Self Assessment

Weekly Intelligence Report – 11 July 2025

Published On : 2025-07-10
Share :
Weekly Intelligence Report – 11 July 2025

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware
Target Technologies: Windows
Target Countries: USA
Target Industry: Finance

Introduction
CYFIRMA Research and Advisory Team has found Sinobi Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

Sinobi Ransomware
Researchers identified a new ransomware variant known as Sinobi, which emerged in late June 2025. This crypto ransomware employs a combination of AES and RSA encryption algorithms to lock victims’ files, appending them with the .SINOBI extension. Upon infection, victims receive a ransom note titled README.txt, instructing them to contact the attackers via a Tor-based chat site to negotiate payment. The note emphasizes that the group is financially motivated, not politically, and offers proof of data decryption and a list of exfiltrated files. Victims are given seven days to initiate communication, with warnings against using third-party recovery tools or rebooting their systems.

Screenshot of files encrypted by ransomware (Source: Surface Web)

The appearance of Sinobi ‘s ransom note (“README.txt “) (Source: Surface Web)

Screenshot of Sinobi ‘s desktop wallpaper (Source: Surface Web)

Following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Initial Access T1133 External Remote Services
Initial Access T1190 Exploit Public-Facing Application
Execution T1059.001 Command and Scripting Interpreter: PowerShell
Execution T1059.003 Command and Scripting Interpreter: Windows Command Shell
Execution T1203 Exploitation for Client Execution
Persistence T1543.003 Create or Modify System Process: Windows Service
Privilege Escalation T1055.001 Process Injection: Dynamic-link Library Injection
Privilege Escalation T1134.001 Access Token Manipulation: Token Impersonation/Theft
Privilege Escalation T1543.003 Create or Modify System Process: Windows Service
Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation T1548 Abuse Elevation Control Mechanism
Defense Evasion T1006 Direct Volume Access
Defense Evasion T1027.002 Obfuscated Files or Information: Software Packing
Defense Evasion T1036.005 Masquerading: Match Legitimate Name or Location
Defense Evasion T1070.004 Indicator Removal on Host: File Deletion
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1218.011 Signed Binary Proxy Execution: Rundll32
Defense Evasion T1222 File and Directory Permissions Modification
Defense Evasion T1562.001 Impair Defenses: Disable or Modify Tools
Credential Access T1003 OS Credential Dumping
Credential Access T1552 Unsecured Credentials
Credential Access T1552.001 Unsecured Credentials: Credentials in Files
Discovery T1007 System Service Discovery
Discovery T1012 Query Registry
Discovery T1016 System Network Configuration Discovery
Discovery T1049 System Network Connections Discovery
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1087.002 Account Discovery: Domain Account
Discovery T1120 Peripheral Device Discovery
Discovery T1482 Domain Trust Discovery
Discovery T1518 Software Discovery
Lateral Movement T1021.001 Remote Services: Remote Desktop Protocol
Lateral Movement T1021.002 Remote Services: SMB/Windows Admin Shares
Lateral Movement T1021.003 Remote Services: Distributed Component Object Model
Lateral Movement T1091 Replication Through Removable Media
Command and Control T1071.001 Application Layer Protocol: Web Protocols
Command and Control T1090.002 Proxy: External Proxy
Command and Control T1095 Non-Application Layer Protocol
Command and Control T1572 Protocol Tunneling
Collection T1005 Data from Local System
Collection T1074 Data Staged
Collection T1113 Screen Capture
Collection T1114 Email Collection
Impact T1485 Data Destruction
Impact T1486 Data Encrypted for Impact
Impact T1489 Service Stop

Relevancy and Insights:

  • The ransomware primarily targets Windows OS, which is utilised by enterprise in a variety of industries.
  • Checks the USB bus: This ransomware uses USB bus checking as part of its infection strategy to identify connected USB devices such as flash drives or external storage. By scanning the USB bus, the ransomware can attempt to spread to other systems via removable media, locate additional files to encrypt, or evade detection by checking for the presence or absence of typical USB devices. This behavior is a common tactic used by malware to enhance its reach and impact.
  • This ransomware accessing the Windows Credential Manager to extract stored credentials, including usernames and passwords saved by the user or system. Suspicious access to the credentials history is a technique often used during the credential access phase, where the ransomware attempts to gather authentication data to escalate privileges, disable security tools, or facilitate lateral movement within the network.

