Triad Weekly Cybersecurity Recap

Untitled (Instagram Post)
By Brian Griffin | March 19, 2025 | Cyber Security | 0 Comments

Triad Recap: Your Essential Cybersecurity Update

Welcome to the Triad Recap, your trusted source for the latest cybersecurity and compliance news. In this edition, we bring you crucial updates on emerging cyber threats, including data breaches, phishing schemes, and sophisticated malware campaigns. Stay informed and take proactive steps to protect your business from evolving cyber risks.

The Latest Cybersecurity Threats: What You Need to Know

As cybercriminals refine their tactics, organizations and individuals must stay informed about the latest threats. Recent reports highlight sophisticated attacks targeting supply chains, critical infrastructure, and widely used technologies. Here’s what you need to know.

1. File-Based Backdoor Attacks: A New Threat

A recent cybersecurity report has unveiled a new supply chain attack vector called the “Rules File Backdoor,” which targets AI-powered code editors like GitHub Copilot and Cursor. This method allows attackers to inject hidden malicious instructions into configuration files, leading AI tools to generate code with security vulnerabilities or backdoors. ​

Key Points:

  • Attack Mechanism: By embedding concealed prompts within seemingly harmless rule files, attackers can manipulate AI assistants to produce compromised code. This is achieved using techniques like zero-width joiners and bidirectional text markers to hide malicious instructions
  • Supply Chain Risks: Once a poisoned rule file is integrated into a project repository, it can affect all future code generation by team members. The malicious instructions often persist even after project forking, creating a vector for supply chain attacks that can impact downstream dependencies and end users.
  • Official Responses: Both Cursor and GitHub have acknowledged the issue, stating that users are responsible for reviewing and accepting suggestions generated by the tools. ​

This discovery underscores the need for developers to exercise caution and thoroughly review AI-generated code to prevent potential security breaches.

Read the full article here

2. Eleven11Bot: The Botnet Behind Record-Breaking DDoS Attacks

​A recent investigation has uncovered that over 1 million Android-based devices—including TV streaming boxes, tablets, projectors, and car infotainment systems—have been compromised by a malware campaign dubbed “Badbox 2.0.” These devices, primarily in South America, are being exploited for cybercriminal activities without users’ knowledge.

  • Massive Botnet Attack: Over 1 million Android-based devices, including streaming boxes, tablets, and car infotainment systems, have been compromised by the “Badbox 2.0” malware.
  • Scope of Infection: Many affected devices are generic, low-cost products, with the “TV98” and “X96” streaming boxes being among the most impacted.
  • Malware Tactics: Attackers use drive-by downloads and fake app installations to spread malware, sometimes disguising benign apps as malicious versions outside official stores.
  • Cybercriminal Uses: Compromised devices are exploited for ad fraud, click fraud, and as proxy servers to mask illegal activity.
  • Mitigation Efforts: Google, Trend Micro, and others are working to disrupt the botnet by shutting down related infrastructure.
  • Security Advice: Avoid suspiciously cheap devices, only install apps from trusted sources, and monitor for unusual device behavior.

This discovery highlights the importance of vigilance when purchasing and using electronic devices, as cyber threats continue to evolve and exploit unsuspecting consumers.

Read the full article here

3. BadBox 2: Over One Million Infected Android Devices

A new malware campaign known as BadBox 2 has compromised over one million third-party Android devices, exposing users to spyware and data theft. Wired reports that the infection spreads through pre-installed malicious firmware. Users should avoid purchasing uncertified devices and regularly update their mobile security software.

Key Points:

  • Affected Devices: The malware predominantly targets generic, low-cost devices, notably the “TV98” and “X96” streaming box families. ​
  • Distribution Methods: Attackers employ tactics like drive-by downloads and malicious app installations to infect devices. In some cases, they create benign apps for official app stores to build trust, then distribute nearly identical malicious versions outside these platforms. ​
  • Malicious Uses: Compromised devices are exploited for advertising fraud, including click fraud, and as residential proxy services, allowing cybercriminals to route and mask web traffic through unsuspecting users’ internet connections. ​
  • Mitigation Efforts: Organizations like Google, Human Security, Trend Micro, and Shadow Server are collaborating to disrupt Badbox 2.0’s infrastructure. Actions include terminating associated publisher accounts and sinkholing the botnet to render it ineffective.

