6 October 2025: Monday Threat Intelligence

6 October 2025: Monday Threat Intelligence
In today’s hyper-connected world, the question is not if your organization will be targeted by cybercriminals, but when. The past week has been a stark reminder of this reality, with a surge in sophisticated cyberattacks impacting businesses of all sizes across the United States. From critical zero-day vulnerabilities to widespread ransomware campaigns, the threat landscape is more dangerous than ever. Staying informed is the first step towards building a resilient defense.
The first step in any robust cybersecurity strategy is to understand your vulnerabilities. We strongly recommend running a Cyber Penetration Test to identify and address security risks before they can be exploited by malicious actors.

🔹 Top 10 Cybersecurity Incidents of the Week – October 6, 2025

1. CISA Issues Emergency Directive for Cisco Zero-Day Flaws

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a critical alert for federal agencies to immediately patch two zero-day vulnerabilities in Cisco Adaptive Security Appliances (ASA). These flaws are being actively exploited by advanced threat actors to gain unauthenticated remote code execution and can persist even after system reboots and upgrades. This emergency directive, only the second of its kind under the current administration, underscores the severity of the threat to government and critical infrastructure networks.

Is my industry affected?

While the directive specifically targets federal agencies, any organization using Cisco ASA devices is at high risk. This includes large enterprises in the finance, healthcare, and technology sectors that rely on these devices for network security. Businesses in these industries should prioritize patching their systems to avoid being compromised by the same vulnerabilities.

2. Asahi Breweries Hit by Crippling Ransomware Attack

Japanese beverage giant Asahi Group Holdings confirmed that a ransomware attack caused significant IT disruptions, forcing the company to shut down factories and switch to manual order processing. The attack on the $20 billion company, which employs 30,000 people and owns popular brands like Peroni and Pilsner Urquell, also resulted in the theft of company data. This incident serves as a stark reminder of the devastating impact that ransomware can have on manufacturing and supply chain operations.

Is my industry affected?

The manufacturing sector is highly vulnerable to these kinds of attacks, which can halt production and cause significant financial losses. Food and beverage companies, in particular, should be on high alert, as disruptions to their operations can have far-reaching consequences for both the business and its customers.

3. Red Hat GitLab Server Hacked, Major Customer Data Stolen

A hacking group calling itself Crimson Collective has claimed responsibility for a major data breach at enterprise software company Red Hat. The attackers stole 570 GB of compressed data from 28,000 private repositories on a GitLab server used by the Red Hat Consulting team. The stolen data allegedly includes sensitive information from approximately 800 Red Hat customers, including major corporations like IBM, Siemens, and Verizon, as well as U.S. government agencies such as the Department of Energy, NIST, and the NSA.

Is my industry affected?

Technology companies and government contractors are most at risk from this type of breach. Any business that uses third-party code repositories or works with large software vendors could have their data exposed in such an incident. This highlights the importance of supply chain security and understanding the security practices of your vendors.

4. New LockBit 5.0 Ransomware Variant Emerges with Cross-Platform Capabilities

A new and more dangerous version of the prolific LockBit ransomware, dubbed LockBit 5.0, has been discovered. This updated variant can target a wider range of systems, including Windows, Linux, and VMware ESXi servers, making it a significant threat to a broad spectrum of organizations. The Health Information Sharing and Analysis Center (Health-ISAC) has issued a specific warning about this new variant, highlighting its potential to cause widespread disruption.

Is my industry affected?

This threat is largely industry-agnostic, as it can impact any organization using the targeted operating systems. However, organizations that heavily rely on virtualized environments, such as those in the healthcare and finance sectors, are particularly vulnerable to the ESXi-targeting capabilities of this new ransomware variant.

5. Ransomware Attack on Automotive Software Provider Exposes 766,000 Customers

A ransomware attack on Motility Software Solutions, a provider of dealer management software (DMS) for the automotive industry, has exposed the sensitive personal data of 766,000 customers. The compromised information includes names, contact details, Social Security numbers, and driver’s license numbers. This incident underscores the significant supply chain risk within the automotive sector, where an attack on a single vendor can have a cascading effect on dealerships and their customers.

Is my industry affected?

The automotive industry, especially dealerships and their software suppliers, are the direct targets here. This incident serves as a critical reminder for businesses in this sector to vet the security of their software vendors and to have a response plan in place for supply chain breaches.

6. Clop Ransomware Gang Launches Extortion Campaign Against Oracle E-Business Suite Users

The Clop ransomware gang is actively targeting companies that use Oracle’s E-Business Suite (EBS) with a widespread extortion campaign. The attackers are sending emails to corporate executives, claiming to have stolen sensitive data from their EBS systems and demanding payment. This campaign highlights the ongoing threat from established ransomware groups and their focus on high-value enterprise targets.

Is my industry affected?

Large enterprises across all sectors that use Oracle E-Business Suite for their financial, supply chain, and manufacturing operations are at risk. This includes companies in the finance, manufacturing, and retail industries. Organizations using EBS should be on high alert for phishing and extortion attempts.

7. VMware Zero-Day Vulnerability Exploited by China-Linked Hackers

Broadcom has patched a high-severity vulnerability in VMware products that has been actively exploited as a zero-day by a China-linked hacking group since October 2024. The vulnerability, CVE-2025-41244, allows attackers to execute code with elevated privileges, giving them significant control over compromised systems. The long-term exploitation of this flaw before it was patched highlights the sophisticated capabilities of state-sponsored threat actors.

Is my industry affected?

Any organization that uses VMware for virtualization is at risk. This is a very broad category, but it especially includes technology companies, cloud service providers, and large enterprises with complex IT infrastructure. These organizations should ensure they have applied the necessary patches to their VMware products.

8. Medusa Ransomware Group Claims Data Breach at Comcast

The Medusa ransomware group has claimed responsibility for a data breach at Comcast Corporation, one of the world’s largest media and technology companies. The group alleges that it has stolen 834.4 GB of data from the company. While the full extent of the breach is still being investigated, the claim itself is a significant development and a potential threat to Comcast and its customers.

Is my industry affected?

The telecommunications and media industries are the primary targets of this attack. Customers of these services should also be aware that their personal data may be at risk and should be vigilant for any signs of misuse of their information.

9. FBI Warns of “Phantom Hacker” Scam Targeting Smartphone Users

The FBI has issued a public warning about a new social engineering scam dubbed the “phantom hacker.” In this scheme, scammers call or message individuals, pretending to be from their bank’s fraud department. They convince the victim that their account has been hacked and trick them into moving their money to a “safe” account that is actually controlled by the scammers. This scam highlights the importance of being skeptical of unsolicited calls and messages, even if they appear to be from a trusted source.

Is my industry affected?

This scam targets the general public, so it is not specific to any one industry. However, financial institutions have a vested interest in educating their customers about this and similar scams to protect them from financial loss and to maintain trust in their services.

10. Shinyhunters Group Targets S&P Global and CIC Vietnam

The Shinyhunters hacking group has added S&P Global, a major financial information and analytics company, and CIC Vietnam to its list of victims. The group is known for its data breaches and the sale of stolen data on the dark web. These latest attacks demonstrate the continued threat to financial institutions and international corporations from data-hungry cybercriminals.

Is my industry affected?

Financial services firms and multinational corporations are the primary targets of groups like Shinyhunters. These organizations hold vast amounts of valuable data, making them attractive targets for cybercriminals. This incident serves as a reminder of the persistent threat of data breaches in these sectors.

Protect Your Organization with the Cyber Grants Alliance

The cybersecurity landscape is constantly evolving, and staying protected requires a proactive and informed approach. The Cyber Grants Alliance is here to help. We have Cyber Grants available on our website to help organizations of all sizes access the cybersecurity resources they need to stay safe. We encourage you to visit our website and apply for a grant today.The Cyber Grants Alliance is committed to helping organizations improve their cybersecurity posture. We provide grants to help cover the costs of:

  • Penetration testing
  • Security audits
  • Employee training
👉 Visit our website and apply for a grant today to strengthen your defenses.

Our Mission

Cyber Grants Alliance envisions and creates a world where every organization has access to professional cybersecurity protection through innovative partnerships between industry leaders and those who need it most.

We bridge the critical cybersecurity gap facing American organizations by connecting cybersecurity expertise with vulnerable organizations through our comprehensive grant programs.

Don’t wait until it’s too late. Take the first step towards a more secure future by running a Cyber Penetration Test and exploring the grant opportunities available through the Cyber Grants Alliance.

Contact Information