Self Assessment

Weekly Intelligence Report – 12 September 2025

Published On : 2025-09-12
Share :
Weekly Intelligence Report – 12 September 2025

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware
Target Technologies: Windows

Introduction
CYFIRMA Research and Advisory Team has found EXTEN Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

EXTEN Ransomware.
Researchers identified a new ransomware variant called EXTEN. This malicious program encrypts files on compromised systems and alters their filenames by appending the “.EXTEN” extension. All affected files are rendered inaccessible after encryption. Once the encryption process is complete, EXTEN generates a ransom note titled “readme.txt.”

Screenshot of files encrypted by ransomware (Source: Surface Web)

The ransom note states that all data has been encrypted and can only be recovered by paying a ransom of 5 Bitcoin (BTC). The message provides a Bitcoin wallet address for the payment and instructs the victim to make further contact through the email address.

Victims are warned that failure to pay within five days will result in the public release of stolen data.

The appearance of EXTEN’s ransom note (“README.TXT”) (Source: Surface Web)

The ransom note also specifies several conditions for the victim. It explicitly instructs not to shut down or reboot infected devices and prohibits the use of recovery tools, claiming these actions could make decryption impossible.

Combined with the encryption behavior and the appended file extension, these elements define the operational characteristics of the EXTEN ransomware.

The following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Execution T1129 Shared Modules
Privilege Escalation T1055 Process Injection
Defense Evasion T1027.002 Obfuscated Files or Information: Software Packing
Defense Evasion T1027.005 Obfuscated Files or Information: Indicator Removal from Tools
Defense Evasion T1055 Process Injection
Defense Evasion T1564.003 Hide Artifacts: Hidden Window
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1614 System Location Discovery
Command and Control T1071 Application Layer Protocol

Relevancy and Insights:

  • The ransomware primarily affects the Windows operating system, which is commonly utilized in enterprise environments across multiple industries.
  • shadow copy deletion: The ransomware issues WMI commands to enumerate and remove Windows shadow copies. These shadow copies are used by the operating system for system restore and file recovery. By deleting them, the malware ensures victims cannot roll back to clean states or recover files through built-in features, increasing the pressure to comply with ransom demands.

ETLM Assessment:
CYFIRMA’s analysis of the EXTEN ransomware campaign highlights the ongoing evolution of ransomware groups in both scale and tactics. The appearance of this variant reflects a continuing trend where adversaries refine their methods to maximize disruption and leverage data exposure as an additional pressure mechanism. This suggests that such threats will remain a dominant force in the cybercrime ecosystem, targeting organizations across diverse industries that rely heavily on Windows-based infrastructure.

Given the ransom demands in cryptocurrency and the threat of data leakage, the operators are not only seeking direct financial gain but also exploiting the fear of reputational and regulatory damage. This dual-extortion model is becoming a defining characteristic of modern ransomware incidents, and EXTEN’s activity aligns with that trajectory. The ability to deny victims access to recovery options further increases the likelihood of payment, making these campaigns particularly damaging for enterprises with limited resilience strategies.

Looking forward, the tactics demonstrated in this campaign are expected to inspire copycat actors and the development of more sophisticated variants. Organizations can anticipate a rise in ransomware activity that blends traditional file encryption with aggressive data-handling practices, extending the impact beyond immediate financial losses to long-term operational and brand consequences.

Sigma rule:
title: Shadow Copies Deletion Using Operating Systems Utilities tags:
– attack.defense-evasion
– attack.impact
– attack.t1070
– attack.t1490 logsource:
category: process_creation product: windows
detection: selection1_img:
– Image|endswith:
– ‘\powershell.exe’
– ‘\pwsh.exe’
– ‘\wmic.exe’
– ‘\vssadmin.exe’
– ‘\diskshadow.exe’
– OriginalFileName:
– ‘PowerShell.EXE’
– ‘pwsh.dll’
– ‘wmic.exe’
– ‘VSSADMIN.EXE’
– ‘diskshadow.exe’ selection1_cli:
CommandLine|contains|all:
– ‘shadow’ # will match “delete shadows” and “shadowcopy delete” and “shadowstorage”
– ‘delete’
selection2_img:
– Image|endswith: ‘\wbadmin.exe’
– OriginalFileName: ‘WBADMIN.EXE’ selection2_cli:
CommandLine|contains|all:
– ‘delete’
– ‘catalog’
– ‘quiet’ # will match -quiet or /quiet selection3_img:
– Image|endswith: ‘\vssadmin.exe’
– OriginalFileName: ‘VSSADMIN.EXE’ selection3_cli:
CommandLine|contains|all:
– ‘resize’
– ‘shadowstorage’ CommandLine|contains:
– ‘unbounded’
– ‘/MaxSize=’
condition: (all of selection1*) or (all of selection2*) or (all of selection3*) fields:
– CommandLine
– ParentCommandLine falsepositives:
– Legitimate Administrator deletes Shadow Copies using operating systems utilities for legitimate reason
– LANDesk LDClient Ivanti-PSModule (PS EncodedCommand) level: high
(Source: Surface Web)

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.

STRATEGIC RECOMMENDATION

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATION

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATION

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Trending Malware of the Week

Type: Botnet | Objectives: Data Theft, Remote control, Data Exfiltration |Target Technologies: Windows OS, Web Browsers | Target Geography: Global

CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malwares that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week “NightshadeC2” is trending.

Overview of NightshadeC2 Malware
Researchers have identified NightshadeC2, a recently discovered botnet that leverages a loader designed to bypass security checks. It employs a method known as UAC Prompt Bombing to evade detection and make analysis more difficult. It has been observed in both C and Python variants, each maintaining communication with its operators through different channels. Once deployed, NightshadeC2 provides attackers with a wide range of capabilities, including remote command execution, reverse shell access, downloading and running additional files, self-deletion, keylogging, clipboard data collection, browser credential theft, screen capture, and hidden browsing activity. These functions make it a flexible tool for espionage, data theft, and persistent control over infected systems. The appearance of NightshadeC2, with its dual C and Python builds, highlights how threat actors continue to experiment with diverse approaches to create adaptable and resilient botnets capable of evading defenses and expanding their reach.

Attack Method
The NightshadeC2 campaign begins with deceptive entry points designed to trick victims into running malicious code. In this campaign, attackers leveraged the ClickFix vector, where individuals are shown a fake captcha and then prompted to enter a command into the Windows Run dialog. Alongside this, researchers also found the malware distributed through trojanized versions of popular software tools, including well-known programs like VPN clients, system utilities, and file search applications.

With initial access secured, the threat progresses through multiple stages to deliver its payload. The loader stage is responsible for downloading and activating the core malware. To secure its position, it repeatedly pushes a User Account Control (UAC) prompt until the victim approves, a tactic known as UAC Prompt Bombing. This not only forces user compliance but also sidesteps Microsoft Defender protections and disables analysis environments, allowing the malware to slip through unnoticed. Persistence is then achieved by modifying registry entries, ensuring the malware launches automatically on system restart.

The payload stage delivers the full NightshadeC2 botnet. At this point, it gathers basic information about the device—such as system details, user identity, and location—before reporting back to its command-and-control server. Once communication is established, NightshadeC2 enables attackers to take complete control, with capabilities including keylogging, clipboard monitoring, reverse shells, hidden browsing, and credential theft from major web browsers. While most samples observed are compiled in C, a Python variant has also been identified, offering a slimmer but still functional version of the malware. Some versions even leverage Steam profiles to disguise and update their command servers dynamically.

Further analysis revealed that NightshadeC2 employs multiple privilege escalation tricks, including older bypasses of Windows’ UAC mechanism, making it adaptable across different operating system versions. These combined methods—stealthy entry, forced privilege acceptance, layered execution, and versatile payload delivery—demonstrate the botnet’s sophisticated approach to infiltration and persistence.

Following are the TTPs based on the MITRE Attack Framework for Enterprise

Tactic Technique ID Technique Name
Execution T1059 Command and Scripting Interpreter
Execution T1204 User Execution
Execution T1129 Shared Modules
Execution T1106 Native API
Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation T1055 Process Injection
Privilege Escalation T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control
Defense Evasion T1562.001 Impair Defenses: Disable or Modify Tools
Defense Evasion T1036 Masquerading
Defense Evasion T1055 Process Injection
Defense Evasion T1497 Virtualization/Sandbox Evasion
Defense Evasion T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control
Defense Evasion T1070.004 Indicator Removal: File Deletion
Credential Access T1056.001 Input Capture: Keylogging
Credential Access T1555.003 Credentials from Password Stores: Credentials from Web Browsers
Discovery T1016 System Network Configuration Discovery
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1497 Virtualization/Sandbox Evasion
Collection T1056.001 Input Capture: Keylogging
Collection T1113 Screen Capture
Command and Control T1071 Application Layer Protocol
Command and Control T1105 Ingress Tool Transfer
Command and Control T1571 Non-Standard Port

INSIGHTS

  • NightshadeC2 stands out because of how it blends multiple distribution methods, making its entry into victim systems unpredictable and harder to defend against. Instead of relying on a single infection route, it appears both through social engineering tricks like the ClickFix vector and through tampered versions of everyday software tools. This variety ensures that different types of users—ranging from casual home users to professionals downloading legitimate utilities—can all be unwittingly exposed, giving the campaign a broader reach than malware that depends on one narrow entry point.
  • By abusing User Account Control prompts in a way that essentially forces victims to approve its actions, it not only bypasses Microsoft Defender but also disrupts automated security sandboxes. This means analysts studying the malware may see incomplete behavior, allowing the threat to slip by unnoticed. Such evasion techniques highlight how the operators behind NightshadeC2 think beyond simple infection, designing it to frustrate both end users and security researchers alike.
  • Finally, NightshadeC2’s dual presence in C and Python form reveals something about the attackers’ priorities. The C variant delivers the full suite of spying and control functions, while the Python version strips down the capabilities but offers greater flexibility and stealth due to lower detection rates. This suggests the operators are experimenting with different builds to suit different campaigns, using the heavier variant where full control is needed and the lighter one in situations that demand discretion. The coexistence of these builds reflects a deliberate strategy to maintain adaptability in the face of diverse security environments.

ETLM ASSESSMENT
From the ETLM perspective, CYFIRMA anticipates that as malware like NightshadeC2 continues to evolve, techniques such as ClickFix could turn ordinary digital interactions into hidden points of compromise, where even a routine captcha or prompt might trigger infection. By exploiting familiar tools and everyday actions, attackers may increasingly spread threats across interconnected systems, software supply chains, and widely used platforms, targeting multiple browsers and potentially reaching users in broader regions. Over time, the combination of stealthy malware and deceptive techniques could reshape how people interact with digital interfaces, making awareness of hidden threats an essential part of navigating everyday technology.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

YARA Rule
rule NightshadeC2_Indicators
{
meta:
description = “Detects NightshadeC2 malware indicators” author = “CYFIRMA”
malware_family = “NightshadeC2”
strings:

