Cleartext

Cleartext – April 24, 2026


Listen Later

Cleartext – April 24, 2026

Daily cybersecurity briefing for CISOs and security leaders.

🎧 Listen to this episode

Episode Summary

Today's episode covers 9 stories across 6 topic areas, including: A dozen allied agencies say China is building covert hacker networks out of everyday routers; Surveillance campaigns use commercial surveillance tools to exploit long-known telecom vulnerabilities; In a first, a ransomware family is confirmed to be quantum-safe.

Stories Covered
🌍 Geopolitical
A dozen allied agencies say China is building covert hacker networks out of everyday routers

CyberScoop Β· Apr 23 Β· Relevance: β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘ 9/10

Why it matters to CISOs: A joint advisory from 12+ allied agencies describing China's tactical shift to botnet-based covert networks demands immediate review of edge device hygiene, network visibility, and threat hunting for SOHO router compromises across your environment.

  • Joint advisory from CISA, NCSC-UK, and 10+ allied agencies on Chinese state-backed botnet operations
  • China-linked groups are industrializing use of compromised consumer routers as covert proxy networks
  • Advisory includes specific defensive recommendations for enterprise organizations
  • πŸ“– Read full article

    Surveillance campaigns use commercial surveillance tools to exploit long-known telecom vulnerabilities

    CyberScoop Β· Apr 23 Β· Relevance: β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘ 7/10

    Why it matters to CISOs: First-ever mapping of attack traffic to mobile signaling infrastructure exposes how commercial surveillance vendors exploit SS7/Diameter weaknessesβ€”CISOs with mobile-dependent executives or operations in sensitive regions face direct espionage risk.

    • First documented mapping of commercial surveillance tool traffic to mobile operator signaling infrastructure
    • Exploits long-known SS7/Diameter telecom protocol vulnerabilities
    • Unnamed surveillance vendors posed as legitimate cellular providers to track victims' locations
    • πŸ“– Read full article

      πŸ“‘ Macro Trends
      In a first, a ransomware family is confirmed to be quantum-safe

      Ars Technica Security Β· Apr 23 Β· Relevance: β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘ 7/10

      Why it matters to CISOs: Ransomware operators adopting post-quantum cryptography before most enterprises do is a stark wake-up callβ€”this eliminates any future hope of decrypting seized ransomware payloads and reinforces the urgency of resilient backup and recovery strategies.

      • First confirmed ransomware family using post-quantum cryptography (PQC) for encryption
      • PQC adoption by attackers eliminates potential future quantum-based decryption recovery options
      • Raises questions about enterprise PQC readiness when threat actors are already adopting it
      • πŸ“– Read full article

        πŸ”“ Data Breach
        Vercel attack fallout expands to more customers and third-party systems

        CyberScoop Β· Apr 23 Β· Relevance: β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘ 8/10

        Why it matters to CISOs: Vercel's expanding breach scopeβ€”now confirmed to affect additional customers and downstream third-party systemsβ€”is a concrete supply-chain risk for any enterprise running applications on Vercel infrastructure, requiring immediate assessment of exposure.

        • Vercel found additional evidence of compromise beyond the initial April breach disclosure
        • Customer data was stolen and downstream third-party systems were also affected
        • Full scope of exposure remains undefined, posing ongoing risk assessment challenges
        • πŸ“– Read full article

          New Checkmarx supply-chain breach affects KICS analysis tool

          BleepingComputer Β· Apr 23 Β· Relevance: β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘ 8/10

          Why it matters to CISOs: A compromise of security tooling itselfβ€”Checkmarx KICS Docker images and IDE extensionsβ€”represents a nightmare scenario where the tools CISOs rely on for code analysis become attack vectors, demanding immediate verification of developer tool integrity.

          • Hackers compromised Docker images and VSCode/Open VSX extensions for Checkmarx KICS
          • Compromised artifacts harvested sensitive data from developer environments
          • Highlights growing trend of attackers targeting security and developer tools in the supply chain
          • πŸ“– Read full article

            βš–οΈ Governance & Policy
            Risky Bulletin: Sean Plankey withdraws CISA nomination

            Risky Business News Β· Apr 24 Β· Relevance: β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘ 8/10

            Why it matters to CISOs: CISA leadership vacuum continues to deepenβ€”Plankey's withdrawal after a year of chaotic interim leadership raises serious questions about federal cyber coordination, incident response partnership, and the reliability of government threat intelligence sharing for the private sector.