ETLM Assessment:
CYFIRMA’s assessment indicates that the Sinobi ransomware group is likely to evolve rapidly, with signs pointing toward a possible rebrand or pivot from the now- dormant Lynx group. Given its current tactics and infrastructure, Sinobi may shift to a Ransomware-as-a-Service (RaaS) model, expand into double extortion operations, and broaden its targeting beyond finance to sectors like healthcare and manufacturing. As the group refines its methods, including credential theft and lateral movement via USB, Sinobi is positioned to become a persistent and scalable global threat in the ransomware landscape.

Sigma rule:
title: Suspicious desktop.ini Action
Description: Detects unusual processes accessing desktop.ini, which can be leveraged to alter how Explorer displays a folder’s content (i.e. renaming files) without changing them on disk.
tags:
– attack.persistence
– attack.t1547.009 logsource:
product: windows category: file_event
detection: selection:
TargetFilename|endswith: ‘\desktop.ini’ filter_generic:
Image|startswith:
– ‘C:\Windows\’
– ‘C:\Program Files\’
– ‘C:\Program Files (x86)\’ filter_jetbrains:
Image|endswith: ‘\AppData\Local\JetBrains\Toolbox\bin\7z.exe’ TargetFilename|contains: ‘\JetBrains\apps\’
filter_upgrade:
TargetFilename|startswith: ‘C:\$WINDOWS.~BT\NewOS\’ condition: selection and not 1 of filter_*
falsepositives:
– Operations performed through Windows SCCM or equivalent
– Read only access list authority level: medium
(Source: Surface Web)

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.

STRATEGIC RECOMMENDATION

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATION

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATION

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Trending Malware of the Week

Type: Botnet| Objectives: Operational Disruption | Target Technologies: Linux OS, Routers, DVRs | Target Geography: Global | Exploited Vulnerability: CVE-2024-3721, CVE- 2024-12856

CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malware that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week “RondoDox” is trending.

About Malware RondoDox
The RondoDox botnet has recently emerged as a growing threat, exploiting two critical vulnerabilities – CVE-2024-3721 in TBK DVRs and CVE-2024-12856 in Four-Faith routers—to gain access to targeted devices. Once inside, it uses stealthy tactics to avoid detection, disguising its traffic as that from popular online games or VPN services. RondoDox also ensures it stays active on infected systems through strong persistence methods and can launch disruptive DDoS attacks using multiple protocols. Its ability to blend in, stay hidden, and exploit specific flaws highlights the urgent need for timely security updates and increased awareness around connected device vulnerabilities.

Attack Strategy
RondoDox, which was initially distributed to infect Linux systems running on ARM and MIPS architectures, is now showing signs of expanding its reach to a much wider range of
Linux-based devices. Recent evidence points to a downloader script that can install the malware on systems using various processor types, including older and more common ones like Intel and PowerPC. The script is designed to quietly prepare the system, locate a suitable environment to run the malware, and then erase its tracks to avoid detection.

This shift signals that RondoDox is becoming more adaptable and determined to infect as many systems as possible, making it a growing concern for Linux environments across different hardware platforms.

Technical Analysis
RondoDox demonstrates a multi-layered approach built to remain hidden and maintain control over Linux-based environments for extended periods. Its configuration is hidden through simple obfuscation and decoded during execution, after which it establishes persistence by modifying system files and startup routines. Even if one method fails, others ensure it reactivates on reboot. The malware also neutralizes security and monitoring tools by terminating known analysis processes, helping it operates without interruption.

Interestingly, it drops an unused email reference—likely a relic or placeholder—in a hidden file, hinting at either future use or abandoned features.

Once embedded, RondoDox corrupts essential system files by renaming key executables, effectively disrupting critical functions like firewall management and user control. This tactic not only impairs recovery but also makes systems unstable. After completing its setup, it connects to its control server and can launch powerful distributed denial-of-service (DDoS) attacks through HTTP, UDP, and TCP protocols. To avoid detection, it disguises its traffic using patterns from popular games and services such as Fortnite, Roblox, and Discord. It can even imitate encrypted communication protocols like OpenVPN and WireGuard, blending in with legitimate network behavior. This level of impersonation makes RondoDox difficult to detect and positions it as a technically advanced threat engineered for both persistence and evasion.

Following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Persistence T1543 Create or Modify System Process
Persistence T1543.002 Create or Modify System Process: Systemd Service
Privilege Escalation T1543 Create or Modify System Process
Privilege Escalation T1543.002 Create or Modify System Process: Systemd Service
Defense Evasion T1070 Indicator Removal
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1562 Impair Defenses
Defense Evasion T1562.001 Impair Defenses: Disable or Modify Tools
Discovery T1082 System Information Discovery
Command and Control T1071 Application Layer Protocol
Command and Control T1095 Non-Application Layer Protocol
Command and Control T1573 Encrypted Channel

INSIGHTS

  • RondoDox stands out not just for its technical complexity, but for the way it blends multiple offensive and defensive tactics into a unified operation. Unlike many botnets that rely on loud, brute-force behaviors, RondoDox keeps a low profile through subtle interference with system components and selective disruption of critical files. It gains its initial foothold by exploiting specific vulnerabilities in exposed devices, using these weaknesses as silent entry points rather than relying on broad scans or brute-force access. This allows it to compromise and degrade systems without immediately raising alarms. Its ability to suppress competing processes and analysis tools reflects an intention not just to persist, but to control the environment it’s operating within.
  • Another notable characteristic of RondoDox is its deceptive communication behavior. Rather than using traditional patterns that defenders might quickly flag, it shapes its traffic to resemble data from games, VPNs, and messaging platforms. This use of camouflage allows its command-and-control signals and attack traffic to slip past conventional monitoring tools, making detection far more difficult. The variety of impersonated services, from gaming platforms to encrypted tunneling tools, shows how well the malware understands modern traffic norms and uses that understanding to its advantage.
  • What also sets RondoDox apart is how it targets diversity in device architecture. Starting with ARM and MIPS, it has expanded toward a much wider set of systems, suggesting a broader ambition to maximize infections across different hardware types. This move is supported by a modular delivery strategy that adapts to available system conditions, using script-based deployment to silently install and execute. Its layered methods—from entry to persistence and operation— demonstrate a botnet that’s built with adaptability and endurance in mind, operating under the radar while silently expanding its footprint.

ETLM ASSESSMENT
From the ETLM perspective, CYFIRMA anticipates that as threats like RondoDox continue to evolve, their impact is expected to extend beyond individual systems and into the broader digital infrastructure that supports daily operations across sectors. By exploiting unpatched vulnerabilities in network-facing devices, RondoDox can silently compromise Linux-based systems embedded in critical equipment and edge infrastructure. This covert misuse can lead to unexpected network instability, service disruptions, or become part of coordinated attacks affecting public platforms. For organizations, the presence of silently exploited systems—especially those beyond direct visibility—may lead to prolonged investigation cycles, delayed recovery, and growing uncertainty around the integrity of their operational environment.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

YARA Rule
rule RondoDox_Botnet_Indicators
{
meta:
description = “Detects RondoDox Botnet-related strings ” author = ” CYFIRMA ”
threat_name = “RondoDox”
strings:
// IP addresses
$ip1 = “45.135.194.34”
$ip2 = “83.150.218.93”
$ip3 = “14.103.145.202”
$ip4 = “14.103.145.211”
$ip5 = “154.91.254.95”
$ip6 = “78.153.149.90”

