X-PHY https://x-phy.com Thu, 06 Nov 2025 08:26:06 +0000 en-US hourly 1 https://wordpress.org/?v=6.9 https://x-phy.com/wp-content/uploads/2025/07/cropped-x-phy-favicon-32x32.png X-PHY https://x-phy.com 32 32 The Cost of Deepfake Tools Just Hit Zero – And Your Security Strategy Needs to Catch Up https://x-phy.com/the-cost-of-deepfake-tools-just-hit-zero-and-your-security-strategy-needs-to-catch-up/ https://x-phy.com/the-cost-of-deepfake-tools-just-hit-zero-and-your-security-strategy-needs-to-catch-up/#respond Thu, 06 Nov 2025 08:26:06 +0000 https://x-phy.com/?p=111193 HelpNet YouTube

As featured in Help Net Security: Cybercriminals have built a business on YouTube’s blind spots

The barrier to entry for deepfake fraud has collapsed. What used to require technical expertise, expensive software, and significant time now takes minutes with free AI models and a laptop.

This is a real and current day threat, one that cybercriminals have turned platforms like YouTube into profitable attack vectors.

In a recent Help Net Security article, our CEO Camellia Chan weighs in on how organisations need to respond to the industrialisation of deepfake scams. The piece examines how YouTube’s 2.53 billion users have become targets for AI-powered fraud that traditional security controls simply were never designed to stop.

YouTube Has Become a Business Opportunity for Cybercriminals

The article highlights several large-scale operations exploiting YouTube’s trust infrastructure:

The “Ghost Network” malware campaign involved over 3,000 videos uploaded to fake or hijacked channels. These videos promised cracked software or game hacks, but instead delivered phishing pages and malware downloads. By the time YouTube’s moderation team flagged them, thousands of users had already been compromised.

Deepfake crypto scams have weaponized the likenesses of public figures like Elon Musk, Donald Trump, and Nvidia CEO Jensen Huang to promote fraudulent investment schemes. In one case, a fake Nvidia GTC livestream featuring a deepfake of Jensen Huang drew approximately 100,000 viewers and ranked above the official stream in search results before being taken down.

Hijacked verified channels are being repurposed at scale. Scammers buy or compromise established YouTube accounts with followers and algorithmic trust, then keep the verification badge while flooding the channel with AI-generated scam content. Users see the blue checkmark and assume legitimacy – exactly what attackers are counting on.

As the article notes, researchers found that scammers are even hijacking legitimate business accounts – like a Norwegian design agency’s Google Ads account – to run sophisticated phishing campaigns that mirror official TradingView branding, complete with verified badges and pixel-perfect layouts.

The Economics of Deepfake Fraud Are Accelerating

The financial impact is staggering. According to Deloitte research cited in the article, GenAI-driven fraud losses in the United States are projected to reach $40 billion by 2027, up from $12.3 billion in 2023. That’s a 225% increase in just four years.

This surge is directly tied to the commoditisation of deepfake technology. What was once the domain of nation-state actors and well-funded criminal organisations is now accessible to anyone with an internet connection. Free tools, open-source models, and “deepfake-as-a-service” platforms have turned synthetic media creation into a scalable, low-cost operation.

The article points out that scammers no longer need Hollywood-level production quality. They just need content that’s convincing enough to fool someone for 30 seconds – the time it takes to click a malicious link, download malware, or authorize a fraudulent transaction.

Traditional Security Controls Aren’t Built for This

Now here is the uncomfortable truth: your firewall doesn’t filter synthetic media. Your email gateway doesn’t scan YouTube videos. Your endpoint protection doesn’t flag a tutorial that looks legitimate but delivers ransomware.

The attack surface has expanded beyond the network perimeter into content platforms, social media, and communication channels that employees use every day. And because these threats don’t rely on traditional malware signatures or network anomalies, they slip past conventional defenses undetected.

As our CEO Camellia Chan told Help Net Security: “Treat deepfakes like any other cyber threat and apply a zero-trust mindset. That means don’t assume anything is real just because it looks or sounds convincing.”

This philosophy is at the core of how X-PHY approaches synthetic media detection. Zero-trust can’t stop at authentication and access control anymore. It has to extend to every piece of content your organization encounters – video, audio, images, and documents.

What 2026 Will Bring (And Why You Need to Prepare Now)

The Help Net Security article projects that scam activity on YouTube will continue to rise in 2026 as AI tools become even more accessible and affordable. Here’s what security leaders should expect:

  • Faster, cheaper production means more scams will reach wider audiences before platforms can respond
  • Coordinated networks of fake creators will post, comment, and interact with each other to appear authentic and game algorithmic recommendations
  • More hijacked channels with established audiences and trust will be weaponized for malware distribution and fraud
  • Deepfakes of public figures will drive a new wave of investment scams, disinformation campaigns, and brand impersonation attacks

Reactive content moderation cannot scale to meet this threat. By the time human reviewers flag and remove malicious content, the damage is already done – systems are compromised, money is stolen, and trust is eroded.

The X-PHY Approach to Deepfake Detection

At X-PHY, we have built our deepfake detection solution on a simple premise: if the threat operates at the speed of AI, your defenses need to as well.

X-PHY Deepfake Detector uses multi-modal AI to analyse synthetic media in real time. Enabling:

  1. Real-time detection of AI-generated video, audio, and images without relying on cloud connectivity or external APIs
  2. On-device processing that works in high-security, air-gapped environments where traditional SaaS solutions can’t operate
  3. Zero-trust verification that treats all content as untrusted until proven authentic—no assumptions based on source, verification badges, or visual quality

The Path Forward: From Awareness to Action

The Help Net Security article makes clear that deepfakes aren’t a niche threat or a distant concern anymore. Deepfakes are a present, profitable, and rapidly scaling attack vector that’s already costing organizations billions.

Security awareness training won’t solve this. Telling employees to “be vigilant” or “look for red flags” is insufficient when the fakes are pixel-perfect and contextually flawless. You can’t train humans to outperform AI-generated deception.

Instead, organisations need to:

  1. Expand their threat model to include synthetic media as a critical attack vector across email, collaboration tools, social platforms, and public content
  2. Implement zero-trust principles for content verification – not just network access and authentication
  3. Deploy autonomous detection across the stack that operates at the speed and sophistication of the attacks themselves
  4. Build incident response capabilities specifically designed to handle deepfake scenarios, including brand impersonation, executive fraud, and synthetic media manipulation

Want to learn more about how X-PHY Deepfake Detector works? Schedule a demo or technical briefing with our team here.

