c5e80b78a81f0f579b39a9cb11d78fd90a2, fe977e8a2a03396d1a057a30cb02db88811573f5, ff9a074df4c5f96c728aab29e3710fc31183694b |
| Victim Industries: | Advertising Services, Financial Services, Information Technology, Software, Technology Hardware |
Mitigation Advice
- Block the domain `solananetworkinstance[.]info` at the network perimeter firewall and in DNS filtering services.
- Scan all developer workstations and CI/CD build servers to detect the presence of the malicious NuGet packages: `Netherеum.All`, `SolnetPlus`, `Coinbase.Net.Api`, and `GoogleAds.API`.
- Create a detection rule in your SIEM to generate a high-priority alert for any network traffic to or from the domain `solananetworkinstance[.]info`.
- Instruct all .NET developers to immediately review their projects' dependencies for any packages published by the authors `AngelDev`, `DamienMcdougal`, or `jackfreemancodes`.
Compliance Best Practices
- Establish a formal policy for vetting and approving third-party libraries, requiring developers to check package age, author history, and source code repository activity before use.
- Integrate a Software Composition Analysis (SCA) tool into the CI/CD pipeline to automatically scan dependencies for known vulnerabilities, malicious code patterns, and suspicious package attributes.
- Implement a private internal artifact repository (e.g., private NuGet feed) to host only company-vetted and approved third-party packages.
- Develop and mandate recurring security awareness training for developers that specifically covers software supply chain risks, including how to spot typosquatting, homoglyph attacks, and manipulated package metrics.
- Enforce the use of a centralized secrets management vault for all credentials and API tokens, and restrict CI/CD pipeline access to only the specific secrets required for a given build job.
Stay updated on emerging threats: sign up for the F5 Threat Report to receive the Weekly Threat Report in your inbox.
Help guide the future of your DevCentral Community!
What tools do you use to collaborate? (1min - anonymous)