Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

The Vulnerabilities Lurking in the Shadows: A Deep Dive into Stalkerware, Ransomware, and Supply Chain Security




Recent cases highlight the ongoing threat of stalkerware, ransomware, and supply chain vulnerabilities. Security researcher Eric Daigle discovered a SQL vulnerability in Catwatchful's spyware kit, allowing him to steal 62,000 user accounts. Meanwhile, the Swiss government was hit by ransomware attacks on its own IT supplier, with the Play ransomware gang making off with some 65,000 government files. Additionally, researchers from OX security found that verification in top IDEs can be spoofed, highlighting the importance of prioritizing extension signing and supply chain security.

  • Recent cybersecurity cases highlight the importance of vigilance in addressing vulnerabilities, such as stalkerware and ransomware attacks.
  • The Catwatchful case shows the ease with which SQL vulnerabilities can be exploited, emphasizing the need for robust security measures and regular audits.
  • Ransomware attacks on critical infrastructure, like government agencies, pose a significant threat and require prioritized cybersecurity efforts.
  • Supply chain security issues, such as spoofing verification in top IDEs, have serious implications for organizations relying on third-party dependencies.
  • Cyberattacks on critical infrastructure, like healthcare providers, underscore the need for proactive cybersecurity measures to protect sensitive data.



  • In the realm of cybersecurity, vulnerabilities are like Pandora's box - once opened, they can unleash a plethora of malicious activities that can have far-reaching consequences. Two recent cases that highlight the importance of vigilance in this regard are the exposure of stalkerware seller Catwatchful's SQL vulnerability and the rise of ransomware attacks on government agencies.

    The story of Catwatchful began when security researcher Eric Daigle stumbled upon an SQL vulnerability in the spyware kit, which promised to be undetectable and unstoppable. The vulnerability allowed Daigle to copy plaintext login details for all 62,000 Catwatchful accounts in the group's system, including the administrator's. What's more, he was able to identify the alleged administrator of Catwatchful and get its hosters to take it down.

    Daigle's discovery serves as a stark reminder of the importance of robust security measures, particularly when it comes to software that is designed to track people's computer activity. Stalkerware, also known as spyware, is a form of software used to monitor an individual's online activities without their knowledge or consent. It can be installed by parents, spouses, or employers with physical access to the user's computer and tends to be undetectable and very hard to remove.

    The Catwatchful case highlights two critical vulnerabilities - SQL vulnerabilities and the lack of robust security measures in software kits. The fact that Daigle was able to exploit these vulnerabilities so easily is a testament to the importance of regular security audits and penetration testing. Furthermore, it underscores the need for developers to prioritize security when designing their products.

    On the other hand, we have the rise of ransomware attacks on government agencies. A recent case involves the Swiss government's Radix foundation, an NGO dedicated to healthcare promotion, which was hit by ransomware. The Play ransomware gang made off with some 65,000 government files among more than a million stolen from the business last year. This highlights the ongoing threat of ransomware attacks on critical infrastructure and the need for organizations to prioritize their cybersecurity.

    Another pressing issue that needs attention is supply chain security. A recent case highlights how easy it can be to spoof verification in top IDEs, such as VSCode, Visual Studio, and IntelliJ IDEA. Researchers from OX security claim that it's possible to inject malicious code into extensions, package them as VSIX/ZIP files, and install them while maintaining the verified symbols across multiple major development platforms.

    This has serious implications for organizations that rely on third-party dependencies and for developers who may unknowingly download and install malicious software. The findings of OX security serve as a stark reminder of the importance of verifying the authenticity of IDE packages and prioritizing extension signing.

    Lastly, there's also the case of Esse Health, a US-based healthcare provider that was breached in April, resulting in the theft of data belonging to 263,601 people. This highlights the ongoing threat of cyberattacks on critical infrastructure and the need for organizations to prioritize their cybersecurity.

    In conclusion, these recent cases serve as a stark reminder of the importance of prioritizing security when it comes to software development, supply chain management, and cybersecurity. Vulnerabilities like SQL vulnerabilities and lack of robust security measures in software kits can have far-reaching consequences if not addressed promptly. It's essential for organizations and developers to remain vigilant and take proactive steps to protect themselves against these threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/The-Vulnerabilities-Lurking-in-the-Shadows-A-Deep-Dive-into-Stalkerware-Ransomware-and-Supply-Chain-Security-ehn.shtml

  • https://go.theregister.com/feed/www.theregister.com/2025/07/06/infosec_roundup/


  • Published: Sun Jul 6 16:09:54 2025 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us