Read the full article here

4. Fortinet Firewall Exploits Used for Ransomware Attacks

Hackers are actively exploiting vulnerabilities in Fortinet firewalls to plant ransomware. A recent Tech Crunch report reveals that unpatched systems remain a prime target. Organizations relying on Fortinet products must immediately apply security patches and monitor network activity for unusual behavior.

Key Details:

  • Vulnerabilities Exploited: The flaws in FortiOS and FortiProxy allow attackers to gain super-administrator access to vulnerable devices. Despite patches being released in January, some organizations remain unpatched, leaving them susceptible to attacks.
  • Attack Progression: After exploiting these vulnerabilities, Mora_001 conducts reconnaissance, exfiltrates sensitive data, and selectively encrypts critical file servers. This approach aligns with modern ransomware tactics that emphasize data theft over mere disruption.
  • Connection to LockBit: Analysis indicates that SuperBlack is based on the leaked builder of LockBit 3.0 ransomware. The ransom notes also share contact information with LockBit, suggesting that Mora_001 may be an affiliate or associate group within the LockBit ecosystem.

This situation underscores the critical importance of timely patch management and proactive security measures to defend against sophisticated ransomware threats.

Read the full article here

5. GitHub Supply Chain Attack Exposes CI/CD Secrets

A sophisticated supply chain attack has compromised a widely used GitHub Action, exposing sensitive continuous integration and deployment (CI/CD) secrets. BleepingComputer warns that attackers could use this data to infiltrate software pipelines. Developers should audit their CI/CD configurations and use credential vaults to secure sensitive information.

Key Details:

  • Attack Methodology: The attackers modified the action’s code and retroactively updated multiple version tags to reference a malicious commit, causing the tool to log sensitive CI/CD secrets during its execution.
  • Compromised Access: The breach was facilitated by a compromised GitHub personal access token (PAT) associated with the bot account ‘@tj-actions-bot,’ which had privileged access to the repository. The exact method of compromise remains unclear.

This incident underscores the critical importance of securing CI/CD pipelines and the potential risks associated with third-party integrations in software development workflows.

Read the full article here

How Triad InfoSec Can Assist Your Business

Navigating the complexities of cybersecurity compliance can be challenging. Triad InfoSec is dedicated to helping businesses prepare for CMMC audits, ensuring compliance, and optimizing cybersecurity strategies. Our services include:

  • CMMC Audit Preparation: Guiding your organization through the necessary steps to achieve CMMC certification.
  • MSP Partnerships: Collaborating with Managed Service Providers to ensure your business remains compliant while reducing cyber insurance premiums.
  • Comprehensive Cybersecurity Solutions: Offering a range of services tailored to meet all your cybersecurity needs.

Partner with Triad InfoSec to secure your business’s future.

Contact us today

Stay vigilant and proactive in addressing cybersecurity challenges to protect your business and its valuable assets.

Latest Posts

MSP MSSP
MSPs, MSSPs, and Cyber Compliance Explained
The Cybersecurity Trio Your Business Can’t Ignore
When it comes to building a strong cybersecurity posture, three acronyms dominate the conversation: MSP, MSSP, and cyber compliance. They get tossed around a lot, often interchangeably, but they each ...
Untitled (Instagram Post)
Triad Recap
Your Essential Cybersecurity Update
Welcome to the Triad Recap, your trusted source for the latest cybersecurity and compliance news. In this edition, we bring you crucial updates on emerging cyber threats, including data breaches, phis...
Untitled (Instagram Post)
Triad Weekly Cybersecurity Recap
Triad Recap: Your Essential Cybersecurity Update Welcome to the Triad Recap, your trusted source for the latest cybersecurity and compliance news. In this edition, we bring you crucial updates on emer...