F5 Threat Report - September 22nd, 2025

BlackLock Ransomware Targets Windows, Linux, and VMware ESXi Systems

BlackLock, a ransomware group formerly known as El Dorado, has been active since March 2024, with its Dedicated Leak Site (DLS) exposing victim data since June 2024. This Go-written ransomware targets Windows, Linux, and VMware ESXi systems, enabling affiliates to compromise diverse environments globally, including U.S. enterprises, government agencies, and various industries across South Korea, Japan, and Europe. Operating under a Ransomware-as-a-Service (RaaS) model, BlackLock employs the ChaCha20 stream cipher for encryption, generating unique 32-byte FileKeys and 24-byte nonces for each file, and utilizes an Elliptic Curve Diffie-Hellman (ECDH) key exchange with secretbox.Seal() to secure metadata. It features stealthy backup deletion by crafting a COM object to execute WMI queries from memory via embedded shellcode, targeting Volume Shadow Copy Service snapshots and the Recycle Bin. Encrypted files are renamed with random extensions, and a ransom note titled `HOW_RETURN_YOUR_DATA.TXT` is left behind. Organizations are advised to implement layered defenses, maintain offline backups, ensure robust monitoring for unusual activity, prioritize patch management, segment networks, and regularly test backup integrity to mitigate this threat.

Severity: Critical

Sources

Threat Details and IOCs

Malware:BlackLock, Eldorado, El Dorado
Technologies:Microsoft Windows, VMware ESXi, Linux
Threat Actors:Eldorado, BlackLock
Attacker Countries:Russia, China
Attacker IPs:173.44.141.152
Attacker Emails:sopajelessei-5488@yopmail.com
Attacker Domains:yopmail.com
Attacker Hashes:1375e5d7f672bfd43ff7c3e4a145a96b75b66d8040a5c5f98838f6eb0ab9f27b, 7f21d5c966f4fd1a042dad5051dfd9d4e7dfed58ca7b78596012f3f122ae66dd, b2266ee3c678091874efc3877e1800a500d47582e9d35225c44ad379f12c70de, f392807da3ee1f3e9702ce5fa91d418d
Victim Industries:Consulting, Real Estate, Manufacturing, Healthcare, Construction, Public Administration, Financial Services, Government, Educational Services, Finance, Retail, Transportation, Hospitality, Defense, Arts, Entertainment, and Recreation, Professional Services, Technology, Education
Victim Countries:Spain, Argentina, Croatia, Italy, Aruba, Congo, United Arab Emirates, Puerto Rico, France, United Kingdom, Netherlands, Peru, Brazil, Germany, Japan, Canada, South Korea, United States

Mitigation Advice

  • Use endpoint management or security tools to scan all Windows, Linux, and ESXi systems for the presence of the ransom note file named 'HOW_RETURN_YOUR_DATA.TXT'.
  • Immediately verify that recent backups for critical Windows, Linux, and VMware ESXi systems are stored offline or in immutable storage, and confirm they are not accessible from the production network.
  • Configure security monitoring tools (like SIEM or EDR) to create high-priority alerts for processes using WMI to delete Volume Shadow Copies (vssadmin delete shadows, wmic shadowcopy delete).
  • Audit all open SMB shares on the network and apply the principle of least privilege, restricting write access to only authorized users and services.

Compliance Best Practices

  • Initiate a network segmentation project to isolate critical infrastructure, such as VMware ESXi hosts and database servers, from general user workstations and less-trusted network zones.
  • Establish a formal policy and schedule for regularly testing backup integrity and the full restoration process for critical systems.
  • Enhance Endpoint Detection and Response (EDR) policies to enable and tune detection for in-memory shellcode execution and anomalous process creation originating from WMI.
  • Develop and implement a security hardening baseline for all VMware ESXi hosts, ensuring unused services are disabled and management interfaces are restricted to a dedicated, secure network.
  • Implement a comprehensive patch management program to ensure timely application of security updates for all operating systems (Windows, Linux) and hypervisors (VMware ESXi).

