Self Assessment

Weekly Intelligence Report – 23 May 2025

Published On : 2025-05-22
Share :
Weekly Intelligence Report – 23 May 2025

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware.
Target Technologies: Windows.

Introduction
CYFIRMA Research and Advisory Team has found RALEIGHRAD Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

RALEIGHRAD Ransomware.
RALEIGHRAD is a newly identified ransomware strain that, upon execution, encrypts victim files and appends the “.RALEIGHRAD” extension.

Additionally, RALEIGHRAD generates a ransom note, “RESTORE_FILES_INFO.txt”.

Screenshot of files encrypted by ransomware (Source: Surface Web)

A ransom note is dropped, informing the victim that a range of sensitive data— including contracts, customer records, financial documents, HR files, and databases— has been exfiltrated.

Victims are warned that the stolen information will be published if contact is not initiated within three days. The attackers instruct victims to communicate via the qTOX messaging app to begin ransom negotiations. In exchange for payment, the threat actors claim they will provide a decryption tool and delete the exfiltrated data from their servers.

The appearance of RALEIGHRAD’s text file (“RESTORE_FILES_INFO.txt”):(Source: Surface Web)

Following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Execution T1047 Windows Management Instrumentation
Execution T1053 Scheduled Task/Job
Execution T1059 Command and Scripting Interpreter
Execution T1106 Native API
Execution T1569.002 System Services: Service Execution
Persistence T1053 Scheduled Task/Job
Persistence T1112 Modify Registry
Persistence T1543.003 Create or Modify System Process: Windows Service
Persistence T1574 Hijack Execution Flow
Privilege Escalation T1053 Scheduled Task/Job
Privilege Escalation T1055 Process Injection
Privilege Escalation T1543.003 Create or Modify System Process: Windows Service
Privilege Escalation T1574 Hijack Execution Flow
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1055 Process Injection
Defense Evasion T1112 Modify Registry
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1222 File and Directory Permissions Modification
Defense Evasion T1497.001 Virtualization/Sandbox Evasion: System Checks
Defense Evasion T1562.001 Impair Defenses: Disable or Modify Tools
Defense Evasion T1564.001 Hide Artifacts: Hidden Files and Directories
Defense Evasion T1574 Hijack Execution Flow
Defense Evasion T1620 Reflective Code Loading
Discovery T1012 Query Registry
Discovery T1033 System Owner/User Discovery
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1087 Account Discovery
Discovery T1135 Network Share Discovery
Discovery T1497.001 Virtualization/Sandbox Evasion: System Checks
Discovery T1518.001 Software Discovery: Security Software Discovery
Command and Control T1071 Application Layer Protocol
Command and Control T1095 Non-Application Layer Protocol
Command and Control T1105 Ingress Tool Transfer
Impact T1486 Data Encrypted for impact

Relevancy and Insights:

  • This ransomware specifically targets the widely used Windows Operating System, which is prevalent across numerous industries and organizations.
  • Detect-Debug-Environment: Debugging environments are used by developers to analyze and troubleshoot software. The ransomware uses this technique to determine whether it is operating in a debug environment. This feature aids the ransomware in avoiding analysis and detection attempts.
  • Calls to WMI: The ransomware is making calls to the Windows Management Instrumentation (WMI) framework. WMI is a powerful tool used by many legitimate applications and services, but it can also be exploited by malware to execute commands, collect information, or perform system modifications.
  • Ransomware utilizes extended sleep intervals to evade detection by security software, enabling it to operate stealthily and increasing the likelihood of completing file encryption before being identified.

ETLM Assessment:
Cyfirma’s assessment with available data suggests that RALEIGHRAD is likely to evolve into a persistent threat targeting enterprise environments reliant on Windows systems. Its use of qTOX for anonymity, WMI abuse, and sandbox evasion tactics reflects increasing sophistication. Future variants may introduce enhanced lateral movement and data exfiltration features. Given its data-leak extortion model and stealthy execution, RALEIGHRAD may transition into a ransomware-as-a-service (RaaS) model, placing organizations globally at heightened risk of data breaches and critical service disruptions.

Sigma rule:
title: Raccine Uninstall tags:
– attack.defense-evasion
– attack.t1562.001 logsource:
category: process_creation product: windows
detection: selection1:
CommandLine|contains|all:
– ‘taskkill ‘
– ‘RaccineSettings.exe’ selection2:
CommandLine|contains|all:
– ‘reg.exe’
– ‘delete’
– ‘Raccine Tray’ selection3:
CommandLine|contains|all:
– ‘schtasks’
– ‘/DELETE’
– ‘Raccine Rules Updater’ condition: 1 of selection*
falsepositives:
– Legitimate deinstallation by administrative staff level: high
(Source: Surface Web)

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.

STRATEGIC RECOMMENDATION

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATION

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATION

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Trending Malware of the Week

Type: Information Stealer | Objectives: Data Theft, Data Exfiltration | Target Technologies: Windows OS, Browsers, Email Clients, FTP Clients | Target Industries: State and Local Government, Federal Government, High Tech, Finance, Manufacturing, Media and Entertainment | Target Geographies: United States, Brazil, Peru, the Netherlands, Turkey, Hungary

CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malware that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week “DarkCloud Stealer” is trending.

DarkCloud Stealer
Researchers uncovered a wave of attacks linked to DarkCloud Stealer, a threat that has been quietly promoted on underground forums since early 2023. While the stealer has cast a wide net across different sectors, government organizations appear to be its primary target. In the latest campaign, attackers used AutoIt scripting and file-sharing servers to bypass security tools and deploy the malware. These new AutoIt-based DarkCloud samples have been observed across various affected industries, including state and local government, federal government, high tech, finance, manufacturing, and media and entertainment. Geographically, the campaign has impacted victims in the United States, Brazil, Peru, the Netherlands, Turkey, and Hungary. DarkCloud’s layered structure and stealthy behavior make it particularly hard to spot, while its core strength lies in stealing sensitive information and establishing communication with attackers in the background.

Attack Method
Researchers have observed multiple variations of attack chains used to deliver DarkCloud Stealer, all following a similar pattern. These attacks typically begin with a phishing email, which either contains a compressed file (RAR archive) or a PDF. In some cases, the PDF tricks the victim into downloading a fake software update from a file- sharing site. Once opened, the RAR archive includes a hidden executable file designed to run in several steps. This file uses scripting to unpack and activate the final payload— DarkCloud Stealer—while keeping its actions concealed. The layered approach helps the malware evade detection and increases its chances of success, posing a significant threat to its targets.

Fig: Infection chain of the new DarkCloud Stealer variant.

Technical Analysis
The attack begins with a phishing email containing a PDF crafted to mislead the victim. When opened, the PDF shows a fake pop-up warning that Adobe Flash
Player is outdated. If the victim clicks the “Download Flash” button, it redirects to a file-sharing site that delivers a compressed RAR archive. Inside the archive is an AutoIt compiled executable—a disguised program that quietly launches the next stage of the malware.

Fig: Phishing PDF file

Fig: Downloaded RAR file and extracted sample.

A key update in the latest variant of DarkCloud Stealer is its use of AutoIt-compiled executables to help deliver the malware. AutoIt is a legitimate tool often used for automating tasks on Windows, but in this case, attackers have cleverly repurposed it to hide their malicious activity. The AutoIt file doesn’t work alone—it’s bundled with two additional encrypted components, one acting as a shellcode and the other as a hidden payload.

Once activated, the script quietly unpacks and runs hidden code in the background. This multi-layered process includes decoding strings, injecting code into memory, and executing the final malware without raising suspicion. Interestingly, researchers noted signs that the attackers may be experimenting with more advanced obfuscation techniques, suggesting that future versions of the malware could be even harder to detect.

The final stage of the attack reveals the true purpose of DarkCloud Stealer. Identified by a clear signature within the code, this malware is built to quietly gather sensitive information from infected systems. It collects a wide range of data, including device names, user details, screenshots, saved browser passwords, email credentials, and contact lists—making it a powerful tool for stealing personal and workplace data.

Data Theft with Evasion and Persistence Tactics
The final DarkCloud payload is designed to harvest a wide range of sensitive data from infected systems. It targets saved usernames and passwords from browsers like Chrome and Firefox and also digs into email client profiles to extract login details. All this stolen information is bundled into a single file, ready to be sent back to the attackers’ server. Beyond login credentials, DarkCloud also looks for stored credit card data from popular browsers and retrieves FTP and SMTP credentials from related applications.

