Threat Research | Weekly Recap [24 Aug 2025]

Threat Research | Weekly Recap [24 Aug 2025]

The weekly Cybersecurity Threat Research recap highlights significant ransomware operations, including SharePoint exploitation by WarLock and advanced RaaS variants targeting multiple platforms. It also covers emerging backdoors like Cornflake V3 and PipeMagic, sophisticated phishing campaigns such as Salty 2FA, and targeted APT campaigns like APT36 and Static Tundra. #WarLock #CornflakeV3

Ransomware & extortion

Backdoors, loaders & modular frameworks

  • Campaigns using fake CAPTCHA (ClickFix) lures and PowerShell/JS droppers to deliver the Node.js/PHP CORNFLAKE.V3 backdoor with AD reconnaissance and Kerberoasting. Cornflake V3 Backdoor — Google Cloud
  • Modular named‑pipe backdoor masquerading as trojanized ChatGPT apps; exploits CVE-2025-29824 and manages in-memory modules for payload/injection. PipeMagic Analysis — Microsoft
  • New and stealthy loaders/botnets: QuirkyLoader (.NET side‑loading/process hollowing delivering multiple RATs/stealers) and stealth Java loader “SoupDealer” used in targeted phishing. QuirkyLoader — IBM X‑Force
  • Delphi x86 implant using heavy obfuscation, anti‑analysis and persistence for surveillance/exfiltration. DBatLoader. DBatLoader — DeepInstinct
  • Novel Linux persistence/backdoor masquerading as PAM library to provide stealthy SSH auth bypass and persistence. Plague. Plague Linux PAM Backdoor — PolySwarm
  • New Gh0st-based RAT targeting finance, uses steganography for shellcode and downloads plugins/password stealers; tracked as GodRAT. GodRAT — Kaspersky Securelist

Phishing, credential theft & PhaaS

Mobile & endpoint threats

Abuse of legitimate tools, supply-chain & monetization schemes

Notable APT & targeted campaigns

Vulnerabilities, cloud & infra research

  • AWS Resource Explorer ListResources allowed quiet resource enumeration because it wasn’t CloudTrail‑logged by default; AWS reclassified it as a management event after disclosure. CloudTrail‑free AWS enumeration — Datadog
  • SQL injection in a reference Postgres MCP server could chain stacked statements (e.g., COMMIT; DROP SCHEMA) enabling arbitrary writes; patches released in forks. MCP Postgres SQLi Case Study — Datadog
  • Research into programmatic start of the WebClient service shows multiple vectors but a final ETW consumer descriptor limits remote start without elevated token conditions—relevant to NTLM relay mitigations. Will WebClient Start? — SpecterOps

Cryptojacking & illicit mining

Threat Research | Weekly Recap – hendryadrian.com