Self Assessment

Weekly Intelligence Report – 29 August 2025

Published On : 2025-08-28
Share :
Weekly Intelligence Report – 29 August 2025

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware
Target Technologies: Windows

Introduction
CYFIRMA Research and Advisory Team has found LockBeast Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

LockBeast Ransomware
Researchers identified LockBeast as a ransomware variant designed to encrypt user data and extort payment through threats of both data loss and exposure. Once executed, it locks files using strong cryptographic algorithms, appends a victim specific identifier along with the “.lockbeast” extension, and generates a ransom note titled README.TXT. The operators behind this malware also claim to have exfiltrated sensitive data during the attack, combining encryption with data theft to increase pressure on victims.

Screenshot of files encrypted by ransomware (Source: Surface Web)

The ransom note informs victims that documents, databases, source code, and other critical files have been encrypted and that confidential information such as transaction records, personal data, and card details have been stolen. Victims are instructed to contact the attackers through privacy-focused messengers (Session and Tox) and warned not to rename encrypted files or attempt third-party decryption. A strict seven-day deadline is imposed, after which the attackers threaten to publicly release the stolen information. This combination of encryption and data leak threats forms the basis of LockBeast’s double-extortion strategy.

The appearance of LockBeast’s ransom note(“README.TXT”) (Source: Surface Web)

Following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Execution T1129 Shared Modules
T1059 Command and Scripting Interpreter
T1047 Windows Management Instrumentation
Privilege Escalation T1134 Access Token Manipulation
Defense Evasion T1027.005 Obfuscated Files or Information: Indicator Removal from Tools
T1222 File and Directory Permissions Modification
T1134 Access Token Manipulation
Credential Access T1056.001 Input Capture: Keylogging
Discovery T1082 System Information Discovery
T1057 Process Discovery
T1518 Software Discovery
T1135 Network Share Discovery
T1083 File and Directory Discovery
T1007 System Service Discovery
T1614.001 System Location Discovery : System Language Discovery
T1087 Account Discovery
T1033 System Owner/User Discovery
Collection T1056.001 Input Capture: Keylogging
T1074 Data Staged

Relevancy and Insights:

  • The ransomware primarily affects the Windows operating system, which is commonly utilized in enterprise environments across multiple industries.
  • calls-wmi: The ransomware utilizes Windows Management Instrumentation (WMI), a powerful feature in Windows that allows it to quietly gather system data, manage processes, or run commands. This method is often employed to evade detection and perform reconnaissance within the infected system.
  • shadow copy deletion: The ransomware issues WMI commands to enumerate and remove Windows shadow copies. These shadow copies are used by the operating system for system restore and file recovery. By deleting them, the malware ensures victims cannot roll back to clean states or recover files through built-in features, increasing the pressure to comply with ransom demands.

ETLM Assessment:
CYFIRMA’s analysis highlights that LockBeast ransomware operates with a clear focus on control and intimidation. Beyond file encryption and ransom demands, its operators design the campaign to exert psychological pressure by combining data denial with reputational threats. The attackers frame negotiations as a structured process, offering limited proof of decryption and stolen data access to build credibility, while simultaneously warning of severe consequences if victims delay contact. This approach ensures that the pressure is constant, and victims feel cornered into compliance.

The ransom communication is tightly managed, relying on anonymous messengers like Session and Tox, which reduces exposure to the attackers and limits the victim’s ability to trace interactions. The seven-day deadline is not only a technical point but also a strategic element, reinforcing urgency and limiting decision-making time for the target organization. This demonstrates an operational model where timing, communication control, and leverage of stolen information are central to the attack’s impact. In the future, LockBeast could evolve by adopting additional anonymized communication channels, expanding its targeting scope across industries, and incorporating more aggressive leak site strategies to amplify pressure on victims.

Sigma rule:
title: Uncommon File Created In Office Startup Folder tags:
– attack.resource-development
– attack.t1587.001 logsource:
product: windows category: file_event
detection: selection_word_paths:
– TargetFilename|contains: ‘\Microsoft\Word\STARTUP’
– TargetFilename|contains|all:
– ‘\Office’
– ‘\Program Files’
– ‘\STARTUP’
filter_exclude_word_ext: TargetFilename|endswith:
– ‘.docb’ # Word binary document introduced in Microsoft Office 2007
– ‘.docm’ # Word macro-enabled document; same as docx, but may contain macros and scripts
– ‘.docx’ # Word document
– ‘.dotm’ # Word macro-enabled template; same as dotx, but may contain macros and scripts
– ‘.mdb’ # MS Access DB
– ‘.mdw’ # MS Access DB
– ‘.pdf’ # PDF documents
– ‘.wll’ # Word add-in
– ‘.wwl’ # Word add-in selection_excel_paths:
– TargetFilename|contains: ‘\Microsoft\Excel\XLSTART’
– TargetFilename|contains|all:
– ‘\Office’
– ‘\Program Files’
– ‘\XLSTART’
filter_exclude_excel_ext: TargetFilename|endswith:
– ‘.xll’
– ‘.xls’
– ‘.xlsm’
– ‘.xlsx’
– ‘.xlt’
– ‘.xltm’
– ‘.xlw’ filter_main_office_click_to_run:
Image|contains: ‘:\Program Files\Common Files\Microsoft Shared\ClickToRun\’
Image|endswith: ‘\OfficeClickToRun.exe’ filter_main_office_apps:
Image|contains:
– ‘:\Program Files\Microsoft Office\’
– ‘:\Program Files (x86)\Microsoft Office\’ Image|endswith:
– ‘\winword.exe’
– ‘\excel.exe’
condition: ((selection_word_paths and not filter_exclude_word_ext) or (selection_excel_paths and not filter_exclude_excel_ext)) and not 1 of filter_main_*
falsepositives:
– False positive might stem from rare extensions used by other Office utilities. level: highlevel: high (Source: Surface Web)

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.

STRATEGIC RECOMMENDATION

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATION

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATION

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Trending Malware of the Week

Type: Loader| Objectives: Malware Distribution |Target Technology: Windows OS |Target Geographies: Taiwan, Mexico

CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malwares that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week “QuirkyLoader” is trending.

About Malware QuirkyLoader
Researchers have identified QuirkyLoader, a newly emerging malware loader that has been active since late 2024, which enables cybercriminals to deliver a wide range of threats such as infostealers and remote access trojans. The tool’s key strength is its versatility, serving as a multi-purpose delivery channel for diverse malware families such as Agent Tesla, AsyncRAT, FormBook, MassLogger, Remcos, Rhadamanthys, and Snake Keylogger. Its reach has already extended beyond borders, with campaigns in July 2025 targeting Taiwan with Snake Keylogger and Mexico with Remcos RAT and AsyncRAT, demonstrating how the same tool can support very different attack strategies. The infection chain typically begins with a malicious email attachment that conceals harmful code within legitimate files, allowing attackers to trick victims into triggering the loader.

Once triggered, QuirkyLoader initiates a hidden process that ultimately delivers the final malicious payload, with its design making it appear more like legitimate software and therefore harder to detect.

Attack Method
The attack sequence begins with a carefully crafted email containing a malicious archive disguised as a legitimate file. When opened, this archive leverages a trusted application as cover, discreetly loading hidden malicious components to be loaded without raising suspicion. These components then deploy the final payload by injecting it into trusted system processes, allowing the malware to blend seamlessly into the operating environment. QuirkyLoader strengthens this process with uncommon decryption methods and a loader design that closely resembles genuine software, making it more difficult for security tools to detect. This layered approach not only increases the chances of successful infection but also provides attackers with a dependable method for deploying a wide range of malware families across targeted systems.

Following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Initial Access T1566.001 Phishing: Spearphishing Attachment
Execution T1203 Exploitation for Client Execution
Persistence T1112 Modify Registry
Persistence T1542.003 Pre-OS Boot: Bootkit
Persistence T1574.001 Hijack Execution Flow: DLL
Privilege Escalation T1055 Process Injection
Privilege Escalation T1574.001 Hijack Execution Flow: DLL
Defense Evasion T1014 Rootkit
Defense Evasion T1055 Process Injection
Defense Evasion T1112 Modify Registry
Defense Evasion T1221 Template Injection
Defense Evasion T1497 Virtualization/Sandbox Evasion
Defense Evasion T1542.003 Pre-OS Boot: Bootkit
Defense Evasion T1564.001 Hide Artifacts: Hidden Files and Directories
Defense Evasion T1574.001 Hijack Execution Flow: DLL
Discovery T1018 Remote System Discovery
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1497 Virtualization/Sandbox Evasion
Discovery T1518.001 Software Discovery: Security Software Discovery
Command and Control T1071 Application Layer Protocol
Command and Control T1573 Encrypted Channel
Impact T1496 Resource Hijacking

