Self Assessment

Weekly Intelligence Report – 19 December 2025

Published On : 2025-12-19
Share :
Weekly Intelligence Report – 19 December 2025

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware
Target Technologies: Windows OS
Target Geography: United States, France, Taiwan, Thailand, South Africa, and other regions across Asia, Europe, Latin America, and Africa.
Target Industry: Technology, Healthcare, Government/Public Sector, Construction, and Manufacturing.

Introduction:
CYFIRMA Research and Advisory Team has found DEVMAN 21 Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

DEVMAN 21 Ransomware
Researchers have discovered a new ransomware strain called DEVMAN 21. This ransomware encrypts victim data, renames affected files by appending a unique extension (such as .devman21), and generates a ransom note titled “!!!README!!!.txt”.

Screenshot: File encrypted by ransomware (Source: Surface Web)

CYFIRMA’s assessment suggests that the DEVMAN 21 ransomware group is progressively shifting from a conventional file-encryption–centric model toward a more advanced, data-extortion–focused operation. The group utilizes strong hybrid cryptography (RSA-4096 and AES-256), threatens the public release of exfiltrated data, and applies time-based ransom escalation while conducting negotiations through anonymous channels such as Tor and qTox. Its operational methods include offering limited free decryption to establish credibility, stressing confidentiality during communications, and applying psychological pressure via data-leak threats, indicating a growing level of professionalism and organizational structure. Based on these observed behaviors, CYFIRMA assesses that DEVMAN 21 is likely to further expand its double-extortion strategy, enhance leak-site infrastructure for public exposure, and introduce more automated negotiation and payment mechanisms to support operational scale. Over time, the group may evolve into a persistent, service-oriented ransomware operation, consistent with broader trends across organized cyber-extortion groups.

Screenshot: The appearance of DEVMAN 21’s ransom note (“!!!_README_!!!.txt”) (Source: Surface Web)

Screenshot: Data Leak site DEVMAN

The following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Execution T1059 Command and Scripting Interpreter
Execution T1129 Shared Modules
Persistence T1112 Modify Registry
Persistence T1542 Pre-OS Boot
Persistence T1542.003 Pre-OS Boot: Bootkit
Persistence T1547 Boot or Logon Autostart Execution
Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation T1134.004 Access Token Manipulation: Parent PID Spoofing
Privilege Escalation T1547 Boot or Logon Autostart Execution
Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Defense Evasion T1014 Rootkit
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1027.002 Obfuscated Files or Information: Software Packing
Defense Evasion T1027.005 Obfuscated Files or Information: Indicator Removal from Tools
Defense Evasion T1070 Indicator Removal
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1112 Modify Registry
Defense Evasion T1134.004 Access Token Manipulation: Parent PID Spoofing
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1222 File and Directory Permissions Modification
Defense Evasion T1497 Virtualization/Sandbox Evasion
Defense Evasion T1497.001 Virtualization/Sandbox Evasion: System Checks
Defense Evasion T1542 Pre-OS Boot
Defense Evasion T1542.003 Pre-OS Boot: Bootkit
Defense Evasion T1564 Hide Artifacts
Defense Evasion T1564.003 Hide Artifacts: Hidden Window
Credential Access T1056 Input Capture
Credential Access T1056.001 Input Capture: Keylogging
Discovery T1010 Application Window Discovery
Discovery T1012 Query Registry
Discovery T1016 System Network Configuration Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1497 Virtualization/Sandbox Evasion
Discovery T1497.001 Virtualization/Sandbox Evasion: System Checks
Discovery T1614 System Location Discovery
Collection T1056 Input Capture
Collection T1056.001 Input Capture: Keylogging
Collection T1074 Data Staged
Command and Control T1071 Application Layer Protocol
Command and Control T1090 Proxy
Command and Control T1105 Ingress Tool Transfer
Command and Control T1573 Encrypted Channel
Impact T1486 Data Encrypted for Impact
Impact T1490 Inhibit System Recovery

Relevancy and Insights:

  • The ransomware primarily targets Windows OS, which is utilised by enterprises in a variety of industries.
  • Long-sleeps: Ransomware utilizes extended sleep intervals to evade detection by security software, enabling it to operate stealthily and increasing the likelihood of completing file encryption before being identified.
  • Calls to WMI: The ransomware is making calls to the Windows Management Instrumentation (WMI) framework. Windows Management Instrumentation (WMI) is widely leveraged by legitimate software and administrative services; however, threat actors can also abuse it to run commands, gather system intelligence, or alter system configurations.
  • Detect-Debug-Environment: Debugging environments are used by developers to analyze and troubleshoot software. This technique is used by the ransomware to determine whether it is operating in a debug environment. This capability helps the ransomware evade security analysis and bypass detection mechanisms.

ETLM Assessment:
CYFIRMA’s assessment indicates that the DEVMAN 21 ransomware group is likely to further advance its operations by building on its existing encryption-and-data- extortion model. Given its demonstrated use of file encryption combined with threats of public data disclosure, anonymous communication channels, and credibility-building tactics, such as limited free decryption, the group is expected to continue prioritizing campaigns that maximize coercive leverage over victims.

DEVMAN 21 may seek to standardize and streamline victim engagement processes through more consistent ransom communications and structured negotiation flows to support higher campaign volumes. The emphasis on data exfiltration suggests the group could expand proof-of-compromise practices, including selective data samples or staged disclosures, to reinforce pressure and accelerate payment decisions. Additionally, reliance on anonymized infrastructure indicates a likely focus on maintaining and hardening communication channels to improve operational resilience. Over time, and consistent with broader ransomware evolution trends, DEVMAN 21 may also explore scalable operating approaches that enable wider deployment of its tooling and sustain long-term extortion activity under a unified operational framework.

Sigma rule:
title: Disable Windows Defender Functionalities Via Registry Keys tags:
– attack.defense-evasion
– attack.t1562.001 logsource:
product: windows category: registry_set
detection: selection_main:
TargetObject|contains:
– ‘\SOFTWARE\Microsoft\Windows Defender\’
– ‘\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\’
– ‘\SOFTWARE\Policies\Microsoft\Windows Defender\’ selection_dword_1:
TargetObject|endswith:
– ‘\DisableAntiSpyware’
– ‘\DisableAntiVirus’
– ‘\DisableBehaviorMonitoring’
– ‘\DisableBlockAtFirstSeen’
– ‘\DisableEnhancedNotifications’
– ‘\DisableIntrusionPreventionSystem’
– ‘\DisableIOAVProtection’
– ‘\DisableOnAccessProtection’
– ‘\DisableRealtimeMonitoring’
– ‘\DisableScanOnRealtimeEnable’
– ‘\DisableScriptScanning’ Details: ‘DWORD (0x00000001)’
selection_dword_0:
TargetObject|endswith:
– ‘\DisallowExploitProtectionOverride’
– ‘\Features\TamperProtection’
– ‘\MpEngine\MpEnablePus’
– ‘\PUAProtection’
– ‘\Signature Update\ForceUpdateFromMU’
– ‘\SpyNet\SpynetReporting’
– ‘\SpyNet\SubmitSamplesConsent’
– ‘\Windows Defender Exploit Guard\Controlled Folder Access\EnableControlledFolderAccess’
Details: ‘DWORD (0x00000000)’
filter_optional_symantec:
Image|startswith: ‘C:\Program Files\Symantec\Symantec Endpoint Protection\’
Image|endswith: ‘\sepWscSvc64.exe’
condition: selection_main and 1 of selection_dword_* and not 1 of filter_optional_*
falsepositives:
– Administrator actions via the Windows Defender interface
– Third party Antivirus level: high

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.

STRATEGIC RECOMMENDATION

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained, which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATION

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATION

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring, which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defense based on the tactical intelligence provided.

Trending Malware of the Week

Type: Information Stealer| Objectives: Data Exfiltration & Credential Theft | Target Technology: Windows OS | Target Industry: Finance | Target Geography: Global
CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malwares that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week, “JSCEAL” is trending.

Overview of JSCEAL Infostealer Malware
JSCEAL is a sophisticated information-stealing campaign primarily targeting users of cryptocurrency applications. First identified in early 2024, the threat has steadily evolved from a limited operation into a mature and well-organized campaign. Ongoing research throughout 2025 indicates continuous development, with threat actors refining their techniques to maintain persistence and effectiveness, demonstrating a long-term commitment to the operation.

The campaign relies on impersonation of legitimate cryptocurrency trading platforms to distribute malicious installers, typically through fraudulent websites promoted via malicious advertising. Once executed, these installers initiate a carefully staged infection process that incorporates multiple verification and evasion steps before deploying the final malicious component. In certain cases, the attackers deliberately avoid delivering the payload to reduce exposure, reflecting a strategic focus on remaining undetected rather than immediate exploitation.

A defining feature of JSCEAL is its strong emphasis on stealth and resistance to security analysis. The campaign employs advanced obfuscation and anti-analysis techniques, which have historically resulted in very low detection rates, even when samples were widely circulated. Despite portions of the campaign becoming publicly known, ongoing monitoring indicates that JSCEAL remains active and continues to evolve. The threat actors consistently refine their methods to evade detection, underscoring a broader trend toward increasingly adaptive and covert malware campaigns targeting the cryptocurrency ecosystem, as well as the growing importance of proactive security controls.

Attack Method
The JSCEAL operation employs a structured, multi-layered intrusion process that emphasizes controlled execution and environmental validation. The initial access vector relies on paid online advertisements that redirect selected users through a managed chain of intermediary domains. These redirections serve both as traffic shaping and as an early filtering mechanism, ensuring that only targets matching predefined conditions are forwarded to the next stage, while all other visitors are presented with benign or unrelated content.

Once the redirection criteria are satisfied, the victim is presented with a professionally crafted download interface that delivers a malicious installer package. This installer is designed to function only when a parallel web component is active, creating a strict dependency between the local installation process and the remote site. During execution, the installer deploys multiple embedded components, establishes local listeners, and initializes persistence logic. To maintain user trust, the process simultaneously displays legitimate application content, effectively masking the underlying activity.

In later variants observed in mid-2025, the backend delivery and control mechanisms were substantially re-engineered. The attackers transitioned to a standardized infrastructure model featuring newly registered domains, consistent subdomain usage, and restrictive request handling. Server-side logic actively validates client behavior and rejects unexpected interaction patterns. Responses are deliberately staged, with misleading content delivered initially, followed by subsequent retrieval steps only after validation checks are met. This approach significantly disrupts automated analysis and limits unintended exposure.

