BMC Daily Cyber News

This is today’s cyber news for October 16th, 2025. F5 confirmed a nation-state breach with BIG-IP source code and vulnerability research stolen, while the U.K.’s regulator fined Capita £14 million for its 2023 data breach. We covered a massive misconfigured Elasticsearch cache exposing six billion records, evolving social engineering that impersonates password managers and the “ClickFix” copy-paste lure, and a third-party breach at MANGO. Critical risk items include SAP NetWeaver remote code execution, leaked tokens in 100+ VS Code extensions, and Secure Boot bypass risks on Framework laptops. Advanced adversary activity featured Jewelbug at a Russian IT provider and Flax Typhoon’s long-term ArcGIS abuse, alongside OT and telecom warnings on Red Lion RTUs and active exploitation of ICTBroadcast. We also discussed job-offer phishing against Google Workspace and Microsoft 365, GhostBat Android banking theft in India, a four-year sentence in the PowerSchool case, the Qilin ransomware operation, and the rise of board-level AI and cyber oversight.

Listeners will hear concise, plain-English summaries plus who’s most exposed and a practical next step for each story—useful for leaders prioritizing risk, defenders tuning controls, and builders shoring up pipelines. It’s a fast way to stay briefed on supplier breaches, patch-now vulnerabilities, cloud identity threats, OT device flaws, and shifting governance expectations. The narrated edition is available at DailyCyber.news.

What is BMC Daily Cyber News?

The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.

This is today’s cyber news for October 16th, 2025. You can also subscribe to the newsletter and view the archive of previous headlines at daily cyber dot news.

Attackers broke into F5’s internal systems and stole source code from its BIG-IP product line, along with research on unpatched vulnerabilities. The company says the breach was contained, but the theft raises fears of future exploitation against enterprise networks that rely on these devices. BIG-IP systems often sit in front of critical web apps, meaning a compromise could have wide impact. Organizations using F5 hardware should expect new advisories soon and monitor for unusual traffic on management interfaces. This incident highlights how vendor compromises can ripple downstream. Leaders should verify patch timelines and communication plans. Defenders should lock down management access, enforce least privilege, and watch for suspicious iControl REST activity.

The U.K. Information Commissioner’s Office fined outsourcing giant Capita fourteen million pounds for a 2023 breach affecting more than six million people. Regulators found that Capita failed to isolate infected systems quickly, allowing personal data to leak onto criminal forums. The penalty sends a strong message about accountability for security basics. Public-sector clients and service providers can expect stricter due diligence clauses after this. Leaders should revisit contracts to ensure measurable security obligations. Security teams should confirm they can isolate systems within minutes and demonstrate those controls during audits. Fast detection and containment now have a real financial incentive.

A misconfigured Elasticsearch database left six billion records publicly accessible without a password. The trove combined data from old breaches and scraping operations, making it easy for criminals to search for personal and financial details. While not a new hack of source systems, the exposure amplifies the harm of previous breaches by making data simple to query. The leak increases risk of fraud, spam, and credential stuffing. Organizations should assume reused passwords are compromised and enforce multi-factor authentication across all user accounts. Security teams should monitor for login anomalies and credential-testing bursts. Public data handling demands real access control, even for research projects.

Attackers are impersonating password-manager brands like LastPass and Bitwarden, sending fake “security alert” emails that prompt users to install remote-support tools. The downloaded programs, often ScreenConnect, give attackers full control of the device. Victims believe they’re protecting their accounts when they’re actually handing them over. The campaigns use polished branding and legitimate-looking support pages. Small businesses and home users are primary targets. Leaders should reinforce policies against installing unverified tools from unsolicited messages. Defenders should block common remote-access installers and check for new administrative programs deployed in the past few days. Awareness and basic controls stop most of these attacks.

A campaign dubbed “ClickFix” has registered more than thirteen thousand fake domains to trick users into copying and running malicious commands. The lures appear as support or “fix your issue” pages found through search or ads. When users paste the provided commands into their terminals, they unknowingly install malware. Because no file is downloaded, normal antivirus tools rarely catch it. Attackers are exploiting trust in self-help guides and technical language. Businesses should teach employees to never copy code from unverified websites. Security teams can block known domains and watch for suspicious PowerShell or script activity launched from browsers. This trend shows social engineering evolving faster than software defenses.

SAP issued an emergency fix for a critical NetWeaver flaw, tracked as CVE-2025-42944, that enables code execution without logging in. This platform runs finance, procurement, and supply chains, so a single exploit can hit core operations. Public scanning often starts within days of disclosure, compressing patch windows. Internet-exposed or partner-facing SAP services are most at risk. Leaders should authorize an immediate change window and communicate expected downtime. Security teams need to apply the patch, remove unnecessary exposure, and monitor for suspicious Remote Function Calls. Keep an eye on spikes in inbound probes to SAP ports and odd admin jobs appearing after hours.

