This browser is not actively supported anymore. For the best passle experience, we strongly recommend you upgrade your browser.
Subscribe

Social Media Links

| 3 minute read

Ankura CTIX FLASH Update - December 10, 2025

Malware Activity

 

Spyware Innovations and AI Browser Vulnerabilities

Recent reports reveal alarming advancements in cybersecurity threats. The spyware company Intellexa has created a highly covert infection method called “Aladdin.” The spyware infects devices when a user simply views a malicious ad, no clicking required. This technique uses fake advertising networks across multiple countries, which makes it hard to detect or block, and exploits complex webs of companies and platforms. Additionally, Intellexa employs other tactics, like exploiting vulnerabilities in Samsung Exynos phones and even radio signals, to secretly compromise devices. Meanwhile, cybersecurity experts have identified critical flaws in AI-powered browsers such as Perplexity’s Comet, which can be manipulated to delete important files or execute harmful commands through seemingly innocent prompts or embedded URL fragments. While some companies have released patches, others have downplayed these risks, exposing ongoing challenges in securing AI tools. CTIX analysts will continue to report on the latest malware strains and attack methodologies.

 

Threat Actor Activity

 

UK Intelligence Warn of the Persistent Risks Prompt Injection Pose to AI Security

British intelligence experts have warned that large language models (LLMs) may never be fully protected from "prompt injection," a cyber threat where nefarious actors manipulate AI systems into ignoring original instructions. The U.K.'s National Cyber Security Centre (NCSC) explained that prompt injections exploit the way LLMs process text as sequences of tokens, making them vulnerable to interpreting user content as commands. Real-world examples include attackers uncovering hidden instructions in Microsoft's New Bing search engine and stealing secrets through GitHub's Copilot. NCSC’s technical director for platforms research cautioned that embedding generative AI into global digital systems could lead to widespread security breaches. He emphasized the difference between prompt injection and SQL injection, noting that many security professionals mistakenly equate the two (2). While SQL injection involves sending malicious instructions to a database, prompt injection involves embedding hidden commands in text, such as modifying AI evaluations of job resumes to include prompts that could trick the AI into approving a resume for a follow-up interview. Efforts to mitigate prompt injection involve detecting prompts or training models to differentiate instructions from data, but these approaches struggle with the inherent nature of LLMs. Prompt injection should be viewed as a "Confused Deputy" vulnerability, requiring risk management through careful design and operation. Unlike SQL injection, prompt injection cannot be fully mitigated with parameterized queries, highlighting the need for proactive security measures. As AI becomes more integrated into applications, failing to account for prompt injection risks could lead to similar widespread breaches as seen with SQL injection in the past.

Vulnerabilities

 

Rapid, Global Exploitation of React2Shell Drives Critical Patch Mandates as State-Linked Intrusions Surge

Across multiple threat-intel sources, exploitation of the critical React2Shell vulnerability (an unauthenticated remote code (RCE) execution flaw in React Server Components caused by insecure deserialization in its Flight protocol) has escalated rapidly, prompting The U.S. Cybersecurity and Infrastructure Security Agency (CISA) to add it to the Known Exploited Vulnerabilities (KEV) catalog and mandate federal patching by December 26, 2025. The flaw, tracked as CVE-2025-55182, affects all frameworks implementing React Server Components, including Next.js, enabling attackers to run arbitrary commands through a single crafted HTTP request; public proof-of-concept exploits released by Maple3142 and others accelerated mass scanning and widespread attacks. Initially, Shadowserver identified 77,664 vulnerable IPs (later dropping to ~29,000), while Censys reported 2.15 million potentially exposed services across ecosystems like React Router, Waku, Parcel, Vite, and RedwoodSDK. Active compromises (over 30 confirmed organizations) show attackers using PowerShell “cheap math” tests, in-memory downloaders, and deployment of Cobalt Strike, SNOWLIGHT, and Vshell. These tactics indicate possible attribution pointing to groups such as Earth Lamia, Jackpot Panda, and UNC5174/CL-STA-1015, attributed to China by threat intelligence entities like Palo Alto's Unit 42, Amazon Web Services (AWS), Trend Micro/Trend Research, as well as independent researchers. Threat actors have also attempted credential theft, AWS file exfiltration, and crypto-miner installation. Emergency mitigations (including Cloudflare’s WAF rules) briefly led to outages, reinforcing the urgency for organizations worldwide to update to patched React library versions, rebuild and redeploy applications, and review logs for exploitation indicators. CTIX analysts urge any administrators to follow the React patch guidance immediately to prevent or remediate exploitation.

 

📧 Never Miss a Briefing

Stay informed and secure. Subscribe to Ankura's Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure. 

Join the Cyber Flash Update community today.

© Copyright 2025. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.

Tags

managed data protection, report, cybersecurity & data privacy, data & technology, cyber response, data privacy & cyber risk

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in

I need help with