Self Assessment

Weekly Intelligence Report – 22 August 2025

Published On : 2025-08-22
Share :
Weekly Intelligence Report – 22 August 2025

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware
Target Technologies: Windows

Introduction
CYFIRMA Research and Advisory Team has found Charon Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

Charon Ransomware
Researchers identified a new ransomware variant named Charon, which demonstrates a technically consistent encryption-and-renaming cycle across compromised environments. Once executed, the malware traverses local and shared directories, systematically encrypting accessible files with strong cryptographic algorithms. To mark its activity and prevent redundant operations, each locked file is appended with the distinctive “.Charon” extension.

Screenshot of files encrypted by ransomware (Source: Surface Web)

This encryption process is tightly coupled with the malware’s renaming logic, ensuring that all targeted file types follow a uniform post-compromise structure. Importantly, executables and dynamic libraries are excluded from encryption to avoid destabilizing the payload itself or preventing victim systems from remaining operational enough to view ransom instructions.

The ransom note files, consistently dropped as “How To Restore Your Files.txt” across directories, serve as both a persistent reminder of the compromise and an enforced communication channel between the attackers and the victim. This technical workflow demonstrates Charon’s dual focus on operational effectiveness and psychological impact, optimizing both disruption and visibility of the attack.

The appearance of the Charon ransom note(“How To Restore Your Files.txt “) (Source: Surface Web)

Following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Initial Access T1091 Replication Through Removable Media
Execution T1059 Command and Scripting Interpreter
Execution T1129 Shared Modules
Execution T1569 System Services
Execution T1569.002 System Services: Service Execution
Persistence T1543 Create or Modify System Process
Persistence T1543.003 Create or Modify System Process: Windows Service
Privilege Escalation T1543 Create or Modify System Process
Privilege Escalation T1543.003 Create or Modify System Process: Windows Service
Privilege Escalation T1548 Abuse Elevation Control Mechanism
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1036 Masquerading
Defense Evasion T1222 File and Directory Permissions Modification
Defense Evasion T1548 Abuse Elevation Control Mechanism
Discovery T1007 System Service Discovery
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1120 Peripheral Device Discovery
Discovery T1518 Software Discovery
Lateral Movement T1091 Replication Through Removable Media
Collection T1074 Data Staged
Impact T1486 Data Encrypted for Impact
Impact T1489 Service Stop

Relevancy and Insights:

  • The ransomware primarily affects the Windows operating system, which is commonly utilized in enterprise environments across multiple industries.
  • USB Bus Checks: The ransomware is actively monitoring and checking the USB bus for connected devices. This behaviour suggests that the ransomware may be attempting to propagate by spreading through removable media, such as USB drives. It could be searching for specific files or vulnerabilities on connected devices to further spread its malicious payload.
  • Detect-debug-environment: This shows that the ransomware checks whether it’s running in a debug or virtualized environment, a common anti-analysis tactic used to evade sandboxes or security researchers by terminating or altering behavior when such conditions are detected.
  • Checks-cpu-name: It inspects the CPU name to identify virtualized or sandboxed environments are often used in malware analysis, allowing it to evade detection or halt execution in such scenarios.

ETLM Assessment:
CYFIRMA’s analysis assesses that Charon ransomware operations are likely to progress toward more sophisticated extortion frameworks, combining encryption with structured data theft to amplify leverage over victims. Its reliance on stealth-oriented techniques and system disruption methods indicates a trajectory where evasion and persistence will remain central themes, with potential enhancements toward automation of lateral movement and self-propagation. Future variants may also incorporate more resilient communication channels and negotiation mechanisms, signaling a shift toward professionalized and highly adaptive ransomware campaigns.

Sigma rule:
title: Suspicious Volume Shadow Copy Vssapi.dll Load tags:
– attack.defense-evasion
– attack.impact
– attack.t1490 logsource:
category: image_load product: windows
detection: selection:
ImageLoaded|endswith: ‘\vssapi.dll’ filter_windows:
– Image:
– ‘C:\Windows\explorer.exe’
– ‘C:\Windows\ImmersiveControlPanel\SystemSettings.exe’
– Image|startswith:
– ‘C:\Windows\System32\’
– ‘C:\Windows\SysWOW64\’
– ‘C:\Windows\Temp\{‘ # Installers
– ‘C:\Windows\WinSxS\’ filter_program_files:
# When using this rule in your environment replace the “Program Files” folder by the exact applications you know use this. Examples would be software such as backup solutions
Image|startswith:
– ‘C:\Program Files\’
– ‘C:\Program Files (x86)\’ filter_programdata_packagecache:
# The following filter is required because of many FPs cause by:
# C:\ProgramData\Package Cache\{10c6cfdc-27af-43fe-bbd3- bd20aae88451}\dotnet-sdk-3.1.425-win-x64.exe
# C:\ProgramData\Package Cache\{b9cfa33e-ace4-49f4-8bb4- 82ded940990a}\windowsdesktop-runtime-6.0.11-win-x86.exe
# C:\ProgramData\Package Cache\{50264ff2-ad47-4569-abc4- 1c350f285fb9}\aspnetcore-runtime-6.0.11-win-x86.exe
# C:\ProgramData\Package Cache\{2dcef8c3-1563-4149-a6ec- 5b6c98500d7d}\dotnet-sdk-6.0.306-win-x64.exe
# etc.
Image|startswith: ‘C:\ProgramData\Package Cache\’ condition: selection and not 1 of filter_*
falsepositives:
– Unknown level: high

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.

Recommendations

STRATEGIC RECOMMENDATIONS

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained, which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATIONS

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATIONS

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring, which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Trending Malware of the Week

Type: Trojan| Objectives: Stealing Sensitive Information, Financial Fraud, Data Exfiltration | Threat Actor: Go1ano developer | Target Technologies: Android OS, Mobile Payment Systems | Target Industry: Banks |Target Geography: Brazil CYFIRMA collects data from various forums, based on which the trend is ascertained. We identified a few popular malware that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week “PhantomCard” is trending.

About the Malware PhantomCard
Researchers uncovered PhantomCard, a newly emerging Android banking trojan in Brazil that exploits NFC technology to steal payment card information. Masquerading as a fake “Card Protection” app on counterfeit Google Play pages with fabricated reviews, once installed, it secretly relays sensitive information from victims’ cards to cybercriminals for fraudulent transactions. The campaign is linked to the “Go1ano developer” threat actor, known for distributing Android malware in Brazil, who recently promoted a tool called GHOST NFC CARD. Unlike ghost card fraud, which relies on fabricated numbers, PhantomCard directly transmits live NFC data, making it more dangerous. Though currently focused in Brazil, its use of NFC relay techniques signals the potential for global expansion, posing growing risks as contactless payments become more widespread.

Attack Method
PhantomCard employs a deceptive delivery method by posing as a “Card Protection” app on fake Google Play pages, reinforced with fabricated positive reviews to build credibility. Once installed, it immediately activates without requiring extra permissions, prompting the victim to scan their payment card. The malware then relays the captured NFC data to a criminal-controlled server, where it is transmitted to a terminal or ATM. To complete fraudulent transactions, PhantomCard also requests the victim’s PIN, effectively allowing attackers to use the card remotely as though it were physically present.

Operational Breakdown
PhantomCard reveals that the malware is not an original creation of the actor promoting it, but rather a customised version of the NFU Pay Malware-as-a-Service, a Chinese-origin platform known in underground markets alongside others like SuperCardX and KingNFC. Evidence such as debug strings in Chinese and references to NFU Pay in the source code confirm this link. The campaign’s tailoring to Brazil is evident in a command-and-control endpoint containing baxi, the Chinese term for Brazil, suggesting deliberate regional targeting. While currently configured for Brazilian banking users, the service’s adaptable design allows PhantomCard to be repackaged for other markets, broadening its global risk potential.

Technical Capabilities
PhantomCard’s core strength is its ability to relay NFC card data from a victim’s device to an attacker’s system in real time. Unlike earlier tools like NFCGate, PhantomCard is narrowly built to target the ISO-DEP (ISO 14443-4) standard used in EMV payment cards. When a victim scans their card, the malware sends commands to identify available applications and extract metadata. If the card is EMV-compatible, PhantomCard forwards the extracted data to its server, signaling it is ready for exploitation. A companion tool on the attacker’s side then mirrors the victim’s card activity, establishing a live bridge to a terminal or ATM, enabling fraudulent use as though the attacker held the card physically.

Following are the TTPs based on the MITRE Attack Framework for Mobile

Tactic Technique ID Technique Name
InitialAccess T1660 Phishing
Persistence T1541 Foreground Persistence
Defense Evasion T1655 Masquerading
Defense Evasion T1628 Hide Artifacts
Defense Evasion T1633.001 Virtualization/Sandbox Evasion: System Checks
Credential Access T1417 Input Capture
Discovery T1426 System Information Discovery
Collection T1417 Input Capture
Command andControl T1437 Application Layer Protocol

INSIGHTS

  • PhantomCard highlights the increasing role of underground malware-as-a-service ecosystems in shaping cybercrime. By leveraging a pre-existing platform like NFU Pay instead of building a tool from scratch, the threat actor demonstrates how cybercriminals can quickly adopt and adapt sophisticated capabilities. This approach not only lowers the barrier for less skilled actors to launch advanced campaigns but also accelerates the global spread of techniques once confined to niche circles, since such platforms are openly marketed and supported in underground forums.
  • The campaign also underscores how cybercriminals exploit local trust and familiarity to enhance success. By tailoring infrastructure with cultural markers, such as using terms like baxi for Brazil, and by mimicking app distribution methods that closely resemble legitimate regional practices, attackers create a sense of credibility that resonates with local victims. This strategy shows how blending cultural awareness with technical delivery can make malware distribution far more effective, particularly in regions where digital services and payment methods are rapidly expanding.
  • An emerging pattern in the cybercrime ecosystem is the rise of resellers, actors who may not develop malware themselves but operate as local distributors for Malware- as-a-Service. This role allows them to bridge global threats into regional underground markets, bypassing barriers like language, culture, and financial systems that would normally limit access. Such activity increases the risks for local financial institutions, exposing them to a wider array of malicious tools. In Brazil, “Go1ano developer” has become a prominent example, marketing PhantomCard alongside spyware families, such as BTMOB and GhostSpy, earning a reputation as a serial reseller with a diverse portfolio. Eventually, Go1ano transferred the rights of these malware families to the Pegasus Team, another well-known group in the region, reflecting how reseller networks evolve and adapt much like legitimate business chains.

ETLM ASSESSMENT
From the ETLM perspective, CYFIRMA anticipates that PhantomCard’s arrival signals a new challenge for organizations in securing mobile and contactless payments. As NFC- based banking becomes more common, companies may face increased pressure to monitor and mitigate threats stemming from seemingly legitimate applications, even from widely trusted sources. Employees who rely on mobile banking for work-related transactions could inadvertently become entry points for financial fraud, increasing operational risk. Moreover, the rise of resellers and tailored malware campaigns may allow threat actors to adapt rapidly to specific regional practices, potentially bypassing standard corporate defenses. This could force organizations to reassess internal policies on employee use of personal devices for financial interactions, as well as the reliance on mobile devices for transaction approvals or account management. Over time, the growing sophistication and accessibility of such malware could erode confidence in mobile payment tools, requiring more stringent risk assessment and monitoring protocols for staff interactions with banking apps.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

YARA Rules
rule PhantomCard_Indicators
{
meta:
description = “Detects PhantomCard malware indicators” author = “CYFIRMA”
malware_family = ” PhantomCard” strings:
// SHA256 hashes
$sha256_1 = “a78ab0c38fc97406727e48f0eb5a803b1edb9da4a39e613f013b3c5b4736262f”
$sha256_2 = “cb10953f39723427d697d06550fae2a330d7fff8fc42e034821e4a4c55f5a667”
condition:
any of ($sha256*)
}

RECOMMENDATIONS:

STRATEGIC RECOMMENDATIONS

  • Implement Mobile Device Management (MDM) policy to enhance corporate data security by monitoring, managing, and securing mobile devices such as laptops, smartphones, and tablets that are used in enterprises.
  • Maintain an up-to-date inventory of all active software used within the organization and perform regular self-audits of workstations, servers, laptops, and mobile devices to identify unauthorized/ restricted software.
  • Configure organization’s intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defence mechanisms in place to alert on — and upon review, consider blocking connection attempts to and from — the external IP addresses and domains listed in the appendix.

MANAGEMENT RECOMMENDATIONS

  • Incorporate a written software policy that educates employees on good practices in relation to software and the potential implications of downloading and using restricted software.
  • Security Awareness training should be mandated for all company employees. The training should ensure that employees:
  • Avoid downloading and executing files from unverified sources.
  • Move beyond the traditional model of security awareness towards Improved Simulation and training exercises that mimic real attack scenarios, account for behaviours that lead to a compromise, and are measured against real attacks the organization receives.

TACTICAL RECOMMENDATIONS

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Evaluate the security and reputation of each piece of open-source software or utilities before usage.
  • Enforce policies to validate third-party software before installation.
  • Add the Yara rules for threat detection and monitoring, which will help to detect anomalies in log events and identify and monitor suspicious activities.

CYFIRMA’S WEEKLY INSIGHTS

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Vulnerabilities & Exploits, Malware implant, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Qilin Ransomware, Blacknevas Ransomware | Malware – PhantomCard
  • Qilin Ransomware– One of the ransomware groups.
  • Blacknevas Ransomware – One of the ransomware groups. Please refer to the trending malware advisory for details on the following:
  • Malware – PhantomCard
    Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

ShinyHunters – Advanced Sophistication Techniques and Potential Collaboration with Scattered Spider

  • Threat Actor: ShinyHunters aka UNC6040
  • Attack Type: Connection Proxy, Credential Dumping, Social Engineering Attacks, Exploitation of Vulnerabilities.
  • Objective: Information theft, Espionage, Financial Gains
  • Suspected Target Technology: Office Suites Software, Operating System, Web Application, SAP NetWeaver.
  • Suspected Target Geography: US, India
  • Suspected Target Industries: Diversified Financials, E-Commerce, IT Services, Software
  • Business Impact: Financial Loss, Data Theft, Operational Disruption, Reputational Damage

About the Threat Actor
ShinyHunters is a prominent cybercriminal group, active since at least 2020, and primarily motivated by financial gains. The group has been associated with multiple high-profile data breaches impacting organizations worldwide. Their operations typically involve exploiting security vulnerabilities, and advanced social engineering attacks to gain unauthorized access to corporate databases. Following intrusion, they systematically exfiltrate sensitive information, including personally identifiable information (PII), login credentials, and financial records, which is subsequently monetized through sale or exposure on dark web platforms, and underground forums.

Details on Exploited Vulnerabilities

CVE ID Affected Products CVSS Score Exploit Links
CVE-2024- 6387 OpenSSH 8.1 Link
CVE-2025- 31324 SAP NetWeaver 10.0 Link

TTPs based on MITRE ATT&CK Framework for Enterprise & Mobile

Tactic ID Technique
Reconnaissance T1589.001 Gather Victim Identity Information: Credentials
Reconnaissance T1598 Phishing for Information
Reconnaissance T1598.001 Phishing for Information: Spear phishing Service
Reconnaissance T1598.004 Phishing for Information: Spear phishing Voice
Resource Development T1588.002 Obtain Capabilities: Tool
Initial Access (Mobile) T1451 SIM Card Swap
Initial Access (Mobile) T1660 Phishing
Initial Access T1190 Exploit Public-Facing Application
Initial Access T1566.004 Phishing: Spear phishing Voice
Initial Access T1133 External Remote Services
Initial Access T1078.004 Valid Accounts: Cloud Accounts
Execution T1047 Windows Management Instrumentation
Execution T1204 User Execution
Execution T1059 Command and Scripting Interpreter
Persistence T1556.006 Modify Authentication Process: Multi- Factor Authentication
Persistence T1556.009 Modify Authentication Process: Conditional Access Policies
Persistence T1133 External Remote Services
Persistence T1136 Create Account
Persistence T1098.005 Account Manipulation: Device Registration
Persistence T1098.003 Account Manipulation: Additional Cloud Roles
Persistence T1098.001 Account Manipulation: Additional Cloud Credentials
Persistence T1078.004 Valid Accounts: Cloud Accounts
Privilege Escalation T1078.004 Valid Accounts: Cloud Accounts
Privilege Escalation T1098.001 Account Manipulation: Additional Cloud Credentials
Privilege Escalation T1098.003 Account Manipulation: Additional Cloud Roles
Privilege Escalation T1098.005 Account Manipulation: Device Registration
Privilege Escalation T1484.002 Domain or Tenant Policy Modification: Trust Modification
Privilege Escalation T1068 Exploitation for Privilege Escalation
Defense Evasion T1564.008 Hide Artifacts: Email Hiding Rules
Defense Evasion T1006 Direct Volume Access
Defense Evasion T1484.002 Domain or Tenant Policy Modification: Trust Modification
Defense Evasion T1656 Impersonation
Defense Evasion T1556.006 Modify Authentication Process: Multi- Factor Authentication
Defense Evasion T1556.009 Modify Authentication Process: Conditional Access Policies
Defense Evasion T1578.002 Modify Cloud Compute Infrastructure: Create Cloud Instance
Defense Evasion T1553.002 Subvert Trust Controls: Code Signing
Defense Evasion T1078.004 Valid Accounts: Cloud Accounts
Credential Access T1556.006 Modify Authentication Process: Multi- Factor Authentication
Credential Access T1556.009 Modify Authentication Process: Conditional Access Policies
Credential Access T1621 Multi-Factor Authentication Request Generation
Credential Access T1003.003 OS Credential Dumping: NTDS
Credential Access T1003.006 OS Credential Dumping: DCSync
Credential Access T1539 Steal Web Session Cookie
Credential Access T1552.001 Unsecured Credentials: Credentials In Files
Credential Access T1552.004 Unsecured Credentials: Private Keys
Discovery T1083 File and Directory Discovery
Discovery T1538 Cloud Service Dashboard
Discovery T1580 Cloud Infrastructure Discovery
Discovery T1217 Browser Information Discovery
Discovery T1087.004 Account Discovery: Cloud Account
Discovery T1087.002 Account Discovery: Domain Account
Discovery T1087.003 Account Discovery: Email Account
Discovery T1046 Network Service Discovery
Discovery T1069.003 Permission Groups Discovery: Cloud Groups
Discovery T1018 Remote System Discovery
Lateral Movement T1021.007 Remote Services: Cloud Services
Collection T1530 Data from Cloud Storage
Collection T1213.002 Data from Information Repositories: Sharepoint
Collection T1213.003 Data from Information Repositories: Code Repositories
Collection T1213.005 Data from Information Repositories: Messaging Applications
Collection T1074 Data Staged
Collection T1114 Email Collection
Command and Control T1102 Web Service
Command and Control T1105 Ingress Tool Transfer
Command and Control T1572 Protocol Tunneling
Command and Control T1090 Proxy
Command and Control T1219 Remote Access Tools
Exfiltration T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage
Impact T1486 Data Encrypted for Impact
Impact T1657 Financial Theft

