Weekly Intelligence Report – 15 May 2026

Published On : 2026-05-15
Share :
Weekly Intelligence Report – 15 May 2026

Ransomware In Focus

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and The CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple industries, geographies, and technologies that could be relevant to your organization.

Type: Ransomware
Target Technologies: Windows OS

Introduction:
CYFIRMA’s Research and Advisory Team has found Rex Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

Rex Ransomware
Rex ransomware was identified as a ransomware strain that encrypts files on compromised systems and appends the “.rex48” extension to affected filenames, although the numeric suffix may vary depending on the variant. For example, files such as “1.jpg” and “2.png” are renamed to “1.jpg.rex48” and “2.png.rex48”. After completing the encryption process, the malware creates an HTML ransom note named “RANSOM_NOTE.html”. The ransomware also claims to have exfiltrated confidential data from the victim’s network, indicating a double-extortion attack designed to pressure organizations into paying the ransom.

Screenshot: File encrypted by ransomware (Source: Surface Web)

The ransom note states that the victim’s company network has been penetrated and warns against using third-party recovery tools, modifying encrypted files, or renaming them, claiming such actions could permanently corrupt the data. The attackers claim that confidential and personal information has been collected and stored on a private server, with threats to publicly release or sell the data if payment is not made. Victims are offered free decryption of 2–3 non-important files as proof that recovery is possible and are instructed to contact the operators through the provided email addresses or Tor- based chat service. The note also states that the ransom demand will increase if contact is not established within 72 hours.

Screenshot: The appearance of Rex’s Ransom Note (Source: Surface Web)

Screenshot: The appearance of Rex’s TOR chat window (Source: Surface Web)

The following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Execution T1106 Native API
Execution T1574 Hijack Execution Flow
Privilege Escalation T1055 Process Injection
Credential Access T1003 OS Credential Dumping
Credential Access T1552 Unsecured Credentials
Credential Access T1552.001 Unsecured Credentials: Credentials In Files
Discovery T1012 Query Registry
Discovery T1033 System Owner/User Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1518 Software Discovery
Collection T1005 Data from Local System
Collection T1074 Data Staged
Collection T1114 Email Collection
Collection T1560 Archive Collected Data
Command and Control T1071 Application Layer Protocol
Stealth T1202 Indirect Command Execution
Stealth T1564 Hide Artifacts
Defense Impairment T1562 Impair Defenses
Impact T1486 Data Encrypted for Impact

Relevancy and Insights:

  • The ransomware primarily affects the Windows operating system, which is commonly utilized in enterprise environments across multiple industries.
  • The ransomware terminates processes such as vssadmin.exe Delete Shadows /all /quiet and wmic shadowcopy delete /nointeractive to delete Volume Shadow Copies, which are used by Windows for backup and restore. By deleting shadow copies, the malware prevents victims from restoring their data using built-in recovery features such as system restore points or local backup mechanisms.
  • Detect-debug-environment: The ransomware technique is used to determine if it is being monitored in environments such as sandboxes, virtual machines, or under debugging tools. To perform this check, the malware may look for specific processes, drivers, or artifacts linked to analysis tools, measure timing to spot inconsistencies, or scan for system traits uncommon in real user machines. When such conditions are identified, the malicious program can modify its behavior such as pausing execution, shutting down, or withholding key payload actions to avoid detection and make detailed analysis more difficult.

ETLM Assessment:
CYFIRMA’s analysis indicates that Rex ransomware currently operates as a double- extortion malware campaign designed to target enterprise and corporate environments through file encryption and alleged data theft. The ransomware encrypts files on compromised systems and appends variant-specific extensions such as “.rex48” to affected files before dropping an HTML-based ransom note titled “RANSOM_NOTE.html”. The note instructs victims not to rename encrypted files or use third-party recovery solutions, while simultaneously pressuring organizations through threats of public data exposure. The operators claim to have collected confidential and personal information from the victim’s network and leverage this claim to intensify extortion pressure beyond operational disruption caused by encryption alone. The inclusion of free decryption for a limited number of files is consistent with tactics used to establish credibility during ransom negotiations and increase the likelihood of payment.

The ransomware’s operational structure suggests a focus on maintaining persistence in victim communication and maximizing negotiation control through multiple contact mechanisms, including email-based communication and Tor-based channels. The language used in the ransom note indicates a deliberate attempt to discourage victims from seeking external recovery assistance or incident response support. Rex ransomware also demonstrates characteristics commonly associated with modern financially motivated ransomware activity, including enterprise-focused targeting, psychological pressure tactics, and the integration of data-leak threats into the extortion lifecycle. The emphasis on “company network” compromise indicates that the operators are likely prioritizing organizational victims where operational downtime and potential reputational damage can significantly increase pressure to comply with ransom demands.

CYFIRMA assesses that ransomware operations such as Rex are likely to evolve toward more advanced and modular attack frameworks capable of adapting to different enterprise environments. Future variants may incorporate stronger defense evasion capabilities, faster encryption mechanisms, and broader support for lateral movement across networked systems to increase operational impact before detection occurs. Threat actors behind such ransomware campaigns may also continue enhancing data exfiltration workflows and extortion strategies by integrating automated reconnaissance, credential harvesting, and selective targeting of critical business assets. In addition, future iterations may increasingly rely on anonymized communication infrastructure, multi-stage payload deployment, and customizable ransom negotiation models to improve operational resilience and maximize financial returns from enterprise victims.

