Cybersecurity Brief

Static Tundra Espionage, Warlock Ransomware, macOS Stealer

Coverage: 20 Aug 2025 (UTC)

Incidents

A new analysis from Talos details a long-running espionage operation it calls Static Tundra, attributed to a Russian state-sponsored actor linked to the FSB’s Center 16 and likely related to the Energetic Bear grouping. The actor prioritizes intelligence collection by compromising routers and switches—often unpatched, end-of-life hardware—across telecom, higher education and manufacturing, with notable focus on Ukraine and allied entities. Observed access vectors include exploitation of CVE-2018-0171 (Smart Install), weak or compromised SNMP community strings, and credential guessing. Post-compromise, the operators pivot with harvested credentials and SNMP, create local accounts, enable remote services (including TELNET when present), and modify ACLs and TACACS+ to reduce logging. For persistence they abuse SNMP and deploy firmware implants such as the SYNful Knock IOS implant, and exfiltrate via GRE tunnels, NetFlow collection, and TFTP/FTP including CISCO‑CONFIG‑COPY‑MIB. Talos urges patching or disabling Smart Install, replacing end‑of‑life gear, enforcing strong passwords and SNMPv3, disabling Telnet, enabling MFA and encrypted management, centralizing configuration storage, and auditing device auth/command logs and NetFlow for anomalies.

Extortion pressure continues to intensify. Fortra profiles the Warlock ransomware operation, active in 2025 with double‑extortion tactics and claimed intrusions at public‑sector and critical service organizations. The post cites reported victims in Portugal, Croatia and Türkiye, and describes alleged data from a recent Colt Technology Services incident offered for sale via the group’s leak site. While analysts link some intrusions to exploitation of software flaws—including a tracked SharePoint issue—Fortra emphasizes that phishing, credential theft, misconfiguration, and other unpatched vulnerabilities remain probable entry points. Recommended defenses include timely patching, multi‑factor authentication, modern endpoint and network protections, offline backups, least‑privilege hardening, encryption of sensitive data, and regular training and incident response exercises.

On macOS, CrowdStrike reports blocking a campaign by the cybercriminal group COOKIE SPIDER that attempted delivery of SHAMOS, a derivative of the Atomic macOS Stealer. The delivery chain relied on malvertising to lure users to fake help pages instructing execution of a one‑line command that Base64‑decodes and retrieves a Bash script, which then fetches a Mach‑O stealer binary. SHAMOS runs from /tmp, strips extended attributes to evade Gatekeeper, performs anti‑VM checks, uses AppleScript and host reconnaissance to harvest browser data, Keychain items, cryptocurrency wallets and Apple Notes, and exfiltrates archives (notably out.zip) via curl. It may also pull spoofed installers and attempt persistence via LaunchDaemons when privileged. Falcon detections disrupted activity at download, execution, and exfiltration stages; indicators include malvertising domains, script and binary hashes, and a fake GitHub repository.

Research

Side‑channel risks to shared infrastructure resurfaced with a practical advance on speculative‑execution attacks. A Kaspersky summary of a Google research paper describes enhanced Retbleed exploitation on AMD Zen 2, achieving roughly 13 KB/s of accurate memory reads and demonstrating methods to bypass certain Linux kernel mitigations in realistic settings. The approach adapts Speculative ROP to evade Spectre v2 defenses and, while technically demanding, raises concern for multi‑tenant cloud settings where co‑resident workloads could be at risk. The write‑up notes that the most significant limitation is the need to know or infer kernel configuration, yet many systems use common builds, making reconnaissance feasible. As a precaution in sensitive contexts, some AMD Zen 2 servers have reportedly been removed from specific client‑executed workloads.

