← Terug naar nieuwsbrief

AI & Security Nieuws – 6 Oktober 2025

Nieuwsbrief

Djimit* een overzicht voor AI cloud- en security professionals*

Insight of the Day

Type: trend

Het tweesporenmoment voor enterprise AI is vandaag scherp zichtbaar: aan de ene kant massale compute-consolidatie door de OpenAI-AMD deal, aan de andere kant governance-versnelling in de EU via DIGITAL 2025-27 en strengere dual-use mitigaties vanuit Microsoft Research. De combinatie dwingt organisaties om tegelijk hun vendor-mix en capaciteit te herijken, en hun policy, audit en agent-controles te verdiepen, vooral nu app-integraties in ChatGPT en Sora 2 het applicatielandschap verder openen. 

Korte aanbevelingen voor CIO/CISO/Chief Data & AI

High-Impact Zero-Day: Oracle E-Business Suite (CVE-2025-61882)

Een kritieke zero-day in Oracle E-Business Suite, aangeduid als CVE-2025-61882, is vandaag bevestigd als actief uitgebuit in Cl0p ransomware-aanvallen. Deze kwetsbaarheid maakt remote code execution mogelijk zonder authenticatie (CVSS 9.8) en treft EBS-versies 12.2.3 t/m 12.2.14. Oracle publiceerde patches en indicators of compromise (IoCs); experts adviseren organisaties om te controleren op potentiële compromissen, zelfs als patches tijdig zijn geïnstalleerd. De campagne bestaat uit “double-extortion” met datadiefstal en bedreiging tot publicatie. De aanval wordt toegeschreven aan Cl0p, met mogelijke betrokkenheid van Scattered Spider/ShinyHunters.[1][2][3][4][5]

Aktieve Exploit: GoAnywhere Managed File Transfer (CVE-2025-10035)

Microsoft Threat Intelligence meldt actieve uitbuiting van CVE-2025-10035 in Fortra GoAnywhere Managed File Transfer, gevolgd door Medusa ransomware-deployment door Storm-1175. Deze kwetsbaarheid is remote exploitable en is onderdeel van een golf van supply-chain gerichte aanvallen.[6]

Grote Datalekken en Ransomware Incidenten

APT-Campagnes & Cyber-Espionage

Zero-Day Exploit in Zimbra: Targeted aanval op Braziliaans leger

CVE-2025-27915 (XSS) misbruikt in aanvallen via ICS-files op Braziliaanse militaire systemen; patch released, verdachte herkomst nog onbekend.[13]

Reguleringsupdate

Kwalitatieve Observaties

Bronnen: CVE-2025-61882, CVE-2025-10035, CVE-2025-27915, MITRE, Mandiant, Oracle Security Alerts, Microsoft Threat Intelligence, SecurityWeek, RiskyBiz, Infosecurity Magazine, The Hacker News.

Voor nadere technische details of IOC’s per case is directe verwijzing naar advisories en bijbehorende MITRE/CVE-catalogus essentieel gezien de impact en breedte van deze actuele dreigingen.[2][3][4][9][10]

Sources[1] Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks https://www.securityweek.com/oracle-e-business-suite-zero-day-exploited-in-cl0p-attacks/[2] Well, Well, Well. It’s Another Day. (Oracle E-Business Suite Pre-Auth … https://labs.watchtowr.com/well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882/[3] CVE-2025-61882 Cl0p Exploited Oracle Zero-Day | Tenable® https://www.tenable.com/blog/cve-2025-61882-faq-oracle-e-business-suite-zero-day-cl0p-and-july-2025-cpu[4] Active Exploitation of Zero-Day Vulnerability in Oracle E-Business … https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-098/[5] Extortion campaign targeting Oracle E-Business Suite customers … https://www.cybersecuritydive.com/news/extortion-campaign-oracle-e-business-suite-zero-day/802123/[6] Investigating active exploitation of CVE-2025-10035 GoAnywhere … https://www.microsoft.com/en-us/security/blog/2025/10/06/investigating-active-exploitation-of-cve-2025-10035-goanywhere-managed-file-transfer-vulnerability/[7] Asahi Confirms Ransomware Attack, Data Stolen from Servers https://www.infosecurity-magazine.com/news/asahi-ransomware-attack-data-stolen/[8] What can businesses learn from the Jaguar Land Rover cyber attack? https://www.keystonelaw.com/keynotes/what-can-businesses-learn-from-the-jaguar-land-rover-cyber-attack[9] The cost of cyber hacking on UK business is greater than it seems https://www.bbc.com/news/articles/c5ye8zj5l4jo[10] The true cost of cyber attacks on UK business is greater than it seems https://www.rusi.org/news-and-comment/in-the-news/true-cost-cyber-attacks-uk-business-greater-it-seems[11] Suspected Chinese cyber spies targeted Serbian aviation agency https://therecord.media/suspected-chinese-spies-serbia[12] Risky Bulletin: Scam compound operators sentenced to death in China https://news.risky.biz/risky-bulletin-scam-compound-operators-sentenced-to-death-in-china/[13] Zimbra Zero-Day Exploited to Target Brazilian Military via Malicious … https://thehackernews.com/2025/10/zimbra-zero-day-exploited-to-target.html[14] Managing AI-related cyber risks | Global Regulation Tomorrow https://www.regulationtomorrow.com/eu/managing-ai-related-cyber-risks/[15] APT & CyberCriminal Campaign Collection – GitHub https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections[16] New COLDRIVER Malware Campaign Joins BO Team and Bearlyfy … https://thehackernews.com/2025/09/new-coldriver-malware-campaign-joins-bo.html[17] Key US cyber law expires, and other cybersecurity news https://www.weforum.org/stories/2025/10/key-us-cyber-law-expire-cybersecurity-news/[18] China-linked APT Phantom Taurus uses Net-Star malware in … https://radar.offseq.com/threat/china-linked-apt-phantom-taurus-uses-net-star-malw-84432eb3[19] The Hacker News | #1 Trusted Source for Cybersecurity News https://thehackernews.com[20] Beware of threats lurking in booby-trapped PDF files – WeLiveSecurity https://www.welivesecurity.com/en/malware/threats-lurking-pdf-files/

DjimIT Nieuwsbrief

AI updates, praktijkcases en tool reviews — tweewekelijks, direct in uw inbox.