Threat Research | Weekly Recap [02 Nov 2025]

Threat Research | Weekly Recap [02 Nov 2025]

Cybersecurity Threat Research ‘Weekly’ Recap. A wide range of topics cover Tor-based SSH backdoors, supply-chain and dev-tooling compromises, cloud abuse and credential theft, active vulnerabilities and exploits, diverse malware families and ransomware trends, phishing and mobile propagation, botnets and anonymized infrastructure, APTs and regional campaigns, detection frameworks and risk management, and a large leak exposing Great Firewall internals.

Tor-based SSH / anonymized backdoors

Supply-chain & developer-tooling compromises

Cloud abuse, credential theft & detection

Vulnerabilities & active exploitation

  • Unauthenticated deserialization RCE in WSUS (CVE-2025-59287) was actively exploited against exposed WSUS instances (ports 8530/8531); Microsoft issued emergency fix and CISA KEV listing. WSUS CVE-2025-59287 → active exploitation
  • Zero-day exploitation of Motex LANSCOPE (CVE-2025-61932) gave SYSTEM RCE to BRONZE BUTLER, enabling backdoors (Gokcpdoor/Havoc) and data theft—patch and review internet-facing instances. BRONZE BUTLER → LANSCOPE zero-day
  • Active exploitation of Apache ActiveMQ deserialization (CVE-2023-46604) to deploy Kinsing/Sharpire, miners and Cobalt Strike via manipulated OpenWire payloads. ActiveMQ → Kinsing / Sharpire
  • Operation ForumTroll used a Chrome sandbox escape (CVE-2025-2783) to deliver loaders and spyware (LeetAgent, Dante) with Fastly-hosted C2s and advanced persistence. ForumTroll → Chrome zero-day

Malware, RATs & post‑exploitation frameworks

Ransomware & leak-site activity

Messaging, mobile propagation & phishing

Botnets, anonymized infrastructure & monitoring

APTs, intrusions & regional campaigns

  • APT‑C‑60 escalated SpyGlace campaigns vs Japan with evolved backdoors, refined VHDX delivery and stealthy use of GitHub/StatCounter for distribution. APT‑C‑60 SpyGlace → targeted espionage
  • Russian-linked intrusions against Ukrainian organizations used Localolive webshells, LOTL tooling and credential harvesting for prolonged access. Ukraine-targeted ops → Localolive
  • Darktrace analysis of a recent intrusion attributed to a cluster dubbed Salt Typhoon highlighting behavioral detection telemetry. Salty Much → intrusion view

Detection frameworks, SOC & risk management

Leaks, exposures & digital‑risk signals

  • Massive leak (≈500–600 GB) of China’s censorship/Great Firewall internal data including source code, PCAPs and configs, exposing heuristics for Psiphon, V2Ray, Shadowsocks and vendor/ISP links. Great Firewall dump → censorship infra leak

Threat Research | Weekly Recap – hendryadrian.com