The final execution phase involves the retrieval of a packaged runtime environment that enables the execution of obfuscated, precompiled script logic. This stage provides the operators with extensive control capabilities, including system interaction, data extraction, traffic manipulation, and remote task execution. Across all phases, the operation demonstrates a preference for precision, delayed execution, and adaptability, favoring long-term operational stability over rapid, high-noise deployment.

The following are the TTPs based on the MITRE Attack Framework for Enterprise

Tactic (ID) Technique ID Technique Name
Execution T1059 Command and Scripting Interpreter
Execution T1129 Shared Modules
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1497 Virtualization / Sandbox Evasion
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Command and control T1071 Application Layer Protocol
Exfiltration T1041 Exfiltration Over C2 Channel
Impact T1531 Account Access Removal

INSIGHTS

Operational Maturity and Scale Beyond Initial Indicators
The activity associated with this threat demonstrates a level of operational maturity that goes beyond simple opportunistic misuse of advertising channels. Over time, the actors have systematically expanded their footprint by refining domain holdings, diversifying infrastructure components, and optimizing user engagement mechanisms. This progression reflects not merely increased volume of exposure but also a deliberate shift toward a more resilient and coordinated set of practices, suggesting the involvement of organized planning and resource allocation rather than ad-hoc exploitative efforts.

Strategic Use of Legitimate Ecosystems Creates Subtle Exposure Paths
One of the more notable characteristics emerging from analysis is the interplay between deceptive artefacts and seemingly legitimate communication channels. By embedding malicious distribution vectors within mainstream advertising environments, the actors leverage trust-based mechanisms as indirect amplification points. This creates exposure paths that are subtle by design: users are drawn in by familiar interfaces and expected content, blurring the line between benign interaction and threat exposure. Such strategic embedding underscores how familiar digital ecosystems can be repurposed as vectors for distribution without triggering immediate suspicion.

Structural Adaptation Reflects Evasion and Containment Priorities
Beyond the surface narrative of expanded reach and obfuscation, the underlying adaptations observed signify a nuanced emphasis on containment and stealth.
Changes in infrastructure naming patterns, access controls, and response behaviors indicate a preference for reducing detectable footprints and isolating control channels from broad visibility. This structural evolution suggests that avoidance of discovery and analysis is not incidental but central to the operation’s design ethos. Rather than relying on aggressive exploitation tactics that leave clear signatures, the actors prioritize stealthy persistence and controlled interaction, indicating an operational philosophy that values operational longevity over immediate impact.

ETLM ASSESSMENT
From an ETLM perspective, CYFIRMA assesses that the emergence of operations such as JSCEAL points to a future threat environment characterized by lower visibility, increased attribution challenges, and deeper integration of malicious activity within routine digital workflows. As these threat operations continue to mature, organizations may encounter extended periods of undetected activity, elevating the risk of covert data exposure and abuse of trusted applications. Employees are likely to be increasingly leveraged as indirect entry points, as adversaries exploit commonplace actions such as downloading software, applying updates, or conducting online research, thereby narrowing the distinction between legitimate behavior and compromise. Over time, these developments may compel organizations to reevaluate how trust is established and maintained across users, applications, and execution contexts, as conventional assumptions around detection, early warning, and clear indicators of malicious activity become less effective against adaptive and low-profile threats.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

YARA Rules
rule JSCEAL_Infostealer_Payload
{
meta:
description = “Detects JSCEAL-related artifacts based on known C2 domains and payload hashes”
author = “CYFIRMA” date = “2025-09-16”
strings:
/* Known JSCEAL C2 / infrastructure domains */
$d1 = “goldensecho.link”
$d2 = “nightfallglen.com”
$d3 = “evercircle.org”
$d4 = “silversoak.link”
$d5 = “calmtobridge.com”
$d6 = “freshstartwalk.org”
$d7 = “coralsshore.net”
$d8 = “everlantern.net”
$d9 = “sunhorizon.org”
$d10 = “auroratrails.link”
$d11 = “veloranest.net”
$d12 = “cedarwhispers.link”
$d13 = “velvetsforest.org”
$d14 = “moonscanyon.org”
$d15 = “flowhaven.link”
$d16 = “maplehaven.fyi”
$d17 = “toautumnlake.net”
$d18 = “ravencliff.org”
$d19 = “stillswaters.link”
$d20 = “amberstrail.net”
$d21 = “northhollow.net”
$d22 = “nordexahub.name”
$d23 = “lighttrail.name”
$d24 = “lowskymeadow.com”
$d25 = “emberstolight.com”
$d26 = “aurevospace.org”
$d27 = “radiantlagoons.com”
$d28 = “lunarapoint.org”
$d29 = “mapleonhaven.net”
$d30 = “cedarspath.com”
$d31 = “goldentrail.name”
$d32 = “forestsgate.com”
$d33 = “ironscove.net”
$d34 = “opencrest.name”
$d35 = “evergreengopath.org”
$d36 = “shadowsvale.net”
$d37 = “lunasfield.net”
$d38 = “whisperhavens.com”
$d39 = “amberfielder.com”
$d40 = “lumenivory.com”
$d41 = “wildflowerpath.org”
$d42 = “prismhills.com”
$d43 = “novaharbor.net”
$d44 = “starhavengo.com”
$d45 = “leafmollytrail.com”
$d46 = “skyinwinters.org”
$d47 = “starsmeadows.net”
$d48 = “warmtogrove.net”
/* Known JSCEAL-related SHA-256 hashes */
$h1 = “9615f60ea3cc1c65eb8fe6d77bb85fe6b455503193eab02310a873fccadd332e”
$h2 = “72af070240c149cda4ad6b6ebb581af4285402d1e2d1ae77dbdb8db41cce3828”
$h3 = “2e04eb129d72645e0167e58d404d1c5a258a97b897d61ed4ea05d2a59ab5d897”
$h4 = “f575032cbae83be2488a59d98f7ffd5c876c8e50f11e56e5a3b071456c2ce28f”

condition:
/* Match either known hashes OR multiple infrastructure indicators */ any of ($h*) or
2 of ($d*)
}

RECOMMENDATIONS

STRATEGIC RECOMMENDATIONS

  • Enhance Enterprise Endpoint Visibility: Establish an organization-wide security strategy that prioritizes continuous and behavior-driven monitoring of endpoint activity. This approach should emphasize correlation across endpoint, identity, and network telemetry to identify anomalous execution patterns that may not be detectable through traditional signature-based methods.
  • Institutionalize Zero-Trust Execution Principles: Advance beyond identity-centric security models by enforcing verification at the level of individual actions and processes. All workstation-originated activities, particularly those involving sensitive operations, should be subject to continuous validation based on device posture, execution context, and environmental risk factors.
  • Reassess Workstation Trust Boundaries and Privilege Models: Conduct a comprehensive review of how trust and privilege are assigned to user workstations, with particular attention to systems used for administrative or high-impact functions. Segmentation of privileged environments and isolation of critical workflows should be implemented to reduce the potential blast radius in the event of compromise.
  • Integrate Threat Intelligence into Strategic Planning: Incorporate curated and actionable threat intelligence into security governance and architectural decision- making. Intelligence related to evolving malware delivery methods, infrastructure patterns, and evasion behaviors should inform long-term risk assessments and control prioritization.

MANAGEMENT RECOMMENDATIONS

  • Strengthen Oversight of High-Risk Endpoint Activities: Implement governance mechanisms that introduce additional validation and oversight for sensitive actions initiated from endpoints. This reduces the likelihood of unauthorized activity executed under the appearance of legitimate user behavior.
  • Standardize and Enforce Endpoint Hardening Policies: Apply consistent hardening standards across all endpoints, including restrictions on executable permissions, service exposure, and software installation rights. Compliance should be continuously assessed through scheduled audits and configuration validation.
  • Improve Detection of Abnormal User and System Interaction: Ensure that security teams have the capability to identify irregular endpoint behaviors, such as unexpected automation, abnormal execution flows, or unexplained background activity indicative of covert misuse.
  • Expand Workforce Awareness of Endpoint Abuse Indicators: Deliver structured awareness programs to educate employees on recognizing subtle indicators of endpoint compromise, including unexpected prompts, anomalous system behavior, or unexplained performance degradation.
  • Regularly Validate Incident Response Readiness: Conduct periodic tabletop and technical response exercises focused on low-visibility endpoint compromise scenarios. These exercises should validate escalation paths, coordination procedures, and decision-making processes across technical and management teams.

TACTICAL RECOMMENDATIONS

  • Deploy Behavioral Controls for Suspicious Execution Patterns: Configure endpoint monitoring capabilities to detect anomalous process creation, concealed execution contexts, and persistence mechanisms commonly associated with advanced malware loaders and stealers.
  • Restrict and Monitor Script Execution Environments: Apply stringent controls over scripting platforms by enforcing restricted execution modes, disabling unauthorized modules, and enabling comprehensive logging of script activity to support detection and forensic analysis.
  • Implement Application Control for High-Risk File Paths: Enforce application control policies to prevent execution from user-writable directories, temporary locations, and other commonly abused paths, thereby reducing exposure to malicious installers and secondary payloads.
  • Monitor Process Lineage for Anomalous Relationships: Establish alerting for unusual parent–child process chains, such as trusted applications initiating unknown or network-capable processes, which may indicate malicious activity.
  • Enable Automated Endpoint Isolation Capabilities: Develop and maintain automated response workflows that rapidly isolate endpoints exhibiting suspicious outbound communication or execution behavior, limiting further impact.
  • Inspect Outbound Network Activity for Covert Indicators: Monitor external communications for irregular resolution patterns, staged content retrieval, or persistent low-volume connections that may indicate hidden command channels.
  • Continuously Validate System and File Integrity: Implement file integrity monitoring for critical system locations to detect unauthorized modifications, persistence artifacts, or tampering with trusted components.
  • Enforce Least-Privilege Access at the Endpoint Level: Remove unnecessary administrative privileges, restrict task scheduling capabilities, and limit registry modification rights to reduce opportunities for persistence and misuse.
  • Increase Telemetry for User Interaction Events: Enable enhanced logging of input and interaction events to identify abnormal automation or manipulation inconsistent with expected user behavior.
  • Maintain SOC Playbooks for Stealthy Endpoint Compromise: Develop and routinely update SOC playbooks outlining procedures for endpoint isolation, volatile data collection, indicator extraction, credential validation, and forensic triage to prevent lateral movement and recurrence.

