Self Assessment

Weekly Intelligence Report – 26 September 2025

Published On : 2025-09-26
Share :
Weekly Intelligence Report – 26 September 2025

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type:
Ransomware

Target Technologies:
Windows

Introduction
CYFIRMA Research and Advisory Team has found Obscura Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

Theft Ransomware

Researchers identified a new variant of the Dharma ransomware family known as Theft, which is designed to encrypt local and network-shared files while avoiding critical system components to keep infected devices operable. Once executed, the ransomware appends encrypted files with a unique victim ID, the attacker’s email address, and the “.theft” extension. During the encryption process, active processes linked to opened files such as databases or document editors are terminated to prevent access conflicts. The malware ensures persistence by copying itself into the %LOCALAPPDATA% directory, configuring Run registry keys for auto-execution, and deleting Volume Shadow Copies to block native recovery options. Additionally, it collects geolocation data that may influence its execution behavior, such as targeting specific regions.

After encryption, Theft generates two ransom demands: a pop-up message and a text file named info.txt placed in all affected folders. The pop-up provides detailed instructions, offering to decrypt up to three files (smaller than 3 MB and non-critical) as proof of decryption capability, while warning against renaming files or using third- party tools.

 

It also introduces a double extortion element, claiming that sensitive business- related data has been exfiltrated and will be leaked if payment is not made. The ransom note directs victims to contact the attackers through email, emphasizing that attempts to involve intermediaries may increase costs or expose victims to scams.

 

The following are the TTPs based on the MITRE Attack Framework

Relevancy and Insights:

  • The ransomware primarily affects the Windows operating system, which is commonly utilized in enterprise environments across multiple
  • shadow copy deletion: The ransomware issues WMI commands to enumerate and remove Windows shadow copies. These shadow copies are used by the operating system for system restore and file By deleting them, the malware ensures victims cannot roll back to clean states or recover files through built-in features, increasing the pressure to comply with ransom demands.
  • Detect-debug-environment: The ransomware technique is used to determine if it is being monitored in environments such as sandboxes, virtual machines, or under debugging tools. To perform this check, the malware may look for specific processes, drivers, or artifacts linked to analysis tools, measure timing to spot inconsistencies, or scan for system traits uncommon in real user When such conditions are identified, the malicious program can modify its behavior such as pausing execution, shutting down, or withholding key payload actions to avoid detection and make detailed analysis more difficult.
  • Persistence: The ransomware uses to maintain execution across system reboots and ensure it continues running until manually In the case of Theft ransomware, persistence is achieved by copying its executable into the %LOCALAPPDATA% directory and creating entries under specific Windows Run registry keys. This setup forces the malware to automatically launch each time the system restarts, allowing it to remain active on the infected device and continue its malicious operations without requiring reinfection.

ETLM Assessment:

CYFIRMA’s analysis of Teft identifies it as a Dharma family ransomware that encrypts local and network-shared files, appends a victim ID and attacker contact to filenames (.theft), kills processes locking targets, deletes Volume Shadow Copies, and establishes persistence by copying itself to %LOCALAPPDATA% and adding Run registry entries.During execution it may terminate applications that hold files open to ensure successful encryption and drops info.txt plus a pop-up ransom message that offers limited free decryption as proof and claims data exfiltration for coercion.Technically, the sample is modular enough to be altered: its cryptographic routine, file- targeting rules, and persistence mechanisms can be swapped or extended (e.g., scheduled tasks, service installation, or WMI/event subscription). Evasion can be hardened by adding richer anti-analysis checks, in-memory loading, packing, or polymorphism; lateral movement and exfiltration capabilities can be bolted on via credential theft, SMB propagation, or encrypted uploads to attacker-controlled endpoints. These kinds of changes would broaden impact and complicated detection, shifting indicators from single artifacts (extension, Run keys) to a combination of endpoint and network telemetry.

Sigma rule:

title: Shadow Copies Deletion Using Operating Systems Utilities tags:

  • defense-evasion
  • impact
  • t1070
  • t1490 logsource:

category: process_creation product: windowsdetection: selection1_img:

  • Image|endswith:
    • ‘\powershell.exe’
    • ‘\pwsh.exe’
    • ‘\wmic.exe’
    • ‘\vssadmin.exe’
    • ‘\diskshadow.exe’
  • OriginalFileName:
    • ‘PowerShell.EXE’
    • ‘pwsh.dll’
    • ‘wmic.exe’
    • ‘VSSADMIN.EXE’
    • ‘diskshadow.exe’ selection1_cli:

CommandLine|contains|all:- ‘shadow’ # will match “delete shadows” and “shadowcopy delete” and “shadowstorage”- ‘delete’ selection2_img:

  • Image|endswith: ‘\wbadmin.exe’
  • OriginalFileName: ‘WBADMIN.EXE’ selection2_cli:

CommandLine|contains|all:

  • ‘delete’
  • ‘catalog’
  • ‘quiet’ # will match -quiet or /quiet selection3_img:
  • Image|endswith: ‘\vssadmin.exe’
  • OriginalFileName: ‘VSSADMIN.EXE’ selection3_cli:

CommandLine|contains|all:

  • ‘resize’
  • ‘shadowstorage’ CommandLine|contains:
  • ‘unbounded’
  • ‘/MaxSize=’

condition: (all of selection1*) or (all of selection2*) or (all of selection3*) fields:

  • CommandLine
  • ParentCommandLine falsepositives:
  • Legitimate Administrator deletes Shadow Copies using operating systems utilities for legitimate reason
  • LANDesk LDClient Ivanti-PSModule (PS EncodedCommand) level: high (Source: Surface Web)

IOCs:Kindly refer to the IOCs section to exercise control of your security systems.

