Descriptive Alt Text

This Week in Cybersecurity: Looking Back at Week 15

April 11, 2025 Reading Time: 4 minutes

This Weeks Headlines


WhatsApp Vulnerability Allowed Remote Code Execution on Windows PCs

Meta has patched a critical vulnerability in WhatsApp for Windows, identified as CVE-2025-30401, which could have allowed attackers to execute arbitrary code on users’ devices.

The flaw involved a spoofing issue where attachments were displayed based on their MIME type but opened according to their filename extension. This discrepancy enabled malicious actors to craft files that, when opened, could run harmful code instead of displaying the intended content.

Users are strongly advised to update to WhatsApp version 2.2450.6 or later to protect against this vulnerability.

View Source

Microsoft Patches 125 Flaws, Including Actively Exploited Windows CLFS Vulnerability

Microsoft has released security updates addressing 125 vulnerabilities across its software products. Among these, 11 are rated Critical, 112 Important, and two Low in severity.

Notably, an elevation of privilege flaw in the Windows Common Log File System (CLFS) Driver (CVE-2025-29824) has been actively exploited in ransomware attacks. This marks the sixth such CLFS vulnerability exploited since 2022.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this flaw to its Known Exploited Vulnerabilities catalog, urging federal agencies to apply the fix by April 29, 2025.

Administrators are advised to prioritise these updates to mitigate potential threats.

View Source

Fortinet Urges FortiSwitch Upgrades to Patch Critical Admin Password Vulnerability

Fortinet has released security updates to address a critical vulnerability in FortiSwitch, identified as CVE-2024-48887, with a CVSS score of 9.3. This flaw allows remote, unauthenticated attackers to modify administrator passwords via specially crafted requests to the FortiSwitch GUI.

Affected versions include FortiSwitch:

  • 7.6.0,
  • 7.4.0 through 7.4.4,
  • 7.2.0 through 7.2.8,
  • 7.0.0 through 7.0.10,
  • 6.4.0 through 6.4.14.

Fortinet advises users to upgrade to the latest versions to mitigate this risk. As interim measures, disabling HTTP/HTTPS access to administrative interfaces and restricting system access to trusted hosts are recommended.

While no exploitation has been reported, prompt action is essential to maintain network security.

View Source

CrushFTP File Transfer Vulnerability Exploited by Ransomware Group

A critical vulnerability in the CrushFTP file transfer tool, identified as CVE-2025-31161, is being actively exploited by cybercriminals, including the Kill ransomware gang.

CrushFTP alerted customers on March 21, 2025, urging immediate updates to mitigate the flaw, which allows unauthorised access to sensitive data. Despite these warnings, exploitation has continued, prompting the Cybersecurity and Infrastructure Security Agency (CISA) to mandate federal agencies to patch affected systems by April 28, 2025.

Organisations using CrushFTP are strongly advised to upgrade to the latest version and implement recommended security measures to prevent potential data breaches.

View Source

PoisonSeed Exploits CRM Credentials to Launch Cryptocurrency Seed Phrase Attacks

A malicious campaign dubbed PoisonSeed is leveraging compromised credentials from customer relationship management (CRM) tools and bulk email providers to send spam messages containing fraudulent cryptocurrency seed phrases.

The attackers aim to deceive recipients into importing these seed phrases into new cryptocurrency wallets, thereby gaining unauthorised access to their funds. Targets include enterprise organisations and individuals, with notable companies like Coinbase, Ledger, Mailchimp, SendGrid, Hubspot, Mailgun, and Zoho being impersonated. The attackers create lookalike phishing pages to harvest credentials and establish persistence by generating API keys. Subsequently, they export mailing lists and disseminate spam emails prompting users to set up new wallets using the provided seed phrases.

View Source

Elevation of Privilege Vulnerability in Network Configuration Operators Group

Security researcher BirkeP discovered a critical elevation of privilege vulnerability, designated as CVE-2025-21293, within Windows Active Directory’s “Network Configuration Operators” group.

This group, intended to allow users to manage network configurations without full administrative rights, was found to possess excessive permissions, notably the “CreateSubKey” right over sensitive registry keys like DnsCache and NetBT. By exploiting these permissions, an attacker could register malicious performance counters, enabling code execution with SYSTEM privileges.

Microsoft addressed this issue in the January 14, 2025, security update by modifying the group’s permissions to prevent such exploits.

View Source

High Court Dismisses Judicial Review Over HSE Ransomware Data Breach

The High Court has dismissed a judicial review concerning a data breach from the 2021 ransomware attack on the Health Service Executive (HSE). The applicant, a fire prevention officer, alleged that unauthorised access to his HSE-issued work phone led to breaches of his personal email and cryptocurrency accounts.

The Data Protection Commission (DPC) had previously determined that the HSE was not a “data controller” for the personal data on the device, as personal use was unauthorised.

The High Court upheld this decision, concluding that the DPC’s findings were lawful and that the applicant’s claims were unsubstantiated.

View Source

If you’re ready to chat about how we can help protect your business from cyber threats, contact us using the form below 👇.

Let's Talk About Your Project

Leave us your details and one of our team will reach out to explore how we can assist with your cybersecurity requirements.

Postal address

The BASE Enterprise Centre

Railway Road

Stranorlar

Co. Donegal

Ireland

F93 VAK6

Phone number
IE: +353 74 970 7876 | UK: +44 20 4538 2818

To learn more about your data and privacy rights, visit our Privacy Statement.