Fortra Releases Critical Patch for CVSS 10.0 GoAnywhere MFT Vulnerability

Fortra has disclosed a critical deserialization vulnerability, CVE-2025-10035, in the License Servlet of its GoAnywhere Managed File Transfer (MFT) software, which carries a CVSS score of 10.0. This flaw allows an attacker with a validly forged license response signature to deserialize arbitrary actor-controlled objects, potentially leading to command injection and arbitrary command execution. Successful exploitation requires the system to be publicly accessible over the internet. While no in-the-wild exploitation has been reported for this specific vulnerability, it impacts the same license code path in the Admin Console as the previously exploited CVE-2023-0669, which was abused as a zero-day by ransomware groups like LockBit. Another critical vulnerability, CVE-2024-0204, was also addressed last year. Given that thousands of GoAnywhere MFT instances are internet-facing, immediate weaponization is anticipated. Users are strongly advised to update to version 7.8.4 or Sustain Release 7.6.3. If immediate patching is not feasible, restricting public access to the GoAnywhere Admin Console is recommended.

Severity: Critical

Sources

Threat Details and IOCs

Malware:Clop, Cl0p, CryptoMix, Cobalt Strike, BEACON, Agentemis, Clop Ransomware, LockBit, ABCD, LockBit Black, LockBit Red, LockBit 2.0, LockBit 3.0, CIop, TA505, FIN11, Water Selkie, CryptoMix Clop, ClopReadMe, Black Basta, ABCD ransomware, Lace Tempest
CVEs:CVE-2024-0204, CVE-2023-0669, CVE-2025-10035
Technologies:Fortra GoAnywhere MFT, Progress MOVEit Transfer, Accellion File Transfer Appliance, Cleo Integration Cloud
Threat Actors:Storm0506, EvilCorp, LockBit, FIN11, Cl0p, GracefulSpider, GoldTahoe, Unc4393, Chimborazo, TA505, Stac5143, GoldRebellion, SpandexTempest, LaceTempest, BlackBasta
Attacker Countries:Russia, China
Victim Industries:Mining, Information Technology, Manufacturing, Healthcare, Consumer Goods, Media & Entertainment, Energy, Utilities, IT, Logistics, Financial Services, Government, Retail, Insurance, Hospitality, Aviation, Technology, Telecommunications, Education, Banking, Public Sector
Victim Countries:Cyprus, Switzerland, Italy, Hungary, China, Luxembourg, Czech Republic, Sweden, United Kingdom, Netherlands, Romania, Austria, Australia, Ireland, Germany, Canada, Portugal, Finland, Malta, Lithuania, Spain, Bulgaria, Croatia, Latvia, Slovenia, Greece, India, Belgium, France, Estonia, Slovakia, Poland, Japan, Denmark, Czechia, United States

Mitigation Advice

  • Immediately patch all Fortra GoAnywhere MFT instances to version 7.8.4 or Sustain Release 7.6.3.
  • Configure firewall rules or network access control lists (ACLs) to block all public internet access to the GoAnywhere MFT Admin Console.
  • Perform an immediate vulnerability scan of all internal and external network ranges to identify every instance of GoAnywhere MFT software.

Compliance Best Practices

  • Establish a formal patch management policy that mandates applying critical and zero-day patches for all internet-facing systems, including GoAnywhere MFT, within a 48-hour service level agreement (SLA).
  • Implement a zero-trust access model requiring all administrative access to critical infrastructure, including the GoAnywhere MFT console, to originate from a secure, multi-factor authenticated session via a VPN or SASE solution.
  • Initiate a formal risk assessment of the Fortra GoAnywhere MFT platform, comparing its security history and total cost of ownership against alternative managed file transfer solutions.

CISA exposes malware kits deployed in Ivanti EPMM attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released an analysis of malware kits used in attacks exploiting Ivanti Endpoint Manager Mobile (EPMM) vulnerabilities. These vulnerabilities include an authentication bypass (CVE-2025-4427) and a code injection flaw (CVE-2025-4428), affecting Ivanti EPMM versions 11.12.0.4, 12.3.0.1, 12.4.0.1, 12.5.0.0, and earlier releases, which Ivanti patched on May 13. Threat actors exploited these as zero-days by targeting the `/mifs/rs/api/v2/` endpoint with HTTP GET requests, using the `?format=` parameter to send malicious commands for reconnaissance, system information collection, network mapping, file fetching, and LDAP credential extraction. CISA identified two distinct malware sets, each containing a `web-install.jar` loader and malicious listeners (Set 1: `ReflectUtil.class`, `SecurityHandlerWanListener.class`; Set 2: `WebAndroidAppInstaller.class`). These components were delivered in segmented, Base64-encoded chunks via separate HTTP GET requests, designed to inject and execute arbitrary code, exfiltrate data, and establish persistence. CISA recommends that organizations finding this malware isolate affected hosts, collect artifacts, create forensic disk images, immediately patch Ivanti EPMM systems, treat mobile device management (MDM) systems as high-value assets, and utilize the provided Indicators of Compromise (IOCs), YARA rules, and SIGMA rules for detection.

