Firestarter backdoor hits US federal Cisco Systems, survives patches and enables long-term access

A sophisticated malware known as Firestarter has been discovered on Cisco firewall devices used by a U.S. federal civilian agency, raising serious concerns about persistent cyber threats targeting critical infrastructure. The breach, identified by the Cybersecurity and Infrastructure Security Agency (CISA), dates to September 2025, when attackers exploited vulnerabilities in Cisco Systems to gain initial access.

The attackers leveraged two known vulnerabilities in Cisco Adaptive Security Appliance (ASA) software to infiltrate the network and deploy the Firestarter backdoor. Once installed, the malware allowed remote access and control of the compromised devices, effectively giving threat actors a foothold inside sensitive government systems. The campaign is believed to be part of a broader, highly coordinated operation carried out by an advanced persistent threat group.

What makes Firestarter particularly dangerous is its ability to persist even after security patches are applied. While Cisco had already released fixes for the exploited vulnerabilities, the malware remained embedded in affected devices, allowing attackers to regain access months later without needing to exploit the flaws again. This persistence significantly undermines traditional cybersecurity assumptions that patching alone is sufficient to eliminate threats.

Investigations revealed that attackers were able to maintain access to the compromised systems well into 2026, using the backdoor to re-enter networks and potentially deploy additional malicious tools. In some cases, the malware could survive reboots and standard remediation processes, requiring more drastic measures such as physical device resets or in-depth forensic analysis to fully remove it.

The incident highlights a growing trend in cyber warfare where attackers target network edge devices like firewalls to establish deep and persistent access. It also underscores the need for organizations to go beyond routine patch management and adopt advanced threat detection, continuous monitoring, and hardware-level security measures to defend against increasingly sophisticated attacks.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the report 2026

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch