Article Details
Scrape Timestamp (UTC): 2025-12-08 00:18:24.373
Source: https://www.theregister.com/2025/12/08/infosec_news_in_brief/
Original Article Text
Click to Toggle View
Apache warns of 10.0-rated flaw in Tika metadata ingestion tool. PLUS: New kind of DDOS from the Americas; Predator still hunting spyware targets; NIST issues IoT advice; And more!. Infosec in Brief The Apache Foundation last week warned of a 10.0-rated flaw in its Tika toolkit. Tika detects and extracts metadata from over 1,000 different file formats. Last August, Apache reported CVE-2025-54988, an 8.4 rated flaw that it warned allows an attacker to carry out XML External Entity injection via a crafted XFA file inside a PDF. Apache fixed that flaw but last Friday announced a related, and worse, problem known as CVE-2025-66516. As Apache explained, the entry point for CVE-2025-54988 was Tika’s tika-parser-pdf-module, but the vulnerability and its fix were in another piece of code called tika-core. “Users who upgraded the tika-parser-pdf-module but did not upgrade tika-core to >= 3.2.2 would still be vulnerable,” the organization advised. The org’s new advisory also admits that its original report “failed to mention that in the 1.x Tika releases, the PDFParser was in the org.apache.tika:tika-parsers module.” Tika’s developers have tidied things up in recent releases, and now users get to revisit this mess too. – Simon Sharwood New kind of ‘DDOS’ erupts from the Americas France-based cloud OVH is adding 2-3Tbps of DDOS protection capacity weekly, to head off a rising tide of attacks from across the Atlantic. “Since Sep'25, we have seen new kind of DDoS coming from US and South America (Brazil, Chile, Argentina, Mexico, Columbia),” OVH CEO Octave Klaba reported last week. “The size is around 15-16Tbps coming thought Miami, FL Dallas, TX and Los Angeles, CA.” OVH is adding the extra DDOS protection capacity to deal with the threat. Klaba said OVH aims to deploy 100Tbps of DDOS-deflectors, ASAP, to defend its operations. – Simon Sharwood Cyber Deterrence and Response Act resurfaces Not content to wait for the White House to develop a plan to deter America's enemies from attacking US critical infrastructure, one Republican representative has introduced his own bill to establish a way to fight off foreign hackers. Rep. August Pfluger (R-TX) last week introduced The Cyber Deterrence and Response Act, which proposes to grant the National Cyber Director formal authority to identify and sanction threat actors. The bill would do this by establishing "the first government-wide process for cyber attribution," according to Pfluger's office. The process would include defining evidentiary standards and verification methods. A press release describing the bill explains that the method would align various agencies under a single set of rules to help ensure accurate attribution. The bill also includes provisions to allow contributions from private companies. It also mandates threat sharing with international allies. "We must ensure the Trump administration and all future administrations have a strong framework to hold bad actors accountable and safeguard our national security," Pfluger said. "Protecting America's critical infrastructure from malicious cyberattacks is essential, and this bill does exactly that." This isn't the first time US lawmakers have proposed an identically-named bill with similar objectives – attempts to pass similar bills took place in 2018, 2019, and 2022. All stalled in committee. It's also worth pointing out that National Cyber Director Sean Cairncross is working on his own measures to help the federal government identify and deter foreign hackers, as we reported last month, and Cairncross' objectives seem to go even further, suggesting the US might start hacking back. NIST wants YOU to secure your IoT devices Manage a lot of IoT tech? Then listen up: the National Institute of Standards and Technology's Cybersecurity Center of Excellence has just published three new IoT onboarding publications to help secure that sensitive kit. Internet of Things devices are a security nightmare, often built without regard for their potential to be an ingress point for attacks, and NIST thinks its trio of new publications can help prevent such problems. The first document covers secure provisioning of IoT devices on their own network layer with unique local credentials, the second looks at why device network layer onboarding is important and why you should do it, and the third goes through device network layer onboarding processes themselves and addresses IoT device lifecycle management. Predator spyware maker still going strong Intellexa, makers of the Predator commercial spyware used to target people around the globe, have been sanctioned by the United States and forced out of Europe, but that's not really slowing the firm down, says Google. A report from the Chocolate Factory's Threat Intelligence Group published last week concluded that Intellexa has "adapted, evaded restrictions, and continues selling digital weapons to the highest bidders." Predator functions similarly to Pegasus spyware. Users are often nation-states and install the software on targets’ devices. It's dangerous, too: Of the 70 zero-day vulnerabilities discovered by Google threat hunters since 2021, Intellexa is