Australia Warns of BADCANDY Malware Targeting Cisco Devices

Australian Signals Directorate Warns of Ongoing BADCANDY Cyberattacks Exploiting Critical Cisco IOS XE Vulnerability

  • The Australian Signals Directorate (ASD) reports ongoing attacks on unpatched Cisco IOS XE devices using the BADCANDY implant.
  • BADCANDY exploits a critical vulnerability (CVE-2023-20198) that allows remote attackers to create privileged accounts and control devices.
  • An estimated 400 Cisco devices in Australia have been compromised since July 2025, with 150 infections reported in October alone.
  • BADCANDY is a non-persistent Lua-based web shell that can be reintroduced if devices remain unpatched and internet-exposed.
  • ASD urges applying patches, limiting exposure, removing unauthorized accounts, and following Cisco hardening guidelines to prevent further breaches.

The Australian Signals Directorate (ASD) has issued a bulletin warning about sustained cyberattacks targeting unpatched Cisco IOS XE devices across Australia. The attacks exploit a critical, previously undisclosed implant called BADCANDY. This implant leverages the vulnerability identified as CVE-2023-20198, which enables a remote, unauthenticated attacker to create accounts with elevated privileges and seize control of affected systems.

- Advertisement -

The vulnerability carries a maximum severity score of 10.0 and has been actively exploited in the wild since 2023. Threat actors linked to China, including a group known as Salt Typhoon, have used this exploit against telecommunications providers. Since October 2023, multiple variants of the BADCANDY implant have been detected, with the attacks ongoing into 2024 and 2025. ASD estimates that up to 400 devices were compromised in Australia from July 2025, with 150 infections recorded in October alone.

According to ASD, “BADCANDY is a low equity Lua-based web shell, and cyber actors have typically applied a non-persistent patch post-compromise to mask the device’s vulnerability status in relation to CVE-2023-20198.” This means the implant does not survive a system reboot, but attackers can reinstall it if the device remains vulnerable and connected to the internet. The agency observed attackers detecting and reinfecting devices after implant removal, even when previous notifications had been issued.

ASD emphasizes that rebooting infected devices only removes the implant temporarily and does not reverse other attacker actions. To prevent further exploitation, the agency advises system administrators to promptly apply patches, restrict public access to web interfaces, and follow the hardening guidelines issued by Cisco. Additional recommended actions include reviewing and removing unauthorized accounts with administrative privileges, inspecting unknown tunnel interfaces, and monitoring command logging if enabled.

These measures are critical to address the ongoing threats posed by this sophisticated implant and the exploitation of critical flaws in widely used network devices.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

DeFi surge, three hacks and MEV bot returns majority funds!!

Three separate DeFi attacks this week drained millions and prompted on-chain recovery efforts.Makina reported...

BitGo shares tumble 22% after $212M IPO; dip below $15 at 2B

BitGo shares fell nearly 22% on the second trading day after its IPO debut...

Intel Slides 17% After Q1 Guidance Miss; Supply Constraints.

INTC shares fell more than 17% on Friday after a quarterly report and weak...

Gold’s FOMO Drains Bitcoin: Prices Falling, Metals Rise Soon

The author argues that Bitcoin prices are likely to weaken because fewer groups need...

Paradex refunds $650,000 to 200 users after error in markets

Paradex refunded $650,000 to roughly 200 users after a maintenance error caused unintended liquidations.The...
- Advertisement -

Must Read

8 Best Crypto Debit Cards For Spending Your Digital Tokens

What are | How we chose | Best crypto debit cards | Binance Card? | FAQ | Final WordsCrypto debit cards have transformed how...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!