Advisory ID: ngCERT-2025-050007
Probability: High
Damage: Critical
Platform(s): Microsoft Office
SUMMARY
ngCERT warns of a marked intensification in cyber espionage activities by SideWinder (aka Rattlesnake or *T-APT-04*), a state-aligned advanced persistent threat (APT) group. Historically focused on government and military entities, the group has now expanded its operations to target maritime, logistics, telecommunications, and financial institutions across Africa and Asia. This shift underscores heightened risks to critical infrastructure and economic stability in these regions.
DESCRIPTION
The key tactics and exploits include:
Weaponized Phishing Campaigns:
- SideWinder distributes spear-phishing emails containing malicious Microsoft Office documents engineered to exploit memory corruption vulnerabilities (CVE-2017-11882, CVSS 7.8 – High; CVE-2018-0802, CVSS 7.8 – High). These documents execute arbitrary code to compromise systems.
- Open XML (OOXML) File Abuse:
Malicious OOXML files bypass legacy security controls to deploy payloads. - Post-Exploitation Malware:
After initial access, the group deploys custom tools like StealerBot (data-harvesting malware) and advanced Remote Access Trojans (RATs) to exfiltrate sensitive data, establish persistence, and pivot laterally within networks.
CONSEQUENCES
This could further result in:
- Operational Disruption: Compromised systems in logistics or maritime sectors could halt critical supply chains.
- Financial Loss: Theft of banking credentials or intellectual property from financial institutions.
- National Security Threats: Exfiltration of government/military data or sabotage of telecom infrastructure.
SOLUTION/MITIGATION
ngCERT recommends the following:
- Patch Legacy Systems: Prioritize updates for Microsoft Office vulnerabilities (CVE-2017-11882, CVE-2018-0802).
- Block Suspicious OOXML Files: Use email filtering to quarantine documents with macros or unusual metadata.
- Enforce Multi-Factor Authentication (MFA): Limit lateral movement via compromised credentials.
- Monitor for Lateral Movement: Deploy endpoint detection (EDR) and network traffic analysis tools.
- Train Staff: Simulate phishing attacks to raise awareness of malicious document tactics.
- Adopt a Zero Trust security framework to verify all access and restrict to the minimum necessary permissions.
Urgency!!!
With SideWinder’s evolving capabilities and cross-sector targeting, organizations in affected regions face high-severity risks (CVSS 7.8–9.0 contextual scores). Proactive defense is critical to preempt large-scale breaches.
REFERENCES
Advisory ID: NCC-CSIRT-2025-006
Summary:
Cybersecurity researchers have identified a new malicious tool named ‘Defendnot’. This tool can disable Microsoft Defender, the built-in antivirus and endpoint protection software on Windows systems, leaving affected machines vulnerable to further compromise. The threat actors behind this tool appear to be leveraging it as a preliminary stage in larger malware campaigns, allowing for stealthy persistence, lateral movement, and data exfiltration.
Damage/Probability: HIGH/Critical
Product(s): Windows 10, Windows 11, and Windows Server.
Version(s): All supported versions of Windows 10, 11, and Windows Server 2016 and above
Platform(s): Microsoft Windows
Description:
Threat actors are using the Defendnot to stealthily disable Microsoft Defender on Windows systems. The tool leverages system utilities, registry modifications, and PowerShell scripts to tamper with Defender settings, effectively bypassing endpoint protection. This allows attackers to deploy additional malware and remain undetected on compromised systems. Organizations using Windows platforms are particularly vulnerable if adequate security hardening and monitoring are not enforced.
Consequences:
To mitigate the identified threat, the following steps are recommended:
-
Apply the latest security updates from Microsoft.
-
Disable unnecessary scripting and administrative tools on user endpoints.
-
Inform system administrators and security personnel about this threat.
-
Conduct awareness training to recognize suspicious activity or social engineering attempts.
-
Ensure Tamper Protection is enabled in Microsoft Defender.
-
Use Group Policy or Intune to enforce Defender protection settings.
-
Block PowerShell scripts that are unsigned or originate from unknown sources.
-
Scan endpoints using an up-to-date Endpoint Detection and Response solution.
-
Monitor for and alert on PowerShell execution logs (Event ID 4104), and Defender configuration changes (Event ID 5007)
- Restore any altered Defender settings using centralized policy enforcement.
Solution:
-
Always install the latest security patches and Android OS updates.
-
Disable NFC functionality when not in use.
-
Only install applications from trusted sources (Google Play Store) and verify app permissions.
-
Deploy reputable mobile security solutions that monitor and block NFC abuse.