// SHA256 File Hashes
$sha256_1 = “8940944e4abc600b283703876def0403160a5109abdbcb9e97c488dc3cc59b94”
$sha256_2 = “39b40746de01af66c0e5ce5888df4c42e474adcdb4301275b1474423d7a0ff1f”
$sha256_3 = “f2ff4cbcd6d015af20e4e858b0f216c077ec6d146d3b2e0cbe68b56b3db7a0be”
$sha256_4 = “0c08b5f3c24841d5fe02ddebdcf4707a75c790916c3ad4c769108241ddf999e4”
$sha256_5 = “c4fd98db8d8181d949ee4ff47991dda70f73b47c72104aa519150223dd8d3588”
$sha256_6 = “cf0c7e0f3c3ea60da7bfe779f09d32b441d5089c905a5d905253e2f4b2b202fd”
$sha256_7 = “0fd7eb57f5f9d817dd497c1ce3be0791f5e798077f8dc2c3a4e2b2b0b0bdc2c6”
$sha256_8 = “1178fa21928e5aac0f320e18bfb15603e00d3b8874719f4e74dd4f49db6dc5a8”
$sha256_9 = “1ff6ee23b4cd9ac90ee569067b9e649c76dafac234761706724ae0c1943e4a75”
$sha256_10 = “26a5e18d6ac86a865250452528664d4cde74187d741fcf98370efb34d4219490”
$sha256_11 = “2fcb76dfdfcd390658bbc032faafef607804d5d4a2f1c0005f274ab2e06d8af4”
$sha256_12 = “3dd877835c04fde3f2d14ce96f23a1c00002fefa9d731e8c4ce3b656aac90063”
$sha256_13 = “420f13538c0c2620eba396e96afdf36430b2618d7d215e96c81444379ab8a7bc”
$sha256_14 = “5a741df3e4a61b8632f62109a65afc0f297f4ed03cd7e208ffd2ea5e2badf318”
$sha256_15 = “e77bc95772ae84e5ecf68c928059cab3e305f92b1518d0ec3f8a7eb6eb728503”
$sha256_16 = “24934295a5824ef8ec8df1df9ee5bc719bb98e9b6b55b2cbbb02498782762cc5”
$sha256_17 = “0e9d984f980ceffb846946a8926e1d69abf2d07a6b710b8f8c802026ba3bbdb4”
$sha256_18 = “05a4f648099d0b35d6eb4662266b1046d4691bb8e739a4fd4e4e55e69774ef1f”
$sha256_19 = “21497a0eb89f321f971b4346880b43b342df131c431788cff4685c5a5a71b53e”
$sha256_20 = “cbee972115b129ed3ce366217321a6f431ab86d9bf61c90ef7d224f1004a672c”
$sha256_21 = “375229df144b3fb0d0560d90b06aa7fe34825886069653a088fa4071476cf63e”
$sha256_22 = “ce2ad8b6d76ba03c96d9248ac3d22590801e00611244c1942875adf52c154971”
$sha256_23 = “7ce399ae92c3e79a25e9013b2c81fe0add119bda0a65336d1e5c231654db01a5”
$sha256_24 = “05d2d06143d363c1e41546f14c1d99b082402460ba4e8598667614de996d2fbc”
$sha256_25 = “94dc0f696a46f3c225b0aa741fbd3b8997a92126d66d7bc7c9dd8097af0de52a”
$sha256_26 = “58d54e2454be3e4e9a8ea86a3f299a7a60529bc12d28394c5bdf8f858400ff7b”
$sha256_27 = “53775af67e9df206ed3f9c0a3756dbbc4968a77b1df164e9baddb51e61ac82df”
$sha256_28 = “6d62210addb8268d0bd3e6ef0400d54c84e550ccad49f5867fdc51edc0c1db2c”
$sha256_29 = “282fa3476294e2b57aa9a8ab4bc1cc00f334197298e4afb2aae812b77e755207”
$sha256_30 = “a2feb262a667de704e5e08a8a705c69bbcc806e0d52f0f8e3f081a6aa6c8d7b4”
$sha256_31 = “85b4d29f2830a3be3a0f51fbe358bea1a35d2a8aaa6a24f5cc1f2e5d2769716e”
$sha256_32 = “04a1852aed5734d8aaf97730a7231272f103605a4f83ea8413abe6f8169aee4c”

// IP Addresses
$ip_1 = “185.208.158.250”
$ip_2 = “104.225.129.171”
$ip_3 = “34.72.90.40”
$ip_4 = “94.141.122.164”
$ip_5 = “64.52.80.82”
$ip_6 = “102.135.95.102”
$ip_7 = “178.17.57.102”
$ip_8 = “185.149.146.118”
$ip_9 = “185.149.146.1”
$ip_10 = “180.178.189.17”
$ip_11 = “195.201.108.189”
$ip_12 = “77.238.241.203”
$ip_13 = “5.35.44.176”
$ip_14 = “180.178.122.131”
$ip_15 = “91.202.233.250”
$ip_16 = “45.61.136.81”
$ip_17 = “45.11.180.174”
$ip_18 = “91.202.233.132”
$ip_19 = “107.158.128.90”
$ip_20 = “107.158.128.45”
$ip_21 = “170.130.165.28”
$ip_22 = “91.202.233.251”
$ip_23 = “79.132.130.142”
$ip_24 = “173.232.146.90”

// Domains
$domain_1 = “bioomx.com”
$domain_2 = “boiksal.com”
$domain_3 = “bkkil.com”
$domain_4 = “biosefjk.com”
$domain_5 = “bioakw.com”
$domain_6 = “bikbal.com”
$domain_7 = “bilaskf.com”
$domain_8 = “bliokdf.com”
$domain_9 = “tdbfvgwe456yt.com”
$domain_10 = “programsbookss.com”

// URLs
$url_1 = “http://www.ip-api.com/line/?fields=147457”
$url_2 = “http://www.ip-api.com/line/?fields=147505”
$url_3 = “http://www.ip-api.com/line/?fields=16385”
condition:
any of ($sha256*) or any of ($ip*) or
any of ($domain*) or any of ($url*)
}

Recommendations:

STRATEGIC:

  • Maintain an up-to-date inventory of all active software used within the organization and perform regular self-audit of workstations, servers, laptops, mobile devices to identify unauthorized/ restricted software.
  • Deploy a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Configure organization’s intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defence mechanisms in place to alert on — and upon review, consider blocking connection attempts to and from — the external IP addresses and domains listed in the appendix.

