ncident: FBI Warns of BADBOX 2.0 Botnet Surge in Chinese IoT Devices Incident Date: June 7, 2025 Article Date: June 7, 2025 Summary: FBI alerts indicate BADBOX 2.0, a Chinese-linked botnet, has infected over one million budget Android smart devices globally, now being used in illicit schemes; networks should be audited and sanitized. Reference: www.databreachtoday.com/fbi-warns…‑2‑0‑botnet-surge-in‑chinese‑devices
Incident: New RustStealer Info-Stealer Targets Chromium Browsers Incident Date: June 7, 2025 Article Date: June 7, 2025 Summary: Security researchers identified “RustStealer”, a Rust-based credential stealer for Chromium browsers on Windows and macOS, which harvests login credentials, cookies and other sensitive browser data. Reference: social.cyware.com/cyber-sec…
Incident: Optima Tax Relief Hit by Chaos Ransomware, Data Leaked Incident Date: June 7, 2025 Article Date: June 9, 2025 Summary: Chaos ransomware stalled Optima Tax Relief’s business by encrypting systems and publicly leaking stolen data as part of a double-extortion campaign. Reference: social.cyware.com/cyber-sec…
Incident: Cumberland County Hospital Ransomware Affects 36,600 Patients Incident Date: June 8, 2025 Article Date: June 9, 2025 Summary: Cumberland County Hospital confirmed ransomware impacted its systems, affecting 36,600 patients, and threatening to publicly release stolen data if ransom was not paid. Reference: www.hipaajournal.com/cumberlan…
Incident: CISA Warns of Erlang/OTP SSH Server RCE Vulnerability Exploited Incident Date: June 10, 2025 Article Date: June 10, 2025 Summary: CISA issued an urgent alert warning that a critical remote code execution flaw in Erlang/OTP SSH servers (CWE‑306) is being actively exploited in the wild, allowing unauthenticated command execution. Reference: cybersecuritynews.com/cisa-erla…
Incident: Rare Werewolf APT Employs Legitimate Tools for Credential Theft and Mining Incident Date: June 10, 2025 Article Date: June 10, 2025 Summary: Kaspersky reports the APT group Rare Werewolf is using benign tools (PowerShell, command files) and phishing operations to steal credentials and deploy crypto-miners across hundreds of targets in Russia and CIS states. Reference: thehackernews.com/2025/06/r…