INSIGHTS

  • QuirkyLoader reflects how cybercriminals increasingly rely on modular tools to maximize efficiency in their operations. By acting as a flexible delivery mechanism, it allows attackers to experiment with different malware combinations and adapt their campaigns without rebuilding from scratch. This adaptability reduces their workload while broadening the range of victims they can target, making loaders like QuirkyLoader highly attractive in the underground economy.
  • Another notable aspect is the use of deception at every stage of its operation. From disguising malicious files within seemingly legitimate archives to blending its presence into trusted processes, QuirkyLoader thrives on misdirection. This reliance on disguise not only helps it avoid detection but also highlights how modern malware emphasizes stealth and persistence over noisy, destructive tactics that would quickly raise alarms.
  • Finally, QuirkyLoader’s appearance in multiple regions demonstrates how such tools can serve both targeted attacks and broader, opportunistic campaigns. Its use in different geographies shows that the same malware is adaptable enough to fit into highly specific attacks against organizations, while also being effective in indiscriminate campaigns against random individuals. This dual utility underscores its significance as a threat enabler, serving the goals of both sophisticated attackers and lower-level cybercriminals.

ETLM ASSESSMENT
From the ETLM perspective, CYFIRMA anticipates that QuirkyLoader’s emergence signals a future in which malware loaders will play a pivotal role in shaping the broader threat landscape, serving as foundational tools for increasingly coordinated and large-scale cybercrime operations. What may originate as localized campaigns has the potential to rapidly expand across regions, elevating risks from isolated incidents to global challenges. As these loaders become more adaptable and sophisticated, they will foster a dynamic and unpredictable environment, where threats continually evolve and reemerge in new forms, creating sustained uncertainty for the digital ecosystem.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

YARA Rule
rule QuirkyLoader_Indicators
{
meta:
description = “Detects QuirkyLoader malware indicators” author = “CYFIRMA”
malware_family = “QuirkyLoader” strings:
// SHA256 File Hashes
$sha256_hash_1 = “011257eb766f2539828bdd45f8aa4ce3c4048ac2699d988329783290a7b4a0d3”
$sha256_hash_2 = “0ea3a55141405ee0e2dfbf333de01fe93c12cf34555550e4f7bb3fdec2a7673b”
$sha256_hash_3 = “a64a99b8451038f2bbcd322fd729edf5e6ae0eb70a244e342b2f8eff12219d03”
$sha256_hash_4 = “9726e5c7f9800b36b671b064e89784fb10465210198fbbb75816224e85bd1306”
$sha256_hash_5 = “a1994ba84e255eb02a6140cab9fc4dd9a6371a84b1dd631bd649525ac247c111”
$sha256_hash_6 = “d954b235bde6ad02451cab6ee1138790eea569cf8fd0b95de9dc505957c533cd”
$sha256_hash_7 = “5d5b3e3b78aa25664fb2bfdbf061fc1190310f5046d969adab3e7565978b96ff”
$sha256_hash_8 = “6f53c1780b92f3d5affcf095ae0ad803974de6687a4938a2e1c9133bf1081eb6”
$sha256_hash_9 = “ea65cf2d5634a81f37d3241a77f9cd319e45c1b13ffbaf5f8a637b34141292eb”
$sha256_hash_10 = “1b8c6d3268a5706fb41ddfff99c8579ef029333057b911bb4905e24aacc05460”
$sha256_hash_11 = “d0a3a1ee914bcbfcf709d367417f8c85bd0a22d8ede0829a66e5be34e5e53bb9”
$sha256_hash_12 = “b22d878395ac2f2d927b78b16c9f5e9b98e006d6357c98dbe04b3fd78633ddde”
$sha256_hash_13 = “a83aa955608e9463f272adca205c9e1a7cbe9d1ced1e10c9d517b4d1177366f6”
$sha256_hash_14 = “3391b0f865f4c13dcd9f08c6d3e3be844e89fa3afbcd95b5d1a1c5abcacf41f4”
$sha256_hash_15 = “b2fdf10bd28c781ca354475be6db40b8834f33d395f7b5850be43ccace722c13”
$sha256_hash_16 = “bf3093f7453e4d0290511ea6a036cd3a66f456cd4a85b7ec8fbfea6b9c548504”
$sha256_hash_17 = “97aee6ca1bc79064d21e1eb7b86e497adb7ece6376f355e47b2ac60f366e843d”
$sha256_hash_18 = “b42bc8b2aeec39f25babdcbbdaab806c339e4397debfde2ff1b69dca5081eb44”
$sha256_hash_19 = “5aaf02e4348dc6e962ec54d5d31095f055bd7fb1e58317682003552fd6fe25dc”
$sha256_hash_20 = “8e0770383c03ce69210798799d543b10de088bac147dce4703f13f79620b68b1”
$sha256_hash_21 = “049ef50ec0fac1b99857a6d2beb8134be67ae67ae134f9a3c53699cdaa7c89ac”
$sha256_hash_22 = “cba8bb455d577314959602eb15edcaa34d0b164e2ef9d89b08733ed64381c6e0”
// Domains
$domain_1 = “catherinereynolds.info”
$domain_2 = “mail.catherinereynolds.info”
// IP Addresses
$ip_1 = “157.66.22.11”
$ip_2 = “103.75.77.90”
$ip_3 = “161.248.178.212”
condition:
any of ($ip*) or
any of ($domain*) or any of ($sha256*)
}

