Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
US Federal Agency Hit by Firestarter Backdoor in Cisco Firewalls

US Federal Agency Hit by Firestarter Backdoor in Cisco Firewalls

Posted on April 24, 2026 By CWS

In a significant cybersecurity breach, a US federal agency has been compromised by a sophisticated backdoor known as ‘Firestarter’, linked to a China-associated espionage operation targeting Cisco firewall systems. This incident underscores the persistent threat of state-sponsored cyber attacks on critical infrastructure.

Zero-Day Vulnerabilities Exploited

In May 2024, Cisco addressed two zero-day vulnerabilities in its Adaptive Security Appliance (ASA) firewall, which were exploited in the ArcaneDoor campaign. By the following year, two additional zero-days, CVE-2025-20333 and CVE-2025-20362, affecting the ASA’s VPN web server and Secure Firewall Threat Defense (FTD) software, were patched.

Despite these patches, the US Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive 25-03 in September 2025, urging immediate updates to affected devices. Further guidance was provided in November, emphasizing additional security measures.

Updated Directive and Mitigation Efforts

In a recent update to ED 25-03, CISA highlighted that merely patching the devices does not eliminate the malware. Agencies are instructed to upload core dumps to the Malware Next Gen portal to confirm infections and immediately report any findings to CISA. This directive applies to various Firepower and Secure Firewall models, with a hard reset deadline set for April 30, 2026.

Documentation accompanying the directive provides insights into the Firestarter backdoor, revealing its persistence even after remediation. The backdoor exploits vulnerabilities in Firepower devices to gain remote access and control, undetected by standard firmware updates.

Technical Analysis and Future Outlook

The Firestarter backdoor employs advanced techniques, including installing hooks within the Lina engine of compromised devices to execute arbitrary shell code. This method allows attackers to maintain access and control through reboot cycles by altering the Cisco Service Platform (CSP) mount list.

Attributed to the state-sponsored group UAT-4356, these attacks are part of an ongoing espionage campaign. Cisco has issued advisories on the continuous exploitation of the identified vulnerabilities, stressing the importance of vigilance and proactive security measures.

As cyber threats evolve, organizations must prioritize patching and perform thorough security checks to safeguard against such sophisticated intrusions. The situation highlights the critical need for robust cybersecurity frameworks and international cooperation to combat state-sponsored cyber threats.

Security Week News Tags:ArcaneDoor, Backdoor, CISA, Cisco, CVE-2025-20333, CVE-2025-20362, cyber espionage, Cybersecurity, Firepower devices, Firestarter, Malware, state-sponsored attack, UAT-4356, US Federal Agency, Vulnerabilities

Post navigation

Previous Post: Safeguarding AI Agents Through Effective Delegation
Next Post: Critical Vulnerability in Xiongmai IP Cameras Exposed

Related Posts

Android Fixes Critical StrongBox and DoS Vulnerabilities Android Fixes Critical StrongBox and DoS Vulnerabilities Security Week News
Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise Red Teams Jailbreak GPT-5 With Ease, Warn It’s ‘Nearly Unusable’ for Enterprise Security Week News
ICS Patch Tuesday: Rockwell Automation Leads With 8 Security Advisories ICS Patch Tuesday: Rockwell Automation Leads With 8 Security Advisories Security Week News
Ox Security Launches AI Agent That Auto-Generates Code to Fix Vulnerabilities Ox Security Launches AI Agent That Auto-Generates Code to Fix Vulnerabilities Security Week News
Hackers Extorting Salesforce After Stealing Data From Dozens of Customers Hackers Extorting Salesforce After Stealing Data From Dozens of Customers Security Week News
Critical Vulnerability in n8n Poses Server Risks Critical Vulnerability in n8n Poses Server Risks Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Python Flaw Enables Memory Overflow on Windows
  • Rethinking Cybersecurity for Autonomous AI Agents
  • 26 Malicious Apps on Apple Store Targeting Crypto Wallets
  • Critical Vulnerability in Xiongmai IP Cameras Exposed
  • US Federal Agency Hit by Firestarter Backdoor in Cisco Firewalls

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Python Flaw Enables Memory Overflow on Windows
  • Rethinking Cybersecurity for Autonomous AI Agents
  • 26 Malicious Apps on Apple Store Targeting Crypto Wallets
  • Critical Vulnerability in Xiongmai IP Cameras Exposed
  • US Federal Agency Hit by Firestarter Backdoor in Cisco Firewalls

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark