Self Assessment

Weekly Intelligence Report – 18 Apr 2025

Published On : 2025-04-17
Share :
Weekly Intelligence Report – 18 Apr 2025

Ransomware of the Week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – which could be relevant to your organization.

Type: Ransomware
Target Technologies: MS Windows

Introduction
CYFIRMA Research and Advisory Team has found Jackalock Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

Jackalock Ransomware
Jackalock is a newly discovered ransomware. This ransomware belongs to MedusaLocker ransomware family.

Upon execution, it encrypts files and appends the “.jackalock” extension to their names. After the encryption process is complete, Jackalock drops a ransom note in the form of an HTML file titled “READ_NOTE.html”.

Screenshot of files encrypted by this ransomware (Source: SurfaceWeb)

The ransom message states that the victim’s files have been encrypted using RSA and AES cryptographic algorithms. It strongly warns victims not to modify the encrypted files or attempt recovery using third-party tools, as doing so could result in permanent data loss.

Additionally, the message reveals that confidential or personal data has been exfiltrated from the compromised system.

To recover their files, the victim is instructed to pay a ransom. Failure to comply will result in the leakage of the stolen data. Moreover, if the attackers are not contacted within 72 hours, the ransom amount (which is not disclosed in the note) will increase.

Before making any payment, victims are allowed to test the decryption process on 2–3 non- critical files as proof of functionality.

Appearance of Jackalock ransomware’s ransom note “READ_NOTE.html” (Source: Surface Web)

Screenshot of Jackalock’s desktop wallpaper: (Source: Surface Web)

Screenshot of Jackalock’s contact website (Tor network):(Source: Surface Web)

Following are the TTPs based on the MITRE Attack Framework.

Tactic ID Technique
Initial Access T1091 Replication Through Removable Media
Execution T1059 Command and Scripting Interpreter
Execution T1129 Shared Modules
Persistence T1542.003 Pre-OS Boot: Bootkit
Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Persistence T1574.002 Hijack Execution Flow:DLL Side-Loading
Privilege Escalation T1055 Process Injection
Privilege Escalation T1134.004 Access Token Manipulation: Parent PID Spoofing
Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation T1574.002 Hijack Execution Flow:DLL Side-Loading
Defense Evasion T1014 Rootkit
Defense Evasion T1027.005 Obfuscated Files or Information: Indicator Removal from Tools
Defense Evasion T1036 Masquerading
Defense Evasion T1055 Process Injection
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1112 Modify Registry
Defense Evasion T1134.004 Access Token Manipulation: Parent PID Spoofing
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1222 File and Directory Permissions Modification
Defense Evasion T1497.001 Virtualization/Sandbox Evasion: System Checks
Defense Evasion T1542.003 Pre-OS Boot: Bootkit
Defense
Evasion
T1564.001 Hide Artifacts: Hidden Files and Directories
Defense Evasion T1564.003 Hide Artifacts: Hidden Window
Defense Evasion T1574.002 Hijack Execution Flow: DLL Side-Loading
Credential Access T1056.001 Input Capture: Keylogging
Discovery T1010 Application Window Discovery
Discovery T1012 Query Registry
Discovery T1016 System Network Configuration Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1120 Peripheral Device Discovery
Discovery T1497.001 Virtualization/Sandbox Evasion: System Checks
Discovery T1518.001 Software Discovery: Security Software Discovery
Discovery T1614 System Location Discovery
Lateral Movement T1091 Replication Through Removable Media
Collection T1056.001 Input Capture: Keylogging
Collection T1074 Data Staged
Command and Control T1071 Application Layer Protocol
Command and Control T1090 Proxy
Command and Control T1095 Non-Application Layer Protocol
Command and Control T1573 Encrypted Channel
Impact T1485 Data Destruction
Impact T1486 Data Encrypted for Impact
Impact T1490 Inhibit System Recovery
Impact T1496 Resource Hijacking

Relevancy and Insights:

  • This ransomware specifically targets the widely used Windows Operating System, which is prevalent across numerous industries and organizations.
  • Detect-Debug-Environment: Debugging environments are used by developers to analyze and troubleshoot software. The ransomware uses this technique to determine whether it is operating in a debug environment. This feature aids the ransomware in avoiding analysis and detection attempts.
  • Calls to WMI: The ransomware is making calls to the Windows Management Instrumentation (WMI) framework. WMI is a powerful tool used by many legitimate applications and services, but it can also be exploited by malware to execute commands, collect information, or perform system modifications.
  • The ransomware’s attempt to delete Volume Shadow Copies (VSS) indicates a deliberate effort to hinder data recovery options for victims.

ETLM Assessment:
CYFIRMA’s analysis of available data reveals that MedusaLocker ransomware has been actively targeting multiple sectors—such as manufacturing, healthcare, finance, and IT services—since 2019. The recent emergence of Jackalock, a sophisticated variant of MedusaLocker, demonstrates the adoption of advanced evasion techniques aimed at expanding its reach across both individual users and enterprises. Given these developments, Jackalock is projected to remain a persistent global threat, particularly to critical industries, which highlights the pressing need for robust cybersecurity strategies to counter these evolving risks.

Indicators of Compromise
Kindly refer to the IOCs section to exercise controls on your security systems.

Sigma Rule
title: Suspicious Volume Shadow Copy VSS_PS.dll Load tags:
– attack.defense-evasion
– attack.impact
– attack.t1490 logsource:
category: image_load product: windows
detection: selection:
ImageLoaded|endswith: ‘\vss_ps.dll’ filter_legit:
Image|startswith: ‘C:\Windows\’ Image|endswith:
– ‘\clussvc.exe’
– ‘\dismhost.exe’
– ‘\dllhost.exe’
– ‘\inetsrv\appcmd.exe’
– ‘\inetsrv\iissetup.exe’
– ‘\msiexec.exe’
– ‘\rundll32.exe’
– ‘\searchindexer.exe’
– ‘\srtasks.exe’
– ‘\svchost.exe’
– ‘\System32\SystemPropertiesAdvanced.exe’
– ‘\taskhostw.exe’
– ‘\thor.exe’
– ‘\thor64.exe’
– ‘\tiworker.exe’
– ‘\vssvc.exe’
– ‘\WmiPrvSE.exe’
– ‘\wsmprovhost.exe’ filter_programfiles:
# When using this rule in your environment replace the “Program Files” folder by the exact applications you know use this. Examples would be software such as backup solutions
Image|startswith:
– ‘C:\Program Files\’
– ‘C:\Program Files (x86)\’ filter_update:
CommandLine|startswith: ‘C:\$WinREAgent\Scratch\’ CommandLine|contains: ‘\dismhost.exe {‘
filter_image_null: Image: null

condition: selection and not 1 of filter_* falsepositives:
– Unknown level: high
(Source: Surface web)

STRATEGIC RECOMMENDATIONS

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATIONS

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATIONS

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rules for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Trending Malware of the Week

Type: Information Stealer

Objective: Data theft, Data Exfiltration

Threat Actor: Sapphire Werewolf

Target Technologies: Windows OS, Browsers (Chrome, Opera, Yandex, Brave, Orbitum, Atom, Kometa, Edge Chromium), FileZilla, VPN Clients, Remote Desktop Tools

Active Malware of the Week
This week “Amethyst Stealer” is trending.

Amethyst Stealer
Researchers discovered a new campaign involving an updated version of Amethyst Stealer, attributed to the threat actor Sapphire Werewolf. The campaign uses deceptive emails that appear to be HR department memos, with the malware delivered through compressed attachments containing a decoy PDF to distract the recipient. Once executed, Amethyst Stealer quietly harvests sensitive data from the infected system, including credentials, browser-stored information, configuration files, and documents from both internal and removable drives. This latest variant also includes enhanced evasion techniques, such as virtual environment detection and advanced encryption, highlighting a more refined and stealthy approach in the evolving campaign.

Attack Method
Initially, Sapphire Werewolf poses as an HR representative and sends a malicious attachment disguised as an official memo. This tactic is crafted to trick victims into opening the file, triggering the execution of the malware.

Fig: Phishing email

The attacker sends a compressed archive, disguised as an official memo, which contains an executable file disguised with a PDF icon. This is a C#-based malware, protected with .NET Reactor, that functions as a loader. Upon execution, it loads a Base64-encoded payload, which is a PE file, allowing the malware to carry out its malicious actions on the victim’s system.

Once the Base64 string is decoded, it is loaded into memory and executed using specific methods in the code. The resulting PE file is the Amethyst Stealer, also protected with .NET Reactor. This variant download malicious files into the memory of the DotNetZip.dll helper library for file compression. It then sends system data, such as the IP address and a string identifying whether the system is a virtual machine, to a specific address. The malware also communicates with several external servers, including one for IP verification, and uses its resources to execute a decoy PDF document, further deceiving the victim.

