Weekly Intelligence Report – 27 February 2026

Published On : 2026-02-27
Share :
Weekly Intelligence Report – 27 February 2026

Ransomware in Focus

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware
Target Technologies: Windows OS
Target Geographies: Australia, Belgium, Canada, Germany, Italy, Japan, New Zealand, United Kingdom, United States
Target Industries: Auto Components, Automobiles, Education Services, Machinery, Software, Technology Hardware, Storage & Peripherals
Target Technologies: Remote Desktop Software, Virtual Private Network (VPN) Solutions, Virtualization Management Tools, Virtualization Security Solutions, operating systems

Introduction:
CYFIRMA Research and Advisory Team has observed SafePay Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

SafePay Ransomware
Safepay (also written SafePay) is a centralized, non-RaaS ransomware operation that emerged around September–October 2024 and has remained highly active into early 2026, conducting disciplined, high-tempo double-extortion campaigns primarily against organizations in developed economies, especially the United States and Germany, while deliberately avoiding CIS-region systems through locale checks. The group gains initial access mainly via exploitation of misconfigured or weakly secured remote access infrastructure, such as VPN gateways, firewalls, RDP services, and exposed edge devices, often leveraging valid credentials, MFA bypass conditions, or public-facing service vulnerabilities.

Once inside, operators rapidly execute a structured intrusion playbook: privilege escalation, Active Directory and SMB share enumeration (including tools like ShareFinder), lateral movement via PsExec, WinRM, RDP, or RMM software, such as ScreenConnect, data staging and archiving (e.g., WinRAR), and exfiltration prior to encryption. The ransomware is typically deployed as a DLL executed through LOLBins like regsvr32.exe or rundll32.exe, encrypting files with a .safepay extension and dropping readme_safepay.txt ransom notes, while aggressively deleting shadow copies, disabling recovery mechanisms, and terminating security tools to inhibit restoration. Operational patterns and tradecraft show strong overlap with post-Conti and LockBit ecosystems, though no confirmed affiliation exists, suggesting experienced operators running a tightly controlled campaign model with rapid compromise-to-encryption timelines and structured leak-site pressure via Tor infrastructure.

Screenshot: File encrypted by the ransomware (Source: Surface Web)

The SafePay ransomware ransom note informs victims that their corporate network has been compromised due to alleged “security misconfigurations,” critical files have been encrypted and renamed with the .safepay extension, and sensitive data has been exfiltrated to attacker-controlled infrastructure. Rather than specifying encryption algorithms or a fixed ransom amount in the note itself, the operators direct victims to initiate contact through a Tor-based portal (with references to backup links, a leak blog, and even a TON site) within 14 days to begin negotiations. The message threatens public disclosure of stolen data if contact is not established, followed by a countdown prior to publication, thereby leveraging reputational, legal, and regulatory pressure. It frames payment as a “mutually beneficial solution,” promising deletion of stolen data and provision of a decryption key, while asserting the group’s “reputation” as assurance of compliance. The note employs classic double-extortion coercion tactics, encryption, data theft, deadline enforcement, and public leak threats designed to induce urgency and compel negotiation, without offering any verifiable guarantee that decryption or data deletion will actually occur after payment.

Screenshot: The appearance of SafePay Ransom Note (Source: Dark Web)

Screenshot: The appearance of SafePay Data Leak Site (Source: Dark Web)

The following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Execution T1059 Command and Scripting Interpreter
Execution T1129 Shared Modules
Persistence T1574 Hijack Execution Flow
Privilege Escalation T1574 Hijack Execution Flow
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1027.002 Obfuscated Files or Information: Software Packing
Defense Evasion T1027.005 Obfuscated Files or Information: Indicator Removal from Tools
Defense Evasion T1070 Indicator Removal
Defense Evasion T1070.006 Indicator Removal: Timestomp
Defense Evasion T1218 System Binary Proxy Execution
Defense Evasion T1218.010 System Binary Proxy Execution: Regsvr32
Defense Evasion T1218.011 System Binary Proxy Execution: Rundll32
Defense Evasion T1574 Hijack Execution Flow
Credential Access T1056 Input Capture
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Collection T1056 Input Capture
Command and Control T1071 Application Layer Protocol

Relevancy and Insights:
I. The ransomware primarily targets Windows OS, which is utilised by enterprises in a variety of diligence.

II. Persistence: The ransomware exhibits continuity mechanisms to ensure its survival and ongoing vicious conditioning within the compromised terrain. This could involve creating autostart entries or modifying system settings to maintain a base and grease unborn attacks.

III. User Input Checks: The ransomware is also performing checks on user input. This behaviour implies that the ransomware may have the ability to interact with the user or receive commands in some way. It could be looking for specific inputs or triggers to initiate its encryption process or carry out other malicious activities. This behaviour indicates a level of sophistication and interactivity in the ransomware’s design.

IV. The use of idle periods may indicate that the ransomware is designed to operate more stealthily, waiting for the computer to be idle before encrypting files or performing other malicious activities.

ETLM Assessment:
CYFIRMA’s assessment indicates that SafePay ransomware is likely to continue evolving as a structured double-extortion operation, focusing on strengthening its data exfiltration processes, leak-site infrastructure, and negotiation mechanisms rather than introducing fundamentally new tactics. Based on its current ransom note structure emphasizing prolonged network access, server disruption, staged public disclosure timelines, and multi-channel communication via Tor and TON (Telegram Open Network), the group may formalize its extortion workflow by standardizing victim portals, improving data leak publication procedures, enhancing backup destruction techniques, and refining negotiation messaging to increase payment rates. Future activity may also involve more consistent lateral movement, persistence, and enterprise-wide impact to reinforce coercive leverage. However, unless supported by significant technical innovation or demonstrable operational sophistication, SafePay’s evolution is expected to remain incremental, centered on improving reliability, psychological pressure, and monetization efficiency rather than materially expanding its tactical capabilities.

Sigma rule:
title: SafePay Ransomware Suspicious Execution and Defense Evasion Activity tags:
– attack.execution
– attack.defense-evasion
– attack.t1218.010
– attack.t1218.011
– attack.t1070.006
– attack.t1027 logsource:
category: process_creation product: windows
detection:
selection_proxy_regsvr32: Image|endswith: ‘\regsvr32.exe’ CommandLine|contains:
– ‘.dll’
– ‘/s’
selection_proxy_rundll32: Image|endswith: ‘\rundll32.exe’ CommandLine|contains: ‘.dll’
selection_shadowcopy_delete: CommandLine|contains|all:
– ‘vssadmin’
– ‘delete’
– ‘shadows’
selection_wmic_shadowcopy: CommandLine|contains|all:
– ‘wmic’
– ‘shadowcopy’
– ‘delete’
selection_backup_catalog_delete: CommandLine|contains|all:
– ‘wbadmin’
– ‘delete’
– ‘catalog’
selection_service_kill: CommandLine|contains:
– ‘taskkill /f’
– ‘net stop’
condition: 1 of selection_proxy_* or 1 of selection_shadowcopy_* or selection_backup_catalog_delete or selection_service_kill
falsepositives:
– Legitimate administrative activity involving backup deletion
– Software deployment using regsvr32 or rundll32
– IT maintenance operations level: high (Source: Surface Web)

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems. (Source: Surface Web)

RECOMMENDATIONS

STRATEGIC RECOMMENDATIONS

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained, which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATIONS

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Implement a zero-trust security model alongside multifactor authentication (MFA) to reduce the risk of credential compromise.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATIONS

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring, which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Establish and implement protective controls by actively monitoring and blocking identified indicators of compromise (IoCs) and reinforcing defensive measures based on the provided tactical intelligence.

Malware in focus

Type: Information stealer| Objectives: Data Exfiltration | Target Technology: Windows OS | Target Geography: Global
CYFIRMA collects data from various forums, based on which the following malware has been observed. The identified malware has been ascertained to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week, “Vidar Malware” is in focus.

Overview of Operation Vidar Malware
A recently identified and ongoing malware campaign has revealed the emergence of a new variant of the Vidar information-stealing malware, characterized by deliberate efforts to evade detection and mislead security analysts. The threat actors are distributing malicious files that impersonate legitimate software by adopting trusted application names and icons, thereby increasing the probability of user interaction and execution. This social engineering approach enables the malware to appear benign during initial inspection, facilitating unauthorized system compromise while delaying recognition of the threat.

A notable feature of this campaign is the intentional inflation of the malicious file size through the inclusion of extraneous data appended to the executable. The resulting files, exceeding 800 MB in size, are designed to disrupt automated analysis environments, degrade the performance of security tools, and complicate manual reverse-engineering efforts. Such manipulation serves to obscure the embedded malicious components and prolong the time required for effective investigation, ultimately enhancing the attackers’ ability to operate undetected for extended periods.

Although the delivery mechanism incorporates advanced evasion techniques, the operational objective remains consistent with information-stealing malware campaigns, namely the compromise of victim systems and the unauthorized extraction of sensitive data to attacker-controlled infrastructure. Observed indicators also suggest potential links to external communication channels, including references to accounts associated with Telegram, which may facilitate coordination or distribution activities. Collectively, this campaign underscores the continued evolution of commodity malware, where adversaries increasingly combine deception, scale manipulation, and covert communication methods to enhance effectiveness and persistence.

Overall, this campaign illustrates how modern malware operations are increasingly designed to evade both users and security defenses through deception and manipulation rather than overtly aggressive techniques. By disguising malicious files as legitimate software and artificially inflating their size to complicate analysis, the attackers demonstrate a strategic focus on misdirection and persistence. This approach emphasizes the growing risk associated with downloading software from untrusted or unofficial sources, as even seemingly authentic applications may conceal hidden threats. It reinforces the importance of verifying software authenticity, maintaining updated security controls, and exercising caution before executing unfamiliar files, particularly when they originate from unverified distribution channels.

Attack Method
The attack methodology associated with this Vidar malware variant demonstrates a structured approach that integrates deception, controlled execution, and external communication to facilitate unauthorized data acquisition while minimizing the likelihood of detection. The malicious file is presented as legitimate software, thereby encouraging user execution and enabling the threat to establish itself within the system environment without immediate suspicion. Following execution, the malware utilizes standard Windows system functionalities to manage memory operations, initiate and control threads, and interact with core operating system components. By relying on commonly used system processes, malicious activity is more likely to blend with normal application behavior, complicating behavioral analysis and detection by security mechanisms.

A central element of the attack involves the establishment of outbound communication with attacker-controlled infrastructure to support command-and-control operations and data exfiltration. Network indicators associated with the activity include communication attempts directed toward the external IP address 49[.]13[.]36[.]31, which is geographically located in Germany, indicating the presence of a remote server used for operational management. Through this channel, malware can transmit collected information and potentially receive further instructions or updates. Additional references to external coordination channels, including accounts associated with Telegram and the Steam community, suggest the integration of supplementary communication mechanisms that may assist in campaign coordination or distribution efforts.

Collectively, the observed attack method reflects an evolution in commodity malware operations, wherein adversaries employ legitimate system capabilities, deceptive presentation techniques, and geographically distributed infrastructure to maintain persistence and operational control. This combination of covert execution and structured remote communication enhances the attackers’ ability to sustain activity over extended periods while complicating incident response and forensic investigation.

The following are the TTPs based on the MITRE Attack Framework for Enterprise

Tactic (ID) Technique ID Technique Name
Execution T1204.002 User Execution: Malicious File
T1106 Native API
Persistence T1547 Boot or Logon Autostart Execution
Defense Evasion T1036 Masquerading
T1027 Obfuscated/Compressed Files and Information
T1140 Deobfuscate/Decode Files or Information
T1055 Process Injection
T1497 Virtualization/Sandbox Evasion
Discovery T1082 System Information Discovery
T1012 Query Registry
Collection T1005 Data from Local System
Credential Access T1555 Credentials from Password Stores
Command and control T1071.001 T1573
Application Layer Protocol: Web Protocols Encrypted Channel
Exfiltration T1041 Exfiltration Over C2 Channel

INSIGHTS
The malware demonstrates a strong reliance on appearance and presentation to avoid early suspicion. By imitating legitimate software and modifying visible file characteristics, the attackers increase the chances that users will trust and execute the file. This indicates that deception plays an important role alongside technical methods in the overall operation.

The behavior observed after execution appears controlled and deliberate rather than aggressive or disruptive. The malware performs its activities in a way that does not immediately interfere with normal system usage, which helps it remain less noticeable. This measured approach allows the malicious processes to operate quietly within the environment.

There are also indications that the activity is supported by an organized external infrastructure rather than being an isolated incident. The presence of coordinated communication elements suggests structured management behind the campaign. This reflects an operation that is planned and maintained with a level of consistency typical of established threat activities.

ETLM ASSESSMENT
From a broader risk and threat-management perspective, this activity demonstrates how modern malware campaigns increasingly rely on credibility, timing, and user interaction rather than overt technical exploitation alone. By blending malicious intent with seemingly legitimate content or processes, attackers can delay detection and extend the duration of compromise, which complicates investigation and response efforts for organizations. Such incidents may also originate outside controlled enterprise environments but later intersect with workplace systems through credential reuse or connected devices, creating indirect exposure pathways. Over time, these patterns can place additional pressure on security teams, influence resource allocation decisions, and reshape how organizations evaluate user-driven risks within their overall cybersecurity posture.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

YARA Rules
rule Vidar_Malware_String_IOCs
{
meta:
description = “Detects Vidar malware-based IOCs and infrastructure indicators” author = “CYFIRMA”
date = “2026-02-23”

strings:
/* Malware Sample Hashes */
$hash_1 =
“89bb701065ed4a6b036223a7752c1cf45c7d32a7a466fc3f1b2013f2736a15cb”
$hash_2 =
“b31b28326d4f69fb1de99ab9f3f880996e08cf7fd9347b2eb17c49e797547ed2”

/* telegram account link & C2 Indicators */
$telegram_url = “https://telegram.me/dead1cf”
$steamcommunity_url =
“https://steamcommunity.com/profiles/76561198767911792”
$c2_ip = “49.13.36.31”

condition:
any of ($hash_*) or any of ($telegram_url, $steamcommunity_url, $c2_ip)
}

Recommendations

Strategic Recommendations

  • Recognize that modern malware campaigns often rely on deception and trusted branding, making user perception a critical component of organizational security risk.
  • Treat information-stealing malware incidents as potential business continuity and reputational concerns, not only technical security issues.
  • Incorporate risks related to large, obfuscated, or analysis-evasive files into enterprise risk assessments and digital asset protection strategies.
  • Ensure leadership understands that stealth-focused threats can remain undetected for extended periods, increasing potential operational and compliance exposure.

Management Recommendations

  • Establish clear policies governing software downloads and installations, including restrictions on unverified or unofficial sources.
  • Promote regular awareness initiatives to help employees identify suspicious files that imitate legitimate applications.
  • Strengthen coordination between security, IT operations, and risk management teams to maintain consistent oversight of endpoint activity.
  • Maintain updated asset inventories and access controls to reduce the likelihood of unauthorized execution across organizational systems.

Tactical Recommendations

  • Monitor systems for unusually large executable files or abnormal file structures that may indicate hidden or appended content.
  • Track outbound network connections for unexpected communication patterns that could signal data exfiltration attempts.
  • Conduct periodic threat-hunting activities using known indicators to identify dormant or stealthy infections.
  • Implement layered endpoint protections and logging mechanisms to improve visibility into suspicious execution behavior and system changes.

CYFIRMA’S WEEKLY INSIGHTS

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Malware Implant, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – NightSpire Ransomware, The Gentlemen Ransomware| Malware – Vidar
  • NightSpire Ransomware – One of the ransomware groups.
  • The Gentlemen Ransomware – One of the ransomware groups. Please refer to the trending malware advisory for details on the following:
  • Malware – Vidar
    Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

Lazarus Group: Strategic shift from conventional attacks

  • Threat Actor: Lazarus Group
  • Attack Type: Botnet Operations, Malware Implant, DLL Injection Attacks, Direct IP- based C2 Communication, Impersonation, Obfuscation, Open Proxy Usage, Credential Stealing, Social Engineering Attack, Supply Chain Attacks, Ransomware Attacks, Cryptocurrency theft, Exploitation of Vulnerabilities.
  • Objective: Information theft, Espionage, Financial Gains
  • Suspected Target Technology: Windows, macOS, Linux, SAP Systems, Cryptocurrency Exchanges, Financial Platforms (including SWIFT), JetBrains TeamCity, Oracle Products, Dell Systems, Atlassian Confluence, Citrix NetScaler ADC/Gateway, GitHub and GitLab repositories, Microsoft Visual Studio Code
  • Suspected Target Geography: Australia, Brazil, Brunei, Canada, Chile, China, Darussalam, Democratic People’s Republic of Korea, France, Germany, Guatemala, Hong Kong, India, Indonesia, Islamic Republic of Iran, Japan, Myanmar, Philippines, Poland, Republic of Korea, Russia, Thailand, United Kingdom, United States, Vietnam, Bangladesh
  • Suspected Target Industries: Aerospace & Defense, Capital Markets, Consumer Finance, Cryptocurrency, Defense, Diversified Financial Services, Energy, Entertainment, Government, Hotels, Investment Trusts (REITs), Media, NGO, Real Estate, Restaurants & Leisure, Technology, Telecommunications, Thrifts and Mortgage, Banks
  • Business Impact: Financial Loss, Data Theft, Operational Disruption, Reputational Damage

About the Threat Actor
Lazarus Group, active since at least 2009, is a highly sophisticated cybercriminal organization reportedly linked to the North Korean government and known to the U.S. government as Hidden Cobra. Members are believed to be affiliated with Lab 110, a unit of DPRK military intelligence.