            • Sean Plankey withdrew his nomination to lead CISA after extended confirmation delays
            • CISA has been operating under temporary leadership for over a year
            • Withdrawal follows a tumultuous period of budget uncertainty and staff departures at the agency
            • πŸ“– Read full article

              πŸš€ Startup Ecosystem
              Cloudsmith Raises $72M for Software Supply-Chain Security

              BankInfoSecurity Β· Apr 24 Β· Relevance: β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘ 7/10

              Why it matters to CISOs: A $72M Series C for artifact-level supply chain security signals strong market validation for the categoryβ€”CISOs evaluating software composition and artifact trust solutions should track Cloudsmith's expanding capabilities in policy enforcement and real-time package risk.

              • $72M Series C led by TCV for software supply-chain security
              • Focus on policy enforcement, auditability, and real-time package risk analysis
              • Driven by increasing CISO concern over open-source dependencies and compromised artifacts
              • πŸ“– Read full article

                Why Cisco Is Eyeing Buy of Non-Human Identity Startup Astrix

                BankInfoSecurity Β· Apr 24 Β· Relevance: β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘β–‘β–‘ 7/10

                Why it matters to CISOs: Cisco's potential $250-350M acquisition of Astrix Security validates non-human identity as a critical enterprise gapβ€”CISOs should consider how service accounts, API keys, and machine identities are governed ahead of likely platform consolidation.

                • Cisco reportedly in talks to acquire Astrix Security for $250-350M
                • Astrix focuses on non-human identity security (service accounts, API keys, machine identities)
                • Deal represents at least 25% premium over Astrix's last $200M valuation
                • πŸ“– Read full article

                  🚨 Critical Vulnerability
                  US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied

                  CyberScoop Β· Apr 23 Β· Relevance: β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–‘ 9/10

                  Why it matters to CISOs: FIRESTARTER malware persisting on Cisco ASA/Firepower devices even after patching means CISOs must go beyond patch managementβ€”integrity verification and forensic examination of perimeter firewalls is now urgent, especially given CISA confirmed a federal agency was compromised.

                  • CISA and UK NCSC found FIRESTARTER backdoor on a US federal agency's Cisco firewall, active since at least September 2025
                  • Malware allowed attackers to return to devices in March 2026 without re-exploiting original vulnerabilities
                  • Patching alone was insufficient; persistence mechanism survived standard remediation
                  • πŸ“– Read full article

                    Further Reading
                    • 🌍 A dozen allied agencies say China is building covert hacker networks out of everyday routers β€” CyberScoop
                    • 🌍 Surveillance campaigns use commercial surveillance tools to exploit long-known telecom vulnerabilities β€” CyberScoop
                    • πŸ“‘ In a first, a ransomware family is confirmed to be quantum-safe β€” Ars Technica Security
                    • πŸ”“ Vercel attack fallout expands to more customers and third-party systems β€” CyberScoop
                    • πŸ”“ New Checkmarx supply-chain breach affects KICS analysis tool β€” BleepingComputer
                    • βš–οΈ Risky Bulletin: Sean Plankey withdraws CISA nomination β€” Risky Business News
                    • πŸš€ Cloudsmith Raises $72M for Software Supply-Chain Security β€” BankInfoSecurity
                    • πŸš€ Why Cisco Is Eyeing Buy of Non-Human Identity Startup Astrix β€” BankInfoSecurity
                    • 🚨 US, UK agencies warn hackers were hiding on Cisco firewalls long after patches were applied β€” CyberScoop
                    • Full Transcript
                      Click to expand full episode transcript

                      Jordan: Patching your Cisco firewall isn't enough anymore. CISA confirmed a federal agency had a backdoor sitting on their perimeter device for months β€” and it survived the patch. Let that sink in for a second before your morning coffee kicks in.

                      Alex: Welcome to Cleartext. It's Friday, April 25th, 2026. I'm Alex Chen.