STRATEGIC RECOMMENDATION

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATION

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your

TACTICAL RECOMMENDATION

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Trending Malware of the Week [New]Type: Information Stealer | Objectives: Stealing Sensitive Information, Data Exfiltration |Target Technologies: Windows OS, Web Browsers | Target Geography: GlobalCYFIRMA collects data from various forums, based on which the trend is ascertained. We identified a few popular malware that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week

Thisweek,“RavenStealer”istrending.

Overview of Raven Stealer Malware

Raven Stealer is a lightweight, modern information-stealing malware designed for stealth and efficiency. Built to harvest credentials, cookies, autofill data, and other browser-stored information, it exfiltrates stolen details in real time, often using Telegram as a communication channel and a promotional outlet via dedicated channels. Its distribution often takes place through underground forums and cracked software bundles, making it accessible to a wide range of operators, including those with limited technical skills. What sets Raven Stealer apart is its streamlined design and modular build, allowing attackers to configure it easily and deploy it quickly. By targeting Chromium-based browsers such as Chrome and Edge, it focuses on the most widely used platforms, ensuring maximum impact. With the ability to bypass basic antivirus detection and deliver stolen data instantly, Raven Stealer has established itself as a persistent and commercially attractive threat within the cybercrime ecosystem.

Technical Analysis 

Attackers spread this malware through underground forums and pirated or trojanized software bundles, luring victims into executing compromised installers. Once launched, Raven Stealer moves quickly into action with minimal user interaction, relying on its builder to embed payloads and operator credentials directly into the executable. Each build is uniquely named with a randomly generated filename, helping it evade simple signature-based detection and ensuring campaigns remain flexible.The builder’s interface allows operators to input Telegram Chat IDs and Bot Tokens, which are then stored in the resource section of the binary. At runtime, the malware decrypts its embedded payload in memory and often injects it into a Chromium process, enabling it to run under the guise of legitimate software. From there, it focuses on extracting sensitive data from Chromium- based browsers — including passwords, cookies, autofill details, and payment data — and organizes them into dedicated folders under the user’s AppData directory.All collected artifacts, including a desktop screenshot, are compressed into a single archive and transmitted through Telegram’s API for remote access. Even in cases where transmission fails due to invalid tokens, the process highlights how Raven Stealer combines resource embedding, in- memory execution, and streamlined configuration to maintain stealth and make credential theft accessible to a wide range of operators.The following are the TTPs based on the MITRE Attack Framework for Enterprise

INSIGHTS

  • Raven Stealer’s prominence in underground marketplaces highlights the increasing commercialization of malware. Its availability through accessible channels like forums and cracked software illustrates how cybercriminals are democratizing sophisticated attack tools, allowing even low-skilled operators to leverage advanced capabilities without developing their own software from scratch.
  • The malware’s integration with widely used platforms, such as Telegram, underscores a shift in how cybercrime leverages legitimate communication tools for illicit purposes. By piggybacking on popular applications, operators can conduct data exfiltration and manage stolen information with minimal infrastructure. This approach also reflects the blending of traditional malware tactics with social engineering elements, as attackers exploit the familiarity and trust of mainstream services to facilitate their operations.
  • Raven Stealer’s design philosophy emphasizes modularity and operational efficiency, revealing a trend in malware development toward flexible, user- oriented frameworks. Each component is structured to perform specific tasks efficiently, from harvesting browser data to packaging information for transmission. This modular approach not only streamlines deployment but also allows operators to tailor the malware to different target environments, illustrating the intersection of usability, speed, and effectiveness in contemporary threat tools.

ETLM ASSESSMENT 

From the ETLM perspective, CYFIRMA anticipates that Raven Stealer is likely to accelerate the commoditization of sophisticated cyber tools, making advanced information-stealing capabilities increasingly accessible to a wider range of threat actors. Future variants may adopt even more seamless integration with popular communication and collaboration platforms, enabling faster and more covert data exfiltration across diverse environments. As its framework becomes more modular and adaptable, the overall cyber threat landscape may see an increase in scale, frequency, and diversity of attacks, affecting digital ecosystems globally and pushing defenders to contend with more persistent and automated threats.

IOCs:Kindly refer to the IOCs Section to exercise controls on your security systems.