The group is capable of rapidly developing and evolving malware and exploits and has recently focused on targeting cryptocurrency exchanges. Lazarus Group operates in at least two subdivisions: Andariel, targeting the South Korean government and organizations, and Bluenoroff, focused on financial gain and global espionage.

Details on Exploited Vulnerabilities

TTPs based on MITRE ATT&CK Framework

Tactic ID Technique
Reconnaissance T1591 Gather Victim Org Information
Reconnaissance T1591.004 Gather Victim Org Information: Identify Roles
Reconnaissance T1589.002 Gather Victim Identity Information: Email Addresses
Reconnaissance T1593.001 Search Open Websites/Domains: Social Media
Resource Development T1608.001 Stage Capabilities: Upload Malware
Resource Development T1608.002 Stage Capabilities: Upload Tool
Resource Development T1587.001 Develop Capabilities: Malware
Resource Development T1587.002 Develop Capabilities: Code Signing Certificates
Resource Development T1583.001 Acquire Infrastructure: Domains
Resource Development T1583.004 Acquire Infrastructure: Server
Resource Development T1583.006 Acquire Infrastructure: Web Services
Resource Development T1584.001 Compromise Infrastructure: Domains
Resource Development T1584.004 Compromise Infrastructure: Server
Resource Development T1585.001 Establish Accounts: Social Media Accounts
Resource Development T1585.002 Establish Accounts: Email Accounts
Resource Development T1588.002 Obtain Capabilities: Tool
Resource Development T1588.003 Obtain Capabilities: Code Signing Certificates
Resource Development T1588.004 Obtain Capabilities: Digital Certificates
Initial Access T1189 Drive-by Compromise
Initial Access T1566.001 Phishing: Spear phishing Attachment
Initial Access T1566.002 Phishing: Spear phishing Link
Initial Access T1566.003 Phishing: Spear phishing via Service
Execution T1059.001 Command and Scripting Interpreter: PowerShell
Execution T1053.005 Scheduled Task/Job: Scheduled Task
Execution T1106 Native API
Execution T1204.001 User Execution: Malicious Link
Execution T1204.002 User Execution: Malicious File
Execution T1203 Exploitation for Client Execution
Execution T1059.003 Command and Scripting Interpreter: Windows Command Shell
Execution T1047 Windows Management Instrumentation
Execution T1059.005 Command and Scripting Interpreter: Visual Basic
Persistence T1505.004 Server Software Component: IIS Components
Persistence T1542.003 Pre-OS Boot: Bootkit
Persistence T1574.001 Hijack Execution Flow: DLL
Persistence T1574.013 Hijack Execution Flow: KernelCallbackTable
Persistence T1543.003 Create or Modify System Process: Windows Service
Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Persistence T1053.005 Scheduled Task/Job: Scheduled Task
Persistence T1098 Account Manipulation
Persistence T1547.009 Boot or Logon Autostart Execution: Shortcut Modification
Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation T1098 Account Manipulation
Privilege Escalation T1547.009 Boot or Logon Autostart Execution: Shortcut Modification
Privilege Escalation T1543.003 Create or Modify System Process: Windows Service
Privilege Escalation T1055.001 Process Injection: Dynamic-link Library Injection
Privilege Escalation T1574.001 Hijack Execution Flow: DLL
Privilege Escalation T1574.013 Hijack Execution Flow: KernelCallbackTable
Privilege Escalation T1134.002 Access Token Manipulation: Create Process with Token
Privilege Escalation T1053.005 Scheduled Task/Job: Scheduled Task
Defense Evasion T1134.002 Access Token Manipulation: Create Process with Token
Defense Evasion T1218 System Binary Proxy Execution
Defense Evasion T1218.005 System Binary Proxy Execution: Mshta
Defense Evasion T1218.010 System Binary Proxy Execution: Regsvr32
Defense Evasion T1218.011 System Binary Proxy Execution: Rundll32
Defense Evasion T1620 Reflective Code Loading
Defense Evasion T1070 Indicator Removal
Defense Evasion T1070.003 Indicator Removal: Clear Command History
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1070.006 Indicator Removal: Timestomp
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1036.003 Masquerading: Rename Legitimate Utilities
Defense Evasion T1036.004 Masquerading: Masquerade Task or Service
Defense Evasion T1036.005 Masquerading: Match Legitimate Resource Name or Location
Defense Evasion T1036.008 Masquerading: Masquerade File Type
Defense Evasion T1027.002 Obfuscated Files or Information: Software Packing
Defense Evasion T1027.007 Obfuscated Files or Information: Dynamic API Resolution
Defense Evasion T1027.009 Obfuscated Files or Information: Embedded Payloads
Defense Evasion T1027.013 Obfuscated Files or Information: Encrypted/Encoded File
Defense Evasion T1542.003 Pre-OS Boot: Bootkit
Defense Evasion T1220 XSL Script Processing
Defense Evasion T1055.001 Process Injection: Dynamic-link Library Injection
Defense Evasion T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion
Defense Evasion T1622 Debugger Evasion
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1564.001 Hide Artifacts: Hidden Files and Directories
Defense Evasion T1221 Template Injection Authentication Process: Conditional Access Policies
Defense Evasion T1574.001 Hijack Execution Flow: DLL
Defense Evasion T1574.013 Hijack Execution Flow: KernelCallbackTable
Defense Evasion T1497.001 Virtualization/Sandbox Evasion: System Checks
Defense Evasion T1553.002 Subvert Trust Controls: Code Signing
Defense Evasion T1078 Valid Accounts
Defense Evasion T1562.001 Impair Defenses: Disable or Modify Tools
Defense Evasion T1562.004 Impair Defenses: Disable or Modify System Firewall
Defense Evasion T1656 Impersonation
Credential Access T1056.001 Input Capture: Keylogging
Credential Access T1110.003 Brute Force: Password Spraying
Credential Access T1557.001 Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay
Discovery T1083 File and Directory Discovery
Discovery T1057 Process Discovery
Discovery T1497.001 Virtualization/Sandbox Evasion: System Checks
Discovery T1497.003 Virtualization/Sandbox Evasion: Time Based Evasion
Discovery T1087.002 Account Discovery: Domain Account
Discovery T1010 Application Window Discovery
Discovery T1046 Network Service Discovery
Discovery T1622 Debugger Evasion
Discovery T1082 System Information Discovery
Discovery T1012 Query Registry
Discovery T1614.001 System Location Discovery: System Language Discovery
Discovery T1016 System Network Configuration Discovery
Discovery T1049 System Network Connections Discovery
Discovery T1033 System Owner/User Discovery
Discovery T1124 System Time Discovery
Lateral Movement T1021.002 Remote Services: SMB/Windows Admin Shares
Lateral Movement T1021.001 Remote Services: Remote Desktop Protocol
Lateral Movement T1021.004 Remote Services: SSH
Lateral Movement T1534 Internal Spear phishing
Collection T1056.001 Input Capture: Keylogging
Collection T1560 Archive Collected Data
Collection T1560.001 Archive Collected Data: Archive via Utility
Collection T1560.002 Archive Collected Data: Archive via Library
Collection T1560.003 Archive Collected Data: Archive via Custom Method
Collection T1557.001 Adversary-in-the-Middle: LLMNR/NBT-NS Poisoning and SMB Relay
Collection T1005 Data from Local System
Collection T1074.001 Data Staged: Local Data Staging
Command and Control T1071.001 Application Layer Protocol: Web Protocols
Command and Control T1571 Non-Standard Port
Command and Control T1132.001 Data Encoding: Standard Encoding
Command and Control T1001.003 Data Obfuscation: Protocol or Service Impersonation
Command and Control T1573.001 Encrypted Channel: Symmetric Cryptography
Command and Control T1090.001 Proxy: Internal Proxy
Command and Control T1090.002 Proxy: External Proxy
Command and Control T1008 Fallback Channels
Command and Control T1105 Ingress Tool Transfer
Command and Control T1104 Multi-Stage Channels
Command and Control T1102.002 Web Service: Bidirectional Communication
Exfiltration T1041 Exfiltration Over C2 Channel
Exfiltration T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage
Exfiltration T1048.003 Exfiltration Over Alternative Protocol: Exfiltration Over Unencrypted Non-C2 Protocol
Impact T1561.001 Disk Wipe: Disk Content Wipe
Impact T1561.002 Disk Wipe: Disk Structure Wipe
Impact T1489 Service Stop
Impact T1485 Data Destruction
Impact T1529 System Shutdown/Reboot
Impact T1491.001 Defacement: Internal Defacement

Latest Developments Observed
The threat actor is suspected of leveraging a BeaverTail malware variant as part of the Contagious Interview campaign, targeting IT professionals working in the cryptocurrency, Web3, and artificial intelligence sectors. The campaign appears aimed at compromising developers and engineers to steal financial information and other sensitive data.

ETLM Insights
The Lazarus Group, a North Korea–aligned state-sponsored threat actor, is suspected to be carrying out sustained and targeted campaigns against software developers employed by cryptocurrency exchanges, blockchain initiatives, Web3 startups, and fintech organizations. Rather than directly targeting heavily secured exchange infrastructure, the group increasingly focuses on compromising individual developers and leveraging their trusted access to penetrate corporate environments and manipulate cryptocurrency transactions.

This approach reflects a strategic shift from conventional exchange-focused attacks to a human-centric supply chain intrusion model.

Looking ahead, Lazarus Group is expected to continue functioning as a state- directed revenue and intelligence apparatus, combining financially motivated operations, primarily cryptocurrency theft, with broader strategic espionage objectives. The group’s operations are likely to grow more sophisticated, patient, and cross-sector in scope. Financially driven cyber activity will remain persistent and operationally prioritized, with campaigns designed to be structured, scalable, and revenue-optimized rather than opportunistic.

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems. (Source: Surface Web)

YARA Rules
rule Threat_Actor_Indicators_Generic
{
meta:
description = “Detects files containing CVE strings, suspicious domains, IPs, or known filenames/hashes linked to recent threat activity”
author = “CYFIRMA” date = “2026-02-24”
confidence = “high (IOC-based detection)”
strings:
// CVEs observed
$cve1 = “CVE-2023-38408” ascii nocase
$cve2 = “CVE-2017-10271” ascii nocase
$cve3 = “CVE-2023-22518” ascii nocase
$cve4 = “CVE-2017-0199” ascii nocase
$cve5 = “CVE-2023-36884” ascii nocase
$cve6 = “CVE-2023-42793” ascii nocase
$cve7 = “CVE-2026-0886” ascii nocase
// Domains
$domain1 = “knightsbridge-dex.vercel.app” ascii nocase
$domain2 = “tetrismic.vercel.app” ascii nocase
$domain3 = “mocki.io” ascii nocase
$domain4 = “sellinicapital.com” ascii nocase
$domain5 = “presentations.life” ascii nocase
// IPs
$ip1 = “141.193.213.20” ascii
$ip2 = “188.165.53.185” ascii
$ip3 = “199.59.148.209” ascii
$ip4 = “119.28.118.4” ascii
$ip5 = “118.70.180.174” ascii
// Files / hashes
$file1 = “win32.exe” ascii nocase
$file2 = “hrm3jvh9v.dll” ascii nocase
$file3 = “eqfvkn” ascii nocase
$sha256_1 = “00000077553a5b27a610ac98f29563bbd6e0decc020c2d49e4fa0d89197e7fd8” ascii
condition:
// Trigger if multiple indicator types appear (reduces noise) (
1 of ($domain*) and 1 of ($ip*)
)
or (
1 of ($file*, $sha256_*) and 1 of ($cve*)
)
or (
2 of ($domain*, $ip*, $file*, $sha256_*, $cve*)
)
}

Recommendations

Strategic Recommendations

  • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
  • Assess and deploy alternatives for an advanced endpoint protection solution that provides detection/prevention for malware and malicious activities that do not rely on signature-based detection methods.
  • Block exploit-like behaviour. Monitor endpoints memory to find behavioural patterns that are typically exploited, including unusual process handle requests. These patterns are features of most exploits, whether known or new. This will be able to provide effective protection against zero-day/critical exploits and more by identifying such patterns.

Management Recommendations

  • Invest in user education and implement standard operating procedures for the handling of financial and sensitive data transactions commonly targeted by impersonation attacks. Reinforce this training with context-aware banners and in- line prompts to help educate users.
  • Develop a cyber threat remediation program and encourage employee training to detect anomalies proactively.

Tactical Recommendations

  • For better protection coverage against email attacks (like spear phishing, business email compromise, or credential phishing attacks), organizations should augment built-in email security with layers that take a materially different approach to threat detection.
  • Protect accounts with multi-factor authentication. Exert caution when opening email attachments or clicking on embedded links supplied via email communications, SMS, or messaging.
  • Apply security measures to detect unauthorized activities, protect sensitive production, and process control systems from cyberattacks.
  • Add the YARA rules for threat detection and monitoring, which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

3. Major Geopolitical Developments in Cybersecurity

China’s Typhoons keep targeting American critical infrastructure
The FBI continues to warn that China’s Salt Typhoon espionage operation remains a serious and active danger to U.S. telecommunications networks. FBI Deputy Assistant Director for Cyber Intelligence stressed that “we must clearly understand the threat from Salt Typhoon actors—along with the broader Chinese intelligence apparatus and its supporting systems—is still very much alive and ongoing.” In other news, researchers recently reported that China’s Volt Typhoon campaign is still deeply entrenched inside

U.S. infrastructure.
Volt Typhoon—which focuses on pre-positioning and battlespace preparation inside vital utility sectors, remains highly active, continuing to map, infiltrate, and establish persistent footholds not only across American infrastructure but also among their allies. It is a distinct possibility that a significant number of these compromises may never be detected.

ETLM Assessment:
As noted in this CYFIRMA report, the above campaigns mark a significant evolution in China’s cyber strategy, from economic espionage to politically driven operations that threaten Western critical infrastructure. Salt Typhoon’s infiltration of telecommunications networks and Volt Typhoon’s sabotage preparations in U.S. sectors like energy and transportation reveal China’s intent to dominate cyberspace, exploiting vulnerabilities in the U.S.’s fragmented cybersecurity framework. These campaigns, leveraging sophisticated techniques and plausible deniability, pose significant risks to national security, from compromised communications to potential disruptions of military and civilian operations. The structural advantages of China’s authoritarian cyberdefense model, contrasted with the U.S.’s decentralized approach, underscore the challenges of securing privately owned systems against a state- backed actor with vast resources.

The Netherlands warns of escalating Russian cyber operations
Dutch intelligence services have issued a stark warning that Russia is ramping up its hybrid warfare tactics—including cyberattacks, acts of sabotage, and clandestine influence efforts—across Europe as part of preparations for an extended standoff with the West.

In a combined evaluation from the General Intelligence and Security Service (AIVD) and the Military Intelligence and Security Service (MIVD), the agencies noted: “Russia has demonstrated not only its ability to endure heavy casualties in Ukraine but has actually strengthened and restructured its military. Moreover, Russian forces are gearing up for the potential of direct confrontation with NATO and are engaging in deliberate actions to probe the West’s readiness to intensify the conflict.”

ETLM Assessment:
In a view repeatedly corroborated by CYFIRMA as well as the published findings of the Dutch intelligence, an outright military showdown between Russia and NATO is still viewed as improbable, but it needs to be emphasized that these hybrid methods enable Moscow to sow disruption and exert pressure on Western societies and decision-making without crossing into all-out warfare and thus limiting its political costs. Russia is not likely to ease its cyber campaign in the coming months as its war in Ukraine is coming to a halt, to the contrary.

4. Rise in Malware/Ransomware and Phishing

NightSpire Ransomware Impacts Makimura Co., Ltd.

  • Attack Type: Ransomware
  • Target Industry: Textile and Apparel
  • Target Geography: Japan
  • Ransomware: NightSpire Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
CYFIRMA observed in an underground forum that a company from Japan, Makimura Co., Ltd. (https[:]//makimura[.]co[.]jp/), was compromised by NightSpire Ransomware. Makimura Co., Ltd. is a Japanese textile trading company founded in 1904, specializing in high-quality fabrics and product development for the apparel industry. It focuses on men’s and ladies’ fashion fabrics, business/school uniforms, OEM/ODM production, and overseas sales to luxury brands in Europe and New York. The compromised dataset includes internal records, financial information, client lists, and other confidential and sensitive data belonging to the organization.

Source: Dark Web

Relevancy & Insights:

  • NightSpire employs strong encryption algorithms like AES-256 combined with RSA encryption for key protection, aligning with modern ransomware sophistication.
  • The NightSpire Ransomware group primarily targets countries such as the United States of America, India, Brazil, Spain, and the United Kingdom.
  • The NightSpire Ransomware group primarily targets industries, including Consumer Goods & Services, Professional Goods & Services, Information Technology, Materials, and Healthcare.
  • Based on the NightSpire Ransomware victims list from 1st Jan 2025 to 25th Feb 2026, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the NightSpire Ransomware victims list from 1st Jan 2025 to 25th Feb 2026 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, NightSpire is a ransomware group that emerged in early 2025, marking itself as a formidable player in the rapidly evolving ransomware landscape. Despite its recent appearance, NightSpire has already gained attention for its aggressive tactics and well-structured operations.

The Gentlemen Ransomware Impacts Sawafi

  • Attack Type: Ransomware
  • Target Industry: Oil & Gas
  • Target Geography: Saudi Arabia
  • Ransomware: The Gentlemen Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary: CYFIRMA observed in an underground forum that a company from Saudi Arabia, Sawafi(https[:]//www[.]sawafi[.]com/), was compromised by the Gentlemen Ransomware. Sawafi is a Saudi Arabian company specializing in drilling, completions, and production services tailored to enhance oil and gas performance. The data, which has been breached, has not yet appeared on the leak site, indicating that negotiations between the affected party and the ransomware group may be underway. The compromised data includes confidential and sensitive information belonging to the organization.

Source: Dark Web

Relevancy & Insights:

  • The Gentlemen is a relatively highly sophisticated ransomware-as-a-service (RaaS) group that emerged in mid-2025.
  • The Gentlemen Ransomware group primarily targets countries such as the United States of America, Brazil, Thailand, Spain, and Vietnam.
  • The Gentlemen Ransomware group primarily targets industries, including Manufacturing, Materials, Professional Goods & Services, Consumer Goods & Services, and Information Technology.
  • Based on the Gentlemen Ransomware victims list from 1st July 2025 to 25th Feb 2026, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Gentlemen Ransomware victims list from 1st July 2025 to 25th Feb 2026 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, the Gentlemen Ransomware is a highly adaptive and globally active threat that leverages dual-extortion tactics, combining data theft with file encryption. The group employs advanced evasion and persistence techniques, supports cross-platform and scalable ransomware deployment, and conducts targeted attacks across multiple industries and geographic regions. This combination of capabilities makes it a significant risk to enterprise cybersecurity defenses, particularly for organizations with limited detection and incident-response maturity.

5. Vulnerabilities and Exploits

Vulnerability in SAIL
Attack Type: Vulnerabilities & Exploits
Target Technology: Image Processing Libraries / Universal Components
Vulnerability CVE-2026-27168
CVSS Base Score: 8.8 Source
Vulnerability Type: Heap-based buffer overflow

Summary:
The vulnerability allows a remote attacker to execute arbitrary code on the target system.

Relevancy & Insights:
The vulnerability exists due to a boundary error in Sail- codecs-xwd. A remote attacker on the local network can pass specially crafted data to the application, trigger a heap-based buffer overflow, and execute arbitrary code on the target system.

Impact:
Successful exploitation of this vulnerability may result in complete compromise of the vulnerable system.

Affected Products:
https[:]//github.com/HappySeaFox/sail/security/advisories/GHSA-3g38-x2pj- mv55/#poc

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerability in SAIL introduces significant security risks to systems relying on this image processing library for parsing and handling user-supplied image files. Since SAIL is integrated across various applications and platforms, exploitation can impact multiple industries, including digital content management, media software, embedded systems, and enterprise applications that process untrusted image inputs. Ensuring the security of SAIL is critical for maintaining the integrity of image parsing workflows, preventing remote code execution, and safeguarding system stability across different environments. Therefore, addressing this vulnerability is essential to ensuring secure image processing operations, preventing compromise through malicious media files, and protecting systems across diverse sectors and geographic regions.

6. Latest Cyber-Attacks, Incidents, and Breaches

Space Bears Ransomware attacked and published the data of PT Darma Henwa Tbk Threat Actor: Space Bears Ransomware
Attack Type: Ransomware
Objective: Data Leak, Financial Gains Target Technology: Web Applications Target Industry: Mining
Target Geography: Indonesia

Business Impact:
Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that Space Bears Ransomware attacked and published the data of PT Darma Henwa Tbk(https[:]//www[.]ptdh[.]co[.]id/) on its dark web website. PT Darma Henwa Tbk is a company that specializes in mining support and excavation activities. It provides services such as metal fabrication, machinery repair, and equipment leasing. The company also engages in road and railroad construction, as well as building and civil construction. The ransomware incident resulted in the exposure of sensitive data, including employee personal information, contracts and client records, financial reports and audit documents, project and development details, Outlook email communications, and internal security reports.

Source: Dark Web

Relevancy & Insights:

  • Space Bears operates a dedicated leak site that was first identified in April 2024. This site is used to publish stolen data from victims, showcasing the group’s pivot towards data theft as a primary method of extortion.
  • Space Bears is associated with the Phobos ransomware-as-a-service (RaaS) operation. The group utilizes similar tactics and tools, including hosting stolen data on their leak site, which has been linked to the Faust operator within the Phobos ecosystem.
  • The Space Bears group employs double extortion strategies, where they not only encrypt files but also exfiltrate sensitive data before encryption. If the ransom is not paid, they threaten to leak this data publicly.

ETLM Assessment:
According to CYFIRMA’s assessment, Space Bears ransomware represents a significant threat in the evolving landscape of cybercrime. With its aggressive tactics, association with established ransomware operations like Phobos, and focus on double extortion, organizations are advised to bolster their cybersecurity measures to mitigate risks associated with such attacks. Continuous monitoring of this group’s activities will be essential for understanding their methods and potential impact on various sectors.

7. Data Leaks

Osaka Prefectural Government Data Advertised on a Leak Site Attack Type: Data leak
Target Industry: Government Target Geography: Japan Objective: Financial Gains
Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA research team has identified a post published on a well-known underground hacking forum by a threat actor operating under the alias “TelephoneHooliganism.” The actor is advertising the sale of a dataset allegedly originating from the Osaka Prefectural Government, associated with the official domain pref[.]Osaka[.]lg[.]jp.

According to the forum post, the dataset contains approximately 685,000 records comprising personal and contact data, including employee and administrative information. The actor claims the data is organized into structured sections reflecting internal operational categories.

The threat actor describes the dataset as structured into three primary categories:

1. Contacts
This section allegedly contains public service employee contact records used for internal and external communications. The fields listed in the forum post include:

  • Full names
  • Date of birth
  • Gender and nationality
  • Marital status and dependent details
  • Personal and work phone numbers
  • Personal and work email addresses
  • Residential address information
  • Account status and login metadata
  • Username and password hash
  • Language preferences and communication settings
  • Internal classification and notes

2. Payroll Records
The second dataset section reportedly contains payroll and compensation information for administrative and budgeting purposes, including:

  • Employee ID
  • Pay date
  • Salary type and salary amount
  • Salary grade
  • Allowances and bonus amounts
  • Tax category and tax withheld
  • Pension number
  • Health insurance ID

3. Service Requests
This portion allegedly includes records of citizen-initiated service requests and administrative cases handled by prefectural offices. Fields referenced include:

  • Employee ID
  • Ministry/prefecture and departmental structure
  • Division and section names
  • Job titles and employment classifications
  • Work location and tenure status
  • Personal and work contact details

The actor “TelephoneHooliganism” is offering the dataset for sale at a stated price of USD 950. The post includes sample file links to substantiate the claim and indicates willingness to conduct transactions via private messaging or escrow services.