Latest Developments Observed
The threat actor is suspected of launching a wave of attacks against Salesforce, targeting high-profile organizations across multiple sectors through the use of coordinated ticket- themed phishing domains and Salesforce credential-harvesting pages, likely developed for recurring campaigns. The attack techniques appear consistent with past operations attributed to the Russian cybercriminal group Scattered Spider, suggesting potential collaboration between the two threat actor groups. Domain analysis indicates that financial services and technology service providers are the most probable targets in upcoming campaigns. The primary objective appears to be the exfiltration of sensitive data for subsequent monetization.

ETLM Insights
ShinyHunters are a sophisticated cybercriminal collective known for orchestrating data breaches. The group leverages advanced intrusion techniques to exfiltrate sensitive information from compromised organizations, subsequently monetizing the stolen data through underground markets and extortion schemes. Historically, the group has leveraged insecure APIs, misconfigured cloud environments, and credential-stuffing techniques to gain unauthorized access to targeted organizations.

Recent intelligence suggests a possible collaboration between ShinyHunters and Scattered Spider, amplifying both groups’ capabilities. Such cooperation indicates the use of highly advanced techniques and a clear strategy in defining targets and operational objectives, primarily focused on maximizing financial gain and reputational damage to victims.

The group’s evolving tactics highlight the need for heightened vigilance across industries, particularly for organizations that hold high-value customer or corporate data. Looking ahead, their operations may pivot towards more persistent and covert methods, including session hijacking or even insider recruitment. The group’s growing emphasis on exploiting the human element—through deception, impersonation, and other social engineering tactics – indicates a likely trajectory where social engineering becomes a primary attack vector, reinforced by the technical exploitation of cloud-integrated business ecosystems.

YARA Rules
rule ShinyHunters_CVE2024_6387_Targeting
{
meta:
author = “CYFIRMA”
description = “Detects indicators related to ShinyHunters targeting CVE-2024-6387 and specific domains”
date = “2025-08-19”
threat_actor = “ShinyHunters” strings:
$cve = “CVE-2024-6387”
$domain1 = “havenly.com”
$domain2 = “promo.com” condition:
any of ($cve, $domain1, $domain2)
}

Recommendations

Strategic

  • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
  • Assess and deploy alternatives for an advanced endpoint protection solution that provides detection/prevention for malware and malicious activities that do not rely on signature-based detection methods.
  • Block exploit-like behaviour. Monitor endpoints memory to find behavioural patterns that are typically exploited, including unusual process handle requests. These patterns are features of most exploits, whether known or new. This will be able to provide effective protection against zero-day/critical exploits and more by identifying such patterns.

Management

  • Invest in user education and implement standard operating procedures for the handling of financial and sensitive data transactions commonly targeted by impersonation attacks. Reinforce this training with context-aware banners and in-line prompts to help educate users.
  • Develop a cyber threat remediation program and encourage employee training to detect anomalies proactively.

Tactical

  • For better protection coverage against email attacks (like spear phishing, business email compromise, or credential phishing attacks), organizations should augment built-in email security with layers that take a materially different approach to threat detection.
  • Protect accounts with multi-factor authentication. Exert caution when opening email attachments or clicking on embedded links supplied via email communications, SMS, or messaging.
  • Apply security measures to detect unauthorized activities, protect sensitive production, and process control systems from cyberattacks.
  • Add the YARA rule for threat detection and monitoring, which will help to detect anomalies in log events and identify and monitor suspicious activities.