Fig: Example of decoy content

Capabilities of Updated Amethyst Stealer
The updated Amethyst Stealer features the following special capabilities:

  • Advanced checks for VM environments, enabling the malware to:
  • Attempt to retrieve a file descriptor specific to a VirtualBox VM
  • Check for a registry key used by VMware Tools
  • Check the hardware manufacturer and model via WMI
  • Check the processor manufacturer, including Parallels
  • Check the motherboard manufacturer and BIOS details
  • Check the disk model data
  • Check plug and play devices
  • Check services
  • Check if the VM-associated registry keys have been modified in the last month
  • Exploits WMI to gather extensive data about the compromised system
  • The updated stealer uses the Triple DES algorithm to encrypt nearly all strings used in its function calls, offering a more targeted form of obfuscation compared to typical .NET loaders that encrypt entire code blocks.
  • The updated Amethyst Stealer also includes capabilities to extract credentials from Telegram and various browsers such as Chrome, Opera, Yandex, Brave, Orbitum, Atom, Kometa, Edge Chromium, as well as from FileZilla and SSH configuration files. It targets configuration data from remote desktop tools and VPN clients and is designed to search for and steal various types of documents, including those stored on removable media—broadening its ability to harvest sensitive information from compromised systems.

INSIGHTS

  • The resurgence of Amethyst Stealer in this campaign reflects a broader shift among cybercriminals toward refining older tools rather than creating new ones from scratch. This strategy allows attackers to bypass traditional security layers by modifying familiar malware strains in ways that make them harder to detect. By repackaging Amethyst with new tricks and evasion techniques, Sapphire Werewolf benefits from the malware’s established reliability while adapting it to current security environments—an approach that’s becoming increasingly common in persistent threat operations.
  • This campaign stands out not just for its technical sophistication but also for its psychological manipulation. By impersonating HR departments, the attackers tap into workplace trust and urgency—two emotions that consistently lead to higher click-through rates in phishing attacks. The use of decoy documents and official-sounding communication further blurs the line between legitimate business operations and cyber threats, illustrating how social engineering remains a powerful tool in the threat landscape, especially when combined with custom malware.
  • The threat actor behind this campaign, Sapphire Werewolf, appears to be evolving from a technically capable group into one with a clear strategy for long-term disruption and intelligence gathering. Their choice of infrastructure reflects a more structured and analytical approach to victim monitoring. While their full motives remain unclear, the precision in both malware development and delivery suggests they are not operating randomly—there may be targeted objectives, such as credential harvesting for resale, corporate espionage, or laying the groundwork for future intrusions.

ETLM ASSESSMENT
From the ETLM perspective, CYFIRMA anticipates that the tactics employed by Sapphire Werewolf and the Amethyst Stealer campaign are a clear indication that cybercriminals are becoming more calculated and adaptive in their approach, intensifying the threat landscape for both organizations and individual users. As threat actors sharpen their phishing tactics and refine malware delivery, individuals handling sensitive information—whether for work or personal purposes—could become prime targets. In the coming years, we may see a surge in highly targeted attacks aimed at specific sectors or high-value individuals, allowing cybercriminals to quietly infiltrate networks and extract critical data. These operations are likely to become harder to detect, prolonging exposure and amplifying the potential damage. As personal devices grow more interconnected with organizational systems, they could serve as vulnerable entry points, blurring the line between corporate and individual risk. This shift underscores a growing need for broader cybersecurity awareness and resilience across all levels of digital interaction.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

STRATEGIC RECOMMENDATIONS

  • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
  • Block exploit-like behaviour. Monitor endpoints memory to find behavioural patterns that are typically exploited, including unusual process handle requests. These patterns are features of most exploits, whether known or new. This will be able to provide effective protection against zero-day/critical exploits and more, by identifying such patterns.
  • Configure organization’s intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defence mechanisms in place to alert on — and upon review, consider blocking connection attempts to and from — the external IP addresses and domains listed in the appendix.

MANAGEMENT RECOMMENDATIONS

  • Regularly reinforce awareness of unauthorized attempts with end-users across the environment and emphasize the human weakness in mandatory information security training sessions.
  • Move beyond the traditional model of security awareness towards Improved Simulation and training exercises that mimic real attack scenarios, account for behaviors that lead to a compromise, and are measured against real attacks the organization receives.

TACTICAL RECOMMENDATIONS

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Exert caution when opening email attachments or clicking on embedded links supplied via email communications.

Weekly Intelligence Trends/Advisory

1. Weekly Attack Type and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Qilin Ransomware, Sarcoma Ransomware | Malware – Amethyst stealer
  • Qilin Ransomware– One of the ransomware groups.
  • Sarcoma Ransomware – One of the ransomware groups.
  • Please refer to the trending malware advisory for details on the following:
  • Malware – Amethyst stealer
  • Behaviour –Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

Supply Chain Attack via Malicious NPM Packages Targeting PayPal

  • Threat Actor: tommyboy_h1 and tommyboy_h2
  • Attack Type: Supply Chain Attack
  • Objective: Data Theft and Exfiltration
  • Target Technology: Node.js / NPM ecosystem
  • Target Geographies: Global
  • Target Industries: Finance, E-commerce, Software Development
  • Business Impact: Data breach, financial loss, supply chain compromise

Summary:
Researchers have identified a wave of malicious NPM packages created by a threat actor using the aliases tommyboy_h1 and tommyboy_h2, believed to be the same individual. These packages were published between March 5 and March 14 and were specifically designed to target PayPal users by mimicking legitimate software libraries. By including “PayPal” in the package names—such as oauth2-paypal and buttonfactoryserv-paypal—the attacker created a false sense of legitimacy, tricking developers into installing them.

The campaign primarily targets PayPal users, suggesting a global attack scope, particularly across regions where PayPal is widely used, such as North America, Europe, and Asia-Pacific. The attacker’s strategy involves abusing the trust developers place in well-known service-related package names, transforming this into a supply chain attack that can affect individuals and organizations worldwide.

Once installed, these packages use a “preinstall hook”, a feature in NPM that allows scripts to run before installation. This hook executes a malicious script that silently collects sensitive system data including the current user, hostname, and working directory. To evade detection, the script encodes the data in hexadecimal, obfuscates directory paths, and sends the information to a remote attacker-controlled server using dynamically generated URLs, making it difficult for network security tools to block the communication.

The malicious packages share identical or nearly identical code, indicating a coordinated campaign. The researcher’s investigation found that numerous such packages were published within a short period, all exhibiting similar behaviour aimed at exfiltrating system information for further exploitation or resale on the dark web. The actor’s rapid publishing of these packages increases the likelihood of unsuspecting developers using them in their projects.

Researchers observed identical malicious code across multiple packages, suggesting that all were likely published by the same attacker.

Relevancy & Insights:
The threat actor operating under the aliases tommyboy_h1 and tommyboy_h2 has shown a consistent pattern of using open-source ecosystems, particularly NPM, to distribute malicious packages. In their recent campaign, the attacker rapidly published multiple packages within a short timeframe, using social engineering techniques such as impersonating legitimate services like PayPal. This tactic leverages the trust developers place in popular services to trick them into installing malicious dependencies. While there is no explicit mention of a prior campaign outside of this timeframe (March 5–14), the repetition of tactics, like the use of preinstall hooks, code obfuscation, and data exfiltration methods suggest the attacker has a practiced approach and is refining their techniques.

The targeting remains consistent, focusing on global regions where PayPal is widely used. In both aliases’ activity, the attacker aims at compromising systems of developers integrating financial services, thereby making this a software supply chain attack with broad implications. Attackers are embedding malicious scripts in legitimate- looking packages to steal sensitive data and enable further exploits or resale. The identical code and behaviour across different aliases suggest a coordinated, ongoing supply chain attack, underscoring the need for stronger security in open-source ecosystems.

ETLM Assessment:
The threat landscape surrounding the recent malicious npm package campaign highlights the increasing vulnerability of the open-source ecosystem to supply chain attacks. Attackers, such as the ones behind tommyboy_h1 and tommyboy_h2, are targeting developers by leveraging well-known and trusted platforms like PayPal to create malicious packages that appear legitimate. The preinstall hook is exploited as a primary vector to execute malicious scripts automatically, allowing attackers to steal sensitive data without detection. This type of attack bypasses traditional security mechanisms by obfuscating data and using dynamically generated URLs, making it harder to trace and block. Furthermore, as the open-source software supply chain becomes a more attractive target for cybercriminals, the rapid spread of malicious packages shows the increasing sophistication of threat actors who can abuse package management systems like npm to distribute malware and exfiltrate data. Emerging trends suggest a broader attack surface targeting developer tools and software dependencies, further highlighting the need for enhanced security in open-source package repositories.

