Cyware Daily Threat Intelligence, September 24, 2025

Daily Threat Briefing • September 24, 2025
Daily Threat Briefing • September 24, 2025
Since 2022, a stealthy campaign has been hijacking DLLs to unleash a PlugX variant on Asia’s telecom and manufacturing sectors. Linked to Naikon and BackdoorDiplomacy, it uses malicious documents and shared cryptographic tools to deploy RainyDay and Turian-like backdoors.
Salesforce CLI installer harbors a critical flaw, letting attackers seize SYSTEM-level control on Windows. This path-handling bug in versions before 2.106.6 enables code execution via rogue installers, now fixed with proper signing in the latest release.
Exploiting a Linux Pandoc flaw, hackers are targeting AWS credentials through SSRF attacks. This vulnerability allows iframe-based credential theft from EC2 IMDSv1, urging users to adopt IMDSv2 and sandbox options to lock down systems.
Malware campaign targets telecom and manufacturing sectors
Cisco Talos has identified a sophisticated malware campaign that has been active since 2022, utilizing DLL search order hijacking to deploy a new variant of PlugX, which shares characteristics with the RainyDay and Turian backdoors. This operation primarily targets telecommunications and manufacturing sectors across Central and South Asia, revealing a convergence of functionalities and infrastructure among the Naikon and BackdoorDiplomacy groups. Analysts discovered that the malware families employ the same XOR-RC4-RtlDecompressBuffer decryption algorithm and identical RC4 keys, indicating a shared cryptographic toolkit. The campaign's initial infection typically begins with a malicious document or email, leading to the execution of a legitimate binary vulnerable to DLL hijacking.
ShadowV2 botnet targets misconfigured AWS containers
ShadowV2 is a newly identified DDoS-as-a-Service botnet that enables customers to self-manage DDoS attacks. It leverages misconfigured Docker containers and a Python-based C2 infrastructure hosted on GitHub CodeSpaces. The platform represents a shift from traditional botnet operations by offering a modular, user-driven attack interface. The ShadowV2 operation was observed targeting Docker daemons exposed on AWS cloud instances. The attackers deploy a generic setup container, install tools, and create a customized image for live deployment. The infection chain begins with a Python script hosted on GitHub CodeSpaces, which interacts with Docker to spawn containers. These containers act as wrappers for the Go-based malware, enabling the botnet to propagate across cloud environments.
Critical bug in Salesforce CLI installer
A critical vulnerability (CVE-2025-9844) in the Salesforce CLI installer allows attackers to execute arbitrary code with SYSTEM-level privileges on Windows machines. The flaw stems from improper handling of file paths during installation, enabling attackers to exploit it via social engineering. Unsuspecting users downloading compromised installers or rogue executables may inadvertently run malicious code. The vulnerability affects Salesforce CLI versions prior to 2.106.6, but users downloading from Salesforce’s official site are safe due to proper file signing. Exploitation can lead to privilege escalation, disabling security controls, spreading malware, and gaining complete system control. Salesforce addressed the issue in version 2.106.6, and users are advised to verify their CLI version and update if necessary.
SolarWinds releases hotfix for critical flaw
SolarWinds has released a third hotfix to address a critical unauthenticated RCE vulnerability in Web Help Desk, tracked as CVE-2025-26399. This vulnerability is a patch bypass of CVE-2024-28988, which itself bypassed the original CVE-2024-28986. The repeated patching underscores the persistence and complexity of the issue. The vulnerability affects SolarWinds Web Help Desk, a widely used IT support and ticketing platform deployed by medium-to-large organizations for request tracking, workflow automation, asset management, and compliance assurance. Successful exploitation could allow unauthenticated attackers to execute arbitrary commands on the host system, potentially leading to full system compromise. CVE-2025-26399 is caused by unsafe deserialization in the Ajax Proxy component of WHD version 12.8.7.
Hackers abuse Pandoc vulnerability
A security flaw in the Linux utility Pandoc (CVE-2025-51591) has been exploited by hackers to target AWS Instance Metadata Service (IMDS) and steal EC2 IAM credentials. The vulnerability involves Server-Side Request Forgery (SSRF) using crafted HTML iframe elements, enabling attackers to compromise systems and harvest temporary AWS credentials. IMDSv1 is particularly vulnerable due to its request-response protocol, making it an attractive target for SSRF-based attacks. IMDSv2 mitigates this risk by requiring token-based authentication. Wiz researchers recommend using Pandoc's "-f html+raw_html" or "--sandbox" options to prevent iframe exploitation and enforcing IMDSv2 across EC2 instances to reduce risks.