Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

782+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches
FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches
NEWS

FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches

CISA and the UK's NCSC have revealed that a US federal civilian agency's Cisco Firepower device running ASA software was compromised in September 2025 with a new malware called FIRESTARTER — a Linux ELF backdoor attributed to UAT-4356 that survives firmware updates and can only be fully removed by physically unplugging the device.

Dylan H.

News Desk

April 25, 2026
7 min read

Advisory Overview

The US Cybersecurity and Infrastructure Security Agency (CISA) and the UK National Cyber Security Centre (NCSC) have jointly revealed that a US Federal Civilian Executive Branch (FCEB) agency's Cisco Firepower device running ASA software was compromised in September 2025 with a sophisticated custom backdoor called FIRESTARTER.

CISA discovered the compromise through continuous monitoring, validated the finding with agency personnel, and conducted a full forensic engagement — ultimately discovering the FIRESTARTER malware sample on the affected device. The implant is attributed to UAT-4356, a state-sponsored threat actor previously linked to the ArcaneDoor campaign targeting network perimeter devices.

CISA has issued Emergency Directive 25-03 requiring all FCEB agencies to audit their Cisco Firepower devices by April 24, 2026 and submit device inventories by May 1, 2026.


What Is FIRESTARTER?

FIRESTARTER is a Linux Executable and Linkable File (ELF) designed to execute on Cisco Firepower and Secure Firewall devices, functioning as a C2 channel for remote access and persistent control.

CharacteristicDetail
Malware typeLinux ELF backdoor / C2 implant
Target platformCisco Firepower devices running ASA or FTD software
Primary functionPersistent remote access and command execution
Persistence mechanismSurvives firmware updates and graceful reboots
AttributionUAT-4356 (state-sponsored, ArcaneDoor actor)
DiscoveryCISA continuous monitoring, September 2025 compromise
Removal methodHard power cycle (physical unplug) or full device reimaging

The FIRESTARTER + LINE VIPER Attack Chain

FIRESTARTER was deployed alongside a second implant, LINE VIPER, in a layered attack chain:

Stage 1: Initial Compromise (September 2025)

UAT-4356 exploited CVE-2025-20333 and CVE-2025-20362 on the target Cisco Firepower device:

  • CVE-2025-20333 — enables remote code execution
  • CVE-2025-20362 — enables privilege escalation

Stage 2: LINE VIPER Deployment

Following initial access, the threat actors deployed LINE VIPER as a post-exploitation toolkit with the following capabilities:

LINE VIPER Capabilities:
- Execute CLI commands on the firewall
- Perform packet captures
- Bypass VPN Authentication, Authorization, and Accounting (AAA)
  for actor-controlled devices
- Suppress syslog messages (anti-forensic evasion)
- Harvest user CLI commands
- Force delayed reboots

Stage 3: FIRESTARTER Persistence (March 2026)

With LINE VIPER providing initial post-exploitation access, UAT-4356 deployed FIRESTARTER in March 2026 to maintain persistence — particularly to survive any patching or remediation attempts.

Stage 4: Post-Patch Survival

Although Cisco released patches for CVE-2025-20333 and CVE-2025-20362, devices compromised prior to patching remained infected because FIRESTARTER is not removed by firmware updates.


FIRESTARTER Persistence Mechanism

FIRESTARTER achieves persistence by manipulating the Cisco Service Platform (CSP) mount list (CSP_MOUNT_LIST):

Persistence Flow:
1. FIRESTARTER modifies CSP_MOUNT_LIST to execute itself during boot
2. On graceful reboot, the persistence mechanism triggers
3. FIRESTARTER checks the runlevel and copies itself to a backup location
4. Updates CSP_MOUNT_LIST to point to the backup copy
5. Executes during the next boot cycle
 
Result: Survives standard firmware updates and graceful reboots
Removal: Requires hard power cycle (physical unplug) or full reimaging

FIRESTARTER also detects termination signals and relaunches itself, preventing standard process-kill remediation. It attempts to install a hook within LINA — the device's core engine for network processing and security functions.


Detection Indicators

Known Indicators of Compromise (IoCs)

IndicatorTypeDescription
lina_csProcess nameMalicious process — primary FIRESTARTER IoC
/usr/bin/lina_csFile pathFIRESTARTER binary on disk
/opt/cisco/platform/logs/var/log/svc_samcore.logFile pathSecondary presence indicator
Suppressed syslog messagesLog anomalyLINE VIPER anti-forensic activity
AAA bypass eventsAuth anomalyLINE VIPER bypassing VPN authentication

Detection Commands

# Check for FIRESTARTER process
show processes | include lina_cs
 
# Verify filesystem for malicious files (FTD expert mode)
expert
ls -la /usr/bin/lina_cs
ls -la /opt/cisco/platform/logs/var/log/svc_samcore.log
 
# Check for unexpected CSP_MOUNT_LIST modifications
show running-config | include csp
 
# Review for suppressed or anomalous syslog gaps
show logging | include gap
 
# Verify image integrity against Cisco published hashes
verify /sha-512 disk0:/asa*.bin
verify /sha-512 disk0:/ftd*.bin

Affected Platforms

PlatformSoftwareAction Required
Cisco Firepower appliancesCisco ASAAudit for IoCs; reimage if compromised
Cisco Secure FirewallCisco FTDAudit for IoCs; reimage if compromised
Cisco Firepower Management CenterFMCAdvisory pending from Cisco

CVEs exploited: CVE-2025-20333 and CVE-2025-20362. Organizations should verify these are patched — but patching alone is insufficient if the device was compromised prior to patching.


