ARTICLE
27 October 2025

Ankura CTIX FLASH Update - October 24, 2025

AC
Ankura Consulting Group LLC

Contributor

Ankura Consulting Group, LLC is an independent global expert services and advisory firm that delivers end-to-end solutions to help clients at critical inflection points related to conflict, crisis, performance, risk, strategy, and transformation. Ankura consists of more than 1,800 professionals and has served 3,000+ clients across 55 countries. Collaborative lateral thinking, hard-earned experience, and multidisciplinary capabilities drive results and Ankura is unrivalled in its ability to assist clients to Protect, Create, and Recover Value. For more information, please visit, ankura.com.
Cybersecurity experts have identified new threats involving supply chain attacks and malware campaigns. Attackers are exploiting the NuGet package manager by creating fake packages...
United States Technology
Ankura Consulting Group LLC’s articles from Ankura Consulting Group LLC are most popular:
  • with readers working within the Property industries
Ankura Consulting Group LLC are most popular:
  • within Insurance, Wealth Management and Tax topic(s)

Malware Activity

Supply Chain Attacks and Evolving Malware Campaigns

Cybersecurity experts have identified new threats involving supply chain attacks and malware campaigns. Attackers are exploiting the NuGet package manager by creating fake packages, such as "Nethereum.All." The malware appears to be popular through artificially inflated download counts. These packages contain malicious code designed to steal sensitive information, like cryptocurrency wallet keys. It does so by replacing characters in package names to evade detection. Meanwhile, the Russian hacking group Star Blizzard continues to adapt its tactics after the exposure of its LostKeys malware. They now deploy newer malware tools, such as NoRobot and MaybeRobot. The new tools are designed to trick victims into downloading malicious files that grant attackers control over infected systems. The group regularly updates its methods by changing file names, infrastructure, and techniques. By doing so, they try to avoid detection and sustain their cyber-espionage efforts. CTIX analysts will continue to report on the latest malware strains and attack methodologies.

Threat Actor Activity

Researchers Discover Potential for AI Sidebar Spoofing Attacks

OpenAI's Atlas and Perplexity's Comet browsers are susceptible to AI Sidebar Spoofing attacks, which can deceive users into executing malicious instructions. Researchers at SquareX discovered that a malicious extension can inject JavaScript to overlay a fake sidebar indistinguishable from the genuine one, intercepting user interactions without their awareness. This vulnerability allows attackers to lead users to phishing sites, execute OAuth attacks on Gmail and Google Drive, and deliver reverse shell installation commands. Atlas and Comet integrate large language models (LLMs) into a sidebar for user interaction, such as summarizing pages or executing tasks. SquareX demonstrated the spoofing attack using Google's Gemini AI in Comet, highlighting the potential for broader exploitation through trigger prompts. The attack requires minimal permissions, similar to those used by productivity tools, making it challenging for users to detect. Despite testing the attack on both Comet and the newly released Atlas browser, OpenAI and Perplexity have not responded to the findings. CTIX analysts advise users of AI browsers to exercise caution, limiting usage to non-sensitive tasks, and avoiding activities involving private data.

Vulnerabilities

Global Internet Disruption Exposes Fragility of AWS's Cloud Infrastructure

A series of major outages in Amazon Web Services' (AWS) US-EAST-1 region in October 2025 caused widespread disruptions across thousands of platforms, including Amazon.com, Prime Video, Snapchat, Roblox, major banks, airlines, and financial trading systems, revealing the global economy's deep dependence on centralized cloud infrastructure. The twenty-four (24) hour outage began late on October 19th and was traced to a Domain Name System (DNS) resolution failure affecting the DynamoDB database service. While AWS later confirmed the issue was triggered by an internal error during a routine system update rather than a cyberattack, the cascading impact crippled over 100 AWS services and delayed operations worldwide. DNS misconfigurations prevented servers from locating essential resources, paralyzing EC2, Lambda, and CloudWatch, and forcing AWS engineers to throttle operations to prevent a total collapse before restoring full service the following day. Researchers from Sectigo, Bugcrowd, and the University of Surrey emphasized that the incident (likely caused by a human or configuration error) underscores how even small technical faults in a single region can ripple through global systems due to DNS caching and interdependence. Analysts further warned that Amazon's layoffs and loss of senior engineering talent may have amplified risks by eroding institutional expertise. The outage not only highlighted vulnerabilities in AWS's architecture, which handles up to 40% of its total global load but also reignited debate over systemic concentration in the cloud sector dominated by Amazon, Microsoft, and Google. Cybersecurity and resilience specialists agreed that diversification, multi-region redundancy, hybrid cloud adoption, and disaster playbooks are essential to mitigating the economic and operational fallout from future large-scale cloud failures. CTIX analysts will continue to report on novel vulnerabilities affecting IT systems.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More