Recommendations:

STRATEGIC:

  • Maintain an up-to-date inventory of all active software used within the organization and perform regular self-audit of workstations, servers, laptops, mobile devices to identify unauthorized/ restricted software.
  • Configure organization’s intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defence mechanisms in place to alert on — and upon review, consider blocking connection attempts to and from — the external IP addresses and domains listed in the appendix.

MANAGEMENT:

  • Incorporate a written software policy that educates employees on good practices in relation to software and potential implications of downloading and using restricted software.
  • Security Awareness training should be mandated for all company employees. The training should ensure that employees:
  • Avoid downloading and executing files from unverified sources.
  • Move beyond the traditional model of security awareness towards Improved Simulation and training exercises that mimic real attack scenarios, account for behaviors that lead to a compromise, and are measured against real attacks the organization receives.

TACTICAL RECOMMENDATIONS

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Exert caution when opening email attachments or clicking on embedded links supplied via email communications.
  • Enforce policies to validate third-party software before installation.
  • Add the Yara rules for threat detection and monitoring, which will help to detect anomalies in log events and identify and monitor suspicious activities.

CYFIRMA’S WEEKLY INSIGHTS

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Vulnerabilities & Exploits, Malware implant, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Qilin Ransomware, World Leaks Ransomware | Malware – QuirkyLoader
  • Qilin Ransomware– One of the ransomware groups.
  • World Leaks Ransomware – One of the ransomware groups.
    Please refer to the trending malware advisory for details on the following:
  • Malware – QuirkyLoader
    Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

Silk Typhoon (HAFNIUM): A Deep Dive into China-Linked Cyber Operations

  • Threat Actor: Silk Typhoon aka (Hafnium, Murky Panda)
  • Attack Type: Connection Proxy, Credential Dumping, Exploitation of Vulnerabilities
  • Objective: Information theft, Espionage
  • Suspected Target Technology: Office Suites Software, Operating System, Web Application, Citrix Netscaler, Microsoft Sharepoint, Commvault Web Server
  • Suspected Target Geography: United States, Canada, Mexico.
  • Suspected Target Industries: Defense Contractors, Higher Education Institutions, NGOs, Policy Think Tanks, Law Firms, Government, Technology, Professional Services, Telecommunications.
  • Business Impact: Data Theft, Operational Disruption, Reputational Damage

About the Threat Actor
Silk Typhoon, also known as HAFNIUM, is a Chinese state-sponsored cyber espionage group first recognized as active in January 2021. The group focuses on stealing sensitive information for state-level espionage and has targeted sectors like higher education, military defense, IT, health, government, and critical infrastructure worldwide. They became widely known for a high-profile attack on Microsoft Exchange Server in early 2021, exploiting zero-day vulnerabilities to install backdoors and steal data.

Previously, the group has compromised victims by targeting vulnerabilities in internet- facing servers and has leveraged legitimate open-source frameworks—such as Covenant—for command-and-control operations. Once inside a network, HAFNIUM typically exfiltrates data to public file-sharing platforms like MEGA. When it comes to campaigns unrelated to these vulnerabilities, Microsoft has observed HAFNIUM interacting with victim Office 365 tenants. Even though they are unsuccessful in compromising customer accounts, this kind of reconnaissance activity enables the adversary to identify more details about their targets’ environments.

