Cisco VPNs and Email Services Targeted in Separate Cyberattack Campaigns

Cisco VPNs and Email Services Targeted in Separate Cyberattack Campaigns
25-12-19, 6:19 p.m.
Critical zero-day vulnerability in Cisco email appliances and high-volume VPN brute-force attacks expose the evolving threats facing organizations today. Sophisticated exploits and opportunistic attacks demonstrate the urgent need for proactive cybersecurity defenses.
This December, Cisco systems faced two very different cyberattack campaigns, exposing the evolving risks that organizations face in today’s digital landscape. One was a sophisticated, highly targeted operation exploiting a critical zero-day vulnerability, while the other was a broad, high-volume attack targeting VPNs.
Critical Cisco Zero-Day Exploited by China-Linked Threat Group
The first campaign involved a China-linked advanced persistent threat (APT) known as UAT-9686, which exploited a zero-day vulnerability in Cisco email security appliances running AsyncOS, tracked as CVE-2025-20393. The flaw received the maximum 10 out of 10 severity rating in the Common Vulnerability Scoring System (CVSS).
This vulnerability occurs when Cisco devices have the Spam Quarantine feature enabled and accessible from the internet. Attackers can exploit the flaw to gain root privileges on the appliance, executing arbitrary commands that may also affect connected systems.
Since at least late November, UAT-9686 has actively leveraged this zero-day, deploying a suite of malware tools including:
AquaShell – a lightweight Python backdoor
AquaPurge – a log-erasing utility
AquaTunnel – a reverse SSH tool ensuring command-and-control access through firewalls
These tools allow attackers to maintain persistent access to compromised systems, highlighting the sophistication and real-world danger of advanced cyber threats. Cisco has issued guidance for mitigating the risk by taking the Spam Quarantine offline, as no permanent patch is yet available.
Brute-Force Attacks Against Cisco and Palo Alto VPNs
Just after the zero-day disclosure, a separate, less sophisticated campaign targeted Cisco SSL VPNs and Palo Alto Networks GlobalProtect VPNs. Over 10,000 unique IP addresses attempted more than 1.7 million authentication sessions in just 16 hours, primarily focusing on organizations in the U.S., Mexico, and Pakistan.
While these attacks were simpler than the zero-day exploit, they leveraged weak or compromised credentials to quickly identify vulnerable systems. These high-volume campaigns often serve to inventory exposed systems before defenders can respond, demonstrating that cyber threats can be both advanced and opportunistic.
Lessons for Organizations
These incidents underline the urgent need for proactive cybersecurity measures. Even straightforward protections such as multifactor authentication, strong password enforcement, and proper system configuration can prevent attackers from exploiting weaknesses. Yet, operational complexity and legacy systems often delay implementation, leaving organizations vulnerable.
How Upside Business Technologies Can Help
At Upside Business Technologies, we specialize in helping organizations close the gap between detection and remediation. Our cybersecurity services include:
Vulnerability assessment and monitoring to identify real exposure across your systems
Timely patch management to reduce risk from zero-day exploits and other vulnerabilities
Secure configuration and VPN hardening to prevent brute-force and credential-based attacks
Continuous threat monitoring and incident response to ensure fast, effective action before threats escalate
By partnering with Upside, organizations can implement practical, proactive defenses that protect critical systems, reduce operational risk, and provide peace of mind in an increasingly complex cyber threat landscape.
Proactive cybersecurity is no longer optional. Ensuring the safety of your critical systems today can prevent the costly consequences of tomorrow’s attacks.
