ARTICLE
20 October 2025

Ankura CTIX FLASH Update - October 17, 2025

AC
Ankura Consulting Group LLC

Contributor

Ankura Consulting Group, LLC is an independent global expert services and advisory firm that delivers end-to-end solutions to help clients at critical inflection points related to conflict, crisis, performance, risk, strategy, and transformation. Ankura consists of more than 1,800 professionals and has served 3,000+ clients across 55 countries. Collaborative lateral thinking, hard-earned experience, and multidisciplinary capabilities drive results and Ankura is unrivalled in its ability to assist clients to Protect, Create, and Recover Value. For more information, please visit, ankura.com.
Cybersecurity experts have identified two (2) significant ongoing threats. First, a malicious actor known as TigerJack targets developers by creating harmful extensions for platforms like Microsoft's...
United States Technology
Ankura Consulting Group LLC’s articles from Ankura Consulting Group LLC are most popular:
  • with readers working within the Property industries
Ankura Consulting Group LLC are most popular:
  • within Insurance, Wealth Management and Tax topic(s)

Malware Activity

Malicious Developer Extensions and Cisco Device Exploits

Cybersecurity experts have identified two (2) significant ongoing threats. First, a malicious actor known as TigerJack targets developers by creating harmful extensions for platforms like Microsoft's VSCode marketplace and OpenVSX, an open-source alternative. These extensions (some downloaded thousands of times), contain dangerous features such as stealing source code, secretly mining cryptocurrency, and executing malicious commands from remote servers. Despite some being removed from VSCode, TigerJack continues re-uploading similar malicious tools under different names. Operating with multiple fake accounts to appear legitimate and to push new payloads without updating the extensions. Second, researchers uncovered Operation Zero Disco. A cyberattack campaign exploiting a recent security flaw in older Cisco devices. The flaw, CVE-2025-20352, allowed hackers to remotely execute malicious code on vulnerable systems, especially older models like the 9400, 9300, and 3750G series. Even though Cisco patched the vulnerability, attackers had already installed Linux rootkits that granted persistent access by setting universal passwords containing "disco" and hooking into core software. Making detection difficult. They also attempted to exploit a Telnet vulnerability for deeper access. The attacks mainly targeted outdated Linux systems lacking modern security tools, but newer Cisco devices with protections like ASLR can still be targeted through repeated efforts, highlighting the need for cautious security practices. CTIX analysts will continue to report on the latest malware strains and attack methodologies.

Threat Actor Activity

Australian Government Report Highlights the Interconnected Nature of State-backed and Criminal Hackers

The Annual Cyber Threat Report 2024-2025 from the Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC) underscores the blurred lines between state-sponsored hackers and financially motivated cybercriminals. A key focus is on a threat actor backed by China, known by various names including Kryptonite Panda and Leviathan, which targets Australian and regional networks for valuable information. These state-backed actors often employ tactics similar to those used by criminal entities, posing significant threats to government and critical infrastructure networks. Also highlighted was the convergence of tactics used by different cyber threat actors, emphasizing the need for enhanced defense strategies rooted in threat intelligence and incident response. The ACSC advises organizations to strengthen their defenses with multifactor authentication, unique passwords, regular backups, and timely patching, as these measures can prevent most incidents. Additionally, the report notes the increasing use of AI by less sophisticated cybercriminals to automate phishing campaigns, analyze stolen data, and orchestrate denial-of-service (DoS) attacks. Organizations are urged to invest in adaptive, intelligent security controls to combat AI-enabled threats. Ransomware remains a major threat to Australian companies and to the world, with Australian costs rising by 219% for large businesses.

Vulnerabilities

CISA Orders Federal Agencies to Secure Systems After F5 Issues Emergency Patches After Breach Exposes BIG-IP Vulnerabilities

F5 Networks has released urgent security updates after confirming a state-sponsored compromise on August 9, 2025, in which attackers stole source code and information on undisclosed BIG-IP vulnerabilities. Although the company found no evidence that the stolen flaws were exploited or that its software supply chain was compromised, it issued patches addressing forty-four (44) vulnerabilities across BIG-IP, F5OS, BIG-IP Next for Kubernetes, BIG-IQ, and APM clients. F5 advised customers to update immediately and enhance monitoring through SIEM integrations and administrative login alerts. Following the disclosure, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued emergency directive ED 26-01, mandating that all Federal Civilian Executive Branch (FCEB) agencies patch affected F5OS, BIG-IP TMOS, BIG-IQ, and BNK/CNF systems by no later than October 22. All other F5 products must be patched by no later than October 31. CTIX analysts also urge administrators to follow the guidance and remove unsupported, public-facing devices. The directive highlights the ongoing exploitation risk, as BIG-IP vulnerabilities remain prime targets for both nation-state and cybercriminal groups seeking lateral movement, credential theft, and persistence within networks.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More