FBI Warns of 369,000 Compromised Routers [Prime Cyber Insights]
FBI Warns of 369,000 Compromised Routers [Prime Cyber Insights]
Prime Cyber Insights

FBI Warns of 369,000 Compromised Routers [Prime Cyber Insights]

This briefing analyzes a major FBI alert regarding the AVrecon malware, which has compromised over 369,000 routers globally to establish a massive proxy network. We also examine Fortinet’s recent patches for three critical vulnerabilities in FortiGate fir

Episode E1213
March 17, 2026
03:13
Hosts: Neural Newscast
News
AVrecon
Fortinet
FortiGate
CVE-2025-59718
Android 17
KakaoTalk
Spear-Phishing
FBI
Cybersecurity
Network Security
PrimeCyberInsights

Now Playing: FBI Warns of 369,000 Compromised Routers [Prime Cyber Insights]

Download size: 5.9 MB

Share Episode

SubscribeListen on Transistor

Episode Summary

This briefing analyzes a major FBI alert regarding the AVrecon malware, which has compromised over 369,000 routers globally to establish a massive proxy network. We also examine Fortinet’s recent patches for three critical vulnerabilities in FortiGate firewalls, including two SAML token exploits that allowed unauthenticated administrative access. The discussion extends to North Korean spear-phishing tactics utilizing the KakaoTalk platform and Google’s upcoming security enhancements in Android 17. By restricting the Accessibility API within its Advanced Protection Mode, Google aims to neutralize a common malware vector used for data theft. Aaron Cole and Lauren Mitchell break down the technical details and essential remediation steps for security practitioners.

Subscribe so you don't miss the next episode

Show Notes

Today's episode of Prime Cyber Insights focuses on significant shifts in the threat landscape, starting with an FBI warning about the AVrecon malware's massive router compromise. We detail the technical specifics of three critical Fortinet vulnerabilities—CVE-2025-59718, CVE-2025-59719, and CVE-2026-24858—which have seen active exploitation to bypass firewall authentication. The briefing also covers the emergence of KakaoTalk as a delivery mechanism for North Korean spear-phishing campaigns and the hardening of mobile ecosystems. Specifically, we look at how Android 17's Advanced Protection Mode will automatically revoke Accessibility API privileges for non-essential applications to prevent systemic abuse by mobile malware actors.

Topics Covered

  • 🌐 AVrecon Malware: FBI alert on the global compromise of 369,000 routers for proxy networks.
  • 🛡️ Fortinet Firewall Patches: Analysis of critical SAML-based authentication bypasses and administrative risk.
  • 🚨 State-Sponsored Phishing: North Korean actors shifting tactics toward KakaoTalk messaging.
  • 📱 Android 17 Hardening: Restricting the Accessibility API to verified tools within Advanced Protection Mode.

For informational purposes only. This broadcast does not constitute professional security advice.

Neural Newscast is AI-assisted, human reviewed. View our AI Transparency Policy at NeuralNewscast.com.

  • (00:11) - Introduction
  • (00:23) - AVrecon Router Botnet & Fortinet Patches
  • (00:35) - Conclusion
  • (00:35) - Android 17 Security & North Korean Phishing

Transcript

Full Transcript Available
[00:00] Announcer: From Neural Newscast, this is Prime Cyber Insights, Intelligence for Defenders, [00:04] Announcer: Leaders, and Decision Makers. [00:11] Aaron Cole: Welcome to Prime Cyber Insights. Today is March 16th, 2026, and we are tracking several critical [00:18] Aaron Cole: infrastructure updates and significant hardening measures across the ecosystem. [00:23] Lauren Mitchell: We are starting with a major botnet disclosure from the FBI involving the AV recon malware, [00:30] Lauren Mitchell: which has reached a scale that demands immediate protection. [00:33] Lauren Mitchell: practitioner attention. [00:35] Aaron Cole: Lauren, the scope here is staggering. [00:37] Aaron Cole: The FBI reports that AV Recon has compromised approximately 369,000 routers worldwide. [00:45] Aaron Cole: effectively folding them into a massive global proxy network. [00:49] Aaron Cole: This isn't just residential noise. [00:51] Aaron Cole: It's a highly sophisticated infrastructure used for traffic obfuscation by advanced threat actors. [00:57] Lauren Mitchell: It places immense pressure on edge security, Aaron. [01:01] Lauren Mitchell: Speaking of the edge, Fortinet has just released patches for three critical vulnerabilities [01:06] Lauren Mitchell: in FortiGate Next Generation firewalls. [01:08] Lauren Mitchell: Specifically, CVE 2025-597-18 and CVE 2025-597-19 are the most concerning, both carrying a CVSS score of 9.8. [01:24] Aaron Cole: Those are the SAML token flaws. [01:27] Aaron Cole: Improper verification of cryptographic signatures allowed unauthenticated attackers to gain full administrative access to the appliances. [01:35] Aaron Cole: Sentinel-1 notes that these were exploited in the wild earlier this year to establish long-term persistence. [01:42] Lauren Mitchell: Correct. They also addressed CVE 2026-24858, which was abused as a zero day. [01:50] Lauren Mitchell: Beyond emergency patching, practitioners are advised to rotate LDAP and active directory credentials associated with these appliances, and audit machine account quota settings to prevent lateral movement. [02:04] Aaron Cole: While we're on threat actor movements, reports indicate North Korean groups are now leveraging the cacao talk messaging app for spearfishing campaigns. [02:12] Aaron Cole: This represents a tactical shift toward more personal, mobile-centric social engineering. [02:18] Lauren Mitchell: Which is why the Android 17 update is so timely. [02:22] Lauren Mitchell: Google is testing a feature in its advanced protection mode that blocks non-accessibility [02:27] Lauren Mitchell: apps from using the accessibility API. [02:31] Lauren Mitchell: This effectively closes the primary vector that mobile malware uses to scrape screens and [02:36] Lauren Mitchell: exfiltrate data. [02:38] Aaron Cole: Exactly. [02:39] Aaron Cole: Unless an app is a verified screen reader or switch-based tool, its permissions are revoked when the mode is active. [02:45] Aaron Cole: It is a significant hardening step for high-risk users. [02:49] Aaron Cole: That concludes today's briefing. [02:51] Lauren Mitchell: Stay secure. [02:52] Lauren Mitchell: For more technical analysis, visit pci.neuralnewscast.com. [02:57] Lauren Mitchell: Neural Newscast is AI-assisted, human-reviewed. [03:01] Lauren Mitchell: View our AI transparency policy at neuralnewscast.com. [03:05] Announcer: This has been Prime Cyber Insights on Neural Newscast. [03:09] Announcer: Intelligence for defenders, leaders, and decision makers.

✓ Full transcript loaded from separate file: transcript.txt

Loading featured stories...