
CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.
Type: Ransomware (MedusaLocker family variant).
Target Geography: No specific geographic focus identified; incidents observed globally. Target Sectors: Manufacturing, healthcare, education, professional services, technology, government, and financial organizations.
Target Technologies: Windows OS, enterprise networks, Remote Desktop Protocol (RDP), network file shares, and Active Directory environments.
Introduction:
CYFIRMA Research and Advisory Team has found Chip Ransomware while monitoring various underground forums as part of our Threat Discovery Process.
Chip Ransomware
Chip ransomware has been identified as a file-encrypting malware strain associated with the Medusa Locker ransomware family. The malware encrypts victim files using a combination of AES and RSA encryption algorithms and appends the “.chip1” extension (the number may vary) to affected files, preventing access to the original data. Once executed, the malware generates a ransom note titled “Recovery_README.html” and alters the system environment to notify victims that their files have been encrypted. The message claims that files have been modified rather than damaged and warns victims not to rename or attempt to recover encrypted files using third-party tools, stating that such actions may permanently corrupt the data. The operators further assert that only they possess the capability to restore the encrypted files and indicate that sensitive information may have been collected during the intrusion, potentially to be disclosed if ransom demands are not met. Currently, no publicly available or verified decryption tool exists for this variant, and there is no confirmed assurance that paying the ransom will result in successful data recovery.

Screenshot: File encrypted by the ransomware (Source: Surface Web)
The ransom note associated with Chip ransomware informs victims that their files have been encrypted and renamed with the “.chip1” extension, indicating that access to the data has been restricted. The note states that the files were encrypted using a combination of AES and RSA encryption algorithms and claims that only the attackers possess the capability to restore the affected data. It warns victims not to rename or modify encrypted files and cautions against attempting recovery using third-party tools, asserting that such actions could permanently damage the data. The message also applies psychological pressure by imposing a limited response window, indicating that the ransom demand may increase if contact is not established within a specified timeframe. Additionally, it claims that sensitive data may have been collected during the intrusion and could be disclosed if the ransom is not paid. Overall, the message follows common ransomware coercion tactics designed to create urgency and discourage independent recovery, while offering no verifiable guarantee that file access will be restored after payment.

Screenshot: The appearance of Chip’s Ransom Note (Source: Surface Web)

Screenshot: The appearance of Chip’s desktop wallpaper (Source: Surface Web)
The following are the TTPs based on the MITRE Attack Framework
| Tactic | Technique ID | Technique Name |
| Execution | T1129 | Shared Modules |
| Persistence | T1547 | Boot or Logon Autostart Execution |
| Persistence | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
| Privilege Escalation | T1134 | Access Token Manipulation |
| Privilege Escalation | T1134.004 | Access Token Manipulation: Parent PID Spoofing |
| Privilege Escalation | T1547 | Boot or Logon Autostart Execution |
| Privilege Escalation | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
| Defense Evasion | T1027 | Obfuscated Files or Information |
| Defense Evasion | T1027.005 | Obfuscated Files or Information: Indicator Removal from Tools |
| Defense Evasion | T1134 | Access Token Manipulation |
| Defense Evasion | T1134.004 | Access Token Manipulation: Parent PID Spoofing |
| Defense Evasion | T1140 | Deobfuscate/Decode Files or Information |
| Defense Evasion | T1222 | File and Directory Permissions Modification |
| Defense Evasion | T1497 | Virtualization/Sandbox Evasion |
| Defense Evasion | T1497.001 | Virtualization/Sandbox Evasion: System Checks |
