Nation-state attacks escalate again

CybersecurityHQ weekly analysis

Welcome reader to your CybersecurityHQ report

Brought to you by:

👣 Smallstep – Secures Wi-Fi, VPNs, ZTNA, SaaS and APIs with hardware-bound credentials powered by ACME Device Attestation

🏄‍♀️ Upwind Security – Real-time cloud security that connects runtime to build-time to stop threats and boost DevSecOps productivity

🔧 Endor Labs – App security from legacy C++ to Bazel monorepos, with reachability-based risk detection and fix suggestions across the SDLC

 📊 LockThreat – AI-powered GRC that replaces legacy tools and unifies compliance, risk, audit and vendor management in one platform

🧠 Ridge Security – The AI-powered offensive security validation platform

Forwarded this email? Join 70,000 weekly readers by signing up now.

Get annual access to our deep dives, weekly cyber intel podcast report, premium content, AI Resume Builder, and more — all for just $299. Corporate plans are now available too.

This Week in Cybersecurity: 16B Breached Credentials, AI-Driven Malware, and Geopolitical Cyber Clashes

Executive Summary & Bottom Line

Strategic Assessment: This week demands urgent action across three prioritized threat vectors: (1) unpatchable Brother printer vulnerabilities (CVE-2024-51978, CVSS 9.8), (2) escalating ransomware attacks targeting healthcare and financial sectors, and (3) geopolitical cyber risks from Iranian and Chinese actors. Swift response within 24–72 hours is critical to prevent network compromise, operational disruption, and strategic exposure.

Quick Stats Dashboard

  • 356+ High-severity vulnerabilities reported (SonicWall, Brother, Chrome)

  • 16B Login credentials exposed in massive data breach

  • 743K Individuals impacted by McLaren Health Care breach

  • 100K+ Vulnerable Brother devices exposed to remote code execution

  • 7.4M Paraguayan records leaked via infostealer malware

  • $90M Stolen in Iranian crypto heist by Predatory Sparrow

  • 76 Malicious npm packages dismantled in Lazarus Group campaign

  • 37.4% Increase in ransomware attacks targeting healthcare

  • 4 REvil ransomware operators released after guilty pleas

Market-Moving Intelligence:

  • Critical Vulnerability: Brother printer flaw (CVE-2024-51978) affects 748 models across 5 vendors, enabling remote code execution; unpatchable via firmware.

  • Ransomware Surge: McLaren Health Care’s second attack in 12 months (743,000 patients impacted) and a JPMorgan phishing breach reflect a 67% ransomware rate in healthcare and rising financial sector targeting.

  • Geopolitical Escalation: Iranian cyberattacks on Israel surged 700% since June 12, led by APT33 and Charming Kitten, with spillover risks to U.S. infrastructure. Chinese Salt Typhoon’s telecom attacks signal pre-conflict positioning.

  • Market Activity: M&A activity (e.g., Abacus Group/Entara, LevelBlue/Aon) underscores focus on managed security and litigation consulting.

Strategic Decision Timeline:

  • Next 24 Hours: Patch SonicWall (CVE-2024-53704), segment Brother devices, disable vulnerable services.

  • Next 72 Hours: Test ransomware containment (<30 seconds), monitor Iranian threat groups.

  • Next 30 Days: Harden supply chain, adopt zero-trust for vendor access. See Figure 1: Action Timeline Graphic (available upon request).

Critical Threat Intelligence: Immediate Action Required

1. Zero-Day Exploitation Active [CRITICAL RISK – Priority 1]

Brother Printer Vulnerabilities – Unpatchable Critical Flaw

  • Intelligence Assessment: CVE-2024-51978 (CVSS 9.8) enables unauthenticated attackers to generate default administrator passwords across 695 device models. Chained with CVE-2024-51979 (remote code execution) and CVE-2024-51981 (Server-Side Request Forgery), it poses severe risks.

  • Attack Vector: Unauthenticated remote access via network-exposed printers, enabling lateral movement and ransomware staging.

  • Business Impact: Network compromise, data exfiltration, operational downtime. Over 1M devices potentially exposed globally (estimated based on market share).

  • Strategic Response: Brother cannot remediate via firmware due to manufacturing constraints. Mitigations: Disable IPP/LPD services, deploy IDS/IPS rules for CVE indicators, segment devices via VLANs, monitor for anomalous traffic.

