← Back to Archive

WatchGuard Zero-Day Exploited in 115K+ Firewalls as UK Confirms China-Linked Cyber Intrusion; Iranian APT Resurfaces

Critical Infrastructure Intelligence Briefing

Report Date: Monday, December 22, 2025
Reporting Period: December 15-22, 2025


1. Executive Summary

This week's intelligence highlights three significant developments requiring immediate attention from critical infrastructure operators:

  • Active Exploitation of WatchGuard Firebox Zero-Day: A critical remote code execution vulnerability (CVE pending) in WatchGuard's Fireware OS is being actively exploited in the wild, with over 115,000 devices remaining unpatched and exposed to the internet. Organizations using WatchGuard firewalls should prioritize immediate patching.
  • UK Government Confirms China-Linked Cyber Intrusion: British authorities have acknowledged an ongoing investigation into a cyber incident following reports that China-linked threat actors accessed thousands of confidential government documents. This incident underscores persistent nation-state targeting of government systems and potential implications for allied nations.
  • Iranian Infy APT Returns After Five-Year Hiatus: The Iranian threat group known as Infy (Prince of Persia) has resurfaced with new malware capabilities, signaling renewed Iranian cyber espionage operations that may target critical infrastructure and government entities in Western nations.
  • Ransomware Ecosystem Developments: A Ukrainian national has pleaded guilty to participating in Nefilim ransomware operations targeting high-revenue businesses, demonstrating continued law enforcement success against ransomware affiliates while the threat remains elevated during the holiday period.
  • Business Email Compromise at Scale: The newly identified "Scripted Sparrow" BEC group is sending millions of fraudulent emails monthly across multiple continents, representing a significant financial threat to organizations during the high-activity holiday season.

2. Threat Landscape

Nation-State Threat Actor Activities

China-Linked Intrusion of UK Government Systems

The British government has officially confirmed it is investigating a "cyber incident" following media reports that hackers linked to China gained access to thousands of confidential documents. While specific details remain limited pending investigation, this incident represents a significant intelligence collection operation against a Five Eyes partner nation.

Implications for U.S. Critical Infrastructure:

  • Potential exposure of shared intelligence and policy documents
  • Possible compromise of joint infrastructure protection initiatives
  • Indicators and TTPs from this incident may inform defensive measures for similar targeting

Source: SecurityWeek, December 22, 2025

Iranian Infy APT Resurfaces

After nearly five years of dormancy, the Iranian threat actor known as Infy (also tracked as Prince of Persia) has resumed operations with updated malware capabilities. Previously observed targeting victims in Sweden and other European nations, this group's reemergence signals renewed Iranian cyber espionage priorities.

Key Observations:

  • New malware variants indicate continued development during operational pause
  • Historical targeting includes government entities, diplomatic missions, and defense contractors
  • Critical infrastructure operators in energy and defense sectors should monitor for associated indicators

Source: The Hacker News, December 21, 2025

Ransomware and Cybercriminal Developments

Nefilim Ransomware Affiliate Prosecution

A Ukrainian national pleaded guilty on Friday to conducting Nefilim ransomware attacks targeting high-revenue businesses across the United States and other countries. This prosecution demonstrates continued international law enforcement cooperation against ransomware operators.

Analytical Note: While law enforcement actions continue to disrupt ransomware operations, organizations should maintain heightened vigilance during the holiday period when staffing levels are reduced and response capabilities may be degraded.

Source: Bleeping Computer, December 22, 2025

Scripted Sparrow BEC Campaign

Fortra researchers have uncovered a prolific Business Email Compromise group dubbed "Scripted Sparrow" operating across three continents and at least five countries. The group is sending millions of fraudulent emails monthly, representing a significant financial threat to organizations.

Recommended Actions:

  • Reinforce employee awareness of BEC tactics during holiday period
  • Implement additional verification procedures for financial transactions
  • Review email security controls and authentication mechanisms

Source: Infosecurity Magazine, December 22, 2025

Mobile Threat Developments

Android Malware Operations Consolidating Capabilities

Threat actors are leveraging malicious dropper applications disguised as legitimate software to deliver the "Wonderland" Android SMS stealer. Current targeting focuses on users in Uzbekistan, but the consolidation of dropper, SMS theft, and RAT capabilities indicates maturing mobile attack infrastructure that could be redirected toward other targets.