Severity: Critical

Sources

Threat Details and IOCs

Malware:KrustyLoader, Atomic macOS Stealer, AMOS, Atomic Stealer, SilentSync
CVEs:CVE-2025-4428, CVE-2025-4427
Technologies:Apache Tomcat, Oracle Java, Linux, Google Android, Apple macOS, Apple iOS, Ivanti Endpoint Manager, Microsoft Windows
Threat Actors:CondeTgapIs, AtomicMacOSStealer, AmosStealer, Unc5221, ChinaNexusThreatActor, Uta0178, SilentSyncRat, VaneViper
Attacker Countries:China
Attacker IPs:77.221.157.154, 103.244.88.125, 82.132.235.212, 37.219.84.22, 88.194.29.21, 27.25.148.183, 83.229.126.234, 91.193.19.109, 47.120.74.19, 100.26.51.59, 150.241.71.231, 75.170.92.132, 5.181.159.149, 45.38.17.43, 185.174.137.26, 46.41.134.8, 79.96.45.181
Attacker URLs:/mifs/rs/api/v2/featureusage
Attacker Hashes:e33103767524879293d1b576a8b6257d, c2046523f1cb487a473b0a46a5a4a957f1b3200a, c1f60ca5a5f7b94ab7122718a44b46de16c69d22c2eb62ce2948cab14bc78d50, 004b71ebeb4808b6dfdc4e58b95c4b307985c08118c45c02a34cd56ff697259199698989af0725d63802dfc785a72e416d2db5875edd1a0fa80ae01a282b2007, 6ec2169312feb9fde0b17e244b32c37d, 6d7e85862f925e83f6d0c29e291765548fac721a, 065c1c2fb17ba1c3f882bead409215df612673cd455698768ed71412f9190ba3, 4cd26b298b448db6b26d91b8cf7ac169d693a0dad4f184742463db872b809b91d462ab4659bb21474578e3202bfc92b0db18716db6b4c3c24b3f9e7f2fccce27, 5e9d283b483b8d5c637baf7cfdda0e08, 8b87a881f6f81afb596d3f98abef4225315e26bf, b1b1cf33b8d3da35293d6b74c378f0cd9452a4351e26d07c896c4d9a8257ef89, 07956b3a830bd0885202d9bc7a5b5a5927acf1c5584830ebc1011849f41b1077c3d6e3c2a6e94e36a338fc6b540c4b736751775e7069df4b257fa3786c1140a2, 32f5c3c1582a77c004b1511c77454678, 2a96ce17ed8a025dd72f3729c247dfdb5b0a19a4, b618057de9a8bba95440f23b9cf6374cc66f2acd127b3d478684b22d8f11e00b, ec3880dfdc23a06cc1d97153963c3b0bd64db0469069e8dc3395101d12c65bcdcf87e5eac967ddf0b6be7e1dd6e8faaa233224f9f76a90f44f0e9df320d051a3, 8387a7ce9f2520d8956747fd247b19af, 9808ab3ddfb9ab4fe3af1b5d1f6a638bc03788e0, df501b238854d6579cafebeba82581a728e89ed1f6cd0da54c79ef4eb6f4f9fd, a51943a8381e67aca4b8296c9df0b05450525b5b27efbf873fd54a7f68febb503e1eb088d287e3561137fd33d3772dd879a3f00b09285a67f215f7a420e7ffcd, 1b1dda5e8e26da568559e0577769697c624df30e, ac389c8b7f3d2fcf4fd73891f881b12b8343665b, 19b4df629f5b15e5ff742c70d2c7dc4dac29a7ce, f780151c151b6cec853a278b4e847ef2af3dbc5d, dce8faf5fcf5998b6802995914caa988ee1ebd92, aa2cfeeca6c8e7743ad1a5996fe5ccc3d52e901d, 2bd61ce5bdd258c7dcbef53aedb1b018b8e0ae26
Victim Industries:Healthcare, Financial Services, Government, Defense, Aviation, Telecommunications
Victim Countries:Cyprus, Italy, Hungary, Luxembourg, Czech Republic, Sweden, Norway, United Kingdom, Netherlands, Romania, Austria, Ireland, Germany, Portugal, Finland, Malta, Lithuania, Spain, Bulgaria, Croatia, Latvia, Slovenia, Greece, Belgium, France, Estonia, Slovakia, Poland, Japan, Denmark, United States