- Be vigilant about unfamiliar or excessive permissions requested by apps.
References:
-
https://windowsforum.com/threads/how-defendnot-exploits-windows-defender-a-hidden-threat-to-windows-security.366596/
-
https://cybersecuritynews.com/defendnot-disables-windows-defender/
-
https://www.tomshardware.com/software/security-software/defendnot-tool-pitched-as-an-even-funnier-way-to-disable-windows-defender
-
https://cybersecsentinel.com/defendernot-tool-disables-microsoft-defender-using-taskmgr-injection-and-wsc-abuse/
Advisory ID: ngCERT-2025-050003
SUMMARY
ngCERT has issued an urgent alert regarding a critical vulnerability (CVE-2024-44276, CVSS 9.1 – Critical) in Apple’s Password App for iOS 18, enabling attackers to hijack user sessions and steal sensitive credentials. The flaw originates from the app’s reliance on an insecure HTTP protocol for data transmission, allowing adversaries on shared networks (e.g., public Wi-Fi) to intercept unencrypted traffic and redirect users to malicious phishing sites. These fraudulent pages mimic legitimate services to harvest login credentials, financial data, and other personal information.
Probability: High
Damage: Critical
Platform(s): iOS, iPadOS
DESCRIPTION
The vulnerability in Apple’s password manager App was identified as an insecure data transmission protocol weakness susceptible to compromise by threat actors. Particularly, the App used unencrypted HTTP connections, as opposed to a more secure HTTPS, to fetch logos and icons while opening password reset pages. Attackers with privileged access, mostly connected to the same network as the user (i.e. Starbucks, airport, or hotel Wi-Fi), could intercept the HTTP request and redirect the user to a phishing website. Thereafter, threat actors can easily gather login credentials from victims and utilize them for other malicious activities. Nonetheless, Apple addressed the problem in a security update in its iOS 18.2 version..
CONSEQUENCES
Exploitation of the flaw could lead to phishing attacks and theft of login credentials. This could further result in:
- Malware infiltrations.
- Financial losses through fraudulent transactions.
- Identity theft occasioned by stolen sensitive data.
- Emotional distress.
- Disruption of critical services leading.
SOLUTION/MITIGATION
While Apple has addressed the vulnerability in recent updates, ngCERT strongly advises all iOS 18 users to:
- Install the latest security patch immediately via Settings > General > Software Update.
- Avoid using the Password App on public or untrusted networks until updates are confirmed.
- Enable HTTPS-only mode in browser settings to block insecure connections.
REFERENCES
Advisory ID: ngCERT-2025-050001
SUMMARY
ngCERT is aware of Microsoft Corporation’s announcement of the End-of-Support (EOS) for Windows 10 on October 14, 2025. After this date, Microsoft will no longer provide security updates, technical support, or bug fixes for the Windows 10 operating system (OS). This advisory highlights the security risks associated with the continued use of Windows 10 post-EOS and provides mitigation strategies for organizations and individuals.
Probability: High
Damage: Critical
Platform(s): Windows
DESCRIPTION
Microsoft follows a lifecycle policy for its products, after which extended support is discontinued. Windows 10, a widely used OS in both enterprise and consumer environments, will reach its end of support in October 2025. Post-EOS, the OS will no longer receive:
- Security patches for newly discovered vulnerabilities.
- Technical assistance from Microsoft.
- Bug fixes or performance improvements.
This discontinuation poses significant cybersecurity risks, as unpatched systems will be vulnerable to exploits targeting newly discovered flaws.
CONSEQUENCES
- Loss of Productivity & Business Disruption: System crashes, compatibility issues with newer software, and a lack of vendor support may disrupt operations.
- Increased Vulnerability to Cyberattacks as attackers may exploit unpatched security flaws, leading to malware infections, ransomware, and data breaches. Legacy systems running Windows 10 may become prime targets for cybercriminals.
- Higher Long-Term Costs, as maintaining outdated systems may require costly custom support agreements or emergency migration efforts.
- Non-Compliance with Regulatory Standards.
SOLUTION/MITIGATION
The following should be considered:
- Upgrade to Windows 11 or a supported OS: Ensure hardware compatibility and migrate to Windows 11 or another supported OS before EOS.
- Develop a Migration Plan: Inventory all Windows 10 devices and prioritize upgrades based on criticality. Ensure to test applications for compatibility before migration.
- Consider Extended Security Updates (ESUs): If migration is delayed, enrol in Microsoft’s Extended Security Update (ESU) program (paid) for critical patches (limited duration)
- Implement Strong Security Controls: Deploy Endpoint Detection & Response (EDR) solutions, enforce network segmentation to isolate legacy systems while also applying strict firewall rules and application whitelisting.
- Switch to a Supported Alternative such as a Linux-based OS
- Enhance Security Posture by using reputable antivirus/anti-malware solutions, as well as enabling multi-factor authentication (MFA) and regular backups.
REFERENCES
-
- https://support.microsoft.com/en-us/windows/windows-10-supports-ends-on-october-14-2025-2ca8b313-1946-43d3-b55c-2b95b107f281
- ttps://blogs.windows.com/windowsexperience/2024/10/31/how-to-prepare-for-windows-10-end-of-support-by-moving-to-windows-11-today/
- https://www.uscloud.com/blog/windows-10-end-of-life/
Advisory ID: ngCERT-2025-050002
SUMMARY
A critical directory traversal vulnerability (CVE-2024-45711) has been identified in SolarWinds Serv-U, a widely used file transfer and management solution. This flaw allows unauthenticated attackers to execute arbitrary code or trigger denial-of-service (DoS) conditions on vulnerable systems by exploiting improper handling of environment variables..
CVE: CVE-2024-45711
Probability: High
Damage: Critical
Platform(s): Windows
DESCRIPTION
SolarWinds Serv-U, (CVE-2024-45711) is a directory traversal vulnerability in SolarWinds Serv-U, a software used for file transfer and management. This flaw allows authenticated attackers to exploit the way the software handles environment variables, which can lead to unauthorized access to system files and directories. The vulnerability does not require authentication to exploit, meaning an attacker can exploit it simply by sending specially crafted network messages to a vulnerable system. If successfully exploited, an attacker could manipulate file paths and access sensitive system resources, potentially leading to remote code execution based on the privileges of the authenticated user. While most exploitation attempts may result in a denial of service, remote code execution is theoretically possible in some scenarios.
Technical Details
- Root Cause: Improper validation of environment variables enables attackers to manipulate file paths and access restricted directories.
- Attack Vector: Remote exploitation via specially crafted network requests. No authentication is required.
- Impact:
- Remote Code Execution (RCE): Attackers can execute arbitrary code with the privileges of the Serv-U process (often SYSTEM-level access).
- Data Exposure: Unauthorized access to sensitive system files or directories.
- Denial-of-Service (DoS): Exploitation may crash the service, disrupting file transfer operations.
Key Risk Factors
- Critical Severity: CVSS 9.1 due to low attack complexity, no authentication requirement, and high impact on confidentiality, integrity, and availability.
- Widespread Exposure: Serv-U is broadly deployed in enterprise environments for secure file transfers.
- Theoretical RCE: While most attacks may cause DoS, RCE is feasible under specific conditions.
SOLUTION/MITIGATION
The following are recommended:
1. Immediate Patching:
- Apply the latest SolarWinds Serv-U security update (refer to SolarWinds advisory SB-2024-XXXX).
- Confirm patch installation via the SolarWinds dashboard.
- Restrict Network Access:
- Limit Serv-U exposure to the internet using firewalls or VPNs.
- Segment internal networks to minimize lateral movement risks.
- Monitor for Exploitation:
- Deploy intrusion detection systems (IDS) to flag anomalous network traffic (e.g., unexpected path traversal attempts).
- Audit logs for unauthorized access to system directories.
- Contingency Planning:
- Back up critical data and configurations regularly.
- Prepare incident response protocols for potential DoS or RCE incidents.
- User Awareness:
- Educate staff on risks of unpatched file transfer systems.
REFERENCES
- SolarWinds Serv-U is vulnerable to a directory traversal...· CVE-2024-45711 · GitHub Advisory Database · GitHub
- CVE-2024-45711 : SolarWinds Serv-U Directory Traversal Vulnerability | SecurityVulnerability.io
- SolarWinds Serv-U: CVE-2024-45711: Directory Traversal Vulnerability in Serv-U
- CVE-2024-45711 : SolarWinds Serv-U is vulnerable to a directory traversal vulnerability where r
- SolarWinds Serv-U 15.4.2.0 < 15.5 / 15.4.0 < 15.5 Multiple Vul... | Tenable®
- Android Malware Leverages NFC to Enable Unauthorized POS and ATM Withdrawals
- Multiple Vulnerabilities in Network Time Protocol (NTP)
- SideWinder Espionage Group Targeting Nigerian Maritime, Government, Telecommunications, and Financial Sectors
- Google Chrome Zero-Day Exploit (CVE-2025-2783) Used in Targeted Attacks