 
    
CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.
Type: Ransomware
Target Technologies: Windows, Network Shares, Removable Storage, Tor-based Communication, Cloud/Exfiltration Tools.
Target Geographies: Global (English-speaking focus: United States, Western Europe, Australia), Opportunistic regions (Asia, Eastern Europe, Latin America).
Target Industries: Aerospace & Defense, Government contractors, Technology/Engineering firms.
Introduction:
CYFIRMA Research and Advisory Team has found KYBER Ransomware while monitoring various underground forums as part of our Threat Discovery Process.
KYBER Ransomware:
Researchers have discovered a new ransomware strain called KYBER. This ransomware encrypts victims’ files, renaming them and appending a random extension to filenames (e.g., .#~~~”), and creates a ransom note (“ReadMeForDecrypt.txt”)

The Kyber Ransomware note informs victims that their files have been encrypted using the AES-256-CTR algorithm, with encryption keys generated through X25519 and Kyber1024, making decryption without their help practically impossible. The attackers claim to have exfiltrated a large amount of sensitive data from the victim’s network, warning that if communication is not established within one to two weeks, the organization’s name and samples of stolen data will be publicly posted on their leak blog. To prove their ability to decrypt files, they offer free decryption for three small files and provide examples of the stolen data upon request. The note attempts to build trust by emphasizing their “professionalism” and the confidentiality of negotiations, while discouraging victims from contacting law enforcement, as it would allegedly prevent payment and not stop data publication. They also warn against tampering with encrypted files, claiming it could make recovery impossible. Finally, the attackers instruct victims to download the Tor Browser and access a unique anonymous chat link to initiate communication and negotiate ransom payment.


The following are the TTPs based on the MITRE Attack Framework
| Tactic | Technique ID | Technique Name | 
| Execution | T1059 | Command and Scripting Interpreter | 
| Execution | T1059.001 | Command and Scripting Interpreter: PowerShell | 
| Execution | T1106 | Native API | 
| Execution | T1129 | Shared Modules | 
| Persistence | T1112 | Modify Registry | 
| Persistence | T1542 | Pre-OS Boot | 
| Persistence | T1542.003 | Pre-OS Boot: Bootkit | 
| Persistence | T1543 | Create or Modify System Process | 
| Persistence | T1543.003 | Create or Modify System Process: Windows Service | 
| Privilege Escalation | T1134 | Access Token Manipulation | 
| Privilege Escalation | T1543 | Create or Modify System Process | 
| Privilege Escalation | T1543.003 | Create or Modify System Process: Windows Service | 
| Privilege Escalation | T1548 | Abuse Elevation Control Mechanism | 
| Defense Evasion | T1027 | Obfuscated Files or Information | 
| Defense Evasion | T1027.005 | Obfuscated Files or Information: Indicator Removal from Tools | 
| Defense Evasion | T1036 | Masquerading | 
| Defense Evasion | T1070 | Indicator Removal | 
| Defense Evasion | T1070.001 | Indicator Removal: Clear Windows Event Logs | 
| Defense Evasion | T1070.004 | Indicator Removal: File Deletion | 
| Defense Evasion | T1112 | Modify Registry | 
| Defense Evasion | T1134 | Access Token Manipulation | 
| Defense Evasion | T1202 | Indirect Command Execution | 
| Defense Evasion | T1222 | File and Directory Permissions Modification | 
| Defense Evasion | T1497 | Virtualization/Sandbox Evasion | 
| Defense Evasion | T1497.001 | Virtualization/Sandbox Evasion: System Checks | 
| Defense Evasion | T1542 | Pre-OS Boot | 
| Defense Evasion | T1542.003 | Pre-OS Boot: Bootkit | 
| Defense Evasion | T1548 | Abuse Elevation Control Mechanism | 
| Defense Evasion | T1562 | Impair Defenses | 
| Defense Evasion | T1562.001 | Impair Defenses: Disable or Modify Tools | 
| Credential Access | T1003 | OS Credential Dumping | 
| Credential Access | T1552 | Unsecured Credentials | 
| Credential Access | T1552.001 | Unsecured Credentials: Credentials In Files | 
| Discovery | T1007 | System Service Discovery | 
| Discovery | T1057 | Process Discovery | 
| Discovery | T1082 | System Information Discovery | 