Weekly Intelligence Trends/Advisory

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Malware Implants, Spear-phishing, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Coinbase Cartel Ransomware, Qilin Ransomware| Malware – JSCEAL
  • o Coinbase Cartel Ransomware – One of the ransomware groups.

    o Qilin Ransomware – One of the ransomware groups.
    Please refer to the trending malware advisory for details on the following:

    o Malware – JSCEAL
    Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

Strategic Cyber Intelligence: Ashen Lepus (WIRTE) Targeting Middle Eastern Entities

  • Threat Actor: WIRTE aka Ashen Lepus
  • Attack Type: Connection Proxy, Credential Dumping, Exploitation of Vulnerabilities, Malware Implants, Spear-Phishing
  • Objective: Information theft, Espionage
  • Suspected Target Technology: Office Suites Software, Operating System, Web Application, Word Viewer
  • Suspected Target Geography: China, Egypt, Iran, Islamic Republic of Israel, Jordan, Libya, Palestine, State of Saudi Arabia, United States
  • Suspected Target Industries: Media, Diplomatic Channels, Financial, Government, Military, Technology, Telecommunications
  • Business Impact: Data Theft, Operational Disruption, Reputational Damage

About the Threat Actor
Ashen Lepus is an APT group recognized for conducting espionage operations targeting Arabic-speaking government entities across the Middle East. The threat actor is suspected of being affiliated with, and operating on behalf of, Hamas- related groups in the region. The group is believed to have been active since at least 2018 and is thought to overlap with an Arabic-speaking, politically motivated threat cluster commonly referred to as the Gaza Cyber Gang.

Details on Exploited Vulnerabilities

CVE ID Affected Products CVSS Score Exploit Links
CVE-2017- 0199 Microsoft Office 7.8 Link1, Link2, Link3
CVE-2017-11826 Microsoft Office, SharePoint, Web Applications, Word Viewer 7.8
CVE-2017- 0261 Microsoft Office 7.8

TTPs based on MITRE ATT&CK Framework

Tactic ID Technique
Resource Development T1588.002 Obtain Capabilities: Tool
Initial Access T1566.001 Phishing: Spear phishing Attachment
Execution T1059.001 Command and Scripting Interpreter: PowerShell
Execution T1059.005 Command and Scripting Interpreter: Visual Basic
Execution T1204.002 User Execution: Malicious File
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1036.005 Masquerading: Match Legitimate Resource Name or Location
Defense Evasion T1218.010 System Binary Proxy Execution: Regsvr32
Command and Control T1071.001 Application Layer Protocol: Web Protocols
Command and Control T1571 Non-Standard Port
Command and Control T1105 Ingress Tool Transfer

Latest Developments Observed
Recent observations indicate that Ashen Lepus has significantly evolved its operations with the introduction of the AshTag modular malware suite, enabling more stealthy, persistent, and hands-on espionage activity. The group has also expanded its targeting scope, with new geopolitical phishing lures and increased focus on countries such as Turkey. Additionally, its shift toward destructive capabilities, including the use of wiper malware against Israeli entities, highlights a move beyond traditional intelligence collection.

ETLM Insights
Ashen Lepus is actively expanding its external attack surface, with observable indicators pointing to sustained reconnaissance and infrastructure staging aligned with espionage-driven objectives. The actor demonstrates a systematic approach to identifying exposed assets, compromised credentials, and misconfigured services associated with government, diplomatic, and other high-value regional organizations. Its sustained and adaptive intelligence operations across the Middle East suggest alignment with broader regional geopolitical interests, supported by strong operational discipline and resilience—even during periods when affiliated threat clusters exhibit reduced visibility.

The group consistently leverages recurring patterns such as domain registration clustering, frequent rotation of command-and-control (C2) infrastructure, and the use of legitimate cloud and hosting providers to blend malicious activity into normal internet traffic. These techniques complicate detection efforts and enable rapid operational pivoting when infrastructure is identified or disrupted.

Ashen Lepus maintains a persistent and adaptable external presence, using infrastructure agility and credential-based access to support long-term espionage operations while minimizing attribution risk. Its behavior reflects a deliberate strategy of prolonged intelligence collection, selective targeting of high-value entities, and disciplined operational security, allowing sustained access to sensitive information over extended periods.

Overall, Ashen Lepus represents a methodical and strategically significant threat actor, underscoring the importance of heightened vigilance and proactive defense measures to protect diplomatic and governmental networks.

YARA Rules
rule Suspicious_CVE_IP_Domain_Indicators
{
meta:
description = “Detects files or data containing indicators related to CVE-2017-0199, CVE- 2017-11826, CVE-2017-0261, associated IPs, domains, and executable names”
author = “CYFIRMA” date = “2025-12-16”
threat = “Potentially malicious indicators linked to known CVEs and infrastructure”

strings:
// IP addresses as strings (ascii, exact match)
$ip1 = “198.105.122.96”
$ip2 = “198.105.117.37”
$ip3 = “192.253.246.169”
$ip4 = “192.99.111.228”
$ip5 = “192.52.167.125”

// CVE identifiers
$cve1 = “CVE-2017-0199” ascii nocase
$cve2 = “CVE-2017-11826” ascii nocase
$cve3 = “CVE-2017-0261” ascii nocase

// Domains
$domain1 = “david-gardiner.website” ascii nocase
$domain2 = “jonathanbartz.com” ascii nocase
$domain3 = “wayne-lashley.com” ascii nocase

// Executable name
$exe = “viewfile.exe” ascii nocase

condition:
any of ($ip*) or any of ($cve*) or any of ($domain*) or $exe
}

Recommendations Strategic

  • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
  • Deploy Zero Trust Policy that leverages tools like security information management, advanced security analytics platforms, security user behaviour analytics, and other analytics systems to help the organization’s security personnel observe in real-time what is happening within their networks so they can orient defences more intelligently.
  • Block exploit-like behaviour. Monitor endpoints memory to find behavioural patterns that are typically exploited, including unusual process handle requests. These patterns are features of most exploits, whether known or new. This will be able to provide effective protection against zero-day/critical exploits and more by identifying such patterns.

Management

  • Invest in user education and implement standard operating procedures for the handling of financial and sensitive data transactions commonly targeted by impersonation attacks. Reinforce this training with context-aware banners and in-line prompts to help educate users.
  • Look for email security solutions that use ML- and AI-based anti-phishing technology for BEC protection to analyze conversation history to detect anomalies, as well as computer vision to analyze suspect links within emails.
  • Develop a cyber threat remediation program and encourage employee training to detect anomalies proactively.

Tactical

  • For better protection coverage against email attacks (like spear phishing, business email compromise, or credential phishing attacks), organizations should augment built-in email security with layers that take a materially different approach to threat detection.
  • Protect accounts with multi-factor authentication. Exert caution when opening email attachments or clicking on embedded links supplied via email communications, SMS, or messaging.
  • Use Data Loss Prevention (DLP) technologies to detect malicious instances of data exfiltration.
  • Add the YARA rules for threat detection and monitoring, which will help to detect anomalies in log events, identify and monitor suspicious activities.

3. Major Geopolitical Developments in Cybersecurity

Russian hackers targeting critical infrastructure, Germany summons Russian envoy
In mid-December, amid escalating tensions over Russia’s war in Ukraine, Western governments highlighted a surge in Russian-linked hybrid threats, combining cyberattacks on critical infrastructure with disinformation campaigns aimed at undermining democracies.

The U.S. intelligence community, alongside partners from more than a dozen countries, including Germany, issued a joint cybersecurity advisory warning of opportunistic attacks by pro-Russian hacktivist groups–such as the Cyber Army of Russia Reborn (CARR), Z-Pentest, NoName057(16), and Sector16. These actors exploit poorly secured, internet-facing virtual network computing (VNC) connections to target operational technology in critical sectors, including water and wastewater systems, food and agriculture, and energy. While the groups have limited technical sophistication and often misunderstand the systems they disrupt– leading to haphazard outcomes–they have caused varying impacts, including physical damage. Some, like CARR, have documented ties to Russia’s GRU military intelligence, with evidence of state funding and direction.

Concurrently, Germany’s foreign ministry summoned the Russian ambassador in Berlin to protest a “massive increase” in Moscow-backed hybrid activities, ranging from disinformation and espionage to cyberattacks and sabotage attempts.

Officials cited clear evidence linking the GRU to a 2024 cyberattack on Germany’s air traffic control system, attributed to the hacker group Fancy Bear (APT28), as well as interference in February 2025’s federal election and domestic affairs via the “Storm-1516” campaign. This operation disseminated deepfakes, fabricated stories, and pseudo-journalistic content–such as false claims of scandals involving politicians like the Chancellor–often amplified on social media platforms.

ETLM Assessment:
Germany pledged coordinated European countermeasures, including new sanctions like travel bans and asset freezes on implicated individuals, to impose costs on Russia for these actions aimed at dividing society and eroding trust in democratic institutions– and indeed by mid-December, the EU Council imposed asset freezes and travel bans on 12 individuals and two entities involved in information manipulation and cyber operations aimed at destabilizing Europe and undermining democratic processes.

This will likely provoke Russia in several predictable ways, based on its historical pattern of responses to Western pressure; Russia will typically issue sharp condemnations, deny all allegations, and frame them as attempts to suppress free speech or silence pro-Russian voices. In retaliation, Moscow often mirrors actions by imposing counter-sanctions on EU officials, diplomats, or entities; expelling diplomats; or restricting Western media/NGOs in Russia and using hackers and propagandists to escalate hybrid activities–potentially intensifying cyberattacks on European infrastructure, amplifying disinformation campaigns, or greenlighting sabotage plots to demonstrate defiance and impose asymmetric costs.

The U.S. to enlist private cybersecurity firms to conduct offensive cyberattacks
The U.S. administration is preparing to enlist private cybersecurity firms in conducting offensive cyberattacks against foreign adversaries, marking a significant expansion of U.S. digital warfare beyond traditional intelligence agencies and military units. The new national cyber strategy, as reportedly drafted by the Office of the National Cyber Director, explicitly calls for “unleashing” private businesses to help impose costs on state-sponsored hackers and criminals targeting critical infrastructure, telecommunications networks, and businesses via ransomware.

Currently, no legal basis exists for private companies to independently launch offensive operations, and involvement could expose them to retaliation from foreign governments, whose intelligence services often rely on proxy hackers.

ETLM Assessment:
Despite these risks, the move reflects a consensus in the administration and intelligence community that the U.S. requires greater capacity to counter well- resourced adversaries, allowing government agencies to focus on high-end threats. Experts note that many defensive-focused firms possess tools and expertise adaptable for offense.

4. Rise in Malware/Ransomware and Phishing

Coinbase Cartel Ransomware Impacts Renesas Electronics Corporation

  • Attack Type: Ransomware
  • Target Industry: Manufacturing
  • Target Geography: Japan
  • Ransomware: Coinbase Cartel Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
CYFIRMA observed in an underground forum that a company from Japan, Renesas Electronics Corporation (www[.]renesas[.]com), was compromised by Coinbase Cartel Ransomware. Renesas Electronics Corporation delivers trusted embedded design innovation with complete semiconductor solutions. Renesas provides quality and comprehensive solutions for a broad range of Automotive, Industrial, Home Electronics (HE), Office Automation (OA), and Information Communication Technology (ICT) applications. Renesas Electronics is headquartered in Tokyo, Japan. The compromised data includes confidential details such as physical geometry metrics (wafer diameter, die size, grid size, wafer area, die area), yield analysis reports, spatial defect distribution maps, and lot analysis records.

Source: Dark Web

Relevancy & Insights:

  • Coinbase Cartel Ransomware appeared around September 2025 as a cyber extortion collective with its own dedicated leak site on the dark web.
  • The Coinbase Cartel Ransomware group primarily targets countries such as the United States of America, the United Arab Emirates (UAE), Canada, Switzerland, and Japan.
  • The Coinbase Cartel Ransomware group primarily targets industries, such as Information Technology, Real Estate & Construction, Transportation & Logistics, Manufacturing, and Materials.
  • Based on the Coinbase Cartel Ransomware victims list from 1st September 2025 to 16th December 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Coinbase Cartel Ransomware victims list from 1st September 2025 to 16th December 2025 are as follows:

ETLM Assessment:
Based on recent assessments by CYFIRMA, Coinbase Cartel represents a fast- maturing, financially motivated extortion collective that has moved the goalposts from classic crypto-locking ransomware toward a predominantly data-theft and leak-driven model, significantly increasing legal, regulatory, and reputational risk even in the absence of encryption-driven outages.

Qilin Ransomware Impacts Sanko Air Conditioning Co., Ltd.

  • Attack Type: Ransomware
  • Target Industry: Construction
  • Target Geography: Japan
  • Ransomware: Qilin Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
CYFIRMA observed in an underground forum that a company from Japan, Sanko Air Conditioning Co., Ltd. (www[.]sanko-air[.]co[.]jp), was compromised by Qilin Ransomware. Sanko Air Conditioning Co., Ltd. is a Japanese company operating in the construction and building systems space, with a core focus on air-conditioning and related mechanical services. The compromised data contains confidential and sensitive information belonging to the organization.

Source: Dark Web

Relevancy & Insights:

  • The Qilin Ransomware group operates a Ransomware-as-a-Service (RaaS) model, allowing affiliates to carry out attacks while Qilin provides infrastructure and malware tools.
  • The Qilin Ransomware group primarily targets countries such as the United States of America, Canada, South Korea, France, and the United Kingdom.
  • The Qilin Ransomware group primarily targets industries, including Manufacturing, Professional Goods & Services, Consumer Goods & Services, Healthcare, and Real Estate & Construction.
  • Based on the Qilin Ransomware victims list from 1st Jan 2025 to 16th December 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Qilin Ransomware victims list from 1st Jan 2025 to 16th December 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Qilin ransomware poses a significant threat to organizations of all sizes. Its evolving tactics, including double extortion (data encryption and leak threats), cross-platform capabilities (Windows and Linux, including VMware ESXi), and a focus on speed and evasion, make it a particularly dangerous actor.

5. Vulnerabilities and Exploits

Vulnerability in Next.js App Router

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Server application
  • Vulnerability: CVE-2025-55184
  • CVSS Base Score: 7.5 Source
  • Vulnerability Type: Deserialization of Untrusted Data
  • Summary: The vulnerability allows a remote attacker to perform a denial-of- service attack.

Relevancy & Insights:
The vulnerability exists due to insecure input validation when processing serialized data.

Impact:
A remote attacker can send a specially crafted HTTP request, which can cause an infinite loop and prevent future HTTP requests from being served, leading to a denial-of-service condition.

Affected Products:
https[:]//react[.]dev/blog/2025/12/11/denial-of-service-and- source-code-exposure-in-react-server-components

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerabilities in the Next.js App Router can pose significant threats to application integrity and user data privacy. This can impact various industries globally, including technology, e-commerce, finance, and enterprise IT. Ensuring the security of the App Router is crucial for maintaining the reliability and protection of modern full- stack React applications worldwide. Therefore, addressing these vulnerabilities is essential to safeguarding Server Components, Server Actions, and dynamic routing mechanisms across different geographic regions and sectors.

6. Latest Cyber-Attacks, Incidents, and Breaches

DevMan Ransomware attacked and published the data of Quezon Power

  • Threat Actor: DevMan Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Energy
  • Target Geography: Philippines
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that DevMan Ransomware attacked and published the data of Quezon Power (www[.]qpl[.]com[.]ph) on its dark web website. Quezon Power (Philippines), Limited Co. (QPL) is an independent power producer that operates a coal-fired power plant supplying electricity to the Luzon grid in the Philippines. The data leak from the ransomware attack includes employee records, HR information, project documents, power plant work logs, and SCADA source code, with the total volume of compromised data estimated at around 200 GB.