CISA Directives and Federal Requirements

CISA published Emergency Directive ED 25-03 with the following mandatory actions for FCEB agencies:

RequirementDeadline
Complete all device checks and updatesApril 24, 2026, 11:59 PM EST
Hard-reset compromised devicesApril 30, 2026
Submit Cisco Firepower device inventoryMay 1, 2026

For confirmed compromises, CISA may issue instructions to physically unplug the device from power to remove FIRESTARTER's persistence mechanism before reimaging.

CISA will provide a report on the campaign to the National Cyber Director and other White House leaders by August 1, 2026.


Recommended Actions for All Organizations

Immediate (All Cisco Firepower / ASA / FTD Operators)

  1. Audit all Cisco Firepower, Secure Firewall, and ASA devices against published IoCs
  2. Search for lina_cs process and file artifacts using detection commands above
  3. Verify patch status for CVE-2025-20333 and CVE-2025-20362
  4. Review CSP_MOUNT_LIST for unauthorized modifications
  5. Inspect syslog continuity — gaps may indicate LINE VIPER suppression activity

Remediation (Confirmed or Suspected Compromise)

Step 1: Preserve forensics
  - Do NOT immediately power off or reimage — preserve evidence first
  - Capture running configuration, process list, and CSP_MOUNT_LIST state
  - Contact Cisco TAC and, if FCEB, notify CISA
 
Step 2: Isolate the device
  - Remove from active network path where operationally feasible
  - Redirect traffic through clean devices if available
 
Step 3: Hard power cycle (physical unplug)
  - This is the ONLY known method to remove FIRESTARTER's persistence
  - Graceful reboot will re-execute the implant
 
Step 4: Reimage from known-good media
  - Use Cisco-published fixed releases
  - Verify firmware hash before flashing
 
Step 5: Restore and harden
  - Restore from clean configuration backup
  - Apply all security patches
  - Enable Secure Boot attestation where supported

Hardening Recommendations

PriorityAction
CriticalEnable Secure Boot and image integrity verification on all supported models
CriticalRestrict management plane to dedicated out-of-band management networks
HighEnable TACACS+/RADIUS with MFA for all administrative access
HighMonitor for unauthorized CSP_MOUNT_LIST or syslog configuration changes
MediumDeploy network behavior analytics to detect anomalous traffic from firewall devices
MediumRotate all credentials accessible through firewall management interfaces

Threat Actor Context: UAT-4356

UAT-4356 is the threat actor attributed by Cisco Talos to this campaign and to the earlier ArcaneDoor espionage campaign (2024). Key characteristics:

  • Focus: State-sponsored espionage targeting network perimeter devices
  • Targets: Government agencies, critical infrastructure, enterprise firewalls
  • TTPs: Deep persistence in network appliances, anti-forensic evasion, long-term covert access
  • Attribution: Not publicly confirmed to a specific nation-state, though analysis from Censys suggested potential links to China

The persistence of FIRESTARTER through firmware updates — combined with the LINE VIPER anti-forensic capability to suppress syslog messages — reflects a mature, well-resourced threat actor operating for long-term intelligence collection rather than destructive impact.


References

  • The Hacker News — FIRESTARTER Backdoor Hit Federal Cisco Firepower Device, Survives Security Patches
  • CISA — FIRESTARTER Backdoor Analysis Report (AR26-113A)
  • CISA — Emergency Directive 25-03: Identify and Mitigate Potential Compromise of Cisco Devices
  • CISA — Warns of FIRESTARTER Malware Targeting Cisco ASA
  • The Register — CISA, NCSC issue Firestarter backdoor warning
  • SecurityWeek — US Federal Agency's Cisco Firewall Infected With Firestarter Backdoor
  • Cisco Talos — UAT-4356 Targeting of Cisco Firepower Devices

Related Reading

  • Firestarter Malware Survives Cisco Firewall Updates and Security Patches
  • Interlock Ransomware Exploits Cisco FMC Zero-Day CVE-2026-20131
  • CISA Orders Feds to Patch Actively Exploited Citrix Flaw
#Malware#Cisco#APT#Persistence#Firewall#Nation-State#CISA#The Hacker News

Related Articles

Firestarter Malware Survives Cisco Firewall Updates and Security Patches

US and UK cybersecurity agencies are warning about Firestarter, a custom implant that persists on Cisco Firepower and Secure Firewall devices running ASA or FTD software, surviving firmware updates and security patches.

6 min read

Russia's Forest Blizzard Harvests Logins via SOHO Router DNS Poisoning

Russia's APT28 (Forest Blizzard) is conducting a malwareless espionage campaign by modifying a single DNS setting in vulnerable SOHO routers to silently...

6 min read

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

Russian state-sponsored threat actor APT28 (Forest Blizzard / Pawn Storm) has launched a targeted spear-phishing campaign deploying a newly documented...

5 min read
Back to all News