To avoid detection, the malware is equipped with several anti-analysis tricks. It checks for the presence of common monitoring tools like Wireshark, Process Monitor, and virtual environments such as VMware. It also uses junk code and fake API calls to confuse analysts. Additionally, DarkCloud tries to determine the infected device’s public IP address using online tools, likely to identify the victim’s location. To maintain its presence on the system, it creates a registry entry that ensures the malware runs every time the machine starts.

INSIGHTS

  • DarkCloud Stealer has emerged as a significant threat in the cyber landscape, particularly due to its sophisticated evasion techniques and targeted attack strategies. Initially identified in 2022, this malware has evolved to employ AutoIt scripting, allowing it to bypass traditional security measures effectively. Its primary mode of distribution is through phishing emails, often masquerading as legitimate communications to deceive recipients into executing the malicious payload. The malware’s design enables it to extract sensitive information, such as login credentials and financial data, from infected systems, posing a substantial risk to both individuals and organizations.
  • One of the distinguishing features of DarkCloud Stealer is its ability to adapt and target specific sectors. Recent campaigns have shown a focus on industries like finance, manufacturing, and government, indicating a strategic approach to maximize impact. The campaign demonstrates a sophisticated use of social engineering by disguising the malware’s delivery as routine software updates. By leveraging familiar and seemingly legitimate processes, attackers increase the likelihood of victim interaction while maintaining a low profile. This level of customization and targeting underscores the threat actors’ commitment to refining their methods to achieve their objectives.
  • Furthermore, DarkCloud Stealer’s infrastructure demonstrates a high level of operational security. The malware communicates with command-and-control servers to exfiltrate collected data, often using encrypted channels to avoid detection. Its deployment of multi-stage payloads and obfuscated code complicates analysis and remediation efforts. These characteristics highlight the importance of continuous monitoring and advanced threat detection capabilities to identify and mitigate such sophisticated threats effectively.

ETLM ASSESSMENT
From the ETLM perspective, CYFIRMA anticipates that DarkCloud Stealer is poised to become an even more disruptive threat as it advances, with future campaigns likely to feature stronger evasion tactics and broader targeting across sectors and geographies. As this stealer evolves, it may inspire the development of similar modular threats that are harder to detect and quicker to deploy, particularly through trusted platforms like file- sharing services. Its success could also fuel a growing underground market for plug-and- play malware, making it easier for low-skilled actors to launch sophisticated attacks. This trend points to an era where cybercrime becomes more accessible, scalable, and unpredictable posing a growing concern not just for organizations and individuals, but for digital ecosystems as a whole.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

Recommendations:

STRATEGIC:

  • Deploy an Extended Detection and Response (XDR) solution as part of the organization’s layered security strategy that provides detection/prevention for malware and malicious activities that do not rely on signature-based detection methods.
  • Maintain an up-to-date inventory of all active software used within the organization and perform regular self-audit of workstations, servers, laptops, mobile devices to identify unauthorized/ restricted software.
  • Configure organization’s intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defence mechanisms in place to alert on — and upon review, consider blocking connection attempts to and from — the external IP addresses and domains listed in the appendix.

MANAGEMENT:

  • Security Awareness training should be mandated for all company employees. The training should ensure that employees:
  • Avoid downloading and executing files from unverified sources.
  • Incorporate a written software policy that educates employees on good practices in relation to software and potential implications of downloading and using restricted software.
  • Move beyond the traditional model of security awareness towards Improved Simulation and training exercises that mimic real attack scenarios, account for behaviors that lead to a compromise, and are measured against real attacks the organization receives.

TACTICAL RECOMMENDATIONS

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Exert caution when opening email attachments or clicking on embedded links supplied via email communications.
  • Enforce policies to validate third-party software before installation.
  • Use multi-factor authentication (MFA) to mitigate credential theft and prevent attacker access. Keep MFA always-on for privileged accounts and apply risk-based MFA for normal accounts.

