Cybersecurity Threat Research âWeeklyâ Recap: the report surveys supply-chain compromises, ransomware/defense evasion, infostealers, targeted espionage, cloud and identity threats, phishing, vulnerabilities and detection, labs automation and resilience guidance. It highlights notable campaigns and families such as the Notepad++ supply-chain attack, GlassWorm on Open VSX, dYdX npm/PyPI abuse, DYNOWIPER in Polish energy, Black Basta kernel-driver evasion, SonicWall SSLVPN intrusion, APT28 and Shadow Campaigns, Amaranth-Dragon, Transparent Tribe, Stan Ghouls, Prometei, ShinyHunters, NGOSS and ZHGUI breaches, plus attempts at web-infra abuse (Quest KACE, NGINX hijacking, CrashFix/ClickFix) and AI-assisted cloud intrusion via Amazon Bedrock. #NotepadPlusPlus #GlassWorm #OpenVSX #dYdX #DYNOWIPER #BlackBasta #SonicWall #APT28 #ShadowCampaigns #AmaranthDragon #TransparentTribe #StanGhouls #Prometei #ShinyHunters #NGOSS #ZHGUI #QuestKACE #CrashFix #ClickFix #GOAD #NGINX #Baota #AmazonBedrock #DetectionsAsCode
Supplyâchain & repository compromises
- Attackers abused hosting and developer accounts to deliver signed/updated binaries and extensions that load backdoors and steal credentials; selective update redirects and NSIS/Lua/DLL sideloading observed. Notepad++ supplyâchain analysis
- Compromised Open VSX developer account published malicious extensions that staged AES loaders and delivered a macOS stealer (cookies, keychain, AWS/SSH tokens). GlassWorm hits Open VSX
- Coordinated typosquatting releases on npm and PyPI embedded walletâstealing exfiltration and a RAT in PyPI â seed phrases and device fingerprints targeted. dYdX malicious packages (npm/PyPI)
Ransomware, destructive campaigns & defense evasion
- DYNOWIPER wiped data at Polish energy sites; detection and canary protections blocked damage; attribution links to multiple nationâlinked clusters. DYNOWIPER destructive campaign (Poland)
- Black Basta bundled a vulnerable kernel driver to kill security processes and evade detection, followed by sideâloaded loaders and GotoHTTP RAT presence. Black Basta: kernelâdriver EDR evasion
- SonicWall SSLVPN compromise led to aggressive reconnaissance and a signed (revoked) kernel driver dropped as OemHwUpd.sys to terminate EDRs and persist as a kernel service. SonicWall intrusion & EDRâkiller
- Trend: infostealers increasingly feed Initial Access Brokers and compress timelines to rapid ransomware/extortion chains â focus on credential hygiene and identity defenses. Convergence of infostealers & ransomware
Infostealers, crypto drainers & fraud ecosystems
- Marco Stealer exfiltrates browser and cryptoâwallet data using runtime decryption, antiâanalysis, named pipes and DLL injection; AESâencrypted exfil to HTTP C2s. Marco Stealer technical analysis
- Infostealer campaigns increasingly target macOS and crossâplatform stacks (AppleScript, fake installers, Python stealers) to harvest credentials, keychain and developer secrets. Infostealers without borders (macOS & Python)
- Affiliate cryptoscam operation uses JS Solana wallet drainers, spoofed landing pages and Telegram automation to harvest and launder ~USD 10.9M from victims. Rublevka Team: Solana drainers
APTs & targeted espionage
- Large stateâaligned campaign (TGRâSTAâ1030 / âShadow Campaignsâ) used phishing, custom loaders and a novel eBPF rootkit to compromise government and infrastructure across 37 countries. Shadow Campaigns: global espionage
- AmaranthâDragon weaponized WinRAR CVEâ2025â8088 to deliver Amaranth Loader, Havoc C2 and a Telegram RAT in targeted SE Asia espionage ops. AmaranthâDragon (CVEâ2025â8088)
- APT28 actively exploited CVEâ2026â21509 (KillâBit bypass) via weaponized RTF docs to deploy MiniDoor and PixyNetLoader with COM hijack and steganographic staging. APT28 / CVEâ2026â21509 (Operation Neusploit)
- Transparent Tribe (APT36) shifted toward Indiaâs startup ecosystem, delivering Crimson RAT via ISO/LNK lures; reuse of established APT tooling observed. Transparent Tribe targets startups