Mitigation Advice

  • Immediately patch all Ivanti Endpoint Manager Mobile (EPMM) systems to a version that addresses CVE-2025-4427 and CVE-2025-4428. The affected versions are 11.12.0.4, 12.3.0.1, 12.4.0.1, 12.5.0.0, and their earlier releases.
  • Ingest the file hashes and network indicators of compromise (IOCs) provided by CISA into your SIEM and EDR platforms to search for historical and current evidence of compromise.
  • Use the YARA rules published by CISA to scan the file systems of all on-premise Ivanti EPMM servers for the presence of the malicious malware components.
  • Implement the SIGMA rule provided by CISA in your SIEM to create an alert for detecting the specific malicious HTTP requests used in this attack.
  • If any indicators of compromise related to this threat are discovered, immediately isolate the affected Ivanti EPMM hosts from the network and begin incident response procedures.

Compliance Best Practices

  • Formally classify the Mobile Device Management (MDM) system as a High-Value Asset (HVA) and update security policies to mandate stricter access controls and monitoring for it.
  • Implement network segmentation to place the Ivanti EPMM system in a secured network zone, strictly limiting inbound and outbound traffic to only what is explicitly required for operation.
  • Enhance logging and monitoring for the Ivanti EPMM system by forwarding detailed application and system logs to a SIEM and creating baseline alerts for anomalous activity, such as unusual API calls or outbound data transfers.
  • Review and refine the organization's vulnerability management program to ensure critical, internet-facing systems like Ivanti EPMM are prioritized and that procedures are in place to apply emergency, out-of-band security patches within a defined, minimal timeframe.

Hackers Deploy New EDR-Freeze Tool to Disable Security Software

A new tool named EDR-Freeze, developed by researcher TwoSevenOneT, can temporarily disable endpoint detection and response (EDR) systems and antivirus software by exploiting Windows Error Reporting functionality. This user-mode technique leverages a sophisticated race condition, utilizing the MiniDumpWriteDump function from Windows' DbgHelp library to suspend all threads in a target process for memory snapshot creation. EDR-Freeze then triggers this dump process against security software and subsequently suspends the dumping process itself (WerFaultSecure.exe), leaving the security solution indefinitely frozen. It specifically targets WerFaultSecure.exe, a Windows Error Reporting component capable of running with Protected Process Light (PPL) privileges, and combines this with the CreateProcessAsPPL tool to bypass PPL protection. The tool successfully suspended Windows Defender's MsMpEng.exe process on Windows 11 24H2, accepting the target process ID and suspension duration as parameters. This method avoids traditional "Bring Your Own Vulnerable Driver" (BYOVD) attacks, making detection more challenging as it relies solely on legitimate Windows processes. To counter this, security teams should monitor WerFaultSecure.exe command-line parameters for suspicious activity, particularly when it targets sensitive system processes like LSASS, antivirus engines, or EDR agents, and consider implementing additional process protection mechanisms beyond standard PPL safeguards. The source code for EDR-Freeze is publicly available on GitHub for legitimate security research and red team exercises.

Severity: Critical

Sources

Threat Details and IOCs

Technologies:Microsoft Defender for Endpoint, Microsoft Local Administrator Password Solution, Microsoft Windows
Attacker Countries:Russia
Victim Industries:Retail, Critical Infrastructure, Hospitality, Healthcare, Energy, Financial Services
Victim Countries:United States

Mitigation Advice

  • Create a detection rule in your SIEM or EDR to generate a high-priority alert when `WerFaultSecure.exe` is executed with command-line arguments targeting the process IDs of your organization's EDR agents, antivirus engines, or other sensitive processes like LSASS.
  • Contact your EDR and antivirus vendors to inquire about their specific protections and detection capabilities against the EDR-Freeze technique that abuses `WerFaultSecure.exe` and `MiniDumpWriteDump`.

Compliance Best Practices

  • Evaluate and implement additional process protection and anti-tampering controls for critical security agents, going beyond the standard Windows Protected Process Light (PPL) safeguards.
  • Strengthen defense-in-depth by ensuring network security monitoring and host-based logging from sources other than the EDR (e.g., Sysmon, PowerShell logs) are aggregated and analyzed to detect suspicious activity even if endpoint security tools are disabled.
  • Incorporate adversary emulation exercises that specifically test for the bypass or disabling of security controls, using techniques like EDR-Freeze, to validate the resilience of your detection and response procedures.