]]>
https://x-phy.com/the-cost-of-deepfake-tools-just-hit-zero-and-your-security-strategy-needs-to-catch-up/feed/ 0
X-PHY Inc partners Athena Dynamics to expand access to hardware-based cybersecurity solutions in Asia https://x-phy.com/x-phy-inc-partners-athena-dynamics-to-expand-access-to-hardware-based-cybersecurity-solutions-in-asia/ https://x-phy.com/x-phy-inc-partners-athena-dynamics-to-expand-access-to-hardware-based-cybersecurity-solutions-in-asia/#respond Tue, 04 Nov 2025 03:11:34 +0000 https://x-phy.com/?p=111156 XPHY Athena Dynamics
Partnership enhances delivery of X-PHY’s patented hardware-embedded security solutions to public and critical infrastructure sectors

Singapore, 4 November 2025Cybersecurity firm X-PHY Inc has appointed Athena Dynamics Pte Ltd as its strategic market access partner for the Asia-Pacific region, expanding its presence in Singapore and across Asia.

 The partnership aims to deliver X-PHY’s hardware-embedded security solutions to public and critical infrastructure sectors. Recent advisories from the Cyber Security Agency of Singapore (CSA) highlight that sophisticated ransomware can bypass traditional software defences. X-PHY’s Cybersecure Solid State Drive (SSD) provides AI-driven, hardware-level protection that detects tampering and abnormal activity autonomously, safeguarding sensitive data even if software defences fail.

X-PHY’s portfolio also includes the X-PHY Deepfake Detector, designed in line with the Monetary Authority of Singapore (MAS) Technology Risk Management (TRM) Guidelines. The endpoint-based tool allows financial institutions to detect deepfakes on corporate devices without relying on the cloud, keeping sensitive data secure.

Camellia Chan, CEO of X-PHY Inc, said, “Our current threat landscape demands more than software-based defenses. Hardware must be the first line of defense, embedding intelligence at the core of every device. This is what X-PHY delivers—proactive, autonomous protection that stops attacks before they escalate. Our partnership with Athena Dynamics extends this critical layer of security to organisations across Singapore and Asia. Together, advocating for a holistic security stack that encompasses both hardware and software layers.”

 Athena Dynamics CEO Ken Soh added, “The partnership is timely and strategic, especially with the recent MAS advisory in September 2025 highlighting the rising threat of deepfake-related scams. X-PHY’s hardware-based security proposition uniquely fills a critical gap left by software-only cybersecurity platforms, which can be disabled or manipulated by bad actors before they are able to actively implement their protective measures.”

 The collaboration will leverage Athena Dynamics’ established presence in Singapore and regional network to boost cyber resilience for government, defence, and enterprise clients. Initiatives will include joint customer briefings, proof-of-concept deployments, and co-developed solution bundles across the Asia-Pacific.

About X-PHY Inc

X-PHY Inc is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core. Built on the principle of Security by Design, X-PHY embeds protection directly at the physical layer for proactive, autonomous, and real-time defense against evolving cyber threats. Headquartered in California, USA, X-PHY Inc was established in 2021 and has since developed a growing portfolio of 53 patents, reinforcing its commitment to innovative AI-embedded security at the hardware level. The company’s patented solutions safeguard endpoints, servers, and data centers, ensuring zero-trust resilience across industries.

X-PHY Inc is part of the Flexxon Group, a leader in hardware engineering and memory solutions, leveraging its legacy of innovation and expertise in secure storage to build cutting-edge cybersecurity technologies for the digital world.

About Athena Dynamics

Athena Dynamics (ADPL) is a Singapore-based cybersecurity consulting firm founded in 2014 through a spin-off from SGX-listed BHG Group. Specialising in disruptive technologies, ADPL serves government, defense, maritime, and enterprise sectors. Its ethical hacking arm, Good Hacker Alliance, features experts with world-class credentials. With over 300 enterprise clients, ADPL earned recognition through more than 300 invited thought leadership contributions. Awards include Cyber Security Leaders 2023 (AiSP/CSA), ASEAN CIO 100, and D&B Business Eminence 2022. ADPL’s CEO chairs SGTech’s Cyber Security Chapter, and the firm continues expanding regionally, focusing on advanced solutions where conventional methods fall short.

For media queries, please contact:

X-PHY Inc
Samantha Wong, Director, Communications & Media
Email: samantha@flexxon.com  

Athena Dynamics
Ewen Lim, Head of Marketing
Email: ewen.lim@athenadynamics.com

]]>
https://x-phy.com/x-phy-inc-partners-athena-dynamics-to-expand-access-to-hardware-based-cybersecurity-solutions-in-asia/feed/ 0
X-PHY Inc and Ensign InfoSecurity Ink Strategic Partnership to Fortify Cyber Resilience Across Asia and Beyond https://x-phy.com/x-phy-inc-and-ensign-infosecurity-ink-strategic-partnership-to-fortify-cyber-resilience-across-asia-and-beyond/ https://x-phy.com/x-phy-inc-and-ensign-infosecurity-ink-strategic-partnership-to-fortify-cyber-resilience-across-asia-and-beyond/#respond Wed, 22 Oct 2025 04:09:21 +0000 https://x-phy.com/?p=110717 The official signing ceremony took place today at GovWare 2025 (From L-R: Mr Lim Minhan, Executive Vice President and Head of Consulting at Ensign InfoSecurity, Mr Simon Cheong, Senior Vice President and Head of Sales for International Business & Commercial at Ensign InfoSecurity, Ms May Chng, Co-Founder and Chief Operating Officer of X-PHY Inc, Mr Ted Tan, Board Advisor of the Flexxon Group)
The official signing ceremony took place today at GovWare 2025 (From L-R: Mr Lim Minhan, Executive Vice President and Head of Consulting at Ensign InfoSecurity, Mr Simon Cheong, Senior Vice President and Head of Sales for International Business & Commercial at Ensign InfoSecurity, Ms May Chng, Co-Founder and Chief Operating Officer of X-PHY Inc, Mr Ted Tan, Board Advisor of the Flexxon Group)

Singapore, 22 October 2025 – X-PHY Inc, the cybersecurity arm of the Singapore-headquartered Flexxon Group, and leader in hardware-based cybersecurity solutions, and Ensign InfoSecurity, Asia Pacific’s largest pure-play- end-to-end cybersecurity service provider, have entered into a strategic partnership to strengthen cyber resilience across critical sectors. Together, the parties will explore the co-development and commercialisation of joint innovations, that combine their respective areas of expertise to deliver holistic and seamlessly integrated solutions that secure the digital systems of clients around the world.

The agreement was formalised at GovWare 2025, Singapore’s flagship cybersecurity event that brings together leaders from the public and private sectors across Asia. Ms May Chng, Co-Founder and Chief Operating Officer of X-PHY Inc, and Mr Simon Cheong, Senior Vice President and Head of Sales for International Business & Commercial at Ensign InfoSecurity, signed the partnership agreement on behalf of their respective organisations, with Mr Ted Tan, Board Advisor of the Flexxon Group, and Mr Lim Minhan, Executive Vice President and Head of Consulting at Ensign InfoSecurity, in attendance as witnesses.

The partnership combines X-PHY’s patented AI-embedded hardware cybersecurity innovations – including the X-PHY Cybersecure Solid State Drive and Deepfake Detector – with Ensign’s deep capabilities in end-to-end cybersecurity services, creating a powerful synergy that delivers holistic protection across both hardware and software layers.  

This collaboration also opens opportunities for joint innovation to further enhance the combined portfolio of products, solutions and services offered by both organisations, bridging the gap between device-level protection and enterprise-wide defense against deepfakes, enabling organisations to achieve true end-to-end cyber resilience.

May Chng, Co-Founder & Chief Operating Officer, X-PHY Inc, said: “This partnership unites best-in-class innovation and expertise – combining X-PHY’s advanced hardware-embedded technologies with Ensign’s deep capabilities in technology development, integration and managed security. Together, we are raising the bar for proactive, autonomous and holistic security across the digital infrastructures within Singapore and beyond.”

Simon Cheong, Senior Vice President & Head of Sales for International Business & Commercial, Ensign InfoSecurity, said: “Cybersecurity today demands more than point solutions and requires tightly integrated capabilities that secure every layer, from devices to enterprise systems. This partnership brings together X-PHY’s hardware innovation with Ensign’s deep cybersecurity expertise to create a unified defence fabric that is both intelligent and resilient. By combining our strengths, we are not just enhancing protection but also shaping how next-generation cyber defence is built and delivered.”

Leveraging Ensign’s deep capabilities in end-to-end cybersecurity services and its established global network, the partnership will enhance the reach of these innovations beyond Singapore, supporting cybersecurity modernisation efforts across key regions and countries such as Asia-Pacific, Japan, India, and Europe – showcasing Singapore’s strength as a hub for cybersecurity innovation and export.

Advancing Singapore’s and the Region’s Digital Agendas

The collaboration supports Singapore’s strategic direction towards a multi-layered, coordinated cybersecurity approach – one grounded in the principles of defence-in-depth and Zero Trust readiness, as outlined in the country’s Cybersecurity Strategy 2021 and Government Zero Trust Architecture. 

By combining X-PHY’s AI-embedded, hardware-based cybersecurity technologies with Ensign’s end-to-end cybersecurity expertise and integration capabilities, the partnership helps organisations strengthen continuous validation and verification across users, devices, and systems – extending protection to the hardware layer as part of a holistic, multi-layered defense model for critical sectors.

About X-PHY Inc

X-PHY Inc is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core. Built on the principle of Security by Design, X-PHY embeds AI-embedded protection directly at the physical layer to deliver proactive, autonomous, and real-time defense against evolving cyber threats.

Established in 2021, X-PHY has developed a growing portfolio of over 50 global patents, reinforcing its commitment to advancing zero-trust resilience through hardware-anchored security. Its patented technologies safeguard endpoints, servers, and data centers, providing a holistic foundation for secure digital infrastructure across industries.

For more information, please visit: 

X-PHY: x-phy.com

About Ensign InfoSecurity 

Ensign InfoSecurity is Asia Pacific’s largest pure-play, end-to-end cybersecurity service provider. Headquartered in Singapore, Ensign offers bespoke solutions and services to address their clients’ cybersecurity needs. Their core competencies are in the provision of cybersecurity advisory and assurance services, architecture design and systems integration services, and managed security services for advanced threat detection, threat hunting, and incident response. Underpinning these competencies is in-house research and development in cybersecurity. Ensign has two decades of proven track record as a trusted and relevant service provider, serving clients from the public and private sectors in the Asia Pacific region.

For more information, please visit www.ensigninfosecurity.com

For media queries, please contact:

For X-PHY Inc

Samantha Wong

Director, Communications & Media

  1. samantha@flexxon.com
  2. (65) 9115 6968
]]>
https://x-phy.com/x-phy-inc-and-ensign-infosecurity-ink-strategic-partnership-to-fortify-cyber-resilience-across-asia-and-beyond/feed/ 0
X-PHY Inc Appoints Acton Technology as Full-Service Strategic Partner to Strengthen Cybersecurity Presence in Southeast Asia https://x-phy.com/x-phy-inc-appoints-acton-technology-as-full-service-strategic-partner-to-strengthen-cybersecurity-presence-in-southeast-asia/ https://x-phy.com/x-phy-inc-appoints-acton-technology-as-full-service-strategic-partner-to-strengthen-cybersecurity-presence-in-southeast-asia/#respond Tue, 07 Oct 2025 03:37:33 +0000 https://x-phy.com/?p=110472 XPHY Acton White
Partnership extends reach of X-PHY’s patented AI-embedded hardware security solutions to enterprises in Singapore, Malaysia, Philippines, Thailand, and Vietnam.

Singapore, 7 October 2025X-PHY Inc., a pioneer in hardware-based cybersecurity solutions, today announced the appointment of Acton Technology Pte Ltd as its full-service strategic partner in Southeast Asia. The partnership will deliver next-generation AI-embedded security solutions across the region, helping enterprises build a holistic cybersecurity stack with proactive and intelligent hardware security at its foundation.

Through the partnership, Acton will provide a unified support structure that ensures customers in select regions can lean on a single trusted partner for deployment, integration, managed services, and first-line technical support.

The collaboration leverages Acton’s regional presence, covering Singapore, Malaysia, the Philippines, Thailand, and Vietnam, with a strong focus on industries where cyber resilience is critical – including finance, government, healthcare, enterprises, and critical infrastructure.

“Southeast Asia is a region experiencing rapid digital growth, and with it, a corresponding escalation of cybercrime. As cybercriminals grow in speed, sophistication and opportunity, organisations need security that is proactive, autonomous, and built directly into their systems,” said Camellia Chan, Co-Founder and CEO of X-PHY Inc. “I am glad to welcome Acton to our stable of partners, bringing together X-PHY’s patented hardware-based cybersecurity solutions and Acton’s regional expertise to deliver trusted, localized sales and support that empowers enterprises to defend against today’s most advanced attacks.”

A spokesperson from Acton said, “By partnering with X-PHY, we are expanding access to world-leading, AI-embedded cybersecurity solutions while ensuring organisations across Southeast Asia benefit from faster deployment, localized support, and tailored solutions. Our shared vision is to give enterprises peace of mind with proactive security that adapts to their evolving needs.”

Through this partnership, Acton will build on its growing portfolio of hardware-based security solutions and deliver X-PHY’s suite of solutions to its network of customers in the region. These include:

  1. X-PHY Cyber Secure SSDs and Laptops, the brand’s multi-patented and multi-awarded solution that embeds intelligent security at the memory layer for protection at the endpoint – even against zero day threats.
  2. X-PHY Deepfake Detector, an on-device deepfake detection solution to combat digital content manipulation.

The partnership reflects X-PHY’s global expansion strategy, combining technological innovation with strong regional partnerships to set new standards for zero-trust, hardware-based protection.

Acton will be showcasing X-PHY’s suite of solutions at Tech Week Singapore from 8 to 9 October, at the Marina Bay Sands Expo and Convention Centre. Visit them at N45.

About X-PHY Inc

X-PHY Inc is a pioneering cybersecurity company dedicated to hardware-based cybersecurity solutions that protect data at its core. Built on the principle of Security by Design, X-PHY embeds protection directly at the physical layer for proactive, autonomous, and real-time defense against evolving cyber threats. Headquartered in California, USA, X-PHY Inc was established in 2021 and has since developed a growing portfolio of 53 patents, reinforcing its commitment to innovative AI-embedded security at the hardware level. The company’s patented solutions safeguard endpoints, servers, and data centers, ensuring zero-trust resilience across industries.

X-PHY Inc is part of the Flexxon Group, a leader in hardware engineering and memory solutions, leveraging its legacy of innovation and expertise in secure storage to build cutting-edge cybersecurity technologies for the digital world.

For more information, please visit: 

X-PHY: x-phy.com

Flexxon: flexxon.com 

About Acton Technology Pte Ltd 

Acton is a leading authorized semiconductor and electronic component distributor with regional coverage in Asia Pacific. Established in 2008, with its headquarters in Singapore, Acton’s distribution network spans across Malaysia, the Philippines, Thailand, Vietnam and China. We provide a wide range of semiconductors, along with active, passive, electromechanical, and mechanical products from leading international manufacturers.

As a fast-growing distributor in the region, Acton Technology is committed in providing quality electronic components, value-added products, and services to its customers. 

For more information, please visit: www.newgenprotect.com

For media queries, please contact:

For X-PHY Inc

Samantha Wong

Director, Communications & Media

  1. samantha@flexxon.com
  2. (65) 9115 6968

For Acton Tech

protect@acton-tech.com

]]>
https://x-phy.com/x-phy-inc-appoints-acton-technology-as-full-service-strategic-partner-to-strengthen-cybersecurity-presence-in-southeast-asia/feed/ 0
Flexxon Launches X-Mask Pro: Secure Memory Card with Built-in Encryption and Data Concealment https://x-phy.com/flexxon-launches-x-mask-pro-secure-memory-card-with-built-in-encryption-and-data-concealment/ https://x-phy.com/flexxon-launches-x-mask-pro-secure-memory-card-with-built-in-encryption-and-data-concealment/#respond Tue, 30 Sep 2025 02:30:56 +0000 https://x-phy.com/?p=110041 Delivers uncompromising security, durability, and compliance for industrial use, professional photography, and surveillance applications

X-Mask Pro Press Release Image
Purpose-built to ensure secure data storage in industrial applications, autonomous aircraft, professional cameras, and surveillance operations, X-Mask Pro is currently available in capacities from 64GB to 128GImage credit: Flexxon 1

Singapore, 30 September 2025 – Flexxon, a global leader in industrial NAND flash storage, today announced the launch of X-Mask2 Pro – the next evolution of the company’s best-selling X-Mask. Designed to secure and conceal sensitive data in mission-critical operations, X-Mask Pro delivers plug-and-play functionality, paired with unmatched durability, built-in encryption, and regulator-ready compliance, ensuring that vital information remains secure, intact, and invisible to unauthorised individuals.

As industries worldwide generate growing volumes of sensitive operational data – from aerospace and defense to infrastructure monitoring and autonomous systems – protecting this data at the source has become a pressing priority. With X-Mask Pro, Flexxon provides enterprises with a rugged, secure, and regulator-compliant solution that conceals confidential and vital data in field operations.

Camellia Chan, CEO and Co-founder of Flexxon said: “Data is the most valuable asset in today’s digital economy, and it must be protected at the source. Especially in industrial applications, data captured must remain secure and inaccessible to unauthorised individuals at all times. With X-Mask Pro, we are strengthening our leadership in secure storage to deliver a solution that is not only physically resilient but also digitally impenetrable – all while prioritising usability with plug-and-play functionality. Our goal is to make it easy to use for authorised parties, and impossible for prying eyes to reach their target.” 

Industrial-Grade Security and Reliability

Building on Flexxon’s long-standing prowess in developing secure industrial memory solutions, X-Mask Pro delivers a powerful combination of durability, encryption, and endurance. Rigorously tested to withstand extreme temperatures from -40°C to 85°C, high humidity, shock forces up to 1500G, vibrations, and drops from 1.5 meters, X-Mask Pro delivers consistent performance under the most demanding conditions. It is also tested against bending stress, torque, and electrostatic discharge (ESD) up to ±8kV, ensuring resilience during real-world deployment.

At the same time, X-Mask Pro’s hardware-based encryption and data concealment capabilities ensure that sensitive data remains invisible and unreadable to unauthorized users. Together with these functions, proprietary software authentication controls through the X-Mask Pro Tool, allow for seamless setup and configuration by users to conceal or unlock the data stored. 

Beyond resilience and security, X-Mask Pro is fully regulator-ready, meeting the strictest global compliance requirements – from General Data Protection Regulation (GDPR) to national security and legal standards – and is built to support nonstop, high-volume recording across advanced applications such as HD video, LiDAR, and multispectral sensors.

How X-Mask Pro Works

At its core, X-Mask Pro integrates hardware-based encryption with proprietary authentication controls to safeguard sensitive data from interception or tampering. Unlike standard memory cards that can be easily removed, stolen, and read, X-Mask Pro ensures that all stored information remains concealed and encrypted without authorized access. 

Combined with Flexxon’s industrial-grade engineering, X-Mask Pro is resistant to extreme environmental stress, ensuring that data not only remains secure but also intact. This makes X-Mask Pro uniquely capable of addressing both security threats and environmental risks, offering end-to-end assurance for industries and professionals who require uncompromised data integrity.

Prioritising Ease of Use

X-Mask Pro is designed to make security seamless. Users first activate card security on their PC, creating a protected environment for all future use. Once activated, the card can be inserted into any device with a microSD slot, and used normally, with contents remaining fully readable during operation.

The difference comes when the card is removed or the device is powered off. At this point, all data is automatically encrypted and hidden, making it unreadable to anyone without authorization. To access the content again, users simply authenticate and unlock the card on a PC using a secure PIN.

This process ensures that data is always available to authorized users, while remaining completely inaccessible to anyone without proper access or authorization. From professional photographers managing high-value shoots to surveillance operators safeguarding sensitive footage, X-Mask Pro delivers peace of mind through end-to-end, automated protection.

Available now in capacities from 64GB to 128GB, X-Mask Pro can be purchased online through Flexxon’s eStore or any of our global authorised retailers. The full list of partners can be found here.

Footnotes:

[1] Product image is for illustration purposes only. Actual product design may vary.

[2] X-Mask is a registered trademark of Flexxon Pte Ltd.

For media queries, please contact:

Samantha Wong

Director, Communications & Media

  1. samantha@flexxon.com
  2. (65) 9115 6968
]]>
https://x-phy.com/flexxon-launches-x-mask-pro-secure-memory-card-with-built-in-encryption-and-data-concealment/feed/ 0
Medusa Ransomware Prevention with X-PHY https://x-phy.com/x-phy-solution-medusa-ransomware/ https://x-phy.com/x-phy-solution-medusa-ransomware/#respond Thu, 25 Sep 2025 14:13:17 +0000 https://x-phy.com/?p=110003

Medusa is a Ransomware-as-a-Service (RaaS) operation that has been active since June 2021, impacting over 300 victims by March 2025. The RaaS model allows the developers to “lease out” ransomware tools to affiliates, who then launch attacks in exchange for a percentage of the ransom paid. When it was first reported in 2021, Medusa was run by a centralized developer team, but over time, it evolved into a hybrid model, where affiliates carried out attacks, with developers managing core operations, such as ransom negotiations.

Unlike other types of ransomware that simply encrypt data and demand ransom payment, the group operates under a double-extortion model, where, in addition to encrypting data and demanding ransom payment, they also threaten to publish exfiltrated data if payment is not made. The threat to publish exfiltrated data is facilitated by their public leak site called Medusa Blog, where the group shames non-paying victims by releasing stolen files.

Medusa Blog
Medusa Ransomware Attack Lifecycle

I. Initial Access

Medusa developers typically recruit initial access brokers (IABs) in cybercriminal forums and marketplaces. The affiliates are offered a percentage of the ransom paid on successful attacks with the opportunity to work exclusively for Medusa. Medusa affiliates are known to utilize phishing campaigns and the exploitation of unpatched software vulnerabilities to gain initial access into the targeted organizations’ networks.

Phishing Campaigns
The phishing campaign run by the affiliates is meant to steal credentials or trick users into executing malicious payloads. They achieve this by sending deceptive emails tailored to lure unsuspecting users by impersonating trusted parties such as IT departments or HR. The emails either contain malicious attachments, prompt users to enter login credentials, or trick them into running scripts. A successful phishing campaign is marked by the adversaries gaining access to critical credentials and establishing an initial foothold when the victim executes malware. Once access is achieved, Medusa affiliates quickly escalate privileges and move laterally.

Exploitation of Unpatched Vulnerabilities
Another common technique used by Medusa affiliates to gain initial access is the exploitation of unpatched vulnerabilities in the public-facing applications, such as web apps, VPNs, and remote management tools. The IABs favor this technique because it is silent and does not require user interaction like phishing. Additionally, since they specialize in exploiting such vulnerabilities, they have access to sophisticated tools such as Metasploit that simplify the exploitation process. Some of the Common Vulnerabilities Exposures (CVEs) exploited by the Medusa group include CVE-2024-1709 and CVE-2023-48788. The group exploited CVE-2024-1709, the ScreenConnect Authentication Bypass vulnerability, shortly after its disclosure in early 2024, allowing them to gain full remote access to target systems.

II. Discovery and Enumeration

Once inside the network, the Medusa group takes time to study the environment, learning everything they can. The attackers use this phase to identify high-value targets, map out the network structure, and look for paths to escalate access or spread laterally. This helps them maximize damage and ensure a successful encryption. Common tools and commands used in discovery and enumeration include:

III. Defense Evasion and Obfuscation

After breaching a network and conducting reconnaissance, Medusa ransomware affiliates take deliberate steps to hide their activity and avoid being detected. This allows them to remain undetected long enough to disable security tools, exfiltrate data, and carry out encryption. The attackers achieve this by disabling any security software on the target networks, living off the land (LOTL), renaming payloads, and using a custom loader.

Disabling Security Software

Medusa affiliates disable security tools before encryption to ensure there are no obstacles that could hinder their execution. They commonly use task-killing commands (taskkill /f /im <process>.exe) to stop antivirus, EDR, and backup agents. They target Windows Defender, Sophos, Trend Micro, Veeam, and backup services. They also tamper with registry keys to permanently disable defenses.

Sample list of security services for termination

Living off the Land (LOTL)

Instead of deploying flashy custom tools (which might trigger alerts), Medusa abuses legitimate Windows utilities to facilitate attacks. For instance, tools like cmd.exe, powershell.exe, and rundll32.exe are used for stealthy system manipulation. This allows them to perform malicious actions using trusted processes, making it less likely to be flagged by EDR.

Renaming Payloads
Attackers rename payloads, encode scripts, or compress files to avoid detection. The common extensions used for these purposes include .zip or .7z extensions. They may also use Base64 encoding, PowerShell obfuscation, or custom packing to avoid signature-based detection.

Using Custom Loader

Medusa ransomware uses a loader that decrypts and runs the main ransomware payload in memory. This reduces disk-based artifacts and bypasses file-based antivirus detection. This enables them to deploy ransomware at scale and operate for days or weeks without being detected.

IV. Command and Control (C2) Setup

Medusa actors use Ligolo and Cloudflared to support command and control (C2) and evade detection. Ligolo is a reverse tunneling tool used to create secure connections between a compromised host and a threat actor’s machine. Cloudflared is used to securely expose applications, services, or servers to the internet via Cloudflare Tunnel without exposing them directly. This gives attackers total control of the battlefield to execute their intentions without being detected.

V. Credential Access & Lateral Movement

This step involves going from a single compromised user to company-wide access and getting more access. An attacker steals one admin credential and turns it into full domain control, going from a single compromised user to company-wide encryption and extortion. This transforms a small compromise into a full-blown network-wide attack, allowing the attackers to encrypt servers, steal data, and increase ransom pressure.

Medusa operators use OS Credential Dumping to extract usernames, passwords, and authentication tokens from compromised machines. OS Credential Dumping allows them to extract usernames and passwords stored in memory on Windows machines from LSASS. LSASS (Local Security Authority Subsystem Service) is a Windows process responsible for storing credentials in memory. When an attacker accesses LSASS, they dump all stored credentials, stealing admin credentials to enable them to spread across the network silently.

Example Workflow:
  1. Gain admin access to a machine (via phishing or exploit)
  2. Use procdump to create a memory dump of LSASS
  3. Transfer the .dmp file to the attacker’s system
  4. Run Mimikatz to extract usernames, passwords, and hashes

Once attackers have valid credentials, they log in to target systems via Remote Desktop Protocol (RDP) and begin moving from system to system. RDP is often enabled on internal systems, giving attackers a broad attack surface. With administrative rights, they use tools like PsExec or wmic to execute commands and install ransomware remotely across multiple systems at once.

When attackers gain access to the Active Directory domain controller, they essentially own the network. This means that they can create new admin accounts, disable security policies, and push ransomware to every system via Group Policy Objects (GPO). Medusa affiliates often disable logging, tamper with logs, or destroy artifacts to cover their tracks after lateral movement.

VI. Exfiltration and Encryption

Once Medusa ransomware affiliates have gained initial access to the network, moved laterally, and obtained administrator-level access, they initiate the data exfiltration process. This involves copying sensitive data from internal systems to external infrastructure controlled by the attacker. They do this before encryption to maximize pressure on victims. “If you don’t pay, we’ll leak your data” is the central threat of Medusa’s extortion strategy. During the exfiltration process, the attackers target:

Example workflow

1. Attackers bundle stolen files into .zip or .7z archives using tools like WinRAR and 7-Zip.

2. They then use Command-Line Upload Tools like Rclone, MegaCMD, or curl to exfiltrate data to a dedicated attacker-controlled infrastructure

Once data is exfiltrated, Medusa affiliates launch the ransomware payload to encrypt files across the network, rendering them inaccessible to the victim without a decryption key.

How the Medusa Encryption Works

Files on infected machines are encrypted using AES (Advanced Encryption Standard). The AES key is then encrypted with RSA and communicated post-payment. Encrypted files typically have a custom extension, .MEDUSA. Ransom notes (!!!READ_ME_MEDUSA!!!.txt) are dropped in affected directories. The ransom notes contain:

  • Instructions for payment
  • Links to dark web negotiation sites
  • A threat to publish exfiltrated data

VII. Extortion

The Medusa ransom note demands victims make contact within 48 hours via either a Tor browser-based live chat or an end-to-end encrypted instant-messaging platform. If the victim does not respond to the ransom note, Medusa actors will reach out to them directly by phone or email. On Medusa Blog, the attackers display their victims’ ID alongside countdowns to the release of information. They also post ransom demands with direct hyperlinks to Medusa-affiliated cryptocurrency wallets. At this stage, Medusa concurrently advertises the sale of the data to interested parties when the countdown timer ends. Victims can additionally pay $10,000 USD in cryptocurrency to add a day to the countdown timer.

Medusa Ransomware Note

How X-PHY Protects Against Medusa Ransomware

Medusa is a highly sophisticated ransomware that uses phishing, vulnerability exploits, credential theft, and double extortion. Unlike traditional ransomware protection tools that rely heavily on software, X-PHY embeds AI-driven protection directly into the SSD, the ultimate target of ransomware attacks. This means that even when all the other defenses have been bypassed, X-PHY will be the last line of defense standing to protect your data right where it resides.

The critical steps involved in the operations of Medusa group will be instantly detected and subsequently stopped by X-PHY. For instance, the attack involves disabling security tools and exfiltrating sensitive data before commencing encryption. With X-PHY, all these will not be successful because the X-PHY AI is embedded in the hardware, watching out for any abnormal data access patterns and stopping threats before they cause any real harm.

For instance, when Medusa attempts to exfiltrate sensitive data, X-PHY’s AI will detect the abnormally high volume of read operations, triggering SSD lockdown. This will instantly block data transfer and send an alert to the security team about the attempted exfiltration. Blocking the exfiltration phase of Medusa ransomware and locking down the SSD halts the rest of the Medusa processes, thus ensuring the organization’s sensitive data remains protected from the attackers.

The most significant phase of the Medusa ransomware involves encrypting files using AES, appending a .MEDUSA extension, and making the data inaccessible. X-PHY detects ransomware encryption patterns through advanced AI models analyzing how files are accessed and written. Once an attack has been detected, X-PHY interrupts the process of encryption in real time and locks the drive instantly. This will ensure that sensitive data is protected from unauthorized encryption, halting the entire Medusa process.

Why X-PHY is Uniquely Effective Against Medusa
  • X-PHY’s hardware-level protection means that the solution doesn’t rely on OS or AV software that Medusa can disable.
  • AI-powered anomaly detection gives near 100% detection of unusual patterns even for zero-day threats.
  • Immediate response by shutting down and locking the drive prevents encryption and data theft in real time.
  • Zero Trust architecture ensures access is always verified.
]]>
https://x-phy.com/x-phy-solution-medusa-ransomware/feed/ 0
Trust is Still Mission Possible in the Age of Deepfakes https://x-phy.com/trust-is-still-mission-possible-in-the-age-of-deepfakes/ https://x-phy.com/trust-is-still-mission-possible-in-the-age-of-deepfakes/#respond Wed, 17 Sep 2025 06:57:20 +0000 https://x-phy.com/?p=109710 “A video of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.”

This definition of a deepfake has now worked its way into the Oxford English Dictionary, reflecting how mainstream and pervasive deepfakes have become. If anything, it demonstrates that the threat is here to stay. 

In the deepfake conversation, it’s important to distinguish that not all AI-generated content is created equal. Some uses are creative and helpful, while others are deceptive and harmful. The distinction lies in intent.

To understand the difference, let’s step into a carnival.

AI-Generated Content – The Magician

On one side of the carnival tent, a magician conjures a dazzling, original painting out of thin air. It’s trickery, but you’re in on the fun. The magician winks, and you cheer -entertained, inspired, maybe even amazed.

That magician represents AI-generated content.

AI models like ChatGPT, DALL·E, DeepSeek, Grok and a whole host of other AI tools enable the creation of content, whether that’s a surreal illustration or a cool video clip of Godzilla working in your office. Their purpose? Creativity, productivity, empowerment, and fun.

This is where the category of harmless deepfakes fit in. TikTok face-swap filters, parody videos where celebrities “sing” unexpected songs, or playful experiments like the Tom Cruise parody are entertaining precisely because the audience understands they’re not real. They belong in the magician’s act — fun illusions made to amuse, not to deceive.

The intent here is clear: whether it’s generative AI or parody-style deepfakes, the purpose is creativity, inspiration, or laughter — not harm.

Malicious Deepfakes – The Con Artist

On the other side of the carnival, a con artist steps on stage with a painting for auction — but it’s a forgery. They pass it off as priceless, tricking the crowd into believing it’s real — for his own profit.

That’s the world of malicious deepfakes.

They rely on the very same AI tools and technologies that power fun, creative, and educational applications. The difference lies in intent. Where AI-generated content aims to entertain or inspire, malicious deepfakes are engineered to deceive.

Whether it’s impersonating a CEO to authorize fraudulent wire transfers, fabricating political speeches to sway public opinion, or creating non-consensual content to damage reputations, the con artist’s goal is always the same: profit, manipulation, or harm.

Here, the intent isn’t to entertain — it’s to deceive. And that’s what makes malicious deepfakes so dangerous: they erode trust at its core.

Case Study: The Tom Cruise Deepfake

Deepfake Tom Cruise
All images above are deepfake videos meant to impersonate Tom Cruise — none are the actual actor.

In 2021, TikTok exploded with videos of “Tom Cruise” — playing golf, telling stories, even doing magic tricks. Millions of people were captivated.

But here’s the twist: it wasn’t Tom Cruise.

The creator, known as @deeptomcruise on TikTok, is a skilled impersonator who studied Tom’s voice, gestures, and mannerisms. Combined with faceswap AI and post-production editing, the result was a deepfake so convincing that even seasoned viewers did a double take.

This was a magician’s trick — a parody, not a scam. But it highlighted how thin the line can be. The very same techniques that made millions laugh could just as easily be misused to mislead millions more.

X-PHY Deepfake Detector: Seeing What Humans Can’t

That’s where the X-PHY Deepfake Detector comes in. A tool that spots and surfaces manipulated content that is invisible to the human eye. It detects subtle signs of manipulation, such as unnatural micro-expressions, lip-sync mismatches, and synthetic audio fingerprints.

All of this happens in real time, on-device, with evidence logging built in. No cloud uploads. No privacy trade-offs. Just secure, trustworthy detection when and where it matters most.

Making digital trust a possibility

From carnival tricks to viral parodies, AI-generated content and deepfakes are reshaping the way we experience digital media. AI-supported creativity can inspire us, but malicious deepfakes threaten to erode trust at its core.

There is no denying that deepfakes have gone mainstream. The Tom Cruise case, amongst many others, show us how convincing they can be. And X-PHY Deepfake Detector shows us that spotting them isn’t Mission Impossible.

Sign up for a 7-Day free trial or drop us a message to learn more about enterprise pricing.

 

]]>
https://x-phy.com/trust-is-still-mission-possible-in-the-age-of-deepfakes/feed/ 0
Fix The Risk, Don’t Ban The Tool: How To Secure GenAI At Work https://x-phy.com/fix-the-risk-dont-ban-the-tool-how-to-secure-genai-at-work/ https://x-phy.com/fix-the-risk-dont-ban-the-tool-how-to-secure-genai-at-work/#respond Wed, 10 Sep 2025 04:44:38 +0000 https://x-phy.com/?p=109497 GenAI is transforming the way we work – making everyday tasks faster and more efficient. 

But with convenience comes hidden risks. Employees may unknowingly expose sensitive corporate data when using GenAI tools, creating new avenues for insider threats.

In a recent Forbes Technology Council article, our CEO & Co-founder Camellia Chan explains why the solution is not to ban GenAI in the workplace. Instead, organisations need to fix the risks, not the tool.

Key Highlights from the Article

  1. Shadow AI creates insider threats: Well-intentioned employees often use GenAI on personal accounts, but this “shadow AI” usage can leak sensitive data outside IT’s visibility.
  2. Traditional defenses fall short: Software-based tools like DLP and behavioral analytics are essential, but they can miss risks – especially when compromised credentials make malicious activity look legitimate.
  3. Hardware-level zero trust is the missing piece: Embedding security directly at the physical layer, within the memory storage, enables autonomous, real-time defense. By detecting unusual activity such as mass data transfers – even after a breach – hardware-level security stops threats before data escapes. 
  4. A holistic strategy is needed: The path forward is not banning GenAI but creating a GenAI-aware security strategy that blends governance, employee education, monitoring, and hardware-based protection.

Explore how X-PHY brings this vision to life with our patented AI-embedded hardware security solutions, available now on our X-PHY eStore.

Read the Full Article: Fix the Risk, Don’t Ban the Tool: How To Secure GenAI At Work on Forbes.

]]>
https://x-phy.com/fix-the-risk-dont-ban-the-tool-how-to-secure-genai-at-work/feed/ 0
3 Intriguing Conversations from FMS 2025: Trust Meets Speed in Memory Innovation https://x-phy.com/3-intriguing-conversations-from-fms-2025-trust-meets-speed-in-memory-innovation/ https://x-phy.com/3-intriguing-conversations-from-fms-2025-trust-meets-speed-in-memory-innovation/#respond Mon, 25 Aug 2025 07:08:27 +0000 https://x-phy.com/?p=108928

The X-PHY Team at FMS 2025, (from L-R) Jaime Coreano, Camellia Chan, Jenevieve Que, Pradosh Verlekar

“In the race for speed, we can’t forget the race for trust.”

That was the biggest takeaway our Product Director, Pradosh Verlekar, had from his very first industry event with X-PHY Inc.

Together with CEO, Camellia Chan, and other members of the team, Pradosh attended his maiden event with X-PHY Inc at the Future of Memory and Storage (FMS), held between August 5–7 2025, at the Santa Clara Convention Center in California’s Silicon Valley – the heart of the global technology ecosystem.

A marquee event for the memory and storage community, FMS is the world’s largest international showcase of its kind. Now in its 19th year, the summit brings together leading companies, researchers, and innovators to unveil the latest technologies, products, and trends shaping the future.

For X-PHY, FMS provides the perfect stage to spotlight how memory is no longer just about performance or capacity, but an essential frontier for intelligent, autonomous, and dynamic cybersecurity.

In this article, we revisit FMS 2025 through Pradosh’s lens – recounting the conversations that stuck with him, the lessons he carried forward, and how the conversation at this exclusive event highlighted the need for balance between speed and trust.