The targeted geography in this campaign includes regions where PayPal is heavily used, making global markets the primary focus. The targeted industry is primarily the technology, fintech, and e-commerce sectors, where developers rely on third-party packages for software integration. As attackers increasingly use social engineering tactics to manipulate developers into installing seemingly legitimate packages, the scope of potential victims expands. This trend signifies the growing importance of securing software supply chains and maintaining vigilance in dependency management. Industries relying on online payment platforms, especially those using or integrating PayPal, are particularly vulnerable. To defend against such threats, it is critical for companies to scrutinize package sources and employ security tools that can detect suspicious activities across their networks and codebases.

Recommendations:

Strategic Recommendations

  • Strengthen security protocols for software development and open-source components.
  • Implement continuous training programs focused on identifying malicious packages, social engineering, and package management best practices.
  • Raise organization-wide awareness of open-source security threats.

Tactical Recommendations

  • Establish strict code review and dependency vetting processes using both automated and manual validation tools.
  • Implement real-time monitoring for unusual network activity and review logs for suspicious npm package installations.
  • Enforce the use of trusted, verified npm packages and use private repositories or whitelists to reduce risk.

Operational Recommendations

  • Set up automated tools to detect and block malicious npm packages and quarantine suspicious ones immediately.
  • Regularly audit open-source dependencies for outdated or insecure packages.
  • Actively monitor for IOCs such as specific package names and hash values (e.g., oauth2-paypal, buttonfactoryserv-paypal) and quarantine affected systems immediately.
  • Ensure incident response procedures include actions for handling compromised packages and rotating credentials.
  • Monitor network traffic for unusual connections to external servers linked to malicious package activitiMesIT.

RE ATT&CK Tactics and Techniques

Tactics ID Technique
Initial Access T1195 Supply Chain Compromise
Execution T1059 Command and Scripting Interpreter
Defense Evasion T1027 Obfuscated Files or Information
Credential Access T1555 Credentials from Password Stores
Discovery T1083 File and Directory Discovery
Collection T1119 Automated Collection
Command and Control T1071 Application Layer Protocol
Exfiltration T1041 Exfiltration Over C2 Channel

IOCs:
Kindly refer to the IOCs (Indicators of Compromise) Section to exercise controls on your security systems.

3. Major Geopolitical Developments in Cybersecurity

China reportedly accepted a hand in Volt Typhoon attacks
According to fresh media reports, in a closed-door meeting last December in Switzerland, Chinese officials privately acknowledged that Beijing was behind a series of aggressive cyberattacks targeting U.S. critical infrastructure.

Chinese representatives supposedly connected years of cyber intrusions into U.S. ports, water systems, airports, and other key sectors to Washington’s growing support for Taiwan. These intrusions, previously denied by Beijing, have been linked by security researchers to a group known as Volt Typhoon. The admission, albeit indirect and veiled in diplomatic language, came as a surprise to the American delegation.

Chinese officials had long denied involvement, often blaming criminal groups or accusing the U.S. of exaggerating. However, during this meeting, American officials interpreted the comments as a tacit acknowledgment of responsibility—along with an implicit warning over Taiwan.

ETLM Assessment:
Last year, the U.S. publicly warned about the Volt Typhoon’s infiltration of civilian infrastructure, attributing it to a Chinese military strategy aimed at embedding in U.S. networks in preparation for possible future conflict. Since the Geneva meeting, U.S.- China relations have further deteriorated amid an escalating trade war. Top Trump administration officials have vowed to step up offensive cyber operations against China, while Beijing continues to exploit access to U.S. telecommunications systems gained through a separate breach tied to another hacking group, dubbed Salt Typhoon.

Compounding concerns, the administration recently announced sweeping layoffs of cybersecurity personnel and dismissed both the director and deputy director of the National Security Agency. These moves have raised alarms among intelligence officials and lawmakers about weakening national defenses at a critical time. China’s targeting of civilian infrastructure represents one of the most serious threats currently facing the Trump administration.

Russian hackers target Western military missions in Ukraine
Researchers observed the Russian threat actor Gamaredon (also known as “Shuckworm”) using an infected removable drive to compromise the military mission of a Western country, based in Ukraine. The attackers deployed a new version of their GammaSteel infostealer.

The campaign began in February and extended into March, with the initial compromise likely stemming from an infected removable drive. The campaign highlights a shift in the group’s tactics, moving away from reliance on VBS scripts in favor of more PowerShell-based tools, especially in the later stages of the attack. PowerShell not only enables obfuscation but also allows scripts to be embedded in the Windows registry, adding persistence and stealth. GammaSteel was delivered through a multi- stage, heavily obfuscated attack chain, aimed at reducing the likelihood of discovery.

ETLM Assessment:
Gamaredon is a Russian state-linked espionage group active since 2013. Believed to operate under the direction of Russia’s Federal Security Service (FSB), the group has remained almost entirely focused on the Ukrainian government, law enforcement, and defense entities. Its ongoing activity underscores how the war in Ukraine has evolved into the central organizing principle of the Russian state, shaping the priorities of its intelligence and cyber operations.

This latest attack signals a modest increase in Gamaredon’s technical sophistication. Though considered less capable than other Russian cyber actors, the group makes up for it through relentless focus on Ukrainian targets. By continuously tweaking its code, adding obfuscation, and using legitimate web services, Gamaredon aims to evade detection despite its limited toolkit.

The operation underscores the group’s ongoing, singular focus on Ukraine—highlighting how the war has become not just a military campaign but the central organizing principle of the Russian state, driving long-term intelligence and cyber efforts.

4. Rise in Malware/Ransomware and Phishing

The Qilin Ransomware Impacts Bangkok Electronics Co., Ltd

  • Attack Type: Ransomware
  • Target Industry: Technology
  • Target Geography: Thailand
  • Ransomware: Qilin Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Thailand; Bangkok Electronics Co., Ltd (www[.]bangkokelectronics[.]com), was compromised by Qilin Ransomware.

Bangkok Electronics Co., Ltd. is a Thai company specializing in the distribution and installation of electronic security and access control systems. The compromised data consists of confidential and sensitive information related to the organization. The compromised data totals approximately 400 GB.

The following screenshot was observed published on the dark web:

Source: Dark Web

Relevancy & Insights:

  • Qilin (also known as Agenda) is a Ransomware-as-a-Service (RaaS) group first observed in July 2022. It employs a double extortion method, encrypting victims’ data and exfiltrating it, threatening to leak it on their data leak site (DLS) if the ransom is not paid.
  • Qilin maintains variants written in both Golang and Rust, targeting both Windows and Linux operating systems.
  • Qilin ransomware now utilizes a hybrid encryption scheme combining AES-256 symmetric encryption with RSA-2048 asymmetric keys, making recovery without the decryption key extremely difficult.
  • Qilin affiliates gain initial access via social engineering attacks like phishing emails with malicious attachments and valid credentials that have been leaked or purchased.
  • The Qilin Ransomware group primarily targets countries such as the United States of America, Canada, France, Spain, and the United Kingdom.
  • The Qilin Ransomware group primarily targets industries, including Health Care Providers, Business Support Services, Heavy Construction, Manufacturing, and
    Industrial Machinery.
  • Based on the Qilin Ransomware victims list from 1 January 2024 to 16th April 2025, the top 5 Target Countries are as follows:
  • The top 10 Industries, most affected by Qilin Ransomware from 1st th April 2025 are as follows:
  • According to CYFIRMA’s assessment, Qilin ransomware poses a significant threat to organizations of all sizes. Its evolving tactics, including double extortion (data encryption and leak threats), cross-platform capabilities (Windows and Linux, including VMware ESXi), and focus on speed and evasion make it a particularly dangerous actor.

The Sarcoma Ransomware Impacts FKS Group

  • Attack Type: Ransomware
  • Target Industry: Agri-Food & Commodities
  • Target Geography: Singapore
  • Ransomware: Sarcoma Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Singapore, FKS Group (https[:]//www[.]fksgroup[.]com/), was compromised by Sarcoma Ransomware. FKS Group is a Southeast Asian holding company focused on food and agriculture, infrastructure, and property. Its companies combine a strong commitment to logistics and infrastructure with deep domestic and international understanding to realize the potential of businesses and people across the region. The compromised data includes confidential and sensitive information belonging to the organization. The compromised data totals approximately 177 GB.

