{"id":34634,"date":"2020-04-26T12:04:13","date_gmt":"2020-04-26T12:04:13","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/"},"modified":"2020-04-26T12:04:13","modified_gmt":"2020-04-26T12:04:13","slug":"sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/","title":{"rendered":"Sophos XG firewalls hacked, hotfix ready. Texts wreck Apple iThings. Yup, business as usual in infosec world"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2020\/04\/24\/apple_shutterstock.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><strong class=\"trailer\">Roundup<\/strong> It&#8217;s time to dig in to another <em>Register<\/em> security roundup.<\/p>\n<h3 class=\"crosshead\"><span>Sophos XG Firewall hacked in the wild \u2013 hotfix available<\/span><\/h3>\n<p>Sophos has rushed out a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/community.sophos.com\/kb\/en-us\/135412\">hotfix<\/a> for its XG Firewall products to close an SQL injection vulnerability \u2013 after hackers were spotted exploiting the hole in the wild. The flaw can be abused to steal the firewall&#8217;s configuration, such as usernames and hashed passwords.<\/p>\n<p>The hotfix will, as well as patching the bug, tell admins if their boxes were compromised by miscreants before the fix could be applied. Ensure automatic hotfix deployment is enabled to receive the update. All physical and virtual XG firewalls are vulnerable, we&#8217;re told, and all supported versions (SFOS 17.1, 17.5, 18.0) will get a hotfix.<\/p>\n<p>&#8220;The attack used a previously unknown SQL injection vulnerability to gain access to exposed XG devices,&#8221; said Team Sophos.<\/p>\n<p>&#8220;It was designed to download payloads intended to exfiltrate XG Firewall-resident data. The data for any specific firewall depends upon the specific configuration and may include usernames and hashed passwords for the local device admin(s), portal admins, and user accounts used for remote access. Passwords associated with external authentication systems such as AD or LDAP are unaffected.<\/p>\n<p>&#8220;At this time, there is no indication that the attack accessed anything on the local networks behind any impacted XG Firewall.&#8221;<\/p>\n<h3 class=\"crosshead\"><span>Multi-language texts crash Apple iThings<\/span><\/h3>\n<p>A seemingly random string of text in an SMS can reportedly crash iOS devices that receive it, meaning you can drive an Apple fan bonkers by remotely knackering their handheld by sending them the text. 9to5mac <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/9to5mac.com\/2020\/04\/23\/italian-flag-iphone-crash-bug\/\">reported<\/a> the string is a mixture of the Italian flag icon and text in the Sidhi language, and triggers a bug in Messages for iPhone, iPad, Mac and Apple Watch. The flaw&#8217;s effect is said to vary by device: the crash can cause anything from the chat app unexpectedly quitting to the touchscreen freezing up.<\/p>\n<blockquote class=\"twitter-tweet\" readability=\"3.3050847457627\">\n<p lang=\"en\" dir=\"ltr\">The craziest iOS crash text bug \ud83d\udc80 <a href=\"https:\/\/t.co\/29LJPb67WP\">pic.twitter.com\/29LJPb67WP<\/a><\/p>\n<p>\u2014 EverythingApplePro (@EveryApplePro) <a href=\"https:\/\/twitter.com\/EveryApplePro\/status\/1253432816177537024?ref_src=twsrc%5Etfw\">April 23, 2020<\/a><\/p><\/blockquote>\n<p>Apple has yet to publicly comment on the issue. What with this and its <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2020\/04\/22\/apple_ios_mail_zeroday\/\" rel=\"noopener noreferrer\">unpatched Mail flaw<\/a>, it has not been a good week for Cupertino&#8217;s security record.<\/p>\n<h3 class=\"crosshead\"><span>Ransomware masterminds appear to honor vow not to infect hospitals<\/span><\/h3>\n<p>At the outset of the COVID-19 <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/Tag\/coronavirus\" rel=\"noopener noreferrer\">coronavirus pandemic<\/a>, a handful of ransomware crooks promised <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2020\/03\/19\/ransomware_health_organisations\/\" rel=\"noopener noreferrer\">not to target<\/a> healthcare providers. Yeah, right, we all thought. Well, it seems the malware gangs may be true to their word, kinda, as ransomware attacks in general are way down and infections of file-scrambling nasties at healthcare facilities are almost non-existent, we&#8217;re told.<\/p>\n<p>Security software maker Emsisoft <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/blog.emsisoft.com\/en\/36092\/the-state-of-ransomware-in-the-us-report-and-statistics-for-q1-2020\/\">claimed<\/a> it clocked just 25 reported attacks on healthcare facilities over the past quarter, a nosedive from the 191 hits it sees on an average per quarter. Sounds nice, but&#8230;<\/p>\n<p>&#8220;This reduction is entirely due to the fact that, in 2019, many managed service providers (MSPs) were exploited enabling multiple healthcare organizations to be simultaneously compromised in a single incident,&#8221; Emsisoft pointed out. &#8220;So far in 2020, there have been no such attacks affecting healthcare providers.&#8221;<\/p>\n<p>So, maybe there was something to that pledge after all, sort of.<\/p>\n<h3 class=\"crosshead\"><span>Prosecutors crack down on COVID-19 scams<\/span><\/h3>\n<p>The US Justice Department is taking the fight to sketchy peddlers looking to turn a quick buck by scamming the public with bogus coronavirus information and treatments.<\/p>\n<p>Prosecutors <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.justice.gov\/opa\/pr\/department-justice-announces-disruption-hundreds-online-covid-19-related-scams\">have taken down<\/a> hundreds of scam operations, we&#8217;re told. These range from bogus donation webpages \u2013 with one claiming to be the Red Cross \u2013 to phishing pages that impersonated government relief programs.<\/p>\n<p>&#8220;The department will continue to collaborate with our law enforcement and private sector partners to combat online COVID-19 related crime,&#8221; said Brian Benczkowski, assistant attorney general. &#8220;We commend the responsible internet companies that are taking swift action to prevent their resources from being used to exploit this pandemic.&#8221;<\/p>\n<h3 class=\"crosshead\"><span>Crown Sterling settles case over car-crash Black Hat presentation<\/span><\/h3>\n<p>One of the more bizarre stories to come out of last year&#8217;s Black Hat infosec conference in Las Vegas was the one about the paid-for &#8220;Time AI&#8221; presentation by an outfit called Crown Sterling. The sponsored session went down like a lead balloon: hecklers pulled apart the company&#8217;s outlandish boasts about encryption and artificial intelligence.<\/p>\n<p>Times being what they are, this led to <a target=\"_blank\" href=\"https:\/\/www.theregister.co.uk\/2019\/08\/26\/black_hat_sued\/\" rel=\"noopener noreferrer\">a lawsuit<\/a> from Crown Sterling against Black Hat, alleging the conference organizers violated the sponsorship deal by allowing the presentation to be derailed by cheesed-off audience members. That lawsuit <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/finance.yahoo.com\/news\/crown-sterling-informa-tech-holdings-200000738.html\">was settled<\/a> recently, though we won&#8217;t know the terms as everything was kept confidential.<\/p>\n<p>Sadly, there will probably be no presentations this year, at least not in person, as Black Hat is highly likely to be cancelled due to the virus outbreak. BSides Las Vegas <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/twitter.com\/BSidesLV\/status\/1252769518880985088\">called<\/a> off its event this summer due to the pandemic.<\/p>\n<h3 class=\"crosshead\"><span>Team Fortress 2, Counter Strike: Global Offensive code leaked<\/span><\/h3>\n<p>Someone, apparently after a spat between members of the game modding community, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/twitter.com\/CSGO\/status\/1253075594901774336\">leaked online<\/a> the <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/twitter.com\/TeamFortress\/status\/1253186403900420098\">source code<\/a> to a previously leaked portion of the engine inside smash-hit video games Team Fortress 2 and Counter Strike: Global Offensive. Shortly after, another claimed to have found a remote code execution bug in the software. As scary as that sounds, there&#8217;s actually <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/soatok.blog\/2020\/04\/22\/source-code-leak-is-effectively-meaningless-to-endpoint-security\/\">not much<\/a> to be worried about here.<\/p>\n<h3 class=\"crosshead\"><span>Bankers fall victim to email scam<\/span><\/h3>\n<p>Checkpoint has <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/research.checkpoint.com\/2020\/ir-case-the-florentine-banker-group\/\">yet another report<\/a> on scumbags hijacking an email account within an organization to impersonate a staffer to have account numbers changed on invoices and payments to redirect funds to the crooks&#8217; pockets. In this latest case, $650,000 was stolen via irretrievable transfers from UK and Israeli-based finance firms by criminals.<\/p>\n<h3 class=\"crosshead\"><span>PAAY spills card payment logs<\/span><\/h3>\n<p>Payments biz PAAY inadvertently <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/siliconangle.com\/2020\/04\/22\/2-5m-credit-card-records-belonging-transaction-firm-paay-exposed-online\/\">publicly exposed<\/a> an estimated 2.5 million card transactions, thanks to a misconfigured internet-facing database. There is some debate as to whether any actual payment card numbers were exposed, and thus far there is no indication any fraudsters accessed it before the data silo was taken offline.