Cookie Settings

This website uses cookies and similar technologies to provide essential functionality and improve your experience. Some features, such as demo scheduling and chat support, require marketing cookies to function. By clicking "Accept All", you consent to all cookies. Alternatively, you can customize your preferences, but note that declining marketing cookies will limit certain website features.

Cyware Weekly Threat Intelligence, February 03–07, 2025

shutterstock 2503601795 (1)

Weekly Threat Briefing Feb 7, 2025

The Good

PyPI is taking a "dead but not gone" approach to abandoned software with Project Archival, a new system that flags inactive projects while keeping them accessible. Developers will see warnings about outdated dependencies, helping them make smarter security choices and avoid relying on unmaintained code. The U.K is bringing earthquake-style metrics to cybersecurity with its new Cyber Monitoring Centre, designed to track digital disasters as precisely as natural ones. Inspired by the Richter scale, the CMC will quantify cyber incidents based on financial impact and affected users, offering clearer insights for national security planning.

  • PyPI launched Project Archival, a system for project publishers to indicate that no further updates will be made. Archived projects will remain available for download, but users will see a warning about their maintenance status to help them choose their dependencies wisely. This feature aims to boost supply-chain security by reducing the risk of attackers hijacking developer accounts and pushing harmful updates to abandoned projects. It also helps decrease user support requests by clearly stating the project's lifecycle status. 
  • U.S. and Dutch authorities seized 39 domains and servers belonging to the HeartSender cybercrime group, based in Pakistan. This operation targeted a group known for selling hacking and fraud tools since 2020, causing losses of over $3 million in the U.S. HeartSender, also called Saim Raza and Manipulators Team, ran multiple marketplaces that sold key items like malware, phishing kits, and email extractors, along with providing training for using these tools.
  • Five Eyes cybersecurity agencies from the U.K, Australia, Canada, New Zealand, and the U.S. have published a guidance, recommending that manufacturers of network edge devices improve forensic visibility to help detect attacks and investigate breaches. They urged manufacturers to include robust logging and forensic features. Additionally, they recommended that organizations review minimum forensic visibility requirements before selecting network devices. 
  • The U.K has launched a new Cyber Monitoring Centre (CMC) to better measure cyber incidents with improved clarity and precision. This center uses methods similar to those used for natural disasters, like the Richter scale for earthquakes. The CMC has developed a specific methodology for evaluating cyber events, which includes gathering diverse data and categorizing incidents based on the affected population and financial impacts. Overall, the CMC strives to provide a comprehensive assessment of cyber incidents to improve understanding and responses in the cybersecurity landscape.

The Bad

Kimsuky is back with another phishing trick, this time using fake Office and PDF files to sneak forceCopy malware onto victims' systems. Its latest campaign delivers PEBBLEDASH and RDP Wrapper by disguising malware as harmless shortcuts, ultimately hijacking browser credentials and sensitive data. Hackers have found a new way to skim credit card data - by hiding malware inside Google Tag Manager scripts. CISA is flagging major security holes in Microsoft Outlook and Sophos XG Firewall, urging agencies to patch them before February 27. One flaw allows remote code execution in Outlook, while another exposes firewall users to serious risks. 

  • The North Korea-linked Kimsuky hacking group is conducting spear-phishing attacks to deliver the forceCopy malware. These attacks start with phishing emails containing a deceptive Windows shortcut file that looks like a Microsoft Office or PDF document. Opening the file launches PowerShell or mshta.exe, which then downloads and runs further malware, including the trojan PEBBLEDASH and RDP Wrapper. The forceCopy malware targets web browser directories to steal configuration files and credentials.
  • Sucuri identified a cybersecurity incident involving credit card data theft from a Magento-based eCommerce website, and traced the malware to a Google Tag Manager (GTM) script. The malware was found in the website's database and included obfuscated code that appeared legitimate but was actually designed to steal sensitive information during checkout. A backdoor was discovered in the website's media folder and At least six websites were infected with the same GTM ID.
  • The CISA has added several vulnerabilities to its KEV catalog, including issues in Microsoft Outlook and Sophos XG Firewall. Notable flaws include CVE-2024-21413 in Outlook, which has a CVSS score of 9.8 and allows remote code execution, and CVE-2020-15069 in Sophos XG Firewall, also with a CVSS score of 9.8. Federal agencies must address these by February 27, and private organizations are advised to review and fix these vulnerabilities as well.
  • GreenSpot APT group is running a phishing campaign targeting users of 163[.]com, a popular email service in China. Since at least 2007, this group has focused on Chinese government and military targets. In this latest effort, they created fake domains like mail[.]ll63[.]net and mail[.]eco163[.]com to steal login information. These domains mimic the real 163.com service, making it easy for unsuspecting users to fall for the scam. 
  • Threat actors are exploiting the popularity of DeepSeek to promote two malicious infostealer packages on PyPI, named deepseeek and deepseekai. These packages were designed to look like developer tools for an AI platform and were uploaded by a newly created account with no prior activity. These packages, when run, stole sensitive data from developers, including user information and environment variables like API keys.

