top of page

Cisco Is Having the Worst Week in Cybersecurity History. Here's the Scoreboard.

  • Writer: Patrick Duggan
    Patrick Duggan
  • Apr 3
  • 4 min read

It's Thursday, April 3. ShinyHunters' deadline to dump Cisco's data expires today. This is the fifth simultaneous crisis hitting Cisco in seven days. Nobody's had a week this bad.



The Scoreboard



#

Crisis

Severity

Status

1

CVE-2026-20131 — FMC zero-day (CVSS 10.0)

Maximum

Exploited 36 days before disclosure. Interlock ransomware used it to hit hospitals and Saint Paul, MN. Amazon found it, not Cisco.

2

ShinyHunters extortion — 3M+ Salesforce records

Critical

Three breach vectors: UNC6040 vishing, Salesforce Aura vuln, AWS account compromise. Deadline TODAY.

3

CVE-2026-20093 — IMC critical (CVSS 9.8)

Critical

New. Another management interface vulnerability. Patch released this week.

4

IRGC target list — named as military target

Kinetic

One of 18 US tech companies the IRGC designated for destruction. 5,822 ASA VPN endpoints visible on Shodan.

5

GitHub weaponization — fake FMC PoC with webshells

Active

We found cmd.war and cmd.jsp webshells bundled with a "PoC" for CVE-2026-20131. Three forks. Still live on GitHub.


Five concurrent attacks on one company. Different actors, different vectors, different motivations. All landing in the same seven-day window.



The Management Interface Pattern


Two of the five crises are vulnerabilities in Cisco management interfaces:


FMC (Firepower Management Center) — the console that manages Cisco firewalls. CVE-2026-20131. CVSS 10.0. Unauthenticated Java deserialization → root. The thing that configures your network security gave attackers root access to everything it manages.


IMC (Integrated Management Controller) — the out-of-band management interface for Cisco servers. CVE-2026-20093. CVSS 9.8. The thing that manages your hardware at the BIOS level.


The pattern: Cisco's management interfaces — the tools administrators trust to configure and control infrastructure — are the attack surface. FMC gives you the firewall rules. IMC gives you the server hardware. Both compromised in the same week.


This is the thesis we've been writing about all week. Your security vendor is your attack surface. The management console is the front door. Trust and access — the two things attackers want most, and the two things management interfaces are designed to provide.



ShinyHunters — The Clock


  • European Commission — 90GB+ exfiltrated, DKIM keys leaked

  • TELUS Digital — 1 petabyte, FBI background checks, source code

  • Cisco — 3M+ Salesforce records, GitHub repos, AWS accounts

Three massive targets in one month. The Cisco breach used three separate vectors:


  1. UNC6040 vishing — social engineering via voice phishing to gain initial access

  2. Salesforce Aura vulnerability — exploiting Salesforce Experience Cloud to access CRM data

  3. AWS account compromise — EC2 volumes and S3 buckets accessed directly

ShinyHunters didn't find one hole. They found three. And they're claiming the data includes not just Cisco's records but potentially data from Cisco's customers — the 3M+ Salesforce records are CRM entries that may contain enterprise customer information.


The deadline is today. If Cisco didn't engage, the dump goes public.



The IRGC Dimension


Trump told the nation Tuesday night that the US will hit Iran "extremely hard" over the next two to three weeks. Today he threatened to destroy Iranian bridges and power plants. The April 6 pause on power infrastructure strikes expires in three days.


His March 6 cyber strategy specifically references offensive cyber operations against Iran: "obliterate Iran's nuclear infrastructure." Congress wants more details. The CFR says the strategy "falls short on Iran, China, and the threats that matter most."


Meanwhile, the IRGC named Cisco as one of 18 military targets. Cisco has 5,822 ASA VPN endpoints visible on Shodan. The same ASA VPN product line that Akira/Punk Spider ransomware specifically targets for initial access — VPNs without MFA.


Cisco is being attacked by cybercriminals (ShinyHunters, Interlock), probed by nation-states (IRGC), scanned by ransomware operators (Akira), and exploited through zero-days in their own management consoles — simultaneously.



Trump's Cyber Strategy and What It Means


The White House released "President Trump's Cyber Strategy for America" on March 6. Six pillars:


  1. Shape adversary behavior

  2. Promote "common sense" regulation

  3. Modernize federal networks

  4. Secure critical infrastructure

  5. Sustain technological superiority

  6. Offensive cyber operations

The strategy promises to avoid "costly checklists" and give companies "greater agility." Translation: less compliance, more offense.


Senator Jack Reed urged the administration to strengthen cybersecurity in the aftermath of Iran strikes. Congress wants to know how the government is helping critical infrastructure guard against Iran-linked hacking.


The answer this week: the FBI's wiretap network was breached by China. Cisco has five simultaneous crises. The IRGC named 18 tech companies for destruction. And the cyber strategy says "no more checklists."


The checklists aren't the problem. The management interfaces with CVSS 10.0 vulnerabilities are the problem.



What We've Published This Week



Day

Post

Connection

Mon

Your Security Vendor Is Your Attack Surface

CrowdStrike, Intune, Trivy — security tools weaponized

Tue

TeamPCP: One Actor, Three Supply Chains

Trivy → LiteLLM → Telnyx chained compromise

Tue

Cisco FMC Got Owned for 36 Days

CVE-2026-20131 + our January fake PoC find

Tue

Dell RecoverPoint: $67B, Chinese Hackers 2 Years

Hardcoded credentials, Ghost NICs

Tue

Iran Is Fighting Two Wars

Handala, MuddyWater, Patel, 16 domains surveilled

Wed

Hasbro Hacked: GenAI Pipeline from DNS

255 subdomains, ComfyUI/Fooocus/SwarmUI

Wed

IRGC Names 18 Targets, We Have Files on Six

Cisco, Dell, Oracle, Palantir, Microsoft, Apple

Wed

GitHub Wasteland: Nobody Else Is Looking

FMC webshell PoC + Citrix session harvester

Wed

IP Reputation Is Dead

GreyNoise validation, 5.6M behavioral decisions

Wed

LinkedIn Scans 6,222 Extensions

Microsoft browser surveillance

Wed

FBI Wiretap Network Breached

Salt Typhoon, "major incident"

Thu

This post

The convergence on Cisco


Twelve posts in four days. Every one connected. The Cisco FMC zero-day from Tuesday, the IRGC target list from Wednesday, the GitHub webshells from Wednesday, and the ShinyHunters deadline today — four threads landing on the same company in the same week.



The Numbers


Our STIX feed carries IOCs for every actor in this story:


  • ShinyHunters: 23 IOCs (phishing domains, infrastructure IPs, Salesforce indicators)

  • Interlock: Cisco FMC exploitation indicators, ransomware domains

  • Akira/Punk Spider: 26 IOCs (VPN targeting TTPs, hashes)

  • Iran/MOIS: 1,917 IOCs across 28 adversary profiles

  • Salt Typhoon: Chinese APT indicators

275+ organizations in 46 countries pull this feed. If you're a Cisco customer watching five crises unfold simultaneously, the indicators are already in your SIEM — if your SIEM is pulling from us.



https://analytics.dugganusa.com/api/v1/stix-feed?format=splunk&api_key=YOUR_KEY




Cisco has five concurrent crises: two CVSS 9.8+ management interface vulns, a data extortion deadline, a nation-state military target designation, and weaponized PoCs on GitHub. Nobody else has had five at once. We've been tracking all five since they started.


ShinyHunters' deadline is today. We'll update when we know what they release.


bottom of page