Source: Dark Web

Relevancy & Insights:
DevMan ransomware is a recently identified ransomware strain that emerged in early 2025, showing strong ties to the notorious DragonForce and Conti ransomware families but with distinct characteristics that set it apart as an independent threat. It primarily targets Windows 10 and 11 systems, including Windows server infrastructures, and is known for rapid file encryption and lateral movement within networks using SMB (Server Message Block) share.

ETLM Assessment:
According to CYFIRMA’s assessment, DevMan marks a notable advancement in the ransomware threat landscape. First observed in early 2025 as a customized derivative of DragonForce, the operation rapidly evolved and, by late 2025, had matured into a fully developed Ransomware-as-a-Service (RaaS) platform.

DevMan continues to pose a persistent cyber-extortion risk, primarily targeting organizations with inadequate security controls, underscoring the critical need for strong cybersecurity hygiene, continuous monitoring, and proactive defensive measures.

7. Data Leaks

Sticker Japan Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Printing and Commercial Printing Services
  • Target Geography: Japan
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary: The CYFIRMA research team has identified claims made by a threat actor, operating under the alias “Sorb,” who alleges responsibility for a security breach involving Sticker Japan.

Sticker Japan, a company specializing in business card and sticker printing services, is reportedly the victim of a data compromise. According to the threat actor, a database containing the personal information of approximately 110,000 users has been exfiltrated and offered for sale on a cybercrime forum, with an asking price of $150.

According to the actor and the sample data provided, the allegedly compromised information includes:

  • Full names (including Furigana)
  • Email addresses (110,000 unique records)
  • Phone numbers (80,000 unique records)
  • Physical addresses (Postal codes, prefectures, cities, and building names)
  • Company names
  • Hashed passwords (Bcrypt)
  • IP addresses
  • Order timestamps

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

ThermoEx Company Limited Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Manufacturing
  • Target Geography: Thailand
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team has identified claims suggesting that ThermoEx Company Limited, a prominent Thailand-based manufacturer of high-pressure equipment and heat exchangers, has been compromised.

According to listings observed on a cybercrime forum, a sizable database allegedly belonging to ThermoEx is being offered for sale for $15,000. ThermoEx is known for designing equipment in compliance with ASME standards and for serving major international clients, including Parker Hannifin, Linde, and several organizations within the petrochemical, oil, and gas sectors. The purported data leak is said to comprise approximately 170 GB of information, encompassing more than 108,000 files.

According to the actor, the allegedly compromised data includes:

  • Complete financial documents: Purchase Orders (POs) from 2018 to 2025, invoices, payments, customs, and transportation costs.
  • Technical and engineering drawings: DWG files, PDFs, Compress calculations, BOMs, and As-Built Drawings.
  • Quality control documents: QC Manuals, QCPs, material certificates, and hydrostatic/pneumatic test reports.
  • Project documentation: Files for ongoing and completed projects, including specific codes (e.g., J25-1706 Parker).
  • Internal communications: Correspondence, emails, contracts, and supplier information.
  • Production media: Real photos from the production process and testing.

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously looking for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to gain access and steal valuable data. Subsequently, the stolen data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The threat actor referred to as “Sorb” is assessed to be a highly active and capable group primarily engaged in data-leak operations. Several credible sources have connected the actor to a range of security breaches involving unauthorized access to systems and the distribution or sale of stolen data on dark web marketplaces.

These activities highlight the persistent and rapidly evolving threat landscape driven by underground cybercriminal communities and underscore the importance for organizations to reinforce their cybersecurity posture through continuous monitoring, enhanced threat intelligence, and proactive defensive strategies to protect sensitive data and critical infrastructure.

Recommendations: Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related attacks.
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA Research team observed that Tabsyst, a web-based platform associated with educational management services, has allegedly been compromised, resulting in the sale of sensitive user data on a dark web forum. The platform appears to handle user registrations and management, as indicated by the “members” table exposed in the breach.

According to the actor, the compromised database is approximately 20.2 MB in size and contains 53,779 records. The actor claims the data is available in CSV format and includes a significant amount of financial information. The allegedly compromised data includes:

  • Full names
  • Phone numbers
  • Dates of birth
  • Password hashes (bcrypt)
  • Bank account numbers
  • Bank account holder names
  • IFSC codes
  • Physical addresses (observed in sample data)

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

The CYFIRMA Research team has identified claims suggesting that myQNAPcloud, the cloud-based remote access service operated by QNAP Systems, has been targeted in a data-related offering on a cybercrime forum.

A threat actor alleges they have gained “internal access” to the service and is advertising this access for sale at $400. Although the actor has presented screenshots purportedly showing the interface of a specific QNAP NAS device (TS- 228), the listing implies a wider compromise of the myQNAPcloud platform.

According to the actor, the unauthorized access allegedly provides entry to sensitive information. The claimed data includes:

  • Document data
  • User details
  • Approximately 1.7TB of stored data

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

RECOMMENDATIONS

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Delay a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence, providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions, remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies should be continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security controls, such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.