The following screenshot was observed published on the dark web:

Source: Dark Web

Relevancy & Insights:

  • Sarcoma ransomware first appeared in late 2023 and quickly established itself as a formidable adversary in the ransomware landscape. Its sophisticated approach and rapid victimization have drawn attention.
  • The Sarcoma ransomware group employs a double extortion model, encrypting victims’ data while also exfiltrating sensitive information to leverage for ransom payments. For instance, Sarcoma threatened to publish stolen data within days if ransoms were not paid, showcasing their aggressive extortion tactics.
  • Sarcoma ransomware has adopted AES-256 with hybrid RSA-4096 encryption, making decryption without the attacker’s private key nearly impossible. This dual-layer approach ensures files remain inaccessible even if one layer is partially compromised. Additionally, the malware now employs fileless execution techniques, leveraging legitimate system tools like PowerShell and WMI to evade signature-based detection.
  • The Sarcoma Ransomware group primarily targets countries like the United States of America, Canada, Italy, the United Kingdom, and Spain.
  • The Sarcoma Ransomware group primarily targets industries such as Industrial Goods & Services, Retail, Specialized Consumer Services, Business Support Services, and
    Computer Services.

  • Based on the Sarcoma Ransomware victims list from 1 Jan 2024 to 16th April 2025, the top 5 Target Countries are as follows:
  • 16th April 2025 are as follows:

ETLM Assessment:
Based on recent assessments by CYFIRMA, Sarcoma ransomware is rapidly becoming a significant threat due to its aggressive tactics and increasing victim count. Organizations must remain vigilant and proactive in their cybersecurity efforts to mitigate risks associated with this evolving threat landscape.

5. Vulnerabilities and Exploits

Vulnerability in Joomla!

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Modules and components for CMS
  • Vulnerability: CVE-2025-25226
  • CVSS Base Score: 9.8 Source
  • Vulnerability Type: SQL Injection
  • Summary: The vulnerability allows a remote attacker to execute arbitrary SQL queries in a database.

Relevancy & Insights:
The vulnerability exists due to insufficient sanitization of user-supplied data in the quoteNameStr method of the Database package. A remote attacker can send a specially crafted requests to the affected application and execute arbitrary SQL commands within the application database.

Impact:
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, and modify data in the database and gain complete control over the affected application.

Affected Products:
https://developer[.]joomla[.]org/security-centre/963-20250401- framework-sql-injection-vulnerability-in-quotenamestr-method-of-database-package.html

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED PRODUCTS OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies, due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment:
Vulnerability in Joomla! can pose significant threats to user privacy and security. This can impact various industries globally, including technology, finance, healthcare, and beyond. Ensuring the security of Joomla! is crucial for maintaining the integrity and protection of users’ data worldwide. Therefore, addressing these vulnerabilities is essential to safeguarding content management operations, including website creation, user interaction, and extension integration, across different geographic regions and sectors.

6. Latest Cyber-Attacks, Incidents, and Breaches

Underground Ransomware attacked and published the data of Shengyu Steel Co., Ltd.

  • Threat Actors: Underground Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Manufacturing
  • Target Geography: Taiwan
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that Underground Ransomware attacked and published the data of Shengyu Steel Co., Ltd.(https[:]//www[.]shengyusteel[.]com/) on its dark web website. Shengyu Steel Co., Ltd., operates in the steel manufacturing and distribution industry. The company exports its products to markets across Asia, Europe, and the United States. The data leak, following the ransomware attack, encompasses the following:

    ❍ Company ownership structure documents

    ❍ -Documents from the company president’s computer

    ❍ -HR reports

    ❍ -Records of materials used in manufacturing

    ❍ -Claims

    ❍ -Personal data on employees (passports, employment contracts)

    ❍ -Intellectual property of the company

    ❍ -Yodoko International Limited (YIL) documents

    ❍ -Financial documents of the company

    ❍ -Product development

    ❍ -Documents marked confidential

    ❍ -Product compliance documentation (test reports, compositions, and properties)

Source: Dark Web

Relevancy & Insights:

  • Underground ransomware first appeared in July 2023 and is believed to be linked to the Russian cybercrime group RomCom (Storm-0978). This group is known for conducting opportunistic ransomware attacks and credential-gathering campaigns.
  • Underground ransomware employs a double extortion model, encrypting files while also exfiltrating sensitive information. They threaten to publish stolen data if ransoms are not paid, increasing pressure on victims.

