- The Cybersecurity Club Newsletter
- Posts
- đšWeek 35: WhatsApp Zero Click Use By Spies, Trump Digital Taxes, UK Afghan Security Leak, Google Previews cyber "Disruption Unit", Anonymous energy sector hacker...
đšWeek 35: WhatsApp Zero Click Use By Spies, Trump Digital Taxes, UK Afghan Security Leak, Google Previews cyber "Disruption Unit", Anonymous energy sector hacker...
Insights into Cyber Risks, Threat Intel, Government and Regulations, Startup and VC updates

WhatsApp Security Brief
WhatsApp recently patched a critical zero-click vulnerability (CVE-2025-55177); used in conjunction with an Apple vulnerability, to deliver Graphite spyware to Apple device users without any interaction required. The exploit was disclosed and mitigated thanks to forensic insights from Citizen Lab, whose intelligence was pivotal in triggering WhatsAppâs rapid response. Link
Findings
Discovery and attribution: Citizen Labâs forensic research identified that Paragon Solutions' Graphite spyware was exploiting WhatsAppâs zero-click flaw. Their findings, shared with WhatsApp, enabled swift action.
Victim profile: About 90 individuals, journalists and civil society members across over 20 countries, including in Europe, were targeted. In related Apple messaging attacks, specific journalists (e.g., Italian investigative journalist Ciro Pellegrino and another prominent European journalist) were implanted with Graphite spyware through zero-click iMessage exploits.
Impact
High-value targets: The campaigns demonstrate that commercial spyware is increasingly misused against press and civil societyâeven when marketed to democratic governments.
No user interaction needed: Zero-click vulnerabilities drastically lower attack barriers and heighten risk.
Proactive defense model: Citizen Labâs proactive disclosure underscores the critical role of independent research in identifying sophisticated threats.
Urgent update imperative: WhatsApp and Apple synced timelines for patches; affected users (< 200) were notifiedâhighlighting vigilance in applying updates.
đ» Malware and Vulnerabilities
WhatsApp fixes âzero-clickâ bug that targeted Apple users with spyware: WhatsApp patched a critical vulnerability; CVE-2025-55177; that, alongside an Apple flaw (CVE-2025-43300), was exploited to deploy spyware on iOS and Mac devices in highly sophisticated attacks against specific individuals. (TechCrunch)
Passwordstate urges immediate patch for auth-bypass flaw: Developers behind Passwordstate issued an urgent advisory after discovering an authentication bypass vulnerability. Users are strongly encouraged to apply the patch promptly to prevent potential exploitation. (BleepingComputer)
đ Breaches and Incidents
TransUnion discloses breach impacting 4.4 million customers: Credit bureau TransUnion revealed that hackers accessed a third-party app used in its U.S. consumer support operations, compromising personal data for 4.4 million individuals. The firm claimed no credit data was taken but provided limited details on the types of information breached. (TechCrunch)
Ransomware cripples Swedish municipalities for a modest ransom: A ransomware assault on IT provider Miljödata left 200 Swedish local authorities offline. Attackers sought a relatively low ransom of $168,000, yet the disruption stretched public services across numerous municipalities. (The Register)
Salesloft âDriftâ OAuth incident hits Salesforce customers; tokens revoked: After detecting malicious OAuth activity via the Drift app, Salesforce disabled the integration and Salesloft revoked tokens; Google later warned the campaign targeted Drift integrations beyond Salesforce. Link
đš Threat Intel & Info Sharing
The rise of the âagenticâ AI threat hunter in cybersecurity: A new paradigm in threat hunting is emerging; agentic AI systems that donât just assist analysts but actively think, hypothesise, investigate, triage, and self-evolve, marking a shift from traditional reactive tactics to scalable, adaptive security. (Thor Collective)
Google previews cyber âdisruption unitâ amid debate over active defence: Google is laying the groundwork for a cyber âdisruption unitâ as U.S. government and industry stakeholders weigh the pros and cons of offensive cyber operations, though legal and commercial hurdles remain. (CyberScoop)
