Cyber Briefing: 2025.07.10
Oyster malware spreads via SEO poisoning, RondoDox botnet exploits IoT flaws for DDoS, ServiceNow ACL bug leaks data, McHire exposes 64M applicants, OpenAI tightens security after IP theft fears.
👉 What's trending in cybersecurity today?
Welcome to Cyber Briefing, the newsletter that informs you about the latest cybersecurity advisories, alerts, incidents and news every weekday.
First time seeing this? Please Subscribe
🚨 Cyber Alerts
1. Hackers Revive SEO Poisoning
Cybersecurity experts have identified a malicious campaign utilizing SEO-optimized fake landing pages, impersonating popular tools like PuTTY and WinSCP, to distribute the Oyster malware loader. These deceptive sites trick users into downloading what appears to be legitimate software, but secretly installs a backdoor for further malicious activity.
2. RondoDox Botnet Exploits Router Flaws
A new botnet called RondoDox is actively exploiting vulnerabilities in TBK DVRs and Four-Faith routers to create a network of compromised devices. These devices are then used as stealth proxies for various malicious activities, including DDoS attacks, while the malware employs advanced techniques to evade detection.
3. ServiceNow Data Exposure via ACLs
A high-severity ServiceNow vulnerability (CVE-2025-3648), codenamed Count(er) Strike, could allow unauthorized data exposure and exfiltration through misconfigured conditional Access Control List (ACL) rules. This flaw, discovered by Varonis, enables users to infer sensitive instance data, including PII and credentials, by exploiting differences in how the platform responds to denied access under various ACL conditions.
For more alerts, click here!
💥 Cyber Incidents
4. McDonald's AI Hiring Bot Exposes Data
A severe security flaw in McDonald's AI hiring system, McHire.com, allowed researchers to access the personal data of millions of job applicants using the password "123456." This breach, affecting systems run by Paradox.ai, exposed sensitive information like names, emails, and chat histories, raising significant concerns about data security in AI recruitment.
5. Nippon Steel Solutions Data Breach After Zero-Day
Nippon Steel Solutions, a subsidiary of Nippon Steel, announced a data breach after hackers exploited a zero-day vulnerability in their network equipment, potentially exposing personal information of customers, partners, and employees. The company has taken steps to contain the breach, notified authorities, and is advising affected parties.
6. Bitcoin Depot Breach Exposes Data Crypto Users
Bitcoin Depot, a major Bitcoin ATM operator, is now informing nearly 27,000 customers about a data breach that occurred in June 2024, exposing personal information like names, addresses, and driver's license numbers. The disclosure was delayed at the request of federal law enforcement conducting a parallel investigation.
For more incidents, click here!
📢 Cyber News
7. US Gov Seeks Unprecedented Cut to Cyber Budget
US Gov proposed 2026 budget seeks an unprecedented $1.23 billion cut to federal cybersecurity spending, a move that experts warn could significantly weaken national defenses, hinder talent development, and reduce crucial state and local grant funding amidst rising cyber threats. This reduction marks a reversal of consistent annual increases in cyber spending by civilian agencies since 2017 and is seen by many as a lack of seriousness regarding cybersecurity risk management.
8. US Sanctions N. Korean Andariel Member
The U.S. Treasury has sanctioned Song Kum Hyok, a North Korean hacker associated with the Andariel group, for his involvement in a scheme using fraudulent IT workers to gain remote employment with U.S. companies. This action highlights the ongoing efforts by the U.S. to disrupt North Korea's illicit revenue streams, which are used to fund its weapons programs.
9. OpenAI Boosts Security Against Chinese IP Theft
OpenAI is significantly enhancing its internal security measures, including stricter data controls and staff vetting, due to concerns about intellectual property theft, particularly from Chinese AI rivals. These heightened precautions, accelerated by an alleged data distillation incident with DeepSeek, aim to safeguard its valuable AI models and proprietary information.
For more news, click here!
📈Cyber Stocks
On Thursday, July 10, 2025, cybersecurity stocks recorded modest gains, driven by resilience to tariff pressures, continued AI-driven growth, insider activity, and anticipation of increased government cybersecurity investment.
Okta (OKTA) rose 1.63% to $99.15, supported by its limited exposure to tariffs, favorable R&D tax treatment, and a weaker U.S. dollar enhancing overseas revenue.
CrowdStrike (CRWD) climbed 1.14% to $513.51, driven by bullish investor sentiment after Wedbush raised its price target to $575, citing accelerating AI-powered deal momentum.
Palo Alto Networks (PANW) gained 1.02% to $206.06, following insider and institutional buying, including new positions by Stratos Investment, and growing confidence in its AI and federal cybersecurity strategy.
Fortinet (FTNT) inched up 0.09% to $107.65, as strong Q1 results, particularly in Unified SASE and Security Operations ARR, reinforced expectations for sustained enterprise adoption.
Radware (RDWR) remained flat, as investors awaited its Q2 earnings release scheduled for July 30 and responded cautiously to new coverage by Wolfe Research.
💡 Cyber Tip
Hackers Use Search Engine Tricks and Fake Sites to Distribute Malware
Security researchers have uncovered a campaign where hackers use SEO-optimized fake websites to impersonate trusted software like PuTTY and WinSCP. These deceptive pages distribute a stealthy malware loader known as Oyster, which installs a persistent backdoor on Windows systems. Victims often believe they are downloading legitimate tools, but instead they unknowingly infect their devices with malware capable of launching further attacks.
✅ What you should do:
Always download software directly from the official website by typing the URL manually.
Avoid relying solely on search engine results when looking for software downloads.
Verify the domain name carefully before downloading any tool, especially if it looks slightly off.
Monitor your system for suspicious scheduled tasks or unexpected DLL execution.
Use endpoint protection that can detect stealthy loaders and suspicious software behavior.
🔒 Why this matters:
This campaign targets trusted software and professionals who use it, making it harder to detect. By poisoning search results and spoofing trusted tools, hackers trick users into installing backdoors on their own systems. Being cautious with software sources is essential to prevent compromise.
📚 Cyber Book
IT Disaster Recovery Planning For Dummies - by Peter H. Gregory
That concludes today’s briefing . You can check the top headlines here!
Copyright © 2025 CyberMaterial. All Rights Reserved.
Follow CyberMaterial on:
Substack, LinkedIn, Twitter, Reddit, Instagram, Facebook, YouTube, and Medium.