Threat Report 157
This week’s report: new phishing campaign abusing Google services to bypass email security controls; a critical vulnerability in widely used web technologies that exposes many public-facing websites and enterprise applications; and a severe flaw in an IBM platform commonly used by large organisations. Further details and recommended actions are outlined below.
Google Cloud Phishing Attack Bypasses Email Security
Cybercriminals have found a clever way to send phishing emails that look like they come from Google itself. They are abusing a feature in Google Cloud called Application Integration to send malicious emails from a legitimate Google email address. These emails look like normal notifications, such as voicemail alerts or file access requests, which tricks both people and email security systems designed to block fake messages.
- Warn employees about this new phishing technique and remind them to be cautious even with emails from trusted senders.
- Advise staff to hover over links before clicking to see the real destination address.
- Ensure that any requests for credentials or sensitive information are verified through a separate communication channel.
Critical ‘React2Shell’ Flaw Affects Web Servers and IoT Devices
- Identify if any of your web applications or those of your suppliers use React Server Components or Next.js.
- Update to a patched version immediately if you are using an affected version.
- Ask your software suppliers if they have been affected by this vulnerability and what steps they have taken to mitigate the risk.
Severe Authentication Flaw in IBM API Connect
IBM has revealed a critical security flaw (CVE-2025-13915 ) in its API Connect product, which is a system used by many large companies to manage their Application Programming Interfaces (APIs). APIs are the connections that allow different software applications to talk to each other. This vulnerability has a severity score of 9.8 out of 10 and allows a remote attacker to bypass security checks and gain unauthorised access to the application.
- If your organisation uses IBM API Connect versions 10.0.8.0 through 10.0.8.5 or 10.0.11.0, you must apply the security fix provided by IBM immediately.
- As a precaution, IBM also advises disabling the self-service sign-up feature on the Developer Portal if it is enabled.
- Review access logs for any unusual or unauthorised activity related to your API management platform.
Want help staying ahead of threats like these? Contact Periculo about our Threat Intelligence services.
%20(1)%20(1).png?width=309&height=69&name=image-001%20(2)%20(1)%20(1).png)