Cybersecurity News: JavaScript injection campaign, solar power vulnerabilities, SIM swap lawsuit

In today’s cybersecurity news…

150,000 sites compromised by JavaScript injection

At researchers at website security company c/side, this campaign infiltrates legitimate websites with malicious JavaScript, using an iframe injection to display a full-screen overlay in a visitor’s browser using CSS. This takes them to sites promoting Chinese gambling platforms. This current campaign largely targets infected WordPress sites, but the researchers state the technique demonstrates how threat actors continually adapt, increasing their sophistication.

(The Hacker News)

Vulnerabilities found in numerous solar power systems

Researchers at cybersecurity firm Forescout are warning of “dozens of vulnerabilities” in solar power system products from Sungrow, Growatt and SMA. They say some of these flaws can pose a serious threat to electrical grids. The flaws exist within components such as one that “connects a solar power system to the internet, another in a cloud service where data is sent for monitoring and control, and a mobile application that enables the user to interact with the cloud service,” some of which will allow an attacker to upload files to enable arbitrary code execution on the cloud platform server, steal information, or vandalize the power grid itself.

(Security Week)

T-Mobile pays $33 million in SIM swap lawsuit

The law firm Greenberg Glusker has secured a $33 million arbitration award against T-Mobile over a SIM swap attack that led to a massive cryptocurrency theft. The case involved an investor whose phone number was hijacked on February 21, 2020, leading to the theft of Bitcoin valued at $38 million. T-Mobile “revealed that the incident occurred after a threat actor accessed T-Mobile’s systems and abused them for SIM swapping.” The law firm argued that T-Mobile’s security failures enabled the breach, potentially through a system backdoor, [and that] T-Mobile “attempted to keep details of its security failures sealed.”

(Security Week)

NHS software supplier gets discount on fine for good behavior

This story follows up on an event from August 2022, in which the LockBit ransomware gang attacked Advanced Health and Care Limited, an IT company that provided services to the UK’s National Health Service (NHS), along with other healthcare organizations. The fine of £3.07 million being levied on the company by the UK’s data protection branch called Information Commissioner’s Office (ICO) is just half of what was originally proposed. The ICO said Advanced Health and Care Limited “settled for the reduced fine after acknowledging the watchdog’s decision; agreeing to pay up without appealing; playing nicely with the NHS and related regulatory bodies following the attack; as well as taking “other steps” taken to mitigate related risk.

(The Register)

Huge thanks to our sponsor, ThreatLocker

ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.

Defects in Kubernetes component put 40% of cloud environments at risk

Researchers at Wiz state that this number, 40%, is due to five recently discovered vulnerabilities,  one regarded critical with a CVSS score of 9.8, in the Ingress Nginx Controller for Kubernetes.” The researchers state that “they aren’t aware of any active exploitation, but the risk for publicly exposed and unpatched Ingress Nginx controllers is extremely high.” Stephen Fewer, principal security researcher at Rapid7, stated separately, “with exploit code [for this vulnerability] starting to be published online, Kubernetes administrators should remediate publicly exposed instances on an urgent basis.” He added, “successful exploitation could allow attackers to access cluster-wide secrets, including passwords or tokens, or completely take over a cluster.”

(Cyberscoop)

The top three Microsoft Office exploits to watch for

The Hacker News is out with its summary of the most popular Office exploits, and they are, in brief: phishing, using email attachments that now include fake Captcha, Cloudflare and other “prove you’re a human” steps, as well as QR codes; the Microsoft Equation Editor which still exists on many machines, and which is a zero click exploit embedded in Microsoft Word files; and thirdly, another Microsoft Word zero click, Follina, which “abuses the Microsoft Support Diagnostic Tool (MSDT) and special URLs embedded in Office documents to execute remote code.” More details and tips on how to mitigate are available in the link.

(The Hacker News)

Windows Server 2025 updates cause remote desktop freezes

Microsoft has acknowledged a known issue causing Remote Desktop freezes on Windows Server 2025 after installing security updates since February 2025 Patch Tuesday. Users experience unresponsive mouse and keyboard input shortly after connecting, requiring reconnection. The issue also affected Windows 11 24H2 but was resolved with its February 25 update. Microsoft has yet to release a fix for Windows Server 2025 but plans to address it in a future update.

(BleepingComputer)

Mozilla warns Windows users of critical Firefox sandbox escape flaw

Mozilla has released a new version of Firefox 136.0.4 to patch a critical security flaw that allows attackers to escape the browser’s sandbox on Windows. The issue affects standard and extended support releases (ESR). While details are limited, the flaw is similar to a Chrome zero-day recently patched by Google. Mozilla noted attackers exploited a related vulnerability in the wild, allowing them to confuse processes and leak handles, leading to a sandbox escape. Other operating systems are unaffected.

(BleepingComputer)

Steve Prentice
Author, speaker, expert in the area where people and technology crash into each other, viewed from the organizational psychology perspective. Host of many podcasts, voice actor and narrator for corporate media and audiobooks. Ghost-writer for busy executives.