| Defense Evasion | T1564 | Hide Artifacts |
| Defense Evasion | T1564.003 | Hide Artifacts: Hidden Window |
| Credential Access | T1056 | Input Capture |
| Credential Access | T1056.001 | Input Capture: Keylogging |
| Discovery | T1010 | Application Window Discovery |
| Discovery | T1012 | Query Registry |
| Discovery | T1082 | System Information Discovery |
| Discovery | T1083 | File and Directory Discovery |
| Discovery | T1497 | Virtualization/Sandbox Evasion |
| Discovery | T1497.001 | Virtualization/Sandbox Evasion: System Checks |
| Discovery | T1614 | System Location Discovery |
| Collection | T1056 | Input Capture |
| Collection | T1056.001 | Input Capture: Keylogging |
Relevancy and Insights:
ETLM Assessment
CYFIRMA’s assessment indicates that the Chip ransomware, associated with the MedusaLocker ransomware family, is likely to continue operating as an extortion- driven malware threat that relies on established ransomware techniques rather than introducing significantly new tactics. The malware already demonstrates core ransomware behaviors, including file encryption, ransom messaging, and warnings discouraging independent recovery attempts, indicating an operational focus on denying access to data in order to pressure victims into payment. If activity continues, the operators may further refine elements of their execution workflow, improve the consistency of their ransom communications, and maintain the use of data-exposure claims to strengthen extortion pressure. However, the current behavior largely aligns with existing ransomware playbooks used by established ransomware families, suggesting that future developments will most likely involve incremental operational adjustments rather than major technical innovations. As a result, the threat is expected to remain focused on opportunistic targeting and data-encryption-based extortion, with limited evidence indicating the introduction of substantially new capabilities.
Sigma rule:
title: New RUN Key Pointing to Suspicious Folder tags:
– attack.privilege-escalation
– attack.persistence
– attack.t1547.001 logsource:
category: registry_set product: windows
detection: selection_target:
TargetObject|contains:
– ‘\Software\Microsoft\Windows\CurrentVersion\Run’
– ‘\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run’
– ‘\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run’ selection_suspicious_paths_1:
Details|contains:
– ‘:\Perflogs’
– :\ProgramData’
– ‘:\Windows\Temp’
– ‘:\Temp’
– ‘\AppData\Local\Temp’
– ‘\AppData\Roaming’
– ‘:\$Recycle.bin’
– ‘:\Users\Default’
– ‘:\Users\public’
– ‘%temp%’
– ‘%tmp%’
– ‘%Public%’
– ‘%AppData%’ selection_suspicious_paths_user_1:
Details|contains: ‘:\Users\’ selection_suspicious_paths_user_2:
Details|contains:
– ‘\Favorites’
– ‘\Favourites’
– ‘\Contacts’
– ‘\Music’
– ‘\Pictures’
– ‘\Documents’
– ‘\Photos’ filter_main_windows_update:
TargetObject|contains: ‘\Microsoft\Windows\CurrentVersion\RunOnce\’ Image|startswith: ‘C:\Windows\SoftwareDistribution\Download\’ Details|contains|all:
– ‘rundll32.exe ‘
– ‘C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32’ Details|contains:
– ‘\AppData\Local\Temp\’
– ‘C:\Windows\Temp\’ filter_optional_spotify:
Image|endswith:
– ‘C:\Program Files\Spotify\Spotify.exe’
– ‘C:\Program Files (x86)\Spotify\Spotify.exe’
– ‘\AppData\Roaming\Spotify\Spotify.exe’ TargetObject|endswith:
‘SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Spotify’ Details|endswith: ‘Spotify.exe –autostart –minimized’
condition: selection_target and (selection_suspicious_paths_1 or (all of selection_suspicious_paths_user_* )) and not 1 of filter_main_* and not 1 of filter_optional_*
falsepositives:
– Software using weird folders for updates level: high
(Source: Surface Web)
IOCs:
Kindly refer to the IOCs section to exercise control of your security systems. (Source: Surface Web)
STRATEGIC RECOMMENDATIONS
MANAGEMENT RECOMMENDATIONS
TACTICAL RECOMMENDATIONS
Type: Information stealer| Objectives: Data Exfiltration | Target Technology: IOS |
Target Geography: Europe
CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malwares that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.
Active Malware of the week
This week, “Amos Stealer” is in focus.