responsible for 15 unique ones. Intellexa's operations aren't completely airtight. Some of its secrets were leaked to Amnesty International, which recently published a profile of the company based on documents it acquired and verified. Regardless of whether there's a mole among Predator's people, Amnesty, like Google, says the spyware and its maker "poses an ongoing threat to civil society" and sanctions haven't been effective. DoJ takes down another crypto fraud website Bad actors continue to build platforms that mimic legitimate trading sites and suckering folks into handing over their digicash, with the DoJ busting another one last week. The Justice Department's Scam Center Task Force seized Tickmilleas.com, which sports a name similar to the legitimate Tickmill asset trading website. Tickmill is not available in the US, and the scam site apparently used the name as bait to draw victims. Believed to be affiliated with Chinese organized criminal gangs and Burma-based scam centers, Tickmilleas.com functioned similarly to other so-called pig-butchering scams in which fraudsters trick victims into investing in fake cryptocurrency trading platforms. Promises of big returns and fake account balances trick users into depositing cash on the platform, which the scammers walk off with, leaving victims with little to no recourse. In this case, Tickmilleas.com also published fraudulent apps on Google Play and Apple’s App Store, which have been removed, the DOJ says. The seizure comes less than three weeks after the DoJ stood up the Scam Center Task Force, which continues to go after scam centers that are proliferating in Asia and elsewhere in the world.
Daily Brief Summary
Apache Foundation has issued a warning about a critical vulnerability, CVE-2025-66516, in its Tika toolkit, which scores a 10.0 severity rating.
Tika, used for metadata extraction from over 1,000 file formats, has a flaw that could allow attackers to exploit XML External Entity injection.
The vulnerability is linked to the tika-core component, requiring users to upgrade to version 3.2.2 or later to mitigate the risk.
Previous fixes for related vulnerabilities may not protect users who only updated the tika-parser-pdf-module without addressing tika-core.
Apache's advisory clarifies that earlier Tika releases had the PDFParser in a different module, complicating the patching process for users.
Organizations relying on Tika should review their systems to ensure all components are updated to prevent potential exploitation.
OVH, a French cloud service provider, is enhancing its DDOS protection by adding 2-3Tbps of capacity weekly in response to new attack patterns.
Recent DDOS attacks, originating from the US and South America, have reached sizes of 15-16Tbps, targeting infrastructure via major US cities.
The company plans to deploy 100Tbps of DDOS-deflectors to safeguard its operations against these escalating threats.
This proactive expansion aims to maintain service reliability and protect client data from disruptions caused by these large-scale attacks.
The rise in attack volume underscores the need for robust DDOS mitigation strategies in the face of evolving cyber threats.
Representative August Pfluger introduced the Cyber Deterrence and Response Act to empower the National Cyber Director with authority for cyber threat attribution.
The bill seeks to establish a government-wide process for identifying and sanctioning cyber adversaries, aligning agencies under unified evidentiary standards.
Provisions include collaboration with private companies and international allies to enhance threat intelligence sharing and response capabilities.
The legislation aims to strengthen national security by holding foreign hackers accountable and protecting critical infrastructure from cyberattacks.
This initiative reflects ongoing efforts to develop a comprehensive cybersecurity strategy amid rising geopolitical tensions and cyber threats.
The National Institute of Standards and Technology (NIST) has published three new documents to guide the secure onboarding of Internet of Things (IoT) devices.
These guidelines focus on secure provisioning, network layer onboarding, and lifecycle management to prevent IoT devices from becoming attack vectors.
IoT devices often lack built-in security, posing significant risks to networks; NIST's publications aim to address these vulnerabilities.
Organizations managing IoT technology are encouraged to adopt these practices to enhance device security and reduce potential cyber threats.
The initiative highlights the critical need for standardized security measures in the rapidly growing IoT landscape.
The Department of Justice has dismantled Tickmilleas.com, a fraudulent cryptocurrency trading site mimicking the legitimate Tickmill platform.
The scam site targeted users with promises of high returns, tricking them into depositing funds, which were then stolen by the fraudsters.
Believed to be linked to Chinese and Burma-based criminal gangs, the site also distributed fake apps on Google Play and Apple’s App Store.
This action is part of the DOJ's broader crackdown on "pig-butchering" scams, which are proliferating in Asia and other regions.
The swift response by the Scam Center Task Force underscores the ongoing threat of cryptocurrency fraud and the need for vigilant monitoring.