Cybersecurity Threat Research âWeeklyâ Recap. A wide range of threats were observed, including information-stealers, supply-chain abuses, botnets, ransomware, state-aligned APTs, web/infrastructure compromises, and offensive tooling, with notable activity across Europe, Asia, and online ecosystems. The report emphasizes defensive controls, incident response best practices, and AI/LLM security risks such as MCP backdoors and AI-obfuscated phishing campaigns.
#Malware #AmateraStealer #PureMiner #DarkCloud #HeartCrypt #XWorm #YiBackdoor #BlockBlasters #GreedyBear #XCSSET #BeaverTail #InvisibleFerret #ShaiHulud #fezbox #Shai-Hulud #ShadowV2 #MUSE #SaltTyphoon #RedNovember #NimbusManticore #COLDRIVER #PlugX #BRICKSTORM #HiddenWordPressBackdoors #OperationRewrite #GeoServer #Tycoon2FA #LNK #Zloader #RUGpull #MCP #AIobfuscatedphishing
#Malware #AmateraStealer #PureMiner #DarkCloud #HeartCrypt #XWorm #YiBackdoor #BlockBlasters #GreedyBear #XCSSET #BeaverTail #InvisibleFerret #ShaiHulud #fezbox #Shai-Hulud #ShadowV2 #MUSE #SaltTyphoon #RedNovember #NimbusManticore #COLDRIVER #PlugX #BRICKSTORM #HiddenWordPressBackdoors #OperationRewrite #GeoServer #Tycoon2FA #LNK #Zloader #RUGpull #MCP #AIobfuscatedphishing
Malware & Infoâstealers
- Phishing using SVG/AI obfuscation delivered CHMâHTA loaders and JS, deploying Amatera Stealer and PureMiner and enabling credential/wallet theft and cryptomining; observed against Ukraine. Fortinet: SVG Phishing (Amatera/PureMiner)
- Spearâphish with banking lure delivered VB6 DarkCloud v3.2 infoâstealer â browser/password/wallet theft, keystroke/clipboard capture, sandbox evasion and multiple exfil methods. eSentire: DarkCloud analysis
- HeartCrypt packerâasâaâservice modifies legit EXEs with positionâindependent loaders and XOR payloads to distribute RATs/stealers (Lumma, AsyncRAT, Rhadamanthys) and an AV killer. Sophos: HeartCrypt packer service
- XWorm is a modular .NET RAT MaaS (keylogger, clipper, persistence, optional ransomware) with diverse delivery chains used by multiple groups. LogPoint: XWorm analysis
- New YiBackdoor family (code overlap with IcedID/Latrodectus) injects into svchost, uses Run registry persistence and dynamic TripleDES C2 keys. Zscaler: YiBackdoor
- Steam game patch for BlockBlasters delivered backdoor and StealC stealer to players, exfiltrating system and wallet data. G Data: BlockBlasters malware
- GreedyBear campaign used malicious Firefox extensions and executables to steal >US$1M via targeted phishing and extension abuse. Koi Security: GreedyBear deep dive
- macOS XCSSET evolved: added Firefox data exfiltration, clipboard walletâaddress substitution, LaunchDaemon persistence and runâonly AppleScript execution. Microsoft: XCSSET update
- North Koreaâlinked operators used ClickFix/social engineering to distribute BeaverTail and InvisibleFerret via fake hiring sites. GLâSecurity: BeaverTail/InvisibleFerret
- Vietnamese actor(s) shifted from PXA Stealer to PureRAT via multiâstage inâmemory loaders and .NET process hollowing; related Lone None campaigns used copyrightâtakedown lures and Telegram C2s. Huntress: PureRAT / actor evolution
- Large malvertising campaign impersonating TradingView across Meta, Google and YouTube delivered multiâstage downloaders/stealers that persist via scheduled tasks and Defender exclusions; expanded to macOS/Android. Bitdefender: TradingView malvertising
Supplyâchain & Repository Abuse
- Selfâpropagating npm worm ShaiâHulud trojanized >500 packages (including @ctrl/tinycolor), hijacked maintainers, injected postinstall scripts to steal tokens/keys and propagate. SecureList: ShaiâHulud npm worm
- Multiple malicious packages abused registries: a QRâsteganography npm package fezbox stole browser cookies/passwords, and two Rust crates impersonating fast_log scanned repos for Solana/Ethereum keys and exfiltrated matches. Socket: Malicious npm & Rust packages
Botnets, Loaders & DDoS
- ShadowV2 DDoSâforâhire uses GitHub Codespaces C2, Python spreader with Docker, and a Go RAT with HTTP/2 rapid reset and Cloudflare UAM bypass to enable large HTTP floods. Darktrace: ShadowV2 botnet
- LoaderâasâaâService infrastructure exploited SOHO router/IoT commandâinjection and enterprise app flaws to distribute multiâarch loaders (Morte, Mirai, RondoDoX) and cryptominers, driving a JulyâAug attack spike. CloudSEK: LoaderâasâaâService
Ransomware, Cloud & Major Operational Impacts
- LockBit 5.0 analyzed: Windows, Linux and ESXi variants with heavy obfuscation, inâmemory DLL reflection, ETW patching and ESXi VMâwide encryption. Trend Micro: LockBit 5.0
