Self Assessment

Weekly Intelligence Report – 05 December 2025

Published On : 2025-12-05
Share :
Weekly Intelligence Report – 05 December 2025

Ransomware of the Week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This covers a variety of topics that can be pertinent to your company, including technology, geography, and industries.

Type: Ransomware
Target Technologies: Windows

Introduction
CYFIRMA Research and Advisory Team has found Benzona Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

Benzona Ransomware
Researchers have identified Benzona as a ransomware strain that encrypts victims’ files and appends the “.benzona” extension to each affected item. Once active, it locks user data using strong cryptographic methods and prevents access without a decryption key controlled by the attackers. During infection, it also generates a ransom note named “RECOVERY_INFO.txt”, flags all encrypted files with the new extension to reinforce that control over the system has been taken. Removal of the malware stops further encryption, but already-locked files will be difficult to restored without external backups.

Screenshot of files encrypted by this ransomware (Source: SurfaceWeb)

The ransomware’s note instructs victims to communicate with the attackers through a TOR-based chat portal, providing steps for downloading the TOR browser and entering a unique chat ID. In the message, the operators claim that files have been both encrypted and exfiltrated, warn victims not to rename files or use recovery tools, and threaten to leak or sell stolen data if contact is not made within 72 hours. The note emphasizes avoiding law enforcement and directs victims toward the attackers’ negotiation page, reinforcing pressure through statements about reputational risk and deadline based consequences.

The appearance of Benzona’s ransom note (RECOVERY_INFO.txt) (Source: Surface Web)

The Benzona extortion site functions as the group’s public-facing pressure mechanism, where stolen data and victim details are displayed to intensify coercion during negotiations. The site lists organizations alongside exfiltrated data volumes, ransom demands, and scheduled leak dates, using this information to signal the attackers’ willingness to publish or sell compromised material if payment is not made. Structured similarly to other double‑extortion platforms, it provides a centralized space for showcasing breaches, validating the threat to new victims, and reinforcing the group’s operational credibility within the criminal ecosystem.

The appearance of Benzona’s data leak site (Source: Surface Web)

The appearance of Benzona’s Tor chat site (Source: Surface Web)

Following are the TTPs based on the MITRE Attack Framework.

Tactic Technique ID Technique Name
Execution T1059 Command and Scripting Interpreter
Execution T1106 Native API
Persistence T1543.003 Create or Modify System Process: Windows Service
Privilege Escalation T1055 Process Injection
Privilege Escalation T1543.003 Create or Modify System Process: Windows Service
Privilege Escalation T1548 Abuse Elevation Control Mechanism
Defense Evasion T1055 Process Injection
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1070.006 Indicator Removal: Timestomp
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1497 Virtualization/Sandbox Evasion
Defense Evasion T1548 Abuse Elevation Control Mechanism
Defense Evasion T1562.001 Impair Defenses: Disable or Modify Tools
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1497 Virtualization/Sandbox Evasion
Discovery T1518.001 Software Discovery: Security Software Discovery
Collection T1560 Archive Collected Data
Command and Control T1071 Application Layer Protocol
Command and Control T1090 Proxy
Impact T1485 Data Destruction
Impact T1489 Service Stop
Impact T1490 Inhibit System Recovery

Relevancy and Insights:

  • The ransomware primarily affects the Windows operating system, which is commonly utilized in enterprise environments across multiple industries.
  • The ransomware terminates processes such as vssadmin.exe and wmic.exe to remove Volume Shadow Copies, which Windows uses for system recovery and backup operations. By eliminating these shadow copies, the malware prevents victims from restoring data through system restore points or built-in backup mechanisms.
  • Detect-debug-environment: The ransomware technique is used to determine if it is being monitored in environments such as sandboxes, virtual machines, or under debugging tools. To perform this check, the malware may look for specific processes, drivers, or artifacts linked to analysis tools, measure timing to spot inconsistencies, or scan for system traits uncommon in real user machines. When such conditions are identified, the malicious program can modify its behavior such as pausing execution, shutting down, or withholding key payload actions to avoid detection and make detailed analysis more difficult.

ETLM Assessment:
CYFIRMA’s assessment indicates that Benzona ransomware operates squarely within the double-extortion model, leveraging both data encryption and data theft to pressure victims into compliance. Its tactics mirror established ransomware-as-a-service (RaaS) behaviors, including fast deployment, automated file-locking mechanisms, TOR-based negotiation channels, and structured exfiltration processes intended to amplify leverage. Within the broader threat environment, Benzona fits the ongoing shift toward data driven coercion, layered extortion methods, and the use of public leak platforms all hallmarks of financially motivated actors that rely on scalable infrastructure and controlled communication pathways to optimize their operations.

Industry analyses of similar ransomware ecosystems indicate that threats functioning in this manner may continue gravitating toward deeper data-centric extortion, increased automation across the intrusion and encryption chain, and greater use of anonymized negotiation environments to obscure operator identity. As data theft becomes a primary pressure point, groups employing models comparable to Benzona are likely to reinforce their leak-site frameworks, broaden victim selection across varied sectors, and refine their coercive tactics to heighten reputational impact consistent with the prevailing trajectory observed across modern cyber-extortion campaigns.

Sigma Rule
title: Shadow Copies Deletion Using Operating Systems Utilities
tags:
– attack.defense-evasion
– attack.impact
– attack.t1070
– attack.t1490
logsource:
category: process_creation
product: windows
detection:
selection1_img:
– Image|endswith:
– ‘\powershell.exe’
– ‘\pwsh.exe’
– ‘\wmic.exe’
– ‘\vssadmin.exe’
– ‘\diskshadow.exe’
– OriginalFileName:
– ‘PowerShell.EXE’
– ‘pwsh.dll’
– ‘wmic.exe’
– ‘VSSADMIN.EXE’
– ‘diskshadow.exe’
selection1_cli:
CommandLine|contains|all:
– ‘shadow’ # will match “delete shadows” and “shadowcopy delete” and “shadowstorage”
– ‘delete’
selection2_img:
– Image|endswith: ‘\wbadmin.exe’
– OriginalFileName: ‘WBADMIN.EXE’
selection2_cli:
CommandLine|contains|all:
– ‘delete’
– ‘catalog’
– ‘quiet’ # will match -quiet or /quiet
selection3_img:
– Image|endswith: ‘\vssadmin.exe’
– OriginalFileName: ‘VSSADMIN.EXE’
selection3_cli:
CommandLine|contains|all:
– ‘resize’
– ‘shadowstorage’
CommandLine|contains:
– ‘unbounded’
– ‘/MaxSize=’
condition: (all of selection1*) or (all of selection2*) or (all of selection3*)
falsepositives:
– Legitimate Administrator deletes Shadow Copies using operating systems utilities for legitimate reason
– LANDesk LDClient Ivanti-PSModule (PS EncodedCommand)
level: high
(Source: Surface Web)

Indicators of Compromise
Kindly refer to the IOCs section to exercise control of your security systems

STRATEGIC RECOMMENDATION

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATION

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority. 
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATION

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rules for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Trending Malware of the Week

Type: Remote Access Trojan (RAT)
Objective: Credential Theft, Data Exfiltration, System Profiling, Remote Access
Target Technologies: Android OS
Target Industry: Financial Sector (Banks, Payment Services, Cryptocurrency Exchanges/Wallets)
Target Geography: Global

Active Malware of the Week
This week “Albiriox” is trending.

Overview of Albiriox Malware
Albiriox is a newly emerging Android remote access Trojan (RAT) sold under a Malware-as-a-Service (MaaS) model on underground cybercrime forums. It first appeared in September 2025 in a closed phase limited to high-reputation forum members and quickly evolved into a publicly accessible service by October 2025. Its core functionality blends VNC-style remote access with credential-stealing overlays, giving attackers both control and visibility over victim activity. Activity on these forums, along with language used and supporting infrastructure, strongly suggests that Russian-speaking threat actors are likely responsible for developing and operating Albiriox. Its distribution relies on deceptive applications and well-crafted social engineering schemes, enabling attackers to bypass basic security checks.

Once installed, Albiriox provides the operator with full, real-time control of an infected device, allowing fraudulent actions to be carried out directly inside legitimate banking or cryptocurrency applications. This method, known as On-Device Fraud, significantly complicates detection because all actions originate from the victim’s own device and appear authentic. The malware also uses various overlay screens to conceal unauthorized activity or prompt users to grant additional permissions.

Despite being relatively new, Albiriox is designed to target a wide range of financial and cryptocurrency applications, underscoring its operators’ broader ambitions and the potential for significant impact on Android users who rely on these services. Its rapid development, combined with built-in tools designed to evade security solutions, positions it as a growing concern for financial institutions. The rise of such tools underscores the need for stronger, behavior-based mobile security mechanisms capable of identifying early signs of device compromise and preventing fraudulent actions before they occur.

Attack Method
In this campaign, Albiriox relies on a socially engineered delivery chain that begins with deceptive mobile applications distributed through targeted phishing pages. In the early stages of the campaign victims are lured through SMS or messaging-platform links that lead to websites impersonating trusted brands, such as regional retail or service apps. These fake pages convincingly replicate legitimate play stores, encouraging users to download what appears to be an authentic application. Once the victim installs the decoy app, the hidden dropper immediately initiates the second stage of the attack by requesting permissions that allow installations from unknown sources, ultimately enabling the silent deployment of the Albiriox payload.

After installation, Albiriox establishes a covert foothold on the device by activating accessibility-based controls and background services. These features allow the malware to quietly prepare the environment for remote manipulation without alerting the user. The attackers can then initiate full device takeover using a built-in remote access module that streams the screen in real time and accepts operator commands. Through this mechanism, the threat actors navigate the victim’s banking or cryptocurrency apps as though they were using the device themselves, enabling seamless execution of unauthorized transactions.

To strengthen its operational cover, Albiriox employs overlay screens that mimic system processes or obscure the device display entirely. These overlays are used to conceal fraudulent actions performed during remote sessions or to prompt the victim for additional permission. By blending technical control, visual deception, and interactive manipulation, the attackers achieve a smooth and highly effective on-device fraud workflow, significantly reducing the chance of user suspicion or automated security detection.

Following are the TTPs based on the MITRE Attack Framework for Mobile

Tactic Technique ID Technique Name
Initial Access T1660 Phishing
Persistence T1398 Boot or Logon Initialization Scripts
Privilege Escalation T1404 Exploitation for Privilege Escalation
Defense Evasion T1406 Obfuscated Files or Information
Credential Access T1414 Clipboard Data
Credential Access T1417 Input Capture
Discovery T1418 Software Discovery
Collection T1430 Location Tracking
Collection T1409 Stored Application Data
Command and control T1429 Audio Capture
Collection T1437.001 Application Layer Protocol: Web Protocols

INSIGHTS

  • Criminal Market Dynamics: Albiriox offers a clear view into how today’s cybercrime marketplace operates, where malware is packaged, advertised, and sold like a commercial product. Its rollout from a private testing phase to a paid public service shows how threat actors increasingly rely on structured business models to attract affiliates and scale their operations. The presence of promotional videos, pricing tiers, and bundled tools illustrates a professionalized ecosystem in which malware authors position their creations as ready-to-use commodities rather than niche technical projects. This commercialization lowers the barrier to entry for less-skilled actors and fuels rapid adoption.
  • Psychological Anchoring Through Familiar Brands: A distinctive aspect of Albiriox’s distribution strategy is its deliberate choice of everyday brands and services to build credibility. By imitating popular retailers and using trust-based lures such as digital promotions or app updates, the attackers align the initial infection pathway with normal user behavior. These tactics exploit the sense of routine associated with downloading store apps or interacting with service providers, making the fake pages and messages appear harmless. This shows how attackers increasingly borrow from legitimate marketing tactics visual consistency, brand imitation, and reward-driven prompts to encourage user engagement without raising suspicion.
  • Trust Manipulation Through Device Visibility: Albiriox’s method of operating directly inside the victim’s own mobile environment reflects a shift toward attacks that quietly leverage the trust users place in their personal devices. Instead of stealing passwords outright, the malware takes advantage of the legitimacy of the victim’s existing banking apps, their logged-in sessions, and their everyday habits. By performing actions within the same interface and device the user relies on, attackers sidestep traditional warning signs that accompany unauthorized access. This blending of malicious activity into familiar digital spaces demonstrates how modern threat actors exploit the illusion of safety created by one’s own device, turning personal trust into an operational advantage.