YARA Rule 

rule Raven_Stealer_Indicators{
meta:description = “Detects Raven Stealer malware indicators” author = “CYFIRMA”malware_family = “Raven Stealer”strings:// SHA256 File Hashes$sha256_1 = “2b24885942253784e0f6617b26f5e6a05b8ad45f092d2856473439fa6e095ce4″$sha256_2 = “65ca89993f2ee21b95362e151a7cfc50b87183bf0e9c5b753c5e5e17b46f8c24″condition:any of ($sha256*)}

STRATEGIC:

  • Maintain an up-to-date inventory of all active software used within the organization and perform regular self-audit of workstations, servers, laptops, mobile devices to identify unauthorized/ restricted software.
  • Deploy a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation
  • Configure organization’s intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defence mechanisms in place to alert on — and upon review, consider blocking connection attempts to and from — the external IP addresses and domains listed in the appendix.

MANAGEMENT:

  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your
  • Security Awareness training should be mandated for all company The training should ensure that employees:
    • Avoid downloading and executing files from unverified
    • Avoid free versions of paid
  • Move beyond the traditional model of security awareness towards Improved Simulation and training exercises that mimic real attack scenarios, account for behaviors that lead to a compromise, and are measured against real attacks the organization receives.

TACTICAL RECOMMENDATIONS

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Enable network protection to prevent applications or users from accessing malicious domains and other malicious content on the internet.
  • Add the Yara rules for threat detection and monitoring which will help to detect anomalies in log events and identify and monitor suspicious activities.

CYFIRMA’s Weekly INSIGHTS:

1.   Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Vulnerabilities & Exploits, Data
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains,
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Killsec Ransomware, Obscura Ransomware | Malware – Raven Stealer
  • Killsec Ransomware– One of the ransomware
  • Obscura Ransomware – One of the ransomware

Please refer to the trending malware advisory for details on the following:

  • Malware – Raven Stealer

        Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart
from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.2.                  Threat Actor in Focus 

Inside Kimsuky: RGB-Aligned Cyber Threat Actor Targeting US and SouthKorea

  • Threat Actor: Kimsuky aka APT43
  • Attack Type: Credential Harvesting, Social Engineering Attack, Exploitation of Vulnerabilities
  • Objective: Espionage
  • Suspected Target Technology: Bandzip, Hangul Word Processor, Social Platforms, macOS, Windows
  • Suspected Target Geography: Belgium, Bulgaria, Canada, Croatia, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland, Italy, Latvia, Lithuania, Luxembourg, Montenegro, North Macedonia, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, the Czech Republic, Netherlands, Albania, Japan, South Korea, Thailand, USA, Vietnam
  • Suspected Target Industries: Aerospace, Construction, Consulting, Defence, Education, Government, Hi-Tech, Manufacturing, Media & Entertainment, NGO, Pharmaceuticals, Professional Services, Research, Telecommunications, Think Tanks
  • Business Impact: Compromised user accounts, Financial Loss, Operational Disruption, Reputational Damage

About the Threat Actor

Kimsuky, an advanced persistent threat (APT) group active since at least 2012, is suspected to be operating out of North Korea in direct support of the regime’s strategic objectives. The group’s intelligence collection priorities are closely aligned with the mission of the Reconnaissance General Bureau (RGB), North Korea’s primary foreign intelligence agency. Kimsuky possesses moderately sophisticated technical capabilities and is known for employing highly targeted social engineering tactics, especially against the South Korean and U.S.-based government agencies, academics, and think tanks focused on geopolitical issues related to the Korean Peninsula. In addition to its espionage operations, Kimsuky engages in cybercriminal activities to generate revenue, helping to finance its overarching mission of acquiring strategic intelligence.

Details on Exploited Vulnerabilities

Tactic Technique ID Technique Name
Execution T1106 Native API
Execution T1129 Shared Modules
Persistence T1112 Modify Registry
Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup

Folder

Privilege Escalation T1055 Process Injection
Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup

Folder

Defense Evasion T1027.002 Obfuscated Files or Information: Software Packing
Defense Evasion T1027.009 Obfuscated Files or Information: Embedded Payloads
Defense Evasion T1036 Masquerading
Defense Evasion T1055 Process Injection
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1112 Modify Registry
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1497 Virtualization/Sandbox Evasion
Defense Evasion T1564.001 Hide Artifacts: Hidden Files and Directories
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1497 Virtualization/Sandbox Evasion
Collection T1074 Data Staged
Command and Control T1071 Application Layer Protocol
Command and Control T1105 Ingress Tool Transfer
Impact T1485 Data Destruction
Impact T1486 Data Encrypted for Impact
Tactic Technique ID Technique Name
Execution T1059 Command and Scripting Interpreter
Execution T1106 Native API
Execution T1129 Shared Modules
Privilege Escalation T1055 Process Injection
Defense Evasion T1027.002 Obfuscated Files or Information: Software Packing
Defense Evasion T1027.005 Obfuscated Files or Information: Indicator Removal from Tools
Defense Evasion T1036 Masquerading
Defense Evasion T1055 Process Injection
Defense Evasion T1070 Indicator Removal
Defense Evasion T1202 Indirect Command Execution
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1518 Software Discovery
Discovery T1614 System Location Discovery
Collection T1005 Data from Local System
Collection T1185 Browser Session Hijacking
Command and Control T1071 Application Layer Protocol
Command and Control T1102 Web Service
Command and Control T1105 Ingress Tool Transfer
Command and Control T1573 Encrypted Channel
CVE ID Affected Products CVSS Score Exploit Links
 