The authenticity of the breach claim remains unverified at the time of reporting, as the information currently originates solely from the threat actor’s forum post.

Source: Underground Forums

ETLM Assessment:
The threat actor operating under the alias “TelephoneHooliganism” is assessed to be an active and technically capable group focused on data-leak operations. Multiple reliable sources have linked the group to several cybersecurity incidents involving unauthorized system intrusions and the advertisement or sale of exfiltrated information on dark web marketplaces.

Almutawa, Tanmia, and Bin Omairah’s Data Advertised on a Leak Site
Attack Type: Data leak
Target Industry: Construction & Engineering, Procurement & Construction,
Target Geography: Saudi Arabia
Objective: Data Theft, Financial Gains
Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA research team has identified a post published on a dark web forum by a user operating under the alias “Ryhem,” advertising the sale of allegedly stolen data from three companies described as contractors for Saudi Aramco.

The threat actor claims to be selling a consolidated dataset containing sensitive corporate, personnel, and infrastructure-related information. The total advertised data volume is approximately 15 GB, with an asking price of USD 40,000.

Allegedly Affected Organisations
The forum post references the following entities as impacted contractors:

  • Almutawa Mechanical Contracting Company (https[:]//www[.]almutawa[.]com[.]sa/): A Saudi Arabian general contracting, manufacturing, and services group.
  • TAMIMI Global Co. Ltd. (https[:]//www[.]tanmialtd[.]com): A Saudi Arabian contracting and engineering company.
  • Bin Omairah Holding (https[:]//binomairah[.]com/): A Saudi Arabian multi-utility infrastructure solutions and contracting company.

The actor further states that, following negotiations with one of the companies, its data was removed from the sale listing. However, no verifiable evidence supporting this claim has been provided.

Description of the Alleged Compromised Data According to the forum post, the dataset includes:
1. Personnel and HR Records

  • Resumes of employees and engineers
  • Photographs
  • Identification cards
  • Email addresses and phone numbers
  • Residential addresses
  • Work records

2. Corporate and Administrative Documents

  • Confidential agreements and contracts
  • Invoices
  • Administrative documentation

3. Infrastructure and Technical Data

  • Data maps of oil, gas, and power transmission projects
  • Engineering drawings and technical schematics
  • SCADA systems information
  • Project mapping and system architecture data
  • Documentation related to Saudi infrastructure and urban development projects
  • Maps of power transmission lines, including international export connections

The post includes preview images that appear to show engineering schematics, identification documents, and internal documentation to substantiate the claim.

Additionally, the threat actor states that a sample file containing data of approximately 1,000 personnel records is available for verification purposes.

The actor “Ryhem” is offering the data for USD 40,000 and provides external download links and encrypted contact channels for negotiation. The post encourages potential buyers to initiate contact via private messaging or secure communication platforms.

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously looking for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to gain access and steal valuable data. Subsequently, the stolen data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The threat actor operating under the alias “TelephoneHooliganism” is assessed to be an active and technically capable group focused on data-leak operations. Multiple reliable sources have linked the group to several cybersecurity incidents involving unauthorized system intrusions and the advertisement or sale of exfiltrated information on dark web marketplaces.

The group’s activities reflect the ongoing and increasingly complex threat landscape driven by underground cybercriminal ecosystems. These developments emphasize the urgent need for organizations to strengthen their security posture through continuous monitoring, integration of actionable threat intelligence, and implementation of proactive defensive measures to safeguard sensitive information and critical infrastructure.

Recommendations: Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related attacks.
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA research team has identified a post published on a well-known underground hacking forum by a user operating under the alias “TelephoneHooliganism.” The threat actor is advertising the sale of a dataset allegedly originating from the Bangkok Metropolitan Administration (BMA), associated with the official domain Bangkok[.]go[.]th.

According to the forum post, the dataset contains approximately 137,000 user contact records, including email addresses and phone numbers. The actor claims that the data is structured and categorized across multiple operational areas related to city administration and public services.

Details of the Alleged Dataset
The threat actor states that the dataset is organized into three primary sections:

1. Citizen Contact Records
The dataset allegedly includes citizen contact details used for municipal communication. The fields referenced in the post include:

  • Full name
  • Email address
  • Phone number
  • Residential address (street, province, district, subdistrict, postal code)
  • Communication preferences
  • Account status and verification details
  • National ID number
  • Date of birth
  • Gender
  • Internal CRM identifiers and metadata

2. City Service Booking Records
This section reportedly contains information related to citizen requests and bookings for city services, including:

  • Requestor details
  • Service type and category
  • Booking status and timestamps
  • Assigned officers
  • Payment details and billing references
  • Internal notes and follow-up records
  • Feedback scores and comments
  • Location data (village/block, road name, building name, province, postal code)

3. Public Health Clinic Records
The post also claims the inclusion of sensitive healthcare-related data from public health clinics within the city. Alleged fields include:

  • Patient identification information
  • Contact details
  • Medical record numbers
  • Diagnosis codes
  • Treatment plans
  • Vaccination status
  • Insurance provider and policy numbers
  • Laboratory results
  • Emergency contact information
  • Appointment history and discharge details

The actor “TelephoneHooliganism” is offering the dataset for sale at a stated price of USD 1,200 and has shared sample file links to support the claim. The post suggests a willingness to use escrow or intermediaries for transaction purposes.

The structured nature of the described dataset, including CRM-related fields and internal record identifiers, may indicate potential unauthorized access to backend administrative systems rather than a simple surface-level scrape.

The authenticity of the breach claim remains unverified at the time of reporting, as the information currently originates solely from the threat actor’s forum post.

Source: Underground Forums

RECOMMENDATIONS

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Deploy a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence, providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions, remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Ensure that detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies should be continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security controls, such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.