ETLM ASSESSMENT
From an ETLM perspective, CYFIRMA assesses that the emergence of Albiriox points toward a future in which mobile devices assume an increasingly central role in organizational risk. As employees continue to depend on smartphones for financial access, authentication, communication, and workflow integration, adversaries are likely to develop even more refined methods that blend seamlessly into normal device activity. This will make it progressively more difficult for enterprises to discern whether actions on a device originate from the legitimate user or from an attacker operating covertly in the background. Over time, this shift may compel organizations to adopt stronger mechanisms for validating mobile-initiated actions and to regard routine app interactions with heightened scrutiny. As personal and professional digital environments become further intertwined, Albiriox style campaigns may gradually erode confidence in everyday mobile usage, prompting both employees and enterprises to approach familiar device behaviors with increased caution.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

YARA Rule
rule Albiriox_IOCs
{
meta:
author = “CYFIRMA”
description = “Detects known IOCs associated with the Albiriox Android malware campaign”
date = “2025-12-01”

strings:
/* ———- APK Hashes ———- */
$sha256_1 = “070640095c935c245f960e4e2e3e93720dd57465c81fa9c72426ee008c627bf3”
$sha256_2 = “5e14181839816bbb4b55badc91f29d382e8d6f603eec2ed8f8b731c35def6b59”
$sha256_3 = “630b047722d553495def3b8e744f2f621209e1a77389c09a9a972eeb243f9ed8”
$sha256_4 = “a0c9d6eb1932c96a11301c00cf96ce9767fb11401e090f215f972df06b09a878”

/* ———- Malicious Domains ———- */
$d1 = “google-app-download.download”
$d2 = “google-get.download”
$d3 = “google-aplication.download”
$d4 = “play.google-get.store”
$d5 = “google-app-get.com”
$d6 = “google-get-app.com”
$d7 = “google-app-install.com”

/* ———- C2 Server ———- */
$ip1 = “194.32.79.94”

condition:
any of ($sha256*) or
any of ($d*) or
any of ($ip*)
}

STRATEGIC RECOMMENDATION

  • Implement a zero-trust approach for mobile interactions, ensuring that all device actions, especially those linked to financial or high risk applications are continuously verified.
  • Enforce strict controls on mobile app acquisition by restricting downloads to official app stores and approved enterprise repositories, preventing exposure to spoofed or manipulated applications.
  • Strengthen identity and session security by integrating continuous authentication and monitoring for signs of remote manipulation or abnormal user behavior.
  • Deploy behavior-driven detection models capable of identifying subtle indicators of on-device fraud, such as unusual interaction patterns or automated navigation sequences.

MANAGEMENT RECOMMENDATION

  • Establish enterprise-wide mobile application policies that explicitly prohibit installation of apps sourced through messaging links, QR codes, promotional pages, or unverified websites.
  • Conduct recurring employee training focused on identifying deceptive app pages, permission abuse tactics, and fraudulent update prompts commonly used in Albiriox style campaigns.
  • Enhance oversight of mobile communication channels to detect unexpected app download requests, suspicious permission grants, or repeated prompts originating from fake system notifications.
  • Maintain well-defined response procedures for mobile compromises, including immediate device isolation, credential resets, and review of financial or authentication activities.

TACTICAL RECOMMENDATION

  • Enable comprehensive logging for mobile application installations, accessibility service activations, and background service behavior to support fast identification of anomalies.
  • Restrict the ability of devices to install applications from unknown sources and enforce permission-hardening to prevent unauthorized accessibility or device control capabilities.
  • Configure automated alerts for abnormal touch sequence patterns, remote interaction signals, high-frequency screen overlays, or unexpected communication with external servers.
  • Regularly audit mobile persistence points and accessibility settings to ensure no unauthorized services, overlays, or background modules remain active.
  • Continuously monitor and block the relevant IOCs while reinforcing defensive controls using tactical threat intelligence derived from the Albiriox campaign.
  • Incorporate YARA rules into the detection pipeline to identify unusual application structures, unpacked payloads, or behaviors reflective of Albiriox-like remote control modules.

Weekly Intelligence Trends/Advisory

1. Weekly Attack Type and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Cl0p Ransomware,Dire Wolf Ransomware | Malware – Albiriox
  • o Cl0p Ransomware– One of the ransomware groups.

    o Dire Wolf Ransomware – One of the ransomware groups.

