Day 268 – Ransomware, Malicious Extensions, & CISO Entrepreneurs

Intro Snapshot

Today’s headlines stretch from data theft in corporate fleets, through weaponized web vectors, to malware campaigns and OS-level attacks. The underlying theme? Attackers seek persistence and scale through platforms we think we trust—and defenders are shifting from reactive posture to proactive innovation.

1) Volvo employee SSNs stolen in ransomware attack

Full URL: https://www.darkreading.com/cyberattacks-data-breaches/volvo-employee-ssns-stolen-ransomware-attack

Volvo disclosed that a ransomware group accessed employee sensitive data—including Social Security numbers—during a breach. The move reminds organizations that ransomware is no longer just about disruption—it’s often tied to identity theft and long-term exploitation.

2) Researchers expose SVG + PureRAT exploitation vector

Full URL: https://thehackernews.com/2025/09/researchers-expose-svg-and-purerat.html

A new technique combining crafted SVG files with PureRAT allows attackers to slip past content filters and deploy backdoors via embedded JavaScript payloads. This underscores how seemingly innocuous file types remain attack vectors.

3) When CISOs become founders

Full URL: https://www.cyberdefensemagazine.com/from-defense-to-offense-why-ambitious-cisos-are-becoming-founders/

An emergent trend: CISOs are launching their own security ventures, leveraging domain expertise to push innovation. The piece argues this shift bridges operations, product thinking, and threat response in tighter loops.

4) ColDriver malware campaign joins BO (Bootloader) attackers

Full URL: https://thehackernews.com/2025/09/new-coldriver-malware-campaign-joins-bo.html

A newer ColdDriver variant now adds bootloader-based persistence, giving it deep control over infected systems from early in the boot chain. This class of malware is especially dangerous because remediation often requires firmware-level cleaning.

5) macOS XCSSET variant attacks Safari & iOS devices

Full URL: https://thehackernews.com/2025/09/new-macos-xcsset-variant-targets.html

The latest XCSSET version now targets Safari on macOS and iOS with obfuscated WebKit exploits and runtime payloads. The exploit stalks WebView interactions and injects malicious scripts during page loads—giving attackers a persistent browser-based foothold.

Key Takeaways

Ransomware today = identity rain. Breaches tie to data theft, not just system encryption. File formats are still vectors. SVG and other innocuous file types can embed persistent exploits. CISO to founder is a natural path. Deep operational insight fuels product innovation in security. Firmware-based malware is pure escalation. Bootloader implants demand high skill to detect—and mitigation often means hardware replacement. OS browser layers remain weak links. XCSSET’s evolution shows that even “safe browsing contexts” can be compromised.