Weekly Intelligence Report – 16 January 2026

Published On : 2026-01-15
Share :
Weekly Intelligence Report – 16 January 2026

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware
Target Technologies: Windows OS
Target Geography: North America, Europe, Asia-Pacific
Target Industry: BFSI, professional services, manufacturing, healthcare,

Introduction:
CYFIRMA Research and Advisory Team has found Karma (MedusaLocker) ransomware while monitoring various underground forums as part of our Threat Discovery Process.

Karma (MedusaLocker) ransomware
Researchers have discovered a new ransomware strain called Karma (MedusaLocker) ransomware. Karma (MedusaLocker) ransomware is a financially motivated, enterprise- focused ransomware variant belonging to the MedusaLocker family that encrypts victim files using a hybrid RSA and AES cryptographic scheme and appends the “.KARMA” extension to affected data. After gaining access, typically through phishing, malicious attachments, or compromised network entry points, it conducts network-wide file encryption, changes the desktop wallpaper, and drops a ransom note (“HOW_TO_RECOVER_DATA.html”) claiming both data encryption and data exfiltration. The attackers threaten to leak or sell stolen sensitive information if payment is not made, offering limited free decryption as proof and increasing ransom demands after a fixed deadline. The operation is designed to pressure organizations into negotiated ransom payments, with no publicly available decryption tool and no guarantee of data recovery even if the ransom is paid.

Screenshot: File encrypted by ransomware (Source: Surface Web)

CYFIRMA’s assessment identifies Karma as a ransomware variant associated with the MedusaLocker family that encrypts victim files and appends the “.KARMA” extension to affected data, after which it deploys an HTML-based ransom note titled “HOW_TO_RECOVER_DATA.html” and modifies the desktop wallpaper to reinforce extortion messaging. The ransom note asserts that the victim’s corporate network has been penetrated and claims that files were encrypted using a hybrid RSA and AES cryptographic scheme, while explicitly warning victims not to rename encrypted files or attempt recovery using third-party tools, stating that such actions could result in permanent data corruption. The note further alleges that highly sensitive and confidential data has been exfiltrated and stored on a private server, threatening public disclosure or resale of the information in the event of non-payment, while claiming the data will be destroyed upon successful ransom payment. To intensify pressure, the operators impose a 72-hour deadline, after which the ransom amount is stated to increase, and they offer free decryption of 2–3 non-essential files as proof of their ability to restore access to encrypted data.

Screenshot: The appearance of Karma (MedusaLocker) ransomware‘s ransom note “HOW_TO_RECOVER_DATA.html “) (Source: Surface Web)

The following are the TTPs based on the MITRE Attack Framework

Tactic Technique
ID
Technique Name
Execution T1059 Command and Scripting Interpreter
Execution T1129 Shared Modules
Persistence T1112 Modify Registry
Persistence T1542 Pre-OS Boot
Persistence T1542.003 Pre-OS Boot: Bootkit
Persistence T1547 Boot or Logon Autostart Execution
Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys /
Startup Folder
Privilege Escalation T1134.004 Access Token Manipulation: Parent PID Spoofing
Privilege Escalation T1547 Boot or Logon Autostart Execution
Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys /
Startup Folder
Defense Evasion T1014 Rootkit
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1027.002 Obfuscated Files or Information: Software Packing
Defense Evasion T1027.005 Obfuscated Files or Information: Indicator Removal from
Tools
Defense Evasion T1070 Indicator Removal
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1112 Modify Registry
Defense Evasion T1134.004 Access Token Manipulation: Parent PID Spoofing
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1222 File and Directory Permissions Modification
Defense Evasion T1497 Virtualization/Sandbox Evasion
Defense Evasion T1497.001 Virtualization/Sandbox Evasion: System Checks
Defense Evasion T1542 Pre-OS Boot
Defense Evasion T1542.003 Pre-OS Boot: Bootkit
Defense Evasion T1564 Hide Artifacts
Defense Evasion T1564.003 Hide Artifacts: Hidden Window
Credential Access T1056 Input Capture
Credential Access T1056.001 Input Capture: Keylogging
Discovery T1010 Application Window Discovery
Discovery T1012 Query Registry
Discovery T1016 System Network Configuration Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1497 Virtualization/Sandbox Evasion
Discovery T1497.001 Virtualization/Sandbox Evasion: System Checks
Discovery T1614 System Location Discovery
Collection T1056 Input Capture
Collection T1056.001 Input Capture: Keylogging
Collection T1074 Data Staged
Command and Control T1071 Application Layer Protocol
Command and Control T1090 Proxy
Command and Control T1105 Ingress Tool Transfer
Command and Control T1573 Encrypted Channel
Impact T1486 Data Encrypted for Impact
Impact T1490 Inhibit System Recovery

Relevancy and Insights:

  • The ransomware primarily targets Windows OS, which is utilised by enterprises in a variety of diligence.
  • Ransomware that performs fragment space checks demonstrates a position of resource optimization. By assessing the available fragment space on an infected system, the ransomware can ensure that it has enough room to cipher lines effectively.
  • Persistence: The ransomware exhibits continuity mechanisms to ensure its survival and ongoing vicious conditioning within the compromised terrain. This could involve creating autostart entries or modifying system settings to maintain a base and grease unborn attacks.

ETLM Assessment:
CYFIRMA’s assessment suggests that Karma (MedusaLocker) ransomware is likely to continue evolving as a data-extortion–centric ransomware operation, maintaining and potentially refining its dual-pressure model that combines file encryption with credible data-leak threats. The consistent use of hybrid cryptography, anonymized communication channels, proof-of-decryption offers, and strict time-bound ransom escalation indicates a mature and repeatable extortion framework designed to maximize victim compliance. Going forward, these operational characteristics position the group to sustain activity across enterprise environments, particularly where incident response maturity and backup hygiene are weak. The continued absence of a publicly available decryptor and reliance on backup-based recovery further enhance the group’s leverage, suggesting that Karma (MedusaLocker) will remain an effective and persistent threat within the broader ransomware ecosystem, with potential expansion in victim scale and extortion pressure rather than a shift in core tactics.