New Threats

Bitcoin scammers are switching tactics, swapping static images for video attachments in MMS to make their schemes more convincing. A recent case involved a tiny .3gp video luring victims into WhatsApp groups where scammers apply pressure to extract money or personal data. XE Group has shifted from credit card skimming to zero-day exploitation, now targeting manufacturing and distribution companies. A new version of ValleyRAT is making the rounds, using stealthy techniques to infiltrate systems. Morphisec found the malware being spread through fake Chrome downloads from a fraudulent Chinese telecom site. 

  • Attackers are now using video attachments in MMS to promote Bitcoin scams, moving away from static images. A recent case involved a small 14KB .3gp video file that lures victims into clicking links and engaging with scammers. Recipients are directed to WhatsApp groups where scammers exert pressure to get money or personal information. A .3gp file is designed for 3G networks, optimized for small sizes, making it suitable for mobile devices with limited storage and slower networks. 
  • XE Group is targeting companies in manufacturing and distribution by exploiting zero-day vulnerabilities in VeraCore software, specifically CVE-2025-25181 and CVE-2024-57968. In a recent incident, the group compromised an IIS server hosting VeraCore software in November 2024, which led to the discovery of unique techniques used to exfiltrate files and run malicious commands. The group evolved from credit card skimming to exploiting vulnerabilities, showing their adaptability. The upload vulnerability was patched in November 2024, but no patch for the other vulnerability is available.
  • Morphisec has found a new version of the ValleyRAT malware, which uses advanced evasion tactics and targets computer systems. This malware is distributed through phishing emails, messaging apps, and hacked websites, focusing on high-profile individuals in finance, accounting, and sales to steal sensitive information. The new variant spreads through a fake download of a Chrome browser from a fraudulent Chinese telecom website. It uses a .NET executable to check for admin rights and download more malware components. The malware injects itself into legitimate processes to operate secretly, using names that seem normal to avoid attracting attention. 
  • A help desk phishing campaign has been targeting Microsoft Active Directory Federation Services (ADFS) to steal credentials and bypass MFA. The campaign focuses on education, healthcare, and government organizations, hitting at least 150 targets. Attackers send phishing emails pretending to be from the organization's IT team, urging victims to log in for security updates. These emails lead to fake ADFS login pages that mimic legitimate ones, where victims enter their usernames, passwords, and MFA codes. 
  • SentinelOne found new variants of a macOS malware family, named FlexibleFerret, used by North Korean threat actors in schemes centered around fake job interviews. This malware is part of the Contagious Interview campaign. Typically, targets are directed to click a link which gives an error message and prompts them to install software like VCam or CameraAccess for virtual meetings. FlexibleFerret is particularly deceptive, as it was signed with a valid Apple Developer signature, although this signature has since been revoked. The ongoing campaign targets employers and developers on job search platforms. 
  • A new malware called ELF/Sshdinjector.A!tr has been linked to the DaggerFly espionage group, targeting Linux-based network devices for data theft. The dropper checks for existing infections and deploys malicious files if none are found. It replaces essential binaries with infected versions to maintain access. Key features include overwriting system binaries, remote control through an altered SSH library, extracting sensitive information, executing commands from attackers, and encrypted communication. 
  • Forcepoint’s X-Labs research team discovered a new malware campaign using AsyncRAT with Python scripting and TryCloudflare tunnels to stealthily deliver harmful payloads. The campaign starts with a phishing email that contains a Dropbox link, leading to a ZIP file. This file has a shortcut that redirects to a TryCloudflare link. The attack involves several steps: the shortcut leads to an LNK file, which triggers PowerShell scripts to get an obfuscated JavaScript file. This links to a ZIP file with a Python script that runs malicious code.

