Article Details
Scrape Timestamp (UTC): 2026-02-03 17:23:38.080
Source: https://www.theregister.com/2026/02/03/greynoise_cisa_ransomware_gripe/
Original Article Text
Click to Toggle View
CISA updated ransomware intel on 59 bugs last year without telling defenders. GreyNoise's Glenn Thorpe counts the cost of missed opportunities. On 59 occasions throughout 2025, the US Cybersecurity and Infrastructure Security Agency (CISA) silently tweaked vulnerability notices to reflect their use by ransomware crooks. Experts say that's a problem. "Frustrated" by the agency failing to notify defenders when key pieces of intel change, Glenn Thorpe, senior director of security research and detection engineering at GreyNoise, counted the number of missed opportunities to potentially stop ransomware attacks last year. CISA maintains its Known Exploited Vulnerability (KEV) catalog and populates it on a near-daily basis with details about the vulnerabilities attackers are exploiting to successfully gain access to victims' networks. The purpose of the catalog is to identify the most serious vulnerabilities at any given time, and inform defenders, especially those working for federal agencies, about which bugs should be prioritized. One of the features of the catalog is that it indicates whether or not CISA is aware of a given vulnerability being used by those carrying out ransomware attacks. Generally seen as the most damaging, infosec pros tend to prioritize the security flaws that could lead to stolen and encrypted files. Previous research has shown that these vulnerabilities are patched 2.5 times faster than those that aren't associated with ransomware attacks. The thing is, the rapid speed at which CISA adds these new bugs to the catalog often outpaces defenders. As Thorpe discovered, the bugs CISA adds to the catalog are only known to be exploited by ransomware affiliates after being added, and CISA does not alert techies when its "known ransomware use" indicator switches from "unknown" to "known." "When that field flips from 'Unknown' to 'Known,' CISA is saying: 'We have evidence that ransomware operators are now using this vulnerability in their campaigns,'" said Thorpe. "That's a material change in your risk posture. Your prioritization calculus should shift. But there's no alert, no announcement. Just a field change in a JSON file." Thorpe's analysis of the 59 flipped vulnerabilities revealed that the largest share (16) were Microsoft CVEs, while the other common vendors included Ivanti, Fortinet, PANW, and Zimbra. "Ransomware operators are economic actors after all. They invest in exploit development for platforms with high deployment and high-value access. Firewalls, VPN concentrators, and email servers fit that profile perfectly." He also found that more than a third (39 percent) of the bugs confirmed to be used in ransomware campaigns in 2025 were first added to the KEV catalog before 2023. The oldest to flip last year was a bug added 1,353 days prior, while the fastest to flip was in just one day. Bear in mind: some vulnerabilities are known to be used by ransomware crews at the time of being added, so their "known ransomware use" indicator was always set to "Known," i.e. they never flipped. Thorpe went on to say that authentication bypasses and remote code execution flaws were the most likely to flip after being added to the KEV catalog. GreyNoise has now released an RSS feed to which defenders can subscribe to see when KEV catalog entries' ransomware statuses change. The feed updates hourly, and is the product of Thorpe's unrealized hopes of change following a 2024 BSidesLV presentation. The Register asked CISA to comment.
Daily Brief Summary
The US Cybersecurity and Infrastructure Security Agency (CISA) updated 59 vulnerability notices in 2025 to reflect ransomware exploitation, without notifying defenders.
Glenn Thorpe of GreyNoise criticized the lack of alerts, noting missed opportunities to prevent ransomware attacks by not informing defenders of critical changes.
CISA's Known Exploited Vulnerability (KEV) catalog is updated frequently, but the pace can outstrip defenders' ability to respond effectively.
The catalog's "known ransomware use" indicator changes without announcement, impacting risk assessments and prioritization strategies for cybersecurity teams.
Analysis revealed Microsoft CVEs were the most affected, with other vendors like Ivanti, Fortinet, PANW, and Zimbra also impacted.
GreyNoise introduced an RSS feed to notify defenders of changes in ransomware status, addressing the communication gap left by CISA.
The situation underscores the need for timely communication from cybersecurity agencies to better equip organizations in defending against ransomware threats.