XStore Documentation

June 10, 2025 – Cyber Briefing

👉 What’s the latest in the cyber world today?

Google bug exposes phone numbers, Roundcube flaw threatens 84K servers, Skitnet boosts ransomware stealth. TxDOT breach leaks crash data, UNFI food deliveries halted, HFS phishing exposes Medicaid info. FBI names new cyber chief, Texas launches Cyber Command, and WordPress split spurs FAIR plugin manager.


🚨 Cyber Alerts

1. Google Bug Exposed Any User’s Phone Number

A security researcher discovered a critical vulnerability in a legacy Google account recovery form that allowed attackers to systematically brute-force and obtain the phone numbers of any Google user. By abusing the JavaScript-disabled form and bypassing security with IPv6 address rotation and valid BotGuard tokens, the researcher could make 40,000 attempts per second using just a target’s name and a partial number hint. After the researcher, BruteCat, reported the issue in April 2025, Google initially deemed it low-risk but later upgraded the severity and awarded a $5,000 bounty for the disclosure. Google confirmed on June 6, 2025, that it fully deprecated the vulnerable endpoint, closing the attack vector which could have led to widespread phishing and SIM-swapping attacks.

2. Roundcube RCE Flaw Risks 84,000 Servers

A critical remote code execution vulnerability, CVE-2025–49113, has been discovered in Roundcube Webmail, leaving over 84,000 unpatched installations worldwide exposed to attacks. The flaw, affecting a decade of Roundcube versions, allows an authenticated attacker to exploit a session handling weakness to achieve PHP object injection and ultimately take control of the server. Although Roundcube released patches on June 1st, hackers quickly reverse-engineered them and weaponized an exploit within 48 hours, which is now reportedly being sold on underground forums. Given the webmail client’s widespread use and the rapid weaponization of the flaw, administrators are urged to update immediately to prevent potential data compromise and system takeovers.

3. New Skitnet Malware Arms Ransomware Gangs

A sophisticated new malware tool called Skitnet, also known as “Bossnet,” is being adopted by ransomware operators like Black Basta and Cactus to enhance their post-exploitation capabilities and evade security. This multi-language malware uses a Rust-based loader to execute a Nim-based payload in memory, which then establishes a stealthy DNS-based reverse shell for command and control. Skitnet achieves resilient persistence through a sophisticated DLL hijacking technique, using a legitimate digitally signed ASUS executable to load its malicious library at every system startup. The malware’s availability on underground forums as a Malware-as-a-Service (MaaS) highlights the industrialization of cybercrime, providing advanced tools for data theft and double extortion schemes.

💥 Cyber Incidents

📢 Cyber News

💡 Cyber Tip

📚 Cyber Book

Get Help

Online Scam Prevention & Recovery

Schedule a free consultation

A free 15-min cybersecurity consultation