  • Please refer to the trending malware advisory for details on the following:
  • o Malware – Albiriox

  • Behaviour –Most of these malware use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

Lazarus Group Continuously Evolving its Attack Surface

  • Threat Actor: Lazarus Group
  • Attack Type: Botnet Operations, Malware Implant, DLL Injection Attacks, Direct IP-based C2 Communication, Impersonation, Obfuscation, Open Proxy Usage, Credential Stealing, Social Engineering Attack, Supply Chain Attacks, Ransomware Attacks, Cryptocurrency theft, Exploitation of Vulnerabilities.
  • Objective: Information theft, Espionage, Financial Gains
  • Suspected Target Technology: Windows, macOS, Linux, SAP Systems, Cryptocurrency Exchanges, Financial Platforms (including SWIFT), JetBrains TeamCity, Oracle Products, Dell Systems, Atlassian Confluence, Citrix NetScaler ADC/Gateway.
  • Suspected Target Geography: Australia, Brazil, Brunei, Canada, Chile, China, Darussalam, Democratic People’s Republic of Korea, France, Germany, Guatemala, Hongkong, India, Indonesia, Islamic Republic of Iran, Japan, Myanmar, Philippines, Poland, Republic of Korea, Russia, Thailand, United Kingdom, United States, Vietnam, Bangladesh
  • Suspected Target Industries: Aerospace & Defense, Capital Markets, Consumer Finance, Cryptocurrency, Defense, Diversified Financial Services, Energy, Entertainment, Government, Hotels, Investment Trusts (REITs), Media, NGO, Real Estate, Restaurants & Leisure, Technology, Telecommunications, Thrifts and Mortgage, Banks
  • Business Impact: Financial Loss, Data Theft, Operational Disruption, Reputational Damage

About the Threat Actor
The Lazarus Group, active since at least 2009, is a highly sophisticated cyber-espionage and financially motivated threat actor linked to the North Korean government, specifically associated with Lab 110, a unit within DPRK military intelligence. The group maintains a dedicated malware development and exploitation team, enabling rapid refinement of tools, implants, and intrusion techniques.

In recent years, Lazarus has intensified its focus on cryptocurrency exchanges and financial platforms, reflecting its dual mandate of revenue generation and strategic intelligence collection. Its operations consistently target high-value firms worldwide, underscoring the group’s emphasis on monetization, data theft, and long-term espionage campaigns.

Details on Exploited Vulnerabilities

CVE ID Affected Products CVSS Score Exploit Links
CVE-2021-44228  Apache Log4j 10.0 link1, link2,link3, link4, link5, link6, link7, link8, link9, link10, link11, link12, link13, link14,link15, link16
CVE-2023-4966 Citrix NetScaler ADC / Gateway 7.5 link
CVE-2023-22518 Atlassian Confluence 9.8 link
CVE-2017-0147 Microsoft Windows
(Various Versions)
7.5 link1, link2
CVE-2017-11882 Microsoft Office
(Various Versions)
7.8 link
CVE-2017-0199 Microsoft Office & Windows 7.8 link
CVE-2023-36884 Microsoft Windows 7.5 ————-
CVE-2023-42793 JetBrains TeamCity 9.8 link1
CVE-2024-3094 XZ Utils (5.6.0 and 5.6.1) 10.0 ————-
CVE-2017-10271 Oracle WebLogic Server 7.5 link1, link2
CVE-2021-21551 Dell systems with dbutil_2_3.sys driver 7.8 link1, link2