SonicWall Exploitation in Wild

  • Threat Intelligence: CVE-2024-53704 under active exploitation, confirmed by Arctic Wolf, targeting SSL VPN authentication bypass.

  • Attack Pattern: Bypasses multi-factor authentication, enabling service disruption and data disclosure.

  • Risk Assessment: High risk to organizations relying on SonicWall VPNs, especially in financial and critical infrastructure sectors.

  • Strategic Response: Apply emergency patches within 24 hours, enhance VPN monitoring, and audit authentication logs.

2. Sector-Specific Ransomware Surge [HIGH RISK – Priority 2]

Healthcare: McLaren Health Care – Pattern Analysis

  • Incident Summary: INC Ransom group attack (July–August 2024) affected 743,000 patients, following ALPHV/BlackCat’s 2.2M-patient breach. Backdoors enabled re-extortion.

  • Strategic Concern: Incomplete eviction of ransomware gangs increases repeat attack risk. Forensic analysis took 9 months (August 2024–May 2025).

  • Recovery Timeline: 37% of healthcare organizations require over a month to recover; only 22% recover within a week.

Financial Services: JPMorgan Phishing Breach

  • Incident Summary: June 20, 2025, spear-phishing campaign linked to Iranian actors compromised 10,000 customer accounts, exploiting unpatched email gateways.

  • Strategic Concern: Rising financial sector targeting mirrors healthcare trends, with average ransom demands reaching $4M.

  • Business Impact: Reputational damage, regulatory fines, and operational disruption.

Industry-Wide Escalation

  • Attack Frequency: Healthcare ransomware attacks rose from 60% to 67% year-over-year; financial services at 45%.

  • Financial Impact: Average recovery costs (excluding ransom) reached $2.57M in healthcare, $3.1M in finance.

  • Strategic Response: Validate backup isolation, test sub-30-second containment, and deploy AI-driven phishing detection.

3. Geopolitical Cyber Warfare Escalation [STRATEGIC RISK – Priority 3]

Iran-Israel Cyber Operations

  • Intelligence Assessment: 700% surge in Iranian cyberattacks since June 12 missile strikes, led by APT33 (destructive wiper attacks) and Charming Kitten (spear-phishing). Targets include Israeli critical infrastructure and U.S.-aligned entities.

  • U.S. Threat Exposure: DHS’s June 22, 2025, bulletin warns of low-level cyber attacks by pro-Iranian hacktivists, with potential escalation to U.S. energy and financial sectors.

  • Strategic Response: Monitor Iranian TTPs (e.g., phishing, supply chain attacks), enhance threat intelligence feeds.

Chinese Infrastructure Targeting

  • Persistent Threat: Salt Typhoon’s attacks on Canadian telecoms and Viasat (June 19, 2025) target U.S.-allied infrastructure, mirroring Iranian strategies.

  • Strategic Assessment: Pre-conflict espionage to disrupt telecommunications and satellite networks.

  • Strategic Response: Harden telecom vendor security, audit critical infrastructure for Chinese-linked backdoors.

Market Implications & Investment Intelligence

Mergers and Acquisitions:

  • Abacus Group Acquires Entara: Enhances managed security for financial services, leveraging Entara’s incident response expertise (June 23, 2025; Source: X, FinTech Futures).

  • Integris Acquires TechMD/1nteger Security: Bolsters SMB cybersecurity with 1nteger’s threat detection (June 22, 2025; Source: X).

  • LevelBlue Acquires Aon’s Stroz Friedberg/Elysium Digital: Strengthens litigation consulting and digital forensics (June 19, 2025; Source: X).

  • Context: These deals reflect 2025’s consolidation trend, addressing ransomware and geopolitical threats through expanded capabilities.

Cyber Insurance Market:

  • Trend: Healthcare recovery costs averaged $2.57M (up from $1.82M in 2023); 20% premium increases post-incident.

  • Strategic Response: Invest in zero-trust and automated containment to reduce premiums.

Technology Investment:

  • Priorities: Zero-trust architecture, geopolitically-aware threat intelligence, sub-minute isolation systems.

  • Business Case: Avoid $4M average ransomware costs, maintain competitive edge.

Strategic Action Framework

Immediate Response (24–72 Hours)

Risk Mitigation:

  • Brother Devices: Disable IPP/LPD, deploy IDS/IPS, segment via VLANs, monitor CVE indicators.