Sigma rule:
title: New RUN Key Pointing to Suspicious Folder detection:
selection_target: TargetObject|contains:
– ‘\Software\Microsoft\Windows\CurrentVersion\Run’
– ‘\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Run’
– ‘\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run’ selection_suspicious_paths_1:
Details|contains:
– ‘:\Perflogs’
– :\ProgramData’
– ‘:\Windows\Temp’
– ‘:\Temp’
– ‘\AppData\Local\Temp’
– ‘\AppData\Roaming’
– ‘:\$Recycle.bin’
– ‘:\Users\Default’
– ‘:\Users\public’
– ‘%temp%’
– ‘%tmp%’
– ‘%Public%’
– ‘%AppData%’ selection_suspicious_paths_user_1:
Details|contains: ‘:\Users\’ selection_suspicious_paths_user_2:
Details|contains:
– ‘\Favorites’
– ‘\Favourites’
– ‘\Contacts’
– ‘\Music’
– ‘\Pictures’
– ‘\Documents’
– ‘\Photos’ filter_main_windows_update:
TargetObject|contains: ‘\Microsoft\Windows\CurrentVersion\RunOnce\’ Image|startswith: ‘C:\Windows\SoftwareDistribution\Download\’ Details|contains|all:
– ‘rundll32.exe ‘
– ‘C:\WINDOWS\system32\advpack.dll,DelNodeRunDLL32’ Details|contains:
– ‘\AppData\Local\Temp\’
– ‘C:\Windows\Temp\’ filter_optional_spotify:
Image|endswith:
– ‘C:\Program Files\Spotify\Spotify.exe’
– ‘C:\Program Files (x86)\Spotify\Spotify.exe’
– ‘\AppData\Roaming\Spotify\Spotify.exe’ TargetObject|endswith:
‘SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Spotify’ Details|endswith: ‘Spotify.exe –autostart –minimized’
condition: selection_target and (selection_suspicious_paths_1 or (all of selection_suspicious_paths_user_* )) and not 1 of filter_main_* and not 1 of filter_optional_*
falsepositives:
– Software using weird folders for updates level: high

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.

STRATEGIC RECOMMENDATIONS

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained, which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATIONS

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Implement a zero-trust security model alongside multifactor authentication (MFA) to reduce the risk of credential compromise.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATIONS

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring, which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Establish and implement protective controls by actively monitoring and blocking identified indicators of compromise (IoCs) and reinforcing defensive measures based on the provided tactical intelligence.

Trending Malware of the Week

Type: Astaroth
Objectives: Messaging on WhatsApp
Target Technology: Android/
Windows OS
Target Geography: Brazil.

CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malwares that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week, “Astaroth” is trending.

Overview of Operation Astaroth
Astaroth, a well-established Brazilian banking malware, has re-emerged in a recently identified campaign that introduces a significant change in its distribution approach. The threat actors have adopted WhatsApp Web as a propagation channel, reaffirming the malware’s strong focus on Brazilian users using widely trusted communication platforms and region-specific social engineering techniques.

In this campaign, victims are lured into opening malicious files delivered via WhatsApp messages. Once executed, the malware leverages the compromised WhatsApp environment to disseminate additional malicious files to the victim’s contacts, enabling rapid and self-sustaining spread while minimizing reliance on conventional phishing methods.

In parallel with its propagation activity, the malware conducts financially motivated operations by targeting users during online banking sessions. This dual capability highlights Astaroth’s continued evolution, combining efficient distribution mechanisms with persistent banking fraud objectives within a geographically focused threat landscape.

Attack Method
The campaign employs a multi-stage infection chain initiated by a heavily obfuscated Visual Basic Script embedded within a compressed archive distributed via WhatsApp. This downloader functions as the primary execution trigger, resolving obfuscation at runtime before retrieving multiple secondary components from remote infrastructure. Upon execution, it deploys both the core banking malware and an auxiliary propagation module, ensuring that credential theft and lateral spread capabilities are established early in the compromise lifecycle.

A distinctive feature of this operation is the integration of a Python-based propagation mechanism, deployed alongside a locally installed Python runtime. This module interfaces with the victim’s WhatsApp Web session to enumerate stored contacts and automate message delivery. The attacker-crafted logic generates context-aware messages that closely resemble legitimate user interactions, dynamically adjusting greetings based on local time to improve engagement and attachment execution rates.

Beyond propagation, the malware implements internal telemetry to monitor campaign effectiveness. The propagation module records delivery success rates, failure counts, and message throughput, periodically generating runtime statistics to track spread efficiency. In parallel, harvested contact data is transmitted to external command-and-control infrastructure, enabling attackers to maintain visibility into infection scale and refine targeting within the affected regional ecosystem.

The following are the TTPs based on the MITRE Attack Framework

Tactic (ID) Technique ID Technique Name
Initial Access T1204.002 User Execution: Malicious File
Execution T1059.005 Command and Scripting Interpreter: Visual Basic
Execution T1059.006 Command and Scripting Interpreter: Python
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Persistence T1543 Create or Modify System Process
Credential Access T1555 Credentials from Password Stores
Discovery T1082 System Information Discovery
Collection T1005 Data from Local System
Command and control T1071.001 Application Layer Protocol: Web Protocols
Exfiltration T1041 Exfiltration Over C2 Channel

INSIGHTS

  • Abuse of Trusted Social Communication Channels: The campaign highlights how widely adopted personal messaging platforms can be repurposed as effective delivery mechanisms for malicious activity. By operating within a space associated with everyday interpersonal communication, the activity benefits from implicit trust, reducing user skepticism and allowing malicious content to circulate in a manner that closely resembles normal social behaviour.
  • Social Familiarity as a Force Multiplier: The use of informal language, culturally aligned messaging, and conversational timing underscores how attackers increasingly rely on behavioural authenticity rather than technical sophistication alone. This approach demonstrates how closely mimicking routine human interaction can significantly amplify reach and engagement without drawing immediate attention.
  • Regional Targeting Through Ecosystem Awareness: The activity reflects a deep understanding of local digital habits and communication norms within a specific geographic region. By aligning delivery methods, language, and interaction patterns with regional user behaviour, the campaign embeds itself more naturally into the local ecosystem, reinforcing its effectiveness without requiring broad, indiscriminate targeting.

ETLM ASSESSMENT
From an ETLM perspective, this activity signals a future environment in which trusted communication platforms increasingly serve as indirect conduits for threat exposure rather than overt attack surfaces. As employees rely more heavily on consumer messaging tools for routine coordination, organizations may experience heightened residual risk originating outside formal enterprise controls. Over time, this dynamic is likely to blur the separation between personal and professional digital spaces, expanding the scope of organizational risk while increasing the potential for employee-driven propagation, reputational impact, and operational disruption without clear indicators of compromise.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

YARA Rules
rule Astaroth_WhatsApp_Campaign_StringBased
{
meta:
description = “Detects Astaroth campaign artifacts using SHA256 hashes treated as strings and known domains”
campaign = “WhatsApp-based propagation”

strings:
/* Astaroth MSI Installer Hashes */
$h1 = “098630efe3374ca9ec4dc5dd358554e69cb4734a0aa456d7e850f873408a3553”
$h2 = “073d3c77c86b627a742601b28e2a88d1a3ae54e255f0f69d7a1fb05cc1a8b1e4”
$h3 = “bb0f0be3a690b61297984fc01befb8417f72e74b7026c69ef262d82956df471e”

/* WhatsApp Spreader (Python) Hashes */
$h4 = “c185a36317300a67dc998629da41b1db2946ff35dba314db1a580c8a25c83ea4”
$h5 = “5d929876190a0bab69aea3f87988b9d73713960969b193386ff50c1b5ffeadd6”
$h6 = “9081b50af5430c1bf5e84049709840c40fc5fdd4bb3e21eca433739c26018b2e”
$h7 = “3b9397493d76998d7c34cb6ae23e3243c75011514b1391d1c303529326cde6d5”
$h8 = “1e101fbc3f679d9d6bef887e1fc75f5810cf414f17e8ad553dc653eb052e1761”
$h9 = “01d1ca91d1fec05528c4e3902cc9468ba44fc3f9b0a4538080455d7b5407adcd”
$h10 = “025dccd4701275d99ab78d7c7fbd31042abbed9d44109b31e3fd29b32642e202”
$h11 = “19ff02105bbe1f7cede7c92ade9cb264339a454ca5de14b53942fa8fbe429464”
$h12 = “1fc9dc27a7a6da52b64592e3ef6f8135ef986fc829d647ee9c12f7cea8e84645”
$h13 = “3bd6a6b24b41ba7f58938e6eb48345119bbaf38cd89123906869fab179f27433”
$h14 = “4a6db7ffbc67c307bc36c4ade4fd244802cc9d6a9d335d98657f9663ebab900f”
$h15 = “4b20b8a87a0cceac3173f2adbf186c2670f43ce68a57372a10ae8876bb230832”
$h16 = “4bc87764729cbc82701e0ed0276cdb43f0864bfaf86a2a2f0dc799ec0d55ef37”
$h17 = “6168d63fad22a4e5e45547ca6116ef68bb5173e17e25fd1714f7cc1e4f7b41e1”
$h18 = “7c54d4ef6e4fe1c5446414eb209843c082eab8188cf7bdc14d9955bdd2b5496d”
$h19 = “a48ce2407164c5c0312623c1cde73f9f5518b620b79f24e7285d8744936afb84”
$h20 = “f262434276f3fa09915479277f696585d0b0e4e72e72cbc924c658d7bb07a3ff”

/* Contacted Domains */
$d1 = “centrogauchodabahia123.com”
$d2 = “coffe-estilo.com”
$d3 = “empautlipa.com”
$d4 = “miportuarios.com”
$d5 = “varegjopeaks.com”

condition:
any of ($h*) or any of ($d*)
}

Recommendations:

STRATEGIC RECOMMENDATIONS

  • Trust Boundary Reassessment: Reevaluate organizational trust models to account for increasing abuse of consumer communication platforms and personal digital channels that operate outside traditional enterprise controls.
  • Enterprise–Consumer Ecosystem Risk Alignment: Integrate risks originating from employee use of external messaging and file-sharing platforms into enterprise risk frameworks to better reflect evolving exposure paths.
  • Threat Intelligence Contextualization: Emphasize contextual intelligence that links social engineering trends, regional targeting patterns, and platform misuse to support informed security planning and prioritization.
  • Cross-Domain Visibility Strategy: Strengthen visibility across endpoint, identity, and user interaction layers to better understand how non-enterprise services intersect with corporate environments.

MANAGEMENT RECOMMENDATIONS

  • Policy Enforcement on External Messaging Use: Define and enforce clear policies governing the use of personal and third-party messaging platforms for work-related activities to limit indirect exposure.
  • Employee Risk Ownership Awareness: Promote awareness that employee digital behaviour can introduce organizational risk even when activity occurs outside managed infrastructure.
  • Detection Capability Maturity: Ensure security teams are equipped with tools capable of identifying indirect infection paths, including file-based delivery and trusted-platform abuse.
  • Response Coordination Readiness: Align internal response procedures with external service providers to support faster containment when incidents originate beyond direct organizational control.