CYFIRMA’S WEEKLY INSIGHTS

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Qilin Ransomware, BlackLock Ransomware | Malware – DarkCloud Stealer
  • Qilin Ransomware– One of the ransomware groups.
  • BlackLock Ransomware – One of the ransomware groups.
    Please refer to the trending malware advisory for details on the following:
  • Malware – DarkCloud Stealer
    Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

SAP NetWeaver Under Fire: Chinese Threat Actors Launch Global Attacks via CVE-2025- 31324 (CVSS 9.8)

  • Threat Actor: UNC5221, UNC5174, CL-STA-0048
  • Attack Type: Exploitation of CVE-2025-31324 (CVSS 9.8)
  • Objective: Espionage
  • Target Technology: SAP NetWeaver Visual Composer, AWS S3, VMware ESXi, Linux systems
  • Target Geography: United Kingdom, United States, Saudi Arabia
  • Target Industries: Oil & Gas, Energy, Utilities, Manufacturing, Healthcare, Government, and Finance
  • Business Impact: Unauthorized Access, Data Exfiltration, Operational Disruption

Summary:
Researchers have discovered that several China-linked threat actor groups— including UNC5221, UNC5174, and CL-STA-0048—have carried out coordinated cyber operations targeting a critical vulnerability, CVE-2025-31324 (CVSS 9.8), in SAP NetWeaver Visual Composer. This flaw, an unauthenticated file upload vulnerability, enables remote code execution, providing attackers with a powerful foothold into compromised systems.

Attackers leveraged mass scanning tools to identify vulnerable systems and uploaded webshells for persistent access. The campaign, focused on critical infrastructure, used an attacker-controlled server with an exposed directory to host reconnaissance results, listing over 1,800 SAP NetWeaver targets and confirming 581 successful compromises.

Post-exploitation activity involved the strategic deployment of two complementary webshells to maintain robust and resilient access.

The first, coreasp.js, was a feature-rich, encrypted webshell leveraging AES/ECB encryption with hardcoded keys(693e1b581ad84b87) and Java reflection for in- memory execution, allowing attackers to stealthily maintain persistent control while avoiding file-based detection.

The second, forwardsap.jsp, acted as a lightweight, fail-safe shell, enabling direct command execution via query parameter named cmdhghgghhdd—ideal for quickly re-establishing access if the primary shell was discovered or disabled. By combining both, attackers ensured operational redundancy: coreasp.js for stealth and extended control, and forwardsap.jsp for accessibility and resilience. Both were uploaded via the vulnerable /developmentserver/metadatauploader endpoint, granting attackers initial footholds and long-term backdoor access into SAP environments.

Compromised targets spanned essential sectors including energy, healthcare, and government services across the UK, the US, and Saudi Arabia. Attackers utilized the gained access for deep network reconnaissance, issuing thousands of remote commands aimed at identifying adjacent systems, internal IPs, and backup metadata. Techniques included using arp, parsing /etc/hosts, and probing for VMware ESXi-connected workloads. Unsegmented networks further increased the risk of lateral movement.

One actor used a reverse shell over TCP port 10443 and DNS beaconing to confirm exploitation success. Additional malware delivery chains were observed, including KrustyLoader—a Rust-based loader fetched from Amazon S3 buckets, designed to execute Sliver backdoors through encrypted, in-memory execution—and SNOWLIGHT, a loader that retrieves and executes a VShell RAT payload using memfd-based fileless techniques. Both malware strains performed environmental and anti-debugging checks, with staging and obfuscation routines designed for evasion and stealth.

The attackers leveraged widely-used cloud services and exposed enterprise systems to disguise malicious activity and evade detection. These operations are part of a broader strategy focused on achieving long-term, persistent access to critical infrastructure, with objectives likely tied to cyber espionage or potential disruption. SAP environments served as key entry points, enabling lateral movement into cloud identity systems and industrial control networks.

We detail the specific activities attributed:

  • CL-STA-0048: Established reverse shell access via C2 server 43.247.135[.]53 and used DNS beaconing to confirm compromises.
  • UNC5221: Deployed KrustyLoader malware via AWS S3 buckets, leveraging Rust-based payloads for in-memory execution of Sliver C2.
  • UNC5174: Utilized SNOWLIGHT to deliver VShell RAT and GOREVERSE backdoor, adapting payloads to the victim’s OS for stealth.