Overview of Operation Amos Stealer Malware
The AMOS Stealer campaign targeting macOS devices distributes its malicious payload through a disk image file named Clearl_AI.dmg, which is presented as a legitimate software installer. When the disk image is opened, it contains an application bundle named Clearl AI.app along with several supporting folders and files typically found in macOS disk images. This structure is designed to resemble a normal macOS application package, thereby reducing suspicion from users during installation. By disguising the malware as a legitimate application, attackers rely on social engineering techniques to convince users to execute the malicious file.
Once the application is launched, the malware operates quietly in the background while interacting with legitimate macOS processes and services. It establishes encrypted network communication with external infrastructure and performs actions intended to evade security detection. During execution, the malware accesses various system configuration files and creates hidden files within user directories, which may assist in collecting system-related information and maintaining its activity on the infected machine. By trusted domains, encrypted connections, and masquerading techniques, the threat attempts to conceal its operations while enabling attackers to gather sensitive data from compromised macOS systems.
Attack Method
The attack begins with the distribution of a malicious macOS disk image named Clearl_AI.dmg, which is presented as a legitimate application installer. When the disk image is opened, it reveals an application bundle called Clearl_AI.app along with several supporting folders that are commonly found in standard macOS installation packages. This familiar structure helps the malicious package appear authentic and reduces the likelihood that a user will suspect any abnormal activity. Once the user runs the application, the embedded executable inside the bundle is launched and begins interacting with the macOS operating system.
After execution, the malware performs several background operations while blending into normal system activity. It initiates several processes that resemble legitimate macOS services and interacts with system components responsible for authentication, preferences, and background services. During this stage, the malware accesses multiple system configuration files and directories associated with protected cloud storage and system preferences. It also creates or modifies files within user-specific directories to store operational data and maintain its activity within the system environment.
In addition to these local activities, malware establishes outbound communication with remote servers using encrypted network connections. These communications allow the compromised system to exchange data with external infrastructure while reducing the visibility of the traffic. The use of encrypted channels and trusted-looking network interactions helps the malware conceal its command-and-control activity within normal internet traffic. By combining social engineering, masquerading techniques, and encrypted communications, the attackers can maintain covert access to the infected macOS system while continuing to collect information from the device.
The following are the TTPs based on the MITRE Attack Framework for Enterprise
| Tactic | Technique ID | Technique Name |
| Execution | T1204.002 | User Execution: Malicious File |
| Defense Evasion | T1027 | Obfuscated Files or Information |
| T1036.001 | Masquerading: Invalid Code Signature | |
| T1553.002 | Subvert Trust Controls: Code Signing | |
| Command and control | T1071 | Application Layer Protocol |
| T1573 | Encrypted Channel |
INSIGHTS
ETLM ASSESSMENT
From an ETLM perspective, AMOS Stealer suggests a future where macOS- targeted threats increasingly mimic legitimate system operations, making malicious activity harder to distinguish from normal processes. Techniques that replicate familiar installation workflows and exploit trusted system components are likely to evolve into more sophisticated social engineering strategies, making deceptive prompts appear fully consistent with standard user interactions. Concurrently, stealthy payloads and encrypted communication channels may be embedded more seamlessly within routine applications and cloud-integrated services. This combination of subtle user manipulation and covert control could allow malware to operate almost invisibly, complicating detection and response efforts. For organizations and employees, the long-term impact may be a gradual erosion of trust in standard macOS processes, as even routine system elements could be leveraged to conceal advanced cyber intrusions.
IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.
