Close Menu
    Main Menu
    • Home
    • News
    • Tech
    • Robotics
    • ML & Research
    • AI
    • Digital Transformation
    • AI Ethics & Regulation
    • Thought Leadership in AI

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Incident Response Workforce ShieldForce Companions with AccuKnox to Ship Zero Belief CNAPP in Latin America

    November 10, 2025

    Finest early Black Friday offers 2025: 35+ gross sales out early

    November 10, 2025

    The T+n Drawback – O’Reilly

    November 10, 2025
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Facebook X (Twitter) Instagram
    UK Tech InsiderUK Tech Insider
    Home»AI Ethics & Regulation»ASD Warns of Ongoing BADCANDY Assaults Exploiting Cisco IOS XE Vulnerability
    AI Ethics & Regulation

    ASD Warns of Ongoing BADCANDY Assaults Exploiting Cisco IOS XE Vulnerability

    Declan MurphyBy Declan MurphyNovember 2, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    ASD Warns of Ongoing BADCANDY Assaults Exploiting Cisco IOS XE Vulnerability
    Share
    Facebook Twitter LinkedIn Pinterest Email Copy Link


    Nov 01, 2025Ravie LakshmananSynthetic Intelligence / Vulnerability

    The Australian Alerts Directorate (ASD) has issued a bulletin about ongoing cyber assaults focusing on unpatched Cisco IOS XE units within the nation with a beforehand undocumented implant often called BADCANDY.

    The exercise, per the intelligence company, includes the exploitation of CVE-2023-20198 (CVSS rating: 10.0), a important vulnerability that permits a distant, unauthenticated attacker to create an account with elevated privileges and use it to grab management of prone programs.

    The safety defect has come below lively exploitation within the wild since final 2023, with China-linked menace actors like Salt Hurricane weaponizing it in latest months to breach telecommunications suppliers.

    DFIR Retainer Services

    ASD famous that variations of BADCANDY have been detected since October 2023, with a contemporary set of assaults persevering with to be recorded in 2024 and 2025. As many as 400 units in Australia are estimated to have been compromised with the malware since July 2025, out of which 150 units had been contaminated in October alone.

    “BADCANDY is a low fairness Lua-based internet shell, and cyber actors have usually utilized a non-persistent patch post-compromise to masks the gadget’s vulnerability standing in relation to CVE-2023-20198,” it mentioned. “In these cases, the presence of the BADCANDY implant signifies compromise of the Cisco IOS XE gadget, by way of CVE-2023-20198.”

    The shortage of a persistence mechanism means it can’t survive throughout system reboots. Nonetheless, if the gadget stays unpatched and uncovered to the web, it is attainable for the menace actor to re-introduce the malware and regain entry to it.

    ASD has assessed that the menace actors are in a position to detect when the implant is eliminated and are infecting the units once more. That is based mostly on the truth that re-exploitation has occurred on units for which the company has beforehand issued notifications to affected entities.

    That having mentioned, a reboot is not going to undo different actions undertaken by the attackers. It is subsequently important that system operators apply the patches, restrict public publicity of the online consumer interface, and comply with obligatory hardening pointers issued by Cisco to forestall future exploitation makes an attempt.

    CIS Build Kits

    A few of the different actions outlined by the company are listed under –

    • Evaluation the working configuration for accounts with privilege 15 and take away sudden or unapproved accounts
    • Evaluation accounts with random strings or “cisco_tac_admin,” “cisco_support,” “cisco_sys_manager,” or “cisco” and take away them if not authentic
    • Evaluation the working configuration for unknown tunnel interfaces
    • Evaluation TACACS+ AAA command accounting logging for configuration modifications, if enabled
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Declan Murphy
    • Website

    Related Posts

    Incident Response Workforce ShieldForce Companions with AccuKnox to Ship Zero Belief CNAPP in Latin America

    November 10, 2025

    Vibe-codierte Ransomware auf Microsoft Market entdeckt

    November 10, 2025

    Faux 0-Day Exploit Emails Trick Crypto Customers Into Working Malicious Code – Hackread – Cybersecurity Information, Information Breaches, Tech, AI, Crypto and Extra

    November 10, 2025
    Top Posts

    Evaluating the Finest AI Video Mills for Social Media

    April 18, 2025

    Utilizing AI To Repair The Innovation Drawback: The Three Step Resolution

    April 18, 2025

    Midjourney V7: Quicker, smarter, extra reasonable

    April 18, 2025

    Meta resumes AI coaching utilizing EU person knowledge

    April 18, 2025
    Don't Miss

    Incident Response Workforce ShieldForce Companions with AccuKnox to Ship Zero Belief CNAPP in Latin America

    By Declan MurphyNovember 10, 2025

    Menlo Park, CA, USA, November tenth, 2025, CyberNewsWireAccuKnox, a pacesetter in Zero Belief Cloud-Native Utility…

    Finest early Black Friday offers 2025: 35+ gross sales out early

    November 10, 2025

    The T+n Drawback – O’Reilly

    November 10, 2025

    Advances in heavy-duty robotics and clever management help future fusion reactor upkeep

    November 10, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    UK Tech Insider
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms Of Service
    • Our Authors
    © 2025 UK Tech Insider. All rights reserved by UK Tech Insider.

    Type above and press Enter to search. Press Esc to cancel.