#AutomotiveSecurity

2026-01-22

Alright team, it's been a pretty packed 24 hours in the cyber world! We've got some major breaches, a new AI-assisted Linux malware framework, critical vulnerabilities in popular software and automotive systems, and some serious discussions around ransomware negotiation ethics and government surveillance. Let's dive in:

Under Armour Data Breach ⚠️

- Have I Been Pwned (HIBP) has ingested data from an alleged Everest ransomware attack in November, affecting 72.7 million Under Armour accounts.
- The leaked data includes names, email addresses, dates of birth, genders, geographic locations, and purchase details.
- Under Armour has yet to publicly acknowledge the breach, despite Everest's claims and a class-action lawsuit filed on behalf of customers.

🕵🏼 The Register | go.theregister.com/feed/www.th

PcComponentes Credential Stuffing Attack 🔒

- Spanish tech retailer PcComponentes denies claims of a 16.3 million customer data breach but confirms a credential stuffing attack.
- Their investigation found no unauthorised access to internal systems, but info-stealer logs from other breaches were used to compromise a "small number" of accounts.
- As a response, PcComponentes has enforced mandatory two-factor authentication (2FA) for all accounts, invalidated active sessions, and added CAPTCHA to login pages.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu

LastPass Phishing Campaign 🎣

- LastPass is warning users about an active phishing campaign impersonating the password manager, urging them to "create a local backup" of their vaults due to "upcoming maintenance."
- These emails, sent from suspicious addresses with urgent subject lines, redirect users to phishing sites designed to steal their master passwords.
- LastPass stresses they will never ask for a master password and advises users to report suspicious emails to abuse@lastpass.com, noting that the campaign was timed over a US holiday weekend to reduce detection.

📰 The Hacker News | thehackernews.com/2026/01/last
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th
👁️ Dark Reading | darkreading.com/application-se

CrashFix Malware Leverages Browser Crashes for Corporate Infiltration 💥

- A new "CrashFix" variant of the ClickFix scam, attributed to the KongTuke threat actor, intentionally crashes victims' browsers via a malicious extension (NexShield).
- It then presents a fake security message prompting users to run a "fix," which executes a PowerShell script to contact a C2 server.
- Domain-joined corporate systems receive ModeloRAT, a Python-based remote access Trojan with extensive reconnaissance capabilities, while home users appear to be part of a testing phase.

👁️ Dark Reading | darkreading.com/cyberattacks-d

VoidLink Linux Malware & AI's Impact on Cybercrime 🤖

- The sophisticated Linux malware framework, VoidLink, is believed to have been predominantly developed by a single actor with significant AI assistance, reaching 88,000 lines of code in under a week.
- Check Point Research identified operational security blunders, including TRAE-generated helper files and LLM-generated internal planning documents, suggesting a "Spec Driven Development" approach using AI agents.
- This highlights how AI is industrialising cybercrime, lowering the barrier to entry for complex attacks and enabling threat actors to rapidly envision, create, and iterate sophisticated systems, as also noted by Group-IB.

📰 The Hacker News | thehackernews.com/2026/01/void

Black Basta Ringleader Identified 🚨

- Oleg Evgenievich Nefedov, 35, has been publicly identified by German police as the alleged leader of the Black Basta ransomware group and added to Europol and Interpol's most-wanted lists.
- This identification follows raids in Ukraine on the homes of two other Russian nationals accused of participating in Black Basta's crimes, seizing data and cryptocurrency.
- Nefedov is accused of extorting over 100 companies in Germany and 600 globally, with authorities suggesting prior involvement with the Conti ransomware group.

🤫 CyberScoop | cyberscoop.com/black-basta-lea

SMS Blaster Scams: Fake Cell Towers in Cars 🚗

- Greek police arrested suspects using a fake cell tower hidden in a car trunk to send mass phishing messages across Athens.
- The device, an "SMS blaster," mimicked legitimate telecom infrastructure, forcing nearby phones to downgrade to less secure 2G networks to harvest data.
- Attackers then sent phishing links, posing as banks or couriers, to steal payment card details, a tactic previously seen in Thailand, Indonesia, Qatar, and the UK, often using similar Chinese-manufactured equipment.