CVE-2017-11882

 

 

Microsoft Office

 

 

7.8

 

 

link

 

CVE-2019-0708

 

Remote Desktop Services

 

9.8

 

link1, link2, link3, link4, link5

Tactic ID Technique
Reconnaissance T1589.002 Gather Victim Identity Information: Email

Addresses

Reconnaissance T1589.003 Gather Victim Identity Information: Employee

Names

Reconnaissance T1591 Gather Victim Org Information
Reconnaissance T1598 Phishing for Information
Reconnaissance T1598.003 Phishing for Information: Spear phishing Link
Reconnaissance T1596 Search Open Technical Databases
Reconnaissance T1593 Search Open Websites/Domains
Reconnaissance T1593.001 Search Open Websites/Domains: Social Media
Reconnaissance T1593.002 Search Open Websites/Domains: Search

Engines

Reconnaissance T1594 Search Victim-Owned Websites
Resource Development T1583 Acquire Infrastructure
Resource Development T1583.001 Acquire Infrastructure: Domains
Resource Development T1583.004 Acquire Infrastructure: Server
Resource Development T1583.006 Acquire Infrastructure: Web Services
Resource Development T1586.002 Compromise Accounts: Email Accounts
Resource Development T1584.001 Compromise Infrastructure: Domains
Resource Development T1587 Develop Capabilities
Resource Development T1587.001 Develop Capabilities: Malware
Resource Development T1585 Establish Accounts
Resource Development T1585.001 Establish Accounts: Social Media Accounts
Resource Development T1585.002 Establish Accounts: Email Accounts
Resource Development T1588.002 Obtain Capabilities: Tool
Resource Development T1588.003 Obtain Capabilities: Code Signing Certificates
Resource Development T1588.005 Obtain Capabilities: Exploits
Resource Development T1608.001 Stage Capabilities: Upload Malware
Initial Access T1133 External Remote Services
Initial Access T1190 Exploit Public-Facing Application
Initial Access T1566 Phishing
Initial Access T1566.001 Phishing: Spear phishing Attachment
Initial Access T1566.002 Phishing: Spear phishing Link
Initial Access T1078.003 Valid Accounts: Local Accounts
Execution T1059.001 Command and Scripting Interpreter:

PowerShell

Execution T1059.003 Command and Scripting Interpreter: Windows

Command Shell

Execution T1059.005 Command and Scripting Interpreter: Visual

Basic

Execution T1059.006 Command and Scripting Interpreter: Python
Execution T1059.007 Command and Scripting Interpreter:

JavaScript

 

Execution

 

T1053.005

 

Scheduled Task/Job: Scheduled Task

 

Execution

 

T1204.001

 

User Execution: Malicious Link

 

Execution

 

T1204.002

 

User Execution: Malicious File

 

Persistence

 

T1547.001

Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
 

Persistence

 

T1098.007

Account Manipulation: Additional Local or Domain Groups
 

Persistence

 

T1136.001

 

Create Account: Local Account

 

Persistence

 

T1543.003

Create or Modify System Process: Windows Service
 

Persistence

 

T1546.001

Event Triggered Execution: Change Default File Association
 

Persistence

 

T1078.003

 

Valid Accounts: Local Accounts

 

Persistence

 

T1505.003

 

Server Software Component: Web Shell

 

Persistence

 

T1205

 

Traffic Signaling

 

Persistence

 

T1176.001

 

Software Extensions: Browser Extensions

 

Persistence

 

T1053.005

 

Scheduled Task/Job: Scheduled Task

 

Persistence

 

T1112

 

Modify Registry

 

Persistence

 

T1133

 

External Remote Services

 

Privilege Escalation

 

T1098.007

Account Manipulation: Additional Local or Domain Groups
 

Privilege Escalation

 

T1547.001

Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation  

T1543.003

Create or Modify System Process: Windows Service
 

Privilege Escalation

 

T1546.001

Event Triggered Execution: Change Default File Association
 

Privilege Escalation

 

T1055

 

Process Injection

 

Privilege Escalation

 

T1055.012

 

Process Injection: Process Hollowing

 

Privilege Escalation

 

T1053.005

 

Scheduled Task/Job: Scheduled Task

 

Privilege Escalation

 

T1078.003

 

Valid Accounts: Local Accounts

 

Defense Evasion

 

T1140

 

Deobfuscate/Decode Files or Information

 

Defense Evasion

 

T1564.002

 

Hide Artifacts: Hidden Users

 

Defense Evasion

 

T1564.003

 

Hide Artifacts: Hidden Window

 

Defense Evasion

 

T1562.001

 

Impair Defenses: Disable or Modify Tools

 

