The U.S. Cybersecurity and Infrastructure Security Agency (CISA), in collaboration with the U.K.'s NCSC, has issued a critical alert regarding a newly discovered backdoor named FIRESTARTER. This malware was found on a Cisco Firepower device within a U.S. federal civilian executive branch (FCEB) agency. The malware provides persistent, remote access to the compromised firewall. The initial intrusion, occurring in September 2025, was achieved by exploiting two since-patched vulnerabilities: CVE-2025-20333 (a critical 9.9 CVSS RCE flaw) and CVE-2025-20362. The key threat posed by FIRESTARTER is its ability to maintain persistence even after the device's firmware is updated, rendering standard patching insufficient for remediation. Attackers were confirmed to have used this backdoor to regain access as recently as March 2026.
An unidentified Advanced Persistent Threat (APT) actor conducted a widespread campaign targeting Cisco Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software. The initial access vector was the exploitation of CVE-2025-20333 and CVE-2025-20362. Once on the device, the APT deployed the FIRESTARTER backdoor.
FIRESTARTER's primary function is to provide a persistent foothold. It achieves this by installing a hook within LINA, the core processing engine of the Cisco device's operating system. This hook allows the malware to intercept system functions and execute arbitrary shell code supplied by the attacker via specially crafted network packets. Because this hook is installed in the underlying system and not as a simple file, it is not removed during a standard firmware update or patching process.
CISA's investigation revealed that the attackers used this persistent access to deploy a secondary payload, a post-exploitation toolkit named LINE VIPER. This toolkit enabled the threat actors to:
The attack showcases a high level of sophistication, targeting the core of a network security appliance. The TTPs map to the MITRE ATT&CK framework as follows:
T1190 - Exploit Public-Facing Application.T1059.004 - Unix Shell.T1546 - Event Triggered Execution. By hooking a core process, it ensures its code is executed whenever specific system events occur, guaranteeing its survival across reboots and updates.T1574 - Hijack Execution Flow). By embedding itself deep within a trusted system process, the malware avoids detection by conventional file-based scanners.T1003 - OS Credential Dumping.The persistence mechanism is the most critical aspect of this threat. It means that simply patching the initial vulnerabilities is not enough to remediate a compromised device. Organizations must actively hunt for evidence of the backdoor itself.
The impact of this attack is severe. A persistent backdoor on a perimeter firewall grants an attacker a privileged position within the network. From here, they can monitor all traffic passing through the device, bypass security controls like VPNs, pivot to other internal systems, and maintain long-term, stealthy access to the victim's environment. For a federal agency, this could lead to the exfiltration of sensitive government data, espionage, and a complete loss of network integrity. The fact that the attackers were able to return months later demonstrates the effectiveness of their persistence and the significant challenge defenders face in fully eradicating such threats.
No specific Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were mentioned in the source articles. CISA's advisory likely contains specific hunting guidance for federal agencies.
The following patterns may help identify vulnerable or compromised systems:
Anomalous management trafficCisco ASA/FTD Syslog/ngfw/var/log/lina.logDetection requires more than just vulnerability scanning. Organizations with affected Cisco devices should:
D3-DA: Dynamic Analysis.D3-NTA: Network Traffic Analysis.If a device is confirmed to be compromised, the recommended response is to isolate it from the network and perform a complete re-imaging from a trusted source, followed by restoring a clean configuration. Simply patching is insufficient.
Mitigation requires a multi-step approach:
D3-SU: Software Update).Applying security patches for CVE-2025-20333 and CVE-2025-20362 is the first step to prevent initial compromise.
Mapped D3FEND Techniques:
Thoroughly auditing device configurations, logs, and memory is necessary to detect signs of a pre-existing compromise.
Restricting network access to firewall management interfaces to a secure, isolated management network reduces the attack surface.
Mapped D3FEND Techniques:
Using hardware-based boot integrity mechanisms can help detect and prevent unauthorized modifications to core system processes like LINA.
To detect a sophisticated, fileless backdoor like FIRESTARTER, static analysis is insufficient. Organizations must perform dynamic analysis and memory forensics on potentially affected Cisco devices. This involves taking a live memory snapshot of the device and using tools like Volatility to inspect the running processes, especially the 'LINA' engine. Security teams should look for signs of hooking, where pointers to legitimate functions are overwritten to redirect execution to malicious code. They should also search for injected code segments in memory that do not map to any file on disk. CISA's private advisories likely contain specific signatures or patterns to look for. This technique is the most reliable method for confirming a compromise by FIRESTARTER, as the malware is designed to evade file-based detection.
A fundamental mitigation against attacks on network infrastructure is to apply strict network isolation to management interfaces. The management ports of Cisco firewalls should never be exposed to the public internet. Access should be restricted to a dedicated, out-of-band management network. This can be enforced using access control lists (ACLs) on the device itself and through physical or logical network segmentation. By doing so, an attacker would first need to gain a foothold on the internal management network before they could even attempt to exploit a vulnerability like CVE-2025-20333 on the firewall's management plane. This preventative control dramatically reduces the attack surface and contains the blast radius of other security failures.
Initial intrusion and deployment of FIRESTARTER backdoor occurred.
Threat actors used the persistent backdoor to return to the compromised device.
CISA and NCSC published a joint advisory on the FIRESTARTER malware.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats