ARTICLE
9 December 2025

Ankura CTIX FLASH Update - December 3, 2025

AC
Ankura Consulting Group LLC

Contributor

Ankura Consulting Group, LLC is an independent global expert services and advisory firm that delivers end-to-end solutions to help clients at critical inflection points related to conflict, crisis, performance, risk, strategy, and transformation. Ankura consists of more than 1,800 professionals and has served 3,000+ clients across 55 countries. Collaborative lateral thinking, hard-earned experience, and multidisciplinary capabilities drive results and Ankura is unrivalled in its ability to assist clients to Protect, Create, and Recover Value. For more information, please visit, ankura.com.
Recently, cybersecurity experts have identified new threats targeting both mobile devices and Internet of Things (IoT) devices.
Worldwide Technology
Ankura Consulting Group LLC’s articles from Ankura Consulting Group LLC are most popular:
  • with readers working within the Property industries
Ankura Consulting Group LLC are most popular:
  • within Compliance topic(s)

Malware Activity

Mobile and IoT Malware Highlights Growing Risks

Recently, cybersecurity experts have identified new threats targeting both mobile devices and Internet of Things (IoT) devices. A malware called Albiriox has appeared on Android platforms, distributed through a malware-as-a-service platform that offers various malicious features. It tricks users into installing fake apps by using social engineering, then gains extensive control over infected phones to steal sensitive data, manipulate screens, and perform fraud. Meanwhile, a botnet named ShadowV2, based on the Mirai malware, has been attacking IoT devices like routers from brands such as D Link and TP Link by exploiting known security flaws, including some outdated vulnerabilities in unsupported devices. ShadowV2 can launch large-scale Distributed Denial of Service (DDoS) attacks, disrupting online services across sectors worldwide. Both threats underscore the increasing sophistication of cybercriminals and the urgent need for users and organizations to keep their devices updated and secure against these evolving dangers. CTIX analysts will continue to report on the latest malware strains and attack methodologies.

Threat Actor Activity

Australian Man Sentenced for 'Evil Twin' WiFi Attacks at Airports and Flights

Michael Clapsis, a 44-year-old Australian man, has been sentenced to seven (7) years and four (4) months in prison for operating "evil twin" WiFi networks at airports and on flights in Australia, including Perth, Melbourne, and Adelaide. Using a WiFi Pineapple device designed for network penetration testing, Clapsis created rogue access points with the same names as legitimate networks, tricking travelers into connecting. Victims were then directed to phishing pages where they were prompted to enter email or social media credentials. The Australian Federal Police (AFP) launched an investigation after an airline employee discovered a suspicious network, leading to the seizure of Clapsis's equipment, including a laptop and mobile phone. Forensic analysis revealed thousands of stolen images and videos, as well as personal credentials from the fraudulent WiFi pages. Clapsis pleaded guilty to multiple charges, including unauthorized access and modification of data, stealing, and attempted destruction of evidence. He also accessed his employer's laptop to obtain information about confidential meetings with the AFP. This case highlights the risks associated with free and public WiFi networks. CTIX analysts recommend using virtual private networks (VPNs), strong passwords, and to disable automatic WiFi connectivity to protect against such attacks.

Vulnerabilities

CISA Flags Exploited OpenPLC ScadaBR Flaw Amid Hacktivist ICS Targeting

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2021-26829, a medium-severity cross-site scripting (XSS) vulnerability in the open-source OpenPLC ScadaBR human-machine interface, to its Known Exploited Vulnerabilities (KEV) catalog following confirmed real-world abuse targeting industrial control systems. Although the flaw was patched in 2021 and affects older Windows and Linux versions of ScadaBR, it was recently exploited by pro-Russian hacktivist group TwoNet during attacks against ICS/OT honeypots designed to mimic water treatment facilities and operated by Forescout. In these incidents, attackers leveraged weak or default credentials to access the environment, created rogue user accounts, and exploited the XSS flaw to deface the HMI login page with scripted pop-up messages, while also disabling logs and alarms (demonstrating how low-skill adversaries can still disrupt operational technology environments using easily exploitable, legacy weaknesses). While the targeted systems were simulated and caused no real-world impact, the activity highlights ongoing hacktivist interest in the water sector and broader ICS infrastructure, as well as the risk posed by outdated interfaces and poor security hygiene. CISA has directed all U.S. Federal Civilian Executive Branch (FCEB) agencies to remediate the vulnerability under Binding Operational Directive 22-01 by no later than December 19, 2025, and recommends that private organizations likewise review the KEV catalog to reduce exposure, warning that more sophisticated threat actors could quietly exploit similar flaws in targeted, undisclosed operations. CTIX analysts urge any affected administrators to ensure their infrastructure is patched in time.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

[View Source]

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More