// SHA-256 Hashes
$sha256_1 = “c88f60dbae08519f2f81bb8efa7e6016c6770e66e58d77ab6384069a515e451c”
$sha256_2 = “eb3e2a6a50f029fc646e2c3483157ab112f4f017406c3aabedaae0c94e0969f6”
$sha256_3 = “f4cd7ab04b1744babef19d147124bfc0e9e90d557408cc2d652d7192df61bda9”
$sha256_4 = “e3c080e322862d065649c468d20f620c3670d841c30c3fe5385e37f4f10172e7”
$sha256_5 = “e62df17150fcb7fea32ff459ef47cdd452a21269efe9252bde70377fd2717c10”
$sha256_6 = “53e2c2d83813d1284ddb8c68b1572b17cca95cfc36a55a7517bf45ff40828be5”
$sha256_7 = “43d4847bf237c445ed2e846a106e1f55abefef5c3a8545bd5e4cad20f5deb9a4”
$sha256_8 = “4c2429fc8b8ec61da41cbba1b8184ec45fa93a9841b4ca48094bba7741b826b8”
$sha256_9 = “694d729d67f1b0c06702490bfab1df3a96fe040fe5d07efa5c92356c329757be”
$sha256_10 = “edae3b75deb8013bd48ac4534cca345b90938a2abb91672467c2bf9ae81ff683”
$sha256_11 = “0814a0781ab30fca069a085dba201d6fd0f414498fafa4bb42859786d91d4781”
$sha256_12 = “59b4deee977e9e27b60e7e179d54a1ce8e56624e73b799523416eee828bfaf76”
$sha256_13 = “9f916a552efc6775367a31357a633dc0be01879830d3fddccdf3c40b26e50afd”
$sha256_14 = “0a9ebbecc8ec58c253039520304ca373cfb8d1674d67993e6485e244a77d6ec9”
$sha256_15 = “6c81fd73b4bef6fef379cbefdcce7f374ea7e6bf1bf0917cf4ca7b72d4cee788”
$sha256_16 = “a55a3859a203ca2bae7399295f92aeae61d845ffa173c1938f938f5c148eef99”
$sha256_17 = “57573779f9a62eecb80737d41d42165af8bb9884579c50736766abb63d2835ba”
$sha256_18 = “3daa53204978b7797bd53f5c964eed7a73d971517a764785ce3ab65a9423c2e7”
$sha256_19 = “8bf8928bc255e73e0b5b0ce13747c64d82d5f2647da129f189138773733ac21f”
$sha256_20 = “20a24b179bdbbdcc0053838c0484ea25eff6976f2b8cb5630ab4efb28b0f06b5”
$sha256_21 = “42aa715573c7d2fca01914504cb7336db715d73d1e20d23e4bd37f2e4f4fe389”
$sha256_22 = “c9278ce988343606350a94156ca28ee28bd605d1d95c810a16866eee1f997598”
$sha256_23 = “a197f60d5f5641f2c56576b4c867d141612c6e00db29c512f266835510b8a62d”
$sha256_24 = “8250d289c5ec87752cec1af31eed0347cf2dd54dc0fbeea645319c4dae238ee2”
$sha256_25 = “d02414a54e97ad26748812002610f1491a2a746e9ba0f9d05de3d47d7bab4f5e”
$sha256_26 = “c123a91fdacd9a4c0bcf800d6b7db5162cfd11cb71e260647ef0f2c60978ebfc”
$sha256_27 = “ef708fec1afbea4fb32b586e0dacf0d228c375a532008d81453c367256afea5a”
$sha256_28 = “305507f34c14c72cab35715b7f7b25b32352a8e19b8a283003aaf539d12ca517”
$sha256_29 = “937e6ab0dfcedfa23eced7b52d3899b0847df3fcb7a9c326b71027a7ab5f5b93”
condition:
any of ($ip*) or any of ($sha256*)
}

Recommendations:

STRATEGIC:

  • Maintain an up-to-date inventory of all active software used within the organization and perform regular self-audit of workstations, servers, laptops, mobile devices to identify unauthorized/ restricted software.
  • Configure organization’s intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defence mechanisms in place to alert on — and upon review, consider blocking connection attempts to and from — the external IP addresses and domains listed in the appendix.

MANAGEMENT:

  • Conduct regular security checks of your server and internet-facing assets.
  • Effective implementation of security initiatives that encompass awareness building and training across the organization.
  • Move beyond the traditional model of security awareness towards Improved Simulation and training exercises that mimic real attack scenarios, account for behaviors that lead to a compromise, and are measured against real attacks the organization receives.

TACTICAL RECOMMENDATIONS

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Add the Yara rules for threat detection and monitoring which will help to detect anomalies in log events and identify and monitor suspicious activities.

CYFIRMA’s WEEKLY INSIGHTS

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Vulnerabilities & Exploits, Data Leaks, Malware Implant.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Qilin Ransomware, DevMan Ransomware| Malware – RondoDox
  • Qilin Ransomware– One of the ransomware groups.
  • DevMan ransomware– One of the ransomware groups.
    Please refer to the trending malware advisory for details on the following:
  • Malware – RondoDox

Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

APT36 (Transparent Tribe): The Persistent Adversary Behind South Asian Cyberattacks

  • Threat Actor: TAG-140 aka (APT36, Transparent Tribe).
  • Attack Type: Spear-Phishing, Malware Implant, Exploitation of Vulnerabilities, ClickFix Technique, Watering-hole Attacks.
  • Objective: Espionage, Information Theft.
  • Target Technology: Office Suites Software, Operating Systems, Web Applications.
  • Target Geography: Afghanistan, Australia, Austria, Azerbaijan, Belgium, Botswana, Bulgaria, Canada, China, Czech Republic, Germany, India, Iran, Japan, Kazakhstan, Kenya, Malaysia, Mongolia, Nepal, Netherlands, Oman, Pakistan, Romania, Saudi Arabia, Spain, Sweden, Thailand, Turkey, UAE, UK, and USA.
  • Target Industries: Aerospace & Defense, Capital Goods, Diplomats, Education, Embassies, Government, Military, Rail & Road, and Transportation.
  • Business Impact: Data Theft, Operational Disruption, Reputational Damage.

