Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
FIRESTARTER Backdoor Threatens Cisco Devices Despite Patches

FIRESTARTER Backdoor Threatens Cisco Devices Despite Patches

Posted on April 24, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has identified a severe security breach involving a federal agency’s Cisco Firepower device running Adaptive Security Appliance (ASA) software. The breach, which occurred in September 2025, involved a malware known as FIRESTARTER, a backdoor facilitating unauthorized remote access and control.

CISA, in collaboration with the UK’s National Cyber Security Centre (NCSC), has assessed that FIRESTARTER is being used in a widespread campaign by an advanced persistent threat (APT) group. This campaign exploits patched vulnerabilities in Cisco’s ASA firmware, specifically targeting CVE-2025-20333 and CVE-2025-20362, to gain unauthorized access.

Persistent Threat of FIRESTARTER

FIRESTARTER poses a significant risk by maintaining its presence on compromised Cisco devices even after security patches are applied. The malware uses a post-exploitation toolkit called LINE VIPER, which enables threat actors to execute system commands, capture network packets, and bypass authentication protocols.

This toolkit allows attackers to suppress security logs and execute arbitrary commands, ensuring continued access. By embedding itself into the device’s boot sequence, FIRESTARTER can survive firmware updates and device reboots, except in cases of a hard power cycle.

Technical Analysis and Impact

FIRESTARTER’s resilience is enhanced by its ability to manipulate the startup sequence of the device, reactivating with every system reboot. It shares similarities with a previously identified bootkit known as RayInitiator. CISA warns that even though Cisco has patched the vulnerabilities, the backdoor remains unless the device undergoes a complete reimaging.

Cisco is monitoring the exploitation activities linked to these vulnerabilities under the designation UAT4356, also known as Storm-1849. The company stresses the need for complete reimaging and upgrading of compromised devices to eliminate the backdoor’s persistence mechanism.

Response and Mitigation Strategies

To mitigate the threat, Cisco recommends a cold restart of the affected devices, as simple reboot commands are ineffective. Pulling and reinserting the power cord is necessary to remove the implant. Meanwhile, the broader cybersecurity community is advised to remain vigilant, as the origins of these attacks, reportedly linked to China, continue to pose significant challenges.

State-sponsored groups like Volt Typhoon have been leveraging covert networks of compromised routers and IoT devices to conduct espionage and complicate attribution efforts. These botnets enable low-cost, low-risk cyber operations, further emphasizing the need for robust network security measures.

The continued evolution of these tactics highlights the importance of comprehensive cybersecurity strategies to defend against sophisticated threats targeting critical infrastructure worldwide.

The Hacker News Tags:APT, APT actors, Cisco, Cisco Firepower, CVE-2025-20333, CVE-2025-20362, cyber threat, Cybersecurity, Firestarter, LINE VIPER, Malware, network security, network vulnerability, security patches, Threat Actors

Post navigation

Previous Post: Claude Desktop Raises Privacy Concerns with Browser Integration
Next Post: Udemy Targeted in Alleged Data Breach by Hacker Group

Related Posts

How VexTrio and Affiliates Run a Global Scam Network How VexTrio and Affiliates Run a Global Scam Network The Hacker News
Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware Hackers Hijack Blender 3D Assets to Deploy StealC V2 Data-Stealing Malware The Hacker News
OpenAI Resolves ChatGPT Data Breach and Codex Vulnerability OpenAI Resolves ChatGPT Data Breach and Codex Vulnerability The Hacker News
GlassWorm Malware Exploits Solana for Data Theft GlassWorm Malware Exploits Solana for Data Theft The Hacker News
Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike The Hacker News
Malicious Go Module Targets Passwords and Installs Backdoor Malicious Go Module Targets Passwords and Installs Backdoor The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks
  • Ollama Vulnerability Exposes Servers to Data Leaks
  • Udemy Targeted in Alleged Data Breach by Hacker Group
  • FIRESTARTER Backdoor Threatens Cisco Devices Despite Patches
  • Claude Desktop Raises Privacy Concerns with Browser Integration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Chinese Hackers Exploit Routers for Hidden Cyber Attacks
  • Ollama Vulnerability Exposes Servers to Data Leaks
  • Udemy Targeted in Alleged Data Breach by Hacker Group
  • FIRESTARTER Backdoor Threatens Cisco Devices Despite Patches
  • Claude Desktop Raises Privacy Concerns with Browser Integration

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark