Executive Summary
As we approach the holiday shutdown period, the Australian cyber threat landscape has intensified significantly over the last 24 hours. The standout threat is the rapid weaponisation of the React2Shell (CVE-2025-55182) vulnerability, which is currently being exploited in the wild by state-sponsored actors and botnets alike. Additionally, the University of Sydney has confirmed a data breach impacting historical records, reminding the Education sector that non-production environments remain a critical risk vector.
Here is your daily deep dive into the threats shaping the Australian cyber security environment today.
Top Priority: Critical Web Application Vulnerabilities
1. The "React2Shell" Crisis (CVE-2025-55182)
Sectors Impacted: SaaS, FinTech, eCommerce, Government The most critical threat facing Australian organisations today is CVE-2025-55182, dubbed "React2Shell". This critical Remote Code Execution (RCE) vulnerability affects React Server Components (RSC) via unsafe server-side deserialisation.
- Status: Active Exploitation. Telemetry indicates over 127 million exploit attempts globally in the last week, with Australian infrastructure heavily targeted in the last 24 hours.
- Attack Vector: Threat actors are sending crafted payloads to vulnerable endpoints to execute arbitrary code without authentication.
- Observed Campaigns:
- "ReactOnMyNuts": A new botnet campaign deploying XMRig cryptominers and Mirai variants.
- State-Sponsored Activity: Intelligence suggests Chinese-affiliated groups are leveraging this flaw for initial access into critical networks.
- Action Required: Immediate patching is mandatory. Web Application Firewalls (WAF) should be tuned to block suspicious serialised objects in HTTP bodies.
2. Fortinet FortiCloud SSO Bypass (CVE-2025-59718 & CVE-2025-59719)
Sectors Impacted: Healthcare, Government, IoT The ASD’s ACSC has flagged critical vulnerabilities in Fortinet products allowing FortiCloud SSO Login Authentication Bypass.
- Risk: Attackers can bypass authentication to gain administrative access to managed network devices.
- Impact: This is particularly dangerous for distributed networks in Healthcare and Retail relying on SD-WAN and cloud management.
Sector-Specific Intelligence
🎓 Education / EdTech
University of Sydney Data Breach Yesterday (17 December 2025), the University of Sydney notified staff and students of a cyber incident involving unauthorised access to an online IT code library.
- The Breach: While the environment was primarily for development, it contained "historical data files" with personal information.
- Analysis: This highlights a classic "Shadow IT" and DevOps failure—production data bleeding into testing environments. EdTech providers must rigorously enforce data sanitisation in non-production pipelines.
💳 FinTech & SaaS
ThinkMarkets Alleged Breach Reports have emerged of an alleged data breach targeting online trading broker ThinkMarkets.
- Threat Actor: The data has reportedly been published by the RansomHub group.
- Trend: FinTech remains a primary target for extortion-based attacks due to the high sensitivity of client financial data.
🏥 Healthcare
Ransomware Persistence Healthcare providers are urged to maintain high vigilance as we enter the holiday season—a statistically high-risk period for ransomware attacks.
- Specific Threat: The MediSecure incident fallout continues to influence policy, but new campaigns targeting IoMT (Internet of Medical Things) devices via the Fortinet vulnerabilities mentioned above are a pressing concern.
🤖 AI Systems
New Risk Vectors
- OpenAI Warning: New models released this month have been flagged as presenting "high" cyber risks regarding their ability to aid in sophisticated phishing and exploit generation.
- Defence: CrowdStrike has launched Falcon AIDR to secure AI prompts, reflecting the growing necessity to secure the inputs and outputs of Large Language Models (LLMs) used in enterprise environments.
Seasonal Scam Alert: "Australia Post" Smishing
With Christmas delivery deadlines looming, a massive wave of SMS phishing (smishing) campaigns impersonating Australia Post has been detected. These messages utilise fake "delivery failure" notifications to steal credit card details. Organisations should remind staff not to use corporate devices for personal shopping verifications to reduce the attack surface.
Recommendations for the Next 24 Hours
- Audit for React (CVE-2025-55182): Identify all public-facing applications using React Server Components and apply patches or WAF mitigations immediately.
- DevOps Hygiene: Review all code repositories (GitHub, GitLab, internal) for hardcoded credentials or unmasked production data, following the lesson from the University of Sydney incident.
- Fortinet Patching: Ensure all FortiCloud-managed devices are updated to the latest firmware to prevent SSO bypass.
Contact us for a quote for penetration testing service or adversary simulation.

