:

FIRESTARTER MALWARE PERSISTS ON CISCO FIREWALLS

SECURITY DESK2 MIN READ
FRI, APR 24, 2026

■ AI-SUMMARIZED FROM 1 SOURCE BELOW

U.S. and U.K. cybersecurity agencies are warning of a custom malware called Firestarter that continues to survive security updates on Cisco Firepower and Secure Firewall devices. The threat targets systems running Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software.

Firestarter represents a significant security concern for enterprise networks worldwide. The malware has demonstrated the ability to maintain persistence on Cisco's critical security infrastructure even after organizations apply available patches and security updates. Cisco Firepower and Secure Firewall devices serve as perimeter defenses for many organizations, making them high-value targets for threat actors. The fact that Firestarter can survive standard remediation efforts suggests sophisticated design and potentially multiple persistence mechanisms. The joint warning from U.S. and U.K. authorities underscores the severity of the threat. Both nations' cybersecurity agencies, including CISA and the NCSC, have issued guidance to organizations running affected Cisco equipment. Key affected systems: - Cisco Firepower devices with ASA software - Cisco Secure Firewall devices with FTD software Organizations using these devices are advised to implement comprehensive detection and response strategies beyond standard patching. Security teams should conduct thorough investigations of their firewall infrastructure to identify potential compromise indicators. The persistence of Firestarter across security updates highlights the importance of defense-in-depth strategies. Relying solely on patches may not be sufficient against sophisticated threats targeting critical security appliances. Cisco has released guidance for affected customers, though specific technical details about the malware's persistence mechanisms remain limited. Organizations are encouraged to consult official advisories from both Cisco and their respective national cybersecurity agencies for the latest information and recommended countermeasures. This threat comes amid increasing focus on supply chain and infrastructure-level attacks targeting security appliances. Defenders should assume potential compromise and implement enhanced monitoring protocols on all Cisco firewall deployments.

■ SOURCES

Bleeping Computer

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

Hundreds of subdomains across dozens of top universities have been compromised by scammers and are now hosting adult content. The breach stems from poor website maintenance and security practices.

JUST NOWIndustry Desk

Article 9 of the Digital Operational Resilience Act now requires EU financial institutions to implement mandatory authentication and access controls. Non-compliance creates direct regulatory and security exposure.

1H AGOIndustry Desk

Microsoft will roll out passkey support for Microsoft Entra-protected resources on Windows devices starting late April. The move enables phishing-resistant passwordless authentication for enterprise users.

3H AGOIndustry Desk

A new financially motivated hacking group called BlackFile has launched a wave of data theft and extortion attacks against retail and hospitality organizations since February 2026. The group employs vishing tactics to compromise victims.

3H AGOIndustry Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.