TACTICAL RECOMMENDATIONS

  • File Execution Monitoring: Monitor for unusual execution of script-based installers and compressed file contents originating from non-enterprise messaging sources.
  • Process and Runtime Visibility: Track abnormal process spawning and interpreter usage that may indicate unauthorized runtime deployment or misuse of scripting environments.
  • Network Destination Review: Regularly review outbound connections to detect access to unrecognized or newly registered domains associated with malicious activity.
  • Endpoint Hygiene Checks: Perform periodic endpoint hygiene assessments to identify unauthorized components, residual artifacts, or abnormal user-space activity that may indicate compromise.

CYFIRMA’S WEEKLY INSIGHTS

1. Weekly Attack Types and Trends

  • Key Intelligence Signals:
  • Attack Type: Ransomware Attacks, Malware Implant, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Qilin Ransomware, Everest Ransomware| Malware – Astaroth
  • Qilin Ransomware – One of the ransomware groups.
  • Everest Ransomware – One of the ransomware groups.
    Please refer to the trending malware advisory for details on the following:
  • Malware – Astaroth
    Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed

2. Threat Actor in Focus

Fancy Bear (APT28) Phishing Campaign Exploiting Enterprise Authentication Portals

  • Threat Actor: Blue Delta aka Fancy Bear/APT28
  • Attack Type: Connection Proxy, Credential Dumping, Footprint deletion, Malware Implant, Social Engineering Attack, Timestomping, Exploitation of Vulnerability
  • Objective: Information theft, Espionage, Long-Term Persistence & Stealth
  • Suspected Target Technology: Microsoft Outlook, Office Suites Software, Operating System (Windows, Linux Kernel, Android), Web Application, Oracle Java SE, Adobe Flash Player, Apache Server
  • Suspected Target Geography: Afghanistan, Brazil, Cambodia, France, Georgia, Germany, India, Indonesia, Kazakhstan, Malaysia, Moldova, Pakistan, Romania, Russia, South Africa, Syria, Thailand, Turkey, Ukraine, United States, Vietnam, Australia, Mexico
  • Suspected Target Industries: Aerospace & Defense, Capital Goods, Critical Infrastructure, Crypto, Defense, Energy, Energy Equipment & Services, Government, Information Technology, Military, NGO, Telecommunications, Utilities, Banking & Investment Services
  • Business Impact: Compromised user accounts, Data Theft, Operational Disruption, Reputational Damage, Financial Loss

About the Threat Actor
FANCY BEAR is a well-documented Russian state-sponsored threat actor that has been active since at least 2007 and is widely assessed to operate in close coordination with Russian intelligence services. Security researchers have attributed multiple high-profile cyber operations to the group, including election interference activities in several countries, aimed at influencing political outcomes in favor of the Russian government.

Details on Exploited Vulnerabilities

CVE ID Affected Products CVSS Score Exploit Links
CVE-2023-38831 WinRAR 7.8 Link
CVE-2021-4034 pkexec application 7.8 Link 1, Link 2
CVE-2016-5195 Linux kernel 7.0 Link1, Link2, Link3, Link4, Link5, and Link6
CVE-2020-0688 Microsoft Exchange 8.8 Link 1 and Link 2
CVE-2015-2545 Microsoft Office 7.8