                      Jordan: And I'm Jordan Reeves.

                      Alex: Big week. We're covering a 12-agency warning about China industrializing router botnets, FIRESTARTER malware that laughs at your patch management program, the Vercel and Checkmarx breaches expanding in ways that should concern every CISO with a modern software supply chain, quantum-safe ransomware β€” yes, really β€” SS7 surveillance campaigns finally mapped to real infrastructure, CISA's leadership vacuum getting worse, and two market signals worth tracking. Let's get into it.

                      Jordan: Let's start with what I'd call the week's most strategically significant story, and it's a two-header. First: CISA, NCSC-UK, and ten other allied agencies dropped a joint advisory on China-linked groups systematically compromising consumer and SOHO routers to build covert proxy networks. We're talking about industrialized botnet infrastructure built out of the kind of hardware sitting in your employees' home offices, your branch locations, and your OT-adjacent networks. The tactical logic here is sound from their perspective β€” commodity hardware, hard to attribute, blends into legitimate traffic.

                      Alex: And the board-level read on this is straightforward. If your visibility stops at the enterprise perimeter, you're blind to traffic routing through these networks. The advisory has specific defensive recommendations, and I'd encourage your team to treat this as a hunting trigger, not a reading exercise. Edge device hygiene, firmware integrity, network telemetry on anomalous egress patterns. The sophistication here isn't in the malware β€” it's in the operational concept. They're using your ISP's forgotten hardware against you.

                      Jordan: Layer that on top of the second geopolitical story this week, and you start to see a coherent espionage doctrine. Researchers published what they're calling the first-ever mapping of commercial surveillance tool traffic to mobile operator signaling infrastructure. SS7 and Diameter vulnerabilities aren't new β€” we've known about them for a decade. What's new is seeing the commercial surveillance industry actually fingerprinted in real attack traffic, with vendors posing as legitimate carriers to track physical locations.

                      Alex: If you have executives traveling in sensitive regions, or mobile-dependent operations anywhere with contested geopolitical exposure, this is not an abstract problem. The attack surface is the phone your CFO carries to Singapore. The mitigations are limited β€” encrypted messaging apps help for comms, but location tracking via SS7 doesn't care about your Signal installation. This is a risk conversation you need to have with your board, particularly around executive protection programs.

                      Jordan: Now to the story I opened with β€” FIRESTARTER. CISA and NCSC confirmed a backdoor on a US federal agency's Cisco ASA and Firepower devices. Active since at least September 2025. In March 2026, attackers returned to already-patched devices without re-exploiting the original vulnerability. The persistence mechanism survived standard remediation. That is not a patching failure. That is a fundamental assumptions failure.

                      Alex: This is the story where I want CISOs to stop and have a hard conversation with their teams. For years we've operated on the assumption that patch equals remediation. FIRESTARTER breaks that. The attacker got in, established persistence at a layer below what your standard patch touches, and waited. Your next step is not patching β€” it's integrity verification of your perimeter devices. Firmware hashes, configuration baselines, and frankly forensic review if you have Cisco ASA or Firepower in your environment and you haven't done a clean rebuild recently. The CISA advisory has IoCs. Use them this week.

                      Jordan: And speaking of assumptions that need revisiting β€” let's talk supply chain, because this week handed us two concrete examples of why the category keeps expanding. Vercel disclosed that the scope of their April breach is larger than initially reported. More customers affected, downstream third-party systems compromised, and β€” critically β€” the full scope of exposure is still undefined. Undefined scope is the phrase that should make your general counsel uncomfortable.

                      Alex: If you're running applications on Vercel infrastructure, you need an answer to two questions today. What data flows through that environment, and what downstream systems are connected to it? Supply chain breaches are particularly brutal because the blast radius is discovered in stages. Every new disclosure from Vercel is another opportunity for your organization to find itself in scope. Get ahead of it.

                      Jordan: The Checkmarx KICS story is arguably more insidious, because this time it's the security tooling itself. Attackers compromised Docker images and VSCode and Open VSX extensions for the KICS infrastructure-as-code analysis tool β€” and used those artifacts to harvest credentials and sensitive data from developer environments. Your AppSec tool became the attack vector.

