Saturday, December 20, 2025

Cisco Alerts on Chinese-Linked Hackers Exploiting Email Security Flaws

Cisco has issued urgent warnings about a sophisticated hacking operation attributed to groups tied to China, which are leveraging a newly discovered zero-day vulnerability in its email security software. This exploit could give attackers complete control over compromised systems, according to the company's security team.

The campaign was first spotted on December 10, targeting AsyncOS, the operating system powering Cisco's Secure Email Gateway and Secure Email and Web Manager devices—available in both hardware and virtual forms. The vulnerability kicks in when the "Spam Quarantine" feature is active and the devices are exposed to the internet. While this feature isn't turned on by default and doesn't require public access, any internet-facing setups are vulnerable.

Experts like Michael Taggart from UCLA Health Sciences note that these prerequisites narrow the potential attack surface, but it's still a serious risk for exposed systems.

In a related development, researchers at Israeli firm Check Point have highlighted the activities of a threat actor dubbed Velvet Ant. This group has been running a long-term operation against an East Asian organization, using outdated F5 BIG-IP appliances to maintain a foothold in breached networks.

The zero-day in question, CVE-2024-20399, was quietly exploited until it surfaced recently, leading Cisco to push out fixes. It impacts a range of Cisco switches, including the MDS 9000 series and various Nexus models (3000, 5500, 5600, 6000, 7000, and 9000). Cisco has rolled out software updates and urges immediate patching.

For now, though, the only surefire fix for confirmed breaches is a full wipe and rebuild of the affected devices' software—no quick patch exists yet. "Rebuilding the appliances is currently the best way to remove any persistent threats left by the attackers," Cisco advises.

Cisco Talos, the firm's threat intelligence unit, links these hackers to Chinese state-sponsored operations. They've been using the flaw to plant enduring backdoors, with the campaign active since at least late November 2025. (Note: This date might be a reporting error; cross-check with official sources for accuracy.)

If you're running any of these Cisco products, review your configurations, apply updates where possible, and consider isolating internet-facing systems to minimize exposure. For the latest details, head straight to Cisco's security advisories. Stay vigilant—cyber threats like this are evolving fast.

Cisco has issued urgent warnings about a sophisticated hacking operation attributed to groups tied to China, which are leveraging a newly discovered zero-day vulnerability in its email security software. This exploit could give attackers complete control over compromised systems, according to the company's security team.

The campaign was first spotted on December 10, targeting AsyncOS, the operating system powering Cisco's Secure Email Gateway and Secure Email and Web Manager devices—available in both hardware and virtual forms. The vulnerability kicks in when the "Spam Quarantine" feature is active and the devices are exposed to the internet. While this feature isn't turned on by default and doesn't require public access, any internet-facing setups are vulnerable.

Experts like Michael Taggart from UCLA Health Sciences note that these prerequisites narrow the potential attack surface, but it's still a serious risk for exposed systems.

In a related development, researchers at Israeli firm Check Point have highlighted the activities of a threat actor dubbed Velvet Ant. This group has been running a long-term operation against an East Asian organization, using outdated F5 BIG-IP appliances to maintain a foothold in breached networks.

The zero-day in question, CVE-2024-20399, was quietly exploited until it surfaced recently, leading Cisco to push out fixes. It impacts a range of Cisco switches, including the MDS 9000 series and various Nexus models (3000, 5500, 5600, 6000, 7000, and 9000). Cisco has rolled out software updates and urges immediate patching.

For now, though, the only surefire fix for confirmed breaches is a full wipe and rebuild of the affected devices' software—no quick patch exists yet. "Rebuilding the appliances is currently the best way to remove any persistent threats left by the attackers," Cisco advises.

Cisco Talos, the firm's threat intelligence unit, links these hackers to Chinese state-sponsored operations. They've been using the flaw to plant enduring backdoors, with the campaign active since at least late November 2025. (Note: This date might be a reporting error; cross-check with official sources for accuracy.)

If you're running any of these Cisco products, review your configurations, apply updates where possible, and consider isolating internet-facing systems to minimize exposure. For the latest details, head straight to Cisco's security advisories. Stay vigilant—cyber threats like this are evolving fast.

By - Aaradhay Sharma

No comments:

Post a Comment

Death by Algorithm: Preparing for the New Age of Legal Liability

The era of digital globalisation is hitting a hard border. For decades, the tech industry operated under the assumption that a single, mass...