Ukrainian cyber-partisans hijack Russian TV to reveal wartime realities: On Ukraineâs Independence Day (August 24), hackers linked to âcyber partisansâ reportedly infiltrated Russian television networks to expose battlefield losses, infrastructure crises, and shortagesâbroadcasting âtruthfulâ footage across 116 channels and digital platforms. (Kyiv Independent)
Berlin prosecutor indicts suspected âAnonymousâ hacker over 2022 energy-sector attack: Berlinâs public prosecutor has charged a 30-year-old German believed to be part of the âAnonymousâ collective for allegedly conducting cyber espionage and sabotage against Rosneft Germany, a firm tied to critical energy infrastructure, in March 2022. (Berlin.de)
Andalusia tightens security of âSĂ©necaâ school platform after hacks: Following arrests over unauthorized grade changes, authorities hardened the education portalâs defenses and moved to close exposed weaknesses across affected centers. Link
Taiwan arrests suspect tied to China-linked âCrazyHunterâ ransomware group: Investigators detained a Taiwanese national alleged to assist a China-based crew blamed for cyberattacks and data sales, underscoring cross-border cooperation on ransomware. Link
âïž Laws, Policies and Regulations
UK government dragged for incomplete security reforms after Afghan leak fallout: Senior officials were summoned to the UKâs science and technology committee following criticism over lagging cybersecurity reform in the wake of an Afghan intelligence data leak, with calls growing for more robust protective measures. (The Register)
AG Wilson leads 44 attorneys general demanding end to AI-driven targeting of kids: South Carolinaâs Attorney General Alan Wilson spearheads a coalition of 44 state attorneys general urging major tech firms to halt predatory AI practices aimed at childrenâs behavioral targeting and exploitation. (SCAG)
Kremlin app masquerades as WhatsApp rival to spy on users: A new messaging app, promoted as a Russian alternative to WhatsApp, has drawn scrutiny for built-in spyware capabilities that enable extensive surveillance of its users. (Forbes)
St. Petersburg deploys cameras that recognize nationality: Authorities in St. Petersburg have introduced surveillance cameras capable of identifying individualsâ nationality; among six categories; as part of efforts linked to monitoring migration and public safety. (78.ru)
ENISA to manage âŹ36 million EU Cybersecurity Reserve: ENISA has been tasked with launching and overseeing the EU Cybersecurity Reserve, backed by a âŹ36 million fund, to bolster incident response and cyber resilience across member states. (ENISA)
Trump threatens tariffs over UK/EU digital taxes: The White House warned it could impose tariffs and export curbs on countries with âdiscriminatoryâ digital rules and taxesâexplicitly citing the UKâs DST and EU measuresâescalating transatlantic tech tensions. Link
US sanctions fraud network funding North Koreaâs weapons programs: Treasury blacklisted individuals and entities accused of running an identity-fraud and shell-company scheme that siphoned funds to DPRK WMD development, urging stronger KYC controls across platforms. Link.
đ Trends, Reports, Analysis
Anthropic releases August 2025 report on AI-enabled cyber misuse: Anthropic reveals that AI, particularly agentic systems, is being weaponised; used in extortion, fraudulent schemes, and automated ransomware creationâ necessitating advanced detection and mitigation strategies. (Anthropic)
đ Upcoming Events
Virtual Event: Generative AI & Cybersecurity: Risks and Opportunities
Generative AI is reshaping the cybersecurity landscape, empowering Security Operations Centers (SOCs) with intelligent automation, predictive analytics, and faster incident response. However, with this innovation comes a new class of threats: AI-generated phishing campaigns, polymorphic malware, and code exploits crafted by LLMs.

Register your interest to join here.
If you would like to sponsor any of our future in person or virtual events then please email us on [email protected]
We hope you enjoyed our email briefing! âđ„źIf you want to sponsor our next edition or advertise on our site, drop us an email [email protected].
Thank you for being a part of our newsletter community and you can be part of the community by joining our LinkedIn Group.