SIGNALS WEEKLY: Holiday Patch Panic: Cisco AsyncOS Zero-Day + KEV Edge Rush
đ Zero-day season: Cisco AsyncOS exploited + KEV edge scramble. đ§Ż VNC-to-HMI + cloud C2 (Drive/Telegram) keep paying rent.
TL;DR
- [Vulnerabilities] Active exploitation of Cisco AsyncOS zero-day and other KEV-listed edge flaws; prioritize patching email gateways, VPNs, and firewalls; hunt for perimeter webshell/tunneling artifacts.
- [OT/Critical Infrastructure] Pro-Russia hacktivists abusing exposed VNC into HMI/SCADA; Denmark attributes destructive water-utility incident to Russia-linked groups; urgently audit/lock down remote access in OT.
- [Threat Actors] China-aligned LongNosedGoblin and Iranâs Infy resurgence leverage Group Policy abuse, cloud C2 (OneDrive/Drive), DGAs/Telegram; strengthen identity/EDR/proxy detections and targeted hunts.
AlphaHunt
Stop doomscrolling, start decisioning. We chewed through the muck so your team doesnât have to. â Subscribe!
Like this? Forward this to a friend!
(Have feedback? Did something resonate with you? Did something annoy you? Just hit reply! :))
Current Stories
TL;DR
-
[Vulnerabilities / Edge Devices] Critical Cisco AsyncOS zeroâday (CVE-2025-20393) and other KEVâlisted edge flaws drive an urgent patch/mitigation window on email gateways, VPNs, and firewalls through late December.
-
[Ransomware / Critical Infrastructure] Romaniaâs âRomanian Watersâ agency hit by BitLockerâbased ransomware, encrypting ~1,000 IT systems but leaving OT/water flow intact via manual operations.
-
[APT â China] Newly exposed Chinaâaligned APT âLongNosedGoblinâ uses Group Policy for lateral movement and cloud services (OneDrive/Google Drive) for C2 against Southeast Asian and Japanese government networks.
-
[APT â Iran] SafeBreach documents largeâscale resurgence of Iranian âPrince of Persiaâ/Infy APT with new Foudre/Tonnerre variants, DGAs, and Telegramâbacked C2 targeting regional and diaspora networks.
References
-
(2025-12-18) Cisco Zero-Day Vulnerability (CVE-2025-20393) Exploited in the Wild
-
(2025-12-17) CISA Adds Three Known Exploited Vulnerabilities to Catalog (KEV catalog reference)
-
(2025-12-22) Romanian water authority hit by ransomware attack over weekend
-
(2025-12-18) LongNosedGoblin tries to sniff out governmental affairs in Southeast Asia and Japan
-
(2025-12-18) Prince of Persia: A Decade of Iranian Nation-State APT Campaign Activity under the Microscope
AlphaHunt Converge - Plug in your Flight Crew
Get intelligence where it counts. No dashboards. No detours. AlphaHunt Converge teases out your intent, reviews the results and delivers actionable intel right inside Slack. We turn noise into signal and analysts into force multipliers.
Anticipate, Donât Chase.
Suggested Pivots
How do the Cisco AsyncOS zero-day (CVE-2025-20393) and other KEV edge entries map onto our own exposed email gateways, VPNs, and firewalls and their hardening gaps?
- Why: Connects a timeâboxed federal KEV mandate and active exploitation directly to your perimeter stack, not just generic CVE chatter.
- What to expect: A prioritized list of internetâfacing devices, mitigation status vs CISA guidance, and concrete telemetry patterns (e.g., webshell/tunneler tooling) to hunt for.
What is the combined detection coverage and hunting strategy across LongNosedGoblin and Prince of Persia tradecraft (Group Policy abuse, cloudâC2, DGAs, Telegram) in our current stack?
- Why: Both APTs lean heavily on âliving off the landâ and commodity cloud services, stressing behaviorâ and configurationâbased defenses.
- What to expect: A crossâmapping of these TTPs to your EDR, identity, and proxy controls plus candidate hunts around Group Policy, cloud OAuth, and DGA/Telegram patterns.
