Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2025

Top Tips To Combat Fraud Targeting Older Generations

In this episode, Mike is joined by Christopher Fielder, Field CTO at Arctic Wolf to delves into the vulnerability of seniors to cybercrime. With over 101,000 Americans aged 60 and above falling victim to digital fraud in 2023, it’s evident that scammers exploit seniors’ digital unawareness for significant financial gain. Christopher sheds light on the risk-reward dynamics, manipulation tactics, and emphasizes the importance of maintaining control, asking questions, and practicing cyber hygiene.

Arctic Wolf Observes Campaign Exploiting SimpleHelp RMM Software for Initial Access

On January 22, 2025, Arctic Wolf began observing a campaign involving unauthorized access to devices running SimpleHelp RMM software as an initial access vector. Roughly a week prior to the emergence of this campaign, several vulnerabilities had been publicly disclosed in SimpleHelp by Horizon3 (CVE-2024-57726, CVE-2024-57727, and CVE-2024-57728).

Cyber Risk Heats Up: 2025 Predictions for Australia

Mark Thomas, Director of Security Services for ANZ at Arctic Wolf, unravels the upcoming cyber security landscape in 2025. He outlines heightened risks due to geopolitical tensions and zero-day cyber attacks, the need for better protection of critical infrastructure, the impact of technology investment, and the importance of viewing cyber risk as business risk.

Why Cyber Insurance Is Vital To Keeping Businesses Standing When Threats Hit

Steve Hunter, Director of Sales Engineering at Arctic Wolf, discusses the importance of cyber insurance for organizations in mitigating cyber risks. He explains the types of coverage cyber insurance policies offer, the growing challenges in obtaining coverage, and the essential strategies for evaluating a policy. Steve also highlights the need for organizations to enhance their cybersecurity measures and how they can communicate effectively with insurers to improve their risk profile.

CVE-2025-23006: Actively Exploited Vulnerability in SonicWall SMA1000 Appliances

On January 22, 2025, SonicWall published a security advisory detailing an actively exploited remote command execution vulnerability in SMA1000 appliances. The critical-severity vulnerability, CVE-2025-23006, is a pre-authentication deserialization of untrusted data vulnerability that has been identified in the SMA1000 Appliance Management Console (AMC) and Central Management Console (CMC). If exploited, it could allow unauthenticated remote threat actors to execute arbitrary OS commands.

The Importance of Identity and Access Management

The business world has an identity security problem. Identity telemetry dominated Arctic Wolf’s list of the top 10 security investigation types over the past 12 months, and 70% of organizations were targeted by business email compromise (BEC), an attack that often relies on identity compromise for success, in 2024.

Multiple Vulnerabilities in Rsync Could be Combined to Achieve RCE

On January 14, 2025, the CERT Coordination Center (CERT/CC) published a security advisory detailing multiple vulnerabilities impacting Rsync. The most severe vulnerability is CVE-2024-12084, a critical severity heap buffer overflow vulnerability in the Rsync daemon which can lead to out-of-bounds writes in the buffer.

CVE-2024-55591: Follow up: Authentication Bypass Vulnerability in Fortinet FortiOS and FortiProxy

On January 14, 2025, Fortinet published a security advisory for CVE-2024-55591, an authentication bypass using an alternate path or channel vulnerability in FortiOS and FortiProxy. A remote threat actor can craft requests to the Node.js websocket module to gain super-admin privileges.

Ransomware Campaign Encrypting Amazon S3 Buckets using SSE-C

On January 13, 2025, Halcyon released a research blog about the Codefinger group conducting a ransomware campaign targeting Amazon S3 buckets. The attacks leverage AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C) to encrypt data. The threat actors then demand ransom payments for the symmetric AES-256 keys required to decrypt it.

Console Chaos: A Campaign Targeting Publicly Exposed Management Interfaces on Fortinet FortiGate Firewalls

In early December, Arctic Wolf Labs began observing a campaign involving suspicious activity on Fortinet FortiGate firewall devices. By gaining access to management interfaces on affected firewalls, threat actors were able to alter firewall configurations. In compromised environments, threat actors were observed extracting credentials using DCSync.

CVE-2025-0282: Critical Zero-Day Remote Code Execution Vulnerability Impacts Several Ivanti Products

On January 8, 2025, Ivanti published a security advisory announcing the patching of a critical, actively exploited vulnerability in Ivanti Connect Secure, Policy Secure, and ZTA Gateways. Tracked as CVE-2025-0282, the vulnerability allows remote unauthenticated threat actors to achieve remote code execution (RCE) via a stack-based buffer overflow flaw. Ivanti confirmed that exploitation has only been observed in Connect Secure, and no exploitation has been reported in Policy Secure or ZTA Gateways.

Understanding Indicators of Compromise and Their Role in Cybersecurity

Through a known vulnerability, a threat actor gains access to an organization and begins to alter the network activity, running unusual enumeration commands. Then the threat actor uses stolen credentials to log into various applications within said network. The cybersecurity monitoring solution at work, in this case Arctic Wolf Managed Detection and Response, subsequently picks up an IP address associated with Finland connecting to the network.

The Howler Episode 15: Debra Sevelius, VP of Legal

This month we sit down with Debra Sevelius, Vice President of Legal, as she shares the "glamorous side of commercial legal," her love of curling, and much more! As the Head of Commercial Legal at Arctic Wolf, Deb is an experienced, collaborative, globally-minded executive leader, with a proven record in leading legal and cross-functional operational teams that deliver pragmatic win-win outcomes that maximize long term value, achieve process efficiencies, and increase revenue.

Overview of Arctic Wolf Managed Security Awareness

In this overview of Arctic Wolf Managed Security Awareness, we take a look at the importance of addressing human risk. Find out how this program uses micro learning sessions to deliver frequent, easy to consume content that builds a strong security culture. Learn more how Arctic Wolf Managed Security Awareness ends human risk by delivering 100% relevant microlearning content.