TTPs based on MITRE ATT&CK Framework

Tactic ID Technique
Reconnaissance T1591 Gather Victim Org Information
Reconnaissance T1598.003 Phishing for Information: Spearphishing Link
Reconnaissance T1598 Phishing for Information
Reconnaissance T1596 Search Open Technical Databases
Resource Development T1583.001 Acquire Infrastructure: Domains
Resource Development T1583.003 Acquire Infrastructure: Virtual Private Server
Resource Development T1583.006 Acquire Infrastructure: Web Services
Resource Development T1586.002 Compromise Accounts: Email Accounts
Resource Development T1584.008 Compromise Infrastructure: Network Devices
Resource Development T1588.002 Obtain Capabilities: Tool
Initial Access T1189 Drive-by Compromise
Initial Access T1190 Exploit Public-Facing Application
Initial Access T1133 External Remote Services
Initial Access T1091 Replication Through Removable Media
Initial Access T1199 Trusted Relationship
Initial Access T1078 Valid Accounts
Initial Access T1078.004 Valid Accounts: Cloud Accounts
Initial Access T1566.001 Phishing: Spearphishing Attachment
Execution T1204.001 User Execution: Malicious Link
Execution T1203 Exploitation for Client Execution
Execution T1559.002 Inter-Process Communication: Dynamic Data Exchange
Execution T1204.002 User Execution: Malicious File
Persistence T1098.002 Account Manipulation: Additional Email Delegate Permissions
Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Persistence T1037.001 Boot or Logon Initialization Scripts: Logon Script (Windows)
Persistence T1546.015 Event Triggered Execution: Component Object Model Hijacking
Persistence T1133 External Remote Services
Persistence T1137.002 Office Application Startup: Office Test
Persistence T1542.003 Pre-OS Boot: Bootkit
Persistence T1505.003 Server Software Component: Web Shell
Persistence T1078 Valid Accounts
Persistence T1078.004 Valid Accounts: Cloud Accounts
Privilege Escalation T1134.001 Access Token Manipulation: Token Impersonation/Theft
Privilege Escalation T1098.002 Account Manipulation: Additional Email Delegate Permissions
Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation T1037.001 Boot or Logon Initialization Scripts: Logon Script (Windows)
Privilege Escalation T1546.015 Event Triggered Execution: Component Object Model Hijacking
Privilege Escalation T1078.004 Valid Accounts: Cloud Accounts
Defense Evasion T1134.001 Access Token Manipulation: Token Impersonation/Theft
Defense Evasion T1564.001 Hide Artifacts: Hidden Files and Directories
Defense Evasion T1564.003 Hide Artifacts: Hidden Window
Defense Evasion T1070.001 Indicator Removal: Clear Windows Event Logs
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1070.006 Indicator Removal: Timestomp
Defense Evasion T1036 Masquerading
Defense Evasion T1036.005 Masquerading: Match Legitimate Resource Name or Location
Defense Evasion T1027.013 Obfuscated Files or Information: Encrypted/Encoded File
Defense Evasion T1542.003 Pre-OS Boot: Bootkit
Defense Evasion T1014 Rootkit
Defense Evasion T1218.011 System Binary Proxy Execution: Rundll32
Defense Evasion T1221 Template Injection
Defense Evasion T1550.001 Use Alternate Authentication Material: Application Access Token
Defense Evasion T1550.002 Use Alternate Authentication Material: Pass the Hash
Defense Evasion T1078.004 Valid Accounts: Cloud Accounts
Credential Access T1557.004 Adversary-in-the-Middle: Evil Twin
Credential Access T1110 Brute Force
Credential Access T1110.001 Brute Force: Password Guessing
Credential Access T1110.003 Brute Force: Password Spraying
Credential Access T1056.001 Input Capture: Keylogging
Credential Access T1040 Network Sniffing
Credential Access T1003 OS Credential Dumping
Credential Access T1003.001 OS Credential Dumping: LSASS Memory
Credential Access T1003.002 OS Credential Dumping: Security Account Manager
Credential Access T1003.003 OS Credential Dumping: NTDS
Credential Access T1528 Steal Application Access Token
Discovery T1083 File and Directory Discovery
Discovery T1040 Network Sniffing
Discovery T1120 Peripheral Device Discovery
Discovery T1057 Process Discovery
Lateral Movement T1210 Exploitation of Remote Services
Lateral Movement T1091 Replication Through Removable Media
Lateral Movement T1550.001 Use Alternate Authentication Material: Application Access Token
Lateral Movement T1550.002 Use Alternate Authentication Material: Pass the Hash
Collection T1557.004 Adversary-in-the-Middle: Evil Twin
Collection T1560 Archive Collected Data
Collection T1560.001 Archive Collected Data: Archive via Utility
Collection T1119 Automated Collection
Collection T1213 Data from Information Repositories
Collection T1213.002 Data from Information Repositories: Sharepoint
Collection T1005 Data from Local System
Collection T1039 Data from Network Shared Drive
Collection T1025 Data from Removable Media
Collection T1074.001 Data Staged: Local Data Staging
Collection T1074.002 Data Staged: Remote Data Staging
Collection T1114.002 Email Collection: Remote Email Collection
Collection T1056.001 Input Capture: Keylogging
Collection T1113 Screen Capture
Command and Control T1001.001 Data Obfuscation: Junk Data
Command and Control T1071.001 Application Layer Protocol: Web Protocols
Command and Control T1071.003 Application Layer Protocol: Mail Protocols
Command and Control T1092 Communication Through Removable Media
Command and Control T1573.001 Encrypted Channel: Symmetric Cryptography
Command and Control T1105 Ingress Tool Transfer
Command and Control T1090.001 Proxy: Internal Proxy
Command and Control T1090.002 Proxy: External Proxy
Command and Control T1090.003 Proxy: Multi-hop Proxy
Command and Control T1102.002 Web Service: Bidirectional Communication
Exfiltration T1030 Data Transfer Size Limits
Exfiltration T1048.002 Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Impact T1498 Network Denial of Service

Latest Developments Observed
The threat actor is assessed to be deploying new credential-harvesting campaigns leveraging spoofed Microsoft Outlook Web Access (OWA), Google, and Sophos VPN login portals. Targeting is believed to be primarily focused on Türkiye and broader European regions, with sustained interest in organizations linked to energy research, defense collaboration, and government communication networks. The observed activity suggests an intelligence-gathering objective, likely aligned with Russian state intelligence requirements.

ETLM Insights
APT28 is a highly capable, state-aligned cyber espionage actor assessed to operate in support of Russian military and intelligence objectives. Unlike financially motivated groups, APT28’s operations are mission-driven, disciplined, and tightly aligned to geopolitical priorities. Their campaigns consistently focus on intelligence collection, influence positioning, and operational readiness, rather than immediate disruption.

From an ETLM perspective, APT28 represents a persistent external pressure actor— one that adapts quickly to defensive changes, shifts infrastructure rapidly, and deliberately operates within the gray zone between espionage and influence operations.

Going forward the approach ETLM indicators suggest APT28 will:

  • Increase Identity-Based Operations
    • Greater use of cloud identity abuse
    • Focus on SSO, federation, and delegated access
    • Target organizations transitioning to cloud-first identity models
  • Expand Use of Trusted Service Surfaces
    • VPNs, remote access gateways, and collaboration platforms
    • Third-party IT providers supporting government entities
    • Email security bypass techniques, rather than malware delivery
  • Align Campaign Timing with Geopolitical Events
    • Elections, defense agreements, and sanctions activity
    • NATO coordination milestones
    • Energy security discussions
  • Maintain Influence Optionality
    • Retain stolen data for potential future disclosure
    • Enable narrative shaping rather than immediate leaks
    • Support broader information operations if required

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.

