ā±ļø Read Time: 7 minutes
Editorās Note: This week is a nice sampler platter of āthe internet is held together with duct tapeā: CVSS 10.0 bugs in core web stacks, universities popping like Oracle-flavored popcorn, and AI pretending your momās been kidnapped. Patch fast, verify everything, trust nothing. Happy Friday.
š Table of Contents
š„ Major Breaches & Incidents ā Oracle higher-ed campaign, Cernerās slow-mo health breach
šØ Emerging Threats & Vulnerabilities ā React2Shell mega-vuln, Android banking malware, āsystem alertā phishing
šļø Privacy Watch ā MFA bypass via Evilginx, fake copyright/X scams
šµļøāāļø APTs & State Sponsored Attacks ā DPRKās npm games, PRCās BRICKSTORM backdoor
š¤ AI in Cyber ā Malicious LLMs for wannabe hackers, AI ākidnappingā scam
š Story Follow-Ups / Threat Intel ā Ransomwareās monster month
š„ Major Breaches & Incidents
š§āšš½ļø Oracle Zero-Day Campaign Snags University of Phoenix and UPenn
A broader exploitation campaign against Oracle E-Business Suite zero-day CVE-2025-61882 led to data theft at both the University of Phoenix and the University of Pennsylvania. Attackers accessed documents containing personal and institutional data, as part of a Clop-linked spree hitting Oracle EBS customers. The story here isnāt just ātwo schools got poppedā ā itās that a shared ERP platform quietly turned into a common blast radius.
šļø If your ERP is old, complex, and ātoo critical to touch,ā itās also probably your biggest liability.š„š¾ Patients Are Only Now Hearing About a January Cerner/Oracle Health Breach
A legacy Cerner (Oracle Health) system was breached back in January, but some patients in Missouri are just receiving notification letters now. Lawyers say it may be one of the biggest U.S. healthcare breaches this year, involving sensitive health and personal data. The delay highlights how slow some providers are to coordinate breach investigations, vendor communications, and patient notifications.
šļø The incident response might be ācontained,ā but reputational damage is still very much in progress.
This newsletter you couldnāt wait to open? It runs on beehiiv ā the absolute best platform for email newsletters.
Our editor makes your content look like Picasso in the inbox. Your website? Beautiful and ready to capture subscribers on day one.
And when itās time to monetize, you donāt need to duct-tape a dozen tools together. Paid subscriptions, referrals, and a (super easy-to-use) global ad network ā itās all built in.
beehiiv isnāt just the best choice. Itās the only choice that makes sense.
šØ Emerging Threats & Vulnerabilities
š„š§© Critical React2Shell RCE in React/Next.js Is Being Actively Exploited
A CVSS 10.0 bug (CVE-2025-55182, nicknamed āReact2Shellā) in React Server Components and Next.js lets unauthenticated attackers execute arbitrary JavaScript on backend servers via crafted RSC payloads. The React team has confirmed the issue and shipped patches, while ecosystem coverage shows that common frameworks (Next.js, Expo, various Node stacks) are widely exposed if not updated. AWS reports that China-nexus threat groups began targeting unpatched workloads within hours of disclosure, and Help Net Security warns exploitation attempts are ramping up across internet-facing apps. Default configurations are impacted, so this isnāt a āweird edge caseā ā itās a platform-level fire drill.
šļø If your app says āReactā and āserverā anywhere in the same sentence, someone should already be patching.š±šø New Android Malware Lets Criminals Drain Your Bank Account
Researchers found a new Android banking trojan that targets hundreds of financial apps and gives attackers full remote control over infected devices. Once on the phone, criminals can view screens, capture credentials, and execute banking transactions as if they were the legitimate user. Combined with weak mobile hygiene and side-loading, the barrier to large-scale fraud is getting lower.
šļø If your mobile fleet policy is ājust donāt install weird stuff,ā you donāt have a policy.šØš Phishing Emails Masquerading as āSpam Filter Alertsā Are Stealing Logins
A phishing campaign is impersonating automated spam-filter or quota notifications, warning users about āheldā or āblockedā messages. Victims who click through are taken to fake login pages where credentials and MFA codes are captured in real time. Because the emails mimic internal IT tooling and look routine, theyāre slipping past people whoād normally ignore obvious phishing.
šļø User training that only focuses on āunexpectedā emails misses the fact that attackers now copy the boring ones.
