Self Assessment

Weekly Intelligence Report – 09 May 2025

Published On : 2025-05-08
Share :
Weekly Intelligence Report – 09 May 2025

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware
Target Technologies: MS Windows

Introduction
CYFIRMA Research and Advisory Team has found LockZ Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

LockZ Ransomware
LockZ is a ransomware strain that encrypts files and appends the “.lockz” extension to affected files. It also modifies the desktop wallpaper and places a ransom note named “@[email protected]

Screenshot of files encrypted by ransomware (Source: Surface Web)

The ransom note informs victims that their system has been compromised and that all files—including documents, images, and databases—have been encrypted. It warns against self-recovery attempts, claiming such actions could result in permanent file loss.

To regain access, victims are instructed to pay 1 BTC to a designated Bitcoin address. Attackers promise to provide a decryption file within 24 hours of payment. The ransom will reportedly double if not paid within 48 hours, and files are said to be permanently deleted after 72 hours.

The note discourages contacting law enforcement or using third-party recovery tools and includes an email address for further communication.

Screenshot of LockZ’s text file (“@[email protected]”):(Source: Surface Web)

Screenshot of LockZ’s desktop wallpaper: (Source: Surface Web)

Following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Execution T1059 Command and Scripting Interpreter
Execution T1059.001 PowerShell
Execution T1106 Native API
Execution T1129 Shared Modules
Execution T1203 Exploitation for Client Execution
Persistence T1112 Modify Registry
Persistence T1542 Pre-OS Boot
Persistence T1542.003 Bootkit
Persistence T1547 Boot or Logon Autostart Execution
Persistence T1547.001 Registry Run Keys / Startup Folder
Persistence T1574 Hijack Execution Flow
PrivilegeEscalation T1055 Process Injection
PrivilegeEscalation T1055.003 Thread Execution Hijacking
PrivilegeEscalation T1547 Boot or Logon Autostart Execution
PrivilegeEscalation T1547.001 Registry Run Keys / Startup Folder
PrivilegeEscalation T1574 Hijack Execution Flow
Defense Evasion T1006 Direct Volume Access
Defense Evasion T1014 Rootkit
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1027.002 Software Packing
Defense Evasion T1027.004 Compile After Delivery
Defense Evasion T1036 Masquerading
Defense Evasion T1055 Process Injection
Defense Evasion T1055.003 Thread Execution Hijacking
Defense Evasion T1070 Indicator Removal
Defense Evasion T1070.004 File Deletion
Defense Evasion T1112 Modify Registry
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1497 Virtualization/Sandbox Evasion
Defense Evasion T1497.001 System Checks
Defense Evasion T1542 Pre-OS Boot
Defense Evasion T1542.003 Bootkit
Defense Evasion T1564 Hide Artifacts
Defense Evasion T1564.001 Hidden Files and Directories
Defense Evasion T1564.003 Hidden Window
Defense Evasion T1574 Hijack Execution Flow
Defense Evasion T1620 Reflective Code Loading
CredentialAccess T1003 OS Credential Dumping
CredentialAccess T1539 Steal Web Session Cookie
CredentialAccess T1552 Unsecured Credentials
CredentialAccess T1552.001 Credentials In Files
Discovery T1010 Application Window Discovery
Discovery T1012 Query Registry
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1497 Virtualization/Sandbox Evasion
Discovery T1497.001 System Checks
Discovery T1518 Software Discovery
Discovery T1518.001 Security Software Discovery
Collection T1005 Data from Local System
Collection T1114 Email Collection
Command and Control T1071 Application Layer Protocol
Command and Control T1095 Non-Application Layer Protocol
Command and Control T1105 Ingress Tool Transfer
Command and Control T1573 Encrypted Channel
Impact T1485 Data Destruction
Impact T1486 Data Encrypted for Impact
Impact T1496 Resource Hijacking

Relevancy and Insights:

  • This ransomware specifically targets the widely used Windows Operating System, which is prevalent across numerous industries and organizations.
  • Detect-Debug-Environment: Debugging environments are used by developers to analyze and troubleshoot software. The ransomware uses this technique to determine whether it is operating in a debug environment. This feature aids the ransomware in avoiding analysis and detection attempts.
  • Ransomware utilizes extended sleep intervals to evade detection by security software, enabling it to operate stealthily and increasing the likelihood of completing file encryption before being identified.

ETLM Assessment:
CYFIRMA’s prediction, based on available intelligence, indicates that LockZ ransomware is poised to become a more evasive and persistent threat in the near future. Its focus on the widely deployed Windows platform, combined with high ransom demands, suggests a clear targeting of enterprises in sectors such as finance, healthcare, and manufacturing. The ransomware’s capabilities—including debug environment detection and extended sleep intervals—highlight its growing sophistication and intent to evade analysis and delay detection. These features increase the likelihood of successful encryption before intervention, underscoring the need for heightened vigilance and proactive defense across critical industries.