Sigma rule:
title: Shadow Copies Deletion Using Operating Systems Utilities tags:
– attack.impact
– attack.stealth
– attack.t1070
– attack.t1490 logsource:
category: process_creation product: windows
detection: selection1_img:
– Image|endswith:
– ‘\powershell.exe’
– ‘\pwsh.exe’
– ‘\wmic.exe’
– ‘\vssadmin.exe’
– ‘\diskshadow.exe’
– OriginalFileName:
– ‘PowerShell.EXE’
– ‘pwsh.dll’
– ‘wmic.exe’
– ‘VSSADMIN.EXE’
– ‘diskshadow.exe’ selection1_cli:
CommandLine|contains|all:
– ‘shadow’ # will match “delete shadows” and “shadowcopy delete” and “shadowstorage”
– ‘delete’ selection2_img:
– Image|endswith: ‘\wbadmin.exe’
– OriginalFileName: ‘WBADMIN.EXE’ selection2_cli:
CommandLine|contains|all:
– ‘delete’
– ‘catalog’
– ‘quiet’ # will match -quiet or /quiet
selection3_img:
– Image|endswith: ‘\vssadmin.exe’
– OriginalFileName: ‘VSSADMIN.EXE’ selection3_cli:
CommandLine|contains|all:
– ‘resize’
– ‘shadowstorage’ CommandLine|contains:
– ‘unbounded’
– ‘/MaxSize=’
condition: (all of selection1*) or (all of selection2*) or (all of selection3*) falsepositives:
– Legitimate Administrator deletes Shadow Copies using operating systems utilities for legitimate reason
– LANDesk LDClient Ivanti-PSModule (PS EncodedCommand) level: high
(Source: Surface Web)

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems. (Source: Surface Web)

STRATEGIC RECOMMENDATION

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATION

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Implement a zero-trust security model alongside multifactor authentication (MFA) to reduce the risk of credential compromise.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATION

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Establish and implement protective controls by actively monitoring and blocking identified indicators of compromise (IoCs) and reinforcing defensive measures based on the provided tactical intelligence.

Active Malware of the Week

Type: Stealer| Objectives: Data Exfiltration | Target Technology: MacOS |
Target Geography: Global, (Blocked Countries: Russia, Belarus, Kazakhstan, Armenia, and Ukraine) |Targeted Hardware: M2, M3 & M4

CYFIRMA collects data from various forums, based on which trends are ascertained. We identified a few popular malware samples that are being distributed in the wild to launch cyberattacks on organizations and individuals.

Active Malware of the week
This week, “Ultimate Stealer” Stealer is in focus.

Overview of Operation Ultimate Stealer Malware
Analysis of the Ultimate Stealer sample reveals a sophisticated, cross-platform data- exfiltration program deliberately engineered to covertly infiltrate user systems, extract sensitive information, and minimize forensic evidence of its activity. Presented under the guise of a legitimate script, the program integrates social engineering techniques, system manipulation, and stealth mechanisms to obtain elevated privileges on targeted machines. Its modular architecture supports remote updates, selective execution based on hardware and geographic parameters, and adaptive operational behavior that differentiates it from conventional opportunistic malware.

The program prioritizes the collection of high-value data, including browser credentials, cryptocurrency wallet artifacts, messaging session tokens, system metadata, and clipboard contents. It leverages trusted system components and commonly permitted applications to bypass user consent controls and security prompts, while also attempting to establish persistence to ensure silent re-execution after system restarts. To avoid detection, it incorporates obfuscation techniques, fileless execution patterns, and process-injection methods that allow its activities to blend with normal operating system processes.

Network observations indicate encrypted communications with external endpoints for geolocation checks and data exfiltration, often using widely trusted web services to disguise outbound traffic. Upon completing its objectives, the program attempts to remove temporary artifacts, clear activity traces, and dismantle persistence mechanisms to complicate forensic analysis. This case underscores the evolving sophistication of modern threats and highlights the importance of layered defensive strategies, continuous monitoring, and user awareness in contemporary cybersecurity environments.

Attack Method
The attack sequence commences with the execution of a seemingly legitimate JavaScript that conducts comprehensive environmental validation prior to initiating malicious operations. The program systematically fingerprints the host by collecting hardware identifiers, operating system details, memory capacity, processor information, and user account attributes. It further performs geolocation verification through an external IP intelligence service to ensure that the target system aligns with predefined operational criteria. These preliminary checks enable the program to avoid execution in sandboxed, research, or non-target environments, thereby reducing the probability of early detection.

Following validation, the program attempts to access sensitive data sources by leveraging native operating system utilities rather than relying exclusively on embedded malicious routines. Concurrently, it employs scripted dialog prompts designed to resemble legitimate system messages, thereby persuading the user to provide authentication credentials. These credentials are subsequently utilized to achieve privilege escalation through standard administrative command pathways, minimizing the presence of overt exploit artifacts.

To circumvent privacy controls and user consent mechanisms, the program utilizes automation scripts to interact with trusted system applications, allowing malicious commands to be executed within legitimate process contexts. It also attempts to establish persistence by creating a launch daemon configured to execute with elevated privileges during system startup. This persistence mechanism is deliberately disguised with identifiers resembling authentic system services, reducing the likelihood of detection during routine system review.

In the final phase, the program employs advanced evasion and data exfiltration techniques. Additional functional modules are retrieved from remote sources to dynamically extend operational capabilities without modifying the original script. Collected data is compressed, encoded, and transmitted to external endpoints through encrypted communication channels that resemble legitimate web traffic. Upon completing its objectives, the program initiates cleanup procedures to remove temporary artifacts, clear command histories, and dismantle persistence components, thereby complicating subsequent forensic analysis.

Following are the TTPs based on the MITRE Attack Framework for Enterprise

Tactic Technique ID Technique Name
Execution T1059:007 Command and Scripting Interpreter: JavaScript
Execution T1204 User Execution
Stealth T1027 Obfuscated Files or Information
Stealth T1202 Indirect Command Execution
Discovery T1082 System Information Discovery
Discovery T1016 System Network Configuration Discovery
Exfiltration T1041 Exfiltration Over C2 Channel

INSIGHTS
A prominent feature of the analyzed malware is its intentional reliance on contextual evaluation before initiating any meaningful activity. The program performs selective assessment of hardware characteristics, geographic indicators, and overall system conditions, suggesting that its execution is restricted to specific and favorable environments. This disciplined approach indicates a calculated design in which operations are confined to carefully chosen targets to minimize unnecessary exposure.

Another key observation is the malware’s methodical alignment with legitimate system operations and routine user interactions. Instead of adopting intrusive or disruptive tactics, it leverages standard system tools, familiar application environments, and expected user-facing prompts to achieve its objectives. This measured operational style enables the malware to remain indistinguishable from normal system behavior, thereby reducing the likelihood of detection through unusual activity patterns.

Furthermore, the malware follows a well-structured sequence of actions in which data collection, privilege management, persistence mechanisms, communication, and cleanup are executed in a coordinated and orderly manner. Each stage appears designed to support the next while limiting residual artifacts. This systematic flow reflects a focus on operational consistency and discretion, allowing the malware to operate efficiently without leaving readily observable signs of compromise.

ETLM ASSESSMENT
From an ETLM standpoint, the emergence of threats characterized by subtlety and contextual awareness signifies a movement toward attack approaches that integrate seamlessly with ordinary organizational routines. Such developments are expected to reduce the clarity with which malicious behavior can be distinguished from legitimate system activity, thereby obscuring traditional signs of compromise. As employees continue to rely on familiar tools and processes in their daily work, these routine interactions may inadvertently provide opportunities for such threats to sustain their presence.

In the longer term, the increasing overlap between standard operational workflows and concealed malicious actions may contribute to a progressively ambiguous threat environment. This convergence is likely to make the identification of irregularities more complex, heightening the challenges associated with maintaining awareness of potential risks across both organizational systems and individual user activities.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems. (Source: Surface Web)

YARA Rule
import “hash”
rule UltimateStealer_MacOS_Node
{
meta:
description = “Detects Ultimate macOS Node-based stealers via hashes and behavioral strings”
author = “CYFIRMA” date = “2026-04-12”
strings:
/* Behavioral indicators */
$s1 = “Chrome Safe Storage”
$s2 = “security find-generic-password”
$s3 = “osascript -e”
$s4 = “com.apple.softwareupdate.plist”
$s5 = “ipapi.co/json”
$s6 = “discord.com/api/webhooks”
$s7 = “sysctl -n machdep.cpu.brand_string”
$s8 = “LaunchDaemons/com.apple.softwareupdate.plist”
$s9 = “history -c”
$s10 = “gzipSync”
$s11 = “Buffer.from”
$s12 = “node ${process.argv[1]} –silent”
condition: (
hash.md5(0, filesize) == “17f0a28f279e276ae7105cabcd956f73” or hash.sha1(0, filesize) == “4d150b31817f286ffd49fb6230c61d3b6fd4ee8d” or hash.sha256(0, filesize) ==
“ef02d5b2711367205087840e84a6a498a0c74fa7d408aacccd6650622520f8cc”
)
or
(7 of ($s*))
}

Recommendations

Strategic Recommendations

  • Establish a security posture that prioritizes visibility into endpoint behavior rather than relying solely on signature-based detection.
  • Integrate threat intelligence and behavioral monitoring int
  • long-term cybersecurity planning and governance.
  • Promote organization-wide awareness that modern threats often exploit routine workflows and trusted applications.
  • Align security investments toward capabilities that detect subtle misuse of legitimate system components.

Management Recommendations

  • Enforce strict access controls and least privileged policies across user accounts and administrative functions.
  • Conduct periodic security awareness sessions emphasizing deceptive prompts, social engineering, and suspicious system dialogs.
  • Ensure regular auditing of system startup items, background services, and persistence mechanisms on employee devices.
  • Implement centralized logging and monitoring to correlate endpoint, network, and user activity for anomaly detection.

Tactical Recommendations

  • Monitor for unusual use of scripting engines, automation tools, and command-line utilities interacting with sensitive system areas.
  • Detect abnormal creation or modification of system launch agents, daemons, and scheduled tasks.
  • Inspect outbound traffic to public services for potential misuse as data exfiltration channels.
  • Track attempts to access password stores, browser credential files, and clipboard interactions outside normal application behavior.
  • Implement proactive security controls by monitoring and blocking identified IOCs, leveraging YARA rules for detection, and strengthening defenses based on actionable tactical intelligence.

CYFIRMA’s Weekly Insights

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Phishing, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – SafePay Ransomware, The Gentlemen Ransomware| Malware – Ultimate Stealer
  • SafePay Ransomware – One of the ransomware groups.
  • The Gentlemen Ransomware – One of the ransomware groups. Please refer to the trending malware advisory for details on the following:
  • Malware – Ultimate Stealer
    Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

MuddyWater Continues Persistent Intelligence Collection Through Covert Access Operations

  • Threat Actor: MuddyWater
  • Attack Type: Connection Proxy, Credential Dumping, Custom Malware, DDOS Attacks, Phishing, Ransomware Attacks, Social Engineering, Exploitation of Vulnerabilities.
  • Objective: Information theft, Espionage
  • Suspected Target Technology: Office Suites Software, Operating System, Web Application, Remote monitoring and management (RMM) tools
  • Suspected Target Geography: Islamic Republic of Asia, Austria, Azerbaijan, Bahrain, Belarus, Central Asia, Egypt, Georgia, Germany, India, Iran, Iraq, Islamic Republic of Israel, Italy, Jordan, Korea, Mali, Middle East, Pakistan, Poland, Republic of Russia, Saudi Arabia, Southwest Asia, Sweden, Tajikistan, Turkey, Ukraine, United Arab Emirates, United Kingdom, United States
  • Suspected Target Industries: Aerospace, Aerospace & Defense, Agriculture, Capital Goods, Consumer Services, Critical Infrastructure, Defense, Energy, Energy Equipment & Services, Finance, Food, Gaming, High Tech, IT Service Providers, Individuals, Media, Media & Entertainment, Military, NGO, Natural Resources, Oil and Gas, Politics, Telecommunication Services, Transportation, business services, construction, cryptocurrency, defence, education, engineering, government, healthcare, manufacturing, metals.
  • Business Impact: Financial Gain, Data Theft, Operational Disruption, Reputational Damage.

About the Threat Actor
MuddyWater is an advanced persistent threat (APT) group widely believed to be linked to Iran’s Ministry of Intelligence and Security (MOIS), with a longstanding history of espionage-focused cyber operations. The group is known for targeting organizations in the Middle East using PowerShell-based in-memory attack techniques associated with “living-off-the-land” tactics. These methods avoid deploying new binaries on compromised systems, enabling the attackers to maintain a low detection profile and minimal forensic footprint.

Details on Exploited Vulnerabilities

CVE ID Affected Products CVSS Score Exploit Links
CVE-2017-0199 Microsoft Office 7.8 Link1, link2, link3
CVE-2017-8759 Microsoft .NET Framework 7.8 link
CVE-2017- 11882 Microsoft Office 7.8 link
CVE-2017- 17215 Huawei HG532 8.8
CVE-2020-0688 Microsoft Exchange software 8.8 Link1, link2
CVE-2026-1731 BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA) 9.8
CVE-2017-5715 Microprocessors 5.6 Link1, Link2
CVE-2018-8611 Microsoft Windows 7.8
CVE-2019-0797 Microsoft Windows Win32k 7.8

TTPs based on MITRE ATT&CK Framework

Tactic ID Technique
Reconnaissance T1590 Gather Victim Network Information
Resource Development T1588.002 Obtain Capabilities: Tool
Resource Development T1583.001 Acquire Infrastructure: Domains
Resource Development T1588.001 Obtain Capabilities: Malware
Resource Development T1583.006 Acquire Infrastructure: Web Services
Initial Access T1566.001 Phishing: Spearphishing Attachment
Initial Access T1190 Exploit Public-Facing Application
Initial Access T1566 Phishing
Initial Access T1566.002 Phishing: Spearphishing Link
Execution T1059.001 Command and Scripting Interpreter: PowerShell
Execution T1059.003 Command and Scripting Interpreter: Windows Command Shell
Execution T1059.005 Command and Scripting Interpreter: Visual Basic
Execution T1059.006 Command and Scripting Interpreter: Python
Execution T1059.007 Command and Scripting Interpreter: JavaScript
Execution T1047 Windows Management Instrumentation
Execution T1204.001 User Execution: Malicious Link
Execution T1204.002 User Execution: Malicious File
Execution T1203 Exploitation for Client Execution
Execution T1053.005 Scheduled Task/Job: Scheduled Task
Execution T1559.001 Inter-Process Communication: Component Object Model
Execution T1574.001 Hijack Execution Flow: DLL
Execution T1204.004 User Execution: Malicious Copy and Paste
Execution T1559.002 Inter-Process Communication: Dynamic Data Exchange
Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Persistence T1137.001 Office Application Startup: Office Template Macros
Persistence T1053.005 Scheduled Task/Job: Scheduled Task
Privilege Escalation T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control
Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation T1053.005 Scheduled Task/Job: Scheduled Task
Stealth T1218.003 System Binary Proxy Execution: CMSTP
Stealth T1218.005 System Binary Proxy Execution: Mshta
Stealth T1140 Deobfuscate/Decode Files or Information
Stealth T1574.001 Hijack Execution Flow: DLL
Stealth T1036.005 Masquerading: Match Legitimate Resource Name or Location
Stealth T1684.001 Social Engineering: Impersonation
Stealth T1027.010 Obfuscated Files or Information: Command Obfuscation
Stealth T1027.003 Obfuscated Files or Information: Steganography
Stealth T1027.004 Obfuscated Files or Information: Compile After Delivery
Stealth T1218.011 System Binary Proxy Execution: Rundll32
DefenseImpairment T1685 Disable or Modify Tools
Credential Access T1555 Credentials from Password Stores
Credential Access T1555.003 Credentials from Password Stores: Credentials from Web Browsers
Credential Access T1003.001 OS Credential Dumping: LSASS Memory
Credential Access T1003.004 OS Credential Dumping: LSA Secrets
Credential Access T1003.005 OS Credential Dumping: Cached Domain Credentials
Credential Access T1552.001 Unsecured Credentials: Credentials In Files
Discovery T1083 File and Directory Discovery
Discovery T1057 Process Discovery
Discovery T1033 System Owner/User Discovery
Discovery T1049 System Network Connections Discovery
Discovery T1016 System Network Configuration Discovery
Discovery T1087.002 Account Discovery: Domain Account
Discovery T1082 System Information Discovery
Discovery T1518 Software Discovery
Discovery T1518.001 Software Discovery: Security Software Discovery
LateralMovement T1210 Exploitation of Remote Services
LateralMovement T1534 Internal Spearphishing
Collection T1113 Screen Capture
Collection T1560.001 Archive Collected Data: Archive via Utility
Collection T1074.001 Data Staged: Local Data Staging
Command and Control T1071.001 Application Layer Protocol: Web Protocols
Command and Control T1132.001 Data Encoding: Standard Encoding
Command and Control T1573.001 Encrypted Channel: Symmetric Cryptography
Command and Control T1105 Ingress Tool Transfer
Command and Control T1104 Multi-Stage Channels
Command and Control T1571 Non-Standard Port
Command and Control T1090 Proxy
Command and Control T1090.002 Proxy: External Proxy
Command and Control T1219.002 Remote Access Tools: Remote Desktop Software
Command and Control T1102.002 Web Service: Bidirectional Communication
Exfiltration T1041 Exfiltration Over C2 Channel
Exfiltration T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage

Latest Developments Observed
The threat actor is suspected of leveraging Chaos ransomware to target organizations across the construction, manufacturing, and business services sectors in the United States and several European countries, including United Kingdom, Sweden, Austria, Germany, Poland, and Italy. Initial access is believed to be obtained through social engineering techniques and abuse of remote access services to establish a foothold within targeted environments. The campaign appears to be financially motivated and aligned with triple extortion strategies involving exfiltration of sensitive information, monetary demands, and the threat or execution of DDoS attacks.

ETLM Insights
MuddyWater operations are primarily focused on long-term intelligence collection, covert access, and strategic surveillance rather than financially motivated activity. The group continues to evolve its operational capabilities and infrastructure strategy to support persistent espionage operations across strategically important environments.

The actor’s behaviour reflects three core strategic drivers:

  • Financially Motivated Multi-Stage Extortion Operations.
  • Scalable Initial Access Through Social Engineering and Remote Service Abuse.
  • Maximizing Operational and Psychological Pressure on Victims.

Looking ahead, the threat actor is likely to continue refining its extortion-centric operations through broader geographic targeting, enhanced intrusion automation, and increasingly disruptive coercion tactics aimed at sustaining operational leverage and reducing victim recovery flexibility.