| Discovery | T1083 | File and Directory Discovery | 
| Discovery | T1497 | Virtualization/Sandbox Evasion | 
| Discovery | T1497.001 | Virtualization/Sandbox Evasion: System Checks | 
| Discovery | T1518 | Software Discovery | 
| Collection | T1005 | Data from Local System | 
| Collection | T1114 | Email Collection | 
| Command and Control | T1071 | Application Layer Protocol | 
| Impact | T1485 | Data Destruction | 
| Impact | T1486 | Data Encrypted for Impact | 
| Impact | T1489 | Service Stop | 
| Impact | T1490 | Inhibit System Recovery | 
Relevancy and Insights:
ETLM Assessment:
CYFIRMA’s assessment indicates that the KYBER ransomware group is rapidly evolving from a conventional encryptor into a structured, data-driven extortion operation, reflecting increasing technical sophistication and operational maturity. Evidence from the ransom note and observed artifacts—such as the use of hybrid encryption (AES-256-CTR with X25519 and Kyber1024), explicit claims of mass data exfiltration, offers of limited free decryption to build trust, Tor-based anonymous communication channels, and threats of public data leaks—demonstrates a professionalized approach consistent with emerging high-tier ransomware collectives. These behaviors, combined with coercive communication tactics, leak- based intimidation, and emphasis on negotiation secrecy, strongly indicate a deliberate evolution in tactics, techniques, and procedures (TTPs). With these capabilities already active, it is highly likely that KYBER will advance toward double- or triple-extortion models, deploy dedicated leak sites or data auction platforms, and eventually transition into a Ransomware-as-a-Service (RaaS) ecosystem— positioning it as a scalable, persistent, and globally impactful ransomware threat.
Sigma rule:
title: WannaCry Ransomware Activity tags:
–	attack.lateral-movement
–	attack.t1210
–	attack.discovery
–	attack.t1083
–	attack.defense-evasion
– attack.t1222.001
–	attack.impact
–	attack.t1486
–	attack.t1490
–	detection.emerging-threats logsource:
category: process_creation product: windows
detection: selection_img:
–	Image|endswith:
–	‘\tasksche.exe’
–	‘\mssecsvc.exe’
–	‘\taskdl.exe’
–	‘\taskhsvc.exe’
–	‘\taskse.exe’
– ‘\111.exe’
–	‘\lhdfrgui.exe’
# – ‘\diskpart.exe’ # cannot be used in a rule of level critical
–	‘\linuxnew.exe’
–	‘\wannacry.exe’
–	Image|contains: ‘WanaDecryptor’
selection_cmd:
CommandLine|contains: ‘@[email protected]’ condition: 1 of selection_*
fields:
–	CommandLine
–	ParentCommandLine falsepositives:
–	Unknown level: critical
Source: Surface Web
IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.
STRATEGIC RECOMMENDATION
MANAGEMENT RECOMMENDATIONS
TACTICAL RECOMMENDATIONS
Type: Backdoor | Objectives: Account takeover, Data theft | Target Technology: Android OS | Target Geography: Brazil, Indonesia
CYFIRMA collects data from various forums, based on which the trend is ascertained. We identified a few popular malware that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.
Active Malware of the week
This week, “Baohuo” is trending.
Overview of the Baohuo Malware
Researchers have uncovered Baohuo, a malicious backdoor hidden inside altered versions of the Telegram X messenger. Unlike typical data-stealing malware, Baohuo grants cybercriminals near-total control over victims’ Telegram accounts—allowing them to read messages, manage chats, and even manipulate channel memberships without the user’s knowledge. Its ability to hide unauthorized logins and disguise suspicious activity within Telegram sessions makes it particularly deceptive. Interestingly, the attackers employ an unconventional command system through the Redis database, a rare tactic in Android- based threats.
The backdoor’s spread began around mid-2024, primarily through fake advertisements within mobile apps that lure users into downloading counterfeit versions of Telegram X. These ads redirect users to fraudulent websites resembling app stores, often themed around social interaction or dating to increase credibility. Currently, the campaign is focused on Portuguese- and Indonesian-language banners — indicating Brazil and Indonesia as primary targets. However, with over 58,000 infections already detected, the operation’s infrastructure suggests a potential for global expansion.
