Weekly Intelligence Report – 27 March 2026

Published On : 2026-03-27
Share :
Weekly Intelligence Report – 27 March 2026

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware
Target Technologies: Windows OS, enterprise network endpoints

Introduction:
CYFIRMA Research and Advisory Team has found Uragan Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

Uragan Ransomware
Uragan ransomware has been identified as a file-encrypting malware strain that restricts access to victim data by encrypting files and appending the “.uragan” extension, rendering them inaccessible. Upon execution, the malware deploys a ransom note titled “README.txt” and indicates that critical infrastructure, including systems, servers, and backups, may be impacted. The operators claim that only they possess the capability to restore the encrypted data through a unique decryption key and warn victims against attempting recovery using third-party tools or modifying encrypted files, stating such actions may result in permanent data loss. Additionally, the threat actors employ double extortion tactics, asserting that sensitive information may have been exfiltrated during the intrusion and could be publicly disclosed or shared if ransom demands are not met. Currently, no publicly available or verified decryption tool exists for this ransomware, and payment does not guarantee successful data recovery.

Screenshot: File encrypted by the ransomware (Source: Surface Web)

The ransom note associated with Uragan ransomware, typically delivered as “README.txt”, informs victims that their files have been encrypted and access has been restricted. It emphasizes that only the attackers can provide the necessary decryption key and discourages victims from renaming encrypted files or using third-party recovery tools, claiming this could permanently damage the data. The message further reinforces coercion by stating that multiple parts of the victim’s infrastructure may be affected and by introducing data leakage threats, indicating that exfiltrated sensitive information may be disclosed or shared if the ransom is not paid. Overall, the note follows standard ransomware intimidation strategies, combining claims of irreversible encryption with data exposure risks, while offering no verifiable guarantee of file recovery after payment.

Screenshot: The appearance of the Uragan’s Ransom Note (Source: Surface Web)

The following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Execution T1059 Command and Scripting Interpreter
Execution T1129 Shared Modules
Persistence T1112 Modify Registry
Persistence T1543 Create or Modify System Process
Persistence T1543.003 Create or Modify System Process: Windows Service
Persistence T1547 Boot or Logon Autostart Execution
Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation T1055 Process Injection
Privilege Escalation T1543 Create or Modify System Process
Privilege Escalation T1543.003 Create or Modify System Process: Windows Service
Privilege Escalation T1547 Boot or Logon Autostart Execution
Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation T1548 Abuse Elevation Control Mechanism
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1027.002 Obfuscated Files or Information: Software Packing
Defense Evasion T1036 Masquerading
Defense Evasion T1055 Process Injection
Defense Evasion T1070 Indicator Removal
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1112 Modify Registry
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1497 Virtualization/Sandbox Evasion
Defense Evasion T1548 Abuse Elevation Control Mechanism
Defense Evasion T1562 Impair Defenses
Defense Evasion T1562.001 Impair Defenses: Disable or Modify Tools
Defense Evasion T1564 Hide Artifacts
Defense Evasion T1564.003 Hide Artifacts: Hidden Window
Credential Access T1003 OS Credential Dumping
Credential Access T1539 Steal Web Session Cookie
Credential Access T1552 Unsecured Credentials
Credential Access T1552.001 Unsecured Credentials: Credentials In Files
Credential Access T1555 Credentials from Password Stores
Credential Access T1555.003 Credentials from Password Stores: Credentials from Web Browsers
Discovery T1012 Query Registry
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1497 Virtualization/Sandbox Evasion
Collection T1005 Data from Local System
Collection T1074 Data Staged
Collection T1114 Email Collection
Command and Control T1071 Application Layer Protocol
Command and Control T1095 Non-Application Layer Protocol
Impact T1485 Data Destruction
Impact T1486 Data Encrypted for Impact
Impact T1489 Service Stop

Relevancy and Insights

  • Uragan ransomware encrypts victim files and appends the “.uragan” extension, preventing access to the original data.
  • The malware creates a ransom note named “README.txt”, which informs victims that their files have been encrypted and can only be restored using a decryption key held by the attackers.
  • The ransom message warns victims against renaming encrypted files or using third-party recovery tools, stating that such actions may result in permanent data loss.
  • The operators claim that sensitive data may have been exfiltrated and could be publicly disclosed if the ransom is not paid, indicating the use of data exposure threats as part of the extortion process.

ETLM Assessment:
CYFIRMA’s analytical assessment suggests that Uragan ransomware operators may continue to evolve within the boundaries of established ransomware tradecraft, with future activity likely focused on operational refinement rather than fundamental innovation. Based on its current use of file encryption, ransom messaging, and data exposure threats, the group may enhance the reliability and speed of encryption routines, improve ransom note clarity to increase payment conversion rates, and standardize extortion workflows. There is also a realistic possibility of expanded double extortion practices, including more structured use of data leakage pressure to amplify coercion. Additionally, operators may attempt to improve initial access efficiency—potentially leveraging common vectors such as phishing or exploitation of exposed services—while maintaining a focus on broad, opportunistic targeting rather than sector-specific campaigns. However, there is currently no direct evidence indicating the development of advanced capabilities (e.g., novel encryption mechanisms, highly targeted intrusions, or custom exploitation frameworks), suggesting that any near-term evolution will most likely remain incremental and aligned with existing ransomware operational models.

Sigma rule:
title: Uncommon Svchost Command Line Parameter tags:
– attack.defense-evasion
– attack.privilege-escalation
– attack.t1036.005
– attack.t1055
– attack.t1055.012 logsource:
category: process_creation product: windows
detection: selection:
# Example of command to simulate: “C:\Windows\System32\svchost.exe” calc.exe
Image|endswith: ‘\svchost.exe’ filter_main_flags:
CommandLine|re: ‘-k\s\w{1,64}(\s?(-p|-s))?’ filter_main_empty:
CommandLine: ” filter_main_null:
CommandLine: null filter_optional_defender:
ParentImage|endswith: ‘\MsMpEng.exe’ CommandLine|contains: ‘svchost.exe’
filter_optional_mrt: ParentImage|endswith: ‘\MRT.exe’ CommandLine: ‘svchost.exe’
condition: selection and not 1 of filter_main_* and not 1 of filter_optional_* falsepositives:
– Unlikely level: high
(Source: Surface Web)

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems. (Source: Surface Web)

RECOMMENDATIONS

STRATEGIC RECOMMENDATIONS

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained, which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATIONS

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Implement a zero-trust security model alongside multifactor authentication (MFA) to reduce the risk of credential compromise.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATIONS

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring, which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Establish and implement protective controls by actively monitoring and blocking identified indicators of compromise (IoCs) and reinforcing defensive measures based on the provided tactical intelligence.

Active Malware of the Week

Type: Information Stealer | Objective: Information/Data Exfiltration |
Target Technology: MacOS| Target Geography: Global

CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malwares that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week, “MacSync Stealer” is in focus.

Overview of Operation MacSync Stealer Malware
MacSync Stealer is a type of malware that targets macOS systems and is built to quietly collect sensitive information without drawing attention. Instead of behaving in an obvious or aggressive way, it runs silently in the background and uses normal system tools so that its activity looks like regular system behavior. This makes it much harder for users or basic security tools to notice anything unusual.

It connects to a remote server to receive instructions and can carry out tasks in accordance with the attacker’s commands. This means malware can adapt its behavior over time. One of its primary objectives is to gather important data, such as login details, system information, or personal files, and then send that data back to the attacker.

In simple terms, MacSync Stealer is designed to stay hidden while giving attackers access to your system and data. Because it operates quietly and blends in with normal activity, it can remain unnoticed for a long time, increasing the risk of data theft and further misuse of the compromised system.

Attack Method
The attack begins with a hidden script that runs silently in the background, ensuring that no visible signs alert the user. It avoids detection by suppressing activity on the screen and even closing open terminal windows, making it difficult to notice any suspicious behavior during execution.

Following successful execution, the script connects to a remote server controlled by the attacker. It sends initial information and waits for instructions. The commands received from the server are executed directly on the system using built-in tools, allowing the attacker to dynamically control the compromised machine without needing to install additional files.

Once the commands are executed, the script gathers sensitive data from the system. This information is then compressed into a file and sent back to the attacker’s server.

This process ensures efficient data exfiltration while minimizing the chances of detection.

To cover its tracks, the script deletes the compressed file after transmission. Overall, the attack is designed to remain stealthy, maintain remote control, and quietly steal data while avoiding detection by users and security tools.

The following are the TTPs based on the MITRE Attack Framework for Enterprise

Tactic Technique ID Technique Name
Execution T1059.002 Command and Scripting Interpreter: AppleScript
Execution T1059.003 Command and Scripting Interpreter: Windows Command Shell
Execution T1204.002 User Execution: Malicious File
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1562.001 Impair Defenses: Disable or Modify Tools
Discovery T1083 File and Directory Discovery
Discovery T1057 Process Discovery
Command and control T1071.001 Application Layer Protocol: Web Protocols
Command and control T1105 Ingress Tool Transfer
Exfiltration T1041 Exfiltration Over C2 Channel
Exfiltration T1048 Exfiltration Over Alternative Protocol

INSIGHTS
This malware shows how attackers are trying to stay hidden by behaving like normal system activity instead of doing anything obviously suspicious. It uses everyday tools and processes to minimize its footprint and blends in with normal system activity, making it harder for security systems to detect. This reflects a shift toward more subtle and discreet attack methods.

Another key point is that the malware depends on externally delivered instructions, typically from a remote server. Rather than operating as a fully self-contained program, it waits for commands from a remote source, which allows the attacker to change its behavior whenever needed. As a result, it becomes more difficult to fully understand its behavior through static code analysis alone.

It also tries to remove any signs of its activity after completing its operations. By cleaning up traces and reducing evidence, it makes post-incident investigation more difficult. This shows that malware is designed not just to carry out an attack, but also to evade detection and hinder subsequent analysis.

ETLM ASSESSMENT
From an ETLM perspective, this malware reflects a trend where attacks become more discreet and closely resemble normal system activity, making it harder to detect and investigate. Instead of using obvious malicious behavior, such threats are expected to rely on familiar tools and standard processes to operate quietly within systems. This shift suggests that attackers will continue to refine techniques that help them stay hidden while maintaining control over compromised environments.

For organizations and individuals, this evolution increases the risk of sensitive data being accessed or misused without immediate detection. It also highlights the increasing importance of awareness, as routine actions and system interactions could potentially be exploited. Over time, this may change how people trust and use digital systems, encouraging more cautious behavior and making it more important to pay attention to unusual or unexpected activity.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

YARA Rules
rule MacSync_Shell_Backdoor
{
meta:
description = “Detection of macOS shell script abusing osascript for C2 and exfiltration”
author = “CYFIRMA” date = “2026-03-23”
severity = “critical”

strings:
$hash1 =
“055ce8476ae9079d0ab8a2b99a65040536114384a1a999e1963ca3840174c04b”
$hash2 =
“158b697c0e4ae73256fc23a9b25a18cd57140ede60757875fea9c2bb688b8552”

$shebang = “#!/bin/zsh”
$exec_null = “exec >/dev/null”
$exec_null_err = “exec 2>/dev/null”
$kill_terminal = “killall Terminal”

$curl_osascript = “curl”
$osascript = “osascript”

$c2_domain = “nordmest.com”
$dynamic_path = “/dynamic”
$gate_path = “/gate”

$api_header = “api-key:”
$user_agent = “Mozilla/5.0 (Macintosh; Intel Mac OS X”

$post_file = “-F \”file=@”
$rm_tmp = “rm -f /tmp/osalogging.zip”

$suspicious_combo = “| osascript”

condition:
any of ($hash*) or ($shebang and
(3 of ($exec_null, $exec_null_err, $kill_terminal)) and
$curl_osascript and
$osascript and
($c2_domain or $dynamic_path or $gate_path) and
$api_header and
$user_agent and
($post_file or $rm_tmp or $suspicious_combo))
}

Recommendations

Strategic Recommendations

  • Adopt a strong cybersecurity strategy that combines endpoint protection, network monitoring, and threat intelligence to improve overall visibility.
  • Create and enforce organization-wide policies for secure system usage and proper control over administrative privileges.
  • Continuously track emerging threats and adjust defenses to stay ahead of evolving malware techniques.
  • Invest in advanced detection methods such as behavioral analysis and anomaly detection to identify hidden or unusual activity.

Management Recommendations

  • Provide regular training to employees on recognizing phishing attempts, social engineering, and safe system practices.
  • Maintain an updated inventory of all assets, including systems and devices, to support faster response during incidents.
  • Ensure that important data is backed up regularly and stored securely to reduce the impact in case of an attack.
  • Conduct response simulations and exercises to evaluate readiness for incidents like malware infections or remote access attacks.

Tactical Recommendations

  • Use endpoint detection tools to monitor system processes, file changes, and network activity for suspicious behavior.
  • Apply network-level protections such as DNS filtering, firewalls, and blocking access to suspicious or unknown domains.
  • Utilize detection rules and threat intelligence to identify malicious files, scripts, or patterns of behavior.
  • Keep systems and applications updated with the latest patches to reduce the chances of exploitation by attackers.

CYFIRMA’s Weekly Insights

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Malware Implant, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Space Bears Ransomware, The Gentlemen Ransomware| Malware – MacSync Stealer
  • Space Bears Ransomware – One of the ransomware groups.
  • The Gentlemen Ransomware – One of the ransomware groups.
    Please refer to the trending malware advisory for details on the following:
  • Malware – MacSync Steale
    Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

Fancy Bear, aka APT28, is carrying out targeted campaigns

  • Threat Actor: Fancy Bear aka APT28
  • Attack Type: Connection Proxy, Credential Dumping, Footprint deletion, Malware Implant, Social Engineering Attack, Timestomping, Exploitation of Vulnerability
  • Objective: Information theft, Espionage, Long-Term Persistence & Stealth
  • Suspected Target Technology: Microsoft Outlook, Office Suites Software, Operating System (Windows, Linux Kernel, Android), Web Application, Oracle Java SE, Adobe Flash Player, Apache Server, Zimbra Collaboration.
  • Suspected Target Geography: Afghanistan, Brazil, Cambodia, France, Georgia, Germany, India, Indonesia, Kazakhstan, Malaysia, Moldova, Pakistan, Romania, Russia, South Africa, Syria, Thailand, Turkey, Ukraine, United States, Vietnam, Australia, Mexico
  • Suspected Target Industries: Aerospace & Defense, Capital Goods, Critical Infrastructure, Crypto, Defense, Energy, Energy Equipment & Services, Government, Information Technology, Military, NGO, Telecommunications, Utilities, Banking & Investment Services
  • Business Impact: Compromised user accounts, Data Theft, Operational Disruption, Reputational Damage, Financial Loss

About the Threat Actor
FANCY BEAR is a well-documented Russian state-sponsored threat actor that has been active since at least 2007 and is widely assessed to operate in close coordination with Russian intelligence services. Security researchers have attributed multiple high-profile cyber operations to the group, including election interference activities in several countries, aimed at influencing political outcomes in favor of the Russian government.

Details on Exploited Vulnerabilities

CVE ID Affected Products CVSS Score Exploit Links
CVE-2023-38831 WinRAR 7.8 Link
CVE-2021- 4034 pkexec application 7.8 Link 1, Link 2
CVE-2016- 5195 Linux kernel 7.0 Link1, Link2, Link3, Link4, Link5, and Link6
CVE-2020- 0688 Microsoft Exchange 8.8 Link 1 and Link 2
CVE-2015- 2545 Microsoft Office 7.8
CVE-2025-66376 Zimbra Collaboration 6.1

TTPs based on MITRE ATT&CK Framework

Tactic ID Technique
Reconnaissance T1591 Gather Victim Org Information
Reconnaissance T1598.003 Phishing for Information: Spear phishing Link
Reconnaissance T1598 Phishing for Information
Reconnaissance T1596 Search Open Technical Databases
Resource Development T1583.001 Acquire Infrastructure: Domains
Resource Development T1583.003 Acquire Infrastructure: Virtual Private Server
Resource Development T1583.006 Acquire Infrastructure: Web Services
Resource Development T1586.002 Compromise Accounts: Email Accounts
Resource Development T1584.008 Compromise Infrastructure: Network Devices
Resource Development T1588.002 Obtain Capabilities: Tool
Initial Access T1189 Drive-by Compromise
Initial Access T1190 Exploit Public-Facing Application
Initial Access T1133 External Remote Services
Initial Access T1091 Replication Through Removable Media
Initial Access T1199 Trusted Relationship
Initial Access T1078 Valid Accounts
Initial Access T1078.004 Valid Accounts: Cloud Accounts
Initial Access T1566.001 Phishing: Spear phishing Attachment
Execution T1204.001 User Execution: Malicious Link
Execution T1203 Exploitation for Client Execution
Execution T1559.002 Inter-Process Communication: Dynamic Data Exchange
Execution T1204.002 User Execution: Malicious File
Persistence T1098.002 Account Manipulation: Additional Email Delegate Permissions
Persistence T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Persistence T1037.001 Boot or Logon Initialization Scripts: Logon Script (Windows)
Persistence T1546.015 Event Triggered Execution: Component Object Model Hijacking
Persistence T1133 External Remote Services
Persistence T1137.002 Office Application Startup: Office Test
Persistence T1542.003 Pre-OS Boot: Bootkit
Persistence T1505.003 Server Software Component: Web Shell
Persistence T1078 Valid Accounts
Persistence T1078.004 Valid Accounts: Cloud Accounts
Privilege Escalation T1134.001 Access Token Manipulation: Token Impersonation/Theft
Privilege Escalation T1098.002 Account Manipulation: Additional Email Delegate Permissions
Privilege Escalation T1547.001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
Privilege Escalation T1037.001 Boot or Logon Initialization Scripts: Logon Script (Windows)
Privilege Escalation T1546.015 Event Triggered Execution: Component Object Model Hijacking
Privilege Escalation T1078.004 Valid Accounts: Cloud Accounts
Defense Evasion T1134.001 Access Token Manipulation: Token Impersonation/Theft
Defense Evasion T1564.001 Hide Artifacts: Hidden Files and Directories
Defense Evasion T1564.003 Hide Artifacts: Hidden Window
Defense Evasion T1070.001 Indicator Removal: Clear Windows Event Logs
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1070.006 Indicator Removal: Timestomp
Defense Evasion T1036 Masquerading
Defense Evasion T1036.005 Masquerading: Match Legitimate Resource Name or Location
Defense Evasion T1027.013 Obfuscated Files or Information: Encrypted/Encoded File
Defense Evasion T1542.003 Pre-OS Boot: Bootkit
Defense Evasion T1014 Rootkit
Defense Evasion T1218.011 System Binary Proxy Execution: Rundll32
Defense Evasion T1221 Template Injection
Defense Evasion T1550.001 Use Alternate Authentication Material: Application Access Token
Defense Evasion T1550.002 Use Alternate Authentication Material: Pass the Hash
Defense Evasion T1078.004 Valid Accounts: Cloud Accounts
Credential Access T1557.004 Adversary-in-the-Middle: Evil Twin
Credential Access T1110 Brute Force
Credential Access T1110.001 Brute Force: Password Guessing
Credential Access T1110.003 Brute Force: Password Spraying
Credential Access T1056.001 Input Capture: Keylogging
Credential Access T1040 Network Sniffing
Credential Access T1003 OS Credential Dumping
Credential Access T1003.001 OS Credential Dumping: LSASS Memory
Credential Access T1003.002 OS Credential Dumping: Security Account Manager
Credential Access T1003.003 OS Credential Dumping: NTDS
Credential Access T1528 Steal Application Access Token
Discovery T1083 File and Directory Discovery
Discovery T1040 Network Sniffing
Discovery T1120 Peripheral Device Discovery
Discovery T1057 Process Discovery
Lateral Movement T1210 Exploitation of Remote Services
Lateral Movement T1091 Replication Through Removable Media
Lateral Movement T1550.001 Use Alternate Authentication Material: Application Access Token
Lateral Movement T1550.002 Use Alternate Authentication Material: Pass the Hash
Collection T1557.004 Adversary-in-the-Middle: Evil Twin
Collection T1560 Archive Collected Data
Collection T1560.001 Archive Collected Data: Archive via Utility
Collection T1119 Automated Collection
Collection T1213 Data from Information Repositories
Collection T1213.002 Data from Information Repositories: Sharepoint
Collection T1005 Data from Local System
Collection T1039 Data from Network Shared Drive
Collection T1025 Data from Removable Media
Collection T1074.001 Data Staged: Local Data Staging
Collection T1074.002 Data Staged: Remote Data Staging
Collection T1114.002 Email Collection: Remote Email Collection
Collection T1056.001 Input Capture: Keylogging
Collection T1113 Screen Capture
Command and Control T1001.001 Data Obfuscation: Junk Data
Command and Control T1071.001 Application Layer Protocol: Web Protocols
Command and Control T1071.003 Application Layer Protocol: Mail Protocols
Command and Control T1092 Communication Through Removable Media
Command and Control T1573.001 Encrypted Channel: Symmetric Cryptography
Command and Control T1105 Ingress Tool Transfer
Command and Control T1090.001 Proxy: Internal Proxy
Command and Control T1090.002 Proxy: External Proxy
Command and Control T1090.003 Proxy: Multi-hop Proxy
Command and Control T1102.002 Web Service: Bidirectional Communication
Exfiltration T1030 Data Transfer Size Limits
Exfiltration T1048.002 Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol
Impact T1498 Network Denial of Service

Latest Developments Observed
The threat actor is suspected to have conducted a targeted phishing campaign leveraging a cross-site scripting (XSS) vulnerability in Zimbra Collaboration (CVE- 2025-66376) to compromise a Ukrainian government entity. The campaign appears to be aimed at exfiltrating sensitive information from the targeted systems.

ETLM Insights
Fancy Bear, aka APT28, represents a highly agile, geopolitically driven threat actor, requiring organisations to adopt a predictive, intelligence-led defence strategy focused on early warning, campaign tracking, and proactive threat mitigation.

Operationally, the actor demonstrates the capability to conduct long-term intelligence collection campaigns as well as timed disruptive or destructive operations. These activities are often closely aligned with geopolitical objectives and may be synchronised with offline military or diplomatic developments, amplifying their strategic impact.

The actor’s behaviour is underpinned by the following core strategic drivers: Geopolitical Objectives Over Financial Gains: Operations are primarily driven by national strategic interests rather than monetary motives, with a focus on intelligence collection, influence, and disruption.

Maximising Strategic Impact with Plausible Deniability: Campaigns are designed to achieve high-impact outcomes while maintaining ambiguity, often leveraging covert infrastructure, proxy actors, and obfuscation techniques to avoid direct attribution.

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems. (Source: Surface Web)

YARA Rules
rule APT28_Zimbra_XSS_Exploit
{
meta:
description = “Detects XSS exploitation patterns targeting Zimbra” author = “CYFIRMA”
date = “2026-03-23”
strings:
$x1 = “<script>” nocase
$x2 = “document.cookie” ascii
$x3 = “onerror=” ascii
$x4 = “onload=” ascii
$x5 = “fetch(” ascii
$x6 = “XMLHttpRequest” ascii
$x7 = “atob(” ascii
$x8 = “eval(” ascii condition:
4 of ($x*)
}

rule APT28_Zimbra_XSS_Payload
{
meta:
description = “Detects XSS/injection payloads targeting Zimbra (APT28 activity)” author = “CYFIRMA”
date = “2026-03-23”
strings:
$xss1 = “<script>” ascii nocase
$xss2 = “document.cookie” ascii
$xss3 = “XMLHttpRequest” ascii
$xss4 = “atob(” ascii
$xss5 = “fetch(” ascii
$xss6 = “eval(” ascii
$xss7 = “onerror=” ascii
$xss8 = “String.fromCharCode” ascii condition:
5 of ($xss*)
}

Recommendations

Strategic Recommendations

  • Incorporate Digital Risk Protection (DRP) as part of the overall security posture to proactively defend against impersonations and phishing attacks.
  • Assess and deploy alternatives for an advanced endpoint protection solution that provides detection/prevention for malware and malicious activities that do not rely on signature-based detection methods.
  • Block exploit-like behaviour. Monitor endpoints memory to find behavioural patterns that are typically exploited, including unusual process handle requests. These patterns are features of most exploits, whether known or new. This will be able to provide effective protection against zero-day/critical exploits and more by identifying such patterns.

Management Recommendations

  • Invest in user education and implement standard operating procedures for the handling of financial and sensitive data transactions commonly targeted by impersonation attacks. Reinforce this training with context-aware banners and in- line prompts to help educate users.
  • Develop a cyber threat remediation program and encourage employee training to detect anomalies proactively.

Tactical Recommendations

  • For better protection coverage against email attacks (like spear phishing, business email compromise, or credential phishing attacks), organizations should augment built-in email security with layers that take a materially different approach to threat detection.
  • Protect accounts with multi-factor authentication. Exert caution when opening email attachments or clicking on embedded links supplied via email communications, SMS, or messaging.
  • Apply security measures to detect unauthorized activities, protect sensitive production, and process control systems from cyberattacks.
  • Add the YARA rules for threat detection and monitoring, which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

3. Major Geopolitical Developments in Cybersecurity

EU sanctions Chinese and Iranian companies for aiding cyberattacks
The European Union has imposed sanctions on two Chinese companies and one Iranian firm, along with two individuals, for their involvement in cyberattacks targeting EU member states and partners.

The measures target China-based Integrity Technology Group and Anxun Information Technology (also known as iSoon), as well as the Iran-based company Emennet Pasargad. The EU also sanctioned the two co-founders of Anxun Information Technology.

According to EU officials, Integrity Technology Group provided technical support that enabled the compromise of more than 65,000 devices across six EU member states between 2022 and 2023, while Anxun Information Technology supplied hacking services aimed at critical infrastructure and key state functions in EU countries and beyond. Meanwhile, Emennet Pasargad unlawfully accessed a French subscriber database, attempted to sell the stolen data on the dark web, and carried out disinformation operations – including hacking advertising billboards – during the 2024 Paris Olympics. It was also linked to other disruptive cyber activities, such as interfering with a Swedish SMS service.

As a result of the sanctions, the listed entities and individuals face an asset freeze. EU citizens and companies are prohibited from providing them with funds, financial assets, or economic resources. The two individuals are also subject to a travel ban, preventing them from entering or transiting through EU territory.

ETLM Assessment
Both China and Iran have conducted aggressive cyber operations against the European Union and its member states. Both states increasingly rely on the private sector to conduct or support these campaigns, allowing a degree of plausible deniability while scaling operations beyond direct government agencies. In China, nominally private cybersecurity companies like iSoon and Integrity Tech operate as “hack-for-hire” contractors for the Ministry of Public Security (MPS) and Ministry of State Security (MSS), developing tools, providing infrastructure, and executing intrusions on behalf of the state in exchange for contracts. In Iran, companies such as Emennet Pasargad function as extensions of the Islamic Revolutionary Guard Corps (IRGC), blending commercial hacking services with state-directed espionage, data theft, and influence operations. This outsourcing model helps both regimes expand their cyber reach while complicating attribution and international responses.

Iran’s cyber operations continue despite strikes on infrastructure
US and Israeli strikes on Iran’s Ministry of Intelligence and Security (MOIS) in late February and early March 2026 reportedly killed two key figures tied to the country’s state-backed cyber operations and bombed out the infrastructure used by Iranian intelligence agencies’ cyber campaigns. Yet affiliated hacking groups have continued their activities. Among those killed were Mohammad Mehdi Farhadi Ramin, who was charged by the US Justice Department in 2020 for hacking American aerospace and defense firms, and Seyed Yahya Hosseiny Panjaki, a senior MOIS intelligence official linked by the FBI to cyberattacks and terror plots. Panjaki reportedly oversaw the MOIS unit responsible for directing state-affiliated hacktivist groups, including the notorious Handala. Despite these leadership losses, Iran’s cyber capabilities have proven resilient due to their decentralized structure. Handala has since claimed responsibility for a major disruptive attack on US medtech giant Stryker, while another MOIS-linked group carried out operations against Albanian targets. Western governments, organizations, and critical infrastructure operators should remain on high alert for sustained Iranian cyber threats amid the ongoing conflict.