IOCs:
Kindly refer to the IOCs section to exercise controls on your security systems.

Sigma Rule
title: Dot net compiler compiles file from suspicious location threatname:
behaviorgroup: 1
classification: 7 mitreattack:

logsource:
category: process_creation product: windows
detection: selection:
CommandLine:
– ‘*\windows\microsoft.net\framework*\csc.exe*/noconfig
/fullpaths*\appdata\local\temp*’ condition: selection
level: high
(Source: Surface web)

STRATEGIC RECOMMENDATION

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATION

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATION

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Trending Malware of the Week

Type: Information Stealer | Objectives: Stealing sensitive information, Data exfiltration | Target Technology: Windows OS | Target Geography: Global

CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malware that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week “Gremlin Stealer” is trending.

Gremlin Stealer
Researchers have uncovered a newly emerging malware known as Gremlin Stealer, a C#-based information stealer that has been making waves since mid-March 2025. The malware’s operators have been actively promoting it through Telegram, signaling a clear intent to attract cybercriminals seeking powerful data theft tools. Gremlin Stealer is designed to quietly infiltrate victims’ systems and extract a broad range of personal and sensitive information. This includes browser cookies, credit card details, clipboard content, crypto wallet data, and credentials for services like FTP and VPNs. Once collected, the stolen information is sent to a remote server controlled by the attackers, where it can be viewed, shared, or potentially sold. The rise of Gremlin Stealer highlights the continued evolution of information-stealing malware and the growing role of online platforms like Telegram in facilitating malicious activity.

Gremlin Stealer – Sales and Advertisement on Telegram
Gremlin Stealer claims to be capable of extracting data from a wide variety of software applications, positioning itself as a versatile tool for information theft. It is actively promoted through a Telegram channel, where its authors regularly share updates, highlighting that the malware is still under active development. A promotional post on this channel showcases Gremlin Stealer’s capabilities and serves as a central hub for its distribution, signaling ongoing efforts to expand its reach among cybercriminal circles.

Fig: Telegram post advertising Gremlin Stealer

Technical Analysis
The initial infection vector for Gremlin Stealer remains unknown. However, the malware is advertised as being capable of targeting a wide range of applications to extract sensitive user data. Ongoing updates shared via Telegram indicate that the stealer is under active development, with its capabilities likely to expand over time. The following are the stealer’s functions:

Basic features include:

  • Bypassing Chrome cookie V20 protection
  • Its build process does not download anything from the internet

Stealing functionality targets the following:

  • Popular browsers (e.g., cookies, passwords, cards, forms)
  • Popular cryptocurrencies
  • Clipboard data
  • FTP services
  • Steam (token and session data)
  • Popular VPN services
  • Telegram session data
  • Discord tokens (spot search by browsers)
  • Screenshots
  • Specified information from victim PC (e.g., BSID, HVID, RAM, CPU, GPU and IP address)

Bypassing Chrome cookie V20 protection
One of the key features highlighted for Gremlin Stealer is its ability to bypass Chrome’s cookie v20 protection, allowing it to access cookie-related data despite Google’s security updates aimed at blocking such techniques. This method, commonly seen in other stealers, enables Gremlin to retrieve sensitive browser information. Once collected, the stolen cookies—along with details like domain, name, value, path, and expiration date—are written into a text file stored in the LOCAL\_APP\_DATA folder. This file is then prepared for upload to the malware’s server.

Chromium and Gecko Browsers
Gremlin Stealer is designed to search for cookies and saved passwords across a wide range of Chromium- and Gecko-based browsers. Once collected, this data is written into a file for later exfiltration. To handle newer security measures like Chrome’s “v20” cookie encryption, the malware uses a specific function to bypass these protections in Chromium- based browsers, with a similar mechanism in place for Gecko-based browsers as well.

Cryptocurrency Wallet Stealer
Gremlin Stealer targets various cryptocurrency wallets by scanning specific directories for related files. For instance, when looking for a Litecoin wallet, it checks the system registry, and if a match is found, it copies the wallet.dat file to a temporary location. The malware also searches for files linked to known cryptocurrency domains and duplicates them for future exfiltration. Additionally, it creates a hash list to represent the data it plans to extract.

Fig: List of cryptocurrency wallets targeted by Gremlin Stealer

FTP & VPN Credentials
Gremlin Stealer is also designed to extract login credentials from FTP services, targeting usernames and passwords stored by applications like TotalCommander. In addition, it collects account details and configuration files from widely used VPN clients, expanding its reach into more secure areas of user data.

Telegram and Discord Sessions
Gremlin Stealer also focuses on capturing session data from messaging platforms like Telegram and Discord, allowing it to extract sensitive information and upload it to a server controlled by the attacker.

System Information
Gremlin Stealer gathers system details such as the PC username, clipboard contents, processor info, and hardware ID, and compiles this data into a text file for later exfiltration.

Credit Card Information Stealing
Gremlin Stealer is also capable of stealing credit card information from infected systems and sending the collected data directly to its server.

Uploading Stolen Data to Gremlin Stealer’s Server
Gremlin Stealer creates a dedicated folder under the LOCAL_APP_DATA directory where it stores various types of stolen information in plain text files. This includes saved passwords, cookies, autofill data, screenshots, system details, Discord and Telegram sessions, FTP and VPN credentials, and cryptocurrency wallet data. All this information is bundled into a ZIP archive, which is then sent to the attacker’s server via a Telegram bot using a hard-coded API key. The transfer occurs through an HTTP POST request, delivering the full archive of stolen data from the victim’s Windows device.

Published Stolen Data from Gremlin Stealer’s Victims
The group behind Gremlin Stealer asserts that they have uploaded significant amounts of stolen data from victims to a server. This server is likely a configurable portal provided with the malware for easy access and management of the stolen information.

Fig: Gremlin Stealer login page

The Gremlin Stealer website currently hosts 14 ZIP archives containing stolen data from its victims, with options for users to either delete or download the files. Based on timestamps, the malware has been active since March 2025.

Fig: Gremlin Stealer site showing entries for stolen victim data

INSIGHTS

  • Gremlin Stealer reflects the ongoing evolution of information-stealing malware. What makes this threat stand out is not only its wide-reaching ability to steal a variety of personal data from numerous sources but also the active promotion of its capabilities on platforms like Telegram. The use of such platforms to advertise and distribute malware marks a growing trend where online spaces previously used for legitimate purposes are now facilitating malicious activities. This creates an environment where even less technically savvy cybercriminals can gain access to powerful tools, broadening the scope of potential attackers and victims alike.
  • The operational model behind Gremlin Stealer is indicative of a more organized and sophisticated malware ecosystem. It goes beyond just infecting devices; it also provides a customizable infrastructure for cybercriminals to manage stolen data effectively. The backend portal provided with the malware acts as a central hub for criminals to easily access, manage, and even sell the stolen information. This business-like model elevates Gremlin Stealer above other malware strains, as it combines the technical capabilities of data theft with a structured system for illicit operations. The ability for cybercriminals to control and monitor the process makes it a dangerous tool for a variety of attacks, potentially enabling the targeting of high-value individuals or organizations.
  • As Gremlin Stealer continues to evolve, it presents significant challenges for both cybersecurity professionals and everyday users. Its method of exfiltrating data through hidden channels, combined with its ability to remain undetected for extended periods, emphasizes the growing sophistication of modern malware. While many victims may not immediately recognize that their data has been compromised, the long-term consequences could be severe, including financial losses and identity theft. In the broader context, this malware highlights the increasing need for stronger security measures and better awareness to protect sensitive data, as cybercriminals continue to refine their tactics and tools.

ETLM ASSESSMENT
From the ETLM perspective, CYFIRMA anticipates that as threats like Gremlin Stealer become more accessible and easier to deploy, the malware is poised to expand its reach, targeting a broader global audience and a more diverse range of victims. Its user-friendly design may attract even less-skilled attackers, enabling them to steal personal data, commit fraud, or misuse digital identities with minimal effort. With its built-in system for storing and organizing stolen data, there’s potential for the rise of underground marketplaces where such information is sold and recycled for future attacks. As its operators continue to refine and promote the malware, we could see it integrated into larger cybercriminal ecosystems or offered as part of malware-as-a-service packages. In the long run, this shift toward easier, automated tools may make large-scale data theft more routine and coordinated—posing lasting risks to digital trust and global online safety.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

Recommendations:

STRATEGIC:

  • Deploy an Extended Detection and Response (XDR) solution as part of the organization’s layered security strategy that provides detection/prevention for malware and malicious activities that do not rely on signature-based detection methods.
  • Configure organization’s intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defence mechanisms in place to alert on — and upon review, consider blocking connection attempts to and from — the external IP addresses and domains listed in the appendix.

MANAGEMENT:

  • Implement real-time website monitoring to analyze network traffic going in and out of the website to detect malicious behaviours.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.
  • Move beyond the traditional model of security awareness towards Improved Simulation and training exercises that mimic real attack scenarios, account for behaviors that lead to a compromise, and are measured against real attacks the organization receives.

TACTICAL RECOMMENDATIONS

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Enforce policies to validate third-party software before installation.
  • Evaluate the security and reputation of each piece of open-source software or utilities before usage.

CYFIRMA’S WEEKLY INSIGHTS

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Phishing, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Qilin Ransomware, Lynx Ransomware | Malware – Gremlin Stealer
  • Qilin Ransomware– One of the ransomware groups.
  • Lynx Ransomware – One of the ransomware groups.
    Please refer to the trending malware advisory for details on the following
  • Malware – Gremlin Stealer
    Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

Pahalgam Attack Unveiled: APT36’s Strategic Use of Decoys to Target Indian Government

  • Threat Actor: Transparent Tribe (APT36)
  • Attack Type: Phishing
  • Objective: Espionage
  • Target Technology: Windows OS
  • Target Geography: India
  • Target Industries: Government, Defense
  • Business Impact: Data theft, Operational disruption

Summary:
A recent cyber-espionage campaign has been uncovered leveraging the theme of the April 22, 2025, Pahalgam terror attack to target Indian government and defense personnel. The operation combines credential phishing and malware deployment through malicious documents and deceptive domains mimicking official Indian entities. The attack centers around phishing PDFs, including filenames like “Action Points & Response by Govt Regarding Pahalgam Terror Attack.pdf,” which contain masked content and embedded URLs leading to spoofed login pages. These URLs, such as jkpolice[.]gov[.]in[.]kashmirattack[.]exposed, closely resemble legitimate Indian government domains to harvest credentials of officials using @gov.in or @nic.in email addresses.

The PDF documents were created shortly after the real-world incident, demonstrating the attacker’s rapid response to exploit sensitive geopolitical events. An additional PowerPoint macro-enabled add-on file (.ppam) with a matching lure name has also been identified. This file contains embedded executables that determine the target’s Windows version and install a variant of the Crimson RAT while opening a decoy document to avoid suspicion. The payload, disguised as a .jpg file, is dropped under a dynamically named directory and communicates with a command-and-control server at 93[.]127[.]133[.]58.

The Crimson RAT used in the attack supports over 20 commands for surveillance and data exfiltration, including taking screenshots, listing directories, downloading or deleting files, and maintaining persistence. All compiled payloads bear timestamps from April 21, 2025, indicating premeditated deployment before the terror event. The fake domains used in this campaign were registered within days of the incident, hosted on infrastructure linked to various ASNs known for cyber operations.

The adversary has impersonated numerous Indian defense and government organizations, creating domains such as iaf[.]nic[.]in[.]ministryofdefenceindia[.]org and email[.]gov[.]in[.]departmentofdefenceindia[.]link. These actions form part of a broader pattern of disinformation and espionage aimed at exploiting politically sensitive themes like Kashmir. This campaign presents significant risks, including compromised government systems, unauthorized data access, and disruption of sensitive operations. Technical defenses must focus on macro restriction, phishing detection, anomaly monitoring, and threat intelligence integration to counter such persistent threats.

Relevancy & Insights:
Transparent Tribe (APT36), a Pakistan-linked APT group, has once again demonstrated its consistent operational behavior through a recent campaign exploiting the “Pahalgam Terror Attack” theme. This campaign reflects the group’s strategic focus on Indian government and defense personnel by capitalizing on current, sensitive geopolitical developments. By crafting phishing documents embedded with malicious links and deploying Crimson RAT via macro-enabled PPAM files, the group continues to follow a well-established modus operandi. Fake domains mimicking official Indian entities such as Jammu & Kashmir Police and the Indian Air Force are being used to steal credentials and enable further infiltration— showcasing their blend of social engineering and technical deception.

Historically, APT36 has employed similar techniques. They have used PPAM (PowerPoint add-in) files embedded with OLE objects to deliver malware for years. Additionally, spoofed domains mimicking Indian defense infrastructure and exploiting emotionally or politically charged topics—such as the Kashmir conflict and military movements—have been a recurring strategy. This consistency in their TTPs (tactics, techniques, and procedures) highlights their long-term operational patterns and underlines the relevance of the current incident within their broader threat landscape.

ETLM Assessment:
Transparent Tribe (APT36), a Pakistan-linked threat actor, has launched a campaign targeting the Indian government and defense personnel using phishing documents themed around the April 2025 Pahalgam terror attack. These documents are designed to lure victims into clicking on malicious links embedded in PDFs and PowerPoint files, which then lead to fake login portals mimicking legitimate government domains. The campaign uses credential phishing and macro-enabled files to deploy Crimson RAT, a malware previously associated with APT36. The group targets Indian military, defense, government, and research sectors, with operations geographically focused on India. They exploit human vulnerabilities through social engineering rather than specific software flaws. The Crimson RAT used in this campaign allows full remote access, data exfiltration, and system control. The documents and malicious infrastructure are themed around ongoing sensitive topics, particularly related to Kashmir, to maximize psychological impact. APT36 has consistently used domain impersonation and weaponized documents to support cyber espionage and intelligence collection. This campaign is consistent with their established tactics, techniques, and procedures (TTPs), indicating continuity in objectives and operational style.