In addition to malicious websites, Baohuo has been found in several third-party app stores, such as APKPure and ApkSum, sometimes falsely listed under the official Telegram developer’s name. This shows how cybercriminals are exploiting trusted platforms to broaden their reach. With thousands of compromised devices—including smartphones, tablets, smart TVs, and even Android-powered cars—Baohuo stands out as a sophisticated and large-scale campaign blending social engineering with advanced account manipulation.
Attack Method
Baohuo operates through multiple modified versions of the Telegram X messenger, each designed to execute the same malicious goal under different layers of disguise. In some cases, the backdoor is built directly into the app’s main structure, while in others, it is introduced as a dynamic patch or stored separately within the app’s resources to be activated during runtime. This modular approach ensures that, despite the infection, the messenger continues to function normally, keeping victims unaware that their communications and accounts are under the complete control of attackers.
Once installed, Baohuo activates as soon as the messenger launches, allowing the operators to manipulate app behavior without disrupting the user experience. To maintain stealth, it employs mirrored functions that imitate Telegram X’s legitimate processes, creating deceptive pop-ups and phishing messages identical to authentic ones. For deeper manipulations—such as concealing certain chats or hiding connected devices—the malware leverages dynamic modification tools, enabling it to alter the app’s behavior and extract sensitive data, including clipboard contents, without user detection.
A defining aspect of Baohuo’s attack method is its dual communication system. Earlier versions relied solely on conventional command servers, but newer builds also integrate a Redis database for receiving updates and commands—a method rarely observed in Android malware. This setup allows cybercriminals to remotely manage infected devices, issue instructions, and modify configurations even if one control channel goes offline.
Through these connections, Baohuo can carry out extensive operations, such as stealing messages and contacts, collecting account tokens, joining or leaving channels, displaying fake update prompts, and uploading sensitive clipboard data. These capabilities enable attackers to silently maintain long-term control, turning an ordinary messaging app into a powerful espionage and manipulation tool.
Following are the TTPs based on the MITRE Attack Framework for Mobile
| Tactic | Technique ID | Technique Name | 
| Initial Access | T1660 | Phishing | 
| Defense Evasion | T1628.002 | Hide Artifacts: User Evasion | 
| Defense Evasion | T1655 | Masquerading | 
| Defense Evasion | T1406 | Obfuscated Files or Information | 
| Credential Access | T1414 | Clipboard Data | 
| Discovery | T1418 | Software Discovery | 
| Discovery | T1421 | System Network Connections Discovery | 
| Discovery | T1422 | System Network Configuration Discovery | 
| Discovery | T1424 | Process Discovery | 
| Discovery | T1426 | System Information Discovery | 
| Discovery | T1430 | Location Tracking | 
| Collection | T1409 | Stored Application Data | 
| Collection | T1414 | Clipboard Data | 
| Collection | T1429 | Audio Capture | 
| Collection | T1430 | Location Tracking | 
| Collection | T1636.003 | Protected User Data: Contact List | 
| Collection | T1636.004 | Protected User Data: SMS Messages | 
| Command and Control | T1437 | Application Layer Protocol | 
INSIGHTS
ETLM ASSESSMENT
From the ETLM perspective, CYFIRMA anticipates that Baohuo’s techniques could pave the way for more advanced threats that exploit popular communication platforms used by both individuals and organizations. As attackers refine their ability to embed backdoors into legitimate-looking apps, everyday users may unknowingly grant access to their private conversations, financial data, and digital identities. This could lead to a rise in large-scale account takeovers, impersonation scams, and privacy breaches that ripple across social and professional spaces alike. Over time, such tactics may redefine how trust is perceived in online interactions, creating an environment where even familiar apps and contacts can no longer be assumed safe.
IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.
