Day 178: Quiet Exploits, Trusted Channels, and the War Beneath

There’s something about today’s headlines that feels… subtle. Not explosive, but insidious. Trusted tools being misused, silent infrastructures being hijacked, and internal systems turned against themselves. It’s not just about breaches anymore—it’s about the illusion of safety. When systems function just enough to not raise alarms, the damage compounds quietly.

🛰️ Apple & Google VPN Apps Used for Surveillance in China

This one’s frustrating. Apps labeled as VPNs—security tools, privacy tools—turn out to be surveillance tools. It’s a layered betrayal because people go looking for protection and end up with the opposite. And in a place like China, it’s more than privacy—it’s risk at a human level.

https://www.darkreading.com/cloud-security/apple-google-vpn-apps-china-spy-users

📡 Over 1,000 SOHO Devices Compromised in Coordinated Ops

Routers in small offices and home setups continue to be leveraged as infrastructure. Quiet, low-cost, and widely distributed—it’s a perfect backdoor network. The technical part isn’t even new. What’s notable is how persistent and strategic the targeting is. It’s not brute force—it’s patience.

https://thehackernews.com/2025/06/over-1000-soho-devices-hacked-in-china.html

🗃️ MoveIt Transfer Facing Renewed Ransomware Interest

MoveIt again. Ransomware groups haven’t let it go, and I get why. It’s embedded in too many business processes to be easily removed, and when something becomes that sticky, threat actors just wait until defenses get tired. It’s less about how good your patching is and more about how long you can stay consistent.

https://thehackernews.com/2025/06/moveit-transfer-faces-increased-threats.html

🕸️ Trustwave SpiderLabs on Dark Web Supply Chain Tools

This was a good breakdown. Supply chain compromise is no longer just a byproduct of bigger campaigns—it’s becoming its own service model. Access brokers are selling exploit kits tailored for third-party vendors. The idea that “your weakest link might be someone you’ve never met” keeps getting more real.

https://www.trustwave.com/en-us/resources/blogs/trustwave-blog/trustwave-spiderlabs-investigates-the-dark-webs-role-in-supply-chain-attacks

📤 Phishing Through Microsoft 365’s Direct Send

This one’s clean and effective. Using Microsoft 365’s Direct Send function to send emails that look internal—but bypass security filters—is exactly the kind of small shift that creates a big trust gap. The email doesn’t look dangerous. It looks normal. That’s the danger.

🧠 Rethinking Risk and Shadow Dependencies

This article reminded me how often orgs fail—not because they didn’t have tools, but because they had no visibility into what was connected. Shadow dependencies are real. Someone installs a plugin or connects a service without telling anyone… and now you’ve got a live attack path that’s not in your playbook.

http://www.securitymagazine.com/articles/101725

📝 Personal Note

Trying to keep momentum right now—mentally and physically. Staying consistent with workouts and cutting back distractions. Nothing big, just small tweaks that keep the system honest.

Because like in security, it’s the small overlooked parts that break first. And I don’t want to get caught off guard by things I should have seen coming.