MANAGEMENT:

  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.
  • Move beyond the traditional model of security awareness towards Improved Simulation and training exercises that mimic real attack scenarios, account for behaviors that lead to a compromise, and are measured against real attacks the organization receives.

TACTICAL RECOMMENDATIONS

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Use multi-factor authentication (MFA) to mitigate credential theft and prevent attacker access. Keep MFA always-on for privileged accounts and apply risk-based MFA for normal accounts.
  • Evaluate the security and reputation of each piece of open-source software or utilities before usage.
  • Add the Yara rules for threat detection and monitoring, which will help to detect anomalies in log events and identify and monitor suspicious activities.

CYFIRMA’S WEEKLY INSIGHTS

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Vulnerabilities & Exploits, Malware implant, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Qilin Ransomware, Dire Wolf Ransomware | Malware – NightshadeC2
  • Qilin Ransomware– One of the ransomware groups.
  • Dire Wolf Ransomware – One of the ransomware groups.
    Please refer to the trending malware advisory for details on the following:
  • Malware – NightshadeC2
    Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

FANCY BEAR: Unmasking a Decade of State-Sponsored Cyber Espionage

  • Threat Actor: FANCY BEAR aka APT28
  • Attack Type: Connection Proxy, Credential Dumping, Footprint deletion, Malware Implant, Social Engineering Attack, Timestomping, Exploitation of Vulnerabilities
  • Objective: Information theft, Espionage, Long-Term Persistence & Stealth
  • Suspected Target Technology: Microsoft Outlook, Office Suites Software, Operating System (Windows, Linux Kernel, Android), Web Application, Oracle Java SE, Adobe Flash Player, Apache Server
  • Suspected Target Geography: Afghanistan, Brazil, Cambodia, France, Georgia, Germany, India, Indonesia, Kazakhstan, Malaysia, Moldova, Pakistan, Romania, Russia, South Africa, Syria, Thailand, Turkey, Ukraine, United States, Vietnam, Australia, Mexico
  • Suspected Target Industries: Aerospace & Defense, Capital Goods, Critical Infrastructure, Crypto, Defense, Energy, Energy Equipment & Services, Government, Information Technology, Military, NGO, Telecommunications, Utilities, Banking & Investment Services
  • Business Impact: Compromised user accounts, Data Theft, Operational Disruption, Reputational Damage

About the Threat Actor
FANCY BEAR is a Russian state-sponsored hacking group active since 2007, widely linked to Russian military intelligence. Known for cyber-espionage and political interference, including election-related operations, the group targets governments, corporations, and media worldwide. They exploit software vulnerabilities to gain access, extract credentials using custom and public tools, and deploy tailored malware. To evade detection, they delete system logs, manipulate file timestamps, and route command traffic through compromised systems. Their campaigns are highly targeted and align closely with Russian strategic objectives, reflecting advanced technical skill and a deep understanding of both offensive tactics and stealthy persistence.

Details on Exploited Vulnerabilities

CVE ID Affected Products CVSS Score Exploit Links
CVE-2017-11882 Microsoft Office 7.8 Link
CVE-2021-4034 pkexec application 7.8 Link 1, Link 2
CVE-2016-5195 Linux kernel 7.0 Link1, Link2, Link3, Link4, Link5, and Link6
CVE-2020-0688 Microsoft Exchange 8.8 Link 1 and Link 2