YARA Rules
rule Baohuo_URLs_IPs_and_Hashes
{
meta:
description = “Detects IoCs (file hashes, URLs, IPs) associated with Baohuo” author = “CYFIRMA”
malware = “Baohuo”
strings:
// SHA1 file hashes
$sha1_1  = “4410f69099a037a25e5976df04a91cee7dbfac14”
$sha1_2 = “6699466094cc74e31fae4a959004d70fc5d10e94”
$sha1_3  = “4673bd285e1f6c6e628fd5aa8d7d9a2293310bf5”
$sha1_4  = “fc4b545cce8933b32d82ab792f0f6c12099f1f1a”
// URLs
$url_1 = “https://bvqie.com”
$url_2   =  “https://hpncallback.qianxun168.com”
$url_3   =  “https://hpncallback.gold5play.com”
$url_4 = “https://sdk-nps.ips5.info”
// IP addresses
$ip_1 = “159.138.237.10”
$ip_2 = “172.10.10.10”
condition:
any of ($sha1*) or any of ($url*) or any of ($ip*)
}
STRATEGIC RECOMMENDATIONS
MANAGEMENT RECOMMENDATIONS
TACTICAL RECOMMENDATIONS
Key Intelligence Signals:
Inside the Threat: MuddyWater – The Stealthy PowerShell Espionage Campaign
About the Threat Actor
MuddyWater is an APT group that primarily targets victims in the Middle East, employing in-memory attack techniques via PowerShell. Their operations fall under the “Living off the Land” category, as they avoid creating new binaries on the victim’s system, which helps maintain a low detection profile and minimal forensic footprint.
Details on Exploited Vulnerabilities
| CVE ID | Affected Products | CVSS Score | Exploit Links | 
| CVE-2017-0199 | Microsoft Office | 7.8 | Link1, link2, link3 | 
| CVE-2017-8759 | Microsoft .NET Framework | 7.8 | link | 
| CVE-2017-11882 | Microsoft Office | 7.8 | link | 
| CVE-2017-17215 | Huawei HG532 | 8.8 | – | 
| CVE-2020-0688 | Microsoft Exchange software | 8.8 | Link1, link2 | 
TTPs based on MITRE ATT&CK Framework
| Tactic | ID | Technique | 
| Resource Development | T1588.002 | Obtain Capabilities: Tool | 
| Resource Development | T1583.006 | Acquire Infrastructure: Web Services | 
| Initial Access | T1566.001 | Phishing: Spear phishing Attachment | 
| Initial Access | T1190 | Exploit Public-Facing Application | 
| Initial Access | T1566.002 | Phishing: Spear phishing Link | 
| Execution | T1059.001 | Command and Scripting Interpreter: PowerShell | 
| Execution | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | 
| Execution | T1059.005 | Command and Scripting Interpreter: Visual Basic | 
| Execution | T1059.006 | Command and Scripting Interpreter: Python | 
| Execution | T1059.007 | Command and Scripting Interpreter: JavaScript | 
| Execution | T1047 | Windows Management Instrumentation | 
| Execution | T1204.001 | User Execution: Malicious Link | 
| Execution | T1204.002 | User Execution: Malicious File | 
| Execution | T1203 | Exploitation for Client Execution | 
| Execution | T1053.005 | Scheduled Task/Job: Scheduled Task | 
| Execution | T1559.001 | Inter-Process Communication: Component Object Model | 
| Execution | T1559.002 | Inter-Process Communication: Dynamic Data Exchange | 
| Persistence | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | 
| Persistence | T1574.001 | Hijack Execution Flow: DLL | 
| Persistence | T1137.001 | Office Application Startup: Office Template Macros | 
| Persistence | T1053.005 | Scheduled Task/Job: Scheduled Task | 
| Privilege Escalation | T1548.002 | Abuse Elevation Control Mechanism: Bypass User Account Control | 
| Privilege Escalation | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | 
| Privilege Escalation | T1574.001 | Hijack Execution Flow: DLL | 
| Privilege Escalation | T1053.005 | Scheduled Task/Job: Scheduled Task | 
| Defense Evasion | T1218.003 | System Binary Proxy Execution: CMSTP | 
| Defense Evasion | T1218.005 | System Binary Proxy Execution: Mshta | 
| Defense Evasion | T1548.002 | Abuse Elevation Control Mechanism: Bypass User Account Control | 
| Defense Evasion | T1140 | Deobfuscate/Decode Files or Information | 
| Defense Evasion | T1574.001 | Hijack Execution Flow: DLL | 
| Defense Evasion | T1562.001 | Impair Defenses: Disable or Modify Tools | 
