Cybersecurity News | Daily Recap [16 Aug 2025]

Cybersecurity News | Daily Recap [16 Aug 2025]

Cybersecurity experts highlight ongoing threats from nation-state APTs like UAT-7237, which breached Taiwanese web servers using persistent methods. Major malware activities include the leak of ERMAC v3.0 source code and Russian exploitation of Windows CVE-2025-26633 by EncryptHub, emphasizing evolving cyberattack techniques. #ERMAC #UAT7237

Events

  • Virtual conference CodeSecCon 2025 spotlights defenses for modern apps against evolving threats like AI-powered attacks and supply chain risks – CodeSecCon 2025

Malware & Exploits

  • Leaked source code reveals the full infrastructure of the Android banking trojan ERMAC v3.0, which targets over 700 apps and offers defenders insight into its capabilities – ERMAC Leak
  • Russian group EncryptHub abuses Windows flaw CVE-2025-26633 and social-engineering (fake Teams requests) to deliver backdoors and the Fickle Stealer, blending malicious traffic with normal communications – EncryptHub Exploit

Ransomware

  • Ransomware activity climbs as group Qilin remains the top threat in July (its third win in four months), increasingly targeting critical infrastructure and supply chains – Qilin Rise
  • The Blue Locker ransomware campaign is targeting Pakistan’s oil & gas sector and government ministries, prompting a National CERT advisory and vendor analysis – Blue Locker

Microsoft Zero-day & High-profile Breaches

  • Attackers exploited a Microsoft vulnerability (CVE-2025-53770) to breach Canada’s House of Commons, exposing employee and device information and highlighting risks to national institutions – Canada Breach
  • UK telecom Colt suffered multi-day outages after a cyberattack claimed by the WarLock gang, with alleged data theft and sale and reports tying the incident to a Microsoft SharePoint zero-day (CVE-2025-53770) – Colt Outage, Colt Outage, Colt Outage

APT & Nation-State Activity

  • Chinese-speaking APT UAT-7237 breached Taiwan web servers using customized open-source tools, web shells and persistence methods (e.g., RDP, SoftEther VPN) to maintain long-term access – UAT-7237 Attack

Fraud & Money Laundering

  • Criminals in Southeast Asia increasingly use β€œghost-tapping”, mobile malware and Telegram marketplaces to launder proceeds from retail fraud and stolen payment card data, expanding the regional cybercrime ecosystem – Ghost-Tapping Fraud

Cybersecurity News | Daily Recap – hendryadrian.com