Recommendations:

Strategic Recommendations:

  • Enhance SOC operations by integrating geopolitical threat intel, enabling proactive identification and blocking of targeted campaigns using IoCs provided in the report.
  • Ensure the SOC has a tested response plan for phishing and nation-state threats, with regular simulation drills for quick and effective mitigation.
  • Implement advanced threat protection to scan emails and attachments for malicious payloads and disable macros by default to mitigate risks from malicious documents.

Tactical Recommendations

  • Implement advanced threat protection to scan emails, PDFs, and attachments for malicious payloads and embedded links to prevent phishing attacks.
  • Disable macros by default, especially from untrusted sources, to mitigate risks from macro-laced documents used in spear-phishing.

Operational Recommendations

  • Apply the principle of least privilege to restrict access to sensitive systems and data, minimizing lateral movement opportunities for attackers.
  • Provide regular training on recognizing phishing and disinformation tactics, with a focus on politically sensitive topics.
  • Utilize behavioral analytics to detect unusual access patterns or data exfiltration attempts, ensuring quick identification of suspicious activities.
MITRE FRAMEWORK
Tactic ID Technique
Reconnaissance T1598.003 Phishing for Information: Spear phishing Link
Resource Development T1583.001 Acquire Infrastructure: Domains
Initial Access T1566.002 Phishing: Spear phishing Link
Execution T1203 Exploitation for Client Execution
Persistence T1542 Pre-OS Boot
Persistence T1542.003 Pre-OS Boot: Bootkit
Privilege Escalation T1055 Process Injection
Defense Evasion T1014 Rootkit
Defense Evasion T1036 Masquerading
Defense Evasion T1564.001 Hide Artifacts: Hidden Files and Directories
Credential Access T1003 OS Credential Dumping
Discovery T1012 Query Registry
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Collection T1005 Data from Local System
Collection T1113 Screen Capture
Exfiltration T1041 Exfiltration Over C2 Channel

3. Major Geopolitical Developments in Cybersecurity

Many Fortune 500 companies have hired North Korean operatives
According to a recent report on North Korea’s efforts to obtain remote IT positions at foreign companies, these fraudulent workers are now using AI tools to cheat on coding tests and technical interviews. The threat actors are also using deepfake technology to bypass ID checks. The primary goal of these workers is to earn a paycheck for Pyongyang, though they also occasionally use their access to conduct espionage or launch financially motivated attacks. While many initially thought the issue was confined to the crypto industry or even tech firms, multiple experts said it has grown far beyond that. There are now hundreds of Fortune 500 organizations that have hired these North Korean IT workers. Most of them have at least dozens, if not hundreds, of applications from North Korean IT workers.

In many cases, the workers managed to evade detection by using a mix of artificial intelligence and quick thinking—rapidly answering questions and relying on ChatGPT for translations. After securing the job, they would claim a family emergency requires their work laptop to be shipped to a different address than the one provided on their application.

These laptops are then sent to U.S.-based “laptop farms,” where Americans— sometimes knowingly, sometimes not—are paid modest fees to host the devices, install remote access software, and ensure they remain powered on. Many of the individuals operating these laptop farms are unaware they’re assisting North Koreans, often believing they are supporting Chinese business operations.

ETLM Assessment:
North Korean cyber operations are increasingly sophisticated. DPRK’s state hackers both collect intelligence and generate revenue for the state and for themselves.

These efforts appear to be financially motivated not only by hackers themselves but by the state, which treats these fraudulent job applications as a major source of hard currency revenue.

Trump administration to ‘change the script’ on offensive operations
A senior White House official said that the Trump administration aims to “destigmatize and normalize” the use of offensive cyber capabilities as a legitimate tool of national power. “It’s not offense for offense’s sake,” said Alexei Bulazel, senior director for cyber on the National Security Council, during a keynote at the RSA Conference. “It’s about being able to respond in kind if we’re targeted by foreign aggression, or to support conventional military operations with cyber offense.”

His remarks offer some of the clearest insight yet into how the Trump administration plans to approach offensive cyber operations—an increasingly central piece of U.S. national security strategy. Following the 2024 election, Trump’s incoming team emphasized a shift toward a more aggressive cyber posture, especially in the wake of Chinese hacking campaigns that infiltrated U.S. telecom companies and positioned China to potentially disrupt critical infrastructure. Officials argued the U.S. must impose greater costs and consequences on adversaries.

ETLM Assessment:
So far, Trump administration’s policy specifics have been scarce. Much of the attention has instead focused on internal changes, including efforts to downsize the Cybersecurity and Infrastructure Security Agency (CISA) and the recent firings of Gen. Timothy Haugh, who led U.S. Cyber Command and the NSA, along with one of his top deputies.

But now top NSC officials openly state that: “There’s a lot we could do to impose costs,” and “I think previous administrations have been reluctant to go there. This is our opportunity to rewrite the script, to update the offensive cyber playbook. … You have people who’ve been handcuffed for years …It’s time to unleash that talent.”

This could mean the following weeks and months might see the similar level of cyber action states like China and Russia typically employ, coming from the United States.

Canadian power company hit by a cyberattack
Halifax-based electric utility Nova Scotia Power and its parent company Emera have shut down parts of their IT networks while responding to a cyberattack. The attack disrupted the utility’s customer care phone line and online portal, but did not affect physical operations, according to a company statement.

ETLM Assessment:
While the attack in Canada has not caused damage to the grid itself and the electricity generation and distribution operations, the recent blackout in Spain has been the worst in recent decades in all of Europe. As of writing, a cyberattack seems unlikely as the ultimate cause of the blackout, however, the case highlights the increasing vulnerability of interdependent grid operations in the 21st century, while hostile actors like China and Russia are making inroads to critical infrastructure virtually everywhere.

4. Rise in Malware/Ransomware and Phishing

The Qilin Ransomware Impacts Megachem Singapore

  • Attack Type: Ransomware
  • Target Industry: Manufacturing
  • Target Geography: Singapore
  • Ransomware: Qilin Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Singapore; Megachem Singapore
(https[:]//www[.]megachem[.]com[.]sg/), was compromised by Qilin Ransomware. MegaChem Singapore Limited is a well-established, Singapore-based specialty chemical solutions provider with a comprehensive service offering that includes contract manufacturing and global chemical distribution. The compromised data contains confidential company data, financial data, R&D data, employee data, etc. The total size of the compromised data is approximately 165 GB.

Source: Dark Web

Relevancy & Insights:

  • Qilin (also known as Agenda) is a Ransomware-as-a-Service (RaaS) group first observed in July 2022. It employs a double extortion method, encrypting victims’ data and exfiltrating it, threatening to leak it on their data leak site (DLS) if the ransom is not paid.
  • Recently, we observed that the North Korean threat group Moonstone Sleet is using Qilin ransomware in limited attacks, marking the first known use of Qilin by a nation-state actor.
  • Qilin maintains variants written in both Golang and Rust, targeting both Windows and Linux operating systems.
  • Qilin ransomware now utilizes a hybrid encryption scheme combining AES-256 symmetric encryption with RSA-2048 asymmetric keys, making recovery without the decryption key extremely difficult.
  • The Qilin Ransomware group primarily targets countries such as the United States of America, Canada, France, Spain, and the United Kingdom.
  • The Qilin Ransomware group primarily targets industries, including Health Care Providers, Business Support Services, Heavy Construction, Manufacturing, and Industrial Machinery.
  • Based on the Qilin Ransomware victims list from 1st January 2024 to 7th May 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries, most affected by Qilin Ransomware from 1st January 2024 to 7th May 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Qilin ransomware poses a significant threat to organizations of all sizes. Its evolving tactics, including double extortion (data encryption and leak threats), cross-platform capabilities (Windows and Linux, including VMware ESXi), and focus on speed and evasion, make it a particularly dangerous actor.

The Lynx Ransomware Impacts Runtec Co., Ltd

  • Attack Type: Ransomware
  • Target Industry: Logistics
  • Target Geography: Japan
  • Ransomware: Lynx Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Japan; Runtec Co., Ltd (https[:]//www[.]runtec[.]co[.]jp/), was compromised by Lynx Ransomware. Runtec Co., Ltd. is a Japanese logistics provider, specializing in temperature-controlled transportation and storage of food products. It ensures fast, reliable delivery across Japan while actively adopting eco-friendly technologies and digital innovations to improve the efficiency and safety of its operations. The compromised data consists of confidential and sensitive information related to the organization. The total size of the compromised data is approximately 500 GB.