Defense Evasion

 

T1562.004

Impair Defenses: Disable or Modify System Firewall
 

Defense Evasion

 

T1656

 

Impersonation

 

Defense Evasion

 

T1070.004

 

Indicator Removal: File Deletion

 

Defense Evasion

 

T1070.006

 

Indicator Removal: Timestomp

 

Defense Evasion

 

T1036.004

 

Masquerading: Masquerade Task or Service

 

Defense Evasion

 

T1036.005

Masquerading: Match Legitimate Resource Name or Location
 

Defense Evasion

 

T1112

 

Modify Registry

 

Defense Evasion

 

T1027

 

Obfuscated Files or Information

 

Defense Evasion

 

T1027.002

Obfuscated Files or Information: Software Packing
 

Defense Evasion

 

T1055

 

Process Injection

 

Defense Evasion

 

T1055.012

 

Process Injection: Process Hollowing

 

Defense Evasion

 

T1620

 

Reflective Code Loading

 

Defense Evasion

 

T1553.002

 

Subvert Trust Controls: Code Signing

 

Defense Evasion

 

T1218.005

 

System Binary Proxy Execution: Mshta

Defense Evasion  

T1218.010

 

System Binary Proxy Execution: Regsvr32

 

Defense Evasion

 

T1218.011

 

System Binary Proxy Execution: Rundll32

 

Defense Evasion

 

T1205

 

Traffic Signaling

 

Defense Evasion

 

T1550.002

Use Alternate Authentication Material: Pass the Hash
 

Defense Evasion

 

T1078.003

 

Valid Accounts: Local Accounts

 

Credential Access

 

T1557

 

Adversary-in-the-Middle

 

Credential Access

 

T1555.003

Credentials from Password Stores: Credentials from Web Browsers
 

Credential Access

 

T1003.001

 

OS Credential Dumping: LSASS Memory

 

Credential Access

 

T1056.001

 

Input Capture: Keylogging

 

Credential Access

 

T1111

 

Multi-Factor Authentication Interception

 

Credential Access

 

T1040

 

Network Sniffing

 

Credential Access

 

T1539

 

Steal Web Session Cookie

 

Credential Access

 

T1552.001

 

Unsecured Credentials: Credentials In Files

 

Discovery

 

T1518.001

Software Discovery: Security Software Discovery
 

Discovery

 

T1040

 

Network Sniffing

 

Discovery

 

T1083

 

File and Directory Discovery

 

Discovery

 

T1057

 

Process Discovery

 

Discovery

 

T1012

Query Registry
 

Discovery

 

T1082

 

System Information Discovery

 

Discovery

 

T1016

 

System Network Configuration Discovery

 

Discovery

 

T1007

 

System Service Discovery

 

Lateral Movement

 

T1534

 

Internal Spear phishing

 

Lateral Movement

 

T1021.001

 

Remote Services: Remote Desktop Protocol

 

Lateral Movement

 

T1550.002

Use Alternate Authentication Material: Pass the Hash
Collection  

T1560.001

 

Archive Collected Data: Archive via Utility

 

Collection

 

T1557

 

Adversary-in-the-Middle

 

Collection

 

T1560.001

 

Archive Collected Data: Archive via Utility

 

Collection

 

T1560.003

Archive Collected Data: Archive via Custom Method
 

Collection

 

T1185

 

Browser Session Hijacking

 

Collection

 

T1005

 

Data from Local System

 

Collection

 

T1074.001

 

Data Staged: Local Data Staging

 

Collection

 

T1114.002

 

Email Collection: Remote Email Collection

 

Collection

 

T1114.003

 

Email Collection: Email Forwarding Rule

 

Collection

 

T1056.001

 

Input Capture: Keylogging

 

Collection

 

T1113

 

Screen Capture

 

Command and Control

 

T1071.001

 

Application Layer Protocol: Web Protocols

 

Command and Control

 

T1071.002

 

Application Layer Protocol: File Transfer Protocols

 

Command and Control

 

T1071.003

 

Application Layer Protocol: Mail Protocols

 

Command and Control

 

T1219.002

 

Remote Access Tools: Remote Desktop Software

 

Command and Control

 

T1105

 

Ingress Tool Transfer

 

Command and Control

 

T1205

 

Traffic Signaling

 

Command and Control

 

T1102.001

 

Web Service: Dead Drop Resolver

 

Command and Control

 

T1102.002

 

Web Service: Bidirectional Communication

 

Exfiltration

 

T1041

 

Exfiltration Over C2 Channel

 

Exfiltration

 

T1567.002

 

Exfiltration Over Web Service: Exfiltration to Cloud Storage

 

Impact

 

T1657

 

Financial Theft

 

Latest Developments Observed

The threat actor is suspected of weaponizing ChatGPT to fabricate government identification documents in a phishing campaign targeting South Korean officials. By generating high-resolution images of official credentials, the attackers were able to disguise malware-laden messages as legitimate government communications with the intent of exfiltrating sensitive data.