3. Major Geopolitical Developments in Cybersecurity

Poland failed a cyberattack on a big city’s water supply, and a Norwegian dam was sabotaged
A large Polish city could have had its water supply cut off as a result of a cyberattack, according to the country’s digital affairs ministry. Warsaw did not specify who was behind the attack or which city was targeted. The intrusion was detected and neutralized at the last moment, preventing any disruption to the water supply or sewage management.

According to the government, Poland successfully thwarts 99% of such attacks, and Warsaw emphasizes ongoing investments in cybersecurity, including nearly USD 2.7 billion allocated for 2025 and 2026 to bolster digital infrastructure.

This incident is part of a broader pattern of cyberattacks targeting Polish critical infrastructure, in what CYFIRMA describes as an ongoing cyber war with Russia. While the Polish government did not disclose the city or the perpetrators, it has hinted at Russian involvement, noting that Poland’s role as a hub for aid to Ukraine makes it a prime target for Russian cyberattacks.

Meanwhile, a similar but more serious case has been made public in Norway. The Norwegian Police Security Service (PST) linked a cyberattack on a Bremanger dam earlier this spring to pro-Russian hackers. In the incident, the attackers seized control of the dam’s systems, opening its floodgate and releasing over seven million gallons of water before the breach was detected and resolved within four hours. With the river well below flood levels, no damage occurred. PST has recently described the attack as a demonstration of the hackers’ capabilities rather than an intent to cause harm.

In other news, a recent report details a newly identified Russia-aligned advanced persistent threat (APT) group, dubbed “Curly COMrades,” targeting critical organizations in geopolitically sensitive regions. The group has attacked judicial and government institutions in Georgia and an energy distribution firm in Moldova, focusing on establishing persistent access and stealing credentials.

ETLM Assessment:
Since Russia’s invasion of Ukraine in 2022, Russian cyberattacks have surged across both Poland and Norway and Europe, largely as part of a broader pressure campaign to destabilize Ukraine’s allies. Poland, a key hub for military and humanitarian aid to Ukraine, has faced frequent targeting of its critical infrastructure. These attacks, often attributed to Russian state-sponsored groups like APT28 and Sandworm, aim to sow chaos, undermine public confidence, and strain NATO unity. Across Europe, energy grids, government networks, and financial systems have been hit with ransomware, data breaches, and disinformation campaigns, with incidents reported in Germany, Estonia, the Czech Republic, Moldova, Sweden, and Finland.

Ransomware based on Chinese APT
Researchers have issued a warning about a new ransomware family named “Charon,” deployed in a targeted attack against the Middle East’s public sector and aviation industry. The threat actor employed tactics, techniques, and procedures (TTPs) previously linked to the Chinese cyberespionage group Earth Baxia, though the researchers stop short of attributing the attack directly to them. The overlap in TTPs could indicate direct involvement, intentional mimicry, or independent development of similar methods. The report emphasizes a rising trend among ransomware operators adopting advanced techniques typically associated with state-sponsored actors.

ETLM Assessment:
Chinese Advanced Persistent Threat (APT) groups have traditionally focused on cyberespionage but have increasingly been observed adopting ransomware to enrich themselves while masking their primary objectives. Groups like ChamelGang and Bronze Starlight have been previously observed deploying ransomware strains such as CatB, LockFile, and RA World in targeted attacks against organizations in sectors like government, healthcare, and manufacturing across East Asia, India, and the Americas. These attacks often involve sophisticated tactics, such as using custom tools like HUI Loader and PlugX, previously exclusive to Chinese state-sponsored groups, to exfiltrate data and deploy ransomware for financial gain. By blending espionage with ransomware, these groups not only secure financial rewards but also use the disruptive nature of ransomware to obscure their data theft and maintain plausible deniability, complicating attribution efforts.

4. Rise in Malware/Ransomware and Phishing

Qilin Ransomware Impacts Welcome Financial Group

  • Attack Type: Ransomware
  • Target Industry: Finance
  • Target Geography: South Korea
  • Ransomware: Qilin Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from South Korea, Welcome Financial Group (https[:]//www[.]welcomefg[.]co[.]kr/), was compromised by Qilin Ransomware. Welcome Financial Group, Korea is a huge ecosystem operating in the finance industry. The group provides banking, digitalization, payments, integrated asset management, distressed loans, residential leasing, and startup financing services to its clients. The exposed data reportedly includes the full database of all clients, containing names, dates of birth, residential and office addresses, bank account details, email addresses, and a wide range of other sensitive information. The total volume of compromised data is estimated to be around 1,024 GB.

Source: Dark Web

Relevancy & Insights:

  • The Qilin Ransomware group primarily targets countries such as the United States of America, Canada, France, the United Kingdom, and Italy.
  • The Qilin Ransomware group primarily targets industries, including Manufacturing, Professional Goods & Services, Healthcare, Information Technology, and Consumer Goods & Services.
  • Based on the Qilin Ransomware victims list from 1st Jan 2025 to 19th August 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Qilin Ransomware victims list from 1st Jan 2025 to 19th August 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Qilin ransomware poses a significant threat to organizations of all sizes. Its evolving tactics, including double extortion (data encryption and leak threats), cross-platform capabilities (Windows and Linux, including VMware ESXi), and focus on speed and evasion, make it a particularly dangerous actor.

Blacknevas Ransomware Impacts CK Power Public Company Limited

  • Attack Type: Ransomware
  • Target Industry: Energy, Utilities & Waste Treatment
  • Target Geography: Thailand
  • Ransomware: Blacknevas Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Thailand, CK Power Public Company Limited (www[.]ckpower[.]co[.]th), was compromised by Blacknevas Ransomware. CK Power Public Company Limited, through its subsidiaries, generates and sells electricity and steam in Thailand and the Lao People’s Democratic Republic. The compromised data consists of confidential and sensitive information related to the organization.

Source: Dark Web

Relevancy & Insights:

  • BlackNevas ransomware, also known as “Trial Recovery,” is a ransomware family first observed in November 2024. It is a derivative or variation of the Trigona ransomware family.
  • BlackNevas ransomware encrypts files using strong encryption methods, including AES-256-CBC for file encryption and RSA-4096 for key encryption.
  • The BlackNevas ransomware group primarily targets countries such as the United Kingdom, Thailand, Spain, Japan, and South Korea.
  • The BlackNevas ransomware group primarily targets industries, including Consumer Goods & Services, Professional Goods & Services, Manufacturing, Information Technology, and Finance.
  • Based on the BlackNevas ransomware victims list from 1st Jan 2025 to 19th August 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the BlackNevas ransomware victims list from 1st Jan 2025 to 19th August 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, BlackNevas ransomware is a sophisticated and multifaceted threat with extensible capabilities and a partnership model to maximize the impact and profitability of their attacks.

5. Vulnerabilities and Exploits

Vulnerability in Intel Driver & Support Assistant Tool

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Hardware solutions / Firmware
  • Vulnerability: CVE-2025-21093
  • CVSS Base Score: 6.7 Source
  • Vulnerability Type: Unquoted Search Path or Element
  • Summary: The vulnerability allows a local user to escalate privileges on the system.

Relevancy & Insights:
The vulnerability exists due to an uncontrolled search path element.

Impact:
A local user can gain elevated privileges.

Affected Products:
https[:]//www[.]intel[.]com/content/www/us/en/security- center/advisory/intel-sa-01321.html

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerabilities in the Intel Driver & Support Assistant (DSA) Tool can pose significant risks because the tool runs with high privileges to scan hardware, detect outdated drivers, and install updates. Exploitation could allow attackers to escalate privileges, execute arbitrary code, or tamper with driver installations, potentially compromising the entire system. This impacts a wide range of users across industries where Intel- based devices are used, including enterprise IT environments, personal computing, and critical infrastructure relying on Intel hardware. Ensuring timely patching of the Intel DSA Tool, applying Intel security advisories, and restricting unnecessary administrative access are crucial steps to minimize exposure.

6. Latest Cyber-Attacks, Incidents, and Breaches

Dire Wolf Ransomware attacked and published the data of the Kingsford Development & LEADBUILD Construction Pte Ltd

  • Threat Actor: Dire Wolf Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Construction
  • Target Geography: Singapore
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that Dire Wolf Ransomware attacked and published the data of the Kingsford Development & LEADBUILD Construction Pte Ltd (https[:]//kingsford[.]com[.]sg) on its dark web website. Kingsford Development Pte Ltd, based in Singapore, is a subsidiary of the Kingsford Group. The group is engaged in real estate development, property management, and manufacturing, with operations extending across Singapore, China, and Australia. The ransomware attack has compromised approximately 200 GB of data, including financial records, sales information, project drawings, and other sensitive and confidential data extracted from the organization’s database.

Source: Dark Web

Relevancy & Insights:

  • Dire Wolf is a newly emerged ransomware group that surfaced in May 2025. It operates an onion-based data leak site (DLS) where it posts information about its victims, including file trees, sample files, and descriptions of stolen data.
  • The Dire Wolf Ransomware group primarily targets industries, including Manufacturing, Industrial Machinery, Information Technology, Business Support Services, and Heavy Construction.

