Cybersecurity Threat Research âWeeklyâ Recap. The update covers ongoing abuse across Messaging & Social Platforms, including WhatsApp/Android trojans, fake groups targeting seniors, SMS smishing, and AI-generated clone sites harvesting PII. It also highlights ransomware and extortion trends (Yurei, FunkLocker, BQTLock), notable APTs and long-term intrusions (Phantom Taurus, Confucius, Goffee, Lunar Spider, Scattered Lapsus$ Hunters, Lazarus), malware distribution & infrastructure abuse (WordPress malvertising, Detour Dog, WARMCOOKIE, Rhadamanthys, ClickFix, XiebroC2), Linux threats (Koske, FlipSwitch), and threat intel/detection tooling guidance (YARA hunting, intel ops best practices).
#SOCRadar #PhantomTaurus #Confucius #Goffee #LunarSpider #Lazarus #Koske #FlipSwitch #DetourDog #Rhadamanthys #ClickFix #XiebroC2 #MatrixPDF #Yurei #FunkLocker #BQTLock #DetourDog #WARMCOOKIE #WordPressMalvertising #Validin #EclecticIQ
#SOCRadar #PhantomTaurus #Confucius #Goffee #LunarSpider #Lazarus #Koske #FlipSwitch #DetourDog #Rhadamanthys #ClickFix #XiebroC2 #MatrixPDF #Yurei #FunkLocker #BQTLock #DetourDog #WARMCOOKIE #WordPressMalvertising #Validin #EclecticIQ
Messaging & Social Platform Abuse
- WhatsApp-forwarding desktop malware that hijacks WhatsApp Web, persists via LNK/PowerShell and spreads rapidly in Brazil. Trend Micro â SORVEPOTEL via WhatsApp
- PDF toolkit that injects overlays/JS to bypass previews and redirect Gmail users to payloads. Varonis â MatrixPDF phishing toolkit
- Fake Facebook groups targeting seniors to distribute Android trojans (notably Datzbro) for overlays, recording and paymentâcard phishing. Malwarebytes â scam Facebook groups push Android malware
- Two undocumented Android spyware families impersonating Signal/ToTok in the UAE, luring users to sideâload APKs and exfiltrating sensitive files. ESET â Android spyware targeting UAE
- Large-scale smishing via abused Milesight cellular-router APIs (unauthenticated SMS), impersonating government services with campaigns traced to NameSilo/Podaon infrastructure. SEKOIA â Silent Smishing (router API abuse)
- AI/SEO-powered clones of government pages (e.g., IC3) used to harvest PII and trick victims into submitting sensitive reports. Varonis â fake Bureau of Investigation sites
Ransomware & Extortion
- Yurei: Go-based ransomware with per-file ChaCha20+ECIES, strong antiâforensics, SMB/removable spread and doubleâextortion tracking. Cyfirma â Yurei Ransomware
- FunkLocker: AI-assisted ransomware with many inconsistent builds but consistent destructive behavior (.funksec); researchers recovered a decryptor after wallet/key reuse. Any.run/Avast â FunkLocker analysis
- BQTLock: Emerging MiddleâEastern RaaS combining aggressive extortion, political propaganda and AESâ256/RSAâ4096 crypto, marketed to affiliates. SOCRadar â BQTLock profile
APTs & LongâTerm Intrusions
- Phantom Taurus: New Chinese APT using the .NET IISâfocused NETâSTAR suite and DBâcollection scripts against gov/telco targets in Africa/Middle East/Asia. Unit42 â Phantom Taurus & NETâSTAR
- Confucius: South Asia espionage actor evolved from WooperStealer to Python backdoors (AnonDoor), using spearâphishing, LNK/OLE and DLL sideloading. Fortinet â Confucius: stealer â backdoor
- Goffee: Long-term stealth intrusions against Russian targets using legacy and new tooling (DQuic, MiRat, Sauropsida rootkit) and Russian-hosted traffic blending. PT Security â Goffee group tooling
- Lunar Spider chain: JavaScript dropper â MSI â Brute Ratel â Latrodectus/backconnect VNC â Cobalt Strike and long-lived exfiltration (Rclone/FTP). DFIR Report â Lunar Spider intrusion
- Scattered Lapsus$ Hunters: Alliance of Scattered Spider/LAPSUS$/ShinyHunters scaling vishing, OAuth abuse and trojanized Data Loader apps to steal data from âĽ91 orgs. SOCRadar â Scattered Lapsus$ Hunters
- Lazarus subgroup: Operators used three RATs (PondRAT5, ThemeForestRAT, RemotePE) against finance/crypto; DNS traps and WHOIS/traffic analysis produced expanded IoCs. CircleID â Lazarus RATs DNS trap
Malware Distribution & Infrastructure Abuse
- WordPress theme compromise: functions.php injected PHP that loads external JS for redirects, popâups and hidden iframe driveâby payloads across multiple sites while evading Cloudflare. Sucuri â WordPress malvertising
- Detour Dog: DNS TXTâbased control returns Base64 âdownâ URLs to make compromised sites fetch and relay Strela/StarFish payloads; campaign persisted across thousands of sites. Infoblox â Detour Dog & Strela Stealer
- WARMCOOKIE developments: new handlers (PE/DLL/PowerShell), campaign IDs for clustering, reused SSL certs and CASTLEBOT as a loader. Elastic â Revisiting WARMCOOKIE
- Rhadamanthys v0.9.x: Major format and unpacking changes (XS1_B/XS2_B, LZO, PNG stage), breaking older tools; Check Point released updated unpackers and deobfuscators. Check Point â Rhadamanthys 0.9.x
- ClickFix browser stealer: fake CAPTCHA pages trick victims into executing PowerShell; Guardio published 172 IoCs and WHOIS/DNS analysis found thousands more related domains/IPs. CircleID/Guardio â ClickFix CAPTCHAgeddon
- Exposed MSâSQL servers abused with weak creds and JuicyPotato to deploy XiebroC2 (often with coinminers); report includes HostPort/Protocol/AesKey IoCs. AhnLab â XiebroC2 in MSâSQL attacks
Linux Threats & Kernel Evasion
- Koske: AI-generated Linux cryptoâminer delivered via misconfigured JupyterLab using polyglot JPEG+shellcode; installs rootkits, persists via .bashrc/systemd and runs minersâdetection guidance provided using SysmonForLinux/Wazuh. Wazuh â Detecting Koske
- FlipSwitch: New syscallâhooking rootkit technique for Linux 6.9 that patches the x64_sys_call dispatcher call to redirect specific syscalls. Elastic â FlipSwitch syscall hooking
Threat Intel, Detection & Research Tooling
- Validin added YARA retroâhunting over archived virtual host responses to find historical infrastructure artifacts (e.g., thousands of exposed API keys). Validin â YARA hunting for internet infrastructure
- Operational guidance: prioritize contextualized intel, automation, STIX/MITRE alignment and vendor partnerships to reduce alert fatigue and speed response. EclecticIQ â customer spotlight on intel ops