
CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.
Type: Ransomware
Target Technologies: Windows
Introduction
CYFIRMA Research and Advisory Team has found Milkyway Ransomware while monitoring various underground forums as part of our Threat Discovery Process.
Milkyway Ransomware
Milkyway is a ransomware strain identified by researchers that targets organizational environments by encrypting files across infected systems. During execution, it systematically encrypts accessible data and appends the “.milkyway” extension to each affected file, rendering them unusable (for example, 2.png becomes 2.png.milkyway). After completing the encryption process, the malware displays a full-screen ransom message to notify the victim of the attack. Based on established ransomware behavior, decryption without the attackers’ assistance is generally not feasible unless the malware contains critical cryptographic flaws. While removing Milkyway from the operating system can halt further encryption activity, it does not reverse the damage already done; encrypted files can only be restored from secure backups created before the infection and stored separately from the compromised network.

Screenshot of files encrypted by the ransomware (Source: Surface Web)
The ransom note asserts that the victim’s entire infrastructure has been compromised, claiming that all servers, workstations, and even backups are unavailable due to encryption. The attackers state that they possess the necessary decryption keys and software but will release them only after receiving payment, emphasizing that no decryption will occur without prepayment. To pressure the victim, the note includes multiple threats, such as leaking stolen data, reporting the organization to tax authorities, security services, and law enforcement, and publicly disclosing sensitive information. It further warns that login credentials and internal information may be shared and that the attackers will contact the victim’s clients and partners directly. The note instructs the victim to initiate contact via a provided Outlook email address, reinforcing the urgency and coercive nature of the demand.

The appearance of the Milkyway ransom note screen (Source: Surface Web)
The following are the TTPs based on the MITRE Attack Framework
| Tactic | Technique ID | Technique Name |
| Execution | T1059 | Command and Scripting Interpreter |
| Execution | T1106 | Native API |
| Execution | T1129 | Shared Modules |
| Execution | T1569.002 | System Services: Service Execution |
| Persistence | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
| Persistence | T1112 | Modify Registry |
| Persistence | T1543.003 | Create or Modify System Process: Windows Service |
| Privilege Escalation | T1543.003 | Create or Modify System Process: Windows Service |
| Defense Evasion | T1027.002 | Obfuscated Files or Information: Software Packing |
| Defense Evasion | T1070.004 | Indicator Removal: File Deletion |
| Defense Evasion | T1112 | Modify Registry |
| Defense Evasion | T1562.001 | Impair Defenses: Disable or Modify Tools |
| Defense Evasion | T1564.003 | Hide Artifacts: Hidden Window |
| Discovery | T1057 | Process Discovery |
| Discovery | T1082 | System Information Discovery |
| Command and control | T1095 | Non-Application Layer Protocol |
Relevancy and Insights:
ETLM Assessment:
CYFIRMA’s assessment indicates that this ransomware is currently in an early or developing state, but it has the potential to evolve into a more sophisticated and damaging threat. As development progresses, Milkyway could mature into a full- scale ransomware operation with improved encryption routines, better evasion techniques, and more reliable execution across complex enterprise environments. Future variants may incorporate advanced obfuscation, privilege escalation, and lateral movement capabilities, enabling broader and faster impact within large networks.
Additionally, Milkyway could transition into a structured ransomware-as-a-service (RaaS) model, allowing affiliates to deploy it in exchange for a share of the profits. This evolution would likely be accompanied by expanded extortion strategies, such as more systematic data theft, targeted pressure campaigns, and customized ransom negotiations. If actively maintained, the ransomware may also adopt mechanisms to disable security tools, exploit unpatched vulnerabilities, and automate propagation, significantly increasing both its reach and its operational effectiveness.
Sigma rule:
title: Uncommon Svchost Command Line Parameter tags:
– attack.defense-evasion
– attack.privilege-escalation
– attack.t1036.005
– attack.t1055
– attack.t1055.012 logsource:
category: process_creation product: windows
detection: selection:
# Example of command to simulate: “C:\Windows\System32\svchost.exe” calc.exe
Image|endswith: ‘\svchost.exe’ filter_main_flags:
CommandLine|re: ‘-k\s\w{1,64}(\s?(-p|-s))?’ filter_main_empty:
CommandLine: ” filter_main_null:
CommandLine: null filter_optional_defender:
ParentImage|endswith: ‘\MsMpEng.exe’ CommandLine|contains: ‘svchost.exe’
filter_optional_mrt: ParentImage|endswith: ‘\MRT.exe’ CommandLine: ‘svchost.exe’
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_* falsepositives:
– Unlikely level: high
(Source: Surface Web)
IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.
STRATEGIC RECOMMENDATIONS
MANAGEMENT RECOMMENDATIONS
TACTICAL RECOMMENDATIONS
Type: Infostealer RAT| Objectives: Espionage| Threat Actor: Unknown| Target Technology: Windows OS | Target Geography: Global
CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malwares that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.
Active Malware of the week
This week, “Pulsar RAT” is trending.
Overview of Operation Pulsar RAT
Security researchers have uncovered a highly covert Windows-based malware operation that reflects how modern cyber threats are evolving toward stealth, persistence, and long-term exploitation. Instead of relying on obvious malicious files or noisy exploits, this campaign quietly embeds itself into systems using legitimate Windows components and trusted processes. By blending into normal activity, the malware significantly reduces its visibility, allowing attackers to operate for extended periods without raising suspicion.
Once established, the threat deploys its core functionality directly into system memory rather than storing traditional executable files on disk. This approach helps it avoid detection by many conventional security tools and makes forensic analysis more difficult. The malware is structured in a modular fashion, meaning different components handle different tasks, such as maintaining access, gathering information, and communicating with remote operators. This flexible design allows attackers to update or replace individual parts without rebuilding the entire framework.
The campaign is primarily focused on collecting valuable data and enabling remote control of infected machines. It targets a wide range of information, including saved credentials, personal communications, and details about installed applications and system configurations. In addition, it can activate surveillance features such as screen monitoring, audio capture, and camera access, effectively turning compromised systems into silent monitoring devices. Stolen data is then sent out using popular online platforms, helping the attackers hide malicious traffic within everyday internet usage.
Overall, this activity illustrates a broader shift toward memory-resident, multi-stage malware that prioritizes stealth and endurance over quick impact. The use of publicly available tools combined with heavily modified malicious code shows how threat actors can rapidly build powerful operations without developing everything from scratch. For defenders, this reinforces the importance of behavior-based detection and continuous monitoring, as traditional signature-focused security alone is no longer sufficient to counter these increasingly sophisticated threats.
Attack Method
The attack observed in this campaign follows a carefully engineered, multi-layer execution chain designed to establish stealthy persistence, deploy payloads entirely in memory, and maintain continuous control of compromised systems. Initial access is achieved through an obfuscated batch script that copies itself into a concealed per- user directory and registers a randomized entry within the Windows Run registry key. This ensures execution at every user logon without requiring administrative privileges. Rather than dropping a malicious executable, the batch file extracts an embedded Base64-encoded PowerShell payload from within its own contents, writes it temporarily to disk, launches it using a hidden PowerShell instance with execution policy bypass enabled, and then deletes the script. This self-extracting and self-cleaning behavior minimizes static artifacts while reliably transitioning the attack into its next stage.
The decoded PowerShell script functions as an advanced in-memory loader. It contains an encrypted byte array that is decrypted at runtime using a bitwise XOR routine, producing shellcode generated by the Donut framework. To execute this shellcode, the script dynamically compiles C# code inside PowerShell that exposes native Windows API functions, such as OpenProcess, VirtualAllocEx, WriteProcessMemory, and CreateRemoteThread. After an intentional delay intended to evade sandbox detection, the loader injects the decrypted shellcode into a legitimate process and spawns a remote thread to begin execution. This approach allows the core payload to run inside a trusted Windows process while avoiding the creation of a visible executable on disk.
