In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware
Other noteworthy stories that might have slipped under the radar: US universities targeted by payroll pirates, Zimbra vulnerability exploited, Mic-E-Mouse attack. The post In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware appeared first on SecurityWeek .
AI Analysis
Technical Summary
This security roundup details several concurrent threats impacting diverse sectors. Gladinet’s CentreStack and Triofox products have been exploited in the wild due to two vulnerabilities: CVE-2025-30406, a hardcoded machine key issue allowing attackers to bypass authentication or escalate privileges, and CVE-2025-11371, an unauthenticated local file inclusion vulnerability enabling arbitrary file access or code execution. Gladinet is developing patches but currently offers workarounds. Industrial Control Systems (ICS) honeypots mimicking water treatment plants have been targeted by Russia-linked threat actor TwoNet and Iranian groups, attempting to deface HMIs and disrupt processes, indicating ongoing hostile activity against critical infrastructure. ClayRat Android spyware, primarily targeting Russian users, is distributed through Telegram channels and phishing sites masquerading as popular apps. Once installed, it exfiltrates SMS, notifications, call logs, and can remotely control device functions. Additional threats include payroll fraud against US universities via social engineering and lack of MFA, exploitation of a Zimbra XSS vulnerability (CVE-2025-27915) to compromise Brazilian military email accounts, and active exploitation of a critical WordPress plugin vulnerability (CVE-2025-5947) affecting approximately 6,000 sites. These incidents demonstrate a broad attack surface spanning cloud file-sharing solutions, industrial environments, mobile platforms, and web applications. The exploitation methods range from technical vulnerabilities to social engineering, emphasizing the need for layered defenses. The absence of CVSS scores for some vulnerabilities requires severity assessment based on impact and exploitability. The combined threat landscape underscores risks to confidentiality, integrity, and availability across multiple sectors and geographies.
Potential Impact
European organizations face multifaceted risks from these threats. Enterprises using Gladinet CentreStack or Triofox for secure file sharing may suffer unauthorized data access, credential compromise, or lateral movement within networks, potentially leading to data breaches or ransomware. Industrial operators in Europe with ICS/OT environments similar to the targeted honeypots risk operational disruption, safety hazards, and reputational damage if adversaries succeed in manipulating control systems. The ClayRat spyware threat, while primarily targeting Russia, signals the potential for mobile espionage campaigns that could expand geographically, threatening sensitive communications and privacy of European users. The payroll fraud tactics highlight the ongoing risk of social engineering attacks exploiting weak authentication, which could affect HR and finance departments across Europe. Exploitation of web application vulnerabilities like the WordPress plugin flaw could lead to website defacements, data theft, or malware distribution, impacting European businesses relying on these platforms. Overall, these threats could result in financial losses, regulatory penalties under GDPR, operational downtime, and erosion of stakeholder trust. The geopolitical context, especially concerning Russian-linked ICS attacks and spyware, increases the risk for European critical infrastructure and government entities.
Mitigation Recommendations
European organizations should implement the following specific measures: 1) For Gladinet products, immediately apply any vendor-provided workarounds and monitor for updates; restrict network access to management interfaces and audit logs for suspicious activity. 2) ICS operators must enhance network segmentation, deploy anomaly detection tailored for OT environments, and conduct regular security assessments and incident response drills focused on ICS threats. 3) Mobile device management (MDM) solutions should be used to restrict installation of unauthorized apps, especially from unofficial sources like Telegram channels; implement endpoint detection and response (EDR) on mobile devices to detect spyware behaviors. 4) Strengthen authentication by enforcing multi-factor authentication (MFA) on all critical systems, especially HR and payroll platforms, to mitigate social engineering risks. 5) Web administrators should promptly apply patches for vulnerable plugins like Service Finder Bookings and use web application firewalls (WAFs) to block exploitation attempts. 6) Conduct targeted user awareness training on phishing and social engineering, emphasizing risks related to payroll fraud and spyware distribution channels. 7) Monitor threat intelligence feeds for indicators related to TwoNet and other ICS threat actors to proactively defend critical infrastructure. 8) Establish incident response plans that include coordination with law enforcement and information sharing with sector-specific ISACs. These tailored actions go beyond generic advice by addressing the specific vulnerabilities, attack vectors, and threat actors described.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Poland, Sweden, Spain, Belgium, Czech Republic
In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware
Description
Other noteworthy stories that might have slipped under the radar: US universities targeted by payroll pirates, Zimbra vulnerability exploited, Mic-E-Mouse attack. The post In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware appeared first on SecurityWeek .