Critical Infrastructure Relevance: Organizations with BYOD policies or mobile device access to operational technology networks should review mobile security controls.

Source: The Hacker News, December 22, 2025


3. Sector-Specific Analysis

Communications & Information Technology Sector

CRITICAL: WatchGuard Firebox Zero-Day Under Active Exploitation

WatchGuard has released patches for a critical-severity zero-day vulnerability in the Fireware OS's iked process that enables unauthenticated remote code execution. Security researchers report over 115,000 WatchGuard Firebox devices remain exposed online and unpatched.

Technical Details:

  • Affected Component: iked process in Fireware OS
  • Impact: Unauthenticated remote code execution
  • Exploitation Status: Actively exploited in the wild
  • Exposed Devices: 115,000+ internet-facing devices

Immediate Actions Required:

  • Inventory all WatchGuard Firebox devices in your environment
  • Apply available patches immediately
  • If patching is not immediately possible, restrict internet exposure of management interfaces
  • Review logs for indicators of compromise
  • Consider network segmentation to limit potential lateral movement

Sources: SecurityWeek and Bleeping Computer, December 22, 2025

Docker Hardened Images Now Open Source

Docker has released over 1,000 Docker Hardened Images (DHI) as open source under the Apache 2.0 license. This development provides critical infrastructure operators with freely available, security-enhanced container images for software development and deployment.

Benefits for Critical Infrastructure:

  • Reduced attack surface in containerized environments
  • Pre-hardened configurations aligned with security best practices
  • Transparent security controls through open-source availability

Source: Bleeping Computer, December 21, 2025

Government Facilities Sector

UK Government Cyber Incident Investigation

The confirmed investigation into China-linked intrusion of UK government systems has implications for government facilities and contractors across allied nations. Organizations with connections to UK government entities should assess potential exposure and monitor for related threat activity.

Transportation Systems Sector - Maritime

Coast Guard Maritime Law Enforcement Operations

Recent seizures of foreign vessels highlight the U.S. Coast Guard's ongoing maritime law enforcement mission and its role in protecting maritime critical infrastructure. These operations demonstrate continued vigilance against threats to port security and maritime commerce.

Source: Homeland Security Today, December 22, 2025

Financial Services Sector

Elevated BEC Risk During Holiday Period

The Scripted Sparrow BEC campaign's scale (millions of emails monthly) combined with reduced staffing during the holiday period creates elevated risk for financial services organizations and their customers. Wire transfer fraud attempts typically increase during this period.


4. Vulnerability & Mitigation Updates

Critical Vulnerabilities Requiring Immediate Attention

Vendor/Product Severity Impact Exploitation Status Action Required
WatchGuard Firebox (Fireware OS) CRITICAL Unauthenticated RCE via iked process ACTIVELY EXPLOITED Patch immediately; 115K+ devices exposed

Recommended Defensive Measures

For WatchGuard Firebox Vulnerability:

  1. Immediate Patching: Apply vendor-provided patches as the highest priority
  2. Network Segmentation: Isolate firewall management interfaces from internet exposure
  3. Log Review: Examine logs for unusual iked process activity or unexpected connections
  4. Incident Response Preparation: Ensure IR teams are prepared for potential compromise discovery
  5. Vendor Communication: Monitor WatchGuard security advisories for additional guidance

Legal and Compliance Considerations

SolarWinds Lawsuit Dismissal Implications

Analysis of the recent SolarWinds lawsuit dismissal provides important guidance for CISOs regarding liability and disclosure obligations following security incidents. Key takeaways include the importance of documented security programs, timely disclosure practices, and board-level security governance.

Recommended Actions for Security Leaders:

  • Review and document existing security controls and risk management processes
  • Ensure board-level visibility into cybersecurity posture and incidents
  • Maintain clear incident disclosure procedures aligned with regulatory requirements
  • Preserve documentation of security decisions and investments

Source: CSO Online, December 22, 2025


5. Resilience & Continuity Planning

Holiday Period Security Considerations

With the holiday period now underway, critical infrastructure operators should implement enhanced security measures to address reduced staffing and increased threat actor activity:

Immediate Recommendations:

  • Staffing: Ensure adequate security operations coverage through December 31
  • Escalation Procedures: Verify on-call contacts and escalation paths are current
  • Patch Management: Complete critical patching (especially WatchGuard) before staff reductions
  • Monitoring: Increase monitoring sensitivity for anomalous activity
  • Incident Response: Pre-position IR resources and verify vendor support availability

Supply Chain Security

Container Security Enhancement Opportunity

The release of Docker Hardened Images as open source provides an opportunity to enhance supply chain security for organizations using containerized deployments. Security teams should evaluate these images for integration into development and deployment pipelines.