Relevancy & Insights:
The threat actor behind this attack has previously employed sophisticated tactics, often leveraging zero-day vulnerabilities to infiltrate critical infrastructure. In earlier incidents, they used remote code execution (RCE) vulnerabilities to gain unauthorized access and maintain persistence within target systems, indicating a clear focus on espionage. The current attack, however, saw the exploitation of CVE-2025-31324 (CVSS 9.8), a remote code execution vulnerability in SAP NetWeaver Visual Composer, underscoring the actor’s advanced capabilities in identifying and exploiting high-impact flaws in widely used enterprise software.

Their main objective remains espionage, as evidenced by their history of targeting government organizations, financial sectors, and key industries in strategic geographies. Given the targeted nature of these attacks, industries involved in critical infrastructure, such as energy and telecommunications, should be particularly cautious.

ETLM Assessment:
In recent months, threat activity linked to China-nexus state-backed actors has escalated, with a notable campaign exploiting a critical vulnerability (CVE-2025- 31324) (CVSS 9.8) —a critical unauthenticated file upload vulnerability in SAP NetWeaver Visual Composer. This campaign is attributed to groups resembling UNC5221, UNC5174, and CL-STA-0048, all known for cyber-espionage operations aligned with Chinese strategic interests. These actors share overlapping tactics, infrastructure, and malware, pointing to coordination or shared tooling among units likely affiliated with state intelligence.

The attackers focused on high-value targets across the United Kingdom, the United States, and Saudi Arabia, with victim organizations in natural gas distribution, water utilities, oil and gas exploration, medical manufacturing, and governmental financial institutions. The primary attack surface was SAP NetWeaver, often poorly segmented from internal networks and connected to critical systems like VMware ESXi and cloud identities.

Post-compromise, the threat actors deployed encrypted webshells, then used malware loaders—KrustyLoader and SNOWLIGHT—to deliver Sliver and VShell implants. These techniques align with prior campaigns exploiting Ivanti and ConnectWise products. The use of in-memory malware, DNS beaconing, and reverse shells highlights their focus on stealth and persistence. Future operations will likely target similar enterprise platforms to sustain long-term espionage and strategic positioning.

Recommendations:

Strategic Recommendations:

  • Integrate Threat Intelligence: Regularly incorporate up-to-date threat intelligence and IoCs into security tools to detect APTs.
  • Focus on Vulnerability Management: Prioritize addressing critical vulnerabilities (e.g., CVE-2025-31324) and ensure timely patching.
  • Establish Long-Term Cyber Defense Strategy: Regularly review and update the security strategy to stay ahead of evolving threats.

Tactical Recommendations:

  • Utilize IoCs for Detection: Integrate shared IoCs into SOC systems for faster threat detection and containment.
  • Automate Detection Rules: Set up automated detection rules for high-risk vulnerabilities to prevent escalation.
  • Proactive Threat Hunting: Conduct regular threat-hunting exercises to detect lateral movement and unusual access patterns.

Operational Recommendations:

  • 24/7 Monitoring: Maintain continuous threat monitoring for early detection of suspicious activities.
  • Test Incident Response: Conduct regular incident response drills based on known attack techniques.
  • Staff Training: Regularly train teams on emerging threats, such as phishing and social engineering tactics.

MITRE FRAMEWORK

Tactic ID Technique
Initial Access T1190 Exploit Public-Facing Application
Execution T1059.007 Command and Scripting Interpreter: JavaScript
Execution T1059.006 Command and Scripting Interpreter: Python
Execution T1203 Exploitation for Client Execution
Execution T1129 Shared Modules
Persistence T1543.002 Create or Modify System Process: Systemd Service
Privilege Escalation T1547.006 Boot or Logon Autostart Execution: Kernel Modules and Extensions
Privilege Escalation T1068 Exploitation for Privilege Escalation
Privilege Escalation T1055 Process Injection
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1027 Obfuscated Files or Information
Credential Access T1003.008 OS Credential Dumping: /etc/passwd and /etc/shadow
Discovery T1016 System Network Configuration Discovery
Discovery T1087 Account Discovery
Discovery T1083 File and Directory Discovery
Discovery T1010 Application Window Discovery
Discovery T1580 Cloud Infrastructure Discovery
Command and Control T1105 Ingress Tool Transfer
Command and Control T1071 Application Layer Protocol
Exfiltration T1041 Exfiltration Over C2 Channel

IOCs:
Kindly refer to the IOCs (Indicators of Compromise) Section to exercise controls on your security systems.

