CyberWatch

Patch Updates, New Malware Threats, and the Ongoing Supply Chain Battle

By

Curtis Franklin

By

Access Point Consulting

Software Updates Cause Chaos and Concern

This week, the CyberWatch team dissected the complexities of software updates, starting with Microsoft’s October Windows Security updates. While patching is critical, these updates broke SSH connections on some Windows 11 systems, creating headaches for enterprise and IoT users. Microsoft provided a temporary PowerShell workaround, but this incident serves as a reminder to test patches before deployment.

Meanwhile, Adobe, Zoom, and Google also issued patches addressing a combined total of over 150 vulnerabilities. From Adobe’s updates for creative tools to Zoom’s fixes for input validation flaws, and Chrome’s focus on navigation vulnerabilities, the week highlighted the critical importance of staying up-to-date across platforms.

Malicious Campaigns Target Everything from Spreadsheets to Games

Cybercriminals continued their innovation streak with two major malware strains making waves:

  • Remcos RAT Campaign: Using Excel files disguised as purchase orders, this trojan gives attackers full control over target systems.
  • Windows 4.0 Malware: Evolving from Ghost RAT, this new strain uses gaming apps to infiltrate systems, proving that no digital activity is immune to compromise.

Adding to the chaos, Stelfox Malware emerged, masquerading as crack tools for popular software like AutoCAD and Foxit. Beyond bypassing copy protection, it mines cryptocurrency and steals payment data, signaling a concerning trend in malware diversity.

Supply Chain Attacks Continue to Escalate

Supply chain attacks dominated headlines this week:

  • Landmark Admin Breach: Affecting over 800,000 Liberty Bankers Insurance Group policyholders, this breach exposed sensitive data, including Social Security and financial account numbers.
  • Thompson Coburn Breach: The law firm’s data exposure impacted over 300,000 Presbyterian Healthcare patients, with information spanning medical records to health insurance details.

Both breaches underscore the necessity of securing supply chain participants with multi-factor authentication, encryption, and robust monitoring.

Law Enforcement Strikes Against Malware-as-a-Service

In a rare victory, international law enforcement agencies dismantled the Redline Stealer malware operation and its clone, Meta Stealer. This malware-as-a-service platform sold turnkey solutions to cybercriminals, highlighting the scalability and resilience of modern cybercrime enterprises. While this takedown is a win, the decentralized nature of these operations means the fight is far from over.

Key Takeaways from This Week

  1. Patch with Precision: While updates are essential, poorly implemented patches can cause operational disruptions. Test patches before deploying across systems.
  2. Train Your Team: User education remains a critical defense against sophisticated phishing and malware campaigns.
  3. Fortify Supply Chains: Proactive risk management and secure third-party interactions are non-negotiable in today’s threat landscape.

Listen to the CyberWatch podcast on Spotify and Apple Podcasts, or watch the episode on YouTube.

Resources

CyberWatch

March 5, 2025

David Habib (Brightspot) | Building a culture of cybersecurity awareness

Cybersecurity awareness is often reduced to check-the-box training, but David Habib, CIO at Brightspot, argues that real security awareness isn’t about formal programs—it’s about making security part of a company’s culture. In this episode, he shares practical insights on how organizations can move beyond stale training sessions to create an engaged and security-conscious workforce.

Find out more
February 26, 2025

Lori Keller (Access Point Consulting) | Project management’s role in cybersecurity

Cybersecurity projects don’t just require technical expertise—they demand structured planning, risk management, and coordination across teams. Lori Keller, a practitioner in cybersecurity project management, joins CyberWatch to discuss how strong project management practices drive security success.

Find out more
February 19, 2025

Adithya Vellal (Petra Security) | Advancing cybersecurity maturity in the cloud

Cybersecurity maturity isn’t just about implementing tools—it’s about developing repeatable processes that align security with business objectives. Adithya Vellal, founder of Petra Security, joins CyberWatch to discuss how organizations can take a structured approach to cybersecurity, reduce risk, and communicate security priorities effectively.

Find out more