Global Current News
  • News
  • Finance
  • Technology
  • Automotive
  • Energy
  • Cloud & Infrastructure
  • Data & Analytics
  • Cybersecurity
  • Public Safety
  • News
  • Finance
  • Technology
  • Automotive
  • Energy
  • Cloud & Infrastructure
  • Data & Analytics
  • Cybersecurity
  • Public Safety
No Result
View All Result
Global Current News
No Result
View All Result

UK cyber agency warns of malware wave targeting outdated Cisco gear

by Edwin O.
October 11, 2025
in Cybersecurity
UK cyber agency Cisco malware

How to prepare for Microsoft mandatory MFA enforcement

Accenture strikes ~A$1B takeover of Australiaโ€™s CyberCX in cybersecurity consolidation push

How to send fully encrypted Gmail to outside recipients

The National Cyber Security Centre of the UK has also raised an alarm based on complex malware campaigns on old, out-of-date Cisco network devices. In a major suasion, threat actors are using the weaknesses in the Cisco Adaptive Security Appliance 5500-X Series systems to inject sophisticated malware, run operations, and may even steal vital information. NCSC has released research on new types of malware named RayInitiator and LINE VIPER to assist organizations in identifying and preventing recurring malware.

Developed malware types get ahead of the old detection means

On Thursday, the National Cyber Security Centre (NCSC) at GCHQ also provided supplementary guidance to assist network defenders in countering the hostile targeting of some Cisco products. In an important update to a malicious campaign that was previously revealed last year, Cisco has reported that the same threat actor has used the new vulnerabilities in Cisco Adaptive Security Appliance (ASA) 5500-X Series systems to install malware, run commands, and possibly steal data from compromised systems.

The NCSC is urging network defenders who use impacted products to immediately research this activity and publish new analysis of the malware code dubbed RayInitiator and LINE VIPER to help identify and mitigate it. The RayInitiator and the LINE VIPER malware are a further upgrade of the one that was deployed in the last campaign in terms of sophistication, as well as the capacity to go undetected. Companies are also encouraged to adhere to the recommended remediation guidance provided by Cisco, such as implementing security patches, and in case there is evidence of compromise, report it to the NCSC.

NCSC insists on the urgent replacement schemes

NCSC Chief Technology Officer, Ollie Whitehouse, said: Organisations should note the actions that have been recommended by Cisco today, especially on detection and remediation. We highly recommend network defenders to adhere to vendor best practices and make use of the NCSC malware analysis report to help in their investigations. The warning comes on top of a joint warning with foreign collaborators released last year, which contained an in-depth examination of malware, dubbed LINE DANCER and LINE RUNNER.

Whitehouse pointed out that End-of-life technology poses a great threat to organisations. There should be a timely upgrade to modern versions of the systems and devices in the quest to curb vulnerabilities and workforce resilience. Recently, the NCSC posted a blog discussing the importance of preparing for the migration to Windows 12 to Windows 11 to occur, and that organisations must focus on migrating to Windows 12 before the end of life in October.

Cisco offers full detection guidance to the network administrators

Cisco has also offered additional details and detection tips, which can be found on their site that organizations may use to identify possible compromises. The company has also made a major update, which recognises the fact that the vulnerability of its security appliances is still by the same threat agent. It is recommended that network defenders apply recommended security measures as soon as possible to prevent attacks that continue to occur.

International cooperation enhances the defense against the existing threats

The partnership with other international partners confirms the value of sharing threat intelligence in the NCSC in fighting complex malware campaigns. Advanced persistent threat actors are threatening organizations all over the world as they keep changing their tactics and methods. The continued focus on Cisco devices shows how extremely important it is to ensure their security infrastructure is kept updated and its equipment is replaced at the end of its lifespan.

With the threat actors working towards an ever more advanced form of malware, such as RayInitiator and LINE VIPER, proactive security practices have gained precedence in organizations. The threat analysis the NCSC undertakes is proving critical to detection and mitigation: the need to take immediate action to prevent these emerging cyber threats.

Global Current News

ยฉ 2025 by Global Current News

  • Contact
  • Legal notice

No Result
View All Result
  • News
  • Finance
  • Technology
  • Automotive
  • Energy
  • Cloud & Infrastructure
  • Data & Analytics
  • Cybersecurity
  • Public Safety

ยฉ 2025 by Global Current News