Source: Dark Web

Relevancy & Insights:

  • Lynx offers multiple encryption modes (fast, medium, slow, and entire) to balance the speed and depth of encryption. It uses Curve25519 Donna and AES-128 encryption algorithms.
  • Lynx offers cross-platform ransomware binaries for Windows and Linux environments, supporting various architectures like x86, ARM, MIPS, PPC, and ESXi.
  • Lynx provides a comprehensive platform for affiliates, including tools for managing victims, negotiating ransoms, and sharing access with sub-affiliates.
  • The Lynx Ransomware group primarily targets countries such as the United States of America, the United Kingdom, Sweden, Germany, and Thailand.
  • The Lynx Ransomware group primarily targets industries, including Heavy Construction, Retail, Business Support Services, Specialized Consumer Services, and Industrial Machinery.
  • Based on the Lynx Ransomware victims list from 1st June 2024 to 7th May 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries, most affected by the Lynx Ransomware from 1st June 2024 to 7th May 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Lynx ransomware has emerged as a significant threat in the cybersecurity landscape, leveraging advanced encryption and double extortion tactics to target small and medium-sized businesses. Its structured affiliate program and versatile ransomware toolkit make it a formidable force in the RaaS ecosystem.

5. Vulnerabilities and Exploits

Vulnerability in External Image Replace Plugin for WordPress

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Modules and components for CMS
  • Vulnerability: CVE-2025-4279
  • CVSS Base Score: 8.8 Source
  • Vulnerability Type: Unrestricted Upload of File with Dangerous Type
  • Summary: The vulnerability allows a remote attacker to compromise a vulnerable system.

Relevancy & Insights:
The vulnerability exists due to insufficient validation of the file during file upload in the “external_image_replace_get_posts::replace_post” function.

Impact:
A remote user can upload a malicious file and execute it on the server.

Affected Products:
https[:]//www[.]wordfence[.]com/threat- intel/vulnerabilities/id/ee1624fd-d98b-4953-99dc-a952dda48aa1?source=cve

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies, due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerability in the External Image Replace plugin for WordPress can pose significant threats to user privacy and security. This can impact various industries globally, including media, publishing, education, and beyond. Ensuring the security of the External Image Replace plugin is crucial for maintaining the integrity and protection of users’ data worldwide. Therefore, addressing these vulnerabilities is essential to safeguarding image processing workflows, preventing unauthorized file manipulations, and ensuring secure content delivery across different geographic regions and sectors.

6. Latest Cyber-Attacks, Incidents, and Breaches

NightSpire Ransomware attacked and published the data of PT Pupuk Indonesia

  • Threat Actor: NightSpire Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Fertilizer Manufacturing
  • Target Geography: Indonesia
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that NightSpire Ransomware attacked and published the data of PT Pupuk Indonesia(https[:]//www[.]pupuk-indonesia[.]com/) on its dark web website. PT Pupuk Indonesia is one of Asia’s largest fertilizer producers, operating as a state-owned holding company that oversees a diverse group of subsidiaries in fertilizer and pesticide production, chemical manufacturing, industrial support, logistics, and trading. The data leak, following the ransomware attack, encompasses sensitive and confidential records originating from the organizational database. The total size of the compromised data is approximately 200 GB.

Source: Dark Web

Relevancy & Insights:

  • NightSpire employs a double extortion strategy, encrypting data and threatening to leak stolen information unless a ransom is paid. This approach is typical of modern ransomware groups and adds pressure on victims to comply with demands.
  • NightSpire’s operations show strong influences from existing Ransomware-as-a- Service (RaaS) models, suggesting they might be an emerging group or a rebrand of an existing actor.

ETLM Assessment:
According to CYFIRMA’s assessment, NightSpire is a new ransomware group that emerged in early 2025, marking itself as a formidable player in the rapidly evolving ransomware landscape. Despite its recent appearance, NightSpire has already gained attention for its aggressive tactics and well-structured operations.

7. Data Leaks

Technical and Vocational Training Corporation, Saudi Arabia Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: Education and Training
  • Target Geography: Saudi Arabia
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed that a threat actor operating under the alias NO8LO has allegedly listed a database for sale on Dark Forums containing personal data of over 338,000 Saudi citizens affiliated with the Technical and Vocational Training Corporation (TVTC, tvtc[.]gov[.]sa). The leaked data is reportedly in CSV format and includes plaintext passwords, national ID numbers, contact information, and detailed personal identifiers.

The actor claims the data was obtained directly from TVTC systems and is untouched. It is being marketed for phishing, identity exploitation, and reconnaissance purposes. Multiple institutional categories are affected, including technical colleges, industrial institutes, and prison training centers.

Source: Underground Forums

PT Pasifik Satelit Nusantara (PSN) Indonesia’s Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: Telecommunication
  • Target Geography: Indonesia
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed a data sale related to PT Pasifik Satelit Nusantara (PSN) (https[:]//www[.]psn[.]co[.]id/) in an underground forum. PT Pasifik Satelit Nusantara (PSN is a pioneer in satellite communication services across Southeast Asia. PSN drives major satellite projects supporting telecommunications, internet, and critical connectivity for governments, corporations, and military applications. The data sale has been traced back to a threat actor known as “Sentap.”