Related Threat Briefings

Feb 21, 2025

Cyware Weekly Threat Intelligence, February 17–21, 2025

Google is stepping up its defenses against the quantum threat. The company is rolling out quantum-resistant digital signatures in Cloud KMS, following NIST’s post-quantum cryptography standards. Supply chain attacks just got harder to pull off. Apiiro has released two open-source tools to detect malicious code in software projects. With high detection rates across PyPI and npm packages, these tools add a crucial layer of security for developers. China’s Salt Typhoon is making itself at home in global telecom networks. The group has been caught using JumbledPath, a custom-built spying tool, to infiltrate ISPs in the U.S., Italy, South Africa, and Thailand. ShadowPad malware is once again causing havoc in Europe. Trend Micro flagged 21 targeted companies across 15 countries, with manufacturing firms bearing the brunt. A RAT is hiding in plain sight. SectopRAT has been spotted disguised as a fake Google Docs Chrome extension. It steals browser data, targets VPNs and cryptocurrency wallets, and injects malicious scripts into web pages. Darcula Suite is taking PhaaS to the next level. The upcoming update, currently in beta, will let users generate their own phishing kits by cloning real websites and customizing attack elements. A new payment card skimming campaign is turning Stripe’s old API into a weapon. Hackers are injecting malicious scripts into checkout pages, validating stolen card details through Stripe before exfiltration. LummaC2 is spreading through cracked software downloads again. ASEC found it disguised as a pirated Total Commander installer, hiding behind Google Collab Drive and Reddit links.

Feb 14, 2025

Cyware Weekly Threat Intelligence, February 10–14, 2025

Cyber defenders are sharpening their tools, and EARLYCROW is the latest weapon against stealthy APT operations. This method detects C2 activity over HTTP(S) using a novel traffic analysis format called PAIRFLOW. India is taking digital banking security up a notch. The RBI is launching a dedicated domain to curb financial fraud and enhance trust in online banking. Starting April 2025, financial institutions will register under this domain. China’s RedMike hackers are dialing into telecom networks - literally. Between December 2024 and January 2025, they targeted over 1,000 unpatched Cisco devices. Their primary focus? Global telecoms and university networks in Argentina, Bangladesh, and the U.S. Russia’s Sandworm hackers are using pirated software as bait. Their latest attack on Ukrainian Windows users disguises malware inside trojanized KMS activators and fake Windows updates. Love is in the air, but so are phishing scams. In late January, cybercriminals launched a Valentine’s-themed phishing campaign, offering fake gift baskets in exchange for stolen credentials. Cybercriminals are upping their game with Astaroth, a phishing kit that doesn’t just steal credentials but also hijacks entire sessions. By using a reverse proxy, Astaroth intercepts logins and 2FA tokens in real time, allowing attackers to bypass security measures undetected. South America’s foreign ministry was caught in the crosshairs of an advanced cyber-espionage campaign. In November 2024, attackers linked to REF7707 deployed the PATHLOADER and FINALDRAFT malware to infiltrate diplomatic networks. A new malware named Ratatouille is stirring up trouble by bypassing UAC and using I2P for anonymous communications. Spreading through phishing emails and fake CAPTCHA pages, it tricks victims into running an embedded PowerShell script.

Jan 10, 2025

Cyware Weekly Threat Intelligence, January 06–10, 2025

The U.K is fortifying its digital defenses with the launch of Cyber Local, a £1.9 million initiative to bridge cyber skills gaps and secure the digital economy. Spanning 30 projects across England and Northern Ireland, the scheme emphasizes local business resilience, neurodiverse talent, and cybersecurity careers for youth. Across the Atlantic, the White House introduced the U.S. Cyber Trust Mark, a consumer-friendly cybersecurity labeling program for smart devices. Overseen by the FCC, the initiative tests products like baby monitors and security systems for compliance with rigorous cybersecurity standards, ensuring Americans can make safer choices for their connected homes. China-linked threat actor RedDelta has ramped up its cyber-espionage activities across Asia, targeting nations such as Mongolia, Taiwan, Myanmar, and Vietnam with a modified PlugX backdoor. Cybercriminals have weaponized trust by deploying a fake PoC exploit tied to a patched Microsoft Windows LDAP vulnerability. CrowdStrike reported a phishing operation impersonating the company, using fake job offers to lure victims into downloading a fraudulent CRM application. Once installed, the malware deploys a Monero cryptocurrency miner. A new Mirai-based botnet, dubbed Gayfemboy, has emerged as a formidable threat, leveraging zero-day exploits in industrial routers and smart home devices. With 15,000 active bot nodes daily across China, the U.S., and Russia, the botnet executes high-intensity DDoS attacks exceeding 100 Gbps. In the Middle East, fraudsters are posing as government officials in a social engineering scheme targeting disgruntled customers. Cybercriminals have weaponized WordPress with a malicious plugin named PhishWP to create realistic fake payment pages mimicking services like Stripe. The plugin not only captures payment details in real time but also sends fake confirmation emails to delay detection.