In alignment safety, Unit 42 introduces Logit‑Gap Steering, a framework and test method showing that alignment training often increases the probability of refusal tokens without eliminating unsafe pathways. The research demonstrates efficient suffix‑based jailbreaks that close the refusal‑affirmation logit gap and recover harmful outputs across several open models, with high attack success rates in tests. The authors propose using the logit gap as a diagnostic metric and recommend defense‑in‑depth—combining improved alignment with external filtering and runtime monitoring—rather than reliance on internal alignment alone.

Platforms

Cloud platforms emphasized customer control and safer collaboration. AWS added Customer Managed Keys support to Amazon Managed Service for Apache Flink, enabling organizations to apply their own key policies for Flink state stores, checkpoints and persisted artifacts, with full CloudTrail auditability and governance aligned to internal and regulatory requirements. Separately, AWS introduced configurable error message behavior for PySpark analyses in AWS Clean Rooms. Detailed diagnostics are available only when all collaboration members approve, preserving the service’s privacy model while speeding development and troubleshooting for joint analytics.

Cost governance also received attention: AWS made Billing and Cost Management Dashboards generally available, consolidating cost, usage, and coverage/utilization insights into customizable, shareable views at no additional charge in commercial Regions (excluding China). The dashboards centralize FinOps workflows and help surface savings opportunities across accounts.

Vendors continued to blend security tooling with AI‑era workflows. Check Point announced a Harmony SASE MCP Server that exposes curated endpoints via the Model Context Protocol, allowing AI and IDE assistants to retrieve SASE telemetry and policy context with controls for filtering, rate limiting and logging. Fortinet, in a perspective on converged architectures, outlined its unified SASE approach pairing FortiSASE with Secure SD‑WAN and centralized management, arguing for consistent enforcement and simplified operations across edge and cloud; details are in Fortinet.

Looking ahead to cryptography and agent tooling, Microsoft outlined progress and a phased roadmap for post‑quantum cryptography adoption, emphasizing crypto‑agility, hybrid deployments to counter “harvest now, decrypt later,” and alignment with public guidance and standards efforts. In parallel, Azure described enterprise patterns for tool‑centric AI agents, highlighting MCP support, governance via API Management and API Center, and identity controls such as Entra Agent ID for secure, auditable integrations.

Policies

On the public‑private front, CISA is convening partners to close a national “software understanding” gap that leaves critical infrastructure exposed. Recent reports from interagency and national lab collaborators call for software manufactured for analysis—structuring artifacts beyond source code so independent verification and validation are feasible at scale and under adversarial conditions. The initiative seeks sustained research, shared standards and scalable capabilities, with invitations for software analysis professionals and mission owners to participate.

Collaboration dynamics within industry are also under review. A Palo Alto discussion recounts how coordinated sharing during major incidents can correct misconceptions and accelerate response, while noting cultural, legal and prioritization barriers that impede routine exchange. The perspective argues that sharing raw indicators rarely dilutes competitive advantage and that clear guardrails—antitrust statements, embargo protocols, and equal treatment—can build trust for timely, systematic cooperation.

These and other news items from the day:

Wed, August 20, 2025

Static Tundra: Russian State Actor Targets Cisco Devices

🔒 Cisco Talos identifies the threat cluster Static Tundra as a long-running, Russian state-sponsored actor that compromises unpatched and end-of-life Cisco networking devices to support espionage operations. The group aggressively exploits CVE-2018-0171 and leverages weak SNMP community strings to enable local TFTP retrieval of startup and running configurations, often exposing credentials and monitoring data. Talos also observed persistent firmware implants, notably SYNful Knock, and recommends immediate patching or disabling Smart Install, strengthening authentication, and implementing configuration auditing and network monitoring to detect exfiltration and implanted code.

read more →

Wed, August 20, 2025

Google research improves Retbleed exploit on Zen 2

🔬 Google researchers demonstrated practical improvements to the Retbleed speculative-execution attack, showing that on AMD Zen 2 CPUs attackers can read arbitrary RAM at roughly 13 KB/s with perfect cache-extraction accuracy. They adapted a modified Speculative ROP technique to evade Spectre v2 mitigations and showed ways to bypass Linux kernel defenses. The exploit still requires prior knowledge of kernel configuration, but common default builds and probing reduce that hurdle, and Google has already restricted Zen 2 in certain cloud workloads.

