Securonix Threat Labs Monthly Intelligence Insights – March 2025

Securonix Threat Labs Monthly Intelligence Insights – March 2025

Keypoints :

  • Securonix identified 3,372 TTPs and IoCs and analyzed 149 emerging threats in March 2025.
  • Malware campaigns are increasing, particularly with new strains like OBSCURE#BAT and StilachiRAT.
  • Cybercriminals use sophisticated techniques such as obfuscation and API hooking to evade detection.
  • UNC3886 is exploiting outdated Juniper routers, while MirrorFace targets diplomatic organizations using advanced tactics.
  • New vulnerabilities have been exploited, including a zero-day in Windows LNK files, affecting various critical sectors.
  • Ransomware campaigns like VanHelsing and Medusa show evolving tactics with double extortion methods.

MITRE Techniques :

  • T1071.001 – Application Layer Protocol: StilachiRAT communicates using DNS and HTTPS protocols (Ports 53 and 443).
  • T1076 – Remote Services: CoffeeLoader uses the Windows Task Scheduler to establish persistence.
  • T1135 – Access Token Manipulation: OBSCURE#BAT hides its processes by manipulating API calls.
  • T1036 – Masquerading: OBSCURE#BAT disguises batch files with unnecessary characters for detection evasion.
  • T1069 – Permission Groups Discovery: UNC3886 uses base64-encoded commands to gain insight into system permissions.
  • T1218 – Signaling: MirrorFace leverages Visual Studio Code remote tunnels for malware delivery.

Indicator of Compromise :

  • [File] OBSCURE#BAT (batch files with obfuscated characteristics)
  • [Domain] example.com (for command-and-control fallback)
  • [File] StilachiRAT.exe (remote access Trojan executable)
  • [File] XCSSET.dmg (malicious macOS installer)
  • [File] CoffeeLoader.dll (malware loader)

Full Story: https://www.securonix.com/blog/securonix-threat-labs-monthly-intelligence-insights-march-2025/