Dataset Details:
This comprehensive package contains classified SNL N5 project documents and Cikarang site operational data, covering multiple facets of the program. The dataset includes:

  • Boeing Documents: Technical and operational reports for the Boeing 702BL satellite, including Recommended Operating Procedures (ROPs), Electrical Power System (EPS) test data with battery voltage metrics, and propulsion subsystem tests detailing thruster performance and interfaces.
  • SpaceX Documents: Monthly project reports, including launch schedules, satellite mass, dynamic environment analysis for Falcon 9 launches, and Electromagnetic Compatibility (EMI/EMC) analysis with radiated emission data.
  • Kratos Documents: Site Acceptance Test (SAT) reports for the Koupang TT&C ground system, detailing technical specifications, transmission frequencies, and safety alerts.
  • Cikarang Site Data: C-band antenna system (CKC013) schematics with operational frequencies, output power, and tracking specifications, plus equipment status and potential vulnerabilities.
  • Spectroscopy Data: Intermediate Frequency (IF) test reports with specific frequencies, average power, and equipment settings, ideal for RF signal chain analysis and vulnerability identification.
  • PSN VI Satellite Anomalies: Anomaly reports on attitude and power issues, including detailed data on attitude errors and momentum.
  • Server Monitoring Data: IT infrastructure data, valuable for cyberattacks or vulnerability identification.

These documents are governed by U.S. export control laws (EAR, TA-1360-21A) and the intellectual property rights of Boeing, SpaceX, and Kratos, amplifying their strategic value.

Pricing and Delivery:
Given the dataset’s 92GB volume (zipped), confidentiality, and strategic significance, the pricing is as follows:

  • Price: 10 Bitcoin (BTC) or equivalent in Monero (XMR)
  • Payment Method: Bitcoin or Monero only
  • Delivery: Download link provided upon payment confirmation

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously scouring for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to illicitly gain access and steal valuable data. Subsequently, the pilfered data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The threat actor known as “Sentap” has been implicated in several data breaches, with credible reports indicating involvement in unauthorized access and the attempted sale of stolen data on dark web forums. The emergence and activity of “Sentap” highlight the ongoing and evolving risks posed by cyber threats originating from the dark web. In light of these developments, it is imperative for organizations to maintain a robust cybersecurity posture, including continuous monitoring, threat intelligence integration, and proactive defense strategies to safeguard critical data assets.

Recommendations: Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related attacks.
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA Research team observed a data leak related to REACTIS Group(https[:]//www[.]reactis[.]fr/) in an underground forum. The REACTIS Group is a leading Digital Services Company (ESN) with over two decades of expertise in digital transformation, aerospace, FinTech, and social protection. Collaborating with industry giants like Airbus Helicopters, Ingenico, Worldline, Sopra Steria, L’Oréal, and TF1. REACTIS operates in France, Canada, Germany, Italy, and the United States.

The 109 GB of data extracted from Reactis[.]fr’s internal servers is a treasure trove of sensitive information, including project documents, financial records, commercial contracts, quality documents, and HR data. This dataset is unparalleled for competitive analysis, reverse engineering, or strategic exploitation in technology, aerospace, and FinTech markets. The data sale has been traced back to a threat actor known as “Sentap.”

Technical Details of the Data: 109 GB dataset extracted from Reactis [.]fr’s internal servers includes:

AGYLIS:

  • IT project documents with companies like Ingenico, Worldline, and Airbus.
  • Commercial contracts with Sopra Steria and NEOS SDI.
  • Financial data, including cash flow and invoices.

SMQ_Reactis:

  • Quality Management System documents compliant with EN9100 and ISO9001 standards.
  • Customer satisfaction reports (ESEMF) and security plans for Airbus.

Financier:

  • Details of large-scale loans from HSBC and emergency CUEC loans for AGYLIS CANADA.
  • Payment invoices and insurance records.

RESSOURCES HUMAINES:

  • COVID-19 protocols, remote work policies, and Canadian tax forms (T4).

AGYLIS MONTREAL:

  • Financial and operational data for AGYLIS CANADA, showcasing profitable performance.

Contrat BU Industrie:

  • Subcontracting agreements with NEOS SDI and TELA IT Consulting.

BACKUP, DATA, DISTRIB:

  • Unencrypted internal server backups.
  • Technical project data and documentation.

Pricing Details: Given the 109 GB volume, diversity, and sensitivity of the data, the proposed pricing is as follows:

  • Base Price: 0.5 Bitcoin (BTC) or equivalent in Monero (XMR).
  • Payment Method: Secure transaction via Escrow on the forum or anonymous wallets.
  • Discount: 10% off for purchases completed within 48 hours.

Source: Underground Forums

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Delay a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies and continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security control such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

Geography-Wise Graph

Industry-Wise Graph

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.