Cybersecurity Threat Research âWeeklyâ Recap highlights a broad spectrum of activity, from APT and state-backed espionage campaigns to email, banking malware, ransomware, phishing, and supply-chain abuse, along with updates on detection and defensive tooling. Key actors and families mentioned include APT35, APT24, ToddyCat, MuddyWater, UNC1549, Curly COMrades, Kimsuky, NotDoor, WaterSaci, Astaroth, Eternidade, Sarcoma, Lynx, Akira, The Gentlemen, Tycoon2FA, Tsundere, PlushDaemon, NKNShell, TamperedChef, and related C2 and advancement trends.
#APT35 #APT24 #ToddyCat #MuddyWater #UNC1549 #CurlyCOMrades #Kimsuky #NotDoor #WaterSaci #Astaroth #Eternidade #Sarcoma #Lynx #Akira #TheGentlemen #Tycoon2FA #Tsundere #PlushDaemon #NKNShell #TamperedChef
#APT35 #APT24 #ToddyCat #MuddyWater #UNC1549 #CurlyCOMrades #Kimsuky #NotDoor #WaterSaci #Astaroth #Eternidade #Sarcoma #Lynx #Akira #TheGentlemen #Tycoon2FA #Tsundere #PlushDaemon #NKNShell #TamperedChef
APTs & state-backed espionage
- Leaked APT35 corpus shows quota-driven IRGC operations exploiting Exchange (ProxyShell/Autodiscover/EWS), mailbox monitoring, KPI-driven ops. â APT35 leak
- GTIG details APT24âs multi-vector espionage using obfuscated BADAUDIO downloader, web/supplyâchain compromises, and Cobalt Strike payloads. â APT24 / BADAUDIO
- ToddyCat expanded toolset to exfiltrate browser creds, DPAPI keys, Outlook OSTs and M365 tokens via SMB collection and memory dumps. â ToddyCat email theft
- GroupâIB exposes a refreshed MuddyWater toolkit enabling international espionage with new implants and TTPs. â MuddyWater toolkit
- UNC1549 targeted aerospace/defense with spear-phishing, supplier compromise and custom backdoors (TWOSTROKE, DEEPROOT, etc.) using Azure/SSH tunnels. â UNC1549 analysis
- Curly COMrades abused HyperâV to host hidden Alpine VMs running custom implants (CurlyShell, CurlCat) for covert persistence and proxying. â Curly COMrades
- Contagious Interview: DPRK fakeâjob platform lures AI/crypto talent into clipboardâhijack workflows that deliver staged VBScript loaders and multiâstage malware. â Contagious Interview
- Kimsuky campaign using weddingâphoto lures to deliver malware via social engineering (regional/actor attribution reporting). â Kimsuky weddingâphoto lure
Email, Outlook, and mailbox-focused threats
- NotDoor Outlook VBA backdoor (APT28) uses OneDrive DLL sideloading, encoded PowerShell, registry persistence and emailâtriggered C2 detection artifacts. â NotDoor (Outlook)
- Exchange/Outlookâcentric campaigns and tools (mailbox monitoring, OST/Token theft) persistent in multiple APT operations. â Emailâcentric theft (ToddyCat)
Messaging-borne banking malware (WhatsApp & worms)
- WaterâSaci campaign abused WhatsApp Web via Python/Selenium to propagate banking trojans and inâmemory payloads targeting Brazil. â WaterâSaci / WhatsApp
- STAC3150 WhatsApp campaign delivered downloaders that harvest WhatsApp session data and ultimately install Astaroth banking trojan via Selenium/WPPConnect. â Astaroth via WhatsApp
- Trustwave SpiderLabs found Eternidade stealer distributed through a WhatsAppâpropagating worm with MSI droppers and localized Brazilian targeting. â Eternidade / WhatsApp
- Maverick/Coyote banking trojans continue spreading via WhatsApp downloads and obfuscated loaders targeting Brazilian banks. â Maverick / Coyote
WSUS & softwareâupdate exploitation
- Actors exploited WSUS RCE (CVEâ2025â59287) to deploy Velociraptor from S3 and configure malicious update C2 endpoints for persistent C2. â WSUS â Velociraptor
- Separate findings show ShadowPad delivered via the same WSUS RCE chain using certutil/curl and ETDApix.dll sideloading; mitigation: patch WSUS and restrict access. â ShadowPad via WSUS
Ransomware & extortion trends
- October 2025 ransomware trends: Inc_Ransom dominance and new Qilin activity (notable attacks vs. Japanese firms) with DLS stats and detection signals. â Oct 2025 ransomware trends
- CISA/FBI update on Akira RaaS: documented TTPs include credential dumping, lateral movement, ChaCha20/RSAâ4096 encryption and high ransom demands. â Akira advisory