| Defense Evasion | T1036.005 | Masquerading: Match Legitimate Resource Name or Location | 
| Defense Evasion | T1027.010 | Obfuscated Files or Information: Command Obfuscation | 
| Defense Evasion | T1027.003 | Obfuscated Files or Information: Steganography | 
| Defense Evasion | T1027.004 | Obfuscated Files or Information: Compile After Delivery | 
| Defense Evasion | T1218.011 | System Binary Proxy Execution: Rundll32 | 
| Credential Access | T1555 | Credentials from Password Stores | 
| Credential Access | T1555.003 | Credentials from Password Stores: Credentials from Web Browsers | 
| Credential Access | T1003.001 | OS Credential Dumping: LSASS Memory | 
| Credential Access | T1003.004 | OS Credential Dumping: LSA Secrets | 
| Credential Access | T1003.005 | OS Credential Dumping: Cached Domain Credentials | 
| Credential Access | T1552.001 | Unsecured Credentials: Credentials In Files | 
| Discovery | T1083 | File and Directory Discovery | 
| Discovery | T1057 | Process Discovery | 
| Discovery | T1033 | System Owner/User Discovery | 
| Discovery | T1049 | System Network Connections Discovery | 
| Discovery | T1016 | System Network Configuration Discovery | 
| Discovery | T1087.002 | Account Discovery: Domain Account | 
| Discovery | T1082 | System Information Discovery | 
| Discovery | T1518 | Software Discovery | 
| Discovery | T1518.001 | Software Discovery: Security Software Discovery | 
| Lateral Movement | T1210 | Exploitation of Remote Services | 
| Collection | T1113 | Screen Capture | 
| Collection | T1560.001 | Archive Collected Data: Archive via Utility | 
| Collection | T1074.001 | Data Staged: Local Data Staging | 
| Command and Control | T1071.001 | Application Layer Protocol: Web Protocols | 
| Command and Control | T1132.001 | Data Encoding: Standard Encoding | 
| Command and Control | T1573.001 | Encrypted Channel: Symmetric Cryptography | 
| Command and Control | T1105 | Ingress Tool Transfer | 
| Command and Control | T1104 | Multi-Stage Channels | 
| Command and Control | T1090.002 | Proxy: External Proxy | 
| Command and Control | T1219 | Remote Access Tools | 
| Command and Control | T1102.002 | Web Service: Bidirectional Communication | 
| Exfiltration | T1041 | Exfiltration Over C2 Channel | 
Latest Developments Observed
The threat actor is suspected of deploying the Phoenix v4 backdoor in a new phishing campaign that leverages a compromised mailbox accessed through NordVPN to conceal its identity and evade attribution. The campaign primarily targets government and critical infrastructure sectors across the Middle East and North Africa (MENA) regions. The malware gathers system details, modifies registry keys, and connects to a command-and-control (C2) server for instructions. The intent appears to be espionage.
ETLM Insights
MuddyWater remains an active, espionage-focused Advanced Persistent Threat (APT) group aligned with Iranian state interests. The group continues to evolve its attack methodologies and expand its operational footprint across multiple industries and geographies to execute high-impact cyber-espionage campaigns.
Recent observations indicate that the threat actor is potentially enhancing its technical sophistication and operational resilience. The group is expected to increasingly leverage AI-generated phishing lures, deepfake media, and cloud- hosted command-and-control (C2) infrastructures to improve deception, persistence, and scalability of its operations.
The threat actor’s tactics, techniques, and choice of targets demonstrate a clear espionage-driven intent, primarily focused on intelligence collection and sustained network infiltration within strategic sectors.
The continued evolution of this actor underscores the necessity for organizations to strengthen email and identity security, cloud monitoring, and behavioral analytics to detect and mitigate sophisticated, state-linked intrusion attempts.
IOCs
Kindly refer to the IOCs Section to exercise controls on your security systems.