YARA Rules
rule AMOS_Stealer_Hashes
{
meta:
description = “Detection rule for AMOS Stealer macOS variant based solely on file hashes”
author = “CYFIRMA” date = “2026-03-10”
strings:
/* Malware Sample Hashes */
$hash_1 =
“7896a1429d7916e6c06fb160491d7a997ee56368dd11e074e33fd0682f1f7108”
$hash_2 =
“5efe3d6ff69002f2cf82683f2d866264d0836b9f02e8b52719ecbd6fecf72a62”
condition:
any of ($hash_*)
}
Strategic Recommendations
Management Recommendations
Tactical Recommendations
Key Intelligence Signals:
2. Threat Actor in Focus
China-Linked UAT-9244 Expands Telecom Intrusions Using New Malware Toolset
About the Threat Actor
The threat actor Salt Typhoon, active since at least 2020, is a highly sophisticated advanced persistent threat (APT) group believed to be operated by China’s Ministry of State Security (MSS). The group has been linked to high-profile cyber espionage campaigns, with a particular focus on U.S. intelligence agencies’ targets and the exfiltration of critical corporate IP. Salt Typhoon is observed carrying out campaigns in multiple nations globally and is widely regarded as a strategic asset aligned with China’s broader “100-Year Strategy” to expand its global influence and technological dominance.
Some of its tactics, techniques, and procedures (TTPs) overlap with those used by FamousSparrow, suggesting a possible connection. The group is also suspected to have links with the nation-state threat actor APT41 and is assessed to operate with significant resources and advanced cyber-espionage capabilities.
Details on Exploited Vulnerabilities
| CVE ID | Affected Products | CVSS Score | Exploit Links |
| CVE-2021-26855 | Microsoft Exchange Server | 9.8 | Link1, link2, link3, link4 |
| CVE-2026-22548 | BIG-IP Advanced WAF or ASM | 5.9 | – |
| CVE-2021-45461 | FreePBX Rest Phone Apps | 9.8 | – |
| CVE-2025-0944 | Tailoring Management System 1.0 | 9.8 | – |
| CVE-2025-12480 | Triofox | 9.1 | – |
TTPs based on MITRE ATT&CK Framework
| Tactic | ID | Technique |
| Reconnaissance | T1590.004 | Gather Victim Network Information: Network Topology |
| Resource Development | T1587.001 | Develop Capabilities: Malware |
| Resource Development | T1588.002 | Obtain Capabilities: Tool |
| Initial Access | T1190 | Exploit Public-Facing Application |
| Persistence | T1098.004 | Account Manipulation: SSH Authorized Keys |
| Persistence | T1136 | Create Account |
| Privilege Escalation | T1136 | Create Account |
| Defense Evasion | T1562.004 | Impair Defenses: Disable or Modify System Firewall |
| Defense Evasion | T1070.002 | Indicator Removal: Clear Linux or Mac System Logs |
| Credential Access | T1110.002 | Brute Force: Password Cracking |
| Credential Access | T1040 | Network Sniffing |
| Discovery | T1040 | Network Sniffing |
| Lateral Movement | T1021.004 | Remote Services: SSH |
| Collection | T1602.002 | Data from Configuration Repository: Network Device Configuration Dump |
| Command and Control | T1572 | Protocol Tunneling |
| Exfiltration | T1048.003 | Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol |
Latest Developments Observed
Recent analysis revealed that UAT-9244 deployed multiple malware implants, including the TernDoor backdoor, the PeerTime peer-to-peer backdoor, and the BruteEntry brute-force scanning tool during its operations. The campaign targeted telecommunications providers and related infrastructure across South America, impacting Windows, Linux, and network edge devices. The activity likely aims to establish persistent access within telecom networks to facilitate long-term intelligence gathering and cyber-espionage operations.
ETLM Insights
UAT-9244, suspected to be an affiliate of Salt Typhoon, is assessed as a state-aligned cyber espionage threat actor primarily focused on long-term intelligence collection and sustained access to sensitive networks rather than financially driven cybercrime. The group’s activities suggest a strategic emphasis on compromising telecommunications infrastructure, government entities, and organizations that possess critical strategic or technological information. Operationally, the threat actor emphasizes stealth and persistence, frequently exploiting publicly exposed vulnerabilities to gain initial access before employing backdoors and credential- based techniques to facilitate lateral movement within compromised environments. Its tradecraft, including the use of covert access mechanisms, carefully managed infrastructure, and credential abuse, reflects a deliberate strategy to maintain a low-profile presence within victim networks for extended intelligence gathering. Based on observed targeting patterns and operational behavior, the actor is expected to continue expanding espionage campaigns against telecommunications providers, government networks, and other strategic sectors worldwide while further refining persistence and access techniques. Consequently, Salt Typhoon and its affiliates remain a persistent threat to critical infrastructure and government-linked organizations, posing ongoing risks to sensitive communications, strategic intelligence, and proprietary technological data.
