The Australian Signals Directorate (ASD) has released a high-priority alert regarding a new malware implant named BADCANDY that is being actively deployed against unpatched Cisco IOS XE devices in Australia. The attackers are exploiting CVE-2023-20198, a maximum-severity (CVSS 10.0) vulnerability that allows for unauthenticated remote code execution. The campaign has shown a recent surge, with the ASD identifying 150 compromised devices in October 2025, bringing the total to approximately 400 since July 2025. The BADCANDY implant is a Lua-based web shell that gives attackers persistent access as long as the device is not rebooted. The attackers have been observed reinfecting devices after the implant is removed, indicating a persistent and determined adversary.
The current campaign involves the deployment of the BADCANDY implant. This malware is a Lua-based web shell that is written to the device's file system. It allows the attacker to execute arbitrary commands on the compromised device. A key tactic observed by the ASD is that after deploying BADCANDY, the attackers apply a non-persistent patch to the device's web server in memory. This masks the device from being detected by scanners looking for CVE-2023-20198, giving the device owner a false sense of security. However, the presence of the implant itself is definitive proof of compromise.
T1190 - Exploit Public-Facing Application): The attackers gain initial access by exploiting CVE-2023-20198 on unpatched, internet-facing Cisco IOS XE devices.T1505.003 - Server Software Component: Web Shell): The BADCANDY implant is installed, which functions as a web shell, providing the attacker with a persistent method to execute commands via HTTP/S requests.T1562.007 - Disable or Modify Tools): The attackers patch the vulnerability in memory post-exploitation. This is a clever defense evasion tactic designed to thwart vulnerability scanners.Compromise of network infrastructure devices like routers and switches is extremely serious. An attacker with full control over these devices can:
check-integrity.py script: Cisco has provided a script to check for the presence of the implant. This should be run on all suspect devices.show running-config | include ip http active-session-modules. The presence of badcandy indicates a compromise.M1051 - Update Software): The only definitive solution is to upgrade all Cisco IOS XE devices to a patched software version as recommended in the Cisco security advisory.no ip http server or no ip http secure-server.The most effective mitigation is to update Cisco IOS XE software to a patched version that remediates CVE-2023-20198.
Disable the HTTP/S web UI on internet-facing devices if it is not essential for operations.
Restrict access to the device's management interface to a trusted management network or specific IP addresses.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats