BADCANDY Hack Exploits Cisco IOS XE, Warns ASD

A bulletin about continuing cyberattacks targeting unpatched Cisco IOS XE equipment in the nation using an unauthorized implant known as BADCANDY has been released by the Australian Signals Directorate (ASD).

According to the intelligence agency, the activity entails the exploitation of CVE-2023-20198 (CVSS score: 10.0), a critical vulnerability that enables a remote, unauthenticated attacker to create an account with elevated privileges and use it to take over vulnerable systems.

Since 2023, the security flaw has been actively exploited in the open; in recent months, threat actors connected to China, such as Salt Typhoon, have used it as a weapon to compromise telecom companies.

Variations of BADCANDY have been identified since October 2023, according to ASD, with new attacks being reported in 2024 and 2025. The malware is thought to have infected up to 400 devices in Australia since July 2025, with 150 of those devices being affected in October alone.

It cannot endure system reboots because it lacks a persistence mechanism. However, the threat actor may re-introduce the malware and recover access if the device is left unpatched and connected to the internet.

According to ASD’s assessment, threat actors can recognize when an implant is removed and re-infect the devices. This is because devices for which the agency has previously notified impacted entities have been re-exploited.

Nevertheless, a reboot won’t reverse the attackers’ previous actions. Therefore, in order to stop further exploitation attempts, system operators must apply the patches, restrict the web user interface’s public exposure, and adhere to Cisco’s hardening standards.

Meta Rolls Out Easier Encryption for WA Cloud Backups

With passkey support, WhatsApp is introducing a new method for accessing your encrypted backups. This implies that you can access WhatsApp’s backup in the event that you misplace your handset using techniques like fingerprint, facial recognition, or the screen lock code of your old device.

WhatsApp’s chat backups lacked an encryption layer for many years. But in 2021, Meta introduced a feature that allows customers to secure their backups with end-to-end encryption using 64-character encryption keys or passwords.

The issue with both is that, to restore the backup, you must either remember your backup password or have the encryption key on hand. Users don’t have to search for the key or the password while using passkeys.

They may need to monitor when this function is made available, as WhatsApp, which surpassed 3 billion active users in May, stated that it will be made available to users in the upcoming weeks and months.

To enable encrypted backups and see if users have the option to utilize passkeys, it can be navigated to Settings > Chats > Chat backup > End-to-end encrypted backup.