IOCs:
Kindly refer to the IOCs section to exercise control of your security systems. (Source: Surface Web)
YARA Rules
rule Suspicious_Backdoor_Related_IOCs
{
meta:
description = “Detects malware artifacts related to suspicious infrastructure and scripts”
author = “CYFIRMA” date = “2026-03-10”
reference = “IOC-based detection rule”
hash_reference = “exa4e835aa0635685e39e7dd112bc5f1b937bbad1b95c7a4fe9c53fcb31da54c79”
strings:
/* Domains */
$domain1 = “updata.mgil01.workers.dev” ascii nocase
$domain2 = “service.oneipsoft.com” ascii nocase
$domain3 = “myoffice.techralsolution.com” ascii nocase
$domain4 = “afddd9d14453d4f9-1e185df7e4-ap-southeast-mnl.timcorpnet.com” ascii nocase
$domain5 = “back-trust-aurora.cluster-ctrjumtpbmf.mnl-east-2.timcorpnet.com” ascii nocase
/* Suspicious script/file indicators */
$file1 = “ps1u_ex200822.ps1” ascii nocase
$file2 = “u_ex200822.ps1” ascii nocase
$file3 = “win32.exe” ascii nocase
$file4 = “win32.dll” ascii nocase
/* Hash indicator (if embedded in scripts/logs) */
$hash1 = “exa4e835aa0635685e39e7dd112bc5f1b937bbad1b95c7a4fe9c53fcb31da54c79” ascii nocase
/* IP indicators */
$ip1 = “13.89.97.154” ascii
$ip2 = “114.119.158.36” ascii
$ip3 = “34.234.200.207” ascii
$ip4 = “54.225.199.17” ascii
$ip5 = “23.23.103.31” ascii
condition:
3 of ($domain*) or 2 of ($file*) or
any of ($ip*) or
$hash1
}
Strategic Recommendations
Management Recommendations
Tactical Recommendations
GPS jamming in the Strait of Hormuz, Iranian hacktivists harass the region
Researchers report that GPS jamming has disrupted navigation for more than 1100 ships in the Strait of Hormuz since the first military strikes against Iran by the end of February. Maritime analysts note that interference with GPS and Automatic Identification System (AIS) signals has caused vessels to appear in incorrect locations on navigation maps, including on land, at airports, and even within sensitive facilities. While GPS interference has long occurred in the region, analysts are now tracking over twenty new AIS jamming clusters across waters near the UAE, Qatar, Oman, and Iran. Shipping traffic through the Strait of Hormuz has slowed as a result, with some Western- affiliated tankers reportedly disabling their tracking signals or reversing course.
Separately, cloud service providers have reported that Iranian drone strikes damaged several data center facilities in the United Arab Emirates and Bahrain, leading to widespread disruptions of cloud services. According to company statements, the strikes caused structural damage, disrupted power supply systems, and triggered fire- suppression systems that led to additional water damage. Operators say they are working with local authorities to restore services while prioritizing staff safety.
Meanwhile, analysts monitoring cyber activity have observed increased pro-Iranian hacktivist operations following the start of the hostilities. The activity has been dominated by a small number of groups responsible for the majority of attacks in the first days of the conflict. Distributed denial-of-service (DDoS) attacks have targeted telecommunications providers and technology organizations in Israel, as well as government entities and infrastructure-related websites in Saudi Arabia, Qatar, Bahrain, and the United Arab Emirates.