ETLM Assessment:
According to CYFIRMA’s assessment, Underground ransomware continues to evolve as a major threat in the cybercrime ecosystem, driven by well-organized RaaS operations and sophisticated techniques. Organizations must adopt a multi-layered cybersecurity strategy to defend against these persistent threats and minimize impact.

7. Data Leaks

Department of Transportation Philippines Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: Government
  • Target Geography: Philippines
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed a data leak related to the Department of Transportation of the Philippines (https[:]//www[.]dotr[.]gov[.]ph/) in an underground forum. The Department of Transportation (DOTr) in the Philippines serves as the government’s central authority for all matters related to transportation. Its primary function is to ensure the development and efficient operation of the country’s transportation networks, encompassing land, air, and sea travel. The compromised data includes confidential and sensitive information pertaining to the Department of Transportation of the Philippines. The breach has been linked to a threat actor identified as “LuxurySp1d3r.”

Source: Underground Forums

Machine Tech Co., Ltd Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: Manufacturing and Industrial Equipment
  • Target Geography: Thailand
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed a data leak related to the Machine Tech Co., Ltd (https[:]//www[.]machine-tech[.]co[.]th/) in an underground forum. Machine Tech Co., Ltd is a leading supplier of industrial machinery and automation solutions in Thailand. The company specializes in importing and distributing CNC machines, waterjet cutting systems, 3D printers, and related equipment, serving various industries, including automotive, aerospace, electronics, medical, and mold manufacturing. The compromised data includes ID, parent ID, full name, phone number, email address, messages, file attachments, creation and modification dates, along with other confidential and sensitive information. The breach has been linked to a threat actor identified as ” Sythe.”

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously scouring for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to illicitly gain access and steal valuable data. Subsequently, the pilfered data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The rise of the threat actor known as ‘Sythe’ marks a significant development in the cyber threat landscape, especially given their claims of responsibility for multiple breaches. This incident underscores the fact that even individual or seemingly isolated actors can cause substantial harm. It highlights the ongoing importance of implementing strong, layered security measures. Staying vigilant and maintaining a proactive defense posture is essential to countering the risks posed by emerging threats like Sythe.

Recommendations: Enhance the cybersecurity posture by

  • Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  • Ensure proper database configuration to mitigate the risk of database-related attacks.
  • Establish robust password management policies, incorporating multi-factor authentication and role-based access, to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA Research team observed a data leak related to AsiaRecruit Malaysia (https[:]//www[.]asiarecruit[.]com[.]my/) in an underground forum. Asia Recruit is a leading recruitment and human resource consultancy firm based in Malaysia. The data leak involved information of 88,000 users, including email addresses, recruitment details, and other related data.

Source: Underground forums

The CYFIRMA Research team observed a data leak related to First Advantage (https[:]//fadv[.]com/solutions/employment-background-checks/) in an underground forum. First Advantage Corporation is a leading global provider of background screening, identity verification, and risk mitigation solutions. The company serves clients across various industries, including healthcare, retail, financial services, and transportation.

The data leak contains Indian PAN, Passport, voter ID, and DL, including:

criminal.csv – 861,337
first name, middle name, last name, father name, date of birth, government ID, ID name, ID country, subject date, address, address2, city, state, country, zip code, report URL

pan.csv – 232,139
first name, middle name, last name, father name, date of birth, government ID, ID name, ID country, Aadhaar seeding status, name on card, pan Last updated, pan active

passport.csv – 17,198
first name, middle name, last name, father name, date of birth, gender, nationality, government ID, ID name, ID country

driver_license.csv – 10,765
first name, middle name, last name, father name, date of birth, government ID, ID name, ID country, issuing date, expiry date, subject date

voter_id.csv – 2,623
first name, middle name, last name, father name, date of birth, husband name, voter ID, ID name, ID country, subject date

Source: Underground forums

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organizations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Deploy a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, active network monitoring, through next generation security solutions and ready to go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied and the proper implementation of security technologies, followed by corrective actions remediations, and lessons learned.
  • Move beyond the traditional model of security awareness towards improved simulation and training exercises that mimic real attack scenarios, account for behaviours that lead to a compromised and are measured against real attacks the organization receives.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcoming of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies and continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthen defences based on tactical intelligence provided
  • Deploy detection technologies that are behavioural anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security control such as reCAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

Geography-Wise Graph

Industry-Wise Graph

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, technology, please access DeCYFIR.