CISO Talk by James Azar
CyberHub Podcast
Australian Pension Fund Hack Rattles Consumers, Apple Sues the UK Government, CrushFTP Attacks, Ivanti Again
0:00
Current time: 0:00 / Total time: -16:34
-16:34

Australian Pension Fund Hack Rattles Consumers, Apple Sues the UK Government, CrushFTP Attacks, Ivanti Again

The latest cybersecurity news as Australian reel from the weekend pension fund hack as standards lack for cybersecurity across the globe.

Good Morning, Security Gang – Your Tuesday, April 8, 2025 CyberHub Podcast Recap


Welcome to another packed episode of the CyberHub Podcast! Although broadcasting from the road in New York rather than the usual studio, today’s show dives deep into critical cybersecurity events shaping the global threat landscape. Grab your coffee or tea—coffee-cup cheers—and let’s get right into the top stories.

Australian Pension Fund Credential Stuffing Attack

A major Australian superannuation fund with over AUD 360 billion under management fell victim to a simultaneous wave of credential stuffing attempts, compromising around 600 member accounts. At least four of these were used for unauthorized withdrawals, amounting to roughly AUD 500,000 (USD 400,000). The incident highlights how governments and regulators tend to focus on breach notification requirements, yet fall short on enforcing robust minimum standards. Observers criticize Australia (and other nations) for lacking clear cybersecurity baselines that would require strong identity and access controls—especially in critical sectors like finance.

WK Kellogg Data Theft Linked to Clop/Cleo Breach

WK Kellogg, an American food giant known for cereals like Corn Flakes and Froot Loops, discovered its data was stolen in a late 2024 attack involving Clop ransomware exploits against Clio file transfer (FTP) software. Investigations trace unauthorized access to December 2024, reflecting persistent visibility gaps in third-party environments. The breach echoes earlier reports from Western Alliance Bank, which also had data compromised through Clio’s vulnerable secure file transfer platform.

Apple Sues UK Government Over Alleged Encryption Backdoor

Apple is taking legal action against the British government to contest a secret order demanding backdoor access to iCloud user data. A special UK tribunal, the only court authorized to handle certain national security matters, revealed this case exists despite initial attempts to maintain secrecy. The outcome could shape future government powers to mandate technological backdoors, raising privacy concerns far beyond the UK.

Android Zero-Day Patches

Google released its April 2025 security updates to address two actively exploited kernel vulnerabilities (CVE-2024-53150 and CVE-2024-531907) that affect the USB audio component. While details remain sparse, limited targeted attacks suggest spyware vendors or other advanced threat actors may be leveraging these zero-days. Amnesty International reports connections to possible exploitation in Europe, underscoring how frequently mobile platforms are probed via highly specialized tools.

CrushFTP Vulnerability Exploitation

A newly revealed CrushFTP flaw (now standardized as CVE-2025-31161 after controversy over CVE assignment) has been actively exploited since late March. Threat actors gain remote access through the vulnerability, then pivot by installing legitimate tools like AnyDesk or Mesh Agent for persistence and credential dumping. Researchers at Huntress emphasize that the best defensive posture is prompt patching, combined with vigilant monitoring of logs for anomalous remote desktop installations.

Everest Ransomware Gang Website Hacked

In a rare instance of “threat actors attacking threat actors,” the Everest ransomware group’s dark web site was breached and defaced with a mocking message: “Don’t do crime, crime is bad.” While details remain unclear, the takedown means Everest’s leak platform is offline—at least temporarily. Whether this was the work of rival cybercriminals, security researchers, or hacktivists remains unknown.

Ivanti Connect Secure Vulnerabilities

Around 5,000 internet-exposed Ivanti (Pulse Secure) Connect Secure appliances remain unpatched against a high-severity stack-based buffer overflow (CVE-2025-22457). Exploitable without authentication, the flaw could allow remote code execution. Although Ivanti released a patch in February, many organizations have yet to apply it. Security pros warn of heightened exploitation by Chinese and other advanced persistent threat (APT) groups.