- Stan Ghouls (Bloody Wolf) targeted Uzbekistan and nearby regions with spearâphishing PDFs and a Java loader that installs NetSupport components; Mirai binaries found near infrastructure. Stan Ghouls: NetSupport campaign
- Prometei botnet infection on a Windows Server dissected: deployment, unpacking, persistence, C2, YARA and remediation guidance included for containment. Prometei botnet on Windows Server
Cloud, SaaS & identity threats (incl. AIâassisted operations)
- Attackers used exposed S3 creds and injected code into Lambda to create admin keys, move across 19 principals, abuse Amazon Bedrock and provision GPUs â evidence of LLMâassisted playbooks. AIâassisted cloud intrusion (Sysdig)
- Expansion of ShinyHuntersâbranded SaaS extortion: vishing, SSO credential harvesting and MFA enrollment abuse to exfiltrate cloud data; immediate containment and phishingâresistant MFA recommended. ShinyHunters SaaS dataâtheft & defenses
- Leaked fourthâparty engineer credentials exposed a central NGOSS portal for >200 airports â vendor revoked access and forced emergency MFA to avert operational outages. Hidden backdoor to 200 airports (NGOSS)
Phishing, scams & social engineering
- Widespread WhatsApp account takeovers push urgent money requests; users urged to verify via other channels, close active sessions, enable twoâstep verification and report incidents. WhatsApp moneyârequest scam
- PHALT#BLYX phishing used fake CAPTCHAs and BSOD decoys to deliver DCRat; expanded IoCs and thousands of potential victim IPs/domains uncovered. PHALT#BLYX / DCRat campaign
- Phishing kits increasingly use legitimate cloud/CDN platforms (Cloudflare, Azure, Firebase, AWS) and reverseâproxy AiTM tooling (Tycoon2FA, EvilProxy) to bypass enterprise detections. Enterprise phishing abusing trusted platforms
- ZHGUI mirrorâexchange crypto scam targeted Mandarin speakers via WhatsApp communities, fake dashboards and a structured onâchain laundering pipeline. Crossâborder crypto investment scam (ZHGUI)
Vulnerabilities, exploitation techniques & web infra abuse
- Quest KACE Desktop Authority exposed a SYSTEMâowned named pipe that allowed authenticated users to invoke privileged actions (RCE, credential retrieval); vendor patches or segmentation recommended. Quest KACE namedâpipe RCE
- Active campaign injects malicious NGINX config to intercept and proxy traffic (Baota panel abused); automation covers discovery, injection, persistence and exfiltration. NGINX config injection & traffic hijacking
- ClickFix evolved into âCrashFixâ: malicious Chrome extension impersonates uBlock, forces browser crashes and tricks users into executing commands that deploy obfuscated PowerShell/Python RATs. CrashFix / ClickFix variant (browser extension)
Detection, labs & SOC automation
- Automated, scalable cyberârange built with Ludus runs live malware (GOAD, XZbot) in isolated VMs instrumented with Elastic Agent to validate detections and AIâassist hunting. Automating GOAD & live malware labs
- Detections as Code: Elastic extended rule repositories, CI/CD, testing and schema tools so teams can author, version and deploy detection rules as code. Elastic: Detections as Code
- Elastic introduced Agent Builder + Workflows to combine probabilistic agents and deterministic automation for alert enrichment, triage and safe containment â moving toward an autonomous SOC. From alert fatigue to agentic response
Trends & telemetry
- MSâISAC Q4 2025 telemetry: overall malware notifications +7% QoQ; SocGholish ~30% of detections; CoinMiner and Agent Tesla also prevalent with diverse vectors (malvertising, WMI, malspam). Top 10 malware â Q4 2025
Operational security & digital resilience
- Practical, incremental guidance to reduce dependence on nonâEU hosted messaging and cloud services: inventory, triage by importance, adopt realistic alternatives (Signal/Matrix/Nextcloud) and favor gradual replacement. Go European â alternatives & migration steps