ETLM Assessment:
According to CYFIRMA’s assessment, Dire Wolf is a newly identified ransomware group that emerged in May 2025, distinguished by its use of double-extortion tactics combining data encryption with data theft and threats of public exposure via an onion-based leak site. The group appears to operate solely for financial gains, without ideological motives. Its emergence highlights the evolving nature of ransomware threats in 2025, particularly the increased reliance on data exfiltration to amplify extortion efforts. These activities reinforce the urgent need for strong cybersecurity defenses and effective incident response strategies across all sectors.

7. Data Leaks

Indonesian Health Platform SatuSehat Kotim Kabupaten Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: Healthcare
  • Target Geography: Indonesia
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary: The CYFIRMA Research team has identified a threat actor allegedly leaking and attempting to sell a database linked to SatuSehat for the East Kotawaringin Regency (Kotim Kabupaten) in Indonesia. The database, reportedly containing sensitive patient information, was advertised on a dark web forum. As SatuSehat is Indonesia’s national health platform that consolidates patient records from multiple healthcare providers into a unified system, this incident represents a potentially serious data breach impacting a large number of individuals.

The post, made by a new user on the forum, includes a sample of the allegedly stolen data, which seems to span from 2020 to 2025. The database purportedly contains records from the Indonesian Social Security Administering Body for Health (BPJS Kesehatan). The threat actor is offering the full database for sale and has provided cryptocurrency wallet addresses for the transaction. This incident raises serious concerns about the security of citizen data within the national health system and the potential for misuse of the leaked information.

The leaked data sample includes the following types of information:

  • Timestamp of the record
  • Medical Record Number (No MR)
  • BPJS Number
  • Patient’s Full Name
  • Gender
  • Assigned Polyclinic
  • Print status
  • Barcode

Source: Underground Forums

Thai retail company Data advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Retail / E-commerce
  • Target Geography: Thailand
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team has identified that the threat actor “Omerta” is allegedly offering for sale a complete customer and order database belonging to a Thai retail company with annual revenues exceeding $6 million. The dataset reportedly covers the period from 2021 to the present and contains around 2.3 million records with detailed customer and transactional information. The exposed fields include full names, contact details, residential addresses, payment data, order history, discount amounts, product information, and company account identifiers. The listing indicates a starting price of $50,000, bidding increments of $500, and a blitz price of $75,000.

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously scouring for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to illicitly gain access and steal valuable data. Subsequently, the pilfered data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The threat actor “Omerta” has recently surfaced as a highly active entity involved in data leak operations. Trusted sources have linked the group to several security breaches, including unauthorized system intrusions and efforts to monetize stolen data on dark web marketplaces. Their ongoing activities reflect the persistent and growing cyber threats emerging from underground forums. These incidents emphasize the pressing need for organizations to enhance cybersecurity through continuous monitoring, robust threat intelligence, and proactive defense strategies to safeguard sensitive information and critical infrastructure.

Recommendations: Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related attacks.
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA Research team observed that a threat actor has allegedly breached and leaked the database of Kirkpatrick Partners, LLC, a well-known firm specializing in providing training evaluation models and consulting services worldwide. The data, which was posted on a dark web forum, reportedly contains 36,556 user records. Kirkpatrick Partners is a significant player in the corporate and organizational training sector, utilized by numerous multinational corporations, government agencies, and even military entities to measure the effectiveness of their educational programs. The exposure of their user database could have wide- ranging implications for their clients and the individuals whose information has been compromised.

The leaked dataset appears to be comprehensive, containing a vast amount of both personal and professional information. An analysis of the data structure and samples provided by the threat actor indicates that sensitive user details have been exposed. The breach could potentially affect individuals from various high-profile organizations who have engaged with Kirkpatrick Partners’ services, including employees from government, military, and corporate sectors. This incident highlights the persistent threat of data breaches against service providers that hold valuable information on behalf of a diverse and important client base.

The compromised data allegedly includes a wide array of user information. Among the exposed data fields are:

  • User login credentials (usernames and passwords)
  • Personal details, such as full names and phone numbers
  • Email addresses
  • Complete billing and shipping addresses (street, city, state, country, postcode)
  • Professional information, including company name, job title, and sector
  • Various account metadata and user settings

Source: Underground Forums

RECOMMENDATIONS

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Delay a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence, providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions, remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies and continuous evolution to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security control such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

Geography-Wise Graph

Industry-Wise Graph

For situational awareness, intelligence, and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.