Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware

0
Medium
Exploit
Published: Fri Oct 10 2025 (10/10/2025, 14:13:25 UTC)
Source: SecurityWeek

Description

Other noteworthy stories that might have slipped under the radar: US universities targeted by payroll pirates, Zimbra vulnerability exploited, Mic-E-Mouse attack. The post In Other News: Gladinet Flaw Exploitation, Attacks on ICS Honeypot, ClayRat Spyware appeared first on SecurityWeek .

AI-Powered Analysis

AILast updated: 10/10/2025, 14:17:57 UTC

Technical Analysis

This security roundup details several concurrent threats impacting diverse sectors. Gladinet’s CentreStack and Triofox products have been exploited in the wild due to two vulnerabilities: CVE-2025-30406, a hardcoded machine key issue allowing attackers to bypass authentication or escalate privileges, and CVE-2025-11371, an unauthenticated local file inclusion vulnerability enabling arbitrary file access or code execution. Gladinet is developing patches but currently offers workarounds. Industrial Control Systems (ICS) honeypots mimicking water treatment plants have been targeted by Russia-linked threat actor TwoNet and Iranian groups, attempting to deface HMIs and disrupt processes, indicating ongoing hostile activity against critical infrastructure. ClayRat Android spyware, primarily targeting Russian users, is distributed through Telegram channels and phishing sites masquerading as popular apps. Once installed, it exfiltrates SMS, notifications, call logs, and can remotely control device functions. Additional threats include payroll fraud against US universities via social engineering and lack of MFA, exploitation of a Zimbra XSS vulnerability (CVE-2025-27915) to compromise Brazilian military email accounts, and active exploitation of a critical WordPress plugin vulnerability (CVE-2025-5947) affecting approximately 6,000 sites. These incidents demonstrate a broad attack surface spanning cloud file-sharing solutions, industrial environments, mobile platforms, and web applications. The exploitation methods range from technical vulnerabilities to social engineering, emphasizing the need for layered defenses. The absence of CVSS scores for some vulnerabilities requires severity assessment based on impact and exploitability. The combined threat landscape underscores risks to confidentiality, integrity, and availability across multiple sectors and geographies.

Potential Impact

European organizations face multifaceted risks from these threats. Enterprises using Gladinet CentreStack or Triofox for secure file sharing may suffer unauthorized data access, credential compromise, or lateral movement within networks, potentially leading to data breaches or ransomware. Industrial operators in Europe with ICS/OT environments similar to the targeted honeypots risk operational disruption, safety hazards, and reputational damage if adversaries succeed in manipulating control systems. The ClayRat spyware threat, while primarily targeting Russia, signals the potential for mobile espionage campaigns that could expand geographically, threatening sensitive communications and privacy of European users. The payroll fraud tactics highlight the ongoing risk of social engineering attacks exploiting weak authentication, which could affect HR and finance departments across Europe. Exploitation of web application vulnerabilities like the WordPress plugin flaw could lead to website defacements, data theft, or malware distribution, impacting European businesses relying on these platforms. Overall, these threats could result in financial losses, regulatory penalties under GDPR, operational downtime, and erosion of stakeholder trust. The geopolitical context, especially concerning Russian-linked ICS attacks and spyware, increases the risk for European critical infrastructure and government entities.

Mitigation Recommendations

European organizations should implement the following specific measures: 1) For Gladinet products, immediately apply any vendor-provided workarounds and monitor for updates; restrict network access to management interfaces and audit logs for suspicious activity. 2) ICS operators must enhance network segmentation, deploy anomaly detection tailored for OT environments, and conduct regular security assessments and incident response drills focused on ICS threats. 3) Mobile device management (MDM) solutions should be used to restrict installation of unauthorized apps, especially from unofficial sources like Telegram channels; implement endpoint detection and response (EDR) on mobile devices to detect spyware behaviors. 4) Strengthen authentication by enforcing multi-factor authentication (MFA) on all critical systems, especially HR and payroll platforms, to mitigate social engineering risks. 5) Web administrators should promptly apply patches for vulnerable plugins like Service Finder Bookings and use web application firewalls (WAFs) to block exploitation attempts. 6) Conduct targeted user awareness training on phishing and social engineering, emphasizing risks related to payroll fraud and spyware distribution channels. 7) Monitor threat intelligence feeds for indicators related to TwoNet and other ICS threat actors to proactively defend critical infrastructure. 8) Establish incident response plans that include coordination with law enforcement and information sharing with sector-specific ISACs. These tailored actions go beyond generic advice by addressing the specific vulnerabilities, attack vectors, and threat actors described.

Need more detailed analysis?Get Pro

Technical Details

Article Source
{"url":"https://www.securityweek.com/in-other-news-gladinet-flaw-exploitation-attacks-on-ics-honeypot-clayrat-spyware/","fetched":true,"fetchedAt":"2025-10-10T14:17:36.430Z","wordCount":1499}

Threat ID: 68e915809497c34e0b75da4b

Added to database: 10/10/2025, 2:17:36 PM

Last enriched: 10/10/2025, 2:17:57 PM

Last updated: 10/11/2025, 10:50:10 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats