Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
US Federal Agency Hit by Firestarter Backdoor in Cisco Firewalls

US Federal Agency Hit by Firestarter Backdoor in Cisco Firewalls

Posted on April 24, 2026 By CWS

In a significant cybersecurity breach, a US federal agency has been compromised by a sophisticated backdoor known as ‘Firestarter’, linked to a China-associated espionage operation targeting Cisco firewall systems. This incident underscores the persistent threat of state-sponsored cyber attacks on critical infrastructure.

Zero-Day Vulnerabilities Exploited

In May 2024, Cisco addressed two zero-day vulnerabilities in its Adaptive Security Appliance (ASA) firewall, which were exploited in the ArcaneDoor campaign. By the following year, two additional zero-days, CVE-2025-20333 and CVE-2025-20362, affecting the ASA’s VPN web server and Secure Firewall Threat Defense (FTD) software, were patched.

Despite these patches, the US Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 25-03 in September 2025, urging immediate updates to affected devices. Further guidance was provided in November, emphasizing additional security measures.

Updated Directive and Mitigation Efforts

In a recent update to ED 25-03, CISA highlighted that merely patching the devices does not eliminate the malware. Agencies are instructed to upload core dumps to the Malware Next Gen portal to confirm infections and immediately report any findings to CISA. This directive applies to various Firepower and Secure Firewall models, with a hard reset deadline set for April 30, 2026.

Documentation accompanying the directive provides insights into the Firestarter backdoor, revealing its persistence even after remediation. The backdoor exploits vulnerabilities in Firepower devices to gain remote access and control, undetected by standard firmware updates.

Technical Analysis and Future Outlook

The Firestarter backdoor employs advanced techniques, including installing hooks within the Lina engine of compromised devices to execute arbitrary shell code. This method allows attackers to maintain access and control through reboot cycles by altering the Cisco Service Platform (CSP) mount list.

Attributed to the state-sponsored group UAT-4356, these attacks are part of an ongoing espionage campaign. Cisco has issued advisories on the continuous exploitation of the identified vulnerabilities, stressing the importance of vigilance and proactive security measures.

As cyber threats evolve, organizations must prioritize patching and perform thorough security checks to safeguard against such sophisticated intrusions. The situation highlights the critical need for robust cybersecurity frameworks and international cooperation to combat state-sponsored cyber threats.

Security Week News Tags:ArcaneDoor, Backdoor, CISA, Cisco, CVE-2025-20333, CVE-2025-20362, cyber espionage, Cybersecurity, Firepower devices, Firestarter, Malware, state-sponsored attack, UAT-4356, US Federal Agency, Vulnerabilities

Post navigation

Previous Post: Safeguarding AI Agents Through Effective Delegation
Next Post: Critical Vulnerability in Xiongmai IP Cameras Exposed

Related Posts

Reclaiming Control: How Enterprises Can Fix Broken Security Operations Reclaiming Control: How Enterprises Can Fix Broken Security Operations Security Week News
In Other News: ATM Jackpotting, WhatsApp-NSO Lawsuit Continues, CISA Hiring In Other News: ATM Jackpotting, WhatsApp-NSO Lawsuit Continues, CISA Hiring Security Week News
Doppel Raises  Million at 0 Million Valuation Doppel Raises $70 Million at $600 Million Valuation Security Week News
Orca Snaps Up Opus in Cloud Security Automation Push Orca Snaps Up Opus in Cloud Security Automation Push Security Week News
UK Faces Rising Cyber Threats from Russia, Iran, China UK Faces Rising Cyber Threats from Russia, Iran, China Security Week News
Ox Security Bags M Series B to Tackle Appsec Alert Fatigue  Ox Security Bags $60M Series B to Tackle Appsec Alert Fatigue  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • US-Linked Malware ‘Fast16’ Uncovered in Early Cyber Tensions
  • Fraudulent CAPTCHA Pages Lead to SMS Scams
  • Locked Shields 2026: Global Cyber Defense Unites 41 Nations
  • Critical Python Flaw Enables Memory Overflow on Windows
  • Rethinking Cybersecurity for Autonomous AI Agents

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • US-Linked Malware ‘Fast16’ Uncovered in Early Cyber Tensions
  • Fraudulent CAPTCHA Pages Lead to SMS Scams
  • Locked Shields 2026: Global Cyber Defense Unites 41 Nations
  • Critical Python Flaw Enables Memory Overflow on Windows
  • Rethinking Cybersecurity for Autonomous AI Agents

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark