Executive Summary
The Australian cyber threat landscape has seen significant volatility in the last 24 hours. The primary focus for security teams today is the catastrophic "React2Shell" vulnerability (CVE-2025-55182), which is actively being exploited to deploy cryptocurrency miners and backdoors across Australian cloud environments. Simultaneously, the healthcare and education sectors are under heavy fire, with a major breach disclosed by the University of Sydney and a confirmed ransomware attack on fertility provider Genea.
Here is your daily deep dive into the threats impacting Australian organisations.
Critical Vulnerability Alert: "React2Shell" (CVE-2025-55182)
- Severity: Critical (CVSS 10.0)
- Affected Systems: React Server Components (versions 19.x), Next.js, and downstream web frameworks.
- The Threat: A maximum-severity remote code execution (RCE) flaw allows unauthenticated attackers to execute arbitrary code via malicious HTTP requests.
- Status: Active Exploitation. Threat actors are currently scanning for vulnerable Australian SaaS and eCommerce platforms. We have observed the deployment of XMRig miners and the 'COMPOOD' backdoor. With 39% of global cloud environments estimated to be vulnerable, this is a "patch now" event.
- Action: Immediate patching of React and Next.js instances is mandatory. WAF rules should be tuned to block suspicious serialised payloads.
Sector Highlights
Healthcare: Ransomware & Insider Negligence
- Genea Breach: One of Australia’s largest fertility service providers, Genea, has confirmed a cyber attack. The Termite ransomware gang has claimed responsibility, allegedly stealing 700GB of sensitive patient data, including medical histories and diagnostic results. This group is known for using a modified version of the Babuk ransomware.
- NSW Health Audit: A concerning audit released yesterday revealed that clinicians in NSW are routinely bypassing cyber security controls to save time. The report highlighted a "normalisation of non-compliance," with staff sharing passwords and using personal devices for patient data—a significant vector for potential credential harvesting attacks.
Education / EdTech: Code Repository Compromise
- University of Sydney: Yesterday (19 December), the University of Sydney disclosed a data breach affecting over 20,000 staff and affiliates. Hackers accessed an internal code library used by IT teams. While the breach was contained to a single platform, it exposed historical personal data. This incident highlights the growing trend of targeting non-production environments (DevOps pipelines) to pivot into core systems.
Government & Defence: Supply Chain Woes
- Supply Chain Risks: Following the recent updates on the IKAD Engineering breach, the Australian Signals Directorate (ASD) continues to warn of "KillSec" and other groups targeting the defence supply chain.
- Fortinet Alert: The ACSC has issued a critical alert regarding CVE-2025-59718 and CVE-2025-59719. These vulnerabilities allow authentication bypass in FortiCloud SSO. Government agencies and contractors utilising Fortinet edge devices must review their networks for unauthorised access immediately.
FinTech & SaaS
- API Security: With the React2Shell vulnerability, FinTech platforms utilising modern JavaScript frameworks are at heightened risk. We are seeing increased scanning activity targeting API endpoints that utilise server-side rendering.
- Vroom by YouX: The sector remains on high alert following the Vroom incident, with regulators pushing for stricter third-party risk management as "fintechs are being breached" through their vendors.
Technical Focus: Web & Cloud
- Windows Zero-Day: Microsoft’s December patch Tuesday addressed CVE-2025-62221, a privilege escalation flaw in the Windows Cloud Files Mini Filter Driver. Attackers are chaining this with RCE bugs to gain SYSTEM privileges.
- Chrome WebGPU: Google has patched CVE-2025-14765, a use-after-free vulnerability in the WebGPU API. Staff browsing the web can trigger this exploit simply by visiting a malicious page, making browser updates critical for corporate fleets.
Threat Actor Profile: Termite
- Origin: Likely financially motivated; tools suggest overlap with Babuk source code.
- Tactics: Double extortion (encryption + data leak). They target sectors with high uptime pressure (Healthcare, Utilities).
- Current Status: Actively leaking data from Australian healthcare victims on the dark web.
Contact us for a quote for penetration testing service or adversary simulation.