A persistent watchdog mechanism is embedded within the same PowerShell loader to guarantee long-term execution. The script continuously monitors whether the injected process is still alive and, if it terminates, automatically selects another commonly trusted process and repeats the injection sequence. This results in continuous process migration, making takedown efforts more complex because killing a single process does not eliminate the infection. The use of widely present system processes as hosts also obscures malicious activity within normal operating system behavior.
Once active, the injected shellcode decrypts and loads an obfuscated .NET assembly directly into memory. This assembly acts as a combined remote access trojan and information stealer. It establishes encrypted communication with command-and- control infrastructure, enumerates system and user details, harvests credentials and application data, and supports attacker-issued commands such as remote shell access, file management, and surveillance. Collected information is packaged into compressed archives and exfiltrated through commonly used cloud-based messaging services, allowing outbound traffic to blend into legitimate network patterns. Together, these steps form a tightly integrated attack method that prioritizes stealth, resilience, and sustained control over compromised environments.
The following are the TTPs based on the MITRE Attack Framework for Enterprise
| Tactic (ID) | Technique ID | Technique Name |
| Execution | T1059 | Command and Scripting Interpreter |
| T1059.001 | Command and Scripting Interpreter: PowerShell | |
| T1059.005 | Command and Scripting Interpreter: Visual Basic | |
| T1059.006 | Command and Scripting Interpreter: Python | |
| T1059.007 | Command and Scripting Interpreter: JavaScript | |
| T1106 | Native API | |
| Privilege Escalation | T1055 | Process Injection |
| Defense Evasion | T1562.001 | Impair Defenses: Disable or Modify Tools |
| T1070 | Indicator Removal | |
| T1027.002 | Obfuscated Files or Information: Software Packing | |
| T1027.013 | Obfuscated Files or Information: Encrypted/Encoded File | |
| T1027.015 | Obfuscated Files or Information: Compression | |
| T1620 | Reflective Code Loading | |
| Discovery | T1057 | Process Discovery |
| Command and control | T1105 | Ingress Tool Transfer |
| T1071 .001 | Application Layer Protocol: Web Protocols |
INSIGHTS
ETLM ASSESSMENT
From an ETLM perspective, CYFIRMA assesses that this activity signals a future in which malware operations increasingly favor quiet, long-term positioning inside enterprise environments rather than short-lived, disruptive attacks. As these campaigns become more patient and adaptive, organizations are likely to face a steady rise in incidents where compromise is only discovered after significant data has already been collected or systems have been quietly manipulated. For employees, this trend may translate into greater exposure to indirect consequences of compromise, such as misuse of their digital identities, monitoring of everyday work activities, and erosion of personal privacy within corporate systems. Over time, the cumulative effect of these developments is expected to reshape organizational risk landscapes, where the impact of hidden, prolonged intrusions becomes as damaging as large-scale, visible breaches, fundamentally altering how businesses perceive and experience cyber risk.
IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.
YARA Rules
rule WIN_MultiStage_Donut_Pulsar_Stealer
{
meta:
description = “Detects malware based on MD5 hashes, file names, and C2 IP” author = “CYFIRMA”
date = “2026-02-02”
malware_family = “Donut Loader / Pulsar RAT / Stealer” strings:
/* — MD5 Hashes — */
$md5_bat = “648c0ba2bb1cde47fa8812f254821a72” ascii
$md5_ps1 = “69392e0d2b877cb932ab709ebe758975” ascii
$md5_client = “666493877fb7328c3e8c313fbcfdfd1e” ascii
$md5_pulsar = “0020b06dc2018cc2b5bf98945a39cbd3” ascii
$md5_stealer = “3abcad7678dd78832a164349aceeaa59” ascii
/* — File Names — */
$fn_bat = “0a1a98b5f9fc7c62.bat” ascii
$fn_ps1 = “ps_7b948266.ps1” ascii
$fn_pulsar = “Pulsar.Common.dll” ascii
$fn_stealer = “Stealerv37.dll” ascii
/* — C2 Indicator — */
$c2_ip = “185.132.53.17:7800” ascii
condition:
any of ($md5_*) or any of ($fn_*) or $c2_ip
}
STRATEGIC RECOMMENDATIONS
MANAGEMENT RECOMMENDATIONS
TACTICAL RECOMMENDATIONS
Key Intelligence Signals:
DRAGONFLY (TA17-293A): Cyber Operations and Strategic Impact Analysis
About the Threat Actor
DRAGONFLY is a Russian threat actor active since at least 2011, with a long-standing focus on the energy sector and other critical infrastructure. The group resurfaced in September 2017, conducting attacks against energy organizations across Asia, Europe, and North America. DRAGONFLY has also been linked to the major cyberattacks on Ukraine’s power grid in 2015 and 2016, which resulted in widespread power outages.
Also known by aliases such as Energetic Bear, Crouching Yeti, Group 24, Koala Team, Bersek Bear, and Anger Bear, DRAGONFLY primarily targets ICS and SCADA environments. Its notable campaign, TA17-293A, demonstrates a structured two-phase attack approach in which initial compromises of staging targets are used as pivot points to launch further attacks against larger, intended targets.
Details on Exploited Vulnerabilities
| CVE ID | Affected Products | CVSS Score | Exploit Links |
| CVE-2023-22518 | Confluence Data Center and Server | 9.8 | Link |
| CVE-2017-17215 | Huawei HG532 | 8.8 | – |
| CVE-2023-4966 | NetScaler ADC and NetScaler Gateway | 7.5 | Link |
| CVE-2023-36884 | Microsoft Windows and Netlogon Remote Protocol (MS-NRPC) | 10.0 | Link1, Link2 |
| CVE-2020-0688 | Microsoft Exchange software | 8.8 | Link1, Link2 |
TTPs based on MITRE ATT&CK Framework
| Tactic | ID | Technique |
| Reconnaissance | T1595.002 | Active Scanning: Vulnerability Scanning |
| Reconnaissance | T1591.002 | Gather Victim Org Information: Business Relationships |
| Reconnaissance | T1598.002 | Phishing for Information: Spear phishing Attachment |
| Reconnaissance | T1598.003 | Phishing for Information: Spear phishing Link |
| Resource Development | T1608.004 | Stage Capabilities: Drive-by-Target |
| Resource Development | T1583.001 | Acquire Infrastructure: Domains |
| Resource Development | T1583.003 | Acquire Infrastructure: Virtual Private Server |
| Resource Development | T1584.004 | Compromise Infrastructure: Server |
| Resource Development | T1588.002 | Obtain Capabilities: Tool |
| Initial Access | T1189 | Drive-by Compromise |
| Initial Access | T1566.001 | Phishing: Spear phishing Attachment |
| Initial Access | T1189 | Drive-by Compromise |
| Initial Access | T1133 | External Remote Services |
| Initial Access | T1195.002 | Supply Chain Compromise: Compromise Software Supply Chain |
| Initial Access | T1078 | Valid Accounts |
| Execution | T1059.001 | Command and Scripting Interpreter: PowerShell |
| Execution | T1059 | Command and Scripting Interpreter |
| Execution | T1053.005 | Scheduled Task/Job: Scheduled Task |
| Execution | T1204.002 | User Execution: Malicious File |
| Execution | T1203 | Exploitation for Client Execution |
| Execution | T1059.003 | Command and Scripting Interpreter: Windows Command Shell |
| Execution | T1059.006 | Command and Scripting Interpreter: Python |
| Persistence | T1133 | External Remote Services |
| Persistence | T1112 | Modify Registry |
| Persistence | T1078 | Valid Accounts |
| Persistence | T1505.003 | Server Software Component: Web Shell |
| Persistence | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
| Persistence | T1136.001 | Create Account: Local Account |
| Persistence | T1053.005 | Scheduled Task/Job: Scheduled Task |
| Persistence | T1098.007 | Account Manipulation: Additional Local or Domain Groups |
| Privilege Escalation | T1053.005 | Scheduled Task/Job: Scheduled Task |
| Privilege Escalation | T1098.007 | Account Manipulation: Additional Local or Domain Groups |
| Privilege Escalation | T1078 | Valid Accounts |
| Privilege Escalation | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
| Defense Evasion | T1070.004 | Indicator Removal: File Deletion |
| Defense Evasion | T1221 | Template Injection |
| Defense Evasion | T1036.010 | Masquerading: Masquerade Account Name |