Details on Exploited Vulnerabilitie

TTPs based on MITRE ATT&CK Framework

Tactic ID Technique
Reconnaissance T1589.002 Gather Victim Identity Information: Email Addresses
Reconnaissance T1592.004 Gather Victim Host Information: Client Configurations
Reconnaissance T1590 Gather Victim Network Information
Reconnaissance T1590.005 Gather Victim Network Information: IP Addresses
Reconnaissance T1593.003 Search Open Websites/Domains: Code Repositories
Resource Development T1583.003 Acquire Infrastructure: Virtual Private Server
Resource Development T1583.005 Acquire Infrastructure: Botnet
Resource Development T1583.006 Acquire Infrastructure: Web Services
Resource Development T1584.005 Compromise Infrastructure: Botnet
Initial Access T1199 Trusted Relationship
Initial Access T1190 Exploit Public-Facing Application
Initial Access T1078.003 Valid Accounts: Local Accounts
Initial Access T1078.004 Valid Accounts: Cloud Accounts
Execution T1059.001 Command and Scripting Interpreter: PowerShell
Execution T1059.003 Command and Scripting Interpreter: Windows Command Shell
Persistence T1136.002 Create Account: Domain Account
Persistence T1098 Account Manipulation
Persistence T1078.003 Valid Accounts: Local Accounts
Persistence T1505.003 Server Software Component: Web Shell
Persistence T1078.003 Valid Accounts: Local Accounts
Persistence T1078.004 Valid Accounts: Cloud Accounts
Privilege Escalation T1078.003 Valid Accounts: Local Accounts
Privilege Escalation T1078.004 Valid Accounts: Cloud Accounts
Privilege Escalation T1098 Account Manipulation
Privilege Escalation T1068 Exploitation for Privilege Escalation
Defense Evasion T1564.001 Hide Artifacts: Hidden Files and Directories
Defense Evasion T1070.001 Indicator Removal: Clear Windows Event Logs
Defense Evasion T1218.011 System Binary Proxy Execution: Rundll32
Defense Evasion T1550.001 Use Alternate Authentication Material: Application Access Token
Defense Evasion T1078.003 Valid Accounts: Local Accounts
Defense Evasion T1078.004 Valid Accounts: Cloud Accounts
Credential Access T1110.003 Brute Force: Password Spraying
Credential Access T1555.006 Credentials from Password Stores: Cloud Secrets Management Stores
Credential Access T1003.001 OS Credential Dumping: LSASS Memory
Credential Access T1003.003 OS Credential Dumping: NTDS
Discovery T1083 File and Directory Discovery
Discovery T1057 Process Discovery
Discovery T1018 Remote System Discovery
Discovery T1016 System Network Configuration Discovery
Discovery T1016.001 System Network Configuration Discovery: Internet Connection Discovery
Discovery T1033 System Owner/User Discovery
Lateral Movement T1550.001 Use Alternate Authentication Material: Application Access Token
Collection T1560.001 Archive Collected Data: Archive via Utility
Collection T1119 Automated Collection
Collection T1530 Data from Cloud Storage
Collection T1213.002 Data from Information Repositories: Sharepoint
Collection T1005 Data from Local System
Collection T1114.002 Email Collection: Remote Email Collection
Command and Control T1071.001 Application Layer Protocol: Web Protocols
Command and Control T1132.001 Data Encoding: Standard Encoding
Command and Control T1105 Ingress Tool Transfer
Command and Control T1095 Non-Application Layer Protocol
Exfiltration T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage

Latest Developments Observed
The threat actor is suspected of targeting government, technology, academic, legal, and professional services entities in North America by exploiting n-day and zero-day vulnerabilities, including CVE-2023-3519 affecting Citrix NetScaler products and CVE-2025- 3928 affecting Commvault Web Server. The motive is likely driven by intelligence- collection objectives to gain access to sensitive information.

ETLM Insights
Silk Typhoon is a highly sophisticated, state-linked Chinese advanced persistent threat (APT) group that has evolved traditional espionage tactics by focusing on stealth-driven, supply-chain–oriented compromises. The group demonstrates the ability to exploit trusted IT partners, maintain a low operational footprint with minimal forensic evidence, and seamlessly pivot across both on-premises and cloud environments—significantly elevating its risk profile.

Unlike ransomware operators, Silk Typhoon avoids overt disruptions. Instead, it selectively exfiltrates sensitive data and may discreetly approach victims with offers to suppress disclosure, effectively combining espionage with covert extortion. The group’s operations often target industrial and government networks, leveraging persistent, low-noise intrusions. Notably, it frequently removes forensic artefacts to obscure detection and rapidly re-establishes access even after remediation efforts, underscoring its resilience and advanced tradecraft.

