TRENDING TOPICS DEC 19, 2025

Suspected Foreign Interference via Maritime Remote Access Malware

French authorities have detained a Latvian crew member of the Italian-owned passenger ferry Fantastic after discovering malware capable of enabling remote access to the vessel’s computer systems while it was docked in Sète. A second crew member, a Bulgarian national, was released without charge. According to the Paris prosecutor’s office, the Latvian suspect, who had recently joined the crew, is charged with conspiring to infiltrate an automated data-processing system on behalf of a foreign power following the identification of a remote access tool aboard the ship. The malware was initially detected by Grandi Navi Veloci (GNV), which alerted Italian authorities and France’s General Directorate for Internal Security (DGSI), prompting a joint counterintelligence investigation and the seizure of multiple digital items for forensic analysis. While GNV stated the malware was neutralized without operational impact and has not disclosed which shipboard systems were targeted, French officials have characterized the incident as a serious national security matter involving suspected foreign interference. Interior Minister Laurent Nuñez confirmed the foreign interference angle, stopping short of attribution but noting the broader European context of state-linked sabotage and cyber operations. The investigation is being led by the DGSI, in coordination with Italian and Latvian authorities, and highlights concerns about insider access, maritime cyber risk, and the potential convergence of cyber intrusions with physical safety threats. The case reinforces the growing strategic importance of maritime cyber defense, particularly against insider-enabled compromises that could enable remote manipulation of critical transportation systems.

Clop Expands Data Theft Extortion to Internet-Exposed CentreStack Servers

The Clop ransomware group is actively targeting Internet-facing Gladinet CentreStack file servers in a new data-theft extortion campaign, continuing its long-standing focus on enterprise file-sharing and managed file-transfer technologies. CentreStack is commonly used to provide remote access to on-premises file servers through web portals, mobile clients, and mapped drives, making externally exposed deployments particularly attractive targets. Incident responders report that Clop is scanning for publicly accessible CentreStack instances and leaving ransom notes on compromised systems, confirming active exploitation rather than reconnaissance alone. The specific access method remains unknown, raising concerns that attackers may be abusing either an undisclosed weakness or unpatched systems. This activity closely follows Clop’s established operational pattern of mass exploitation against centralized file-sharing platforms, enabling the exfiltration of large volumes of sensitive data quickly. In prior campaigns, Clop has focused on stealing data at scale and leveraging public leak sites to pressure victims into payment rather than relying on traditional ransomware encryption. With hundreds of CentreStack instances potentially exposed online, this campaign poses a significant risk to organizations that have not restricted external access or hardened these services. Defenders should prioritize reducing Internet exposure, validating patch posture, and monitoring for signs of unauthorized access, as data theft remains the primary impact associated with Clop operations.

Chrome Stable Channel Update Mitigates High-Risk Browser Exploitation Vectors

Google has released a Stable Channel update for Chrome that addresses two high-severity memory safety vulnerabilities with a credible remote code execution risk. The update, now rolling out to Windows, macOS, and Linux systems, resolves a use-after-free condition in the WebGPU component (CVE-2025-14765) and an out-of-bounds read and write flaw in the V8 JavaScript engine (CVE-2025-14766). Both issues were reported by external security researchers and represent well-known exploitation primitives frequently abused in browser-based attack chains, particularly for initial access and sandbox escape attempts. Due to the severity and exploit potential, Google has restricted access to detailed bug information until patch adoption reaches a sufficient threshold, reducing the likelihood of rapid weaponization. These fixes are especially significant given Chromium’s role as a shared codebase across multiple browsers, including Microsoft Edge, which means downstream platforms inherit the same exposure until they are updated. Memory corruption vulnerabilities in WebGPU and V8 are attractive to both financially motivated and advanced threat actors, as they can be triggered through malicious web content with minimal user interaction. Organizations should prioritize rapid browser updates across managed endpoints and treat this release as high urgency, particularly in environments where web browsing intersects with sensitive workflows. Monitoring for browser instability, unexpected child processes, or anomalous JavaScript execution remains a critical defensive measure while updates propagate across fleets.

Top CVEs of the Week

Top CVEs of the Week – As part of our ongoing vulnerability monitoring, the following CVEs highlight recent security issues that could affect a range of systems, applications, and devices. These findings reflect the constantly evolving threat landscape and reinforce the importance of timely patching, secure configurations, and proactive security practices. Below is a summary of notable vulnerabilities, including their impact and any available remediation guidance.

CVE Security Vulnerability Dashboard
CVE-2025-20393
Critical
Cisco AsyncOS
COMMAND INJECTION
EXPLOITED IN WILD
Cisco AsyncOS flaw allows remote attackers to execute arbitrary commands with root-level privileges due to improper input validation, granting full control over the underlying operating system. Exploitation has been observed in the wild and is limited to appliances where the Spam Quarantine feature is enabled and exposed.
Urgent Action: Immediately restrict external access to the Spam Quarantine interface, disable the feature if not required, and closely monitor Cisco advisories for vendor patches.
CVE-2025-55182
Critical
React Server Components
UNSAFE DESERIALIZATION
UNAUTHENTICATED
Pre-authentication remote code execution vulnerability affects multiple React Server Components versions due to unsafe deserialization of attacker-controlled HTTP payloads sent to Server Function endpoints. An unauthenticated attacker could execute arbitrary code on the server without valid credentials.
Mitigation: Upgrade React Server Components and associated packages to fixed versions immediately and restrict direct access to Server Function endpoints until patching is complete.
CVE-2025-59718
Critical
Fortinet FortiOS/FortiProxy
SAML AUTHENTICATION BYPASS
UNAUTHENTICATED
Improper cryptographic signature verification flaw in multiple Fortinet products allows unauthenticated attackers to bypass FortiCloud SSO authentication using a crafted SAML response. Successful exploitation could grant unauthorized access to administrative or protected interfaces without valid credentials.
Mitigation: Immediately apply Fortinet security updates. Disable or restrict FortiCloud SSO where patches cannot be deployed promptly. Audit access logs for unauthorized authentication attempts.
3
Total CVEs
3
Critical Severity
1
Actively Exploited
3
Unauthenticated Access
💡
Hunter Strategy encourages our readers to look for updates in our daily Trending Topics and on Twitter.