read more →

Wed, August 20, 2025

Warlock Ransomware: Emerging Threat Targeting Services

⚠️ Warlock is a ransomware operation that emerged in 2025 and uses double extortion — encrypting systems and threatening to publish stolen data to coerce payment. The group has targeted government agencies and critical service providers across Europe, and on August 12 a cyber incident disrupted UK telecom Colt Technology Services, with an alleged auction of one million stolen documents. Security analysts link recent intrusions to exploitation of the SharePoint vulnerability CVE-2025-53770, which Microsoft says is actively exploited; Microsoft has published analysis and urges immediate patching. Recommended mitigations include enforcing multi‑factor authentication, keeping security tools and software patched, maintaining secure off‑site backups, reducing attack surface, encrypting sensitive data, and educating staff on phishing and social engineering.

read more →

Wed, August 20, 2025

Logit-Gap Steering Reveals Limits of LLM Alignment

⚠️ Unit 42 researchers Tony Li and Hongliang Liu introduce Logit-Gap Steering, a new framework that exposes how alignment training produces a measurable refusal-affirmation logit gap rather than eliminating harmful outputs. Their paper demonstrates efficient short-path suffix jailbreaks that achieved high success rates on open-source models including Qwen, LLaMA, Gemma and the recently released gpt-oss-20b. The findings argue that internal alignment alone is insufficient and recommend a defense-in-depth approach with external safeguards and content filters.

read more →

Wed, August 20, 2025

Falcon Stops COOKIE SPIDER's SHAMOS macOS Delivery

🔒 Between June and August 2025, the CrowdStrike Falcon platform blocked a widespread malware campaign that attempted to compromise more than 300 customer environments. The campaign, operated by COOKIE SPIDER and renting the SHAMOS stealer (an AMOS variant), used malvertising and malicious one-line install commands to bypass Gatekeeper and drop a Mach-O executable. Falcon detections—machine learning, IOA behavior rules and threat prevention—prevented SHAMOS at download, execution and exfiltration stages. CrowdStrike published hunting queries, mitigation guidance and IOCs including domains, a spoofed GitHub repo and multiple script and Mach-O hashes.

read more →

Wed, August 20, 2025

Smashing Security Podcast 431: Cloud Bill Fraud & EDR Risks

🛡️ In episode 431 of the Smashing Security podcast, Graham Cluley and guest Allan Liska examine a high-profile cloud-billing fraud in which a crypto influencer calling himself CP3O racked up millions in unpaid cloud costs through cryptomining schemes. They also highlight the growing threat of EDR‑killer tools that can silently disable endpoint protection to aid attackers. The show includes lighter segments on the Internet Archive’s Wayforward Machine and a visit to Mary Shelley’s grave, and carries a content warning for mature language and themes.

read more →

Wed, August 20, 2025

Amazon MSF for Apache Flink Adds Customer Managed Keys

🔐 Amazon Managed Service for Apache Flink now supports Amazon KMS Customer Managed Keys (CMK), giving customers the option to use their own keys instead of AWS-owned keys. This provides greater control over encryption at rest, key rotation, and access policies for data stored in MSF. The update helps address compliance and governance requirements and is available by region; refer to the documentation for implementation details.

read more →

Wed, August 20, 2025

AWS Launches Customizable Billing and Cost Dashboards

📊 AWS announces general availability of AWS Billing and Cost Management Dashboards, a customizable feature that consolidates spending data from AWS Cost Explorer, Savings Plans, and Reserved Instance coverage and utilization reports. Users can build cost, usage, Savings Plans, and Reserved Instance widgets with line, bar, stacked bar, or table visualizations, arrange layouts, and share dashboards across accounts. The capability is available at no additional cost in all AWS commercial Regions except AWS China Regions.