YARA Rules
rule SilkTyphoon_IOC_Detection
{
meta:
author = “CYFIRMA”
description = “Detects references to Hafnium-associated CVEs, IPs, and domains” date = “2025-08-25”
threat_actor = “Silk Typhoon (HAFNIUM)” strings:
// CVE references
$cve1 = “CVE-2021-26855”
$cve2 = “CVE-2021-26858”
$cve3 = “CVE-2021-27065”
$cve4 = “CVE-2021-26857”
$cve5 = “CVE-2020-0688”
$cve6 = “CVE-2025-3928”
$cve7 = “CVE-2023-3519”
// IP addresses
$ip1 = “111.7.96.137”
$ip2 = “111.7.96.133”
$ip3 = “36.32.3.73”
$ip4 = “36.32.3.35”
$ip5 = “71.6.135.131”
$ip6 = “80.82.77.139”
$ip7 = “36.32.3.180”
// Domains
$domain1 = “rambler.ru”
$domain2 = “remotewd.com”
$domain3 = “wikipedia.org”
$domain4 = “soundsgroovyobx.com” condition:
any of ($cve*) or any of ($ip*) or any of ($domain*)
}

Recommendations Strategic

  • Deploy Zero Trust Policy that leverages tools like security information management, advanced security analytics platforms, security user behaviour analytics, and other analytics systems to help the organization’s security personnel observe in real-time what is happening within their networks so they can orient defences more intelligently.
  • Block exploit-like behaviour. Monitor endpoints memory to find behavioural patterns that are typically exploited, including unusual process handle requests. These patterns are features of most exploits, whether known or new. This will be able to provide effective protection against zero-day/critical exploits and more by identifying such patterns.
  • Establish comprehensive identification and prioritization of cyber risks associated with third-party vendors and services through periodic risk assessments, vulnerability assessments, and system reviews.

Management

  • Regularly reinforce awareness of unauthorized attempts with end-users across the environment and emphasize the human weakness in mandatory information security training sessions.
  • Strengthen boundary defense, such as network segmentation, and have a strong access management capability in line with the Principle of Least Privilege (POLP) that can assist in mitigating cyberattacks.
  • A data breach prevention plan must be developed considering:
    1. The type of data being handled by the company.
    2. The treatment given.
    3. Where and how the data is stored.
    4. If there is an obligation to notify the local authority.

Tactical

  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.
  • Enable network traffic/security monitoring, security incident detection, notification, and alerting by leveraging SIEM solutions.
  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Add the YARA rule for threat detection and monitoring, which will help to detect anomalies in log events, and identify and monitor suspicious activities.

3. Major Geopolitical Developments in Cybersecurity

North Korean hackers targeting embassies
Researchers are monitoring a North Korea-linked spear phishing campaign targeting European embassies and foreign ministries in Seoul. The phishing emails included PDF attachments crafted to deploy XenoRAT malware, utilizing the GitHub API for command- and-control. The campaign shares similarities with prior Kimsuky APT activities, but timing patterns suggest the threat actors may be based in China. This could indicate North Korean operatives working from China, a Chinese APT mimicking Kimsuky tactics, or a joint operation using Chinese resources for DPRK intelligence goals. The researchers attribute the campaign to Kimsuky with medium confidence, noting the operators likely operate from China.

ETLM Assessment:
North Korean IT workers, often posing as legitimate remote employees, have been reported to operate from China to generate revenue for the regime. These workers, sometimes linked to hacking groups, engage in activities like app development and web scraping while secretly conducting cyberattacks. For example, a 2023 report noted that North Korean hackers receive vocational training in Shenyang to deploy malware, enhancing their capabilities before returning to North Korea or operating from Chinese outposts. The city of Shenyang has been noted as a hub for such activities due to its proximity to North Korea and internet access. However, in this case, the attacks seem to present a classic case of cyber espionage, and it is not clear if it presents a case of North Korean hackers using Chinese infrastructure, a joint project with China, or a case of Chinese hackers hiding their activity behind known North Korean TTPs.

4. Rise in Malware/Ransomware and Phishing

Qilin Ransomware Impacts Nissan CBI

  • Attack Type: Ransomware
  • Target Industry: Automotive
  • Target Geography: Japan
  • Ransomware: Qilin Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Japan, Nissan CBI, was compromised by Qilin Ransomware. The “Nissan Creative Box” refers to a design studio in Tokyo, previously known as a satellite design base for Nissan, and is now part of the larger Nissan design network. The studio also houses a design team that works on a variety of Nissan’s projects, including concept vehicles and production models. The ransomware group claims to have exfiltrated 4TB of data, including 3D design files, reports, photographs, videos, and various documents pertaining to Nissan automobiles.

Source: Dark Web

Relevancy & Insights:

  • The Qilin Ransomware group primarily targets countries such as the United States of America, Canada, France, the United Kingdom, and Italy.
  • The Qilin Ransomware group primarily targets industries, including Manufacturing, Professional Goods & Services, Healthcare, Information Technology, and Consumer Goods & Services.
  • Based on the Qilin Ransomware victims list from 1st Jan 2025 to 26th August 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Qilin Ransomware victims list from 1st Jan 2025 to 26th August 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Qilin ransomware poses a significant threat to organizations of all sizes. Its evolving tactics, including double extortion (data encryption and leak threats), cross-platform capabilities (Windows and Linux, including VMware ESXi), and focus on speed and evasion, make it a particularly dangerous actor.
World Leaks Ransomware Impacts Nikke Co., Ltd.

  • Attack Type: Ransomware
  • Target Industry: Textiles & Apparel Manufacturing
  • Target Geography: Japan
  • Ransomware: World Leaks Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Japan, Nikke Co., Ltd (https[:]//www[.]nikke[.]co[.]jp/), was compromised by World Leaks Ransomware. Nikke Co., Ltd. (The Japan Wool Textile Co., Ltd.), headquartered in Tokyo, is a leading global textile maker specializing in wool spinning, weaving, dyeing, and the development of high-performance, eco-friendly fabrics. The company has diversified into branded apparel, biotech-driven fiber innovation, real estate leasing, and digital manufacturing via IoT. The compromised data consists of confidential and sensitive information related to the organization.

Source: Dark Web

Relevancy & Insights:

  • World Leaks Ransomware group emerged in January 2025 as a rebrand of the Hunters International ransomware operation, shifting its focus from file encryption to solely stealing sensitive data and threatening to leak it unless a ransom is paid.
  • The World Leaks ransomware group primarily targets countries such as the United States of America, Belgium, Canada, Spain, and Germany.
  • The World Leaks ransomware group primarily targets industries, including Healthcare, Manufacturing, Professional Goods & Services, Information Technology, and Real Estate & Construction.
  • Based on the World Leaks ransomware victims list from 1st Jan 2025 to 26th August 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the World Leaks ransomware victims list from 1st Jan 2025 to 26th August 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, World Leaks represents the newest phase in ransomware evolution—moving towards data-centric, extortion-only operations led by established cybercriminal actors, with significant implications for organizations’ digital risk profiles.

5. Vulnerabilities and Exploits

Vulnerability in Intel PROSet/Wireless WiFi

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Hardware solutions
  • Vulnerability: CVE-2025-20625
  • CVSS Base Score: 7.4 Source
  • Vulnerability Type: Improper Check for Unusual or Exceptional Conditions
  • Summary: The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

Relevancy & Insights:
The vulnerability exists due to an improper condition check.

Impact:
A remote attacker on the local network can send specially crafted data to the application and perform a denial of service (DoS) attack.

Affected Products:
https[:]//www[.]intel[.]com/content/www/us/en/security- center/advisory/intel-sa-01292.html

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies

ETLM Assessment
Vulnerabilities in Intel PROSet/Wireless WiFi software can be critical because this suite manages wireless network connections and drivers on Intel-based systems. Exploitation could allow attackers to escalate privileges, execute arbitrary code, or disrupt wireless connectivity, potentially exposing sensitive data or enabling lateral movement in enterprise networks. This affects a broad user base, including home users, enterprises, and industries relying on Intel wireless adapters for connectivity.

Regularly updating Intel PROSet/Wireless drivers, following Intel security advisories, and limiting unnecessary administrative privileges are essential to reduce the risk of compromise.

6. Latest Cyber-Attacks, Incidents, and Breaches

Crypto24 Ransomware attacked and published the data of Palmgold Management Sdn Bhd

  • Threat Actor: Crypto24 Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Gambling
  • Target Geography: Malaysia
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that Crypto24 Ransomware attacked and published the data of the Palmgold Management Sdn Bhd (https[:]//palmgold-mgmt[.]com/) on its dark web website. Palmgold Management Sdn Bhd is a leading Malaysian gambling company. The ransomware attack on Palmgold Management resulted in a significant breach of 500GB of the company’s most sensitive and business-critical data. The stolen information originated from both the Casino and Credit divisions.

The breach of the Casino Division exposed the full operational database of over 60,000 members, which contained a wealth of information, including personally identifiable information (PII), jackpot and play history, betting patterns, and machine configurations. Also compromised were internal analytics from Power BI dashboards, confidential finance, HR, and IT documents, and the complete contents of scanner shares from all company branches. Furthermore, the attackers gained access to proprietary operational logic, such as promotion formulas, game- specific revenue models, slot machine volatility settings, player-tier betting analytics, risk thresholds, fraud alert triggers, and blacklist criteria. The Credit Division’s breach was equally severe, with the attackers obtaining all customer Know Your Customer (KYC) information and detailed banking and cash transaction records.