Researchers found exposed publisher tokens for more than a hundred Visual Studio Code extensions, creating a path to push backdoored updates. Many teams allow extensions to auto-update, which makes compromise silent and fast. A hijacked extension that touches build scripts or cloud tooling can poison the pipeline. Some maintainers quickly rotated tokens, but coverage was uneven. Leaders should require an approved list of extensions with clear owners and usage justifications. Defenders should pin versions for sensitive projects and review recent change logs before re-enabling auto-updates. Monitor developer machines and build agents for new outbound connections after an extension update.

Framework acknowledged shipping roughly two hundred thousand Linux laptops with signed firmware components later shown to allow Secure Boot bypass. Valid signatures made the code look trustworthy even though it was vulnerable. Attackers could load untrusted boot code and hide persistent malware below the operating system. Fixes require coordinated updates to firmware, bootloaders, and the OS, which can take time. Devices outside centralized management are likely to lag. Leaders should treat firmware lifecycle as a first-class program with inventory and deadlines. Defenders should apply vendor updates, deploy revocation lists, and verify Secure Boot status with attestation checks.

A China-linked group called Jewelbug reportedly gained long-term access to a Russian IT services provider by abusing the Microsoft Console Debugger. Running payloads under trusted system processes helped them blend in and avoid alerts. Because the initial victim was a provider, many downstream clients were at risk. The operators used built-in tools and careful timing instead of noisy malware. Leaders should demand diagrams of provider access paths and require session recording with tamper-resistant logs. Security teams should restrict debugger tools on servers and alert on unusual process chains. Treat any provider VPN session that initiates lateral movement off-hours as a high-priority investigation.

Flax Typhoon, a group linked to China, quietly turned ArcGIS Server features into a backdoor for more than a year. They blended commands into normal map and feature service traffic, so it looked like routine activity. Because geographic information systems connect to planning, utilities, and public data, the stakes are high. The long dwell time suggests weak logging, limited baselining, or both. Cities, utilities, and enterprises exposing ArcGIS services to partners are most at risk. Leaders should classify GIS as a Tier-1 app and demand the same controls used for finance. Defenders should lock down public endpoints, rotate tokens, and enable deep request logging. Treat odd methods, unusual parameters, or token use from new networks as priority alerts.

Researchers disclosed critical flaws in certain Red Lion remote terminal units that allow code execution with root access, no login required. These devices help control physical processes in plants and utilities, so compromise can change set points or halt operations. Internet exposure and flat networks make exploitation far easier. Patching is available, but downtime windows are often hard to schedule. That delay can turn a quick fix into a long outage after an incident. Leaders should approve maintenance now and document acceptable risk clearly if they defer. Defenders should isolate RTUs behind firewalled zones and restrict management to engineering stations. Verify firmware integrity and recent configuration changes before bringing systems back online.

Phishers are sending convincing fake job offers that mimic big employers to steal Google Workspace and Microsoft 365 logins. The emails link to look-alike career portals that capture credentials and then enroll new devices or create stealthy OAuth grants. Timing aligns with hiring seasons, which lowers skepticism. Both personal and corporate inboxes are being targeted. Leaders should mandate phishing-resistant multi-factor authentication and default-deny risky sign-ins. Defenders should tighten OAuth consent, alert on new forwarding rules, and force re-auth on device enrollments. Watch for impossible-travel events and app consents to unfamiliar vendors. Treat any sudden spike in external forwarding as a likely compromise.

GhostBat, an Android malware family, is spreading in India by posing as return-to-office or government service apps. After installation, it abuses accessibility permissions to capture keystrokes, overlay banking apps, and steal one-time passwords. The operators rotate app names and signing keys to avoid takedowns. Financial losses are rising as victims unknowingly approve fraudulent transfers. Bring-your-own-device policies make containment harder for employers. Leaders should block side-loading and require managed app stores on corporate devices. Defenders should monitor for accessibility service enrollment and overlay usage. Add step-up verification on high-risk transactions until infection rates fall.

A U.S. court sentenced the hacker behind the 2024 PowerSchool breach to four years in prison, plus restitution for investigation costs. The case affected student information systems used by K-12 districts for grades, attendance, and communication. Prosecutors emphasized how the intrusion disrupted school operations and exposed personal data for students and staff. The conviction shows that law enforcement is treating education infrastructure as critical, with real penalties for attackers. PowerSchool has since added stronger authentication and monitoring. Leaders in education should report regularly on vendor security and verify breach-response capabilities. Defenders should enforce phishing-resistant multi-factor authentication and segregate admin consoles. Monitor for unusual bulk exports or after-hours data pulls from vendor systems.

That’s the BareMetalCyber Daily Brief for October 16th, 2025. For more, visit BareMetalCyber dot com. You can also subscribe to the newsletter and view the archive of previous headlines at daily cyber news dot com. We’re back tomorrow.