
π―A group of hackers found a way to sneak into a government computer system using a special trick that lets them stay inside even after the system gets updated. They used a sneaky program called FIRESTARTER, which is hard to get rid of, so the government has to act fast to fix it.
What Happened
In September 2025, a U.S. federal agency was breached by state-sponsored hackers exploiting vulnerabilities in Cisco firewalls, specifically through the use of a malware called FIRESTARTER. This backdoor enables the attackers to maintain access to compromised devices without needing to re-exploit the original vulnerabilities, even after patches are applied. CISA confirmed that suspicious connections were detected on a Cisco Firepower device, leading to the discovery of FIRESTARTER during a forensic engagement.
The Flaw
The breach was facilitated by two vulnerabilities: CVE-2025-30333, a remote code execution flaw in the VPN web server component, and CVE-2025-20362, which allowed unauthorized access. These vulnerabilities were patched by Cisco in September 2025, but the persistence mechanism of FIRESTARTER allows it to survive firmware updates and standard reboots, making it particularly dangerous.
What's at Risk
FIRESTARTER manipulates the Cisco Service Platform mount list, ensuring that it can reinstate itself after a reboot. This means that a standard software reboot does not remove the malware, and only a hard rebootβphysically disconnecting the device from powerβcan clear it from memory. The malware can intercept network requests used for VPN authentication, providing attackers with a backdoor into the device and exposing sensitive information, including administrative credentials and encryption keys.
Patch Status
CISA and Cisco have issued updated advisories and directives to federal agencies, mandating audits of their Cisco firewall infrastructure and submission of device memory snapshots for analysis. Cisco has released software updates to address the persistence mechanism, but they recommend reimaging affected devices if compromise is suspected.
Immediate Actions
Federal agencies are required to confirm the completion of malware checks by midnight on Friday and provide an inventory of Cisco Firepower devices by May 1. CISA has emphasized that previous security updates alone are insufficient to remove the malware or eliminate the threat actors from compromised systems. Agencies must follow the updated directives to ensure full remediation.
Source Perspectives
- Technical: The malware FIRESTARTER is designed to survive standard security measures, posing a significant challenge for remediation efforts. (Source: CyberScoop)
- Business Impact: The persistence of FIRESTARTER highlights the vulnerabilities in network perimeter devices, which are critical for enforcing security boundaries in organizations. (Source: CyberScoop)
- Policy: The joint advisory from CISA and the UKβs NCSC underscores the international cooperation in addressing state-sponsored cyber threats targeting government and critical infrastructure. (Source: CyberScoop)
The persistence of FIRESTARTER poses a unique challenge for cybersecurity professionals, as traditional patching methods may not suffice to eliminate the threat. Organizations must adopt more comprehensive remediation strategies.