3 conversations that echoed our sentiments

At the X-PHY booth, where the team showcased the X-PHY SSD alongside Flexxon’s industrial storage solutions, Pradosh witnessed the industry’s pulse shift from speed to trust. Here are three standout moments:

  • From slowdown to speed-up
A storage architect approached, skeptical that cybersecurity meant compromise. “Security always slows us down,” he said. By the end of the chat, he was sold on X-PHY’s hardware-level protection. His key takeaway? Secure storage doesn’t bottleneck performance – it accelerates trust, enabling faster deployments.
  • Trust fuels collaboration
A European systems integrator raved about the Community-Based Root of Trust, presented by our US Sales Director, Jaime Coreano. He saw it not as “extra security” but as a catalyst for innovation. “When every link in the chain trusts the data, we innovate faster,” he noted.
  • Security by design as the default

A startup founder came for Gen5 throughput specs but left buzzing about anomaly detection at the storage layer. He realized: security isn’t a bolt-on; it’s a design choice that builds scalable, confident products. Pradosh summed it up by sharing, “At an event obsessed with ‘bigger, faster,’ people leaned in when we talked safer, smarter, and more trusted.” This shift underscores an essential but often overlooked truth: performance and protection are two sides of the same coin.

FMS theatre
Pradosh on stage at the FMS theatre speaking with the audience about X-PHY’s hardware-based holistic and proactive security philosophy

Pradosh summed it up by sharing, “At an event obsessed with ‘bigger, faster,’ people leaned in when we talked safer, smarter, and more trusted.” This shift underscores an essential but often overlooked truth: performance and protection are two sides of the same coin. Watch the full video on-demand HERE.

Getting to know the team

For Pradosh, FMS2025 was not just about meeting customers and partners, it was also his first time spending full days on the ground with the X-PHY team. Those moments left just as strong an impression as the event itself:

  • Camellia Chan, CEO: Even with a packed schedule of meetings, media briefings, and juggling the global team’s demands, Camellia still carved out time for her daily 5km runs – she even did 27 push ups in a row after day 2 of the event. That same discipline and stamina fuels how she leads the team: focused, prepared, and ready to make every conversation count.
  • Jaime Coreano, US Sales Director: A former windsurfer, Pradosh notes that Jaime brings this same precision and balance to the booth as he did to the waves. Whether explaining the details of community-based root of trust or walking a customer through our range of products, he made sure every message landed with clarity and precision.
  • Jenevieve Que, Business Strategist: Pradosh came to learn that Jenevieve has travelled to over 50 countries. And to that he notes: Jenevieve approaches every interaction like an explorer. She has a knack for drawing out new perspectives from people, uncovering opportunities the team might have missed otherwise.

Trust as the takeaway

One partner summed it up perfectly: “The future of storage isn’t just about moving data faster. It’s about knowing you can trust every bit you move.” In a data-driven world, speed without trust is chaos. Leaders need data that’s fast, accurate, and reliable. 

X-PHY’s mission at FMS? To ignite this conversation across the memory and storage community. 

As Pradosh looked back on his first event with X-PHY, he recognised a clear thread connecting all conversations together:

“In the race for speed, we can’t forget the race for trust. Seeing that vision resonate with engineers and executives alike made this event a milestone not just for me, but for X-PHY’s role in shaping the future of secure storage.”

Join the Secure Storage Revolution

FMS 2025 showed us that trust is the new speed. Want to dive deeper into how X-PHY is shaping secure storage? follow us on LinkedIn for the latest insights or contact us to explore our solutions.

]]>
https://x-phy.com/3-intriguing-conversations-from-fms-2025-trust-meets-speed-in-memory-innovation/feed/ 0
Hackers Exploiting Microsoft Flaw to Attack Governments, Businesses https://x-phy.com/hackers-exploiting-microsoft-flaw-to-attack-governments-businesses/ https://x-phy.com/hackers-exploiting-microsoft-flaw-to-attack-governments-businesses/#respond Mon, 28 Jul 2025 03:17:42 +0000 https://x-phy.com/?p=108462 When Microsoft urges its users to download a security update, it usually means two things:

  1. A breach has already happened
  2. Many more are still vulnerable

That’s exactly what happened on July 19, when Microsoft issued an urgent alert about two zero-day vulnerabilities.

At the time of writing:

On July 19 2025, Microsoft issued an urgent alert for two zero-day vulnerabilities affecting on-premises SharePoint servers, now tracked as CVE-2025-53770 and CVE-2025-53771, and collectively dubbed ToolShell. These vulnerabilities do not impact SharePoint Online but pose a severe risk to organizations running on-prem SharePoint instances.

  1. CVE-2025-53770 enables unauthenticated remote code execution (RCE) by exploiting unsafe deserialization, allowing attackers to gain complete control of compromised servers. It carries a critical CVSS score of 9.8/10 and is already being actively exploited in global campaigns targeting government, telecom, and software sectors.
  2. CVE-2025-53771 is a spoofing/path traversal vulnerability allowing attackers to bypass authentication via improper header validation. When chained with the first vulnerability, it enables the full ToolShell exploit chain.

The ToolShell attack chain has been used to:

  1. Gain access, steal credentials, and in some cases, deploy ransomware
  2. Extract sensitive cryptographic keys
  3. Use in-memory payloads that evade traditional defenses by avoiding file-based artifacts

Researchers and Microsoft have identified three active attack clusters using evolving tactics and payloads to avoid detection. Microsoft has released emergency out-of-band patches for SharePoint Subscription Edition and 2019 (with 2016 patches pending). 

Security agencies urged immediate patching, key rotation, and enhanced endpoint monitoring.

In short, ToolShell is an evolving, active, and critical threat to on-prem SharePoint deployments.

By the time Microsoft’s alert went out, the first wave of breaches had already begun on July 18, with hackers planting shells that leaked sensitive key material. Even after patching, stolen keys could allow attackers to impersonate legitimate users, making this far more dangerous than a typical “update and you’re safe” incident.

In a comment to Security Boulevard, our CEO, Camellia Chan, shared, “No amount of patching or perimeter defense can guarantee safety when trust assumptions are baked into software architecture. Organizations need to embed protection directly in hardware to close the gap software alone can’t.”

Cybersecurity agencies in the U.S., Canada, and Australia warned that this is not a “patch-and-forget” problem. 

Experts recommend:

  1. Patch immediately, but never assume you’re safe
  2. Investigate for compromise both before and after updates
  3. Harden defenses with zero-trust, hardware-level protections that detect and block threats in real time

The ToolShell campaign is a wake-up call for anyone running exposed on-premises systems. 

Read the full article on Security Boulevard here: https://securityboulevard.com/2025/07/hackers-exploiting-microsoft-flaw-to-attack-governments-businesses/

To learn more about how our solutions can support your cybersecurity strategy, drop us a message at info@x-phy.com, and let’s get started!

]]>
https://x-phy.com/hackers-exploiting-microsoft-flaw-to-attack-governments-businesses/feed/ 0