TTPs based on MITRE ATT&CK Framework

Tactic ID Technique
Reconnaissance T1591 Gather Victim Org Information
Reconnaissance T1595.002 Active Scanning: Vulnerability Scanning
Reconnaissance T1589.001 Gather Victim Identity Information: Credentials
Reconnaissance T1598.003 Phishing for Information: Spear phishing Link
Reconnaissance T1596 Search Open Technical Databases
Resource Development T1583.001 Acquire Infrastructure: Domains
Resource Development T1583.003 Acquire Infrastructure: Virtual Private Server
Resource Development T1583.006 Acquire Infrastructure: Web Services
Resource Development T1586.002 Compromise Accounts: Email Accounts
Resource Development T1584.008 Compromise Infrastructure: Network Devices
Resource Development T1588.002 Obtain Capabilities: Tool
Initial Access T1189 Drive-by Compromise
Initial Access T1190 Exploit Public-Facing Application
Initial Access T1133 External Remote Services
Initial Access T1091 Replication Through Removable Media
Initial Access T1199 Trusted Relationship
Initial Access T1078 Valid Accounts
Initial Access T1078.004 Valid Accounts: Cloud Accounts
Initial Access T1566.001 Phishing: Spear phishing Attachment
Execution T1204.001 User Execution: Malicious Link
Execution T1203 Exploitation for Client Execution
Execution T1559.002 Inter-Process Communication: Dynamic Data Exchange
Execution T1204.002 User Execution: Malicious File
Persistence T1098.002 Account Manipulation: Additional Email Delegate Permissions
Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Persistence T1037.001 Boot or Logon Initialization Scripts: Logon Script (Windows)
Persistence T1546.015 Event Triggered Execution: Component Object Model Hijacking
Persistence T1133 External Remote Services
Persistence T1137.002 Office Application Startup: Office Test
Persistence T1542.003 Pre-OS Boot: Bootkit
Persistence T1505.003 Server Software Component: Web Shell
Persistence T1078 Valid Accounts
Persistence T1078.004 Valid Accounts: Cloud Accounts
Privilege Escalation T1134.001 Access Token Manipulation: Token Impersonation/Theft
Privilege Escalation T1098.002 Account Manipulation: Additional Email Delegate Permissions
Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation T1037.001 Boot or Logon Initialization Scripts: Logon Script (Windows)
Privilege Escalation T1546.015 Event Triggered Execution: Component Object Model Hijacking
Privilege Escalation T1078.004 Valid Accounts: Cloud Accounts
Defense Evasion T1134.001 Access Token Manipulation: Token Impersonation/Theft
Defense Evasion T1564.001 Hide Artifacts: Hidden Files and Directories
Defense Evasion T1564.003 Hide Artifacts: Hidden Window
Defense Evasion T1070.001 Indicator Removal: Clear Windows Event Logs
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1070.006 Indicator Removal: Timestomp
Defense Evasion T1036 Masquerading
Defense Evasion T1036.005 Masquerading: Match Legitimate Resource Name or Location
Defense Evasion T1027.013 Obfuscated Files or Information: Encrypted/Encoded File
Defense Evasion T1542.003 Pre-OS Boot: Bootkit
Defense Evasion T1014 Rootkit
Defense Evasion T1218.011 System Binary Proxy Execution: Rundll32
Defense Evasion T1221 Template Injection
Defense Evasion T1550.001 Use Alternate Authentication Material: Application Access Token
Defense Evasion T1550.002 Use Alternate Authentication Material: Pass the Hash
Defense Evasion T1078.004 Valid Accounts: Cloud Accounts
Credential Access T1557.004 Adversary-in-the-Middle: Evil Twin
Credential Access T1110 Brute Force
Credential Access T1110.001 Brute Force: Password Guessing
Credential Access T1110.003 Brute Force: Password Spraying
Credential Access T1056.001 Input Capture: Keylogging
Credential Access T1040 Network Sniffing
Credential Access T1003 OS Credential Dumping
Credential Access T1003.001 OS Credential Dumping: LSASS Memory
Credential Access T1528 Steal Application Access Token
Discovery T1083 File and Directory Discovery
Discovery T1040 Network Sniffing
Discovery T1120 Peripheral Device Discovery
Discovery T1057 Process Discovery
Lateral Movement T1210 Exploitation of Remote Services
Lateral Movement T1091 Replication Through Removable Media
Lateral Movement T1550.001 Use Alternate Authentication Material: Application Access Token
Lateral Movement T1550.002 Use Alternate Authentication Material: Pass the Hash
Collection T1557.004 Adversary-in-the-Middle: Evil Twin
Collection T1560 Archive Collected Data
Collection T1119 Automated Collection
Collection T1213 Data from Information Repositories
Collection T1213.002 Data from Information Repositories: Sharepoint
Collection T1005 Data from Local System
Collection T1039 Data from Network Shared Drive
Collection T1025 Data from Removable Media
Collection T1074.002 Data Staged: Remote Data Staging
Collection T1114.002 Email Collection: Remote Email Collection
Collection T1056.001 Input Capture: Keylogging
Collection T1113 Screen Capture
Command and Control T1001.001 Data Obfuscation: Junk Data
Command and Control T1071.001 Application Layer Protocol: Web Protocols
Command and Control T1071.003 Application Layer Protocol: Mail Protocols
Command and Control T1092 Communication Through Removable Media
Command and Control T1573.001 Encrypted Channel: Symmetric Cryptography
Command and Control T1105 Ingress Tool Transfer
Command and Control T1090.002 Proxy: External Proxy
Command and Control T1090.003 Proxy: Multi-hop Proxy
Command and Control T1102.002 Web Service: Bidirectional Communication
Exfiltration T1030 Data Transfer Size Limits
Exfiltration T1048.002 Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non- C2 Protocol
Impact T1498 Network Denial of Service

Latest Developments Observed
The threat actor is suspected of exploiting Microsoft Outlook by deploying a newly identified backdoor, referred to as NotDoor. This malware enables adversaries to exfiltrate sensitive data, upload malicious files, and remotely execute commands on compromised systems. The campaign’s primary objective appears to be the theft of confidential information, with social engineering techniques leveraged as the initial entry point into targeted environments.

ETLM Insights
APT28, along with other Russian state-sponsored and cybercriminal groups operating under the umbrella of Russian intelligence (GRU)-linked campaigns, is closely associated with cyber-espionage, disinformation operations, ransomware deployment, and disruptive attacks against governments, critical infrastructure, defense, energy, and financial sectors. The threat actor consistently aligns their operations with Russian state interests, supporting military, diplomatic, and geopolitical objectives through sustained espionage and influence campaigns. Looking ahead, the group may expand its focus toward supply- chain compromises and infrastructure targeting, underscoring continued strategic investment in advanced cyber capabilities to shape global political and military outcomes.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