                      Alex: This one hits differently because KICS is specifically a security product. The trust assumption was baked in. The action item here is verifying the integrity of your developer and security tooling supply chain β€” not just your application dependencies, but the tools your developers use every day. Hash verification, provenance checks, pull from verified sources only. And yes, that Cloudsmith Series C we'll mention in a moment is directly relevant to this problem.

                      Jordan: Quantum-safe ransomware. I'll give you a moment with that phrase. Researchers confirmed the first ransomware family using post-quantum cryptography. There is no practical operational benefit to this for the attacker today. Quantum computers capable of breaking current encryption don't exist at scale. So why are they doing it?

                      Alex: A few possibilities. It's a marketing move within ransomware-as-a-service ecosystems β€” differentiation for sophisticated buyers. It's future-proofing against a capability they believe is coming sooner than we do. Or it's signaling that criminal operators are tracking NIST's PQC standards as closely as your compliance team. What it means for CISOs is this: the leverage in ransomware recovery β€” the occasional government seizure that yields decryption keys β€” that leverage just got harder to apply. Resilient, tested, offline backups. That's the mitigation. It's unglamorous and it works.

                      Jordan: CISA governance. Sean Plankey withdrew his nomination to lead the agency. This follows over a year of interim leadership, budget turbulence, and staff departures. I'm going to be direct: CISA's effectiveness as a threat intelligence partner to the private sector is degraded right now. That doesn't mean you ignore their advisories β€” this week's Cisco and China router alerts are proof they're still producing valuable work. But your strategic dependence on federal coordination as a backstop for your program needs to be recalibrated. Don't plan around CISA as an active operational partner in an incident response scenario the way you might have three years ago.

                      Alex: Two market signals worth thirty seconds each. Cloudsmith closed a $72 million Series C for artifact-level software supply chain security β€” policy enforcement, auditability, real-time package risk. Given what we just said about Checkmarx KICS, the timing is almost illustrative. If you're evaluating the category, it's worth a look. And Cisco is reportedly in talks to acquire Astrix Security for $250 to $350 million. Astrix focuses on non-human identity β€” service accounts, API keys, machine identities. This is a category that's been underserved relative to its actual risk surface, and Cisco putting that kind of number on it is validation that platform vendors see it as table stakes. If you haven't done an audit of your non-human identity sprawl, this deal is your signal to start.

                      Jordan: Stepping back to the week's theme β€” and there is a clear one. The perimeter is lying to you. Patched Cisco firewalls are hiding backdoors. Security tooling is delivering malware. Proxy networks are routing through your employees' home routers. The adversary has methodically attacked every assumption layer we've built defenses on.

                      Alex: What strikes me is how much of this week's news is about persistence and concealment over speed and destruction. Whether it's FIRESTARTER waiting eight months on a firewall, or China's router botnet blending into legitimate ISP traffic, or SS7 surveillance mapped invisibly to carrier infrastructure β€” the strategic posture is patience. They're not blowing doors open. They're learning to live inside.

                      Jordan: Which means detection has to be the investment priority. Not more prevention layers. Better visibility, better hunting, better forensic capability on the things you already own. The signals are there. The question is whether you have the instrumentation and the people to see them.

                      Alex: That's the right note to end the week on. For CISOs, the action items are concrete: forensic review of Cisco perimeter devices, supply chain integrity verification of developer tooling, risk conversation with your board on executive mobile exposure, and a clear-eyed reassessment of your federal coordination dependencies.

                      Jordan: All the links are in the show notes. Have a good weekend β€” or at least a quiet one.

                      Alex: This is Cleartext. See you Monday.

                      Cleartext is an automated daily podcast for CISOs and security leaders. Generated 2026-04-24.

                      Sources are pulled from: CyberScoop, The Record, SecurityWeek, Krebs on Security, Dark Reading, Cybersecurity Dive, BleepingComputer, Wired, Ars Technica, TechCrunch, Help Net Security, VentureBeat, Risky Business News, The Hacker News, CISA, and BankInfoSecurity.

                      ...more
                      View all episodesView all episodes
                      Download on the App Store

                      CleartextBy Cleartext