Cybersecurity Threat Research âWeeklyâ Recap. The report highlights a surge in encryptionless extortion and the rise of new RaaS groups such as Qilin, Akira, and LockBit 5.0, tracks the December 2025 ransomware activity, surveys infostealers, phishing campaigns, RATs and loaders, and web skimming, notes notable vulnerabilities like MongoBleed (CVE-2025-14847), CVE-2020-8554 and CVE-2017-11882, and points to defense tools such as Landlock telemetry and AuraInspector along with AI/LLM attack surface insights and Validinâs research. #Qilin #Akira #LockBit5_0 #Sicarii #CrazyHunter #Medusa #Remcos #AsyncRAT #CastleLoader #VoidLink #KONGTUKE #LOTUSLITE #AshTag #AshenLepus #RustDesk #Winos4_0 #RedVDS #Magecart #SilentPush #MongoBleed #CVE2025_14847 #CVE2020_8554 #CVE2017_11882 #SolyxImmortal #ACRStealer #LummaC2 #Stealc #MonetaStealer #MEXCApiAutomator #MustangPanda
Ransomware & Extortion Trends
- Record surge in encryptionless extortion and growth of new RaaS groups (Qilin, Akira, LockBit 5.0); advice to prioritize detection of reconnaissance and dataâtheft precursors â Ransomware: Tactical Evolution
- December 2025 snapshot of ransomware activity, group trends, and victim statistics â December 2025 Ransomware Report
- New/lowâmaturity RaaS âSicariiâ: functional ransomware with performative branding and geoâfencing; indicators suggest immature or falseâflag operation â Sicarii: Truth vs Myth
- CrazyHunter: Goâbased ransomware targeting Taiwanese healthcare with GPO abuse, driver BYOVD, memory loaders and AVâkillingâincludes IOCs and mitigation guidance â CrazyHunter analysis
- Medusa (aka Madusa/Storm-1175): rapid RaaS expansion exploiting unpatched RMM and public apps for access, exfiltration, and encryption â Medusa RMM exploitation
Infostealers, Clipboard Hijackers & Malicious Extensions
- Python Windows infostealer that persists via Run key, harvests browser creds/docs/keystrokes and exfiltrates via hardcoded Discord webhooks â SolyxImmortal analysis
- December 2025 infostealer landscape: heavy distribution of ACRStealer, LummaC2, Stealc via cracks/SEOâpoisoning, EXE droppers, DLL sideloading and clipboard crypto theft (BIP39 targeting) â Infostealer Trend Report (Dec 2025)
- Macâtargeting MonetaStealer masquerading as a Windows EXE (PyInstaller bundle) steals Chrome data, Keychain, WiâFi creds and reports via Telegram â MonetaStealer (macOS) analysis
- Five malicious Chrome extensions posing as productivity tools exfiltrate session tokens and enable full account takeover across HR/ERP platforms (2,300+ users) â Malicious Chrome extensions: session hijack
- Malicious Chrome extension that creates MEXC API keys with withdrawal rights and exfiltrates keys to Telegram, enabling fund theft â MEXC API Automator
- Discord/Telegram distribution of a PyInstaller clipboard hijacker that replaces crypto addresses (targets streamers/gambling communities) and persists via HKCU Run â Clipboard hijacker (RedLineCyber)
Phishing, AiTM & Credential Theft Campaigns
- Mamba 2FA: scalable adversaryâinâtheâmiddle phishing kit automating Microsoft auth flows to capture creds, bypass MFA and relay sessions; recommends FIDO2/WebAuthn and continuous monitoring â Mamba AiTM kit
- Remcos delivered via fake shipping Word doc exploiting CVEâ2017â11882 to execute inâmemory Remcos RAT (process hollowing, scheduled task persistence) â Remcos shippingâdoc campaign
- Localized invoice phishing targeting German manufacturers uses CVEâ2024â43451 and WebDAV shortcuts to deliver AsyncRAT/XWorm; proactive sandbox hunting recommended â AsyncRAT phishing (German manufacturing)
- Multiâstage AsyncRAT campaign abusing TryCloudflare tunnels and trusted Python environments to host WebDAV delivery, embedding Python runtime and APCâinjecting shellcode into explorer.exe â AsyncRAT multiâstage analysis
- Phishing that distributes legitimate RMM installers disguised as video downloads (Syncro, ScreenConnect, NinjaOne, SuperOps) to gain unauthorized access â RMM installers via phishing
RATs, Loaders, Backdoors & Malware Frameworks
- VoidLink: modular, cloudânative Linux C2 written in Zig with web C2, 30+ plugins (cred theft, container escape), multiple rootkit techniques and multiâprotocol C2 for stealth in cloud/container environments â VoidLink framework
- CastleLoader: multiâstage loader (Inno â AutoIt â process hollowing â inâmemory PE) delivering stealers/RATs against government targets; includes parser, YARA and IOCs â CastleLoader deep dive
- KONGTUKE ClickFix loader: malicious Python/Figma package distribution via injected scripts and clipboard curl commands; persistence via scheduled tasks and HTTP/S C2 â KONGTUKE ClickFix campaign
- LOTUSLITE: DLLâsideloaded backdoor in politically themed lure targeting US government/policy entities; Runâkey persistence and Mustang Panda overlaps â LOTUSLITE targeted espionage
- Konni LNK decoy: shortcut executing hidden PowerShell to reconstruct hexâencoded payloads, drop files and run an EXE (behavioral overlap with RoKRAT) â Konni PowerShell LNK
- Ashen Lepus âAshTagâ: targeted espionage with custom payload encryption, inâmemory execution and obfuscated subdomain infrastructure â AshTag campaign analysis
- Trojanized RustDesk installer (rustdesk[.]work) bundles real client plus Winos4.0 backdoor (memoryâresident keystroke/screenshot capture, C2) â RustDesk trojan / Winos4.0
- RedVDS: criminal VDS marketplace selling cloned Windows RDP hosts used for mass phishing, BEC and financial fraud; disruption and IOCs published after takedown â Inside RedVDS marketplace
Web Skimming & Eâcommerce Fraud
- Longârunning Magecart network injecting obfuscated JS into eâcommerce sites to skim payment data across major card brands; key domains and injected filenames identified â New Magecart network (Silent Push)
Vulnerabilities, Patches & Cloud Risks
- MongoBleed (CVEâ2025â14847): critical unauthenticated memory leak in MongoDB allowing disclosure of credentials/API keys; active exploitation and ~146k exposed instances â MongoBleed (CVEâ2025â14847)
- Node.js AsyncLocalStorage crash bug patched (Node 20.20.0, 22.22.0, 24.13.0, 25.3.0) after stackâoverflow termination risk in production apps and observability tools â Node.js AsyncLocalStorage patch
- Unpatchable Kubernetes trafficâhijack via ExternalIP services (CVEâ2020â8554): proofâofâconcept redirects and mitigations (DenyServiceExternalIPs, Kyverno, Cilium kubeâproxy replacement) â CVEâ2020â8554 analysis
- Public exploitation of legacy RTF/CVEâ2017â11882 continues to enable fileless RATs (e.g., Remcos) â RTF/CVEâ2017â11882 exploitation
Detection Engineering & Defensive Tools
- Landlock LSM telemetry offers lowâfalseâpositive filesystem/network denial logs useful for detection engineering and Sigma rule creation â Landlock telemetry for detection
- AuraInspector: openâsource tool to audit Salesforce Aura/Experience Cloud for dataâexposure and accessâcontrol misconfigurations â AuraInspector (Salesforce audit)
- Guide on intelligenceâdriven ransomware detection combining EDR/XDR, network detection and TI (Recorded Future recommended) to catch precursor behaviors â Best ransomware detection tools
AI, LLMs & Attack Automation
- Technical attack surfaces in LLMs (tokenization, embeddings, attention) enable prompt injection, embedding/gradient attacks and attention hijacking; mitigations include smoothing and suffix filtering â Inside the LLM: attack mechanics
- Widespread LLM use accelerates script authoring (PowerShell, commodity tooling) but tradecraft remains familiar; basic telemetry/MFA/segmentation stop many AIâsped attacks â Reflecting on AI in 2025
- âRepromptâ: oneâclick Microsoft Copilot Personal exploit abusing deep links to inject prompts and exfiltrate conversation data; patched by Microsoft for personal Copilot â Reprompt Copilot attack
Supply & Research Intelligence
- Validinâs 2025 recap highlights platform research, community growth and exposure of campaigns such as FreeDrain and phishing tied to Scattered Spider â Validin 2025 recap