ETLM Insights

Kimsuky is a North Korea-linked espionage group engaged in long-term intelligence collection and cyber operations targeting government, defense, financial, and critical infrastructure sectors to assist their intelligence agencies and government in their strategies. The threat actor’s critical threat level, combined with artificial intelligence (AI) adoption and advanced technologies, increases the sophistication of their cyberattacks. The adoption of the latest technologies and AI allows the threat group the following:

  • Scalability: AI allows mass targeting with minimal
  • Personalization: Deepfake voice, video, and text make social engineering harder to
  • Evasion: AI helps attackers adapt quickly against traditional

These evolutions will likely support North Korea’s strategic objectives, gathering intelligence, bypassing sanctions, and destabilizing adversaries, while maintaining stealth and persistence across a broader global attack surface. Organizations need to have predictive, intelligence-led defense and proactive strategies to alert them in advance on to such threats.

YARA Rules

rule Kimsuky_APT_Indicators

{

meta:

description = “Detects potential Kimsuky APT activity based on known IPs, domains, and exploit indicators”

author = “CYFIRMA” date = “2025-09-19”

threat_actor = “Kimsuky”

reference = “CVE-2017-11882, CVE-2019-0708”

strings:

// IP Addresses

$ip1 = “152.32.138.167”

$ip2 = “27.255.80.162”

$ip3 = “212.224.107.244”

$ip4 = “27.255.81.118”

// Domains

$domain1 = “www.vic.apollo-star7.kro.kr

$domain2 = “bitjoker2024.000webhostapp.com”

$domain3 = “nidlogin.apollo.r-e.kr”

// Exploit-related strings (CVE-2017-11882 and CVE-2019-0708)

$eqnedit = “Equation.3” wide ascii // often used in CVE-2017-11882

$rdp_check1 = “termdd.sys” ascii // RDP-related driver

$rdp_check2 = “TSMSISrv.dll” ascii // part of terminal services

condition:

any of ($ip*) or

any of ($domain*) or 2 of ($rdp_check*) or

$eqnedit

}

Recommendations Strategic

  • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
  • Deploy Zero Trust Policy that leverages tools like security information management, advanced security analytics platforms, security user behaviour analytics, and other analytics systems to help the organization’s security personnel observe in real-time what is happening within their networks so they can orient defences more intelligently.
  • Block exploit-like Monitor endpoints memory to find behavioural patterns that are typically exploited, including unusual process handle requests. These patterns are features of most exploits, whether known or new. This will be able to provide effective protection against zero-day/critical exploits and more by identifying such patterns.

Management

  • Invest in user education and implement standard operating procedures for the handling of financial and sensitive data transactions commonly targeted by impersonation Reinforce this training with context-aware banners and in-line prompts to help educate users.
  • Develop a cyber threat remediation program and encourage employee training to detect anomalies proactively.

Tactical

  • For better protection coverage against email attacks (like spear phishing, business email compromise, or credential phishing attacks), organizations should augment built-in email security with layers that take a materially different approach to threat detection.
  • Protect accounts with multi-factor Exert caution when opening email attachments or clicking on embedded links supplied via email communications, SMS, or messaging.
  • Apply security measures to detect unauthorized activities, protect sensitive production, and process control systems from cyberattacks.
  • Add the YARA rules for threat detection and monitoring, which will help to detect anomalies in log events, identify, and monitor suspicious activities.

3. Major Geopolitical Developements in Cybersecurity

European Airports in Chaos Following a Major Cyberattack

 Significant European airports were thrown into chaos over the weekend, with thousands of passengers experiencing delays and cancellations as a result of a significant cyberattack. Airlines flying out of Heathrow, Brussels, and Berlin were forced to manually check passengers in after the attack damaged check-in and boarding systems, resulting in hours-long waits on Saturday. Cancellations at Brussels airport warned that disruptions in Europe’s air travel might continue into Monday.

The cyber-attack disrupted a check-in and baggage system. Airlines were forced to return to slower manual check-ins on Friday night following the attack on Collins Aerospace, which provides check-in counter technology to several airlines. On Sunday afternoon, Brussels Airport said it had “no indication yet” when the system would be operational again and requested that half of the departing flights scheduled for Monday be cancelled. The airport stated that Collins was “not yet able to deliver a new secure version of the check-in system” and verified a cyber-attack had occurred.

Heathrow stated on Sunday that efforts to remedy the situation were underway. It did not specify whether the problem was caused by a cyberattack. It apologized to those who had experienced delays but emphasized that “the vast majority of flights have continued to operate,” advising travellers to check their flight status before heading to the airport and arrive on time. Approximately half of the airlines operating from Heathrow were back online by Sunday, including British Airways, which had been using a backup system since Saturday.

ETLM Assessment:

RTX, which owns the software company Collins Aerospace, stated that it was “aware of a cyber-related disruption” to its system in “select airports” and planned to rectify the problem as soon as possible. It identified the compromised system as its Muse software, which allows multiple airlines to utilize the same check-in booths and boarding gates at an airport instead of having their own. The corporation has yet to reveal what went wrong or how long the outage will persist but stated on Sunday that it will “provide details as soon as they are available”. The incident highlights systemic vulnerabilities in service providers, supply chain attacks supporting critical airport functions, and underscores the need for proactive cyber defenses, continuous threat monitoring, and cross-border coordination to mitigate risks posed by these threat actors.