YARA Rules
rule FancyBear_IOCs_Match
{
meta:
author = “CYFIRMA”
description = “Detects IOC artifacts associated with Fancy Bear” date = “2025-09-09”
threat_actor = “FANCY BEAR / APT28” strings:
// CVEs as text (if present in code, comments, exploit kits, etc.)
$cve1 = “CVE-2017-11882”
$cve2 = “CVE-2021-4034”
$cve3 = “CVE-2016-5195”
$cve4 = “CVE-2020-0688”
$cve5 = “CVE-2023-32315”
$cve6 = “CVE-2021-44228”
$cve7 = “CVE-2018-13379”
$cve8 = “CVE-2023-23397”
$cve9 = “CVE-2020-1472”
$cve10 = “CVE-2023-38831”
$cve11 = “CVE-2018-8174”
$cve12 = “CVE-2020-2021”
$cve13 = “CVE-2020-5902”
$cve14 = “CVE-2014-4114”
$cve15 = “CVE-2020-15505”
$cve16 = “CVE-2019-19781”
$cve17 = “CVE-2022-30190”
$cve18 = “CVE-2022-38028”
$cve19 = “CVE-2024-21412”
$cve20 = “CVE-2022-21587”
$cve21 = “CVE-2021-1675”
$cve22 = “CVE-2020-1380”
$cve23 = “CVE-2023-27350”
$cve24 = “CVE-2012-0158”
$cve25 = “CVE-2009-3129”
$cve26 = “CVE-2021-22555”
$cve27 = “CVE-2023-36025”
$cve28 = “CVE-2023-27351”
$cve29 = “CVE-2023-27992”
$cve30 = “CVE-2015-2545”
$cve31 = “CVE-2023-32231”
$cve32 = “CVE-2019-11510”
$cve33 = “CVE-2014-1761”
// IPs
$ip1 = “208.91.197.27”
$ip2 = “127.0.0.1”
$ip3 = “198.49.23.177”
$ip4 = “50.7.210.226”
$ip5 = “185.220.101.143”
$ip6 = “142.250.31.102”
// Domains
$domain1 = “jinjinpig.co.kr”
$domain2 = “cloud-mail.ink”
$domain3 = “background-services.net”
$domain4 = “futuresfurnitures.com”
// Suspicious Files
$file1 = “win32 exe”
$file2 = “hrm3jvh9v.dll”
$file3 = “ruodjxk.exe” condition:
any of ($cve*) or any of ($ip*) or any of ($domain*) or any of ($file*)
}

Recommendations Strategic

  • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
  • Assess and deploy alternatives for an advanced endpoint protection solution that provides detection/prevention for malware and malicious activities that do not rely on signature-based detection methods.
  • Block exploit-like behaviour. Monitor endpoints memory to find behavioural patterns that are typically exploited, including unusual process handle requests. These patterns are features of most exploits, whether known or new. This will be able to provide effective protection against zero-day/critical exploits and more by identifying such patterns.

Management

  • Invest in user education and implement standard operating procedures for the handling of financial and sensitive data transactions commonly targeted by impersonation attacks. Reinforce this training with context-aware banners and in-line prompts to help educate users.
  • Develop a cyber threat remediation program and encourage employee training to detect anomalies proactively.

Tactical

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening the defence based on the tactical intelligence provided.
  • For better protection coverage against email attacks (like spear phishing, business email compromise, or credential phishing attacks), organizations should augment built-in email security with layers that take a materially different approach to threat detection.
  • Protect accounts with multi-factor authentication. Exert caution when opening email attachments or clicking on embedded links supplied via email communications, SMS, or messaging.
  • Apply security measures to detect unauthorized activities, protect sensitive production, and process control systems from cyberattacks.
  • Add the YARA rules for threat detection and monitoring, which will help to detect anomalies in log events, identify, and monitor suspicious activities.

3. Major Geopolitical Developments in Cybersecurity

Salt Typhoon updates, and China spying on US policymakers
Global media have recently reported that the Chinese cyberespionage campaign, dubbed Salt Typhoon, may have collected data on every American. The operation’s scope was unprecedented, sweeping up information from a wide range of U.S. sectors, including telecommunications, government, transportation, lodging, and military infrastructure networks. In response, several Western allies—including the U.S., U.K., Canada, Finland, Germany, Italy, Japan, and Spain—issued a joint “name-and-shame” statement last week. They publicly linked the Salt Typhoon campaign to Chinese technology companies that have ties to Beijing’s People’s Liberation Army and Ministry of State Security.

In another news, it was reported that during trade talks with China in July, Chinese hackers impersonated a U.S. lawmaker to target U.S. individuals and organizations. The hackers posed as the China committee chair and sent malicious attachments to trade groups, law firms, and government agencies. These attachments contained malware linked to a well-known Chinese threat actor, APT41. The goal of this operation was likely to gain an advantage in the trade negotiations by gathering inside information. It is still unclear whether any of the targeted entities were successfully breached.

ETLM Assessment:
As noted by CYFIRMA in a recent report, the Salt Typhoon campaigns mark a significant evolution in China’s cyber strategy, from economic espionage to politically-driven operations that threaten Western critical infrastructure. Salt Typhoon’s infiltration of telecommunications networks and Volt Typhoon’s sabotage preparations in U.S. sectors like energy and transportation reveal China’s intent to dominate cyberspace, exploiting vulnerabilities in the U.S.’s fragmented cybersecurity framework. These campaigns, leveraging sophisticated techniques and plausible deniability, pose significant risks to national security, from compromised communications to potential disruptions of military and civilian operations. The structural advantages of China’s authoritarian cyber defense model, contrasted with the U.S.’s decentralized approach, underscore the challenges of securing privately owned systems against a state-backed actor with vast resources. As China’s cyber capabilities grow more sophisticated and disruptive, Western nations must confront the reality of a new threat landscape, where digital vulnerabilities could reshape geopolitical outcomes and challenge the resilience of open societies.

Undersea cable cuts disrupt the Internet in the Middle East and Asia
Multiple undersea internet cables have been severed in the Red Sea, causing widespread disruption to internet access across parts of Asia and the Middle East. According to researchers, the incident impacted the SMW4 and IMEWE cable systems near Jeddah, Saudi Arabia. The damage has led to degraded connectivity in several countries, including India, Pakistan, and the UAE. Infrastructure operators confirmed that internet traffic routed through the Middle East may experience increased latency due to the cuts. The cause of the damage is currently unknown. While some have previously accused the Houthis of targeting subsea cables, the group has denied these allegations.