TTPs based on MITRE ATT&CK Framework

Tactic ID Technique
Reconnaissance T1591 Gather Victim Org Information
Reconnaissance T1591.004 Gather Victim Org Information: Identify Roles
Reconnaissance T1589.002 Gather Victim Identity Information: Email Addresses
Reconnaissance T1593.001 Search Open Websites/Domains: Social Media
Resource Development T1608.001 Stage Capabilities: Upload Malware
Resource Development T1608.002 Stage Capabilities: Upload Tool
Resource Development T1587.001 Develop Capabilities: Malware
Resource Development T1587.002 Develop Capabilities: Code Signing Certificates
Resource Development T1583.001 Acquire Infrastructure: Domains
Resource Development T1583.004 Acquire Infrastructure: Server
Resource Development T1583.006 Acquire Infrastructure: Web Services
Resource Development T1584.001 Compromise Infrastructure: Domains
Resource Development T1584.004 Compromise Infrastructure: Server
Resource Development T1585.001 Establish Accounts: Social Media Accounts
Resource Development T1585.002 Establish Accounts: Email Accounts
Resource Development T1588.002 Obtain Capabilities: Tool
Resource Development T1588.003 Obtain Capabilities: Code Signing Certificates
Resource Development T1588.004 Obtain Capabilities: Digital Certificates
Initial Access T1189 Drive-by Compromise
Initial Access T1566.001 Phishing: Spear phishing Attachment
Initial Access T1566.002 Phishing: Spear phishing Link
Initial Access T1566.003 Phishing: Spear phishing via Service
Execution T1059.001 Command and Scripting Interpreter: PowerShell
Execution T1053.005 Scheduled Task/Job: Scheduled Task
Execution T1106 Native API
Execution T1204.001 User Execution: Malicious Link
Execution T1204.002 User Execution: Malicious File
Execution T1203 Exploitation for Client Execution
Execution T1059.003 Command and Scripting Interpreter: Windows Command Shell
Execution T1047 Windows Management Instrumentation
Execution T1059.005 Command and Scripting Interpreter: Visual Basic
Persistence T1505.004 Server Software Component: IIS Components
Persistence T1542.003 Pre-OS Boot: Bootkit
Persistence T1574.001 Hijack Execution Flow: DLL
Persistence T1574.013 Hijack Execution Flow: KernelCallbackTable
Persistence T1543.003 Create or Modify System Process: Windows Service
Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Persistence T1053.005 Scheduled Task/Job: Scheduled Task
Persistence T1098 Account Manipulation
Persistence T1547.009 Boot or Logon Autostart Execution: Shortcut Modification
Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation T1098 Account Manipulation
Privilege Escalation T1547.009 Boot or Logon Autostart Execution: Shortcut Modification
Privilege Escalation T1543.003 Create or Modify System Process: Windows Service
Privilege Escalation T1055.001 Process Injection: Dynamic-link Library Injection
Privilege Escalation T1574.001 Hijack Execution Flow: DLL
Privilege Escalation T1574.013 Hijack Execution Flow: KernelCallbackTable
Privilege Escalation T1134.002 Access Token Manipulation: Create Process with Token
Privilege Escalation T1053.005 Scheduled Task/Job: Scheduled Task
Defense Evasion T1134.002 Access Token Manipulation: Create Process with Token
Defense Evasion T1218 System Binary Proxy Execution
Defense Evasion T1218.005 System Binary Proxy Execution: Mshta
Defense Evasion T1218.010 System Binary Proxy Execution: Regsvr32
Defense Evasion T1218.011 System Binary Proxy Execution: Rundll32
Defense Evasion T1620 Reflective Code Loading
Defense Evasion T1070 Indicator Removal
Defense Evasion T1070.003 Indicator Removal: Clear Command History
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1070.006 Indicator Removal: Timestomp
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1036.003 Masquerading: Rename Legitimate Utilities
Defense Evasion T1036.004 Masquerading: Masquerade Task or Service
Defense Evasion T1036.005 Masquerading: Match Legitimate Resource Name or Location
Defense Evasion T1036.008 Masquerading: Masquerade File Type
Defense Evasion T1027.002 Obfuscated Files or Information: Software Packing
Defense Evasion T1027.007 Obfuscated Files or Information: Dynamic API Resolution
Defense Evasion T1027.009 Obfuscated Files or Information: Embedded Payloads
Defense Evasion T1027.013 Obfuscated Files or Information: Encrypted/Encoded File
Defense Evasion T1542.003 Pre-OS Boot: Bootkit
Defense Evasion T1220 XSL Script Processing
Defense Evasion T1055.001 Process Injection: Dynamic-link Library Injection
Defense Evasion T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion
Defense Evasion T1622 Debugger Evasion
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1564.001 Hide Artifacts: Hidden Files and Directories
Defense Evasion T1221 Template Injection Authentication Process: Conditional Access Policies
Defense Evasion T1574.001 Hijack Execution Flow: DLL
Defense Evasion T1574.013 Hijack Execution Flow: KernelCallbackTable
Defense Evasion T1497.001 Virtualization/Sandbox Evasion: System Checks
Defense Evasion T1553.002 Subvert Trust Controls: Code Signing
Defense Evasion T1078 Valid Accounts
Defense Evasion T1562.001 Impair Defenses: Disable or Modify Tools
Defense Evasion T1562.004 Impair Defenses: Disable or Modify System Firewall
Defense Evasion T1656 Impersonation
Credential Access T1056.001 Input Capture: Keylogging
Credential Access T1110.003 Brute Force: Password Spraying
Credential Access T1557.001 Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay
Discovery T1083 File and Directory Discovery
Discovery T1057 Process Discovery
Discovery T1497.001 Virtualization/Sandbox Evasion: System Checks
Discovery T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion
Discovery T1087.002 Account Discovery: Domain Account
Discovery T1010 Application Window Discovery
Discovery T1046 Network Service Discovery
Discovery T1622 Debugger Evasion
Discovery T1082 System Information Discovery
Discovery T1012 Query Registry
Discovery T1614.001 System Location Discovery: System Language Discovery
Discovery T1016 System Network Configuration Discovery
Discovery T1049 System Network Connections Discovery
Discovery T1033 System Owner/User Discovery
Discovery T1124 System Time Discovery
Lateral Movement T1021.002 Remote Services: SMB/Windows Admin Shares
Lateral Movement T1021.001 Remote Services: Remote Desktop Protocol
Lateral Movement T1021.004 Remote Services: SSH
Lateral Movement T1534 Internal Spearphishing
Collection T1056.001 Input Capture: Keylogging
Collection T1560 Archive Collected Data
Collection T1560.001 Archive Collected Data: Archive via Utility
Collection T1560.002 Archive Collected Data: Archive via Library
Collection T1560.003 Archive Collected Data: Archive via Custom Method
Collection T1557.001 Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay
Collection T1005 Data from Local System
Collection T1074.001 Data Staged: Local Data Staging
Command and Control T1071.001 Application Layer Protocol: Web Protocols
Command and Control T1571 Non-Standard Port
Command and Control T1132.001 Data Encoding: Standard Encoding
Command and Control T1001.003 Data Obfuscation: Protocol or Service Impersonation
Command and Control T1573.001 Encrypted Channel: Symmetric Cryptography
Command and Control T1090.001 Proxy: Internal Proxy
Command and Control T1090.002 Proxy: External Proxy
Command and Control T1008 Fallback Channels
Command and Control T1105 Ingress Tool Transfer
Command and Control T1104 Multi-Stage Channels
Command and Control T1102.002 Web Service: Bidirectional Communication
Exfiltration T1041 Exfiltration Over C2 Channel
Exfiltration T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage
Exfiltration T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol
Impact T1561.001 Disk Wipe: Disk Content Wipe
Impact T1561.002 Disk Wipe: Disk Structure Wipe
Impact T1489 Service Stop
Impact T1485 Data Destruction
Impact T1529 System Shutdown/Reboot
Impact T1491.001 Defacement: Internal Defacement

Latest Developments Observed
The threat actor is suspected to have flooded the npm registry with an additional 197 malicious packages over the past month. These packages are designed to deliver a new variant of OtterCookie, which consolidates capabilities observed in BeaverTail and earlier OtterCookie iterations. The malware’s objective appears to be data theft, including clipboard contents, keystrokes, screenshots, browser credentials, documents, cryptocurrency wallet data, and seed phrases.

ETLM Insights
Lazarus Group operates with a dual strategic mandate driven by the DPRK’s national priorities:

  • Revenue Generation: Fund North Korea’s sanctioned economy through large-scale cryptocurrency theft, financial fraud, and high-value cyber heists.
  • National-Level Espionage: Support geopolitical intelligence collection focused on defense, aerospace, energy, and government targets.

Their operations are shaped by DPRK’s long-term geopolitical objectives: economic survival, military modernization, and strategic deterrence.
From an ETLM standpoint, Lazarus aligns with:

  • Economic Imperatives: Stealing crypto assets, conducting supply-chain compromises, and monetizing access.
  • Strategic Espionage: Acquiring sensitive data related to defense, technology R&D, and sanctions-related intelligence.
  • Global Disruption Capability: Showcasing asymmetric cyber power to compensate for limited conventional capabilities.

Lazarus Group is expected to:

  • Expand cryptocurrency targeting using supply-chain attacks, trojanized trading tools, and wallet-stealing malware.
  • Increase OT/ICS reconnaissance to support sabotage and geopolitical leverage.
  • Adopt AI-enabled tooling for phishing, malware obfuscation, and data triage.
  • Exploit Asian financial and defense firms given regional geopolitical tensions.
  • Conduct KYC/AML-targeted intrusions to bypass global sanctions via illicit transfers.

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.

YARA Rules
rule NPM_Suspicious_Package_SupplyChain_Activity
{
meta:
description = “Flags suspicious npm packages showing characteristics often seen in malicious supply chain attacks”
author = “CYFIRMA”
malware_family = “Generic npm supply-chain threat”
reference = “Behavior-based detection only”
strings:
// Obfuscated JavaScript indicators
$obs1 = /eval\s*\(\s*function/i
$obs2 = /function\s*\(\)\s*\{\s*return\s*function/i
$obs3 = /while\s*\(\s*true\s*\)/
// Clipboard harvesting / system interaction
$clip = “clipboard” ascii nocase
$keylog1 = “keydown” ascii nocase
$keylog2 = “keypress” ascii nocase
$screenshot = “screenshot” ascii nocase
// Browser credential access attempts
$cred1 = “password” ascii nocase
$cred2 = “loginData” ascii nocase
$cred3 = “Local Storage” ascii nocase
$cred4 = “IndexedDB” ascii nocase
// Suspicious postinstall scripts
$post1 = /postinstall[\”\’]?\s*:/ nocase
$curl = /curl\s+https?:\/\// nocase
$wget = /wget\s+https?:\/\// nocase
// Unexpected embedded binaries or base64 blobs
$b64a = /[A-Za-z0-9+\/]{200,}={0,2}/
$exe = “MZ” // Windows binary header
$elf = { 7F 45 4C 46 } // Linux ELF binary header
condition:
// Trigger on multiple suspicious indicators
( #obs1 + #obs2 + #obs3 >= 1 )
or ( $post1 and ( $curl or $wget ) )
or ( $clip or $keylog1 or $keylog2 or $screenshot )
or ( #cred1 + #cred2 + #cred3 + #cred4 >= 2 )
or ( $b64a and ( $exe or $elf ) )
}

Recommendations

Strategic Recommendations

  • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
  • Assess and deploy alternatives for an advanced endpoint protection solution that provides detection/prevention for malware and malicious activities that do not rely on signature-based detection methods.
  • Block exploit-like behaviour. Monitor endpoints memory to find behavioural patterns that are typically exploited, including unusual process handle requests. These patterns are features of most exploits, whether known or new. This will be able to provide effective protection against zero-day/critical exploits and more, by identifying such patterns.

Management Recommendations

  • Invest in user education and implement standard operating procedures for the handling of financial and sensitive data transactions commonly targeted by impersonation attacks. Reinforce this training with context-aware banners and in-line prompts to help educate users.
  • Develop a cyber threat remediation program and encourage employee training to detect anomalies proactively.

Tactical Recommendations

  • For better protection coverage against email attacks (like spear phishing, business email compromise, or credential phishing attacks), organizations should augment built-in email security with layers that take a materially different approach to threat detection.
  • Protect accounts with multi-factor authentication. Exert caution when opening email attachments or clicking on embedded links supplied via email communications, SMS, or messaging.
  • Apply security measures to detect unauthorized activities, protect sensitive production, and process control systems from cyberattacks.
  • Add the YARA rule for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

3. Major Geopolitical Developments in Cybersecurity

Nato considers ‘more aggressive’ response to Russia’s hybrid warfare
NATO’s top military officer has signaled that the alliance is actively exploring a more aggressive and proactive response to Russia’s campaign of hybrid warfare, including cyber-attacks, sabotage, and airspace incursions. Admiral Giuseppe Cavo Dragone, chairman of NATO’s Military Committee, told the media that the alliance is moving beyond its traditionally reactive posture. “On cyber, we are kind of reactive. Being more aggressive or being proactive instead of reactive is something that we are thinking about,” he said. He noted that a pre-emptive strike could, in certain circumstances, be classified as a defensive action, though it remains “further away from our normal way of thinking and behaviour.” The debate has intensified following a series of incidents across Europe—many attributed to Russia or suspected to be Russian-linked—including the severing of undersea cables in the Baltic Sea, widespread cyber-attacks, and drone intrusions. Eastern European members in particular have pushed for NATO to adopt offensive countermeasures, especially in cyberspace where many allies possess significant capabilities.

Dragone acknowledged the challenges: “Being more aggressive compared with the aggressivity of our counterpart could be an option,” but stressed complications around legal and jurisdictional frameworks and deciding which actor would execute any response. He highlighted that NATO operates under far stricter ethical, legal, and jurisdictional constraints than Moscow, placing the alliance in “a harder position.” Russia’s foreign ministry swiftly condemned the admiral’s remarks as “extremely irresponsible” and evidence of NATO’s “readiness to continue moving towards escalation.” Dragone concluded that the core objective remains deterrence, whether achieved through retaliation or pre-emptive measures, and warned that future Russian pressure may force the alliance to confront these difficult choices more urgently.

ETLM Assessment:
As noted in last year’s CYFIRMA report, Europe has faced a surge in cyber-attacks and while definitive attribution remains complex, the sophistication of these attacks and the backdrop of geopolitical tensions strongly indicate Russian involvement. These attacks have targeted diverse organizations, causing widespread disruption and financial losses. Russia has solidified its position as a capable, motivated, and irresponsible cyber threat actor. Russian operatives have almost certainly escalated their cyber campaigns against Ukraine and its allies, aligning these operations with their military objectives and broader geopolitical ambitions.