🗞️ The Record | therecord.media/greek-police-a

Fortinet FortiGate Patch Bypass Under Active Exploitation 🛡️

- Fortinet customers are reporting that patched FortiGate firewalls (FortiOS 7.4.9 and 7.4.10) are still vulnerable to a patch bypass for CVE-2025-59718, a critical SSO authentication flaw.
- Attackers are exploiting this by creating local admin accounts via malicious SSO logins, similar to previous attacks seen in December 2025.
- Fortinet is reportedly preparing new FortiOS versions (7.4.11, 7.6.6, 8.0.0) to fully address the issue; until then, admins are advised to disable the FortiCloud login feature if enabled.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu

ACF Extended WordPress Plugin RCE 🌐

- A critical vulnerability (CVE-2025-14533) in the Advanced Custom Fields: Extended (ACF Extended) WordPress plugin allows unauthenticated attackers to gain administrative privileges.
- The flaw, affecting versions 0.9.2.1 and earlier, stems from a lack of role restriction enforcement during form-based user creation/updates, even when role limitations are configured.
- Roughly 50,000 sites remain exposed, and while no active exploitation of this specific flaw has been observed, large-scale WordPress plugin reconnaissance activity is ongoing, targeting other known vulnerabilities.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu

GitLab Patches 2FA Bypass and DoS Flaws 💻

- GitLab has released patches for high-severity vulnerabilities, including a two-factor authentication (2FA) bypass (CVE-2026-0723) and multiple denial-of-service (DoS) flaws.
- The 2FA bypass allows attackers with knowledge of a victim's credential ID to circumvent multi-factor authentication by submitting forged device responses.
- Admins are strongly advised to upgrade self-managed GitLab installations to versions 18.8.2, 18.7.2, or 18.6.4 immediately to address these issues.

🤖 Bleeping Computer | bleepingcomputer.com/news/secu

Chainlit AI Framework Flaws Enable Data Theft and SSRF 🤖

- High-severity "ChainLeak" vulnerabilities (CVE-2026-22218, CVE-2026-22219) were found in the open-source Chainlit AI framework, allowing arbitrary file reads and Server-Side Request Forgery (SSRF).
- These flaws can be combined to steal sensitive data, leak cloud environment API keys, and enable lateral movement within an organisation.
- Patches were released in Chainlit version 2.9.4, highlighting how traditional software vulnerabilities are now being embedded into AI infrastructure, creating new attack surfaces.

📰 The Hacker News | thehackernews.com/2026/01/chai

Microsoft MarkItDown MCP Server Vulnerability ☁️

- A vulnerability dubbed "MCP fURI" in Microsoft's MarkItDown Model Context Protocol (MCP) server allows arbitrary calling of URI resources, leading to privilege escalation, SSRF, and data leakage.
- This flaw affects the server when running in AWS EC2 instances using IDMSv1, potentially allowing attackers to obtain instance credentials and access AWS accounts.
- BlueRock's analysis found over 36.7% of 7,000 MCP servers are likely exposed; mitigation includes using IMDSv2, private IP blocking, and restricting metadata service access.

📰 The Hacker News | thehackernews.com/2026/01/chai

`binary-parser` npm Library Bug Allows Node.js RCE ⚙️

- A security vulnerability (CVE-2026-1245) in the popular `binary-parser` npm library allows for arbitrary JavaScript execution with Node.js process privileges.
- The flaw stems from a lack of sanitisation of user-supplied values when JavaScript parser code is dynamically generated at runtime using the "Function" constructor.
- Users of `binary-parser` are advised to upgrade to version 2.3.0 and avoid passing untrusted input into parser field names or encoding parameters.