ETLM Assessment:
CYFIRMA warned about this scenario in a report published last year. In the report, we note that although the threat from non-state actors like the Houthis cannot be dismissed, non-state actors will probably be less likely and less capable of causing harm to the networks and operating systems that submarine cables depend on. Accidental damage caused by fishing boats or ship anchors will continue to be a hazard, however, the physical infrastructure is always at risk from highly capable state-sponsored actors, and the same goes for the cyber threat to the management systems.

Besides physical threats, there’s always the risk of cyber or network attacks. By hacking into the network management systems that private companies use to manage data traffic passing through the cables, malicious actors could disrupt data flows. A “nightmare scenario” would involve a hacker gaining control, or administrative rights, of a network management system: at that point, physical vulnerabilities could be discovered, disrupting or diverting data traffic, or even executing a “kill click” (deleting the wavelengths used to transmit data). The potential for sabotage or espionage is quite clear – and according to reports, the security of many of the network management systems is not up to date.

4. Rise in Malware/Ransomware and Phishing

Qilin Ransomware Impacts Osaki Medical

  • Attack Type: Ransomware
  • Target Industry: Healthcare
  • Target Geography: Japan
  • Ransomware: Qilin Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Japan, Osaki Medical(https[:]//www[.]osakimedical[.]co[.]jp/), was compromised by Qilin Ransomware. Osaki Medical is a Japanese company that manufactures and markets safe, functional, and cost-effective medical supplies, sanitary materials, cosmetics, and medical equipment for the medical and nursing care industries. The ransomware group allegedly infiltrated Osaki Medical’s network and exfiltrated approximately 113 GB of data. The stolen information is reported to include multiple databases, supply chain management (SCM) records, customer relationship management (CRM) data, personal details, sales and logistics information, product-related files, internal correspondence, and other sensitive business data. The attackers have issued a warning that Osaki Medical must contact them before the countdown expires, claiming that failure to do so will leave the company with no alternative means of recovering its data or protecting its business operations.

Source: Dark Web

Relevancy & Insights:

  • The Qilin Ransomware group primarily targets countries such as the United States of America, Canada, France, the United Kingdom, and Italy.
  • The Qilin Ransomware group primarily targets industries, including Manufacturing, Professional Goods & Services, Healthcare, Information Technology, and Consumer Goods & Services.
  • Based on the Qilin Ransomware victims list from 1st Jan 2025 to 10th September 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Qilin Ransomware victims list from 1st Jan 2025 to 10th September 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Qilin ransomware poses a significant threat to organizations of all sizes. Its evolving tactics, including double extortion (data encryption and leak threats), cross-platform capabilities (Windows and Linux, including VMware ESXi), and focus on speed and evasion, make it a particularly dangerous actor.

Dire Wolf Ransomware Impacts the Purwana Group

  • Attack Type: Ransomware
  • Target Industry: Food & Beverage
  • Target Geography: Indonesia
  • Ransomware: Dire Wolf Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary: From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Indonesia, Purwana Group (https[:]//bahanagv[.]co[.]id), was compromised by Dire Wolf Ransomware. Purwana Group is a diversified Indonesian business conglomerate with major activities in coffee production, beverage distribution, and agricultural exports, serving local and international markets. The compromised data reportedly includes financial records, tax information, customer details, and subsidiary-related files. The affected entities span multiple group companies, including PT. Bahana Genta Viktory, PT. Bahana Gourmet Indonesia, PT. Balindo Mitra Perkasa, PT. Cipta Artha Victory, PT. Espressa Illindo, PT. Karsa Murni Centra Satya, PT. Karsa Victa Satya, PT. Parama Mandyadana, PT. UCC and PT. Victo Oro Prima. In total, the volume of exposed data is estimated to be around 40 GB.

Source: Dark Web

Relevancy & Insights:

  • Dire Wolf is a newly emerged ransomware group that surfaced in May 2025. It operates an onion-based data leak site (DLS) where it posts information about its victims, including file trees, sample files, and descriptions of stolen data.
  • Dire Wolf ransomware combines Curve25519 key exchange with ChaCha20 encryption— resulting in efficient, strong file encryption unique per victim, with no current method for decryption without the attackers’ assistance.
  • The Dire Wolf Ransomware group primarily targets countries such as Singapore, the United Kingdom, Taiwan, Turkey, and Thailand.
  • The Dire Wolf Ransomware group primarily targets industries, including Professional Goods & Services, Manufacturing, Information Technology, Consumer Goods & Services, and Real Estate & Construction.
  • Based on the Dire Wolf Ransomware victims list from 1st Jan 2025 to 10th September 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Dire Wolf Ransomware victims list from 1st Jan 2025 to 10th September 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Dire Wolf is a newly identified ransomware group that emerged in May 2025, distinguished by its use of double-extortion tactics combining data encryption with data theft and threats of public exposure via an onion- based leak site. The group appears to operate solely for financial gains, without ideological motives. Its emergence highlights the evolving nature of ransomware threats in 2025, particularly the increased reliance on data exfiltration to amplify extortion efforts. These activities reinforce the urgent need for strong cybersecurity defenses and effective incident response strategies across all sectors.

5. Vulnerabilities and Exploits

Vulnerability in cJSON

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Universal components
  • Vulnerability: CVE-2025-57052
  • CVSS Base Score: 9.8 Source
  • Vulnerability Type: Out-of-bounds read
  • Summary: The vulnerability allows a remote attacker to gain access to potentially sensitive information.