Strained by the demands of an all-out war against Ukraine, Russia has increasingly outsourced cyber operations to privateers and other non-state actors. These groups, often beyond direct state control, introduce a heightened unpredictability to their activities. This trend is likely to persist, as the Kremlin grants these actors greater latitude. From Moscow’s perspective, fostering global instability serves to divert attention from its aggression in Ukraine, further stretching the resources of those who oppose it. According to public diplomacy, NATO stance on counter measures, especially in the cyber domain, might just be changing and we are likely to see an uptick in cyber action going both ways.

4. Rise in Malware/Ransomware and Phishing

Cl0p Ransomware Impacts Mazda Motor Corporation

  • Attack Type: Ransomware
  • Target Industry: Manufacturing, Motor Vehicles
  • Target Geography: Japan
  • Ransomware: Cl0p Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
CYFIRMA observed in an underground forum that a company from Japan, Mazda Motor Corporation (https[:]//www[.]mazda[.]com/), was compromised by Cl0p Ransomware. Mazda Motor Corporation is a Japanese multinational automaker known for its production of stylish, high-quality cars and sports utility vehicles with innovative technology. The compromised data contains confidential and sensitive information belonging to the organization.

The following screenshot was observed published on the dark web:

Source: Dark Web

Relevancy & Insights:

  • Cl0p ransomware is a notorious and highly active strain that leverages both data encryption and extortion to target organisations globally.
  • The Cl0p Ransomware group primarily targets countries such as the United States of America, Canada, the United Kingdom, Mexico, and Germany.
  • The Cl0p Ransomware group primarily targets industries, such as Consumer Goods & Services, Information Technology, Transportation & Logistics, Manufacturing, and Professional Goods & Services.
  • Based on the Cl0p Ransomware victims list from 1st Jan 2025 to 02nd December 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Cl0p Ransomware victims list from 1st Jan 2025 to 02nd December 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Cl0p ransomware remains one of the most significant and disruptive threats in the current cybercrime landscape, particularly evident through its unprecedented volume of attacks and innovative extortion tactics witnessed in 2025. The Cl0p campaign reinforces the urgent need for holistic security strategies: rapid vulnerability management, robust incident detection, thorough supply chain risk assessments, and strong contingency plans for data exfiltration scenarios.

Dire Wolf Ransomware Impacts K.M. Packaging

  • Attack Type: Ransomware
  • Target Industry: Manufacturing
  • Target Geography: Thailand
  • Ransomware: Dire Wolf Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
CYFIRMA observed in an underground forum that a company from Thailand, K.M. Packaging (https[:]//kmp[.]co[].th), was compromised by Dire Wolf Ransomware. K.M. Packaging Public Company Limited is a leading Thai manufacturer of eco-friendly paper packaging for food and beverages. The exposed dataset includes internal documentation, financial and audit records, commercial and legal contracts, employee files, and customer information, with the total volume of compromised data estimated at approximately 82 GB.

[MISSING IMAGE: , ]The following screenshot was observed published on the dark web:[MISSING IMAGE:,]

Source: Dark Web

Relevancy & Insights:

  • Dire Wolf is a newly emerged ransomware group that surfaced in May 2025. It operates an onion-based data leak site (DLS) where it posts information about its victims, including file trees, sample files, and descriptions of stolen data.
  • Dire Wolf ransomware combines Curve25519 key exchange with ChaCha20 encryption—resulting in efficient, strong file encryption unique per victim, with no current method for decryption without the attackers’ assistance.
  • The Dire Wolf Ransomware group primarily targets countries such as Singapore, the United Kingdom, Taiwan, Brazil, and Thailand.
  • The Dire Wolf Ransomware group primarily targets industries, including Professional Goods & Services, Manufacturing, Information Technology, Consumer Goods & Services, and Transportation & Logistics.
  • Based on the Dire Wolf Ransomware victims list from 1st May 2025 to 02nd December 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Dire Wolf Ransomware victims list from 1st May 2025 to 02nd December 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Dire Wolf is a newly identified ransomware group that emerged in May 2025, distinguished by its use of double-extortion tactics combining data encryption with data theft and threats of public exposure via an onion-based leak site. The group appears to operate solely for financial gains, without ideological motives. Its emergence highlights the evolving nature of ransomware threats in 2025, particularly the increased reliance on data exfiltration to amplify extortion efforts. These activities reinforce the urgent need for strong cybersecurity defenses and effective incident response strategies across all sectors.

5. Vulnerabilities and Exploits

Vulnerability in Werkzeug

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Web applications / JS libraries
  • Vulnerability: CVE-2025-66221
  • CVSS Base Score: 6.3 Source
  • Vulnerability Type: Improper Handling of Windows Device Names
  • Summary: The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

Relevancy & Insights:
The vulnerability exists due to the “safe_join” function, which allows path segments with Windows device names.

Impact:
A remote attacker can cause the reading of the file to hang indefinitely.

Affected Products:
https[:]//github[.]com/pallets/werkzeug/security/advisories/GHSA-hgf8-39gv-g3f2

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED PRODUCTS OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies, due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment:
Improper Handling of Windows Device Names in Werkzeug can introduce significant risks to application security and user privacy. This vulnerability has the potential to affect a wide range of industries that rely on Python-based web frameworks, including financial services, manufacturing, healthcare, and public sector organizations. Ensuring the security of Werkzeug—often a core component in Flask and other Python web applications—is essential for protecting critical business data, backend services, and interconnected systems across diverse environments.

6. Latest Cyber-Attacks, Incidents, and Breaches

INC Ransomware attacked and published the data of Southern Lion Sdn. Bhd

  • Threat Actor: INC Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Manufacturer and Distributor, Fast-Moving Consumer Goods (FMCG),
  • Target Geography: Malaysia
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that the INC Ransomware attacked and published the data of Southern Lion Sdn. Bhd (https[:]//www[.]southernlion[.]com[.]my/) on its dark web website. Southern Lion Sdn. Bhd. is a manufacturer and distributor of household & personal care products (Fast-Moving Consumer Goods (FMCG)) like fabric care, oral care, beauty care, and home care based in Malaysia. The data leak, following the ransomware attack, encompasses sensitive and confidential records originating from the organizational database.

Source: Dark Web

Relevancy & Insights:
INC Ransomware, also known as Incransom, is a cyber threat that emerged in mid-2023. Incransom uses strong encryption algorithms to lock files, making recovery without the decryption key virtually impossible. The ransomware typically appends specific file extensions to encrypted files, signalling that they have been compromised.

ETLM Assessment:
Based on recent assessments by CYFIRMA, INC Ransomware represents a significant threat within the evolving landscape of ransomware attacks. Its use of strong encryption methods and double extortion tactics highlights the increasing sophistication of cybercriminal operations. Organizations are advised to enhance their cybersecurity measures by implementing robust defenses against phishing attacks, maintaining updated security protocols, and monitoring for unusual network activity to mitigate risks associated with this and other ransomware variants. Continuous vigilance is essential to protect against the threats posed by emerging ransomware groups like INC Ransomware.

7. Data Leaks

Demi Group Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Information Technology Services
  • Target Geography: Malaysia
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary: The CYFIRMA research team has identified that a threat actor known as “KaruHunters” is alleging responsibility for the compromise of Demi Group, a Malaysian conglomerate that operates multiple subsidiaries, including ProOffice, Demi Couture, and ProView. The alleged breach, said to have taken place in November 2025, reportedly led to the exposure of sensitive internal databases, with detailed employee records and extensive activity logs exfiltrated.

The allegedly compromised data contains approximately 1,000 employee profiles and over 175,000 check-in/login records. According to the leaked samples, the exposed information includes:

  • Full names
  • National Identity Card (IC) numbers
  • Dates of birth
  • Email addresses (corporate and personal)
  • Mobile phone numbers
  • Job titles, ranks, and department details
  • GPS location data (Lat/Long coordinates)
  • Physical check-in addresses
  • Device information (User agents and operating systems)

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

MagicSeller Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Information Technology
  • Target Geography: South Korea
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed that magicseller[.]co[.]kr, a digital platform based in South Korea, has allegedly been compromised, resulting in the sale of a significant database on a cybercrime forum. The threat actor claims to be in possession of 500,000 user records related to the site. The actor has provided a sample of the data to verify the authenticity of the leak, although the sample provided appears to contain Portuguese language content, suggesting potential discrepancies in the data’s origin or a specific regional subset of the service.

According to the actor, the allegedly compromised data includes:

  • Full names
  • Email addresses
  • Phone numbers
  • IP addresses
  • Course or interest categories
  • User messages and inquiries
  • Lead identification numbers

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously scouring for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to illicitly gain access and steal valuable data. Subsequently, the pilfered data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The threat actor known as “KaruHunters” is a highly active and sophisticated group specializing in data leaks. Numerous credible sources attribute multiple security breaches to this group, involving unauthorized access to systems and the illicit sale of stolen data on dark web marketplaces. KaruHunters’ operations highlight the persistent and evolving nature of cyber threats emerging from underground forums. These incidents underscore the critical importance for organizations to enhance their cybersecurity posture through continuous monitoring, leveraging advanced threat intelligence, and adopting proactive defense strategies to protect sensitive data and vital infrastructure.

Recommendations: Enhance the cybersecurity posture by

  • Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  • Ensure proper database configuration to mitigate the risk of database-related attacks.
  • Establish robust password management policies, incorporating multi-factor authentication and role-based access, to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA Research team observed that ExeVision, a company delivering web-based project development and road construction management solutions for State Departments of Transportation in Jordan, was allegedly compromised. The incident was disclosed on a dark web forum by a threat actor known as 888, who claims the breach occurred in November 2025 and resulted in the theft of the company’s source code.

The allegedly compromised data reportedly consists of the company’s proprietary source code. A file tree released by the actor as proof of the breach indicates the exposure of several critical development repositories and application directories, including:

  • Core Platforms: Source code for the “iCX” (Integrated Contractors Exchange) and “iPD” (Integrated Project Development) platforms.
  • Construction Management: The “CMS” (Construction Management Subsystem) and “EBS” (Electronic Bidding System) modules.
  • Field Operations: The “EFieldBook” application, used for field documentation.
  • Compliance Modules: Directories related to “CivilRights” and “ContractTracking”.
  • Infrastructure: Folders containing “SaaS-dev” repositories, authentication microservices, and API configurations.

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground forums

The CYFIRMA Research team observed that ScrapMarket[.]in, an Indian B2B platform facilitating the buying and selling of scrap materials, has allegedly been compromised by an unauthorized party. A database containing approximately 129,659 lines of user data has been listed for sale on a cybercrime forum. The breach, dated November 30, 2025, appears to affect a significant portion of the platform’s user base, including individual sellers and scrap dealers.

According to the samples provided in the leak, the compromised database contains sensitive user information. The allegedly compromised data includes:

  • Full names
  • Email addresses
  • Mobile numbers
  • Hashed passwords
  • Company names
  • User addresses
  • Subscription details (expiry dates and status)
  • Device IDs and Firebase tokens

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground forums

STRATEGIC RECOMMENDATION

  • Attack Surface Management should be adopted by organizations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Deploy a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, active network monitoring, through next generation security solutions and ready to go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATION

  • Take advantage of global Cyber Intelligence providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied and the proper implementation of security technologies, followed by corrective actions remediations, and lessons learned.
  • Move beyond the traditional model of security awareness towards improved simulation and training exercises that mimic real attack scenarios, account for behaviours that lead to a compromised, and are measured against real attacks the organization receives.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcoming of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies and continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATION

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthen defences based on tactical intelligence provided
  • Deploy detection technologies that are behavioural anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security control such as reCAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

Geography-Wise Graph

Industry-Wise Graph

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, technology, please access DeCYFIR.