In 2017, hackers stole an entire casinoās high-roller database through⦠an Internet-connected fish tank. (Darktrace)šļø Privacy Watch
šš Attackers Have a New Way to Slip Past Your MFA
Using Evilginx phishing proxies, attackers intercept credentials and session cookies from users at educational institutions, allowing them to hijack authenticated sessions without ever touching the MFA step again. Even āstrongā MFA doesnāt help once the attacker has your valid session token in hand. Itās another proof point that phishing-resistant mechanisms and hardened login flows matter more than checkbox āwe have MFAā security.
šļø MFA is the floor, not the ceiling ā especially when your users will happily log into a fake SSO page.āļøšØ Bogus Copyright Warnings Are Stealing X (Twitter) Accounts
Scammers are sending fake copyright or DMCA-style notices claiming your X account violated content rules, complete with urgent language and takedown threats. The links lead to phishing pages that snag X usernames, passwords, and sometimes additional personal information. Itās a clever abuse of creator-platform anxiety, targeting people who fear losing reach or monetization.
šļø āYes, legal is mad at youā is a very effective phish subject line.
Want to get the most out of ChatGPT?
ChatGPT is a superpower if you know how to use it correctly.
Discover how HubSpot's guide to AI can elevate both your productivity and creativity to get more things done.
Learn to automate tasks, enhance decision-making, and foster innovation with the power of AI.
šµļøāāļø APTs & State Sponsored Attacks
š°šµš¦ North Korean Hackers Deploy 197 Malicious npm Packages at Web3 Devs
DPRK-linked operators pushed nearly 200 malicious npm packages as part of the āContagious Interviewā campaign, targeting blockchain and Web3 developers. The packages are seeded through fake coding tests and typosquats, aiming to steal crypto assets, keys, and developer credentials from compromised environments. Software supply chains remain one of North Koreaās favorite indirect revenue streams.
šļø If youāre building Web3 apps and ānpm installā is your only security gate, youāre basically speed-running compromise.šØš³š§± PRC Hackers Using BRICKSTORM Backdoor Against VMware/Windows Environments
CISA says Chinese state actors are deploying a Golang-based backdoor dubbed BRICKSTORM to compromise VMware vSphere and Windows systems. The malware provides shell access, file operations, and credential theft, enabling long-term persistence deep in virtual infrastructure. Itās the kind of access that lends itself to both espionage and potential sabotage.
šļø Your hypervisor is now officially part of your threat surface ā not just āboring plumbingā for the SOC to ignore.
š¤ AI in Cyber
š¤š§Ø Malicious LLMs Are Power-Ups for Low-Skill Attackers
Underground LLMs like WormGPT 4 and KawaiiGPT are churning out working ransomware lockers, phishing kits, and lateral movement scripts for attackers with minimal technical ability. These tools remove much of the trial-and-error barrier that used to slow down would-be cybercriminals, letting them iterate quickly on working payloads and infrastructure. Instead of copy-pasting shell scripts from random forums, theyāre now asking a model to generate tailored tools for their target environment.
šļø Assume āscript kiddieā now comes with an AI co-pilot ā and adjust your threat models accordingly.šš§¬ AI-Generated Voice āKidnappingā Scam Triggers Real Police Response
Scammers used AI-cloned voice audio to impersonate a womanās mother, claiming sheād been kidnapped and demanding money ā realistic enough to trigger a full police response before anyone realized it was fake. The incident shows how synthesized voices can shortcut normal skepticism and overwhelm both victims and first responders. It also hints at a future where emergency calls, extortion attempts, and even internal āCEOā instructions may all be generated on demand.
šļø If youāre relying on āI recognized their voiceā as an auth factor, youāre already behind.
š Story Follow-Ups / Threat Intel
š°š¦ Ransomware Attacks Hit 640 Organizations in November ā Second-Highest Month of 2025
Cyble tracked 640 ransomware incidents in November, making it the second-busiest month of 2025 after February. IT services, manufacturing, healthcare, and professional services topped the victim list, showing how broadly opportunistic most crews have become. The report underscores that while weāre all obsessing over AI and supply chains, āclassicā ransomware remains the default monetization path for many threat groups.
šļø Ransomware is not last yearās problem ā itās still the baseline failure mode for weak controls.
Thanks for reading this weekās edition. Like what you see? Forward it!
Hate everything you see or have other feedback? Reply back to this email!