About the Threat Actor
Transparent Tribe, also known as APT36, ProjectM, Mythic Leopard, Earth Karkaddan, and SideCopy, is a Pakistan-based state-sponsored advanced persistent threat (APT) group active since at least 2013. The threat actor is known for spear-phishing campaigns exploiting Windows OLE vulnerabilities, watering-hole attacks, and deploying a range of malware, including Crimson RAT, CapraRAT, and DRAT. The group operates by impersonating government or defence entities, leveraging spoofed domains and decoy documents to lure victims. It demonstrates operational overlaps with various subgroups such as SideCopy, TAG-140, and has shown potential coordination & collaboration with hacktivist affiliates, including Team Crack Codes and Cyber Legion PK.

TTPs based on MITRE ATT&CK Framework

Tactic ID Technique
Resource Development T1583.001 Acquire Infrastructure: Domains
Resource Development T1584.001 Compromise Infrastructure: Domains
Resource Development T1608.001 Stage Capabilities: Upload Malware
Resource Development T1587.003 Develop Capabilities: Digital Certificates
Resource Development T1608.004 Stage Capabilities: Drive-by Target
Initial Access T1566.001 Phishing: Spear phishing Attachment
Initial Access T1189 Drive-by Compromise
Initial Access T1566.002 Phishing: Spear-phishing Link
Execution T1203 Exploitation for Client Execution
Execution T1204.001 User Execution: Malicious Link
Execution T1059.005 Command and Scripting Interpreter: Visual Basic
Execution T1204.002 User Execution: Malicious File
Defense Evasion T1036.005 Masquerading: Match Legitimate Name or
Location
Defense Evasion T1027.013 Obfuscated Files or Information:
Encrypted/Encoded File
Defense Evasion T1564.001 Hide Artifacts: Hidden Files and Directories
Command and Control T1568 Dynamic Resolution

Latest Developments Observed
The threat actor, identified as TAG-140 with potential established links to SideCopy and Transparent Tribe, has been observed deploying a modified variant of the DRAT remote access trojan (DRAT V2) to target Indian government entities, as well as the defence and transportation sectors, indicating a modular and evolving approach to cyber-espionage. The group’s latest campaign involved spoofing the Indian Ministry of Defence’s press release portal to deliver DRAT V2, which features enhanced command-and-control capabilities and supports arbitrary shell command execution. The primary motive behind these attacks appears to be the exfiltration of sensitive information from high-value targets in India.

ETLM Insights
The Pakistan-based nation-state threat actor APT36 is believed to operate with backing from the country’s military intelligence, primarily targeting India and allied nations. The group employs a range of social engineering tactics, such as emotionally charged themes, disinformation, and luring techniques, including honey traps, to compromise individuals and organizations and exfiltrate sensitive information.

There are indications that APT36 may be receiving infrastructure support from other nation-state actors, including Chinese-affiliated groups and Turkish-speaking threat groups, who have historically supported Pakistan with logistics, intelligence, and ammunition, particularly during operations such as the Op Sindoor conflict.

The threat actor is expected to continue advancing its capabilities by developing more sophisticated, cross-platform malware and possibly integrating AI-driven evasion techniques. Future campaigns may increasingly leverage legitimate cloud services and communication platforms while expanding their focus to include mobile and IoT devices. Additionally, the group is likely to employ highly targeted social engineering tactics aligned with real-time events to enhance effectiveness.

The actor is also anticipated to adopt automated attack delivery mechanisms, diversify its malware payloads, and rapidly evolve in response to emerging defence measures. These advancements will likely result in more persistent, scalable, and difficult-to-detect operations across multiple industries.

