Subscribe

Social Media Links

Insights

 | 3 minute read

Ankura CTIX FLASH Update – December 19, 2025

Malware Activity

Hidden Malware Campaigns and Data-Stealing Tools

Recent cybersecurity reports reveal alarming tactics used by cybercriminals to spy on and steal from users. One campaign, called GhostPoster, hides malicious JavaScript code inside logos of popular Firefox extensions, such as VPNs and ad blockers, many with over 50,000 downloads. These covert scripts can monitor browsing, hijack affiliate links, and inject tracking codes, all without the user knowing, by using clever techniques like steganography to hide the malicious code in images. While it does not steal passwords directly, it can still compromise privacy and become more dangerous if it downloads harmful content later. Additionally, an emerging malware tool called SantaStealer is marketed online, targeting personal data like passwords, cookies, and chat logs from browsers and messaging apps. It operates covertly to avoid detection but remains a threat, especially when spread through phishing or malicious downloads. These incidents highlight the importance of being cautious when installing browser add-ons or clicking on suspicious links and underscore the ongoing need for strong security practices to protect personal information from hidden cyber threats.


Threat Actor Activity

Venezuela’s Oil Giant, PDVSA, Suffers Cyberattack Amid Rising US Tensions

Venezuela’s state-owned oil company, Petroleos de Venezuela (PDVSA), recently suffered a cyberattack that disrupted its export operations, although the company claims the impact was limited to administrative systems. The attack comes amid heightened tensions between Venezuela and the U.S., following the seizure of a Venezuelan oil tanker by U.S. authorities. PDVSA and the Venezuelan government have accused the U.S. and domestic conspirators of orchestrating the attack to undermine national stability and seize control of Venezuelan oil resources. Despite PDVSA’s assertions that operational areas were unaffected, internal sources indicate that systems managing the country’s main crude terminal remain offline, halting oil cargo deliveries. The company instructed staff to disconnect from the network and shut down computers as a precaution. Sources report that oil output, refining, and domestic distribution were not impacted, but export operations have been severely disrupted, with more than eleven (11) million barrels of oil stuck on vessels in Venezuelan waters. The attack is believed to be a ransomware incident, with malicious software encrypting files and potentially stealing data. PDVSA has reportedly recovered from the attack, but ongoing effects include suspended loading instructions and tankers making u-turns.


Vulnerabilities

Active Exploitation of Fortinet FortiCloud SSO Authentication Bypass Vulnerabilities

📧 Never Miss a Briefing

Stay informed and secure. Subscribe to Ankura’s Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure. 

© Copyright 2025. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in
I need help with