Threat Research | Weekly Recap [03 Aug 2025]

Threat Research | Weekly Recap [03 Aug 2025]

This weekly recap highlights significant developments in ransomware, malware, and threat actor tactics, including the propagation of Linux variants and credential theft tools. It underscores emerging vulnerabilities in supply chain software and sophisticated espionage campaigns linked to state actors. #QilinRansomware #LockBit #ShadowCoil #Gunra #ScatteredSpider #ToolShellZeroDay #Hafnium #TraderTraitor

Ransomware and Malware Operations

Supply Chain and Software Vulnerabilities

Espionage and State-Sponsored Threats

  • Secret Blizzard AiTM Campaign: Russian state actor uses adversary-in-the-middle attacks at Moscow ISPs deploying ApolloShadow malware to intercept embassy traffic. Frozen in Transit: Secret Blizzard’s AiTM Campaign
  • DPRK IT Workers Infiltration: North Korea’s Reconnaissance General Bureau embeds operatives in global remote IT work with complex laundering schemes to fund cyber espionage and infrastructure access. From Laptops to Laundromats: DPRK Infiltration
  • TraderTraitor Crypto Heists: North Korean Lazarus-linked group targets blockchain ecosystems through social engineering and cloud attacks, responsible for multi-billion dollar crypto breaches. TraderTraitor: North Korean Crypto Threat
  • UNC3886 APT Tactics: This group targets critical infrastructure with zero-days and stealthy malware including Linux rootkits and living-off-the-land techniques. Revisiting UNC3886 Tactics
  • Interlock Group Malware Arsenal: Multi-stage ransomware operations leverage PHP backdoors, PowerShell, and LOLBins for evasion and persistence. Detailed Python detection scripts provided. Unmasking Interlock Group’s Malware
  • Hafnium-Linked Forensics Tools: SentinelLABS exposes advanced forensic and encrypted data collection tech tied to Chinese government-affiliated companies connected with Hafnium activity. China’s Covert Capabilities: Silk Spun from Hafnium
  • Global Telecom Network Infiltration: Unit 42 tracks CL-STA-0969—a nation-state cluster using stealthy backdoors and implants in Southwest Asian telecom infrastructure. The Covert Operator’s Playbook

Information Stealers and Infostealer-as-a-Service

Phishing, Social Engineering, and Credential Theft

Network Censorship, Exploits, and Infrastructure Attacks

Cyber Hygiene, Incident Response & Awareness

Emerging Threats and Trends

  • Google Redirect Abuse 2024: Attackers exploit Google AMP, Maps, and Translate redirects using URL tricks and CAPTCHA bypass to increase phishing effectiveness. Google Redirect Abuse in 2024: Key Trends and Tactics
  • DeerStealer and July 2025 Malware Highlights: Notable attacks include obfuscated .LNK-delivered DeerStealer, Snake Keylogger, and fake 7-Zip installers abusing legit Remote Access Tools. Major Cyber Attacks in July 2025

Threat Research | Weekly Recap – hendryadrian.com