YARA Rules
rule APT36_MultiIndicator_Threat
{
meta:
author = “CYFIRMA”
description = “Detects malware and artifacts associated with APT36 (Transparent Tribe)”
threat_actor = “APT36” last_updated = “2025-07-08”
strings:
// File names commonly used in APT36 delivery
$fname1 = “noway.bat” wide ascii
$fname2 = “index.php” wide ascii
$fname3 = “sysinte.hta” wide ascii
$fname4 = “survey.pdf” wide ascii
$fname5 = “Briefing_MoD_April25.docx” wide ascii
$fname6 = “Alert_Kavach_Update.exe” wide ascii
// Known malicious URLs/domains (C2 or lure pages)
$url1 = “email.gov.in.drdosurvey.info” nocase
$url2 = “trade4wealth.in” nocase
$url3 = “toner-digital.com” nocase
$url4 = “kavach-app.com” nocase
$url5 = “gov-inportal.org” nocase condition:
// Match any one or more unique indicators (filenames, URLs, or behavior) (any of ($fname*) or any of ($url*))
}

Recommendations

Strategic

  • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
  • Deploy Zero Trust Policy that leverages tools like security information management, advanced security analytics platforms, security user behaviour analytics, and other analytics systems to help the organization’s security personnel observe in real-time what is happening within their networks so they can orient defences more intelligently.
  • Block exploit-like behaviour. Monitor endpoints memory to find behavioural patterns that are typically exploited, including unusual process handle requests. These patterns are features of most exploits, whether known or new. This will be able to provide effective protection against zero-day/critical exploits and more by identifying such patterns.

Management

  • Invest in user education and implement standard operating procedures for the handling of financial and sensitive data transactions commonly targeted by impersonation attacks. Reinforce this training with context-aware banners and in-line prompts to help educate users.
  • Look for email security solutions that use ML- and AI-based anti-phishing technology for BEC protection to analyze conversation history to detect anomalies, as well as computer vision to analyze suspect links within emails.

Tactical

  • For better protection coverage against email attacks (like spear phishing, business email compromise, or credential phishing attacks), organizations should augment built-in email security with layers that take a materially different approach to threat detection.
  • Regular updates can contain new exploitable vulnerabilities. Ensure that all applications are updated with the latest security patch.
  • Employ robust endpoint security options that will allow your IT team to identify what confidential information is being stolen, when, and through what specific channel or device.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defenses based on the tactical intelligence provided.
  • Add the YARA rules for threat detection and monitoring, which will help to detect anomalies in log events and identify and monitor suspicious activities.

3. Major Geopolitical Developments in Cybersecurity

Italy arrests Chinese industrial cyber espionage operative, OpenAI tightens cybersecurity in the face of Chinese spying threats
Italian authorities arrested Xu Zewei, a Chinese citizen, at Milan’s Malpensa airport, following a US international warrant, Italian police confirmed. The 33-year-old is suspected of ties to Hafnium, a Chinese government-backed hacking group accused of stealing Covid-19 vaccine secrets from the US in 2020 and breaching Microsoft email software in 2021. The suspect is detained in an Italian jail near the airport, with extradition proceedings set to begin in a Milan court.

The arrest could complicate diplomacy for Prime Minister Giorgia Meloni, who balances strong US ties, including a personal rapport with President Donald Trump, along with maintaining cordial relations with Beijing, despite Italy’s withdrawal from China’s Belt and Road Initiative, possibly setting Italy up for cyber retaliation from Beijing. Deputy Prime Minister Matteo Salvini’s upcoming Beijing visit adds to the delicate situation.

Meanwhile, OpenAI has strengthened its security to protect intellectual property from corporate espionage, particularly after alleged targeting by Chinese competitors. In recent months, the $300bn San Francisco-based AI company implemented tighter controls on sensitive data and enhanced staff vetting, measures put in place to prevent industrial espionage from Chinese competitors.

ETLM Assessment:
During the COVID-19 pandemic, the FBI and the US Cybersecurity Agency accused China of hacking US coronavirus research. This allegation came on top of years of intellectual property theft in which the Chinese government has been directly involved. As predicted by CYFIRMA analysts, the moves of the current US administration towards a more balanced trade relationship with diminishing overt IP transfer are pushing China to double down on covert efforts to illegally gain competitor intellectual property, the main tool of which would be cyber espionage. China is a global champion in using cyber-attacks as a tool of statecraft, and the hands-on role of the government in the economy only reinforces the drive to use cyber-attacks for IP theft, even in matters that are of no military or dual use. China has a bigger hacking program than that of every other major nation combined, and any large company in industries outlined in Chinese development plans will need to invest in external threat landscape management solutions to stay ahead of relentless and repeated assaults by Chinese hackers.