Prompts as Code Embedded Keys | The Hunt for LLM-Enabled Malware

Large Language Models (LLMs) are increasingly being integrated into malware, presenting new challenges for detection due to their ability to generate malicious logic at runtime. Our research focused on identifying and understanding LLM-enabled malware by analyzing embedded API keys and specific prompt structures. We observed several adversarial uses of LLMs, including their use as lures, targets for prompt injection, tools for generating immature malware, external hacking sidekicks, and as embedded components within malware. Notable examples include PromptLock, a proof-of-concept AI-powered ransomware written in Golang that uses specific prompts to generate Lua scripts for data exfiltration and reconnaissance, and LameHug/PROMPTSTEAL, an APT28 information stealer written in Python that leverages HuggingFace API keys to generate system shell commands for data collection and exfiltration to a hardcoded IP address (144.126.202.227). While LLM-enabled malware complicates traditional signature-based detection and network traffic analysis, its reliance on hardcoded API keys and prompts creates new hunting opportunities. Our methodology involved wide API key detection using YARA rules for identifiable key structures (e.g., Anthropic's `sk-ant-api03`, OpenAI's Base64-encoded "OpenAI" substring `T3BlbkFJ`), which uncovered over 7,000 samples, and prompt hunting, where we searched for common prompt structures and used an LLM classifier to identify malicious intent. This led to the discovery of MalTerminal, an early LLM-enabled malware (Python scripts, Windows executables) that uses OpenAI GPT-4 to dynamically generate ransomware or reverse shells, identifiable by its use of a deprecated OpenAI API endpoint from before November 2023. We also identified other offensive LLM applications, such as people search agents, red team benchmarking tools, and LLM-assisted code vulnerability injection tools. This early stage of LLM-enabled malware development offers defenders a crucial opportunity to adapt detection strategies by focusing on these unique artifacts.