  • SonicWall Systems: Patch CVE-2024-53704, enhance VPN monitoring, audit logs.

  • Ransomware Preparation: Validate backups, test sub-30-second containment, deploy phishing defenses.

Intelligence Collection:

  • Geopolitical Monitoring: Track APT33/Charming Kitten TTPs, monitor DHS/CISA advisories.

  • Vendor Assessment: Map Brother device exposure, assess multi-vendor risks.

  • Sector Analysis: Review McLaren/JPMorgan patterns for containment lessons.

Strategic Planning (30–90 Days)

Competitive Positioning:

  • Zero-Trust Acceleration: Implement micro-segmentation, vendor access controls.

  • Supply Chain Hardening: Develop multi-vendor vulnerability protocols.

  • Geopolitical Framework: Integrate cyber risks into business continuity planning.

Investment Priorities:

  • Predictive Analytics: AI-driven threat landscape analysis.

  • Automated Response: Sub-minute ransomware containment.

  • Vendor Risk Tools: Continuous third-party monitoring.

Long-Term Advantage (90+ Days)

Organizational Resilience:

  • Threat Intelligence: Develop proprietary geopolitical risk assessments.

  • Industry Leadership: Join healthcare/financial sector threat-sharing initiatives.

  • Board Integration: Quarterly cyber-geopolitical briefings with quantified impacts.

Outlook: Emerging Risks (30–90 Days)

  • Vendor Consolidation: Multi-vendor vulnerabilities (e.g., Brother’s 5 manufacturers) expose supply chain gaps.

  • Sector Re-targeting: Repeat attacks in healthcare and finance suggest incomplete containment; expect focus through Q3 2025.

  • Geopolitical Spillover: Iran-aligned groups may target U.S. infrastructure/finance if conflict escalates.

  • Intelligence Gaps:

    • Iranian retaliatory capabilities and U.S. target profiles.

    • Brother vulnerability exploitation timelines and threat actor adoption.

    • Healthcare/finance attack attribution and threat group connections.

    • Multi-vendor risk modeling for systemic vulnerabilities.

Board Communication Package

Key Messages:

  • Urgent Action: Brother vulnerabilities and ransomware demand immediate response to avoid $4M losses and competitive disadvantage.

  • Sector Targeting: Healthcare and financial sectors face escalating attacks, requiring enhanced defenses.

  • Geopolitical Risks: Iranian/Chinese cyber operations necessitate strategic planning updates.

  • Investment Case: Security modernization ensures resilience and market leadership.

Success Metrics Dashboard:

  • Vulnerability Response: <4 hours for critical patches (Target).

  • Ransomware Recovery: <72 hours to full recovery (Target).

  • Vendor Risk: 100% critical vendors monitored (Target).

  • Geopolitical Detection: <24 hours to identify nation-state activity (Target).

Financial Impact:

  • Avoided Costs: $4M ransomware vs. proactive patching.

  • Competitive Edge: Enhanced posture vs. peers facing repeat attacks.

  • Insurance Savings: Proactive measures vs. 20% premium hikes.

Competitive Advantage Summary

Strategic Positioning: Organizations addressing these prioritized threats—Brother vulnerabilities, ransomware, and geopolitical risks—will maintain operational continuity while competitors face disruption. Swift action within 72 hours, followed by strategic investments in zero-trust and predictive analytics, will ensure resilience and leadership in a volatile threat landscape.

Decision Point: The next 72 hours are critical to lead in this multi-vector threat environment. Act now to secure networks, strengthen defenses, and integrate geopolitical risks for sustainable advantage.

Cyber Threats & Attack Trends

CybersecurityHQ: This Week’s Reports Based on Technical Research and Academic Papers

→ Free

  1. Assessing the measurable impact of ACME device attestation on TLS supply chain security in enterprise networks 👉 Read the report

 → Pro subscriber-only

  1. Embedding cyber risk assessment into enterprise GRC frameworks 👉 Read the report

  2. Operationalizing crown-jewel asset discovery across complex enterprise environments 👉 Read the report

  3. Comparing insider threat kill chain models by predictive accuracy and early warning performance across organizations 👉 Read the report

And more inside - check out the full list here.

