
A sophisticated malware known as Firestarter has been discovered on Cisco firewall devices used by a U.S. federal civilian agency, raising serious concerns about persistent cyber threats targeting critical infrastructure. The breach, identified by the Cybersecurity and Infrastructure Security Agency (CISA), dates to September 2025, when attackers exploited vulnerabilities in Cisco Systems to gain initial access.
The attackers leveraged two known vulnerabilities in Cisco Adaptive Security Appliance (ASA) software to infiltrate the network and deploy the Firestarter backdoor. Once installed, the malware allowed remote access and control of the compromised devices, effectively giving threat actors a foothold inside sensitive government systems. The campaign is believed to be part of a broader, highly coordinated operation carried out by an advanced persistent threat group.
What makes Firestarter particularly dangerous is its ability to persist even after security patches are applied. While Cisco had already released fixes for the exploited vulnerabilities, the malware remained embedded in affected devices, allowing attackers to regain access months later without needing to exploit the flaws again. This persistence significantly undermines traditional cybersecurity assumptions that patching alone is sufficient to eliminate threats.
Investigations revealed that attackers were able to maintain access to the compromised systems well into 2026, using the backdoor to re-enter networks and potentially deploy additional malicious tools. In some cases, the malware could survive reboots and standard remediation processes, requiring more drastic measures such as physical device resets or in-depth forensic analysis to fully remove it.
The incident highlights a growing trend in cyber warfare where attackers target network edge devices like firewalls to establish deep and persistent access. It also underscores the need for organizations to go beyond routine patch management and adopt advanced threat detection, continuous monitoring, and hardware-level security measures to defend against increasingly sophisticated attacks.