Severity: Critical

Sources

Threat Details and IOCs

Malware:PromptLock, LameHug, PROMPTSTEAL, MalTerminal, Rkor, LAMEHUG, Filecoder.PromptLock.A
CVEs:CVE-2022-30190
Technologies:Vercel, Netlify, OpenAI, Microsoft Windows, Hugging Face, Anthropic Claude, Python, Linux
Threat Actors:WormGPT, TsarTeam, BlueDelta, PromptLock, FROZENLAKE, FightingUrsa, FancyBear, UAC-0001, MalTerminal, APT28, Strontium, GrizzlySteppe, IronTwilight, PawnStorm, Sednit, HacxGPT, UAC-0028, LameHug, Swallowtail, Rkor, PromptSteal, FraudGPT, ForestBlizzard, Sofacy
Attacker Countries:Russia, China
Attacker IPs:144.126.202.227
Attacker URLs:https://huggingface.co/SushantGautam/vulnerability_ativ0.1/raw/main/script.py
Attacker Hashes:3082156a26534377a8a8228f44620a5bb00440b37b0cf7666c63c542232260f2, 3afbb9fe6bab2cad83c52a3f1a12e0ce979fe260c55ab22a43c18035ff7d7f38, 4c73717d933f6b53c40ed1b211143df8d011800897be1ceb5d4a2af39c9d4ccc, 4ddbc14d8b6a301122c0ac6e22aef6340f45a3a6830bcdacf868c755a7162216, 68ca559bf6654c7ca96c10abb4a011af1f4da0e6d28b43186d1d48d2f936684c, 75b4ad99f33d1adbc0d71a9da937759e6e5788ad0f8a2c76a34690ef1c49ebf5, 854b559bae2ce8700edd75808267cfb5f60d61ff451f0cf8ec1d689334ac8d0b, 943d3537730e41e0a6fe8048885a07ea2017847558a916f88c2c9afe32851fe6, b2bda70318af89b9e82751eb852ece626e2928b94ac6af6e6c7031b3d016ebd2, c1a80983779d8408a9c303d403999a9aef8c2f0fe63f8b5ca658862f66f3db16, c5ae843e1c7769803ca70a9d5b5574870f365fb139016134e5dd3cb1b1a65f5f, c86a5fcefbf039a72bd8ad5dc70bcb67e9c005f40a7bacd2f76c793f85e9a061, d1b48715ace58ee3bfb7af34066491263b885bd865863032820dccfe184614ad, dc9f49044d16abfda299184af13aa88ab2c0fda9ca7999adcdbd44e3c037a8b1, e88a7b9ad5d175383d466c5ad7ebd7683d60654d2fa2aca40e2c4eb9e955c927, 09bf891b7b35b2081d3ebca8de715da07a70151227ab55aec1da26eb769c006f, 1458b6dc98a878f237bfb3c3f354ea6e12d76e340cefe55d6a1c9c7eb64c9aee, 1612ab799df51a7f1169d3f47ea129356b42c8ad81286d05b0256f80c17d4089, 2755e1ec1e4c3c0cd94ebe43bd66391f05282b6020b2177ee3b939fdd33216f6, 7bbb06479a2e554e450beb2875ea19237068aa1055a4d56215f4e9a2317f8ce6, b43e7d481c4fdc9217e17908f3a4efa351a1dab867ca902883205fe7d1aab5e7, e24fe0dd0bf8d3943d9c4282f172746af6b0787539b371e6626bdb86605ccd70, 165eaf8183f693f644a8a24d2ec138cd4f8d9fd040e8bafc1b021a0f973692dd, 2eb18873273e157a7244bb165d53ea3637c76087eea84b0ab635d04417ffbe1b, 384e8f3d300205546fb8c9b9224011b3b3cb71adc994180ff55e1e6416f65715, 5ab16a59b12c7c5539d9e22a090ba6c7942fbc5ab8abbc5dffa6b6de6e0f2fc6, 5f6bfdd430a23afdc518857dfff25a29d85ead441dfa0ee363f4e73f240c89f4, 766c356d6a4b00078a0293460c5967764fcd788da8c1cd1df708695f3a15b777, 8013b23cb78407675f323d54b6b8dfb2a61fb40fb13309337f5b662dbd812a5d, a30930dfb655aa39c571c163ada65ba4dec30600df3bf548cc48bedd0e841416, a32a3751dfd4d7a0a66b7ecbd9bacb5087076377d486afdf05d3de3cb7555501, a67465075c91bb15b81e1f898f2b773196d3711d8e1fb321a9d6647958be436b, ae6ed1721d37477494f3f755c124d53a7dd3e24e98c20f3a1372f45cc8130989, b3fcba809984eaffc5b88a1bcded28ac50e71965e61a66dd959792f7750b9e87, b49aa9efd41f82b34a7811a7894f0ebf04e1d9aab0b622e0083b78f54fe8b466, bb2836148527744b11671347d73ca798aca9954c6875082f9e1176d7b52b720f, bdb33bbb4ea11884b15f67e5c974136e6294aa87459cdc276ac2eea85b1deaa3, cf4d430d0760d59e2fa925792f9e2b62d335eaf4d664d02bff16dd1b522a462a, d6af1c9f5ce407e53ec73c8e7187ed804fb4f80cf8dbd6722fc69e15e135db2e
Victim Industries:Government, Industrial Control Systems, Defense
Victim Countries:United Kingdom, Ukraine, France, United States

Mitigation Advice

  • Add the file hashes for MalTerminal, PromptLock, and LameHug listed in the article to your EDR, antivirus, and SIEM blocklists to prevent and detect these specific threats.
  • Block the IP address 144.126.202.227 at the network perimeter firewall and create a detection rule to alert on any internal systems attempting to communicate with it.
  • Use file scanning tools or YARA rules to hunt across endpoints and code repositories for hardcoded LLM API keys, using patterns mentioned in the article such as the prefix "sk-ant-api03" and the Base64 string "T3BlbkFJ".
  • Create and run searches across file systems and code repositories for suspicious prompt structures, such as JSON containing `{"role": "system", "content": "You are a cybersecurity expert..."}` or other keywords like "reverse shell" and "vulnerability injector".
  • In your network monitoring tools, create alerts for new or unauthorized internal devices communicating with common LLM API endpoints, such as those for OpenAI, Anthropic, and HuggingFace.

Compliance Best Practices

  • Develop and enforce a corporate policy that governs the acceptable use of public and private Large Language Models (LLMs) and their APIs in software development and daily operations.
  • Implement a centralized secrets management solution, such as a credential vault, and mandate its use for all API keys, including LLM keys, to prevent them from being hardcoded in applications.
  • Configure perimeter firewalls with strict egress filtering rules to only allow pre-approved servers to communicate with external LLM API endpoints, denying all other outbound connections to these services by default.
  • Deploy an application allow-listing solution on endpoints to prevent the execution of unauthorized applications and scripts, thereby reducing the risk of unknown malware execution.
  • Update the security awareness training program to educate developers on the risks of hardcoding API keys and to teach all employees how to identify social engineering lures that abuse AI themes.

Updated Sep 24, 2025
Version 3.0
No CommentsBe the first to comment