This weekly recap covers the latest cyber threats including ransomware campaigns, supply chain exploits, and state-sponsored activities targeting various sectors. It highlights sophisticated toolchains, zero-day abuses, and evolving malware, emphasizing the need for vigilant security measures. #RejettoHFS #Akira #SharePointVulnerabilities #DarkCloud #PXA #BlueNoroff
Ransomware & Access Abuse
- Unauthenticated RCE in Rejetto HFS â Attackers scanned exposed HFS servers exploiting CVEâ2024â23692 to deploy droppers and ransomware (samples: Farfli, Zenpak, jqvtd). Imperva: Rejetto HFS campaign
- Bumblebee to Akira: SEO-poisoned IT tools â Trojanized IT management tools delivered via SEO poisoning led to privileged IT account compromise and deployment of Akira ransomware. DFIR: Bumblebee â Akira
- MSP targeting by RaaS gangs â Akira and Lynx actors (RaaS) increasingly target MSPs/SMBs using stolen credentials, VPN flaws and EDRâdisabling techniques. Acronis: MSPs targeted by Akira & Lynx
- Active SonicWall zeroâday abuse â Active exploitation of a SonicWall VPN zeroâday bypasses MFA and has been used to push Akira, with urgent mitigation recommended. Huntress: SonicWall VPN exploitation
Vulnerabilities & Exploitation Chains
- SharePoint ToolShell attacks + Project AK47 â Chinaâlinked actors abused chained SharePoint flaws (ToolShell) to deploy web shells, exfiltrate keys and deliver the Project AK47 malware family (backdoors, loaders, ransomware ties to LockBit affiliates). Unit42: Project AK47 & ToolShell
- SAP NetWeaver â AutoâColor backdoor â Exploitation of CVEâ2025â31324 led to a Linux ELF RAT using ld.so.preload persistence and suppressed C2 activity when unreachable. Darktrace: AutoâColor backdoor
- Streamlit fileâupload flaw enables cloud takeover â Clientâside validation bypass lets attackers upload dangerous files to misconfigured cloud instances, risking dashboard tampering and account takeover. CatoNetworks: Streamlit file upload issue
Stealers, Infostealers & Campaign Evolution
- DarkCloud stealer â new variants & obfuscation â Multiâstage phishing with fileless payloads, process hollowing and ConfuserEx/VB6 obfuscation complicates detection and credential theft campaigns. Unit42: DarkCloud infection chains
- PXA Stealer & Telegram ecosystem â Pythonâbased PXA Stealer campaign targeted >4,000 victims and monetizes data via Telegramâpowered marketplaces. SentinelOne: PXA Stealer
- Efimer cryptoâtheft via mass mailings â ClipBankerâstyle Trojan replaces wallet addresses, harvests mnemonics and communicates over Tor; distribution via email, compromised WordPress sites and torrents. Kaspersky: Efimer campaign
- REMCOS delivered via malicious LNKs â Stealthy LNKs use PowerShell/Base64 chains to drop the REMCOS backdoor in multiâstage attacks. PointWild: REMCOS via LNK
- Raspberry Robin updates â Continued evolution with new obfuscation, encryption and local EoP exploits; operators use invalid TOR names to frustrate IOC harvesting. Zscaler: Raspberry Robin tracking
- Silent Watcher â Cmimai stealer VBS â K7 Labsâ analysis shows a multiâstage VBS payload that loads obfuscated modules to steal credentials and browser data; the report highlights persistent obfuscation and modular exfiltration. #Cmimai #VBS K7 Labs: Silent Watcher (Cmimai)
Mobile Banking & Android Threats
- DoubleTrouble Android banker â Android trojan abuses Accessibility Services, hides payloads in resources, records screens and overlays to steal PINs; distribution shifted to Discordâhosted APKs. Zimperium: DoubleTrouble analysis
- Android SpyBanker â call rerouting â âCustomer Help Service.apkâ steals SMS/OTPs and reroutes calls via a hardcoded number to facilitate fraud targeting Indian banks. K7 Labs: Android SpyBanker
- Indian banking malware mines Monero â Hindiâfocused fake finance apps steal data and run XMRig via remote triggers (FCM); targets include SBI, AxisBank, IndusIndBank. McAfee: Android banking + crypto miner
OpenâSource Supply Chain & Registry Abuse
- 60 malicious RubyGems â Longârunning supplyâchain campaign published 60 trojanized gems that exfiltrate credentials; heavy focus on South Korean targets and >275k downloads. Socket: Malicious RubyGems
- 11 malicious Go modules (typosquats) â Go typosquats used indexâbased string obfuscation to execute shells and fetch remote payloads from .icu/.tech domains targeting Linux and Windows. Socket: Malicious Go packages
- Q2 2025: Malicious OSS packages trends â FortiGuard finds persistent NPM/PyPI abuse with installâtime execution, credential/wallet theft and increased obfuscation; includes detection guidance. Fortinet: Malicious OSS registries (Q2 2025)
- Gravity Forms plugin supplyâchain breach â Backdoor in GravityForms v2.9.12 exfiltrated site data and allowed RCE via gravityapi[.]org; patched in v2.9.13. Patchstack: GravityForms backdoor
- BEAM: networkâbased supply chain detector â Netskope released BEAM, an openâsource ML detector that spots suspicious app behavior in network traffic without agents. Netskope: BEAM detector
Adtech, Malvertising & Fraud Networks
- VexTrio adtech fraud network â Large malicious traffic distribution platform evolved from spammers to adtech, powering dating/crypto scams and affiliate networks like Los Pollos and Taco Loco. Infoblox: VexTrio origin story
- Malvertising delivers Oyster/Broomstick backdoors â SEO poisoning and trojanized tools distributed via ads have been used to plant backdoors and facilitate LockBit activity. Arctic Wolf: Malvertising â backdoors
- Fake Binance site via Facebook ads â Malware distributed through Facebook ads impersonating Binance installs an MSI infostealer that opens local listening ports and collects browser/system data. AhnLab: Facebook ads â Binance impostor
Crypto Scams & Web3 Fraud
- Smart contract drainer scams â Malicious contracts posing as trading bots stole >$900k; operators used aged YouTube accounts and AIâgenerated videos to feign legitimacy. SentinelLabs: Smart contract scams
- Malicious Facebook ads + wallet stealers â (See AhnLab) social ad channels remain effective distribution for cryptoâtargeting Infostealers.
Nationâstate & Highâprofile Intrusion Tooling
- VELETRIX loader & DragonClone â Chinaânexus campaign targeting telecom infrastructure uses sophisticated VELETRIX loaders, shellcode and tailored C2 for mass espionage. 0x0d4y: VELETRIX analysis
- BlueNoroff DNS investigation â Malicious Zoom extension masquerading as a Calendly invite led to a complex DNS footprint tied to the BlueNoroff campaign. CircleID: BlueNoroff DNS investigation
- RoKRAT (APT37) â shellcode & steganography â New RoKRAT variants use encrypted shellcode injection, steganographic C2 channels (Dropbox abuse) and fileless persistenceâEDR tuning is critical. Genians: RoKRAT analysis
Linux Persistence, Loaders & EDRâEvasion
- Plague PAM backdoor â New PAMâbased Linux backdoor modifies authentication to grant covert SSH access while evading AV and clearing session traces. Nextron: Plague PAM backdoor
- Hiding payloads in Linux xattr â PoC shows attackers can split/encode payloads into extended attributes; detection via recursive getfattr scanning recommended. SANS ISC: xattr payload hiding
- AVâkiller via ThrottleStop.sys â Driver abuse (ThrottleStop.sys) observed terminating AV processes to enable lateral movement and ransomware deployment (e.g., MedusaLocker). Kaspersky: AV killer via ThrottleStop.sys
- SLOW#TEMPEST Cobalt Strike sideload â ISO targeting Chinese users uses DLL sideloading with an Alibaba executable to spawn Cobalt Strike beacons. dmpdump: SLOW#TEMPEST loader
Data Breaches & Fraud Markets
- Italian hotels â ID docs for sale â Tens of thousands of highâres passport/ID scans from three hotels appeared for sale after unauthorized access, enabling sophisticated identity fraud. CERTâAGID: Stolen hotel identity documents
- PXAStealer/Telegram resale â (See PXA Stealer) stolen datasets are actively monetized via Telegram marketplaces and automation. SentinelOne: PXA Stealer
Short briefs & notable tooling
- Netskope BEAM â Openâsource, networkâbased ML detector for supplyâchain compromise without requiring endpoint agents. Netskope: BEAM
- GenAI used to craft phishing pages â Attackers used generative AI tools (DeepSite AI, BlackBox AI) to create convincing pages impersonating Brazilian gov sites and leveraged SEO poisoning. Zscaler: GenAI phishing (Brazil)
- 11 malicious Go packages â (See Supply Chain) Go typosquats fetch obfuscated remote payloads from .icu/.tech domains. Socket: Malicious Go modules
- Shared EDR killâchain tools â Underground marketplaces and ransomware actors increasingly share sophisticated EDR killers (e.g., HeartCrypt family), complicating defenses. Sophos: EDR killer sharing
- Raksha Bandhan scams â 2âline summary â Scammers leveraged festivalâthemed lures (fake gifts, offers) to phish credentials and solicit payments via WhatsApp/SMS and malicious links. #RakshaBandhan #WhatsApp CloudSEK: Raksha Bandhan scams