Cross-Sector Dependencies

The WatchGuard vulnerability affects organizations across all critical infrastructure sectors that rely on these devices for network security. Given the scale of exposure (115,000+ devices), cascading impacts could affect:

  • Remote access capabilities for operational technology networks
  • VPN connectivity for distributed operations
  • Network segmentation between IT and OT environments
  • Third-party vendor access controls

6. Regulatory & Policy Developments

International Developments

UK Cyber Incident Response

The UK government's acknowledgment of the China-linked cyber intrusion may prompt policy discussions regarding:

  • Enhanced information sharing between Five Eyes partners
  • Potential diplomatic responses to nation-state cyber operations
  • Review of government network security requirements

Legal Precedent

SolarWinds Case Implications

The dismissal of the SolarWinds lawsuit establishes important precedent for CISO liability and organizational security obligations. Organizations should review their security governance structures in light of this decision.

Upcoming Compliance Considerations

As 2025 concludes, organizations should prepare for:

  • Year-end compliance reporting requirements
  • Annual security program reviews and updates
  • Budget planning for 2026 security initiatives
  • Review of regulatory changes effective January 1, 2026

7. Training & Resource Spotlight

New Resources Available

Docker Hardened Images

Over 1,000 Docker Hardened Images are now freely available under Apache 2.0 license, providing security-enhanced container images for critical infrastructure software development.

  • Access: Available through Docker Hub
  • License: Apache 2.0 (open source)
  • Use Case: Secure container deployments for IT and OT environments

Incident Response Planning

CSO Online has published updated guidance on essential elements for incident response plans. Key components highlighted include:

  1. Clear roles and responsibilities
  2. Communication protocols (internal and external)
  3. Evidence preservation procedures
  4. Recovery prioritization frameworks
  5. Post-incident review processes
  6. Regular testing and update cycles

Security Product Developments

Security Magazine has published its 2025 Year in Review highlighting significant security product releases and updates. Security teams should review these developments for potential integration into their protective programs.

Source: Security Magazine, December 22, 2025


8. Looking Ahead: Upcoming Events & Considerations

Heightened Threat Period: December 22, 2025 - January 2, 2026

Holiday Period Security Alert: The period between Christmas and New Year historically sees increased threat actor activity coinciding with reduced organizational staffing. Critical infrastructure operators should maintain elevated vigilance.

Key Dates:

  • December 24-25: Christmas Eve/Day - Minimal staffing expected across sectors
  • December 31 - January 1: New Year's Eve/Day - Second period of minimal staffing
  • January 2, 2026: Return to normal operations for most organizations

Anticipated Developments

  • WatchGuard Vulnerability: Expect continued exploitation attempts; monitor for additional threat intelligence and indicators of compromise
  • UK Cyber Incident: Additional details may emerge as investigation progresses; watch for related advisories from CISA and partner agencies
  • Iranian APT Activity: Monitor for expanded Infy targeting as the group resumes operations
  • Year-End Ransomware Activity: Historically elevated ransomware deployment during holiday periods

2026 Planning Considerations

  • January 2026: NIST expected to release additional guidance on next-generation secure hardware standards
  • Q1 2026: Review and update security programs based on 2025 threat landscape evolution
  • Ongoing: Monitor for regulatory developments affecting critical infrastructure sectors

Recommended Preparations

  1. Complete critical patching before holiday staffing reductions
  2. Verify incident response team availability and contact information
  3. Pre-authorize emergency response actions for on-call personnel
  4. Test backup and recovery capabilities
  5. Brief executive leadership on current threat landscape and response procedures

This intelligence briefing is derived from open-source reporting and is intended to support critical infrastructure protection efforts. Recipients are encouraged to share relevant information with appropriate stakeholders and report suspicious activity to relevant authorities.

Report Prepared: Monday, December 22, 2025
Next Scheduled Briefing: Monday, December 29, 2025

Disclaimer

This briefing is generated using AI analysis of public news sources. Always verify critical information through authoritative sources before taking action.