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems. (Source: Surface Web)

YARA Rules
rule Suspicious_Infrastructure_and_Malware_Artifacts
{
meta:
description = “Detects suspicious infrastructure, malware filenames, hashes, and exploit references observed in the campaign”
author = “CYFIRMA” date = “2026-05-12”
version = “1.1” strings:
/* CVE References */
$cve_1 = “CVE-2015-5122” ascii nocase
$cve_2 = “CVE-2012-0158” ascii nocase
$cve_3 = “CVE-2010-3333” ascii nocase
$cve_4 = “CVE-2014-1761” ascii nocase
$cve_5 = “CVE-2017-1215” ascii nocase
$cve_6 = “CVE-2026-1731” ascii nocase
$cve_7 = “CVE-2017-0199” ascii nocase

/* IP Indicators */
$ip_1 = “146.70.124.102” ascii
$ip_2 = “45.67.230.91” ascii
$ip_3 = “94.131.109.65” ascii
$ip_4 = “94.131.98.14” ascii
$ip_5 = “95.164.38.99” ascii
$ip_6 = “64.233.181.94” ascii
/* Domain Indicators */
$dom_1 = “downloadfile.egnyte.com” ascii nocase
$dom_2 = “fileuploadcloud.egnyte.com” ascii nocase
$dom_3 = “airpazflys.egnyte.com” ascii nocase
$dom_4 = “airpaz.egnyte.com” ascii nocase
$dom_5 = “softwarehosts.com” ascii nocase
$dom_6 = “smtpcloudapp.com” ascii nocase
$dom_7 = “onlinemailservices.com” ascii nocase

/* File / Hash Indicators */
$sha256_1 = “28332bdbfaeb8333dad5ada3c10819a1a015db9106d5e8a74beaf03797511aa” ascii nocase
$file_1 = “ynkf.exe” ascii nocase
$file_2 = “solidworks-5.25.483-win-x64.exe” ascii nocase
$file_3 = “pbidesktopsetup-5.25.483-win-x64.exe” ascii nocase
$file_4 = “notionsetup-5.25.483-win-x64.exe” ascii nocase
$file_5 = “chiefarchitect-2026-latest-5.3-win-x64.exe” ascii nocase

condition: (
any of ($dom_*) and
any of ($file_*)
)
or (
any of ($ip_*) and
any of ($cve_*)
)
or (
$sha256_1
)
}

Recommendations Strategic

  • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
  • Assess and deploy alternatives for an advanced endpoint protection solution that provides detection/prevention for malware and malicious activities that do not rely on signature-based detection methods.
  • Assess and deploy alternatives for an advanced endpoint protection solution that provides detection/prevention for malware and malicious activities that do not rely on signature-based detection methods.

Management

  • Look for email security solutions that use ML- and AI-based anti-phishing technology for BEC protection to analyze conversation history to detect anomalies, as well as computer vision to analyze suspect links within emails.
  • Regularly reinforce awareness of unauthorized attempts with end-users across the environment and emphasize the human weakness in mandatory information security training sessions.

Tactical

  • For better protection coverage against email attacks (like spear phishing, business email compromise, or credential phishing attacks), organizations should augment built-in email security with layers that take a materially different approach to threat detection.
  • Protect accounts with multi-factor authentication. Exert caution when opening email attachments or clicking on embedded links supplied via email communications, SMS, or messaging.
  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Add the YARA rule for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.

3. Major Geopolitical Developments in Cybersecurity

Iranian Hackers Use Ransomware as Espionage Cover
A new report from cybersecurity researchers reveals that MuddyWater, an Iranian state-sponsored group linked to the Ministry of Intelligence and Security, is using Chaos ransomware to mask its espionage operations. By adopting the branding of a known cybercriminal operation, the group aims to obscure its true intent and complicate attribution efforts by Western law enforcement. Researchers noted that the group’s increased activity in early 2026 has intensified its reliance on these deceptive false-flag tactics.

The discovery followed an investigation into an intrusion that initially looked like a standard ransomware attack but lacked typical file encryption. The hackers gained access through a social engineering campaign on Microsoft Teams, where they initiated chat requests and used screen-sharing sessions to steal VPN credentials. Despite the clumsy extortion attempt, the attackers successfully leaked legitimate company data. Rapid7 eventually traced the malware and infrastructure back to MuddyWater’s established toolkit and previous Middle Eastern campaigns.

ETLM Assessment:
This incident highlights a growing convergence between nation-state actors and cybercriminal tradecraft. MuddyWater has a history of using ransomware ecosystems, such as Qilin, to maintain plausible deniability while conducting state business. This trend is not exclusive to Iran; state-sponsored groups from China, Russia, and North Korea have also been observed adopting ransomware frameworks to hide data exfiltration or to moonlighting for financial gain as noted by CYFIRMA researchers before. By blurring their motivations, these actors create significant challenges for cyber defenders and international investigators.

Hackers Target Aviation Firms for Geospatial Data
As regional conflicts intensify, threat actors are increasingly targeting geospatial mapping and GPS data to locate enemy assets and assess rival intelligence capabilities. Cybersecurity researchers have identified a sophisticated group dubbed HeartlessSoul (also known as Versatile Werewolf), which utilizes phishing and malvertising to compromise aerospace firms and drone operators. The group lures victims by hosting malware on sites disguised as legitimate aviation software installers and has even planted malicious projects on the SourceForge download service.

The primary objective of HeartlessSoul appears to be the collection of sensitive Geographic Information System (GIS) data, including shapefiles and digital relief maps, currently focused on Russian government and enterprise systems. Analysts note that stealing GIS data provides “operational ground truth,” allowing adversaries to see exactly how a victim perceives terrain, infrastructure, and logistics routes. This intelligence offers immense value for disrupting operations and tracking asset movements.

ETLM Assessment:
HeartlessSoul employs advanced techniques, such as multi-stage infections, fileless execution, and Windows shortcut exploits, to deploy remote access Trojans. While no formal attribution has been made, researchers link these campaigns to pro-Ukrainian interests because they target Russian defense contractors and drone forums to steal the “operational ground truth” – the precise mapping of infrastructure and logistics that allows Ukraine to plan precision strikes and exploit gaps in the Russian military’s own awareness of the terrain.