ETLM Assessment:
Iran is likely conducting GPS jamming, cyber activity, and drone strikes as part of a broader retaliatory and deterrence strategy following military strikes against it and escalating regional tensions. By disrupting navigation systems in the Strait of Hormuz – a chokepoint through which about 20% of global oil passes – Iran can signal that it has the capability to threaten global trade and energy flows without immediately launching a full military blockade. These electronic warfare actions also fit Iran’s long- standing anti-access/area-denial strategy, which relies on asymmetric tools such as electronic interference, drones, mines, and small naval forces to complicate operations by stronger adversaries and raise the risks for commercial and military traffic in the region. At the same time, cyber and hacktivist operations help Tehran exert pressure on its adversaries.
Israel bombs Iran’s cyber warfare HQ, Iranian hackers target the USA
The Israeli military says it struck a facility in eastern Tehran that it identified as a key center for Iran’s cyber warfare activities. According to the Israeli military, the compound served as a cyber and electronic operations hub linked to the Islamic Revolutionary Guard Corps.
The extent to which the strike will affect Iran’s cyber capabilities remains uncertain. Iranian cyber operations often rely on affiliated groups and loosely connected actors to conduct attacks on the government’s behalf, which may allow activity to continue despite damage to centralized infrastructure. Some analysts believe the strike could significantly disrupt Iran’s ability to coordinate cyber operations in the near term, though ideologically aligned groups and other partners may still attempt cyber activities targeting Israel or its allies.
Meanwhile, according to the latest research, the Iranian state-sponsored threat actor MuddyWater (also known as “Seedworm” or “Static Kitten”) compromised several US entities in early February 2026, including a bank, an airport, US and Canadian non- profits, and the Israeli operations of a US software company. The threat actor is using a new backdoor dubbed “Dindoor” and a Python backdoor called “Fakeset.”
ETLM Assessment:
The activity continued after U.S. and Israeli military strikes against Iran that began on February 28. It remains unclear whether the conflict has disrupted the operations of the threat group, but its previously established access to networks in the United States and Israel places it in a potentially advantageous position to launch further cyber operations.
Qilin Ransomware Impacts Golden Clay Industries Sdn Bhd
Summary:
CYFIRMA observed in an underground forum that a company from Malaysia, Golden Clay Industries Sdn Bhd (www[.]gci[.]com[.]my), was compromised by Qilin Ransomware. Golden Clay Industries Sdn Bhd (GCI) is a Malaysian manufacturing company specializing in clay roofing tiles and building materials used in residential and commercial construction projects. The company is recognized as one of Malaysia’s leading producers of high-quality clay roof tiles and roofing systems. The compromised data includes confidential and sensitive information belonging to the organization.

Source: Dark Web
Relevancy & Insights:


ETLM Assessment:
According to CYFIRMA’s assessment, Qilin ransomware poses a significant threat to organizations of all sizes. Its evolving tactics, including double extortion (data encryption and leak threats), cross-platform capabilities (Windows and Linux, including VMware ESXi), and a focus on speed and evasion, make it a particularly dangerous actor.
The Gentlemen Ransomware Impacts Reanthong Partcenter
Summary:
CYFIRMA observed in an underground forum that a company from Thailand, Reanthong Partcenter (www[.]rtvalve[.]com), was compromised by the Gentlemen Ransomware. Sando Tech specialises in the development, design, manufacturing, and sales of machinery. The company offers a range of products, including testing machines, repair services, and consumable parts orders. The data, which has been breached, has not yet appeared on the leak site, indicating that negotiations between the affected party and the ransomware group may be underway. The compromised data includes confidential and sensitive information belonging to the organization.

Source: Dark Web
Relevancy & Insights:


ETLM Assessment:
According to CYFIRMA’s assessment, the Gentlemen Ransomware is a highly adaptive and globally active threat that leverages dual-extortion tactics, combining data theft with file encryption. The group employs advanced evasion and persistence techniques, supports cross-platform and scalable ransomware deployment, and conducts targeted attacks across multiple industries and geographic regions. This combination of capabilities makes it a significant risk to enterprise cybersecurity defenses, particularly for organizations with limited detection and incident-response maturity.