<\/p>\n<h3 class=\"crosshead\"><span>Cyberstalking charge for California man<\/span><\/h3>\n<p>A California man, said to have been heavily involved with women-hating <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/torontosun.com\/news\/local-news\/inside-the-terrifying-violent-world-of-incel-subculture\">incel<\/a> <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.glamour.com\/story\/what-is-incel-breaking-down-online-community-celibate-men\">message boards<\/a>, has been brought up on charges of stalking two teenage girls who turned down his advances.<\/p>\n<p>Carl Bennington, 33, of Covina, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.justice.gov\/usao-cdca\/pr\/covina-man-arrested-federal-charge-alleging-he-cyberstalked-and-threatened-violence\">has been accused<\/a> of using multiple social media accounts to stalk the young women over a four-year period up to and including death threats. If convicted, he faces up to five years in prison.<\/p>\n<h3 class=\"crosshead\"><span>Exercise app Kinomap reveals user info<\/span><\/h3>\n<p>Elsewhere in badly-secured-databases news, <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.vpnmentor.com\/blog\/report-kinomap-leak\/\">exercise app Kinomap<\/a> forgot to set a password on one of its internet-facing storage buckets and, as a consequence, some basic user profile information such as names, usernames, email address, and workout timestamps were exposed.<\/p>\n<h3 class=\"crosshead\"><span>Microsoft posts Office update<\/span><\/h3>\n<p>Microsoft has issued an <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/ADV200004\">out-of-band update<\/a> for Office 2016 and 2019 thanks to a remote code execution bug found in a bundled AutoDesk library. This can be exploited by opening a file containing a booby-trapped 3D model that triggers malicious code execution.<\/p>\n<p>Autodesk <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.autodesk.com\/trust\/security-advisories\/adsk-sa-2020-0002\">patched<\/a> the flaw earlier this month, so make sure you&#8217;re up to date.<\/p>\n<h3 class=\"crosshead\"><span>Nintendo warns of account thefts<\/span><\/h3>\n<p>Nintendo has had to <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.nintendo.co.jp\/support\/information\/2020\/0424.html\">reset the credentials<\/a> of around 160,000 user accounts after it was found miscreants were using a leaked set of logins from an old service called Nintendo Network ID to get into profiles, and, in some cases, rack up fraudulent purchases.<\/p>\n<h3 class=\"crosshead\"><span>Winnti group blamed for new attack in Germany<\/span><\/h3>\n<p>The notorious DPRK Winnti hacking crew is said to be at it again. This time, the North Korean hackers are <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/quointelligence.eu\/2020\/04\/winnti-group-insights-from-the-past\/\">said to have<\/a> broken into a German company using a technique called DNS tunneling.<\/p>\n<p>&#8220;The sophistication of the techniques we uncovered confirms that the Winnti Group is a highly sophisticated, and highly committed Advanced Persistent Group targeting a plethora of different industry sectors in Europe and South Asia,&#8221; said eggheads at Quo Intelligence, which analyzed the reported break-in.<\/p>\n<h3 class=\"crosshead\"><span>Researchers show how GPUs can leak system data<\/span><\/h3>\n<p>Not the most practical attack, but it&#8217;s worth the time to read <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/duo.com\/labs\/research\/finding-radio-sidechannels\">this interesting report<\/a> from Duo security on how malware could program a PC&#8217;s graphics processor to transmit data wirelessly using its high-frequency shader clock. This leaked information could be received by a miscreant nearby, bypassing any air gapping.<\/p>\n<p>Boffins Mikhail Davidov and Baron Oldenburg produced a setup that could &#8220;exfiltrate data out of a radio-less and air-gapped desktop workstation through a wall and 50ft away.&#8221;<\/p>\n<h3 class=\"crosshead\"><span>VictoryGate botnet menaces South America<\/span><\/h3>\n<p>ESET has uncovered a cryptocurrency-mining botnet that appears to be largely focused on South America. Known as VictoryGate, the malware infects a mixture of home and business Windows PCs and Internet-of-Things devices.<\/p>\n<p>&#8220;Active since at least May 2019, it is composed mainly of devices in Peru, where over 90 per cent of the infected devices are located,&#8221; <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.eset.com\/us\/about\/newsroom\/press-releases\/eset-researchers-disrupt-victorygate-cryptomining-botnet\/\">said<\/a> ESET. &#8220;The main activity of the botnet is mining Monero cryptocurrency.