Cyware Daily Threat Intelligence, April 18, 2025

Daily Threat Briefing • April 18, 2025
Daily Threat Briefing • April 18, 2025
Six million users and 57 extensions they probably shouldn’t trust. A wave of Chrome add-ons, many unlisted and quietly distributed through ads, have been caught with invasive capabilities. Laced with obfuscated code, several have been removed from the Chrome Web Store, but others still linger.
A trio of exploited vulnerabilities just made CISA’s KEV list. Two affect Apple device, both patched in the latest iOS and macOS updates. The third, a Windows NTLM hash leak, has reportedly been used by groups like APT28. All three are now confirmed as actively exploited and fully patchable.
Reward points and toll notices are the new bait. Researchers have flagged a surge in global SMS phishing attacks through two campaigns: PointyPhish and TollShark. Both rely on urgency, fake branding, and thousands of rapidly deployed domains via the Darcula Suite platform. From iMessage to RCS, no inbox is safe.
Chrome extensions found with hidden code
A set of 57 Chrome extensions, impacting six million users, have been found with risky capabilities like monitoring browsing behavior, accessing cookies, and potentially running remote scripts. Many of these extensions are 'hidden' (unlisted) and share obfuscated code linked to the domain "unknow[.]com", potentially evading detection while being pushed via ads. Despite claiming legitimate functions, they have excessive permissions and are considered potential spyware. While some have been removed from the Chrome Web Store following the report, others persist, posing a significant security risk.
XorDDoS: DDoS malware resurges
XorDDoS malware, a long-standing threat targeting Linux systems for DDoS attacks, is experiencing a significant resurgence and now also compromises Docker servers. The activity has surged since 2020, with over 71% of attacks from late 2023 to early 2025 directed at the U.S. The primary infection vector remains SSH brute-force attacks. Once installed, XorDDoS ensures persistence and uses a hardcoded XOR key to decrypt its C2 configuration. The appearance of a new "VIP" version and builder tools in 2024 suggests commercial distribution, likely by Chinese-speaking operators.
CISA adds bugs to KEV catalog
The CISA has added three vulnerabilities to its KEV catalog due to active exploitation. Two impact Apple products: CVE-2025-31200 (CoreAudio remote code execution) and CVE-2025-31201 (RPAC PAC bypass), affecting iOS, macOS, and others. Apple has released patches (e.g., iOS 18.4.1). The third, CVE-2025-24054, is a Microsoft Windows NTLM hash disclosure bug, also recently patched but actively exploited (potentially by APT28) to steal credentials in targeted campaigns.
Critical Bubble[.]io flaw discovered
A significant security vulnerability discovered in 2024 affects the Bubble[.]io no-code platform. Researchers found that weak payload encryption, specifically the use of fixed, shared Initialization Vectors, allows attackers to bypass restrictions and directly query the underlying Elasticsearch database. By decrypting payloads and crafting malicious queries, attackers can potentially extract all user data, including from custom tables, circumventing security measures. The shared hosting infrastructure also poses a risk of cross-tenant attacks.
SMS-based phishing campaigns surge
CTM360 identified a significant rise in two global SMS phishing campaigns: PointyPhish (reward scams) and TollShark (toll payment scams). PointyPhish uses fake expiring reward points, while TollShark sends false unpaid toll warnings, both tricking users into fake sites to steal payment details. These campaigns use thousands of domains across multiple countries, driven by the Darcula Suite PhaaS platform that enables rapid deployment via SMS, iMessage, and RCS. Both exploit urgency and impersonate trusted brands to harvest sensitive financial information from victims worldwide.