YARA Rules
rule FancyBear_IOCs_Match
{
meta:
author = “CYFIRMA”
description = “Detects IOC artifacts associated with Fancy Bear” date = “2026-01-13”
threat_actor = “FANCY BEAR / APT28” strings:
// CVEs as text (if present in code, comments, exploit kits, etc.)
$cve1 = “CVE-2017-11882”
$cve2 = “CVE-2021-4034”
$cve3 = “CVE-2016-5195”
$cve4 = “CVE-2020-0688”
$cve5 = “CVE-2023-32315”
$cve6 = “CVE-2021-44228”
$cve7 = “CVE-2018-13379”
$cve8 = “CVE-2023-23397”
$cve9 = “CVE-2020-1472”
$cve10 = “CVE-2023-38831”
$cve11 = “CVE-2018-8174”
$cve12 = “CVE-2020-2021”
$cve13 = “CVE-2020-5902”
$cve14 = “CVE-2014-4114”
$cve15 = “CVE-2020-15505”
$cve16 = “CVE-2019-19781”
$cve17 = “CVE-2022-30190”
$cve18 = “CVE-2022-38028”
$cve19 = “CVE-2024-21412”
$cve20 = “CVE-2022-21587”
$cve21 = “CVE-2021-1675”
$cve22 = “CVE-2020-1380”
$cve23 = “CVE-2023-27350”
$cve24 = “CVE-2012-0158”
$cve25 = “CVE-2009-3129”
$cve26 = “CVE-2021-22555”
$cve27 = “CVE-2023-36025”
$cve28 = “CVE-2023-27351”
$cve29 = “CVE-2023-27992”
$cve30 = “CVE-2015-2545”
$cve31 = “CVE-2023-32231”
$cve32 = “CVE-2019-11510”
$cve33 = “CVE-2014-1761”
// IPs
$ip1 = “208.91.197.27”
$ip2 = “127.0.0.1”
$ip3 = “198.49.23.177”
$ip4 = “50.7.210.226”
$ip5 = “185.220.101.143”
$ip6 = “142.250.31.102”
// Domains
$domain1 = “jinjinpig.co.kr”
$domain2 = “cloud-mail.ink”
$domain3 = “background-services.net”
$domain4 = “futuresfurnitures.com”
// Suspicious Files
$file1 = “win32 exe”
$file2 = “hrm3jvh9v.dll”
$file3 = “ruodjxk.exe” condition:
any of ($cve*) or any of ($ip*) or any of ($domain*) or any of ($file*)
}

Recommendations Strategic

  • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
  • Assess and deploy alternatives for an advanced endpoint protection solution that provides detection/prevention for malware and malicious activities that do not rely on signature-based detection methods.
  • Block exploit-like behaviour. Monitor endpoints memory to find behavioural patterns that are typically exploited, including unusual process handle requests. These patterns are features of most exploits, whether known or new. This will be able to provide effective protection against zero-day/critical exploits and more by identifying such patterns.

Management

  • Invest in user education and implement standard operating procedures for the handling of financial and sensitive data transactions commonly targeted by impersonation attacks. Reinforce this training with context-aware banners and in- line prompts to help educate users.
  • Develop a cyber threat remediation program and encourage employee training to detect anomalies proactively.

Tactical

  • For better protection coverage against email attacks (like spear phishing, business email compromise, or credential phishing attacks), organizations should augment built-in email security with layers that take a materially different approach to threat detection.
  • Protect accounts with multi-factor authentication. Exert caution when opening email attachments or clicking on embedded links supplied via email communications, SMS, or messaging.
  • Apply security measures to detect unauthorized activities, protect sensitive production, and process control systems from cyberattacks.
  • Add the YARA rule for threat detection and monitoring, which will help to detect anomalies in log events, identify, and monitor suspicious activities.

3. Major Geopolitical Developments in Cybersecurity

Chinese attacks on Taiwan’s energy infrastructure on the rise
According to a report from Taiwan’s National Security Bureau, cyberattacks originating from China against Taiwan’s energy sector surged by 900% in 2025 compared to the previous year. Many of these attacks took place during software update windows, when Chinese hackers exploited the upgrade process to inject malware into the systems. The malware was intended to provide continuous monitoring of Taiwan’s energy sector, including operational planning and mechanisms, material procurement processes, and the establishment of backup systems.

ETLM Assessment:
Taiwan is a hot spot for increased Sino-American rivalry. China wants to reunite with Taiwan because it sees it as a colony gone wild. These days, there is some degree of relationship between the two regions, and they also depend on each other economically. However, Beijing regularly threatens Taipei with heightened military drills in the Taiwan Strait in recent years. When Beijing feels that the “one China” principle has been violated, as it did in 2022 when Nancy Pelosi, the then-U.S. Speaker of the House of Representatives, became the first senior official to visit Taiwan in 25 years. The Chinese capital usually reacts with a show of force. Preparations for debilitating cyber-attacks in case of invasion are increasingly becoming part of the measures China regularly uses to intimidate Taiwan into submission.

Cambodia extradites alleged cybercriminal boss to China
Cambodia has extradited to China a billionaire businessman accused of leading a major fraud syndicate that operated forced-labor scam compounds in the country. The 38-year-old, Chen Zhi, is a Chinese national who acquired Cambodian citizenship in 2014, though his Cambodian citizenship has since been revoked. Last year, the US Justice Department indicted Chen and seized $15 billion worth of his bitcoin. His company, Prince Group, was also sanctioned by the US and the UK. The extradition appears to signal that Cambodia is starting to respond to international pressure, particularly from China, to tackle the country’s massive cyberscam industry. US authorities have alleged that Chen had connections to Chinese state officials, which may have prompted Beijing to push Cambodia to act. However, a wider crackdown on the Cambodian cyberscam sector remains unlikely, given that the industry has grown into a significant pillar of the national economy.

ETLM Assessment:
The situation in Cambodia shares notable parallels with recent raids on similar scam operations in Myanmar, though the scale and governmental responses differ significantly. In both countries, these cyberscam industries—often involving human trafficking, forced labor, and pig-butchering frauds—have flourished as economic mainstays in border regions, drawing international scrutiny from the US and China due to their ties to organized crime and state-linked figures.

However, while Cambodia’s action appears limited to high-profile extraditions like Chen’s, prompted by pressure from Beijing and Washington but unlikely to escalate into a broader crackdown given the sector’s economic importance, Myanmar’s military junta has pursued more aggressive, publicized raids throughout 2025. For instance, in November 2025, the junta raided scam hubs along the Thai border, arresting over 1,600 people in one operation alone and deporting thousands more, including many Chinese nationals, as part of a declared “zero tolerance” policy. By December, demolitions targeted notorious compounds like KK Park, freeing thousands of trapped workers amid calls for foreign governments to repatriate their citizens.