Dec 20, 2024

Cyware Weekly Threat Intelligence, December 16–20, 2024

In a digital age where borders are blurred, governments are sharpening their strategies to outpace cyber adversaries. The draft update to the National Cyber Incident Response Plan (NCIRP) introduces a comprehensive framework for managing nationwide cyberattacks that impact critical infrastructure and the economy. Meanwhile, the fiscal year 2025 defense policy bill, recently approved by the Senate, emphasizes strengthening cybersecurity measures both at home and abroad. A deceptive health app on the Amazon Appstore turned out to be a Trojan horse for spyware. Masquerading as BMI CalculationVsn, the app recorded device screens, intercepted SMS messages, and scanned for installed apps to steal sensitive data. Malicious extensions targeting developers and cryptocurrency projects have infiltrated the VSCode marketplace and NPM. Disguised as productivity tools, these extensions employed downloader functionality to deliver obfuscated PowerShell payloads. The BADBOX botnet has resurfaced, compromising over 192,000 Android devices, including high-end smartphones and smart TVs, directly from the supply chain. Industrial control systems are facing heightened risks as malware like Ramnit and Chaya_003 targets engineering workstations from Mitsubishi and Siemens. Both malware families exploit legitimate services, complicating detection and mitigation efforts in ICS environments. The Chinese hacking group Winnti has been leveraging a PHP backdoor called Glutton, targeting organizations in China and the U.S. This modular ELF-based malware facilitates tailored attacks across industries and even embeds itself into software packages to compromise other cybercriminals. A tax-themed phishing campaign, dubbed FLUX#CONSOLE, is deploying backdoor payloads to compromise systems in Pakistan. Threat actors employ phishing emails with double-extension files masquerading as PDFs.

Dec 13, 2024

Cyware Weekly Threat Intelligence, December 09–13, 2024

Cybercrime’s web of deception unraveled in South Korea as authorities dismantled a fraud network responsible for extorting $6.3 million through fake online trading platforms. Dubbed Operation Midas, the effort led to the arrest of 32 individuals and the seizure of 20 servers. In a significant move to combat surveillance abuses, the U.S. defense policy bill for 2025 introduced measures to shield military and diplomatic personnel from commercial spyware threats. The legislation calls for stringent cybersecurity standards, a review of spyware incidents, and regular reporting to Congress. The subtle art of deception found a new stage with a Microsoft Teams call, as attackers used social engineering to manipulate victims into granting remote access. By convincing users to install AnyDesk, they gained control of systems, executing commands to download the DarkGate malware. Russian APT Secret Blizzard has resurfaced and used the Amadey bot to infiltrate Ukrainian military devices and deploy their Tavdig backdoor. In a phishing spree dubbed "Aggressive Inventory Zombies (AIZ)," scammers impersonated brands like Etsy, Amazon, and Binance to target retail and crypto audiences. Surveillance has reached unsettling new depths with the discovery of BoneSpy and PlainGnome, two spyware families linked to the Russian group Gamaredon. Designed for extensive espionage, these Android malware tools track GPS, capture audio, and harvest data. A new Android banking trojan has already caused havoc among Indian users, masquerading as utility and banking apps to steal sensitive financial information. With 419 devices compromised, the malware intercepts SMS messages, exfiltrates personal data via Supabase, and even tricks victims into entering details under the pretense of bill payment. Iranian threat actors have set their sights on critical infrastructure, deploying IOCONTROL malware to infiltrate IoT and OT/SCADA systems in Israel and the U.S.

Dec 6, 2024

Cyware Weekly Threat Intelligence, December 02–06, 2024

NIST sharpened the tools for organizations to measure their cybersecurity readiness, addressing both technical and leadership challenges. The two-volume guidance blends data-driven assessments with managerial insights, emphasizing the critical role of leadership in applying findings. The Manson Market, a notorious hub for phishing networks, fell in a sweeping Europol-led takedown. With over 50 servers seized and 200TB of stolen data recovered, the operation spanned multiple countries, including Germany and Austria. Russian APT group BlueAlpha leveraged Cloudflare Tunnels to cloak its GammaDrop malware campaign from prying eyes. The group deployed HTML smuggling and DNS fast-fluxing to bypass detection, targeting Ukrainian organizations with precision. Earth Minotaur intensified its surveillance operations against Tibetan and Uyghur communities through the MOONSHINE exploit kit. The kit, now updated with newer exploits, enables the installation of the DarkNimbus backdoor on Android and Windows devices. Cloudflare Pages became an unwitting ally in the sharp rise of phishing campaigns, with a staggering 198% increase in abuse cases. Cybercriminals exploited the platform's infrastructure to host malicious pages, fueling a surge from 460 incidents in 2023 to over 1,370 by October 2024. DroidBot has quietly infiltrated over 77 cryptocurrency exchanges and banking apps, building a web of theft across Europe. Active since June 2024, this Android malware operates as a MaaS platform, enabling affiliates to tailor attacks. Rockstar 2FA, a phishing platform targeting Microsoft 365 users, has set the stage for large-scale credential theft. With over 5,000 phishing domains launched, the platform is marketed on Telegram. The Gafgyt malware is shifting gears, targeting exposed Docker Remote API servers through legitimate Docker images, creating botnets capable of launching DDoS attacks.