Cybersecurity Stocks

Cyber Intel Brief: Key Insights from Leading Security Podcasts

This is what you missed in this week’s Cyber Intel Report sourced from top cybersecurity podcasts and webinars, if you haven’t upgraded your membership: critical insights, expert takes, and the latest threats unpacked. Don’t let this slip by—upgrade today to get the full scoop!

Nation-State Retaliation escalates targeting of OT and ICS systems amid geopolitical fallout
16B Credential Leak floods attack surfaces despite dataset duplication and credential reuse
Deepfake Vishing tactics evolve, cloning executive voices to trigger high-risk wire fraud
Shadow AI Proliferation bypasses governance, risking IP leakage and compliance violations
ASUS Router Exploits reveal silent botnet persistence in unmanaged edge devices
Broker-Fueled Targeting turns public data into real-world threats to executive safety

And more insights in this week’s full CISO briefing.

Interesting Read

Chalmers Unveils Ultra-Efficient Qubit Amplifier to Advance Quantum Computing

On June 25, 2025, researchers at Chalmers University of Technology in Sweden unveiled a low-noise, pulse-activated microwave amplifier that consumes just one-tenth the power of conventional amplifiers. This advancement addresses a major challenge in quantum computing—qubit decoherence caused by heat and noise from always-on hardware. The new amplifier switches on only during qubit readouts, significantly reducing thermal interference and preserving signal fidelity as quantum systems scale in complexity.

By combining transistor-level sensitivity with algorithmic control that enables activation in just 35 nanoseconds, this breakthrough marks a pivotal step toward stabilizing large-scale quantum systems. For CISOs, CTOs, and enterprise strategists exploring quantum-safe infrastructure, this development signals tangible progress in quantum hardware readiness—bringing real-world deployment of scalable, stable quantum computing closer to reality.

→ Read more at ScienceDaily

Fresh From the Field: Security Resources You Can Use

Title

Publisher / Authors

Focus

Access Link

2025 State of Data Security: Quantifying AI’s Impact on Data Risk

Varonis

AI-driven data exposure, SaaS misconfigurations, Shadow‑AI use, MFA gaps

Download PDF

Seizing the Agentic AI Advantage

McKinsey (QuantumBlack team)

Agentic AI mesh architecture, operational agility, governance, scaling risks

Download PDF

AI Risk-Management Standards Profile for General-Purpose AI

UC Berkeley & GPAI

Risk management practices for foundation AI models, mapping to NIST/ISO, regulatory alignment

Download PDF

GAO Report: Artificial Intelligence — Use and Oversight in Financial Services

U.S. Government Accountability Office (GAO‑25‑107197)

AI risk & benefits in financial sector, regulator oversight, model risk management, NCUA gaps

Read Online

Lessons From Red Teaming 100 Generative AI Products

Microsoft (Blake Bullwinkel et al.)

Real-world safety testing insights, emergent vulnerabilities, mitigation strategies in GenAI apps

Download PDF

Social Media Highlights

SMS two-factor is officially broken—Bloomberg just proved it. | Ari Andersen

SMS two-factor is officially broken—Bloomberg just proved it. Their new investigation tracks a million “do-not-share” login codes that quietly detoured through an obscure Swiss shop, Fink Telecom Services, before landing on users’ phones. Google, Meta, Amazon, Signal Messenger, Tinder—everyone’s codes ran the same gauntlet, and nobody (sender or recipient) could see who looked inside on the way. SMS wasn't built for this. Behind every text code is a murky resale market of leased global titles—telecom credentials anyone can rent to funnel messages through their own servers. The GSMA warned against the practice back in 2023, and UK regulators have already banned it after criminals used the loophole to intercept security codes. A few people can spin up infrastructure and “very quickly” be handling billions of 2FA messages—no license required. In other words: the world’s digital lockboxes are protected by a supply chain that would make a food-safety inspector faint. Here’s the uncomfortable truth: SMS 2FA isn’t “multi-factor” at all—it’s single-point-of-failure-as-a-service. The middleman taps your code? Game over. Deepfake calls your CFO? Wire gone. The system works—until it spectacularly doesn’t. And attackers know it. If “just text me a code” still lives anywhere in your security stack, treat this Bloomberg story as a fire drill. | 48 comments on LinkedIn

Stay safe, stay secure.

The CybersecurityHQ Team

Reply

or to participate.