4. Rise in Malware/Ransomware and Phishing

Qilin Ransomware Impacts Sugawara Laboratories

  • Attack Type: Ransomware
  • Target Industry: Manufacturing
  • Target Geography: Japan
  • Ransomware: Qilin Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
CYFIRMA observed in an underground forum that a company from Japan, Sugawara Laboratories (https[:]//www[.]sugawara-labs[.]co[.]jp/), was compromised by Qilin Ransomware. Sugawara Laboratories Inc. is an industrial measuring equipment manufacturer based in Japan, producing and selling high- precision measurement systems and testing instruments such as stroboscopes, dynamometers, and vibration testers. The compromised data contains confidential and sensitive information belonging to the organization.

Source: Dark Web

Relevancy & Insights:

  • The Qilin Ransomware group operates a Ransomware-as-a-Service (RaaS) model, allowing affiliates to carry out attacks while Qilin provides infrastructure and malware tools.
  • The Qilin Ransomware group primarily targets countries such as the United States of America, Canada, South Korea, France, and the United Kingdom.
  • The Qilin Ransomware group primarily targets industries, including Manufacturing, Professional Goods & Services, Consumer Goods & Services, Healthcare, and Real Estate & Construction.
  • Based on the Qilin Ransomware victims list from 1st Jan 2025 to 13th Jan 2026, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Qilin Ransomware victims list from 1st Jan 2025 to 13th Jan 2026 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Qilin ransomware poses a significant threat to organizations of all sizes. Its evolving tactics, including double extortion (data encryption and leak threats), cross-platform capabilities (Windows and Linux, including VMware ESXi), and a focus on speed and evasion, make it a particularly dangerous actor.

Everest Ransomware Impacts Nissan Motor Corporation
Attack Type: Ransomware
Target Industry: Manufacturing
Target Geography: Japan
Ransomware: Everest Ransomware
Objective: Data Theft, Data Encryption, Financial Gains
Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
CYFIRMA observed in an underground forum that a company from Japan, Nissan Motor Corporation (https[:]//www[.]nissan-global[.]com/), was compromised by Everest Ransomware. Nissan Motor Corporation is a multinational automobile manufacturer headquartered in Yokohama, Japan. The company, founded in 1933, produces a comprehensive range of vehicles, from luxury cars to commercial trucks. Nissan is known for its innovation in electric and autonomous driving technology. It includes brands like Infiniti and Datsun. It also has partnerships with Renault and Mitsubishi. The compromised data includes internal documents such as blueprints, financial records, and other sensitive materials, totaling 900 gigabytes of files.

Source: Dark Web

Relevancy & Insights:

  • The Everest Ransomware group primarily targets countries such as the United States of America, Italy, Germany, the United Kingdom, and the United Arab Emirates.
  • The Everest Ransomware group primarily targets industries, including Professional Goods & Services, Consumer Goods & Services, Finance, Manufacturing, and Information Technology.
  • Based on the Everest Ransomware victims list from 1st Jan 2025 to 13th Jan 2026, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Everest Ransomware victims list from 1st Jan 2025 to 13th Jan 2026 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Everest ransomware continues to pose a persistent and evolving cyber threat. The group is actively broadening its targeting across new sectors, expanding its role as an initial access broker, and increasingly relying on data-leak extortion as its core operational tactic. Organizations are advised to remain vigilant by strengthening access controls, closely monitoring for lateral movement and Cobalt Strike–related activity, and maintaining robust incident response and detection capabilities to mitigate the risks posed by Everest’s ongoing campaigns.

5. Vulnerabilities and Exploits

Vulnerability in Langflow
Attack Type: Vulnerabilities & Exploits
Target Technology: AI Agent Tool
Vulnerability: CVE-2026-21445
CVSS Base Score: 8.8 Source
Vulnerability Type: Missing Authentication for Critical Function

Summary:
The vulnerability allows a remote attacker to compromise the target system.

Relevancy & Insights:
The vulnerability exists due to missing authentication for a critical function in critical API endpoints.

Impact:
A remote attacker can gain access to sensitive user conversation data and perform destructive operations.

Affected Products:
https[:]//github[.]com/langflow- ai/langflow/security/advisories/GHSA-c5cp-vx83-jhqx

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behaviour that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerability in Langflow can pose significant threats to application security and system integrity. This can impact various industries globally, including organizations leveraging AI-driven workflows, automation platforms, and language model orchestration frameworks. Ensuring the security of Langflow is crucial for maintaining the integrity and protection of application logic, data flows, and access controls across environments. Therefore, addressing these vulnerabilities is essential to safeguarding AI workflow management, operational reliability, and secure application deployment across different geographic regions and sectors.

6. Latest Cyber-Attacks, Incidents, and Breaches

Dire Wolf Ransomware attacked and published the data of Bina Darulaman Berhad Threat Actor: Dire Wolf Ransomware

Attack Type: Ransomware
Objective: Data Leak, Financial Gains
Target Technology: Web Applications
Target Industry: Civil Engineering Construction
Target Geography: Malaysia

Business Impact:
Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that Dire Wolf Ransomware attacked and published the data of Bina Darulaman Berhad (https [:]//www[.]bdb[.]com[.]my) on its dark web website. Bina Darulaman Berhad (BDB) is a Malaysian investment holding company listed on Bursa Malaysia (KLSE: BDB) focused on property development, construction, leisure, and sustainability initiatives. The ransomware incident resulted in the compromise of approximately 500 GB of data, encompassing Internal Documents, Insurance Policy Documents, Financial Documents, Email Backups, Legal Documents, Design Drawings, Confidential Documents, Supplier Documents, Employee Records, Audit Documents, Internal Agreements, Customer Data, Tax Filing Documents, Financial Records, and Personal Information.