3. Major Geopolitical Developments in Cybersecurity

A Major US steel manufacturer targeted by cyberattack
Nucor, a major steel manufacturer based in North Carolina and responsible for producing roughly a quarter of all raw steel in the U.S., has reported a cyberattack involving “unauthorized third-party access to certain information technology systems.” As a precaution, the company took some systems offline, resulting in production disruptions at several facilities. Nucor stated that it is “currently in the process of restarting the affected operations” and is “actively investigating the incident with the assistance of leading external cybersecurity experts.”

ETLM Assessment:
As CYFIRMA has warned in a recent report, U.S. President Trump’s tariffs carry significant geopolitical consequences. By tearing up trade agreements, the U.S. risks undermining its credibility as a global economic leader and straining alliances. Retaliatory tariffs from trading partners could further reduce U.S. exports, hitting manufacturers hard. In cyberspace, heightened tensions may increase the risk of cyberattacks, as trade wars spill into digital domains. The industries the U.S. government is trying to cushion off – where steel producers are the major example – can find themselves in the crosshairs of foreign threat actors.

Russian hackers targeting foreign governments and defense base
Researchers have uncovered a Russian cyberespionage campaign that leverages cross-site scripting (XSS) vulnerabilities in popular webmail platforms such as Roundcube, Horde, MDaemon, and Zimbra. One of these vulnerabilities, CVE-2024- 11182 in MDaemon, was exploited as a zero-day before being patched. The campaign is attributed to APT28, also known as Fancy Bear, a threat group linked to Russia’s military intelligence GRU.

The primary targets were governmental and defense organizations in Eastern Europe, though the researchers also observed attacks against government entities in Africa, Europe, and South America. The malware deployed in the campaign was designed to steal webmail credentials and exfiltrate contacts and email messages from compromised mailboxes.

ETLM Assessment:
The campaign bears all the hallmarks of a state-driven espionage campaign with a goal of providing the Russian government and defense establishment with strategic intelligence and possibly also intellectual property. There are likely many similar campaigns ongoing at the same time, primarily attacking the West and West-aligned governments and organizations around the globe.

4. Rise in Malware/Ransomware and Phishing

The Qilin Ransomware Impacts CMIC CMO Co., Ltd.

  • Attack Type: Ransomware
  • Target Industry: Healthcare and pharmaceutical Manufacturing
  • Target Geography: Japan
  • Ransomware: Qilin Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Japan; CMIC CMO Co Ltd (www[.]cmic-cmo[.]com), was compromised by Qilin Ransomware. CMIC CMO Co., Ltd. is a subsidiary of the CMIC Group, a leading healthcare and pharmaceutical services provider headquartered in Tokyo, Japan. CMIC CMO specializes in Contract Development and Manufacturing Organization (CDMO) services, supporting pharmaceutical companies through various stages of drug development and manufacturing. The compromised data consists of confidential and sensitive information related to the organization. The total size of the compromised data is approximately 300 GB.

Relevancy & Insights:

  • Qilin (also known as Agenda) is a Ransomware-as-a-Service (RaaS) group first observed in July 2022. It employs a double extortion method, encrypting victims’ data and exfiltrating it, threatening to leak it on their data leak site (DLS) if the ransom is not paid.
  • In recent campaigns, the Qilin Ransomware group has been observed using a new, heavily obfuscated .NET-based loader known as NETXLOADER to covertly deploy payloads such as SmokeLoader, significantly complicating both detection and analysis.
  • Recently, we observed that the North Korean threat group Moonstone Sleet is using Qilin ransomware in limited attacks, marking the first known use of Qilin by a nation-state actor.
  • The Qilin Ransomware group primarily targets countries such as the United States of America, Canada, France, Spain, and the United Kingdom.
  • The Qilin Ransomware group primarily targets industries, including Health Care Providers, Business Support Services, Heavy Construction, Manufacturing, and Industrial Machinery.
  • Based on the Qilin Ransomware victims list from 1st January 2024 to 21st May 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Qilin Ransomware from 1st January 2024 to 21st May 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Qilin ransomware poses a significant threat to organizations of all sizes. Its evolving tactics, including double extortion (data encryption and leak threats), cross-platform capabilities (Windows and Linux, including VMware ESXi), and focus on speed and evasion, make it a particularly dangerous actor.