Vulnerability in Page and Post Clone Plugin for WordPress
Summary:
The vulnerability allows a remote attacker to execute arbitrary SQL queries in the database.
Relevancy & Insights:
The vulnerability exists due to insufficient sanitization of user- supplied data in the “meta_key” parameter in the content_clone() function.
Impact:
A remote user can send a specially crafted request to the affected application and execute arbitrary SQL commands within the application database.
Successful exploitation of this vulnerability may allow a remote attacker to read, delete, or modify data in the database and gain complete control over the affected application.
Affected Products:
https[:]//www[.]wordfence[.]com/threat-intel/vulnerabilities/wordpress- plugins/page-or-post-clone/page-and-post-clone-63-authenticated- contributor-sql-injection-via-meta-key-parameter
Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.
TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerability in the Page and Post Clone plugin for WordPress introduces potential risks to websites and web applications that rely on this plugin for content duplication and management. As WordPress powers a significant portion of websites globally, vulnerabilities within its plugin ecosystem can impact various industries, including e-commerce platforms, enterprise portals, government websites, and digital service providers. Ensuring the security of WordPress plugins is crucial for maintaining the integrity of web application databases, protecting sensitive information, and preventing unauthorized data manipulation. Addressing this vulnerability is therefore essential to safeguarding website functionality, maintaining trust in content management systems, and ensuring secure web application operations across different geographic regions and sectors.
DragonForce Ransomware attacked and published the data of AHMED MUBARAK DEBT COLLECTION
Summary:
Recently, we observed that DragonForce Ransomware attacked and published the data of AHMED MUBARAK DEBT COLLECTION (https[:]//www[.]amdc[.]ae/) on its dark web website. Ahmed Mubarak Debt Collection (AMDC) is a professional debt collection and recovery service provider headquartered in Sharjah, UAE. The company focuses on recovering consumer and corporate debts for organizations while maintaining business relationships between creditors and debtors. The screenshot displays a data leak listing attributed to the DragonForce ransomware group. Based on the visible folder structure and file names, the compromised data appears to include internal system directories, bank-related client information, and user document records. Several directories are labeled with the names of financial institutions such as CBI Bank, Dubai Islamic Bank (DIB), Dubai First Bank, First Abu Dhabi Bank (FAB), Hilal Bank, RAK Bank, and SIB, indicating that the leaked data may contain client case files, debt recovery records, or financial collection information associated with these banking entities.
The presence of system folders such as $RECYCLE.BIN and UsersFolder suggests potential exposure of internal workstation or server data. In addition, multiple files titled “Residency.pdf” with unique numerical identifiers are visible, which likely represent customer residency or identification documents, potentially containing personally identifiable information (PII) used for identity verification during debt collection processes. Overall, the exposed dataset appears to consist of sensitive personal documents, financial case records, and internal operational data related to AMDC’s debt collection activities and its associated banking clients. The total volume of compromised data is estimated to be approximately 107.64 GB.

Source: Dark Web
Relevancy & Insights:
ETLM Assessment:
According to CYFIRMA’s assessment, DragonForce represents a significant threat in the ransomware landscape due to its advanced operational methods and extensive use of modified ransomware tools. As it continues to target high-profile organizations globally, ongoing vigilance and proactive cybersecurity strategies will be essential for mitigating risks associated with this formidable threat actor. Organizations should remain alert to the evolving tactics employed by groups like DragonForce to protect their sensitive data and maintain operational integrity.
Shiraume Hospital Patient Data Advertised on a Leak Site
Summary: CYFIRMA’s research team has identified a post on a well-known underground hacking forum published by a threat actor using the alias “NetRunnerPR.” In the post, the actor claims responsibility for a data breach involving Shiraume Hospital, alleging that they successfully gained unauthorized access to the hospital’s network and extracted sensitive patient information.
According to the post, the threat actor claims to have exfiltrated patient PII and medical records from the hospital’s internal systems. The actor also indicated that a full database release has been made available, while earlier messages referenced an initial announcement followed by the eventual release of the complete dataset.
The post includes a large block of database fields and sample records, suggesting that the allegedly stolen data originated from a structured healthcare database. The dataset appears to contain multiple patient-related attributes and medical information fields.
Based on the sample data displayed in the forum post, the allegedly compromised dataset appears to include a wide range of patient information fields, such as:
At the time of analysis, the authenticity of the breach claim remains unverified. The available information originates solely from the threat actor’s forum post, and there has been no official confirmation from the affected organization or relevant authorities.

Source: Underground Forums
John Hay Management Corporation Data Advertised on a Leak Site
Summary: CYFIRMA’s research team identified a post on a well-known underground hacking forum published by a threat actor operating under the alias “F3TA.” In the post, the actor claims responsibility for a data breach involving John Hay Management Corporation (JHMC), a Philippine government-owned company responsible for managing and overseeing the John Hay Special Economic Zone in Baguio City, Philippines.
According to the forum post, the threat actor alleges that they obtained unauthorized access to the organization’s database and extracted an SQL database dump containing employee-related information. The post advertises the availability of the compromised dataset to other forum members.
Within the post, the actor shared details regarding the size of the leaked SQL database file, reported to be approximately 113.55 MB, along with trimmed sample data intended to demonstrate the authenticity of the compromised dataset.
The shared screenshot displays a structured table containing employee-related data fields, suggesting that the dataset originated from an internal employee management or identity database.
Based on the sample data included in the forum post, the allegedly compromised database may contain the following information:
The sample records displayed in the post appear to include multiple employee entries along with associated identifiers and login-related information, indicating potential exposure of organizational staff records.
At the time of analysis, the authenticity of the breach claim remains unverified. The available information originates solely from the threat actor’s forum post, and there has been no official confirmation from John Hay Management Corporation or relevant authorities regarding the alleged compromise.

Source: Underground Forums
Relevancy & Insights:
Financially motivated cybercriminals are continuously looking for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to gain access and steal valuable data. Subsequently, the stolen data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.
ETLM Assessment:
The threat actor known by the alias “NetRunnerPR” is assessed to be a recently emerged but highly active and capable entity, primarily engaged in data-leak operations. The group’s activity highlights the persistent and fast-evolving cyber threat landscape, driven by underground criminal ecosystems. This development underscores the urgent need for organizations to reinforce their cybersecurity posture through continuous monitoring, improved threat intelligence capabilities, and proactive defensive strategies to protect sensitive information and critical infrastructure.
Recommendations: Enhance the cybersecurity posture by:
CYFIRMA’s research team identified a post on a well-known underground hacking forum in which a threat actor operating under the alias “Spirigatito” claimed responsibility for a large-scale data breach involving Infutor, a consumer identity management and resolution company
In the post, the threat actor alleges that they successfully compromised Infutor’s systems and obtained a massive dataset containing hundreds of millions of records. The post advertises the availability of the leaked data and includes a brief description of the type of information allegedly compromised.
Infutor is a data and identity resolution company that provides consumer identity intelligence, data enrichment, and verification solutions. The organization helps businesses identify, verify, and understand customers in real time by leveraging large consumer data sets. Infutor operates a global data analytics and risk assessment company serving multiple industries, including insurance, financial services, and marketing.
According to the forum post, the allegedly compromised dataset may include highly sensitive personally identifiable information (PII). The threat actor claims the data contains the following fields:
The actor claims the dataset includes approximately 676,798,866 records, allegedly corresponding to hundreds of millions of U.S. citizens, with multiple entries per individual. The post also suggests that the dataset may include records associated with deceased individuals.
The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums
STRATEGIC RECOMMENDATIONS
MANAGEMENT RECOMMENDATIONS
TACTICAL RECOMMENDATIONS
Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.





For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.