&#8221;<\/p>\n<h3 class=\"crosshead\"><span>Group-IB spots card cache for sale on darknet market<\/span><\/h3>\n<p>Group-IB has <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.group-ib.com\/media\/south-korean-and-us-banks-cards\/\">sounded the alarm<\/a> following the discovery of a cache of bank card data for sale on the dark web. The cards, which are said to come exclusively from banks in South Korea and the US, are said to number somewhere around 400,000, and are being offered at $5 apiece. And, according to the seller, anywhere from 30 to 40 per cent are still valid.<\/p>\n<p>&#8220;It should be noted,&#8221; said Group-IB, &#8220;that it is the biggest sale of South Korean records on the dark web in 2020, which contributes to the growing popularity of APAC-issued card dumps in the underground.&#8221; \u00ae<\/p>\n<p class=\"wptl btm\"><span>Sponsored:<\/span> <a href=\"https:\/\/go.theregister.co.uk\/tl\/1925\/-8451\/build-the-next-generation-of-your-business-in-the-public-cloud?td=wptl1925\">Webcast: Build the next generation of your business in the public cloud<\/a><\/p>\n<p>READ MORE <a href=\"https:\/\/go.theregister.co.uk\/feed\/www.theregister.co.uk\/2020\/04\/26\/security_roundup_240420\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Plus Office 2016, 2019 patches \u2013 and a barn-load of other security bits and bytes Roundup\u00a0 It&#8217;s time to dig in to another Register security roundup.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34635,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-34634","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Sophos XG firewalls hacked, hotfix ready. Texts wreck Apple iThings. Yup, business as usual in infosec world 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sophos XG firewalls hacked, hotfix ready. Texts wreck Apple iThings. Yup, business as usual in infosec world 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-26T12:04:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"648\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Sophos XG firewalls hacked, hotfix ready. Texts wreck Apple iThings. Yup, business as usual in infosec world\",\"datePublished\":\"2020-04-26T12:04:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\\\/\"},\"wordCount\":1581,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\\\/\",\"name\":\"Sophos XG firewalls hacked, hotfix ready. Texts wreck Apple iThings. Yup, business as usual in infosec world 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world.jpg\",\"datePublished\":\"2020-04-26T12:04:13+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world.jpg\",\"width\":648,\"height\":432},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sophos XG firewalls hacked, hotfix ready. Texts wreck Apple iThings. Yup, business as usual in infosec world\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sophos XG firewalls hacked, hotfix ready. Texts wreck Apple iThings. Yup, business as usual in infosec world 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/","og_locale":"en_US","og_type":"article","og_title":"Sophos XG firewalls hacked, hotfix ready. Texts wreck Apple iThings. Yup, business as usual in infosec world 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-26T12:04:13+00:00","og_image":[{"width":648,"height":432,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Sophos XG firewalls hacked, hotfix ready. Texts wreck Apple iThings. Yup, business as usual in infosec world","datePublished":"2020-04-26T12:04:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/"},"wordCount":1581,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/","url":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/","name":"Sophos XG firewalls hacked, hotfix ready. Texts wreck Apple iThings. Yup, business as usual in infosec world 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world.jpg","datePublished":"2020-04-26T12:04:13+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world.jpg","width":648,"height":432},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/sophos-xg-firewalls-hacked-hotfix-ready-texts-wreck-apple-ithings-yup-business-as-usual-in-infosec-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Sophos XG firewalls hacked, hotfix ready. Texts wreck Apple iThings. Yup, business as usual in infosec world"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34634"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34634\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34635"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}