To mitigate these risks, experts recommend that organizations protect their “crown jewels” – such as flight-planning and engineering software – through zero-trust security measures and network segmentation. By focusing defense investments on the specific workstations that handle critical GIS data, businesses can reduce operational risk without over-burdening non-critical environments.

4. Rise in Malware/Ransomware and Phishing

SafePay Ransomware Impacts Hokuyo Co., Ltd.

  • Attack Type: Ransomware
  • Target Industry: Packaging and Industrial Supply, Logistics
  • Target Geography: Japan
  • Ransomware: SafePay Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
CYFIRMA observed in an underground forum that a company from Japan, Hokuyo Co., Ltd. (https[:]//hokuyo2006[.]co[.]jp/), was compromised by SafePay Ransomware. Hokuyo Co., Ltd. is a Japanese company that operates as part of a larger industrial group connected to packaging, logistics, and housing-related businesses. It is affiliated with the Tomoku Group, a publicly listed corporation specializing in corrugated packaging and logistics solutions. The company contributes to integrated supply chain operations, including transportation, warehousing, and distribution services across Japan. Its business model focuses on optimizing logistics efficiency, reducing operational costs, and supporting industrial clients through advanced distribution systems. Hokuyo benefits from group synergies, particularly in packaging manufacturing and logistics infrastructure, allowing it to provide end-to-end solutions. The SafePay ransomware group claims to have compromised and exposed internal directory data belonging to Hokuyo Co., Ltd., including administrator-related folders, employee user directories, desktop and document files, fax records, and multiple named user accounts likely associated with company staff. The leaked index suggests potential exposure of internal corporate documents, employee workstation data, operational records, communication files, and business-related information connected to the company’s packaging, logistics, and distribution operations. The presence of numerous user-specific folders indicates that sensitive employee and organizational data may have been accessed as part of the ransomware incident.

Source: Dark Web

Relevancy & Insights:

  • SafePay Ransomware is a rapidly emerging and sophisticated ransomware threat first identified in September 2024.
  • The SafePay Ransomware group primarily targets countries such as the United States of America, Germany, the United Kingdom, Canada, and Argentina.
  • The SafePay Ransomware group primarily targets industries, including Professional Goods & Services, Consumer Goods & Services, Real Estate & Construction, Manufacturing, and Information Technology.
  • Based on the SafePay Ransomware victims list from 1st Jan 2025 to 12th May 2026, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the SafePay Ransomware victims list from 1st Jan 2025 to 12th May 2026 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, SafePay represents a sophisticated, fast- moving ransomware threat capitalizing on VPN weaknesses and credential theft, employing effective double extortion tactics to maximize ransom payments. Organizations, especially in highly targeted sectors and regions, must prioritize layered defenses and active hunting for early detection.

The Gentlemen Ransomware Impacts Marutake
Attack Type: Ransomware
Target Industry: Healthcare
Target Geography: Japan
Ransomware: The Gentlemen Ransomware
Objective: Data Theft, Data Encryption, Financial Gains
Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
CYFIRMA observed in an underground forum that a company from Japan, Marutake (https[:]//www[.]kk-marutake[.]co[.]jp/), was compromised by The Gentlemen Ransomware. Marutake Co., Ltd. is a comprehensive pharmaceutical and medical wholesale company founded on June 15, 1925, and headquartered in Niigata City, Japan, with a 100-year history of connecting manufacturers to healthcare providers across the region. The company distributes prescription pharmaceuticals, medical devices, clinical diagnostic reagents, hygiene materials, nursing care products, and healthcare IT systems to hospitals, clinics, and pharmacies, primarily across Niigata, Yamagata, Miyagi, Akita, Tokyo, and Gunma prefectures. The data, which has been breached, has not yet appeared on the leak site, indicating that negotiations between the affected party and the ransomware group may be underway. The compromised data includes confidential and sensitive information belonging to the organization.

Source: Dark Web

Relevancy & Insights:

  • The Gentlemen is a relatively highly sophisticated ransomware-as-a-service (RaaS) group that emerged in mid-2025.
  • The Gentlemen Ransomware group primarily targets countries such as the United States of America, Thailand, France, Brazil, and India.
  • The Gentlemen Ransomware group primarily targets industries, including Consumer Goods & Services, Professional Goods & Services, Materials, Manufacturing, and Information Technology.
  • Based on the Gentlemen Ransomware victims list from 1st Jan 2025 to 12th May 2026, the top 5 Target Countries are as follows
  • The Top 10 Industries most affected by the Gentlemen Ransomware victims list from 1st Jan 2025 to 12th May 2026 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, the Gentlemen Ransomware is a highly adaptive and globally active threat that leverages dual-extortion tactics, combining data theft with file encryption. The group employs advanced evasion and persistence techniques, supports cross-platform and scalable ransomware deployment, and conducts targeted attacks across multiple industries and geographic regions. This combination of capabilities makes it a significant risk to enterprise cybersecurity defenses, particularly for organizations with limited detection and incident-response maturity.

5. Vulnerabilities and Exploits

Vulnerability in Palo Alto Networks PAN-OS

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Network Security Infrastructure / Firewall Operating Platform
  • Vulnerability: CVE-2026-0300
  • CVSS Base Score: 9.8 Source
  • Vulnerability Type: Buffer Overflow
  • Summary: The vulnerability allows a remote attacker to compromise vulnerable system.

Relevancy & Insights:
The vulnerability exists due to a boundary error within the User-ID Authentication Portal (aka Captive Portal) service.

Impact:
A remote attacker can send specially crafted packets to the device, trigger an out-of-bounds write and execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls.

Note, the vulnerability is being actively exploited in the wild.

Affected Products:
https://security.paloaltonetworks.com/CVE-2026-0300

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerability in Palo Alto Networks PAN-OS introduces significant risks to enterprise network security infrastructures that rely on perimeter defense, identity-based policy enforcement, and secure access control. As PAN-OS is widely deployed across enterprise firewall environments, exploitation of this vulnerability could allow attackers to compromise critical security appliances, disrupt network traffic inspection, or gain unauthorized control over protected infrastructure. Organizations leveraging enterprise firewall platforms must ensure timely patching, secure exposure management, and continuous monitoring to prevent potential compromise. Addressing this vulnerability is essential to maintaining the integrity, availability, and security of enterprise network defense environments.

6. Latest Cyber-Attacks, Incidents, and Breaches

Killsec Ransomware attacked and published the data of Medical Pay

  • Threat Actor: Killsec Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Healthcare
  • Target Geography: Japan
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that Killsec Ransomware attacked and published the data of Medical Pay (https[:]//medical-pay[.]jp/) on its dark web website. Medical Pay is a medical financing and payment facilitation company based in Japan (Tokyo) that provides healthcare payment support services. The ransomware leak page associated with Medical PAY indicates that sensitive healthcare-related data may have been compromised, including scanned prescription documents, patient medical records, healthcare transaction information, and personally identifiable information (PII) visible in uploaded medical forms and prescription images. Based on the preview images displayed on the disclosure page, the exposed data could include patient names, prescription details, medical institution information, treatment-related records, billing or payment information, and other confidential healthcare documents associated with the Medical PAY platform.

Source: Dark Web

Relevancy & Insights:

  • KillSec is a ransomware group that has gained notoriety for its ransomware-as-a- service (RaaS) model and a series of high-profile attacks.
  • KillSec Ransomware employs various sophisticated methods to infiltrate systems, including phishing attacks, exploiting known vulnerabilities, and using custom malware to maintain persistence within compromised networks.

ETLM Assessment:
The emergence and evolution of KillSec’s Ransomware-as-a-Service (RaaS) platform represents a concerning development in the cybercrime landscape. By lowering the technical barrier to entry, this RaaS model allows less skilled individuals to engage in sophisticated ransomware attacks, potentially leading to an increase in such incidents globally.
According to CYFIRMA’s assessment, the KillSec ransomware group is expected to continue targeting a wide range of industries worldwide. Their advanced tactics, such as exploiting website vulnerabilities and conducting credential theft, make them a significant threat to organizations with inadequate security measures in place.

7. Data Leaks

Hakara Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Entertainment
  • Target Geography: Vietnam
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary: The CYFIRMA research team identified a post on a dark web forum by a threat actor using the alias “Xorcat,” claiming responsibility for a large-scale data leak associated with Hakara[.]vn, a Vietnam-based karaoke and social singing application available on both the Apple App Store and Google Play. In the forum post, the actor alleges that approximately 161,000 user records were extracted from an improperly secured Elasticsearch instance exposed to the internet without authentication. The threat actor claims the exposure resulted from a publicly accessible /users/_search endpoint, a lack of rate limiting enabling full index enumeration, and a misconfigured Cross-Origin Resource Sharing (CORS) policy allowing unrestricted browser-based access.

According to the forum post, the compromised platform uses Elasticsearch as its backend indexing system, and the extracted dataset was allegedly obtained in May 2026. The actor states that the database was exported in JSON-line format, with each line representing an individual user document. Sample records shared in the post appear to contain detailed user profile information, account metadata, social login identifiers, activity statistics, and location-related information, increasing the credibility of the alleged breach.

Based on the threat actor’s description and the exposed sample data, the compromised dataset reportedly includes:

  • Internal user identifiers and unique account IDs
  • Facebook and Apple-linked social login identifiers
  • Full usernames and profile-related metadata
  • Email addresses and phone numbers
  • User profile images and avatar URLs hosted on DigitalOcean Spaces
  • Dates of birth, gender details, and biography information
  • Physical address, city, country, and regional location data
  • Language preferences and timezone settings
  • IP addresses associated with user activity
  • Device identifiers and online activity status
  • User engagement statistics, including follower counts, play counts, recordings, gifts, and uploaded content
  • Application role information and account creation/update timestamps
  • Virtual economy-related information such as diamonds, coins, VIP levels, stars, experience points, and wealth values

The threat actor claims that the exposed database contains over 161,000 user documents, potentially affecting a substantial portion of the application’s user base. The inclusion of IP addresses, device identifiers, social media-linked login credentials, and user behavioral metadata significantly increases the risk of targeted phishing attacks, account takeovers, identity profiling, and social engineering campaigns against affected individuals.

Particularly concerning is the exposure of social authentication identifiers tied to Facebook and Apple accounts, which could enable attackers to correlate leaked information with external platforms and build detailed user profiles. Additionally, the presence of geographic, timezone, and activity-related metadata may allow adversaries to map user behavior patterns and online presence.

This incident indicates a potentially severe data exposure event involving personally identifiable information (PII), social account linkage data, and user activity intelligence. If validated, the breach could expose affected users to identity theft, credential abuse, targeted scams, privacy violations, and reputational risks. Furthermore, the incident highlights ongoing security challenges related to misconfigured cloud-hosted databases, inadequate access controls, and insecure API exposure practices within mobile application ecosystems.

The authenticity of this Access sale remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

Tokopedia Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: E-commerce
  • Target Geography: Indonesia
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary: The CYFIRMA research team identified a post on a dark web forum by a threat actor using the alias “XSVSHACKER,” advertising an allegedly compromised database associated with Tokopedia, one of Indonesia’s largest e-commerce and online marketplace platforms. In the forum post, the actor claims to possess and leak approximately 40,000 customer records containing sensitive personally identifiable information (PII), transaction details, shipping information, and order-related data. The post suggests that the exposed dataset contains structured customer purchase records and transactional metadata, indicating a potentially serious compromise affecting Tokopedia users and e-commerce operations.

According to the threat actor, the leaked dataset contains detailed order and customer information exported in a structured format resembling CSV or database table records. The sample entries shared in the forum include multiple customer purchase transactions with extensive personal, financial, and logistical information. The exposed records appear to contain customer identities, contact details, payment methods, shipping addresses, ordered products, pricing information, and transaction statuses, reinforcing the credibility of the alleged breach.

