Threat Research | Weekly Recap [05 Oct 2025]

Threat Research | Weekly Recap [05 Oct 2025]

Cybersecurity Threat Research ‘Weekly’ Recap. The update covers ongoing abuse across Messaging & Social Platforms, including WhatsApp/Android trojans, fake groups targeting seniors, SMS smishing, and AI-generated clone sites harvesting PII. It also highlights ransomware and extortion trends (Yurei, FunkLocker, BQTLock), notable APTs and long-term intrusions (Phantom Taurus, Confucius, Goffee, Lunar Spider, Scattered Lapsus$ Hunters, Lazarus), malware distribution & infrastructure abuse (WordPress malvertising, Detour Dog, WARMCOOKIE, Rhadamanthys, ClickFix, XiebroC2), Linux threats (Koske, FlipSwitch), and threat intel/detection tooling guidance (YARA hunting, intel ops best practices).
#SOCRadar #PhantomTaurus #Confucius #Goffee #LunarSpider #Lazarus #Koske #FlipSwitch #DetourDog #Rhadamanthys #ClickFix #XiebroC2 #MatrixPDF #Yurei #FunkLocker #BQTLock #DetourDog #WARMCOOKIE #WordPressMalvertising #Validin #EclecticIQ

Messaging & Social Platform Abuse

Ransomware & Extortion

  • Yurei: Go-based ransomware with per-file ChaCha20+ECIES, strong anti‑forensics, SMB/removable spread and double‑extortion tracking. Cyfirma — Yurei Ransomware
  • FunkLocker: AI-assisted ransomware with many inconsistent builds but consistent destructive behavior (.funksec); researchers recovered a decryptor after wallet/key reuse. Any.run/Avast — FunkLocker analysis
  • BQTLock: Emerging Middle‑Eastern RaaS combining aggressive extortion, political propaganda and AES‑256/RSA‑4096 crypto, marketed to affiliates. SOCRadar — BQTLock profile

APTs & Long‑Term Intrusions

Malware Distribution & Infrastructure Abuse

  • WordPress theme compromise: functions.php injected PHP that loads external JS for redirects, pop‑ups and hidden iframe drive‑by payloads across multiple sites while evading Cloudflare. Sucuri — WordPress malvertising
  • Detour Dog: DNS TXT‑based control returns Base64 “down” URLs to make compromised sites fetch and relay Strela/StarFish payloads; campaign persisted across thousands of sites. Infoblox — Detour Dog & Strela Stealer
  • WARMCOOKIE developments: new handlers (PE/DLL/PowerShell), campaign IDs for clustering, reused SSL certs and CASTLEBOT as a loader. Elastic — Revisiting WARMCOOKIE
  • Rhadamanthys v0.9.x: Major format and unpacking changes (XS1_B/XS2_B, LZO, PNG stage), breaking older tools; Check Point released updated unpackers and deobfuscators. Check Point — Rhadamanthys 0.9.x
  • ClickFix browser stealer: fake CAPTCHA pages trick victims into executing PowerShell; Guardio published 172 IoCs and WHOIS/DNS analysis found thousands more related domains/IPs. CircleID/Guardio — ClickFix CAPTCHAgeddon
  • Exposed MS‑SQL servers abused with weak creds and JuicyPotato to deploy XiebroC2 (often with coinminers); report includes HostPort/Protocol/AesKey IoCs. AhnLab — XiebroC2 in MS‑SQL attacks

Linux Threats & Kernel Evasion

  • Koske: AI-generated Linux crypto‑miner delivered via misconfigured JupyterLab using polyglot JPEG+shellcode; installs rootkits, persists via .bashrc/systemd and runs miners—detection guidance provided using SysmonForLinux/Wazuh. Wazuh — Detecting Koske
  • FlipSwitch: New syscall‑hooking rootkit technique for Linux 6.9 that patches the x64_sys_call dispatcher call to redirect specific syscalls. Elastic — FlipSwitch syscall hooking

Threat Intel, Detection & Research Tooling

Threat Research | Weekly Recap – hendryadrian.com