CyberWatch

Patch Updates, New Malware Threats, and the Ongoing Supply Chain Battle

By

Curtis Franklin

By

Access Point Consulting

Software Updates Cause Chaos and Concern

This week, the CyberWatch team dissected the complexities of software updates, starting with Microsoft’s October Windows Security updates. While patching is critical, these updates broke SSH connections on some Windows 11 systems, creating headaches for enterprise and IoT users. Microsoft provided a temporary PowerShell workaround, but this incident serves as a reminder to test patches before deployment.

Meanwhile, Adobe, Zoom, and Google also issued patches addressing a combined total of over 150 vulnerabilities. From Adobe’s updates for creative tools to Zoom’s fixes for input validation flaws, and Chrome’s focus on navigation vulnerabilities, the week highlighted the critical importance of staying up-to-date across platforms.

Malicious Campaigns Target Everything from Spreadsheets to Games

Cybercriminals continued their innovation streak with two major malware strains making waves:

  • Remcos RAT Campaign: Using Excel files disguised as purchase orders, this trojan gives attackers full control over target systems.
  • Windows 4.0 Malware: Evolving from Ghost RAT, this new strain uses gaming apps to infiltrate systems, proving that no digital activity is immune to compromise.

Adding to the chaos, Stelfox Malware emerged, masquerading as crack tools for popular software like AutoCAD and Foxit. Beyond bypassing copy protection, it mines cryptocurrency and steals payment data, signaling a concerning trend in malware diversity.

Supply Chain Attacks Continue to Escalate

Supply chain attacks dominated headlines this week:

  • Landmark Admin Breach: Affecting over 800,000 Liberty Bankers Insurance Group policyholders, this breach exposed sensitive data, including Social Security and financial account numbers.
  • Thompson Coburn Breach: The law firm’s data exposure impacted over 300,000 Presbyterian Healthcare patients, with information spanning medical records to health insurance details.

Both breaches underscore the necessity of securing supply chain participants with multi-factor authentication, encryption, and robust monitoring.

Law Enforcement Strikes Against Malware-as-a-Service

In a rare victory, international law enforcement agencies dismantled the Redline Stealer malware operation and its clone, Meta Stealer. This malware-as-a-service platform sold turnkey solutions to cybercriminals, highlighting the scalability and resilience of modern cybercrime enterprises. While this takedown is a win, the decentralized nature of these operations means the fight is far from over.

Key Takeaways from This Week

  1. Patch with Precision: While updates are essential, poorly implemented patches can cause operational disruptions. Test patches before deploying across systems.
  2. Train Your Team: User education remains a critical defense against sophisticated phishing and malware campaigns.
  3. Fortify Supply Chains: Proactive risk management and secure third-party interactions are non-negotiable in today’s threat landscape.

Listen to the CyberWatch podcast on Spotify and Apple Podcasts, or watch the episode on YouTube.

Resources

Latest Resources

Resources

CyberWatch

April 2, 2025

Scott "Monty" Montgomery (Island) | Navigating CMMC compliance for organizations of every size

Scott Montgomery, known as Monty, joined the CyberWatch Expert Series podcast to discuss his extensive background in cybersecurity, particularly in building and designing network security tools for high-assurance environments like the Department of Defense (DoD) and the intelligence community. His experience includes significant tenure at McAfee (now Trellix), which led him to his current role at Island, where he focuses on innovative approaches to cybersecurity compliance.

Find out more
March 19, 2025

Michael Sviben (DomainGuard) | Defending against phishing and building proactive security awareness

Cybersecurity threats evolve rapidly, and one tactic consistently rises above the rest: phishing. In this episode of CyberWatch, Michael Sviben, co-founder of DomainGuard, discusses why phishing remains so effective, how businesses and individuals become targets, and what you can do to stay vigilant.

Find out more
March 5, 2025

David Habib (Brightspot) | Building a culture of cybersecurity awareness

Cybersecurity awareness is often reduced to check-the-box training, but David Habib, CIO at Brightspot, argues that real security awareness isn’t about formal programs—it’s about making security part of a company’s culture. In this episode, he shares practical insights on how organizations can move beyond stale training sessions to create an engaged and security-conscious workforce.

Find out more