Day 218: Exposed Cameras, Cloud Misuse, Phishing Evolution, and Go Package Hijack

🛑 6,500 Axis Servers Expose Remoting Protocols

Over 6,500 Axis Device Manager and Camera Station servers—nearly 4,000 in the U.S.—are publicly exposing the Axis.Remoting service. Claroty warns these flaws (CVE-2025-30023 to -30026) allow for pre-auth remote code execution, MITM attacks, and authentication bypasses. Feeds can be hijacked or devices disabled silently.

Source: https://thehackernews.com/2025/08/6500-axis-servers-expose-remoting.html

☁️ ECS IAM Hijacking via “ECScape” Privilege Escalation

At Black Hat USA, researchers revealed how AWS’s Elastic Container Service can be leveraged to escalate privileges through an undocumented protocol. ECS tasks share credential data over WebSocket, allowing an attacker to impersonate an agent and harvest credentials from other containers on the same EC2 instance. AWS issued guidance but no formal patch.

Source: https://www.darkreading.com/cloud-security/privilege-escalation-amazon-ecs-iam-hijacking

💡 Risk Isn’t in Inbox Anymore — It’s Everywhere You Work

Attackers have moved beyond email. Platforms like Slack, Teams, and LinkedIn are now major phishing vectors—URL threats in SMS spiked 2,524%, and credential phishing shot up 703%. Collaboration tools aren’t monitored like email, but the risks are just as potent.

Source: https://www.cyberdefensemagazine.com/risk-has-moved-beyond-your-inbox/

📧 Microsoft 365 Direct Send Weaponized to Evade Email Security

Threat actors are abusing Microsoft 365’s Direct Send feature to bypass SPF, DKIM, and DMARC protections. By routing emails through trusted internal infrastructure with image-based, ultra-personalized lures, attackers evade traditional email defenses entirely.

Source: https://cybersecuritynews.com/microsoft-365-direct-send-weaponized/

🆘 11 Go Modules Found on GitHub Deliver Stealthy Malware

Researchers discovered eleven malicious Go packages—many built as typosquats—embedding obfuscated, in-memory loaders that fetch second-stage payloads from live C2 domains. This affects Linux and Windows CI pipelines alike, bypassing disk-based detection.

Source: https://securityonline.info/the-malicious-go-modules-11-malicious-go-packages-found-on-github-deploying-stealthy-malware/

Patterns & Pulse

Legacy devices (like Axis cameras) continue to be high-value targets due to visibility gaps. Cloud misconfigurations are now pathways for cross-privilege theft, not just exposure. Collaborative and API flows are redefining where trust — and therefore risk — resides. Attack surface now includes developer pipelines — build tools, dependency managers, and internal mail systems.