Threat Research | Weekly Recap [29 Jun 2025]

Threat Research | Weekly Recap [29 Jun 2025]

This week’s cybersecurity recap highlights sophisticated state-sponsored espionage campaigns by North Korea and Iran, targeting financial, technological, and critical infrastructure sectors globally. Additionally, emerging malware, supply chain attacks, and phishing campaigns continue to evolve, including AI-related threats using prompt injection techniques. #APT38 #IranianCyberThreats #ContagiousInterview #CVE-2025-5777 #RapperBot

State-Sponsored Cyber Espionage & Geopolitical Threats

Phishing Campaigns & Credential Theft

Malware Developments & Advanced Persistent Threats

Exploitation & Supply Chain Attacks

  • CitrixBleed 2 vulnerabilities exploited: CVE-2025-5777 and CVE-2025-6543 actively exploited in Citrix NetScaler appliances, with urgent patching recommended to prevent session hijacking and DoS. CVE-2025-5777 & CVE-2025-6543: CitrixBleed 2 FAQ
  • Pickai backdoor targets AI supply chain: Lightweight backdoor infecting ComfyUI framework steals AI data, uses process spoofing and rotating C2 domains affecting Rubick.ai and users. Pickai AI Backdoor Supply Chain Attack
  • Malicious Python package typosquats passlib: Psslib forces Windows shutdown on wrong password, targeting developers reliant on legitimate passlib, highlighting supply chain risks. Malicious Python Package Typosquats Passlib

Web Exploits, SEO Abuse & Spam

  • South Korean servers exploited using web shells: File upload flaws leveraged to deploy WogRAT, SuperShell, and MeshAgent malware on Windows/Linux with advanced persistence and lateral movement. Attacks Targeting South Korean Web Servers
  • Black Hat SEO used to spread AI-themed malware: Zscaler uncovered campaigns poisoning search results to distribute Vidar, Lumma, and Legion loaders via complex redirections and fingerprinting. Black Hat SEO Poisoning for AI Malware Distribution
  • Hidden spam pages on WordPress sites: Attackers brute force admin access to insert spam for blackhat SEO, using malicious plugins to persist and evade detection. The Case of Hidden Spam Pages

Criminal Infrastructure & Tools Abuse

  • African financial sector targeted with open-source tools: CL-CRI-1014 group uses PoshC2, Chisel, Classroom Spy, and evasion tactics to compromise institutions and offer access on dark web markets. Cybercriminals Abuse Open-Source Tools in Africa
  • Top June 2025 cyberattacks leverage public platforms: GitHub abuse, obfuscated scripts and multi-stage malware like Braodo Stealer and Remcos highlight evolving attack vectors and detection tools. Top 3 Cyber Attacks in June 2025

Emerging Techniques & AI-related Threats

Threat Research | Weekly Recap – hendryadrian.com