SIGNALS WEEKLY: Chrome 0-Day in the Wild + December Patch Tuesday Priv-Esc

Chrome 0-day in the wild + Windows priv-esc getting abused + OT VNC still exposed like it’s 2009. 😬🔥

SIGNALS WEEKLY: Chrome 0-Day in the Wild + December Patch Tuesday Priv-Esc

TL;DR

  • [Critical Infrastructure] Pro‑Russia hacktivists exploit exposed OT VNC; GRU‑linked APT44 abuses edge devices to pivot into energy/telco/cloud environments.
  • [Vulnerabilities] Actively exploited zero‑days: Microsoft December patches include a live priv‑esc; Chrome CVE‑2025‑14174 fixed in Stable—update urgently.
  • [Espionage] Hamas‑linked Ashen Lepus (WIRTE) expands Middle East collection using AshTag backdoor delivered via DLL‑sideloading chains.

AlphaHunt

Stop doomscrolling, start decisioning. We chewed through the muck so your team doesn’t have to. → Subscribe! • Forward to your on-call lead.

(Have feedback? Did something resonate with you? Did something annoy you? Just hit reply! :))


Current Stories

TL;DR

  • [Threat Actors] Joint US/intl advisory details pro‑Russia hacktivists (CARR, NoName057(16), Z‑Pentest, Sector16) abusing exposed OT VNC to disrupt water, food, aviation, and energy entities.

  • [Vulnerabilities] December Microsoft Patch Tuesday fixes ~56+ flaws and three zero‑days across Windows/Office; at least one is actively exploited for privilege escalation.

  • [Intrusion Sets] Hamas‑affiliated “Ashen Lepus” (WIRTE) expands long‑running Middle East espionage with new modular AshTag backdoor plus DLL‑sideloading AshenLoader chains.

  • [Ransomware] INC ransomware breach at Pierce County Library (WA) impacts 340k+ patrons/staff, continuing a sustained pattern of disruptive ransomware hitting US local government services.

References


AlphaHunt Converge - Plug in your Flight Crew

Get intelligence where it counts. No dashboards. No detours. AlphaHunt Converge teases out your intent, reviews the results and delivers actionable intel right inside Slack. We turn noise into signal and analysts into force multipliers.

CTA Image

Anticipate, Don’t Chase.

Plug it In!

Suggested Pivots

How are pro-Russia hacktivist collectives operationally distinct from Russian state units in terms of tooling, targeting, and OT tradecraft?

  • Why: Clarifying where “hacktivism” ends and state direction begins helps sharpen attribution and expectations for escalation against US critical infrastructure.
  • What to expect: A comparison of infrastructure, malware reuse, victim selection, and messaging patterns that can guide threat modeling and tuning of OT/IT detections.

What detection and hardening patterns are most reusable across Ashen Lepus, other Hamas-linked clusters, and broader Middle East-focused espionage actors?

  • Why: Many regional APTs share sideloading and document-lure tradecraft; understanding commonalities yields high-leverage defensive controls.
  • What to expect: A cross-actor matrix of initial access vectors, loader patterns, C2 behaviors, and exfil methods ready to translate into hunts and rules.

Emerging Stories