Source: Dark Web

Relevancy & Insights:

  • Crypto24 is a ransomware variant that emerged in mid-2024 and became notable for its aggressive, rapid attacks and use of the classic double-extortion technique.
  • Crypto24 operates a Ransomware-as-a-Service (RaaS) platform, inviting affiliates to spread the malware in exchange for a share of the profits. It promises fast monetary return for affiliates, with most attacks executed and payloads delivered in under six hours from initial compromise.

ETLM Assessment:
According to CYFIRMA’s assessment, Crypto24 is a high-profile ransomware group known for rapid, high-volume data theft, fast encryption, and aggressive pressure tactics that combine classic ransom demands with sensitive data leaks.

Organizations in Asia have been primary targets, with attacks resulting in the exfiltration and exposure of terabytes of sensitive information. Recovery without payment is rarely feasible, underscoring the need for robust defense and backup strategies.

7. Data Leaks

Indonesian Web Development Firm ‘Wait What Web’ Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: Information Technology
  • Target Geography: Indonesia
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed that a threat actor has allegedly leaked the database of Wait What Web, a web development company based in Bandung, Indonesia. The company, which specializes in creating digital solutions for branded clients, was targeted in a recent cyberattack, with the data subsequently published on a dark web forum for download. The full dataset is said to be 4.5 GB and allegedly contains records for 17,468 users.

The compromised data appears to stem from a user database and includes a variety of sensitive personal information. The threat actor also listed several domains, purportedly belonging to clients of Wait What Web, suggesting their information may also be impacted by this breach. The leaked information allegedly includes:

  • User login credentials
  • Hashed passwords
  • Usernames and display names
  • Email addresses
  • User URLs
  • Registration dates and activation keys

Source: Underground Forums

Saudi Arabian Tech Company DIGO’s Data advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Information Technology
  • Target Geography: Saudi Arabia
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team has identified a threat actor, “N1KA,” who has allegedly leaked the database of DIGO[.]SA, a digital marketing and web services company based in Riyadh, Saudi Arabia. The data was posted on a dark web forum, exposing sensitive information. DIGO[.]SA, which specializes in developing digital technologies and innovative projects for the Saudi market, is now at the center of a significant data security incident. The breach reportedly contains information related to both clients and job applicants, highlighting the potential impact on individuals who have interacted with the company.

The compromised database allegedly contains 11,621 rows of data. An analysis of the leaked sample reveals two separate datasets. One set contains a list of email addresses, while the other includes highly sensitive personal information seemingly from job applications. The exposure of this data could lead to various malicious activities, including phishing attacks, identity theft, and other forms of fraud targeting the individuals whose information was compromised.

The leaked data allegedly includes the following:

  • Full Name
  • Email Address
  • Phone Number
  • Home Address
  • Job Title
  • Business and Portfolio Links
  • Paths to uploaded PDF files, likely containing resumes (CVs)

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously scouring for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to illicitly gain access and steal valuable data. Subsequently, the pilfered data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The threat actor identified as “N1KA” has recently gained attention as a highly active group specializing in data leaks. Reliable sources have connected the group to multiple security breaches involving unauthorized system access and the attempted sale of exfiltrated data on dark web marketplaces. N1KA’s ongoing operations highlight the evolving and persistent nature of cyber threats emerging from underground forums. These incidents underscore the critical importance for organizations to strengthen their cybersecurity posture through continuous monitoring, advanced threat intelligence, and proactive defense strategies to protect sensitive data and infrastructure.

Recommendations: Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related attacks.
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA Research team observed that a threat actor is allegedly selling what they describe as “full ESXi root + DA access” to a Vietnamese private company.
According to a post on a cybercrime forum dated August 25, 2025, the initial access broker is offering complete administrative control over the company’s network for $2,000. The seller did not name the company but provided screenshots of an internal IT environment as proof of their claims to potential buyers.

The package for sale allegedly includes the highest level of privileges, specifically full root access to VMware ESXi servers and Domain Administrator (DA) credentials for the Active Directory, in addition to MSSQL admin access. This level of compromise would grant a buyer total control, enabling them to exfiltrate sensitive corporate data, conduct espionage, or deploy ransomware. The seller suggested this last possibility, noting in their post that the network is “all ready to be locked up.”

Source: Underground Forums

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Delay a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies and continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security control such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

Geography-Wise Graph

Industry-Wise Graph

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.