Australia Warns of BADCANDY Malware Targeting Cisco Devices

Australian Signals Directorate Warns of Ongoing BADCANDY Cyberattacks Exploiting Critical Cisco IOS XE Vulnerability

  • The Australian Signals Directorate (ASD) reports ongoing attacks on unpatched Cisco IOS XE devices using the BADCANDY implant.
  • BADCANDY exploits a critical vulnerability (CVE-2023-20198) that allows remote attackers to create privileged accounts and control devices.
  • An estimated 400 Cisco devices in Australia have been compromised since July 2025, with 150 infections reported in October alone.
  • BADCANDY is a non-persistent Lua-based web shell that can be reintroduced if devices remain unpatched and internet-exposed.
  • ASD urges applying patches, limiting exposure, removing unauthorized accounts, and following Cisco hardening guidelines to prevent further breaches.

The Australian Signals Directorate (ASD) has issued a bulletin warning about sustained cyberattacks targeting unpatched Cisco IOS XE devices across Australia. The attacks exploit a critical, previously undisclosed implant called BADCANDY. This implant leverages the vulnerability identified as CVE-2023-20198, which enables a remote, unauthenticated attacker to create accounts with elevated privileges and seize control of affected systems.

- Advertisement -

The vulnerability carries a maximum severity score of 10.0 and has been actively exploited in the wild since 2023. Threat actors linked to China, including a group known as Salt Typhoon, have used this exploit against telecommunications providers. Since October 2023, multiple variants of the BADCANDY implant have been detected, with the attacks ongoing into 2024 and 2025. ASD estimates that up to 400 devices were compromised in Australia from July 2025, with 150 infections recorded in October alone.

According to ASD, “BADCANDY is a low equity Lua-based web shell, and cyber actors have typically applied a non-persistent patch post-compromise to mask the device’s vulnerability status in relation to CVE-2023-20198.” This means the implant does not survive a system reboot, but attackers can reinstall it if the device remains vulnerable and connected to the internet. The agency observed attackers detecting and reinfecting devices after implant removal, even when previous notifications had been issued.

ASD emphasizes that rebooting infected devices only removes the implant temporarily and does not reverse other attacker actions. To prevent further exploitation, the agency advises system administrators to promptly apply patches, restrict public access to web interfaces, and follow the hardening guidelines issued by Cisco. Additional recommended actions include reviewing and removing unauthorized accounts with administrative privileges, inspecting unknown tunnel interfaces, and monitoring command logging if enabled.

These measures are critical to address the ongoing threats posed by this sophisticated implant and the exploitation of critical flaws in widely used network devices.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

$1B Inflows Fuel Crypto Rebound As Bitcoin Surges Past $70K

Crypto funds saw $1 billion in weekly inflows, the largest since January, breaking a...

Senator: White House Staff May Have Profited Off Iran Strikes

Senator Chris Murphy alleges individuals with White House access placed six-figure bets on a...

Arthur Hayes Warns Bitcoin Rally Could Be a ‘Dead Cat Bounce’

Arthur Hayes of Maelstrom warned that Bitcoin’s rally might be a ‘dead cat bounce’...

A16z Seeks $2B for New Crypto Venture Fund

Despite a severe crypto downturn, Andreessen Horowitz is raising a new $2 billion crypto...

AI Giants Pledge to Pay for Power Grid Strain

Seven top AI firms, including Amazon, Google, and OpenAI, have signed a White House...

Must Read

How Much Money Do You Need To Start In Crypto?

TL;DR -If you are wondering How Much Money Do You Need To Start In Crypto, note that is less than you are probably thinking....
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!