- Sarcoma profiled as a fastâemerging doubleâextortion RaaS targeting Windows/Linux/ESXi across US, Italy and Canada. â Sarcoma profile
- Lynx intrusion used valid RDP creds, rapid lateral movement, data exfiltration to temp.sh and backup deletion before encryption. â Lynx incident
- Analysis of The Gentlemen ransomware family, TTPs and observed campaigns. â The Gentlemen
Phishing, MFA bypass & social engineering
- Tycoon 2FA PhaaS uses realâtime AdversaryâinâtheâMiddle pages to capture credentials, session tokens and bypass legacy MFA with dynamic obfuscation. â Tycoon 2FA
- Phishing trends (Oct 2025): attachments dominated by Trojans (47%), heavy use of OLE downloaders and compressed JS droppersâregional focus on Korean campaigns. â Oct 2025 phishing trends
- Threat actor campaign delivering signed MSI/EXE installers via holiday/party invite lures to install persistent RMM tools (ScreenConnect, LogMeIn Resolve, Naverisk). â RMM via phishing lures
- Abuse of URL shorteners (t.ly, tinyurl, rebrand.ly, is.gd, goo.su, qrco.de) to scale credential phishing and malware delivery across multiple families. â URL shorteners abused
Malware ecosystems, supplyâchain & signed/packaged abuse
- âTamperedChefâ global malvertising/SEO campaign uses acquired codeâsigning certificates to distribute signed fake installers and obfuscated JS backdoors. â TamperedChef signed installers
- npmâbased campaign (dino_reborn) used Adspect cloaking to fingerprint and serve fake CAPTCHAs that redirect to malicious cryptoâphishing sites. â npm + Adspect cloaking
- Tsundere Node.js botnet installs via MSI/PowerShell, uses npm libs and stores WebSocket C2 addresses in an Ethereum smart contract. â Tsundere / blockchain C2
Infostealers, commodity malware & novel obfuscation
- AhnLabâs infostealer report: SEOâpoisoned crack/keygen distribution, DLL sideloading, and top families (Rhadamanthys, ACRStealer, LummaC2) with C2 patterns. â Infostealer trend report
- MaskedâinâMemory Python sample unpacks a marshalled .pyc, injects into cvtres.exe and loads a .NET component for encrypted C2. â Hidden .pyc memory loader
- DarkComet RAT variant hidden inside fake Bitcoin tool RAR installs persistence, keylogging and beacons to hardcoded DDNS C2. â DarkComet Bitcoin lure
- Netskope shows LLMs (GPTâ3.5/4 and early GPTâ5 tests) can generate malicious codeâLLMâpowered malware feasible but often unreliable; guardrails affect capability. â LLMâpowered malware
- â5 Ways Cybercrime Became a Subscription Businessâ highlights payâasâyouâgo services (phishing, OTP bots, access rentals) lowering attacker barriers. â Crime as subscription
- LOLBin abuses explained with interactive sandbox examples to reveal livingâoffâtheâland misuse and detection pointers. â LOLBin attacks guide
- macOS AppleScript droppers (.scpt) used as socialâengineered droppers for MacSync/Odyssey stealers, bypassing Gatekeeper via user interaction. â macOS AppleScript droppers
Network implants, updateâhijacking & C2 innovation
- ESET documents PlushDaemon using MIPS EdgeStepper implants to forward DNS, hijack updates and deploy SlowStepper backdoors via updateâhijacking chain. â PlushDaemon / EdgeStepper
- Larvaâ24010 distributed trojanized VPN installer that deploys MeshAgent, gsânetcat and new NKNShell using NKN/MQTT for C2; persistence via PowerShell downloaders. â NKNShell via VPN site
Detection, threat intelligence & defensive tooling
- Recorded Future showcases automated threat intelligence for machineâspeed detection, ML risk scoring and SIEM/SOAR/EDR integrations. â Threat intel automation
- Recorded Futureâs Threat Intelligence Maturity Model (ReactiveâAutonomous) and operationalization guidance for CTI teams. â Operational CTI model
- SentinelOne released a Validin + Synapse powerâup for timeâaware, crossâsource infra discovery and campaign expansion pivots. â Threat Hunting Power Up
- Datadog highlighted as a 2025 cloud security leader for linking code, observability and runtime security to reduce investigation complexity. â Datadog cloud security
- AttackIQ published Sandworm emulation content detailing webshells, livingâoffâtheâland TTPs and sample artifacts for red/blue teams. â Sandworm emulation