4. Rise in Malware / Ransomware and Phishing

 The Killsec Ransomware Impacts HappyTenant

  • Attack Type: Ransomware
  • Target Industry: Real Estate Services and Software-as-a-Service (SaaS)
  • Target Geography: The United Arab Emirates (UAE)
  • Ransomware: Killsec Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:

 From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from the United Arab Emirates (UAE), HappyTenant (https[:]//happytenant[.]io/), was compromised by Killsec Ransomware.

HappyTenant is a cloud-based property management platform designed to simplify and automate key tasks for landlords, property managers, and tenants, with a broad market focus on the UAE and growing international reach. The compromised data includes confidential and sensitive information belonging to the organization.

Source : Dark Web

                              Source: Dark Web

Relevancy & Insights:

  • KillSec is a ransomware group that has gained notoriety for its ransomware-as-a- service (RaaS) model and a series of high-profile
  • KillSec Ransomware employs various sophisticated methods to infiltrate systems, including phishing attacks, exploiting known vulnerabilities, and using custom malware to maintain persistence within compromised networks.
  • The KillSec Ransomware group primarily targets countries like the United States of America, India, Australia, Brazil, and Mexico.
  • The KillSec Ransomware group primarily targets industries, such as Information Technology, Healthcare, Professional Goods & Services, Finance, and Real Estate & Construction.
  • Based on the KillSec Ransomware victims list from 1stJan 2025 to 24th September 2025, the top 5 Target Countries are as follows:

  • The Top 10 Industries most affected by the KillSec Ransomware victims list from 1st Jan 2025 to 24th September 2025 are as follows:

ETLM Assessment:

The emergence and evolution of KillSec’s Ransomware-as-a-Service (RaaS) platform represents a concerning development in the cybercrime landscape. By lowering the technical barrier to entry, this RaaS model allows less skilled individuals to engage in sophisticated ransomware attacks, potentially leading to an increase in such incidents globally.

According to CYFIRMA’s assessment, the KillSec ransomware group is expected to continue targeting a wide range of industries worldwide. Their advanced tactics, such as exploiting website vulnerabilities and conducting credential theft, make them a significant threat to organizations with inadequate security measures in place.

Obscura Ransomware Impacts EAST Design Architect Sdn. Bhd

  • Attack Type: Ransomware
  • Target Industry: Architecture, Engineering & Construction
  • Target Geography: Malaysia
  • Ransomware: Obscura Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:

From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Malaysia, EAST Design Architect Sdn. Bhd (https[:]//www[.]eastdesign[.]com[.]my/) was compromised by Obscura Ransomware. EAST Design Architect Sdn. Bhd is a prominent professional architectural design firm based in Malaysia. The data, which has been breached, has not yet appeared on the leak site, indicating that negotiations between the affected party and the ransomware group may be underway. The compromised data includes confidential and sensitive information belonging to the organization

Source: Dark Web

Relevancy & Insights:

  • Obscura Ransomware is a newly observed ransomware variant identified in August 2025, notable for its targeted attacks, explicit double-extortion tactics, and use of modern cryptographic techniques.
  • The Obscura Ransomware group primarily targets countries such as the United States of America, Malaysia, Denmark, Egypt, and
  • The Obscura Ransomware group primarily targets industries, including Real Estate & Construction, Healthcare, Manufacturing, Government & Civic, and Professional Goods & Services.
  • Based on the Obscura Ransomware victims list from 1stAugust 2025 to 24th September 2025, the top 5 Target Countries are as follows:

  • The Top 5 Industries most affected by the Obscura Ransomware victims list from 1st August 2025 to 24th September 2025 are as follows:

 

ETLM Assessment:

According to CYFIRMA’s assessment, Obscura Ransomware represents a modern, technically proficient ransomware operation, with a sophisticated encryption routine, privilege enforcement, and double-extortion techniques seen in targeted enterprise attacks.

5. Vulnerabilities and Exploits

 Vulnerability in SolarWinds Web Help Desk

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Web application
  • Vulnerability: CVE-2025-26399
  • CVSS Base Score: 8 Source
  • Vulnerability Type: Deserialization of Untrusted Data
  • Summary: The vulnerability allows a remote attacker to execute arbitrary code on the target system.

Relevancy & Insights:

The vulnerability exists due to insecure input validation when processing serialized data within the AjaxProxy. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system.

Impact: Successful exploitation of this vulnerability may result in complete compromise of the vulnerable system.

Affected Products: https[:]//www[.]solarwinds[.]com/trust-center/security- advisories/cve-2025-26399

Recommendations:

  • Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK

This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment

SolarWinds Web Help Desk is a ticketing and IT asset management solution that streamlines IT service management. It provides features for help desk ticketing, knowledge base, asset management, SLA tracking, and workflow automation, helping organizations improve service delivery and reduce response times.

