Threat Research | Weekly Recap [08 June 2025]

Threat Research | Weekly Recap [08 June 2025]

This week’s cybersecurity recap highlights ongoing threats from phishing and social engineering campaigns targeting various sectors, including finance and government, with sophisticated tactics like fake CAPTCHA frameworks and Phishing-as-a-Service platforms. Malware developments include stealthy RATs such as DuplexSpy and Chaos RAT, along with advanced infostealers like OtterCookie, all posing significant risks to corporate and crypto assets; supply chain threats involve malicious repositories and compromised developer tools. The report also covers notable APT activities by groups like UNC5174, OilRig, and Kimsuky, alongside infrastructure attacks exploiting IoT and cloud misconfigurations. Emerging tools like RayV Lite facilitate hardware-level attacks, illustrating the evolving landscape of cyber threats. #ClickFix #FlowerStorm #LazarusGroup #ChaosRAT #Mirai #RayVLite

Phishing & Social Engineering Campaigns

  • Coordinated campaigns use phishing emails, fake CAPTCHA pages, and spoofed websites to deliver RATs and steal credentials across sectors including hospitality, finance, and government. Notable techniques include novel ClickFix social engineering and Telegram-exfiltrated multi-factor tokens. Unpacking ClickFix
  • Campaigns targeting cryptocurrency users with phishing apps on Google Play stealing mnemonic phrases highlight risks of compromised developer accounts and embedded phishing URLs. Over 20 Crypto Phishing Applications Found
  • Italian phishing campaigns exploiting PDF attachments and fake invoice notices continue to harvest webmail credentials, collected via Telegram channels. Ongoing Phishing Campaign for LiberoMail
  • Sophisticated FakeCaptcha frameworks are deployed via infected streaming/file-sharing sites and compromised WordPress portals to trick victims into executing malicious PowerShell commands. HuluCaptcha CAPTCHA Deploys Malware
  • The FlowerStorm Phishing-as-a-Service platform uses adversary-in-the-middle attacks to steal Microsoft 365 credentials and bypass MFA, with autonomous detection demonstrated by Darktrace. From Rockstar2FA to FlowerStorm
  • Glitch-hosted phishing campaigns targeting Navy Federal Credit Union users exfiltrate OTPs and credentials via Telegram while employing fake CAPTCHAs. Glitch-hosted Phishing Uses Telegram & Fake CAPTCHAs
  • Russian-speaking threat actors use typo-squatted domains mimicking Spectrum to deploy macOS infostealers with multi-platform social engineering via the AMOS campaign. AMOS Variant Distributed via ClickFix
  • North Korean Lazarus Group’s newly identified malware targets crypto companies using phishing and advanced post-exploitation, with exposed operational security yielding valuable intelligence. Lazarus Targeting Crypto via Phishing

Malware and RAT Developments

Supply Chain & Repository Threats

Advanced Persistent Threat (APT) Activity

  • Operation DRAGONCLONE targets Chinese telecom with VELETRIX and VShell malware using DLL sideloading, anti-sandbox, and IPfuscation, linked to UNC5174 and Earth Lamia groups. Operation DRAGONCLONE
  • BladedFeline, an Iran-aligned APT subgroup of OilRig, targets Kurdish and Iraqi officials with advanced spyware including Whisper backdoor and PrimeCache modules for long-term espionage. BladedFeline: Whispering in the Dark
  • Indian-linked TA397 group conducts long-running espionage on government and defense targets primarily in Europe and Asia using spearphishing and RATs during Indian Standard Time. The Bitter End: TA397 Espionage
  • APT36 (Transparent Tribe) infrastructure investigation via DNS history and host data reveals unreported domains linked to espionage. Illuminating Transparent Tribe with Validin
  • North Korean Kimsuky deploys SecurityMail.chm malware exploiting embedded PowerShell in CHM files to target virtual asset users and steal cryptocurrency investments. North Korean Hacking Group Kimsuky Malicious Code

Infrastructure & Cloud Threats

Security Risks in Software Development & Extensions

Emerging Tools & Techniques

  • RayV Lite is an open-source, low-cost IR laser fault injection platform enabling transistor-level hardware attacks and silicon visualization, lowering advanced hardware research barriers. Pew Pew, Precisely: RayV Lite

Threat Research | Weekly Recap – hendryadrian.com