ESET Software Exploited by ToddyCat

A vulnerability in ESET security solutions (CVE-2025-XXXXXX) allowed the state-backed ToddyCat group to covertly deliver malware via ESET’s own processes. The flaw, given a medium severity rating by ESET with a CVSS score of 6.8, has been fixed, though some in the community argue the potential impact on enterprise defenses warrants a higher severity label. ESET insists it has seen no evidence of in-the-wild exploitation, but practitioners remain concerned about any use of mainstream antivirus software as a threat vector.

Russia Arrests CEO of a Tech Firm Linked to Disinformation

Russian authorities detained the CEO of ASA Group, a hosting provider in St. Petersburg alleged to be involved in “Doppelganger” disinformation activities. Officially, he and two coworkers face charges related to running a criminal organization and drug trafficking. Given Russia’s state-controlled media environment, many experts view this as a possible attempt to placate international critics, with some speculating the arrests are more about internal politics than dismantling genuine cybercriminal or disinformation networks.

Action Items

  • Strengthen Access Controls: Deploy stronger identity verification and implement multifactor authentication to thwart credential stuffing attacks, especially for financial and critical services.

  • Prioritize Patch Management: Immediately update all vulnerable FTP solutions (CrushFTP, Clio), Ivanti appliances, Android devices, and ESET software to close dangerous exploits.

  • Monitor Third-Party Providers: Establish clear oversight of any external vendors or software platforms to ensure timely notifications and collaboration in incident response.

  • Safeguard Encryption: Keep an eye on evolving legal battles (e.g., Apple vs. UK) that could mandate weaker encryption. Reassess encryption strategies to maintain robust data privacy.

  • Stay Alert for APT Activity: Remain vigilant against advanced persistent threats targeting zero-day flaws. Track relevant advisories and intelligence feeds for new IOCs.

  • Validate Tools for Persistence: Regularly audit remote desktop and monitoring tools like AnyDesk, Mesh Agent, or similar. Legitimate software can be weaponized if not tracked.

  • Follow Threat Actor “Takedown” News: Ransomware gangs are increasingly targeted by vigilantes or rivals. Such disruptions might be brief but can break the chain of data extortion if leveraged quickly.

  • Evaluate Vendor Self-Assessments: Challenge vendor severity ratings if you suspect a higher impact. Conduct your own risk assessments to guide internal prioritization.

Thanks for reading CISO Talk by James Azar! This post is public so feel free to share it.

Share

✅ Story Links:

https://www.bankinfosecurity.com/top-australian-pension-funds-breached-in-coordinated-hacks-a-27947

https://www.bleepingcomputer.com/news/security/food-giant-wk-kellogg-discloses-data-breach-linked-to-clop-ransomware/

https://therecord.media/uk-court-confirms-apple-suing-over-backdoor-request

https://www.securityweek.com/android-update-patches-two-exploited-vulnerabilities/

https://www.securityweek.com/threat-actors-set-up-persistent-access-to-hosts-hacked-in-crushftp-attacks/

https://www.bleepingcomputer.com/news/security/everest-ransomwares-dark-web-leak-site-defaced-now-offline/

https://www.securityweek.com/exploited-vulnerability-puts-5000-ivanti-vpn-appliances-at-risk/

https://therecord.media/eset-software-vulnerability-malware-toddycat-apt

https://therecord.media/doppelganger-ceo-arrests-russia-tech

🔔 Subscribe now for the latest insights from industry leaders, in-depth analyses, and real-world strategies to secure your digital world. https://www.youtube.com/@TheCyberHubPodcast/?sub_confirmation=1

🚨 Important Links to Follow:

👉Website:

👉Listen here: https://linktr.ee/cyberhubpodcast

Stay Connected With Us.

👉Facebook: https://www.facebook.com/CyberHubpodcast/

👉LinkedIn: https://www.linkedin.com/company/cyberhubpodcast/

👉Twitter (X): https://twitter.com/cyberhubpodcast

👉Instagram: https://www.instagram.com/cyberhubpodcast

🤝 For Business Inquiries: info@cyberhubpodcast.com

=============================

🚀 About The CyberHub Podcast.

The Hub of the Infosec Community.

Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.

Tune in to our podcast Monday through Thursday at 9AM EST for the latest news.

Discussion about this episode