YARA Rules
rule MuddyWater_Indicators
{
meta:
author = “CYFIRMA”
description = “Detects files containing specific CVEs, IPs, domains, and Mozi-related indicators”
date = “2025-10-28”
strings:
// CVE indicators
$cve1 = “CVE-2017-0199”
$cve2 = “CVE-2017-8759”
$cve3 = “CVE-2017-11882”
$cve4 = “CVE-2017-17215”
$cve5 = “CVE-2020-0688”
$cve6 = “CVE-2025-4609”
$cve7 = “CVE-2020-1472”
$cve8 = “CVE-2018-13379”
$cve9 = “CVE-2014-8361”
$cve10 = “CVE-2019-0797”
// IP addresses
$ip1 = “1.1.1.1”
$ip2 = “67.228.235.91”
$ip3 = “141.98.252.143”
$ip4 = “31.171.154.67”
// Domains
$domain1 = “lab52.io”
$domain2 = “filetransfer.io”
$domain3 = “rambler.ru”
// Malware/Mozi indicators
$mozi1 = “elf:mozi.m”
$mozi2 = “Mozi.m”
$mozi3 = “index.php” condition:
any of ($cve*) or any of ($ip*) or any of ($domain*) or any of ($mozi*)
}
Strategic
Management
Tactical
China accuses the US of hacking its National Time Service Center
China’s Ministry of State Security (MSS) has alleged that the U.S. National Security Agency (NSA) conducted a cyberattack on the National Time Service Center (NTSC), a public institution tasked with maintaining China’s standard time. Comparable to the U.S. Naval Observatory, the NTSC supports critical sectors, including communications, finance, power, transportation, surveying, and defense, with high-precision time services. The MSS claims to possess “ironclad evidence” of the NSA’s attempts to steal state secrets and engage in cyber espionage, with China’s CERT releasing a technical analysis of the incident. However, many Western analysts view these accusations as a diversion from allegations against Beijing’s Salt Typhoon hacking operations.
From April 18, 2023, the intruders reportedly used those credentials to repeatedly infiltrate NTSC computers, mapping the institute’s network infrastructure for further probing. The campaign escalated between August 2023 and June 2024, with the deployment of a sophisticated “cyber warfare platform” that, according to the Chinese government, activated 42 specialized cyber tools to launch high-intensity attacks on multiple internal NTSC systems, including attempts to sabotage the Accurate Ground-based Time Service System (AGTSS), a terrestrial backup to China’s GPS equivalent.
ETLM Assessment:
The MSS described these tactics as involving forged digital certificates to evade antivirus software, high-strength encryption to erase traces, and operations routed through proxies in the Philippines, Japan, Taiwan, Europe, and VPNs, often conducted during late-night hours in Beijing time. If true, this modus operandi would mean attackers have pursued a dual-track strategy of intelligence gathering and strategic sabotage preparation. Primarily, the objectives centered on stealing state secrets and conducting cyber espionage. Secondarily, the escalation to deploying a “cyber warfare platform” with 42 specialized tools between August 2023 and June 2024 suggests a focus on pre-positioning for disruption, aiming to implant persistent access for future sabotage rather than immediate exploitation.
Disabling or manipulating the high-precision ground-based timing system (AGTSS), potentially by injecting malware to alter time signals or erase synchronization data, leads to immediate desynchronization of national networks. This could manifest among many other things as network and communications failures: Time-stamped packets in telecommunications would misalign, causing packet loss, delayed data transmission, or complete outages in mobile and internet services, paralyzing emergency response and daily connectivity. This aligns with geopolitical motives in the U.S.-China rivalry, where controlling timing infrastructure could yield leverage in conflicts over Taiwan or the South China Sea by enabling timed disruptions to Beijing’s command-and-control networks.
Russian hackers behind US nuclear weapons manufacturing site hack; Russian hackers deploy new malware
According to recent research, foreign hackers used SharePoint vulnerabilities to breach the Kansas City National Security Campus (KCNSC), which manufactures roughly 80% of the non-nuclear parts in the US’s nuclear stockpile. Microsoft patched the flaws this summer after the vulnerabilities were exploited in a wave of zero-day attacks. The US National Nuclear Security Administration (NNSA) disclosed in July that it had been affected by the attacks but didn’t share details.
