Skip to content
Briefings are running a touch slower this week while we rebuild the foundations.See roadmap
Cybersecurity: Threats and Defences
30APR

Federal agency stayed compromised six months

3 min read
08:16UTC

An unnamed US federal agency was confirmed still hosting FIRESTARTER in March 2026, six months after applying the September 2025 Cisco patches.

TechnologyDeveloping
Key takeaway

Six months of dwell after a clean patch shifts the lever from SLA compliance to forensic audit.

CISA disclosed alongside the FIRESTARTER advisory that an unnamed US federal agency was confirmed still hosting the implant in March, six months after the September patch cycle that should have closed the file 1. The agency had applied those patches on schedule and the implant rode through. CISA has not released the agency's identity.

The operational read of the implant's design explains the dwell. UAT-4356's FIRESTARTER writes itself back to disk before clean shutdowns, so a routine patch reboot reinstates the backdoor rather than removing it. There is no continuous outbound beacon to flag in network telemetry; activation runs through magic-packet primitives that look like ordinary WebVPN traffic until the secret prefix arrives. NCSC and CISA are, in effect, telling operators that the September patch cycle is not a closure event but a starting line for memory analysis and device-side anomaly detection.

BRICKSTORM sets the precedent that frames this dwell. Mandiant disclosed BRICKSTORM at much longer residency than the FIRESTARTER federal case, which signals that nation-state actors are confident they will be undetected long enough to amortise the implant cost across multiple operational objectives. The implication for any CISO with Cisco ASA or FTD at the edge is a procurement audit on attestation and immutable-boot product categories, plus a board-level conversation about disclosure exposure when 'patched' and 'clean' have decoupled.

Deep Analysis

In plain English

A US government agency followed all the official advice: it applied the security patches, ticked every compliance box, and signed off the firewall as clean. Months later it turned out the firewall still contained a hidden back door that the patch had simply left untouched. This happened because the patch fixes software; the back door had hidden itself below the level software controls, in the code that runs before any software starts. Compliance paperwork and real-world cleanliness had silently separated.

Deep Analysis
Root Causes

Standard enterprise patch management operates on a compliance model: apply the patch, record the completion, close the ticket. This model assumes that applying a patch to a device is equivalent to removing a prior compromise, which is structurally false for boot-sequence implants that restore themselves before the OS loads.

The unnamed federal agency's six-month dwell also exposes a monitoring gap specific to network-edge devices. Most SOC tooling is designed for endpoint and cloud workload telemetry; firewall appliances are monitored primarily via syslog and SNMP for availability, not for sub-OS anomaly detection.

FIRESTARTER produced no continuous beacon and activated only on the specific magic-packet trigger, which means no traffic anomaly appeared in the monitoring layer until CISA's external detection process identified the device.

What could happen next?
  • Consequence

    Federal contractor and critical infrastructure operators subject to FISMA or NIS2-equivalent frameworks face a disclosure question: 'patched and compliant' is no longer a sufficient answer to board-level incident materiality review.

    Immediate · 0.85
  • Risk

    SOC tooling vendors face pressure to add device-level boot-sequence anomaly detection as a default capability; current SIEM and EDR products have no visibility below the OS layer on firewall appliances.

    Short term · 0.8
  • Precedent

    CISA's decision to disclose a specific federal dwell figure sets a new bar for government transparency on active compromises; prior practice was to confirm breaches without releasing forensic detail.

    Medium term · 0.75
First Reported In

Update #2 · FIRESTARTER puts Cisco below the patch line

CISA· 30 Apr 2026
Read original
Different Perspectives
Norwegian Security and Service Organisation
Norwegian Security and Service Organisation
NSSO was a prior victim of Ivanti EPMM zero-days and now faces CVE-2026-6973 in the same product line. Ivanti's position that on-premises EPMM is the only affected tier provides limited reassurance to a government body that has already been compromised twice via the same vendor's MDM infrastructure.
ENISA and EU CNA Ecosystem
ENISA and EU CNA Ecosystem
ENISA onboarded four new CVE Numbering Authorities under ENISA Root on 6 May, expanding EU-sovereign vulnerability disclosure infrastructure in the same week three critical CVEs entered the CISA KEV catalogue. Greater CNA coverage inside the EU reduces dependence on US-anchored MITRE for European-sourced vulnerability identifiers.
German Federal Office for Information Security (BSI)
German Federal Office for Information Security (BSI)
BSI rated CVE-2026-41940 in cPanel 'very high', reflecting Germany's exposure across shared-hosting infrastructure for Mittelstand businesses. The 65-day zero-day window and the amplification effect of cPanel's multi-tenancy model mean the BSI rating applies to thousands of German SME websites hosted on affected servers.
Republic of Korea National Intelligence Service
Republic of Korea National Intelligence Service
South Korea's NIS tracks UNC1069's tooling evolution; the CSIS paper argues the ROK's intelligence on DPRK cyber operations should feed joint US-ROK situational awareness rather than bilateral channels that move too slowly for real-time supply-chain response.
Democratic People's Republic of Korea
Democratic People's Republic of Korea
UNC1069's Axios operation scales North Korea's supply-chain access from niche Python packages to the most downloaded HTTP client in the JavaScript ecosystem. WAVESHAPER.V2 provides persistent access to development environments where cryptocurrency wallets and API keys are stored, serving the sanctions-evasion funding logic behind earlier DPRK toolchain operations.
WatchTowr Labs
WatchTowr Labs
WatchTowr Labs disclosed CVE-2026-41940 after the 28 April patch shipped, providing the 65-day exploitation timeline from KnownHost telemetry. The disclosure is textbook; the open question is why WebPros did not catch the cpsrvd CRLF class flaw before external researchers found it under active exploitation.