Source: Dark Web

Relevancy & Insights:
Dire Wolf is a newly emerged ransomware group that surfaced in May 2025. It operates an onion-based data leak site (DLS) where it posts information about its victims, including file trees, sample files, and descriptions of stolen data.

The Dire Wolf Ransomware group primarily targets industries, including Manufacturing, Industrial Machinery, Information Technology, Business Support Services, and Heavy Construction.

ETLM Assessment:
According to CYFIRMA’s assessment, Dire Wolf is a newly identified ransomware group that emerged in May 2025, distinguished by its use of double-extortion tactics combining data encryption with data theft and threats of public exposure via an onion-based leak site. The group appears to operate solely for financial gains, without ideological motives. Its emergence highlights the evolving nature of ransomware threats in 2025, particularly the increased reliance on data exfiltration to amplify extortion efforts. These activities reinforce the urgent need for strong cybersecurity defenses and effective incident response strategies across all sectors.

7. Data Leaks

EMACHI Data Advertised on a Leak Site Attack Type: Data leak
Target Industry: Internet Media/Online Advertising
Target Geography: Japan
Objective: Financial Gains
Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA research team has identified claims made by a threat actor operating under the alias “Solonik,” who alleges responsibility for a security breach involving e-machitown Co., Ltd. (emachi[.]co[.]jp). e-machitown Co., Ltd. operates a regional information portal in Japan that provides listings and information on local businesses, events, and town guides. According to the actor, the breach resulted in the exfiltration of a large database containing detailed information on local shop owners and their businesses, reportedly affecting more than 680,000 verified businesses.

The threat actor claims the compromised dataset contains extensive business and owner information related to Japanese local enterprises.

The allegedly exposed data includes:

  • Full names of individuals (Kanji and Furigana)
  • Phone numbers (mobile and landline)
  • Personal and business email addresses
  • Full physical addresses, including ZIP codes and prefectures
  • Business names, categories, and descriptions
  • GPS coordinates (latitude and longitude)
  • Image folder paths and internal shop identification numbers

The actor states the dataset:

  • Has a clean structure with no character encoding issues
  • Was extracted directly from an SQL backend, making it ready for parsing or reuse
  • Contains comprehensive details on Japanese businesses, owners, geolocation data, phone numbers, and email addresses
  • Data format: SQL dump (raw INSERT statements)
  • Approximate data size: 1.1 GB
  • Total records: 830,000+

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.Top of FormBottom of Form

Source: Underground Forums

FUSE Group Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Insurtech (Insurance Technology)
  • Target Geography: Indonesia
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary
The CYFIRMA Research team has observed claims made by a threat actor using the alias “Solonik,” who alleges responsibility for a security breach involving the FUSE Group. FUSE Group (micro[.]fuse[.]co[.]id) is a prominent InsurTech provider in Southeast Asia, operating since 2017 with a presence across Indonesia, Malaysia, and Vietnam. According to the actor, the breach resulted in the exfiltration of sensitive data from the Simas Insurtech backend, including insurance policy applications, API activity logs, loan information, customer identification records, and direct links to policy documents in PDF format.

The allegedly compromised dataset is said to contain extensive customer personally identifiable information (PII), insurance loan records, and full credit policy metadata. The data reportedly includes:

  • 132,000+ cust_cf_installment records
  • 34,000+ history_log entries and 17,000+ history_api records containing full JSON API requests and responses
  • 13,000+ obj_customer_cf records with complete insured and debtor details
  • Insurance loan amounts, packages, and policy inception dates
  • Direct PDF policy download URLs associated with Simas Insurtech
  • Full names, KTP (Indonesian ID) numbers, physical addresses, phone numbers, and email addresses of insured individuals and debtors
  • Embedded fields such as referral codes, one-time passwords (OTP), policy IDs, and premium values
  • Data format: SQL dump
  • Approximate total records: ~199,000

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously looking for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to gain access and steal valuable data. Subsequently, the stolen data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The threat actor operating under the alias “Solonik” is assessed to be a newly emerged yet highly active and capable group, primarily focused on data-leak operations. Multiple credible sources have linked Solonik to a series of security incidents involving unauthorized access to organisational systems. The actor’s activities reflect the persistent and rapidly evolving cyber-threat landscape fueled by underground criminal ecosystems and underscore the urgent need for organizations to strengthen their cybersecurity posture through continuous monitoring, enhanced threat-intelligence capabilities, and proactive defensive measures to safeguard sensitive data and critical infrastructure.

Recommendations:
Enhance the cybersecurity posture by:
Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.

Ensure proper database configuration to mitigate the risk of database-related attacks.

Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA Research team observed that Rmoney India, an Indian fintech platform, has allegedly been compromised in a significant data security incident. On January 8, 2026, the organization was listed on a dark web forum by a threat actor who claims to have exfiltrated the company’s full production database. The breach reportedly involves a 1.5GB SQL dump encompassing multiple schemas, including insurance data, online KYC records, and WhatsApp bridge integrations.
According to the actor, the leaked database contains sensitive Personally Identifiable Information (PII) and internal records. The allegedly compromised data includes:

  • Full names
  • Email addresses
  • Phone numbers
  • Aadhaar and PAN references
  • Insurance policies and metadata
  • KYC verification data
  • Lead generation and CRM records
  • WhatsApp bridge metadata
  • WordPress user credentials and uploaded files

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

The CYFIRMA Research team has identified that ASML, a Dutch multinational corporation and the world’s leading supplier of photolithography systems and critical equipment for the semiconductor industry, has allegedly been the target of a significant data leak. A threat actor on a cybercrime forum claims to have published approximately 154 databases belonging to the technology giant. The leaked files, which are reportedly in SQL format, were posted for download with instructions on how to convert them for viewing.

According to the actor, the allegedly compromised data includes:

  • Disk encryption keys
  • User information
  • Software data
  • Device details

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

RECOMMENDATIONS

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Delay a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence, providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions, remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies and continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security controls, such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.