4. Rise in Malware/Ransomware and Phishing

Qilin Ransomware Impacts the Cenomi Retail

  • Attack Type: Ransomware
  • Target Industry: Retail (Distribution)
  • Target Geography: Saudi Arabia
  • Ransomware: Qilin Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Saudi Arabia, Cenomi Retail (https[:]//www[.]cenomiretail[.]com/), was compromised by Qilin Ransomware. Cenomi Retail is a retail company specializing in sports merchandise, clothing, and fashion, with a presence spanning North America, the Middle East, Africa, and Asia, including operations in Saudi Arabia and Japan. The compromised data reportedly includes signed contracts, employee personal information, customer contracts, source code for web applications, SQL and other codebases, financial records, sales data, API details, databases, reports, and various other sensitive information. The total volume of the exposed data is estimated to be approximately 816 GB.

Source: Dark Web

Relevancy & Insights:

  • Recently, we observed that Qilin offers a “Call Lawyer” function on its affiliate panel, allowing affiliates to request legal consultation during ransom negotiations. This tactic is designed to increase pressure on victims by introducing legal risks and potentially inflating the ransom amount. The presence of legal counsel in negotiations can intimidate organizations, making them more likely to pay to avoid legal complications.
  • The Qilin Ransomware group primarily targets countries such as the United States of America, Canada, France, Spain, and Singapore.
  • The Qilin Ransomware group primarily targets industries, including Industrial Healthcare, Manufacturing, Information Technology, Professional Goods & Services, and Education.
  • Based on the Qilin Ransomware victims list from 1st Jan 2025 to 09th July 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Qilin Ransomware victims list from 1st Jan 2025 to 09th July 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Qilin ransomware poses a significant threat to organizations of all sizes. Its evolving tactics, including double extortion (data encryption and leak threats), cross-platform capabilities (Windows and Linux, including VMware ESXi), and focus on speed and evasion, make it a particularly dangerous actor.

DevMan ransomware impacts Takachiho Co., Ltd.

  • Attack Type: Ransomware
  • Target Industry: Manufacturing and Retail
  • Target Geography: Japan
  • Ransomware: DevMan ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Japan; Takachiho Co., Ltd. (website: takachiho[.]co[.]jp), was compromised by DevMan ransomware. Takachiho Co., Ltd. is a Japanese company primarily engaged in the manufacturing, wholesale, and retail of tourism souvenirs and confectionery products. The compromised data consists of confidential and sensitive information related to the organization. The Asking price for compromised data is 1 million USD.

Source: Dark Web

Relevancy & Insights:

  • DevMan ransomware is a recently identified ransomware strain that emerged in early 2025, showing strong ties to the notorious DragonForce and Conti ransomware families but with distinct characteristics that set it apart as an independent threat. It primarily targets Windows 10 and 11 systems, including Windows server infrastructures, and is known for rapid file encryption and lateral movement within networks using SMB (Server Message Block) share.
  • The DevMan ransomware group primarily targets countries such as South Africa, Spain, Singapore, Thailand, and the United States of America.
  • The DevMan ransomware group primarily targets industries, including Information Technology, Consumer Goods & Services, Software, Telecommunications & Media, and Professional Goods & Services.
  • Based on the DevMan ransomware victims list from 1st Jan 2025 to 09th July 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the DevMan ransomware victims list from 1st Jan 2025 to 09th July 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, DevMan ransomware is a sophisticated, evolving threat built on established ransomware codebases but with unique features and flaws. It exemplifies the growing ransomware-as-a-service trend, posing significant risks to Windows environments, especially in Asia and Africa.

5. Vulnerabilities and Exploits

Vulnerability in DjVuLibre

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Client/Desktop application
  • Vulnerability: CVE-2025-53367
  • CVSS Base Score: 8.4 Source
  • Vulnerability Type: Out-of-bounds write
  • Summary: The vulnerability allows a remote attacker to compromise a vulnerable system.

Relevancy & Insights: The vulnerability exists due to a boundary error when processing untrusted input within the MMRDecoder::scanruns method.

Impact: A remote attacker can create a specially crafted file, trick the victim into opening it using the affected software, trigger an out-of-bounds write, and execute arbitrary code on the target system.