The BlackLock Ransomware Impacts TOHO CO., LTD.

  • Attack Type: Ransomware
  • Target Industry: Culture and Entertainment
  • Target Geography: Japan
  • Ransomware: BlackLock Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Japan, TOHO CO., LTD.(https[:]//www[.]toho[.]co[.]jp/), was compromised by BlackLock Ransomware. TOHO CO., Ltd. is a major Japanese entertainment company primarily engaged in film production, distribution, and theatrical stage productions. The compromised data consists of confidential and sensitive information related to the organization.

Source: Dark Web

Relevancy & Insights:

  • BlackLock Ransomware, also known as El Dorado or Eldorado, is a ransomware-as- a-service (RaaS) group that first appeared in March 2024. It quickly rose to prominence due to its rapid increase in attacks and sophisticated operational tactics.
  • BlackLock Ransomware employs the standard double extortion technique,
    encrypting victims’ data while simultaneously stealing sensitive information and threatening to leak it publicly. The ransomware targets Windows, VMware ESXi, and Linux environments, although the Linux variant is less feature rich.

  • The BlackLock Ransomware group primarily targets countries such as the United States of America, Canada, Italy, the United Arab Emirates, and Japan.
  • The BlackLock Ransomware group primarily targets industries such as Business Support Services, Retail, Automobiles, Real Estate, and Government.
  • Based on the BlackLock Ransomware victims list from 1st March 2024 to 21st May 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries, most affected by the BlackLock Ransomware from 1st March 2024 to 21st May 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, BlackLock ransomware represents a rapidly growing and sophisticated threat in the ransomware ecosystem, distinguished by custom malware development, aggressive affiliate recruitment, and advanced operational security measures. Despite setbacks from security researchers exploiting vulnerabilities in their infrastructure, BlackLock continues to pose a significant risk to organizations worldwide across multiple sectors.

5. Vulnerabilities and Exploits

Vulnerability in Siemens OZW Web Servers

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Hardware solutions / Security hardware appliances
  • Vulnerability: CVE-2025-26389
  • CVSS Base Score: 10.0 Source
  • Vulnerability Type: OS Command Injection
  • Summary: The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

Relevancy & Insights: The vulnerability exists due to improper input validation in the exportDiagramPage endpoint. A remote unauthenticated attacker can pass specially crafted data to the application and execute arbitrary OS commands on the target system.

Impact: Successful exploitation of this vulnerability may result in complete compromise of the vulnerable system.

Affected Products: https[:]//cert-portal[.]siemens[.]com/productcert/html/ssa- 047424.html

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies, due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerability in Siemens OZW Web Servers can pose significant threats to user privacy and security. This can impact various industries globally, including manufacturing, energy, and building automation. Ensuring the security of Siemens OZW Web Servers is crucial for maintaining the integrity and protection of users’ data worldwide. Therefore, addressing these vulnerabilities is essential to safeguarding building control systems, energy monitoring, and HVAC management processes across different geographic regions and sectors.

6. Latest Cyber-Attacks, Incidents, and Breaches

Everest Ransomware attacked and published the data of Khidmah

  • Threat Actor: Everest Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Real Estate
  • Target Geography: United Arab Emirates (UAE)
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that Everest Ransomware attacked and published the data of Khidmah (https[:]//www[.]Khidmah[.]com/) on its dark web website. Khidmah is a comprehensive real estate services company based in Abu Dhabi, United Arab Emirates. The company provides a wide range of solutions, including property management, leasing and sales, facilities management, home maintenance, cleaning, landscaping, and pool maintenance. With its customer-focused approach, Khidmah caters to residential, retail, and commercial properties. The data leak resulting from the ransomware attack includes employees’ personal information, along with internal and confidential data. A total of 3,300 personal records have been compromised. The exposed data consists of User ID, Employee ID, First Name, Last Name, Middle Name, Gender, Email Address, Manager, Human Capital details, Department, Job Code, Division, Location, Time Zone, and other sensitive and confidential information.

Source: Dark Web

Relevancy & Insights:

  • The Everest Ransomware group is known for double extortion tactics, exfiltrating sensitive data, and threatening public leaks if ransom demands are not met.
  • The Everest Ransomware group primarily targets industries, including Healthcare, Legal Services, Accounting, Financial Services, and Industrial Machinery.