read more →

Wed, August 20, 2025

Harmony SASE MCP Server Enables AI-Driven Visibility

🔗 The Harmony SASE MCP Server connects AI and IDE assistants to Harmony SASE, enabling direct, secure access to networking and security context. Built on the open Model Context Protocol (MCP), it exposes a curated set of endpoints so AI tools like Claude, Cursor, and GitHub Copilot can enrich workflows, accelerate investigations, and integrate SASE telemetry into familiar analyst and developer interfaces.

read more →

Wed, August 20, 2025

AWS Clean Rooms adds PySpark error message controls

🔧 AWS Clean Rooms now lets code authors configure error message detail for analyses using PySpark. When every collaboration member approves an analysis, authors can enable more detailed errors to accelerate debugging and testing. This reduces troubleshooting time for models such as marketing attribution from weeks to hours or days while preserving collaborator data protections.

read more →

Wed, August 20, 2025

Fortinet Unified SASE: Integrated Networking and Security

🔒 Fortinet presents Fortinet Unified SASE as a natively integrated platform that combines cloud-delivered FortiSASE with Fortinet Secure SD‑WAN on a single operating system to avoid the fragmentation common in many SASE solutions. The article stresses a single-agent experience via FortiClient, one management plane powered by FortiOS, and consolidated threat intelligence from FortiGuard Labs. It highlights flexible deployment choices, global POPs, and sovereign SASE options to meet data residency and compliance requirements. Fortinet also emphasizes AI/ML-driven correlation and GenAI-assisted policy and investigation to improve detection and operational efficiency.

read more →

Wed, August 20, 2025

Frenemies in Cybersecurity: Balancing Competition & Sharing

🤝 In a Threat Vector podcast, Michael Sikorski and Michael Daniel of the Cyber Threat Alliance discuss how competing vendors must nonetheless collaborate to counter shared threats. Daniel recalls how pooled observations during the 2017 WannaCry outbreak revealed its worm-like propagation and accelerated industry response. He emphasizes that the main obstacles to sharing are human—culture, legal risk, and lack of executive prioritization—and that concrete guardrails (antitrust-compliance statements, embargo protocols, and equal treatment) build the trust needed for timely intelligence exchange. The post cautions that as adversaries adopt AI and automation, systematic collaboration is essential.

read more →

Wed, August 20, 2025

Tackling the National Gap in Software Understanding

🔍 CISA, with partners including DARPA, OUSD R&E, and the NSA, is leading an interagency effort to close a national gap in software understanding that endangers critical infrastructure. A new Sandia National Laboratories report, The National Need for Software Understanding, describes the gap’s causes, risks, and options for remediation. CISA urges manufacturers to design software for independent analysis and invites experts and mission owners to engage on research priorities.

read more →

Wed, August 20, 2025

Quantum-safe security: Progress toward PQC adoption

🔒 Microsoft outlines a multi-year plan to transition to post-quantum cryptography, stressing that preparation must begin now. The post highlights investments in both quantum research (including Majorana 1 and 4D geometric error correction) and cryptographic readiness, plus collaboration with standards bodies such as NIST and IETF. It describes tools like the Adams Bridge Accelerator, PQC previews, and the Quantum Safe Program with a phased roadmap targeting early adoption by 2029 and completion by 2033.

read more →

Wed, August 20, 2025

Agent Factory: Build Your First AI Agent with Tools

🔧 This Microsoft Azure blog post, the second entry in the six-part Agent Factory series, explains how tool ecosystems are defining the next wave of agentic AI. It argues the industry is moving from single-model prompts to extensible platforms that let agents discover and invoke a broad set of capabilities at runtime. The piece highlights the Model Context Protocol (MCP) and Azure AI Foundry for secure, enterprise-grade tool integration, and summarizes five best practices for governance, identity, and observability to achieve scalable, production-ready agents.

read more →