6. Latest Cyber – Attacks. Incidents, and Breaches

 DragonForce Ransomware attacked and published the data of Concord New Energy Group

  • Threat Actor: DragonForce Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Energy & Utilities
  • Target Geography: Hong Kong, Singapore
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:

Recently, DragonForce Ransomware was observed attacking and publishing the data of Concord New Energy Group (www[.]cn[.]cnegroup[.]com) on its dark web website. Concord New Energy Group Limited (CNE) is a leading global renewable energy company specializing in the development, operation, and management of wind and solar power plants. The ransomware attack resulted in a significant data leak, affecting multiple departments, including Finance, Human Resources, the International Department, and the Research Center. The exposed information also contains overseas company details and other sensitive and confidential records from the organization’s database. In total, approximately 108.76 GB of data has been compromised.

Source : Dak Web

Relevancy & Insights:

  • The DragonForce Ransomware group operates as a RaaS, allowing affiliates to customize and deploy their ransomware tools for specific attacks.
  • DragonForce Ransomware uses a double extortion strategy, which involves encrypting data on the victim’s servers and exfiltrating sensitive They threaten to leak this data if the ransom is not paid, increasing pressure on victims.
  • DragonForce Ransomware has targeted a variety of sectors, including manufacturing, healthcare, telecommunications, and government

ETLM Assessment:

According to CYFIRMA’s assessment, DragonForce represents a significant threat in the ransomware landscape due to its advanced operational methods and extensive use of modified ransomware tools. As it continues to target high-profile organizations globally, ongoing vigilance and proactive cybersecurity strategies will be essential for mitigating risks associated with this formidable threat actor.

Organizations should remain alert to the evolving tactics employed by groups like DragonForce to protect their sensitive data and maintain operational integrity.

7. Data Leaks

Fundline Finance Corporation’s Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: Finance
  • Target Geography: Philippines
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:

The CYFIRMA Research team observed that Fundline Finance Corporation, a significant provider of micro-lending and motorcycle financing services in the Philippines, has allegedly fallen victim to a substantial data breach. A threat actor “Sorb” has posted on a dark web forum claiming to have sensitive personal information of over one million users of the financial institution. The data is being offered for sale for $1,000.

Fundline Finance Corporation, which has been operating for over two decades, plays a crucial role in providing financial services to many Filipinos, particularly micro and small-scale entrepreneurs. The company’s extensive network of 144 branches across the country makes this alleged breach a serious concern for a large number of individuals who have entrusted their personal and financial information to the institution. The alleged leaked data includes a vast amount of personally identifiable information (PII), which could be exploited by malicious actors for various fraudulent activities, including identity theft and phishing scams.

According to the forum post, the compromised data allegedly includes:

  • Full names
  • Phone numbers
  • Email addresses
  • Dates of birth
  • Full addresses
  • Document numbers (including ID cards)
  • Tax Identification Numbers (TIN)
  • Social Security System (SSS) numbers
  • Government Service Insurance System (GSIS) numbers

The seller has provided samples of the data in CSV and TXT format to substantiate their claims, which appear to contain detailed customer and personal identification information. The investigation into this alleged data breach is ongoing.

Source: Underground Forums

Reportage Empire’s Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Media & Creative Services
  • Target Geography: The United Arab Emirates (UAE)
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:

The CYFIRMA Research team has identified that a threat actor “N1KA” claims to have breached Reportage Empire, a company based in the United Arab Emirates that specializes in photography and videography content for business marketing and branding. The actor announced the data leak on a dark web forum, citing a breach date of September 2025.

According to the actor, the allegedly exfiltrated database contains the records of 2,100 customers. The compromised information reportedly includes full names, email addresses, phone numbers, and hashed passwords.

Relevancy & Insights:

Financially motivated cybercriminals are continuously scouring for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to illicitly gain access and steal valuable data. Subsequently, the pilfered data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:

The threat actor identified as “N1KA” has recently gained attention as a highly active group specializing in data leaks. Reliable sources have connected the group to multiple security breaches involving unauthorized system access and the attempted sale of exfiltrated data on dark web marketplaces. N1KA’s ongoing operations highlight the evolving and persistent nature of cyber threats emerging from underground forums. These incidents underscore the critical importance for organizations to strengthen their cybersecurity posture through continuous monitoring, advanced threat intelligence, and proactive defense strategies to protect sensitive data and infrastructure.

Recommendations:

Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8 .  Other Observations

 The CYFIRMA Research team observed that a threat actor claims to have breached Fortis Healthcare, a major Indian healthcare provider. The actor has posted the allegedly stolen database for sale, containing a significant volume of patient and contact information. The total size of the compromised data is listed as 21.8 GB. According to the actor, the exfiltrated database contains records of over 3.2 million individuals across multiple tables. The compromised information includes full names, phone numbers, physical addresses, email addresses, dates of birth, and other personal contact details.

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Delay a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM
  • Detection processes are tested to ensure awareness of anomalous Timely communication of anomalies and continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security control such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.