AI-Powered Analysis
Technical Analysis
This security roundup details several concurrent threats impacting diverse sectors. Gladinet’s CentreStack and Triofox products have been exploited in the wild due to two vulnerabilities: CVE-2025-30406, a hardcoded machine key issue allowing attackers to bypass authentication or escalate privileges, and CVE-2025-11371, an unauthenticated local file inclusion vulnerability enabling arbitrary file access or code execution. Gladinet is developing patches but currently offers workarounds. Industrial Control Systems (ICS) honeypots mimicking water treatment plants have been targeted by Russia-linked threat actor TwoNet and Iranian groups, attempting to deface HMIs and disrupt processes, indicating ongoing hostile activity against critical infrastructure. ClayRat Android spyware, primarily targeting Russian users, is distributed through Telegram channels and phishing sites masquerading as popular apps. Once installed, it exfiltrates SMS, notifications, call logs, and can remotely control device functions. Additional threats include payroll fraud against US universities via social engineering and lack of MFA, exploitation of a Zimbra XSS vulnerability (CVE-2025-27915) to compromise Brazilian military email accounts, and active exploitation of a critical WordPress plugin vulnerability (CVE-2025-5947) affecting approximately 6,000 sites. These incidents demonstrate a broad attack surface spanning cloud file-sharing solutions, industrial environments, mobile platforms, and web applications. The exploitation methods range from technical vulnerabilities to social engineering, emphasizing the need for layered defenses. The absence of CVSS scores for some vulnerabilities requires severity assessment based on impact and exploitability. The combined threat landscape underscores risks to confidentiality, integrity, and availability across multiple sectors and geographies.
Potential Impact
European organizations face multifaceted risks from these threats. Enterprises using Gladinet CentreStack or Triofox for secure file sharing may suffer unauthorized data access, credential compromise, or lateral movement within networks, potentially leading to data breaches or ransomware. Industrial operators in Europe with ICS/OT environments similar to the targeted honeypots risk operational disruption, safety hazards, and reputational damage if adversaries succeed in manipulating control systems. The ClayRat spyware threat, while primarily targeting Russia, signals the potential for mobile espionage campaigns that could expand geographically, threatening sensitive communications and privacy of European users. The payroll fraud tactics highlight the ongoing risk of social engineering attacks exploiting weak authentication, which could affect HR and finance departments across Europe. Exploitation of web application vulnerabilities like the WordPress plugin flaw could lead to website defacements, data theft, or malware distribution, impacting European businesses relying on these platforms. Overall, these threats could result in financial losses, regulatory penalties under GDPR, operational downtime, and erosion of stakeholder trust. The geopolitical context, especially concerning Russian-linked ICS attacks and spyware, increases the risk for European critical infrastructure and government entities.
Mitigation Recommendations
European organizations should implement the following specific measures: 1) For Gladinet products, immediately apply any vendor-provided workarounds and monitor for updates; restrict network access to management interfaces and audit logs for suspicious activity. 2) ICS operators must enhance network segmentation, deploy anomaly detection tailored for OT environments, and conduct regular security assessments and incident response drills focused on ICS threats. 3) Mobile device management (MDM) solutions should be used to restrict installation of unauthorized apps, especially from unofficial sources like Telegram channels; implement endpoint detection and response (EDR) on mobile devices to detect spyware behaviors. 4) Strengthen authentication by enforcing multi-factor authentication (MFA) on all critical systems, especially HR and payroll platforms, to mitigate social engineering risks. 5) Web administrators should promptly apply patches for vulnerable plugins like Service Finder Bookings and use web application firewalls (WAFs) to block exploitation attempts. 6) Conduct targeted user awareness training on phishing and social engineering, emphasizing risks related to payroll fraud and spyware distribution channels. 7) Monitor threat intelligence feeds for indicators related to TwoNet and other ICS threat actors to proactively defend critical infrastructure. 8) Establish incident response plans that include coordination with law enforcement and information sharing with sector-specific ISACs. These tailored actions go beyond generic advice by addressing the specific vulnerabilities, attack vectors, and threat actors described.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Article Source
- {"url":"https://www.securityweek.com/in-other-news-gladinet-flaw-exploitation-attacks-on-ics-honeypot-clayrat-spyware/","fetched":true,"fetchedAt":"2025-10-10T14:17:36.430Z","wordCount":1499}
Threat ID: 68e915809497c34e0b75da4b
Added to database: 10/10/2025, 2:17:36 PM
Last enriched: 10/10/2025, 2:17:57 PM
Last updated: 10/11/2025, 10:50:10 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
RondoDox Botnet: an 'Exploit Shotgun' for Edge Vulns
MediumThreatsDay Bulletin: MS Teams Hack, MFA Hijacking, $2B Crypto Heist, Apple Siri Probe & More
MediumCisco, Fortinet, Palo Alto Networks Devices Targeted in Coordinated Campaign
MediumRondoDox Botnet Takes ‘Exploit Shotgun’ Approach
MediumGoogle's New AI Doesn't Just Find Vulnerabilities — It Rewrites Code to Patch Them
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.