ETLM Assessment:
According to CYFIRMA’s assessment, Everest Ransomware remains a persistent and evolving threat in 2025. Despite the takedown of its leak site, the group continues to target new sectors, expand its operations as an initial access broker, and leverage data leak extortion as its primary tactic. Organizations should remain vigilant, strengthen access controls, monitor for lateral movement and Cobalt Strike activity, and ensure robust incident response capabilities to defend against Everest’s ongoing campaigns.

7. Data Leaks

IM Co., Ltd Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: Manufacturing
  • Target Geography: Japan
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed a data leak related to IM Co., Ltd. (https[:]//www[.]im-eng[.]jp/) in an underground forum. IM Co., Ltd is a Japanese manufacturing company specializing in the design and production of hydraulic cylinders and automotive components. Its service offerings include deep-hole machining, end processing, welding, and assembly. The leaked data includes confidential and sensitive information pertaining to the organization, with a total volume of approximately 1.88 GB. The breach has been attributed to a threat actor operating under the alias “BLF0ty.”

Source: Underground Forums

MALAYSIA AIRPORTS HOLDINGS BERHAD Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: Aviation and Transportation Infrastructure
  • Target Geography: Malaysia
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed a data sale related to MALAYSIA AIRPORTS HOLDINGS BERHAD (https[:]//www[.]malaysiaairports[.]com[.]my/) in an underground forum. Malaysia Airports Holdings Berhad (MAHB) is the primary operator of airports in Malaysia. MAHB oversees the management, operation, maintenance, and development of airports across the country and has expanded its operations internationally. The threat actor known as “Dedale” breached and encrypted the network of Malaysia Airports Holdings Berhad (MAHB), sparing only the flight control systems. Over 2TB of data was exfiltrated in what appears to have been a sophisticated cyberattack primarily aimed at extortion. The threat actor has demanded a ransom of $10,000 in exchange for the compromised data.

The leaked data includes a broad array of sensitive and confidential information, such as:

  • Personal information and passport details
  • Confidential Board of Directors (BOD) reports
  • Extracted emails and sensitive internal correspondence
  • Airport security data, including security camera locations, blind spots, and access credentials
  • Incident and vulnerability reports
  • Employee personal and financial records, including personal loans
  • Flight operations and audit data
  • Network scans and cybersecurity assessments
  • Business development plans, NDAs, and contract documents
  • Tender information
  • Files stored in OneDrive
  • Payment records and tax data
  • Airport incident logs and CCTV footage
  • Other undisclosed sensitive materials

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously scouring for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to illicitly gain access and steal valuable data. Subsequently, the pilfered data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The threat actor known as “Dedale” has been linked to multiple data breaches, with credible reports suggesting involvement in unauthorized system intrusions and attempts to sell stolen data on dark web forums. The emergence and ongoing activity of “Dedale” underscore the persistent and evolving nature of cyber threats originating from the dark web. These developments reinforce the urgent need for organizations to strengthen their cybersecurity posture through continuous monitoring, integration of threat intelligence, and proactive defense strategies to protect critical data assets.

Recommendations: Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related attacks.
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA Research team observed a data sale related to India Steel Expo (https[:]//www[.]indiasteelexpo[.]in/) in an underground forum. The official website indiasteelexpo[.]in serves as the primary portal for India Steel 2025, the 6th International Exhibition and Conference on the steel industry. Jointly organized by the Ministry of Steel, Government of India, and the Federation of Indian Chambers of Commerce and Industry (FICCI), the event took place from April 24 to 26, 2025, at the Bombay Exhibition Centre (NESCO), Mumbai. The database contains a wealth of personal and professional information, making it a valuable asset for various purposes. The database being offered for sale contains the following fields for each record: Fax, City, Email, Phone, State, Title, Mobile Number, Country, Website, Zip Code, Status, Address, Last Name, First Name, Send Count, Company Name, Designation, Random Number, Visitor Number, Registration Date, along with other confidential information. The seller is asking $250 for the complete dataset.

Source: Underground Forums

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Delay a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies and continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security control such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

Geography-Wise Graph

Industry-Wise Graph

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.