📰 The Hacker News | thehackernews.com/2026/01/cert

Cloudflare WAF Bypass Bug Fixed 🛡️

- Cloudflare has patched a logic flaw in its ACME (Automatic Certificate Management Environment) validation that allowed attackers to bypass its Web Application Firewall (WAF) and directly access origin servers.
- The "side door" was caused by the WAF disabling features for ACME challenge tokens without verifying the token matched an active challenge for the hostname.
- While no evidence of in-the-wild exploitation was found, researchers warn that such WAF bypasses could become more dangerous with AI-driven attacks.

🕵🏼 The Register | go.theregister.com/feed/www.th

EU Proposes Phasing Out "High-Risk" Telecom Suppliers 🇪🇺

- The European Commission (EC) is proposing a revised Cybersecurity Act that could force member states to phase out IT and telecoms kit from "high-risk suppliers" (implicitly Huawei and ZTE) within three years.
- This move aims to bolster cybersecurity across the bloc by addressing supply chain security challenges in critical infrastructure and simplifying certification frameworks.
- China has accused the EU of protectionism, with Huawei stating the proposal violates basic legal principles and WTO obligations by targeting suppliers based on country of origin rather than factual evidence.

🕵🏼 The Register | go.theregister.com/feed/www.th
🗞️ The Record | therecord.media/eu-unveils-new

Curl Shuts Down Bug Bounty Program Due to AI "Slop" 🚫

- Daniel Stenberg, the maintainer of the popular open-source `cURL` tool, has ended the project's bug bounty program, citing a struggle to assess a flood of AI-generated contributions.
- Stenberg hopes this move will "remove the incentive for people to submit crap and non-well researched reports," which have placed a high load on the `cURL` security team.
- While acknowledging AI can aid bug hunting, he maintains that developers should only report bugs they fully understand and can reproduce, reserving the right to publicly criticise those who waste the team's time.

🕵🏼 The Register | go.theregister.com/feed/www.th

#CyberSecurity #ThreatIntelligence #Ransomware #Phishing #Vulnerabilities #ZeroDay #AI #Malware #IncidentResponse #DataBreach #InfoSec #WordPress #Fortinet #GitLab #CloudSecurity #AutomotiveSecurity #Regulation #Privacy #OpenSource

2025-12-17

Researchers disclosed a critical buffer overflow (CVE-2024-39432) in connected car modems that enables remote code execution and lateral movement across the vehicle SoC.

The findings challenge long-held assumptions about cellular protocol isolation in automotive systems.

Full analysis:
technadu.com/critical-vulnerab

#AutomotiveSecurity #ConnectedCars #RCE #IoTSecurity

Critical Vulnerabilities in Connected Car Modems Expose Critical Vehicle Security Risks, Researchers Say
2025-12-08

INC Ransom claims Yazaki Group breach - 350 GB allegedly stolen, incl. technical drawings for BMW & Nissan.
technadu.com/inc-ransom-claims

The dataset reportedly includes NDAs, HR medical records, financial data, and sensitive engineering documents. If validated, this represents substantial IP and supply-chain exposure across multiple OEMs.

#Cybersecurity #Ransomware #DataBreach #Yazaki #BMW #Nissan #AutomotiveSecurity #SupplyChainSecurity

INC Ransom Claims Attack on Major Automotive Supplier Yazaki Group, Potentially Impacting BMW, Nissan
2025-11-03

Headed to #escar this week?

​Catch Franziskus talking high assurance crypto. And don't miss Karthik's keynote at the "PQC Migration & Supply Chain Readiness" workshop.

Lets connect and talk #verification and #cryptography.

escar.info/escar-europe/

#AutomotiveSecurity #PQC #Crypto #SupplyChain

2025-10-22

Researchers show that lasers can disrupt vehicle microchips — proving that even light can be weaponized in the wrong hands. 🔦🚘 #AutomotiveSecurity #Resilience

darkreading.com/ics-ot-securit

2025-10-21

Did you know that your car is the new BYOD. As vehicles sync with phones and clouds, data privacy and attack surfaces grow on wheels. 🚗📲 #AutomotiveSecurity #ConnectedDevices

darkreading.com/vulnerabilitie

V0lk3n :verified:v0lk3n@infosec.exchange
2025-09-24

Kali Linux 2025.3 is out!