While researchers attributed the initial zero-day attacks to Chinese state-sponsored actors, US security personnel quoted in the media attribute the KCNSC incident to a Russian threat actor. Meanwhile, Russian hackers have been observed by researchers deploying new strains of malware dubbed NOROBOT. Just five days after Google’s May 2025 report on COLDRIVER’s LOSTKEYS malware, the group adopted new malware families. Researchers note that COLDRIVER is deploying the new malware more aggressively than any prior campaigns. Delivered through CAPTCHA- themed ClickFix attacks, NOROBOT’s infection chain has evolved significantly. Initially simplified to boost deployment success, it later regained complexity by splitting cryptography keys, complicating campaign tracking. This ongoing development underscores COLDRIVER’s efforts to evade detection and target high-value individuals for intelligence collection.
ETLM Assessment:
FSB-linked hackers, often operating as state-sponsored cyber units, are known for their sophisticated and covert operations targeting government entities, critical infrastructure, and private organizations worldwide. Groups like Fancy Bear (APT28), believed to be associated with Russia’s Federal Security Service (FSB), have been implicated in high-profile cyberattacks, election interference, and breaches of European governmental networks. These hackers employ advanced techniques, including spear-phishing, zero-day exploits, and custom malware, to infiltrate systems and extract sensitive data. Their activities are typically driven by geopolitical motives, aiming to gather intelligence, disrupt adversaries, or influence political outcomes. The FSB’s backing provides these groups with significant resources, enabling persistent and evolving campaigns that challenge global cybersecurity efforts. A campaign like the KCNSC hack this summer would be in line with their operations.
RansomHouse Ransomware Impacts Kurogane Kasei Co., Ltd
Summary:
CYFIRMA observed in an underground forum that a company from Japan, Kurogane Kasei Co., Ltd (https[:]//www[.]kuroganekasei[.]com/), was compromised by RansomHouse Ransomware. Kurogane Kasei Co., Ltd. is a development-focused Japanese chemical manufacturer specializing in organic synthesis and fine chemicals. The company’s main operations include joint research and development, contract synthesis, and scalable chemical production ranging from small gram-scale prototypes to ton-scale manufacturing. They actively serve sectors such as electronics, pharmaceuticals, and agrochemicals, leveraging advanced technologies like esterification and maintaining specialized facilities for dust-free, metal-free processes, especially for high-purity and low-metal ion chemical applications crucial to electronic materials. The compromised data includes sensitive and confidential information related to the organization.

Relevancy & Insights:
 
 
ETLM Assessment:
According to CYFIRMA’s assessment, RansomHouse ransomware predominantly targets large enterprises and high-value organizations through phishing and spear phishing campaigns. The group also employs third-party frameworks, such as Vatet Loader, Metasploit, and Cobalt Strike, to gain initial access and perform lateral movements within victim networks. RansomHouse typically skips data encryption, focusing instead on exfiltrating sensitive data to extort victims by threatening to publicly release the stolen information. This approach allows the group to maintain stealth and prolong their presence in targeted environments.
SafePay Ransomware Impacts the MINO Group
Summary
CYFIRMA observed in an underground forum that a company from Japan, MINO Group (https[:]//www[.]mino-in[.]co[.]jp/), was compromised by SafePay Ransomware. MINO Group is a Japanese manufacturer that designs and builds screen-printing machines, stencil makers, dryers, printing accessories, and specialty inks. The exposed data comprises highly confidential and sensitive information associated with the organization.

Relevancy & Insights:
 
 
ETLM Assessment:
According to CYFIRMA’s assessment, SafePay represents a sophisticated, fast- moving ransomware threat capitalizing on VPN weaknesses and credential theft, employing effective double extortion tactics to maximize ransom payments. 
Organizations, especially in highly targeted sectors and regions, must prioritize layered defenses and active hunting for early detection.
Vulnerability in Docker Desktop for Windows installer
Relevancy & Insights:
The vulnerability exists due to the usage of an untrusted search path in Docker Desktop Installer.exe.
Impact:
A local user can place a malicious .dll file into a specific location on the system and execute arbitrary code with escalated privileges.
Affected Products:
https[:]//docs[.]docker[.]com/security/security- announcements/#docker-desktop-4490-security-update-cve-2025-9164
Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.
TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerability in Docker Desktop for Windows Installer can pose significant threats to user privacy and system security. This can impact various industries globally, including technology, finance, healthcare, and software development. Ensuring the security of Docker Desktop for Windows is crucial for maintaining the integrity and protection of users’ environments worldwide. Therefore, addressing these vulnerabilities is essential to safeguarding containerized application development, virtualization processes, and secure software deployment across different geographic regions and sectors.
The Gentlemen Ransomware attacked and published the data of 2GO Group, Inc.
Summary:
Recently, the Gentlemen Ransomware was observed attacking and publishing the data of 2GO Group, Inc. (https[:]//2go[.]com[.]ph/) on its dark web website. 2GO Group, Inc. is the largest integrated transportation and logistics provider in the Philippines, offering end-to-end multimodal logistics and transportation solutions.
2GO operates through several specialized business units, including 2GO Sea Solutions, 2GO Express, 2GO Special Containers and Projects, 2GO Forwarding, and 2GO Logistics, providing services ranging from sea freight and passenger transport to warehousing, special container transport, project logistics, express delivery, and e-commerce logistics. The ransomware attack on 2GO Group resulted in a significant data leak, compromising a variety of sensitive organizational information. The exposed data includes personally identifiable information (PII), financial records, and transportation and logistics data, along with other confidential and proprietary information related to the company.

Relevancy & Insights:
ETLM Assessment:
According to CYFIRMA’s assessment, the Gentlemen ransomware group exemplifies the rising sophistication and persistence of modern ransomware actors, necessitating tailored enterprise defenses and vigilant threat monitoring.
Royal Thai Army Enlistment Portal Data Advertised on a Leak Site
Summary: The CYFIRMA Research team observed that a threat actor, “Kazu,” claims to have breached the Official Royal Thai Army Online Enlistment Portal (RTA). This portal is the official online system used for voluntary military enlistment, allowing eligible Thai males to apply to serve as regular soldiers instead of going through the traditional draft process.
According to the actor, the allegedly compromised data is being offered for sale and includes:
The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Vidal Health Insurance TPA Pvt. Ltd. (Vidal Health) Data Advertised on a Leak Site
Summary:
The CYFIRMA Research team observed that a threat actor, “Kazu,” claims to have breached Vidal Health Insurance TPA Pvt. Ltd. (Vidal Health), a leading IRDAI-licensed third-party administrator in India. The company facilitates health insurance services, including claims processing and cashless hospitalization, for major insurers and government health schemes like Ayushman Bharat.
The threat actor is advertising a database of 472 GB, allegedly exfiltrated in October 2025 and containing 326,865 files. The data is being offered for sale for $3,000.
According to the actor and samples provided, the compromised data includes a vast amount of sensitive patient and personal information:
The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Relevancy & Insights:
Financially motivated cybercriminals are continuously looking for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to gain access and steal valuable data. Subsequently, the stolen data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.
ETLM Assessment:
The threat actor “Kazu” has recently emerged as a notably active group engaged in data leak activities. Credible sources have tied the group to multiple security breaches involving unauthorized system access and attempts to sell stolen data on dark web marketplaces. The group’s ongoing operations illustrate the persistent and escalating cyber threats stemming from underground forums. These incidents reinforce the critical need for organizations to bolster cybersecurity through continuous monitoring, advanced threat intelligence, and proactive defense strategies to protect sensitive data and critical infrastructure.
Recommendations: Enhance the cybersecurity posture by:
The CYFIRMA Research team observed that a threat actor claims to have breached Jazeera Airways (jazeeraairways.com), a Kuwaiti low-cost airline. The actor alleges the data contains 15 million passenger records spanning from 2020 to 2023 and is offering it for sale.
According to the actor, the compromised data includes a vast amount of personally identifiable information (PII). Screenshots provided as proof suggest the leak originates from the airline’s database tables and includes the following data types:
The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

STRATEGIC RECOMMENDATIONS
MANAGEMENT RECOMMENDATIONS
TACTICAL RECOMMENDATIONS
Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.







For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.