Based on the threat actor’s description and the sample data visible in the post, the compromised dataset reportedly includes:

  • User IDs associated with Tokopedia customer accounts
  • Full customer names
  • Dates of birth
  • Email addresses
  • Telephone/mobile phone numbers
  • Complete shipping and residential addresses
  • Product purchase history and ordered item descriptions
  • Quantity of products purchased
  • Item pricing information in Indonesian Rupiah (IDR)
  • Total transaction amounts
  • Payment method details, including references to OVO, bank transfers, virtual accounts, QRIS, credit cards, Dana, and other Indonesian payment systems
  • Order processing statuses such as “Selesai,” “Menunggu Pembayaran,” “Diproses,” and “Dibatalkan”
  • Regional and geographic customer location information across Indonesia
  • Transaction timing and purchase activity records

The leaked sample records suggest that the dataset may expose detailed consumer purchasing behavior and financial transaction metadata. Particularly concerning is the inclusion of payment method information combined with personally identifiable information and shipping addresses, which could significantly increase the risk of targeted phishing attacks, financial fraud, account takeover attempts, identity theft, and social engineering campaigns against affected customers.

Additionally, the exposure of order histories and transaction statuses may allow threat actors to profile consumer behavior, identify high-value customers, and conduct highly personalized fraud schemes. The dataset also appears to contain extensive geographic distribution information, potentially enabling large-scale regional targeting of Indonesian users through SMS phishing (smishing), fake delivery scams, and fraudulent e-commerce communications impersonating Tokopedia or financial service providers.

This incident indicates a potentially severe compromise involving sensitive customer, financial, and transactional information within Indonesia’s e-commerce ecosystem. If validated, the leak could have substantial implications for customer privacy, payment security, and regulatory compliance under Indonesian data protection frameworks. The scale and granularity of the allegedly exposed records may also impact consumer trust in online commerce platforms and digital payment systems throughout the region.

The authenticity of this Access sale remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously looking for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to gain access and steal valuable data. Subsequently, the stolen data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The threat actor “XSVSHACKER,” is assessed as an active and capable entity primarily engaged in data-leak operations, with multiple credible indications linking them to incidents involving unauthorized system access and the dissemination or sale of stolen data on dark web forums. These activities underscore the growing sophistication of cyber threats driven by organized underground networks and highlight the urgent need for organizations to enhance their cybersecurity posture through continuous monitoring, improved threat intelligence, and proactive defensive measures to protect sensitive information and critical infrastructure.

Recommendations: Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related attacks.
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA research team identified a post on a dark web forum by a threat actor using the alias “Xorcat,” advertising the public release of an allegedly compromised dataset associated with Fairline International, a United Kingdom- based luxury yacht manufacturing company. In the forum post, the actor claims to have extracted and leaked approximately 67GB of sensitive corporate and client data spanning Fairline’s global digital infrastructure. The actor alleges that the leak occurred after the company refused ransom negotiations, stating “No deal. No payment. No response,” suggesting the incident may be linked to a financially motivated extortion campaign targeting the organization.

According to the threat actor, the compromise allegedly resulted from multiple exposed and misconfigured systems within Fairline International’s infrastructure. The actor claims to have exploited a misconfigured Salesforce Commerce Cloud instance with exposed public API endpoints, default administrative credentials on a Magento 2 e-commerce platform, an exposed Google Cloud SQL backup bucket without authentication, and publicly accessible credentials and configuration files stored in a webroot directory. Additionally, the post alleges unauthorized access to internal Confluence wiki pages via an exposed XML-RPC endpoint, indicating broad visibility into internal operational and corporate systems.

The threat actor states that the extracted archive contains approximately 64,147 files compressed into a 67GB dataset collected between April and May 2026. The leaked material allegedly spans customer data, dealer agreements, financial documentation, engineering records, HR information, logistics records, and internal communications. Sample information shared in the post suggests a high level of access to Fairline International’s internal corporate ecosystem and operational infrastructure.

Based on the threat actor’s description, the compromised dataset reportedly includes:

  • Full personally identifiable information (PII) of luxury yacht owners and prospective clients across more than 53 countries
  • Customer names, private email addresses, residential addresses, direct mobile numbers, and passport scans
  • Purchase histories and yacht ownership records
  • Dealer and partner network documentation, including dealer agreements and commission structures
  • Internal negotiation archives related to yacht sales and regional dealer operations in the Americas, Europe, Middle East, Asia, and Australia
  • Internal corporate financial statements, P&L reports, tax filings, budgeting spreadsheets, and 2025/2026 sales forecasts
  • Wholesale pricing schedules, dealer margin structures, OEM parts contracts, and supply chain databases
  • Yacht engineering schematics, CAD drawings, design blueprints, and technical specifications for yacht models including the Targa and Squadron series
  • Full specifications and confidential cost breakdowns for production and bespoke yacht models
  • Employee records containing KYC documentation, medical certificates, payroll slips, employment contracts, and internal corporate directories
  • Internal communications involving senior management, including CEO David Buller and other executive personnel
  • Customer service logs, warranty claims, engineering diagnostics, and yacht maintenance records
  • Website backups, including Magento 2 source code, MySQL dumps, administrative credentials, Google Cloud and AWS keys, and hosting infrastructure information
  • Internal process documentation, manufacturing SOPs, factory floor procedures, Slack and Microsoft Teams archives, and Confluence wiki content
  • Shipping schedules, marina logistics records, and access logs associated with yacht transport and private marina operations

The alleged exposure of passport scans, financial records, engineering blueprints, and executive communications significantly elevates the potential impact of this incident. The combination of sensitive customer identity information, financial intelligence, and proprietary yacht engineering documentation could enable identity theft, business espionage, targeted extortion, fraudulent yacht transactions, and sophisticated spear-phishing campaigns against high-net-worth individuals and corporate partners.

Particularly concerning is the alleged compromise of cloud infrastructure credentials, internal source code, and operational documentation, which may facilitate persistent access, secondary compromises, or supply chain attacks targeting Fairline’s partners, dealers, and logistics providers. The exposure of luxury yacht ownership and marina logistics information may also introduce physical security risks for affected customers and executives.

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

RECOMMENDATIONS

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Deploy a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence, providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions, remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Ensure that detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies should be continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security controls, such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.