I hope that you will enjoy #NetHunter update, and the news in #CARsenal 😍

I also wish to give all my best wishes to @steevdave who is no longer part of @kalilinux team, i'm sure that your next adventure will be awesome 🥰

kali.org/blog/kali-linux-2025-

#nethunter #kali #kalilinux #linux #carsenal #automotivesecurity #carhacking #pentest #cybersecurity

@arszilla@bird.makeup @arszilla @kalilinux@bird.makeup @kimocoder @steevdave @yesimxev @gamb1t_kali @androidmalware2 @davidbombal

Finite StateFiniteState
2025-09-16

🚨 One week until kicks off in Washington, DC!

With the on the horizon, automakers face growing demands for transparency, SBOM management, & secure-by-design practices. The Finite State team is heading to the summit to help you stay ahead. Book time with us now 👉 info.finitestate.io/auto-isac-

V0lk3n :verified:v0lk3n@infosec.exchange
2025-08-31

Updated preview of #CARsenal for #Kali #Nethunter 2025.3

Few main changes from 2025.2 :
- New MSF Automotive tab
- Rework "About" dialog
- Floatable ICSim display, Play Stop button in menu bar
- Some settings moved into dialog
- More editable buttons

youtube.com/shorts/iNnBt6XmtKU

@davidbombal @androidmalware2 @kalilinux @kalilinux@bird.makeup @kimocoder @yesimxev @steevdave @gamb1t_kali @offsec

#KaliLinux #Automotive #AutomotiveSecurity #CarHacking #CyberSecurity #Nethunter #KaliNethunter

2025-07-13

Security researchers reveal Bluetooth vulnerabilities affecting vehicles from multiple vendors

Vulnerabilities: Use-after-free; improper validation; incorrect function termination, function call with incorrect parameter

Impact: Can potentially allow access to the car's internals through the infotainment system

Vulnerability IDs: CVE-2024-45431 to CVE-2024-45434

Remediation:
- Patches were released last year on the underlying SDK
- Vendors using the SDK need to apply the patches

#cybersecurity #automotivesecurity #Bluetooth

bleepingcomputer.com/news/secu

Pen Test PartnersPTP@infosec.exchange
2025-06-26

We turned a car into a Mario Kart controller! 🏎️🎮
 
At PTP Cyber Fest, attendees used the steering wheel, pedals, and brakes of a real Renault Clio to play SuperTuxKart.
 
We tapped into the CAN bus with cheap wire splicers.
 
Mapped the signals using Python.
 
We even wrote our own state machine to make it all work.
 
Sure, it was a bit impractical. We had to remove the wing mirrors to fit it inside the building, deal with dodgy electrics, and babysit the car battery.
 
Next year, we might try something a bit more portable.
 
📌Read how we did it here: pentestpartners.com/security-b
 
#CyberSecurity #AutomotiveSecurity #CANbus #HackThePlanet #PenTesting #Python #Infosec #PTPCyberFest2025

Finite StateFiniteState
2025-05-20

Day 1 at 2025 is here!

If you’re navigating automotive cybersecurity challenges, come see how we’re enabling secure-by-design practices for connected vehicles.
📍 info.finitestate.io/escar-usa-

Finite StateFiniteState
2025-05-16

We're less than 1 WEEK out from 2025!

📍Stop by to learn how we help automotive manufacturers meet evolving regulatory demands & secure embedded systems across the SDLC.

🔗 info.finitestate.io/escar-usa-

Security Landsecurityland
2025-04-16

Researchers demonstrate how hackers could remotely control 2020 Nissan Leaf vehicles, access location data, and even record in-car conversations through critical security flaws. See the demonstration and learn what Nissan is doing to address these serious vulnerabilities.

security.land/critical-securit

Global Quality Services (GQS)gqssingapore
2025-03-24

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst