Threat Research | Weekly Recap [20 Jul 2025]

Threat Research | Weekly Recap [20 Jul 2025]

This report highlights the latest ransomware threats, including KAWA4096, CrazyHunter, and global RaaS platforms, as well as advanced malware loaders and backdoors targeting various sectors worldwide. It also covers the rise in targeted remote access tools, phishing campaigns, and infrastructure vulnerabilities amidst geopolitical tensions. #KAWA4096 #CrazyHunter #GlobalGroup #Dark101 #GhostContainer #UNC5174 #IVANTI #Forescout #APT28

Ransomware Developments and Campaigns

Advanced Remote Access Trojans and Backdoors

Phishing, Social Engineering, and Supply Chain Attacks

Malware Trends, Campaigns, and Ecosystem Analysis

  • AsyncRAT evolution exposes growing open-source RAT forks with advanced plugins and evasion techniques impacting malware ecosystems worldwide. Unmasking AsyncRAT
  • SilverFox Chinese malware domains continue large-scale campaigns against Chinese speakers with anti-automation and expanded server distribution. Chinese Malware Delivery Domains: Part III
  • Infostealer trends in June 2025 highlight SEO poisoning and novel infection methods via cracks and password-protected files. June 2025 Infostealer Trend Report
  • Lumma Stealer distributed via cracked software deploys Rsockstun malware post-infection, using pen test tools as persistence. Lumma Stealer Deploys Follow-Up Malware
  • Old Miner, New Tricks research exposes H2Miner crypto-mining botnet and AI-generated Lcrypt0rx ransomware targeting Linux, Windows, and containers. Old Miner, New Tricks
  • Formbook malware spread continues via Office macros targeting companies involved in tenders despite MS security improvements. Widespread Formbook via Office Macro
  • Konfety Android malware returns with new evasion via ZIP tampering and dynamic loading to conduct ad fraud and payload distribution. Konfety Returns: Classic Mobile Threat
  • Fake Android banking apps target Bengali speakers with cryptojacking via XMRig mining activated by device lock state. Android Cryptojacker Disguised as Banking App
  • Massistant forensic tool used by Chinese law enforcement for mobile data extraction risks mobile privacy through advanced Android debugging techniques. Lookout Discovers Massistant
  • RedDirection browser extensions hijack Chrome and Edge with malware distributed via trusted extension marketplaces, infecting over 2.3 million users. RedDirection Malicious Browser Extensions

Exploitation and Vulnerabilities

Evasion, Detection, and Security Automation

  • Wazuh as Code (RaC) facilitates DevOps-style versioning and CI/CD integration for automated security rule deployment, improving detection management. Wazuh ruleset as code (RaC)
  • Detecting Auto-color Linux backdoor demonstrated using Wazuh and SysmonForLinux integrations to identify stealthy malware targeting government and academic sectors. Detecting Auto-color malware with Wazuh
  • AI-enhanced malware analysis improves de-obfuscation but struggles with complex packers and new frameworks; Fortinet protections cover key advanced malware families. Catching Smarter Mice with Even Smarter Cats

Web and Cloud Threats

Geopolitical and Infrastructure Threats

  • Submarine cable infrastructure faces rising sabotage risks amid geopolitical tensions primarily involving Russia and China, with limited repair capabilities threatening prolonged connectivity outages. Submarine Cables Face Increasing Threats
  • Fancy Bear (APT28) continues espionage against governments and militaries worldwide, focusing on Ukraine conflict, election interference, and Central Asian webmail exploits. APT PROFILE โ€“ FANCY BEAR

Threat Research | Weekly Recap โ€“ hendryadrian.com