Affected Products: https[:]//github[.]blog/security/vulnerability-research/cve-2025- 53367-an-exploitable-out-of-bounds-write-in-djvulibre/

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerability in DjVuLibre can pose significant threats to user privacy and security. This can impact various industries globally, including publishing, education, research, and digital archiving. Ensuring the security of DjVuLibre is crucial for maintaining the integrity and protection of users’ data worldwide. Therefore, addressing these vulnerabilities is essential to safeguarding document rendering and compression processes, especially when handling scanned documents and images across different geographic regions and sectors.

6. Latest Cyber-Attacks, Incidents, and Breaches

NightSpire Ransomware attacked and published the data of JIEI CO., LTD

  • Threat Actor: NightSpire Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Manufacturing
  • Target Geography: Thailand
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that NightSpire Ransomware attacked and published the data of the JIEI CO., LTD (https[:]//jieithai[.]com/) on its dark web website. JIEI (Thailand) Co., Ltd. is a company specializing in the production of rubber products primarily for construction materials, automobiles, and various industrial applications. It operates with a focus on the ASEAN region and employs advanced proprietary technologies to deliver high-precision rubber components that support the manufacturing of aesthetically pleasing and comfortable vehicles. The data leak, following the ransomware attack, encompasses sensitive and confidential records originating from the organizational database. The total size of the data compromised is approximately 650 GB.

Source: Dark Web

Relevancy & Insights:

  • NightSpire employs a double extortion strategy, encrypting data and threatening to leak stolen information unless a ransom is paid. This approach is typical of modern ransomware groups and adds pressure on victims to comply with demands.
  • NightSpire’s operations show strong influences from existing Ransomware-as-a- Service (RaaS) models, suggesting they might be an emerging group or a rebrand of an existing actor.

ETLM Assessment:
According to CYFIRMA’s assessment, NightSpire is a new ransomware group that emerged in early 2025, marking itself as a formidable player in the rapidly evolving ransomware landscape. Despite its recent appearance, NightSpire has already gained attention for its aggressive tactics and well-structured operations.

7. Data Leaks

Yamm Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: E-Commerce
  • Target Geography: Saudi Arabia
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed a data leak related to Yamm (https[:]//yam[.]sa/) in an underground forum. Yamm is an e-commerce platform that offers a method for refunding customers’ money. The compromised data includes sensitive details, such as Yamm ID, order number, refund amount, item name, item price, quantity, return reason, customer notes, product variants, item SKU, early and final review by personnel, shipping company, shipment number, return status, date, order link, purchase payment method, refund method, shipping cost, customer name, and customer phone number. The breach has been attributed to the threat actor known as “888.”

Source: Underground Forums

Source: Underground Forums

Global Insurance Company (GIC) Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Finance
  • Target Geography: Vietnam
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed that a threat actor identified as “UPS” claimed to be selling a partial database stolen from the Global Insurance Company (GIC) of Vietnam. According to the forum post, the dataset includes information on 65,997 customers and over 4,000 personal insurance contracts. The leak allegedly contains full personal details, contract records, government ID numbers, emails, phone numbers, birthdates, and insurance policy documents.

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously scouring for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to illicitly gain access and steal valuable data. Subsequently, the pilfered data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
Threat Actor “888” is a persistent and notorious cybercriminal entity with a mixed record of verified and unverified data breaches, focusing on stealing and leaking sensitive data from large organizations worldwide to extort or sell information illicitly. Their activities highlight ongoing cybersecurity challenges for multinational corporations and institutions.

Recommendations: Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related attacks.
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA Research team has observed that a threat actor has allegedly breached and is offering for sale the corporate database of Unibail-Rodamco- Westfield (URW), a prominent global player in commercial real estate.

Headquartered in Paris, URW owns, develops, and manages an extensive portfolio of high-profile shopping centers, office buildings, and convention venues across Europe and the United States, including 39 properties under the well-known Westfield brand. Given the company’s vast international presence, a breach of this nature raises significant concerns for its employees, clients, and business partners.

The alleged breach was disclosed on a hacking forum, where the threat actor advertised the URW corporate database for sale at €1,500. The database, reportedly available in both .sql and MySQL formats, is said to contain sensitive corporate information. Additionally, the attacker claimed that the US tenant coordination portal—a key platform used to manage URW’s relationships with retail tenants in the U.S.—was rendered inaccessible due to the incident.

The compromised data allegedly includes a significant amount of information belonging to both company personnel and clients. The threat actor specified the contents of the database as including:

  • 70,000 records of employees and clients
  • 60,000 IP addresses

Source: Underground Forums

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Delay a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies and continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security control such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

Geography-Wise Graph

Industry-Wise Graph

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.