Relevancy & Insights:
The vulnerability exists due to a boundary condition within the decode_array_index_from_pointer() function in cJSON_Utils.c.

Impact:
A remote attacker can trigger an out-of-bounds read error and read the contents of memory on the system.

Affected Products:
https[:]//x-0r[.]com/posts/cJSON-Array-Index-Parsing- Vulnerability

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies, due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerabilities in cJSON, a lightweight C library for parsing and printing JSON, can expose applications to security risks. Exploitation of such flaws may lead to denial of service (DoS), memory corruption, or, in some cases, remote code execution, depending on how the library is integrated into the application. Since cJSON is widely used in embedded systems, IoT devices, and applications requiring fast JSON handling, these vulnerabilities can have a broad impact.

6. Latest Cyber-Attacks, Incidents, and Breaches

Desolator Ransomware attacked and published the data of Tri Thuc Software

  • Threat Actor: Desolator Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Information Technology
  • Target Geography: Vietnam
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that Desolator Ransomware attacked and published the data of the Tri Thuc Software (https[:]//banquyenphanmem[.]com/) on its dark web website. Tri Thuc software specializes in providing a wide range of software solutions, including graphic design, data recovery, network management, and office applications. The data leak, following the ransomware attack, encompasses sensitive and confidential records originating from the organizational database. The data leak resulting from the ransomware attack includes application source code, internal company documents, and backup files, along with highly confidential and sensitive information. In total, the volume of exposed data is estimated to be around 1.4 terabytes.

Source: Dark Web

Relevancy & Insights:
Desolator Ransomware is a recently emerged ransomware group active in 2025, known for targeting organizations with data encryption, extortion, and demands for payment to restore access to encrypted files.

ETLM Assessment:
According to CYFIRMA’s assessment, Desolator Ransomware is an active player within the global ransomware landscape in 2025. The group employs aggressive tactics that have driven widespread operational disruptions across multiple industries. Desolator is characterized as a sophisticated and continuously evolving threat, with particular risk to enterprise environments where its impact can be especially severe.

7. Data Leaks

South Korean Big Data Platform Textom’s Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: Information Technology
  • Target Geography: South Korea
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed that a threat actor “Krekti” has allegedly put the database and platform access for Textom, a big data analysis and text mining platform, up for sale on a dark web forum. The victim, Textom, was developed by The IMC Inc., a company based in South Korea. The platform is known for its capabilities in collecting, processing, and analyzing unstructured text data from various online sources, making it a valuable tool for research, marketing, policy analysis, and business intelligence. The threat actor is asking for $30,000 in exchange for the compromised data and access.

The sensitive information allegedly exposed in the breach is extensive, containing multiple databases with personally identifiable information (PII) of the platform’s users. The shared samples suggest the leak includes user authentication details, payment records, and detailed personal profiles. A significant portion of the users appears to be associated with academic and research institutions in South Korea. The leak also reportedly contains YouTube API keys used by the platform.

The allegedly leaked data includes:

  • User access tokens and refresh tokens
  • Payment and transaction details
  • Full names, dates of birth, email addresses, phone numbers, and physical addresses
  • Hashed passwords
  • YouTube API keys
  • User activity logs and data processing information

Source: Underground Forums

Philippines’ Top Science Academy (NAST DOST) Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Science, Technology, and Innovation (STI) Governance
  • Target Geography: Philippines
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team has identified that a threat actor “Terror” has allegedly put a database belonging to the National Academy of Science and Technology of the Philippines (NAST DOST) up for sale on a dark web forum. NAST DOST serves as the Philippines’ premier recognition and advisory body on science and technology, playing a crucial role in the nation’s scientific development and policymaking. The breach could potentially expose sensitive information related to the country’s top scientists and governmental scientific affairs.

According to the forum post, the threat actor claims to have obtained a large collection of sensitive information from a recent breach. The seller asserts that the database, organized in CSV/SQL format, has been verified for accuracy. The allegedly compromised data includes a variety of personally identifiable information.

The breach allegedly includes:

  • Emails
  • Database of Datafile
  • Passwords
  • Usernames
  • Full names

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously scouring for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to illicitly gain access and steal valuable data. Subsequently, the pilfered data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The threat actor identified as “Krekti” has recently gained attention as a highly active group specializing in data leaks. Reliable sources have connected the group to multiple security breaches involving unauthorized system access and the attempted sale of exfiltrated data on dark web marketplaces. Krekti’s ongoing operations highlight the evolving and persistent nature of cyber threats emerging from underground forums. These incidents underscore the critical importance for organizations to strengthen their cybersecurity posture through continuous monitoring, advanced threat intelligence, and proactive defense strategies to protect sensitive data and infrastructure.

Recommendations: Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related attacks.
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA Research team observed that the Onno Center International Foundation, an Indonesian non-profit organization dedicated to advancing Information and Communication Technology (ICT) education, has allegedly been targeted in a data breach. A threat actor “N1KA” has claimed responsibility for the attack and has leaked a database containing the information of over 7,100 users on a cybercrime forum. The Onno Center is a key organization in Indonesia, focusing on improving the tech skills and knowledge of communities, especially in rural areas, to prepare them for the competitive workforce.

The leaked data allegedly exposes a significant amount of personally identifiable information (PII) from the organization’s user database. The compromised information reportedly includes sensitive user details that could be exploited for further malicious activities such as phishing, identity theft, and other cybercrimes. The threat actor shared a sample of the data to validate their claims.

The database allegedly contains the following types of information:

  • User IDs
  • Usernames and real names
  • Email addresses
  • Hashed passwords
  • User tokens
  • Registration and password expiration dates

Source: Underground Forums

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Delay a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies and continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security control such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

Geography-Wise Graph

Industry-Wise Graph

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.