- Widespread disruptions across European airports after an incident impacting Collins Aerospaceâs MUSE passenger processing platform; investigations point to multiple plausible actors though no definitive family confirmed. CYFIRMA: MUSE incident analysis
- Jaguar Land Rover global IT outage (Sep 2025) halted manufacturing/retail; leaked data and prior infostealer/Jira credential abuse increased followâon risk. CYFIRMA: Jaguar Land Rover investigation
- Ransomware actors increasingly steal and abuse AWS programmatic keys (Pacu usage) to enumerate/escalate cloud access; rapid detection (disable keys, audit, monitor controlâplane telemetry) limited impact in investigated cases. Varonis: Stolen AWS keys risk
Stateâaligned APTs & Longâterm Espionage
- Salt Typhoon (PRCâaligned) MSSâdirected program targets telco/defense with router/rootkit implants, contractorâenabled infrastructure and VoIP/lawfulâintercept collection. DomainTools: Salt Typhoon
- RedNovember (TAGâ100) targeted gov/defense/tech using Go backdoors (Pantegana), LESLIELOADER, SparkRAT and appliance compromises (SonicWall, Fortinet, Palo Alto, Ivanti, Check Point). Recorded Future: RedNovember
- Nimbus Manticore (Iranânexus) used tailored spearâphishing and DLL sideâloading families (MiniJunk/MiniBrowse) to target defense, telecom and aviation in Europe/Middle East. Check Point: Nimbus Manticore
- COLDRIVER (Russiaâlinked) updated toolkit with BAITSWITCH downloader and SIMPLEFIX PowerShell backdoor delivered via ClickFix social engineering. Zscaler: COLDRIVER updates
- Longârunning campaign abusing DLL search order hijacking delivered a new PlugX variant with overlaps to RainyDay and Turianâattributed to Naikon by Cisco Talos. Cisco Talos: PlugX / RainyDay
Web & Infrastructure Compromise
- BRICKSTORM Go backdoor (UNC5221âlinked) targets network/virtualization appliances (Linux/BSD, vCenter/ESXi) for longâterm stealth, credential theft and VM cloning; includes YARA, IOCs and hunting guidance. Google Cloud: BRICKSTORM
- Compromised WordPress sites hosted hidden backdoors that created persistent admin accounts, exfiltrated credentials and injected visitor scripts for longâterm control. Sucuri: Hidden WordPress backdoors
- Operation Rewrite used BadIIS modules and SEO poisoning to serve content to crawlers and proxy victims to scam sitesâtargeting East/Southeast Asia with Chineseâspeaking actor links. Unit42: Operation Rewrite (BadIIS)
- CISA advisory on CVEâ2024â36401 (GeoServer) details multiâweek compromise chains (RCE, web shells like China Chopper, Stowaway C2, lateral movement) and recommended mitigations; AttackIQ published emulation templates. CISA: GeoServer advisory & lessons
- Telecom sector phishing surge (MayâJul 2025) abused brand impersonation, DGAâlike domains and the Tycoon2FA kit to harvest Microsoft creds and bypass 2FAâactionable IOCs produced for proactive hunting. ANY.RUN: Telecom phishing surge
Techniques, Infection Chains & Tooling
- Windows shortcut (.LNK) infection chain: Discordâdelivered LNK drops ZIP with malicious DLL executed via odbcconf.exe, disabling AMSI/ETW and persisting via Winlogon Shell modification. K7: LNK â RAT chain
- Zloader updates: Zeusâbased modular trojan revived with obfuscation, DNS tunneling + WebSocket C2, LDAP discovery commands and custom Base32+XOR DNS encryptionâshifting to targeted initial access for ransomware. Zscaler: Zloader technical update
- Techniques observed across campaigns include DLL sideloading, process hollowing, .NET AOT/inâmemory loaders, reg persistence (regsvr32/run keys), and Defenderâexclusion persistence tactics. Representative: TTPs & antiâanalysis summary
Defensive Guidance & Incident Response
- Based on >7,000 IRs, the 11 Essential Cybersecurity Controls prioritize phishingâresistant MFA, EDR, telemetry and fast response to reduce dwell time and impact. Cybereason: 11 essential controls
- Managed EDR: humanâled, telemetryâdriven investigations are key to distinguish malicious activity, determine root cause and enable remediation (real cases: RMM abuse, Akira, RedCurl). Huntress: Managed EDR
- AttackIQ published emulation templates for the CISA GeoServer incident (AA25â266A) to validate detection and response controls across Linux/Windows postâcompromise TTPs. AttackIQ: CISA emulation templates
AI & LLM Security
- Model Context Protocol (MCP) risks: indirect prompt injection and RUG Pull attacks can embed hidden instructions or replace trusted tools, enabling stealthy exfiltration or unauthorized actions in LLM workflows. Netskope: MCP & invisible backdoors
- Microsoft detected an AIâobfuscated SVG credentialâphishing campaign and demonstrated AIâpowered message/context protections in Defender for Office 365 that blocked the attack. Microsoft: AIâobfuscated phishing