| Defense Evasion | T1070.001 | Indicator Removal: Clear Windows Event Logs |
| Defense Evasion | T1078 | Valid Accounts |
| Defense Evasion | T1112 | Modify Registry |
| Defense Evasion | T1562.004 | Impair Defenses: Disable or Modify System Firewall |
| Defense Evasion | T1564.002 | Hide Artifacts: Hidden Users |
| Credential Access | T1110 | Brute Force |
| Credential Access | T1110.002 | Brute Force: Password Cracking |
| Credential Access | T1187 | Forced Authentication |
| Credential Access | T1003.002 | OS Credential Dumping: Security Account Manager |
| Credential Access | T1003.003 | OS Credential Dumping: NTDS |
| Credential Access | T1003.004 | OS Credential Dumping: LSA Secrets |
| Discovery | T1083 | File and Directory Discovery |
| Discovery | T1087.002 | Account Discovery: Domain Account |
| Discovery | T1135 | Network Share Discovery |
| Discovery | T1069.002 | Permission Groups Discovery: Domain Groups |
| Discovery | T1012 | Query Registry |
| Discovery | T1018 | Remote System Discovery |
| Discovery | T1016 | System Network Configuration Discovery |
| Discovery | T1033 | System Owner/User Discovery |
| Lateral Movement | T1210 | Exploitation of Remote Services |
| Lateral Movement | T1021.001 | Remote Services: Remote Desktop Protocol |
| Collection | T1056.001 | Input Capture: Keylogging |
| Collection | T1560 | Archive Collected Data |
| Collection | T1005 | Data from Local System |
| Collection | T1074.001 | Data Staged: Local Data Staging |
| Collection | T1114.002 | Email Collection: Remote Email Collection |
| Collection | T1113 | Screen Capture |
| Command and Control | T1071.002 | Application Layer Protocol: File Transfer Protocols |
| Command and Control | T1105 | Ingress Tool Transfer |
Latest Developments Observed
Researchers report that the threat actor is suspected of targeting over 30 Polish organisations in renewable energy, manufacturing, and energy/utilities sectors, aiming for operational disruption and long-term espionage. The initial access vector is believed to be the exploitation of a vulnerable FortiGate appliance. These suspected attacks reflect sustained interest in critical industrial and infrastructure networks.
ETLM Insights
DRAGONFLY conducts strategically driven cyber operations where intelligence collection, disruption, and operational positioning outweigh financial motives. The threat actor targets energy, manufacturing, and other critical infrastructure, leveraging access to OT/ICS networks to undermine operational resilience and gain asymmetric strategic leverage.
The actor employs a methodical approach, exploiting exposed perimeter devices for initial access, followed by internal reconnaissance, credential abuse, lateral movement, and privilege escalation. Compromised staging entities are used to expand reach, maintain footholds, and support long-term intelligence collection against high-value targets.
Recent activity highlights destructive and hybrid techniques, including custom wiper deployment, controller manipulation, and file deletion, alongside ongoing interest in SCADA modernization and OT infrastructure. DRAGONFLY is expected to further refine OT-focused tradecraft, strengthen persistence across IT–OT environments, and maintain readiness for timed disruption aligned with strategic objectives.
IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.
YARA Rules
rule Dragonfly_Campaign_Indicators
{
meta:
author = “CYFIRMA”
description = “Detects artifacts associated with Dragonfly-related activity based on CVEs, IPs, domains, and files”
reference = “Internal Threat Intel” date = “2026-02-03”
strings:
// CVEs
$cve1 = “CVE-2023-22518”
$cve2 = “CVE-2017-17215”
$cve3 = “CVE-2023-4966”
$cve4 = “CVE-2020-1472”
$cve5 = “CVE-2020-0688”
// IPs
$ip1 = “69.172.201.208”
$ip2 = “117.18.237.29”
$ip3 = “171.25.193.25”
$ip4 = “23.227.38.74”
$ip5 = “23.227.38.32”
// Domains
$domain1 = “tureg.info”
$domain2 = “satanal.info”
$domain3 = “user.name”
$domain4 = “adatum.com”
$domain5 = “5iantlavalamp.com”
// Files
$file1 = “hrm3jvh9v.dll”
$file2 = “exe159d860d0cfa59816c686e4a9914113.exe”
$file3 = “e159d860d0cfa59816c686e4a9914113.exe”
condition:
any of ($cve*) or any of ($ip*) or any of ($domain*) or any of ($file*)
}
Strategic Recommendations
Management Recommendations
Tactical Recommendations
Chinese APTs Hit Asia with High-End Malware
China-linked APT groups continue to intensify cyberattacks across Asia, deploying sophisticated tools against gambling sites and government entities in the region. Researchers have tracked the versatile JScript-based command-and-control framework PeckBirdy since 2023, used by China-aligned threat actors in two distinct campaigns, one primarily financially motivated, in which the group injected malicious scripts into Chinese gambling websites. Another one, tracked from July 2024 onward, has been more espionage-oriented. This campaign targeted Asian government entities, private organizations (including a Philippine educational institution), and other sectors. Attackers injected PeckBirdy links into websites for credential harvesting and malware delivery, using diverse execution methods such as Mshta for remote access, ScriptControl (.NET), Node.js, Windows Script Host (WScript), or Active Server Pages (ASP) environments.
Researchers attribute both campaigns to China-aligned actors, noting overlaps with clusters like Earth Baxia for SHADOW-EARTH-045. The researchers highlight that Chinese APTs often share tools and infrastructure, blurring lines between cybercrime and espionage.
ETLM Assessment:
The Asia-Pacific (APAC) region accounts for over half of global APT activity, fueled by its massive population, major economies (Japan, China, South Korea), geopolitical rivalries, and especially the high volume and sophistication of Chinese state-aligned operations. These actors rank among the world’s most advanced, frequently innovating malware and tactics, techniques, and procedures (TTPs), while sharing resources across loosely affiliated clusters that can include private entities or criminal groups.
Russian cyberattack against Poland’s energy grid compromised 30 sites
The December 2025 coordinated cyberattack that targeted Poland’s electric grid compromised operational technology (OT) systems at approximately 30 distributed energy resource (DER) sites, according to researchers. These included wind farms, solar (photovoltaic) installations, and combined heat and power (CHP) facilities. Researchers described the incident as the first major cyberattack at scale targeting distributed energy resources—the smaller-scale, decentralized wind, solar, and CHP assets increasingly integrated into power grids around the world. The attackers disrupted communication and control systems at affected sites, resulting in loss of view, loss of control, and denial-of-service conditions. They also disabled key equipment in a way that rendered it beyond repair at certain locations. Importantly, the attack did not cause any widespread power outages or disruptions to Poland’s overall electricity supply, as the centralized transmission backbone remained unaffected. This, however, should not lead to complacency, since the adversaries gained access to operational technology systems critical to grid operations and disabled key equipment beyond repair at the site. Due to the lack of electric outages, asset operators and the broader community may be mistaken in thinking this is not overly concerning. In fact, the attack demonstrated that countries that currently or will depend more on DERs should be alarmed. The attack has been attributed to the Russia-linked threat group ELECTRUM, which shows significant technical and operational overlaps with the well-known Russian state-sponsored actor Sandworm (also known as APT44 or linked to Russia’s military intelligence GRU).
ETLM Assessment:
Poland, as a key frontline NATO and EU member bordering both Russia and its ally Belarus, faces heightened risks from Moscow’s hybrid warfare tactics. The country has been one of the strongest supporters of Ukraine since Russia’s full-scale invasion in 2022, serving as a major transit hub for military aid to Kyiv. In recent years, hacker groups frequently linked by Polish authorities to the Kremlin have repeatedly struck critical infrastructure in Poland, including hospitals, water treatment plants, and sewage systems. Tensions further intensified last September when multiple Russian drones violated Polish airspace, raising serious concerns about Moscow’s readiness to challenge NATO’s defenses. In November, Poland publicly blamed Russia for orchestrating explosions that damaged a crucial railway line used for transporting aid to Ukraine. Poland currently ranks among the most targeted nations worldwide for cyberattacks.
Everest Ransomware Impacts Hosokawa Micron Corporation
Summary:
CYFIRMA observed in an underground forum that a company from Japan, Hosokawa Micron Corporation (https[:]//www[.]hosokawamicron[.]co[.]jp/), was compromised by Everest Ransomware. Hosokawa Micron Corporation is a global leader in powder and particle processing technology, manufacturing equipment for grinding, classifying, mixing, drying, and particle design used across chemicals, pharmaceuticals, food, minerals, and plastics industries. The compromised data contains confidential and sensitive information belonging to the organization. The Total size of data compromised is approximately 30 GB.

Source: Dark Web
Relevancy & Insights:


ETLM Assessment:
According to CYFIRMA’s assessment, Everest ransomware continues to pose a persistent and evolving cyber threat. The group is actively broadening its targeting across new sectors, expanding its role as an initial access broker, and increasingly relying on data-leak extortion as its core operational tactic. Organizations are advised to remain vigilant by strengthening access controls, closely monitoring for lateral movement and Cobalt Strike–related activity, and maintaining robust incident response and detection capabilities to mitigate the risks posed by Everest’s ongoing campaigns.
The Gentlemen Ransomware Impacts Handsome
Attack Type: Ransomware
Target Industry: Manufacturing
Target Geography: Indonesia
Ransomware: The Gentlemen Ransomware
Objective: Data Theft, Data Encryption, Financial Gains
Business Impact: Financial Loss, Data Loss, Reputational Damage
Summary:
CYFIRMA observed in an underground forum that a company from Indonesia, Handsome(https[:]//www[.]handsomegroup[.]com/), was compromised by the Gentlemen Ransomware. Handsome Industrial Company, Limited operates as a veteran OEM manufacturer and key production partner for global entertainment giants like Disney and Marvel. Specializing in high-quality toys, electronics, and consumer goods featuring iconic characters, the company maintains production facilities in China and Indonesia to serve major retailers across the United States, Europe, Asia, and Australia. The data, which has been breached, has not yet appeared on the leak site, indicating that negotiations between the affected party and the ransomware group may be underway. The compromised data includes confidential and sensitive information belonging to the organization.

Source: Dark Web
Relevancy & Insights:


ETLM Assessment:
According to CYFIRMA’s assessment, the Gentlemen Ransomware is a highly adaptive and globally active threat that leverages dual-extortion tactics, combining data theft with file encryption. The group employs advanced evasion and persistence techniques, supports cross-platform and scalable ransomware deployment, and conducts targeted attacks across multiple industries and geographic regions. This combination of capabilities makes it a significant risk to enterprise cybersecurity defenses, particularly for organizations with limited detection and incident-response maturity.
Vulnerability in fast-xml-parser
Summary:
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
Relevancy & Insights:
The vulnerability exists due to the RangeError issue in the numeric entity.
Impact:
A remote attacker can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Affected Products:
https[:]//github[.]com/NaturalIntelligence/fast-xml- parser/security/advisories/GHSA-37qj-frw5-hhjh/#poc
Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.
TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerability in fast-xml-parser can pose significant threats to application stability and data processing integrity. This can impact various industries globally, including software development platforms, API-driven services, automation pipelines, and systems that rely on XML parsing for input validation and structured data handling. Ensuring the security of fast-xml-parser is crucial for maintaining the integrity and protection of application workflows, data processing routines, and service reliability across deployments. Therefore, addressing these vulnerabilities is essential to safeguarding data parsing operations, preventing denial-of-service disruptions, and maintaining consistent system performance across different geographic regions and sectors.
Sinobi Ransomware attacked and published the data of Impressico Business Solutions
Summary:
Recently, we observed that Sinobi Ransomware attacked and published the data of Impressico Business Solutions(https[:]//www[.]impressico[.]com/) on its dark web website. Impressico Business Solutions is a global digital transformation and IT services company that delivers technology solutions and consulting to clients across multiple industries. Headquartered in Noida, India, the company also has operations in the United States, the United Kingdom, Canada, and other regions. The ransomware incident led to the compromise of approximately 150 GB of data, including Contracts, Financial data, and Customer data.

Source: Dark Web
Relevancy & Insights:
ETLM Assessment:
According to CYFIRMA’s assessment, Sinobi Ransomware represents a persistent threat in the ransomware landscape, capable of disruptive attacks on both enterprises and mid-sized organisations.
LinkUMKM Advertised on a Leak Site
Summary:
The CYFIRMA research team has identified claims made by a threat actor operating under the alias “KaruHunters,” who alleges responsibility for an unauthorized access sale related to LinkUMKM. LinkUMKM is an integrated digital platform operated by PT Bank Rakyat Indonesia (Persero) Tbk (BRI), designed to support and enhance the capabilities of Micro, Small, and Medium Enterprises (MSMEs) in Indonesia through mentoring, training, and expanded market access. The platform provides more than 690 learning modules, business self-assessment tools for MSME upgrading, and a digital storefront to support marketing expansion.
According to the threat actor, the alleged access involves 14,621,156 user records, with the access being offered privately via Telegram direct messages. The actor is reportedly seeking USD 500 for a one-time sale of the access.
At the time of reporting, the authenticity of this access sale remains unverified, as the claim is based solely on information provided by the threat actor and has not been independently validated.

Source: Underground Forums
Argaam Investment Company (Argaam) Data Advertised on a Leak Site
Summary
The CYFIRMA research team observed that Argaam Investment Company (Argaam), the Arab world’s leading financial news portal and data provider, has reportedly suffered a significant data breach. A threat actor “pking25” is claiming to sell a database containing 2 million records, asserting that it includes comprehensive user details and credentials. Argaam, which provides real-time updates on financial markets and macroeconomics in Saudi Arabia, is a critical information hub for investors and C-level executives across the Gulf region.
The actor provided a screenshot of what appears to be an administrative interface titled “All Users”. This panel displays sensitive information, including user IDs, display names, and email addresses, with a navigation bar suggesting thousands of pages of records.
The allegedly compromised data includes:
The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums
Relevancy & Insights:
Financially motivated cybercriminals are continuously looking for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to gain access and steal valuable data. Subsequently, the stolen data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.
ETLM Assessment:
The threat actor known as “KaruHunters” is a highly active and sophisticated group specializing in data leaks. Numerous credible sources attribute multiple security breaches to this group, involving unauthorized access to systems and the illicit sale of stolen data on dark web marketplaces. KaruHunters’ operations highlight the persistent and evolving nature of cyber threats emerging from underground forums. These incidents underscore the critical importance for organizations to enhance their cybersecurity posture through continuous monitoring, leveraging advanced threat intelligence, and adopting proactive defense strategies to protect sensitive data and vital infrastructure.
Recommendations: Enhance the cybersecurity posture by:
1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
2. Ensure proper database configuration to mitigate the risk of database-related attacks.
3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.
The CYFIRMA Research team observed that the Taiwan HVAC Engineering Association (THA), a professional trade organization dedicated to the refrigeration and air-conditioning industry in Taiwan, has reportedly suffered a significant data breach.
The leaked information appears to include sensitive administrative records, user credentials, and tender-related data involving various educational and government institutions across Taiwan. Sample data suggests the breach impacts several schools and municipal offices, including the Taichung City Lixing Elementary School and the Ministry of Justice’s Bade Exterior Prison.
The allegedly compromised data includes:
The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums
STRATEGIC RECOMMENDATIONS
Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.





For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.