Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»New Cisco firewall malware can only be killed by pulling the plug
    Cybersecurity

    New Cisco firewall malware can only be killed by pulling the plug

    adminBy adminApril 25, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    New Cisco firewall malware can only be killed by pulling the plug
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Suspected state-sponsored attackers are using a custom backdoor to persistently compromise Cisco security devices (firewalls), the US CISA and the UK National Cyber Security Centre warned on Thursday.

    “The [Firestarter] malware (…) is relevant for both Cisco Firepower and Secure Firewall devices; however, CISA has only observed a successful implant of the malware in the wild on a Cisco Firepower device running ASA software,” the Cybersecurity and Infrastructure Security Agency noted.

    CISA also shared threat hunting rules US federal civilian agencies should use to search for evidence of the malware on their own systems.

    The malware’s persistence mechanism

    The two agencies posit that the attackers – tracked as UAT-4356 by Cisco Talos – are gaining initial access to internet-facing, vulnerable devices by exploiting CVE-2025-20333 and/or CVE-2025-20362.

    Cisco patched those in late September 2025, when these attacks were initially discovered.

    The threat actors then deployed the Line Viper post-exploitation implant to establish VPN sessions that bypassed all VPN authentication policies, and finally implanted the Firestarter backdoor to achieve persistence.

    Cisco Talos researchers say that Firestarter embeds itself into the device’s boot sequence by manipulating a startup configuration list, ensuring it automatically reactivates every time the device restarts normally.

    It then lays dormant until triggered by a “magic packet” sent by attackers via a specially crafted WebVPN authentication request. When the secret sequence of prefix bytes are recognized, the implant executes whatever shellcode follows them directly in memory.

    The result is an on-demand execution channel that is exceptionally difficult to detect without deep memory forensics or packet-level inspection.

    Firestarter is eminently resilient because each time the device is “gracefully” shut down or rebooted, the malware uses that window to back itself up and rewrite the startup instructions before the device goes offline.

    The one way to fully remove the implant is a hard power cycle, meaning the device must be physically unplugged from power rather than restarted through software. Cutting power abruptly prevents the malware from executing its survival routine, the researchers explained.

    Finding Firestarter

    “CISA and the NCSC assess that Firestarter can persist as an active threat on Cisco devices running ASA or Firepower Threat Defense (FTD) software, maintaining post-patching persistence and enabling threat actors to re-access compromised devices without re-exploiting vulnerabilities,” CISA noted, and ordered US federal civilian agencies to:

    • Identify all public-facing Cisco ASA platforms they manage
    • Collect those devices’ artifacts and core dumps
    • Submit the core dumps to CISA’s Malware Next Generation (MNG) platform
    • Apply the patches for CVE-2025-20333 and CVE-2025-20362
    • Conduct further threat hunting, if neccessary

    “U.S. FCEB agencies should not take further action without first consulting CISA. To preserve evidence, avoid any hard power cycles and other changes (e.g., reboots, patching, configuration changes) before collection and coordination, as these can affect volatile artifacts,” CISA advised.

    According to Cisco, the only known indication of compromise for Firestarter’s presence is the presence of a malicious process called lina_cs. The presence of additional files on disk – /usr/bin/lina_cs and /opt/cisco/platform/logs/var/log/svc_samcore.log – might also point to Firestarter’s presence, though attackers can easily modify these files’ names.

    “A cold restart will remove the malicious persistent implant,” the company says, but nevertheless “strongly recommends” reimaging and upgrading the device to a fixed software release.

    Cisco Talos attributed the Firestarter malware to UAT-4356, a group that’s previously been linked to the 2024 ArcaneDoor campaign, which involved the compromise of Cisco ASA devices via two zero-days.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    Cisco firewall Killed Malware Plug pulling
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleThese are the 10 best Shizuku apps for leveling up Android
    Next Article How disruptors are winning AI search visibility
    admin
    • Website

    Related Posts

    CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

    April 25, 2026

    New BlackFile extortion group linked to surge of vishing attacks

    April 25, 2026

    China-Linked APT GopherWhisper Abuses Legitimate Services in Government Attacks

    April 25, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    I turned a Raspberry Pi and mini PC into a portable homelab that fits in my backpack

    April 25, 2026

    CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

    April 25, 2026

    How disruptors are winning AI search visibility

    April 25, 2026

    New Cisco firewall malware can only be killed by pulling the plug

    April 25, 2026
    Categories
    • Blogging (68)
    • Cybersecurity (1,509)
    • Privacy & Online Earning (183)
    • SEO & Digital Marketing (926)
    • Tech Tools & Mobile / Apps (1,793)
    • WiFi / Internet & Networking (246)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    I turned a Raspberry Pi and mini PC into a portable homelab that fits in my backpack

    April 25, 2026

    CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline

    April 25, 2026

    How disruptors are winning AI search visibility

    April 25, 2026
    Most Popular
    • I turned a Raspberry Pi and mini PC into a portable homelab that fits in my backpack
    • CISA Adds 4 Exploited Flaws to KEV, Sets May 2026 Federal Deadline
    • How disruptors are winning AI search visibility
    • New Cisco firewall malware can only be killed by pulling the plug
    • These are the 10 best Shizuku apps for leveling up Android
    • New BlackFile extortion group linked to surge of vishing attacks
    • The Facts About Google Click Signals, Rankings, And SEO
    • The Xteink S4 Might Be the Pocket E-Reader of My Dreams
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.