ETLM Assessment:
Iran’s cyber operations have remained active despite the loss of senior MOIS leaders because of the highly decentralized structure of its cyber capabilities. Rather than relying on a single centralized command, Iran has built a network of semi-autonomous hacking groups, hacktivist personas (such as Handala), and external proxies that operate with significant independence. This distributed model allows individual units to continue planning and executing attacks – even when leadership is disrupted, or domestic internet infrastructure is damaged – using pre-positioned tools, alternative communications like Starlink, and delegated authority. As a result, the elimination of key figures has slowed coordination but has not shut down the overall cyber campaign.

4. Rise in Malware/Ransomware and Phishing

Space Bears Ransomware Impacts Bonheure Corporation

  • Attack Type: Ransomware
  • Target Industry: Entertainment & Leisure
  • Target Geography: Japan
  • Ransomware: Space Bears Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
CYFIRMA observed in an underground forum that a company from Japan, Bonheure Corporation (https[:]//bonheure[.]co[.]jp/), was compromised by Space Bears Ransomware. Bonheure Corporation is a Japan-based company operating primarily in the entertainment and leisure industry, specifically within the amusement parks and arcades sector. The compromised data includes confidential and sensitive information belonging to the organization.

Source: Dark Web

Relevancy & Insights:

  • Space Bears operates a dedicated leak site that was first identified in April 2024. This site is used to publish stolen data from victims, showcasing the group’s pivot towards data theft as a primary method of extortion.
  • Space Bears is associated with the Phobos ransomware-as-a-service (RaaS) operation. The group utilizes similar tactics and tools, including hosting stolen data on their leak site, which has been linked to the Faust operator within the Phobos ecosystem.
  • The Space Bears group employs double extortion strategies, where they not only encrypt files but also exfiltrate sensitive data before encryption. If the ransom is not paid, they threaten to leak this data publicly.
  • The Space Bears Ransomware group primarily targets countries such as the United States of America, Spain, Brazil, the United Kingdom, and Australia.
  • The Space Bears Ransomware group primarily targets industries, including Manufacturing, Healthcare, Professional Goods & Services, Information Technology, and Consumer Goods & Services.
  • Based on the Space Bears Ransomware victims list from 1st Jan 2025 to 24th March 2026, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Space Bears Ransomware victims list from 1st Jan 2025 to 24th March 2026 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Space Bears ransomware represents a significant threat in the evolving landscape of cybercrime. With its aggressive tactics, association with established ransomware operations like Phobos, and focus on double extortion, organizations are advised to bolster their cybersecurity measures to mitigate risks associated with such attacks. Continuous monitoring of this group’s activities will be essential for understanding their methods and potential impact on various sectors.

The Gentlemen Ransomware Impacts Medicus Shuppan

  • Attack Type: Ransomware
  • Target Industry: Healthcare
  • Target Geography: Japan
  • Ransomware: The Gentlemen Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
CYFIRMA observed in an underground forum that a company from Japan, Medicus Shuppan (https[:]//www[.]medica[.]co[.]jp/), was compromised by the Gentlemen Ransomware. Medicus Shuppan is dedicated to providing enjoyable learning experiences for healthcare professionals through a variety of products and services, including seminar books and digital content. The company aims to support the education of medical practitioners and contribute to the future of healthcare. They also focus on sustainability and creating valuable content that serves as a backbone in the medical field. Their intended clients include healthcare professionals, authors, and bookstores. The data, which has been breached, has not yet appeared on the leak site, indicating that negotiations between the affected party and the ransomware group may be underway. The compromised data includes confidential and sensitive information belonging to the organization.

Source: Dark Web

Relevancy & Insights:

  • The Gentlemen is a relatively highly sophisticated ransomware-as-a-service (RaaS) group that emerged in mid-2025.
  • The Gentlemen Ransomware group primarily targets countries such as the United States of America, Brazil, Thailand, France, and Spain.
  • The Gentlemen Ransomware group primarily targets industries, including Consumer Goods & Services, Manufacturing, Materials, Professional Goods & Services, and Information Technology.
  • Based on the Gentlemen Ransomware victims list from 1st July 2025 to 24th March 2026, the top 5 Target Countries are as follows:
  • The Top 10 Industries most affected by the Gentlemen Ransomware victims list from 1st July 2025 to 24th March 2026are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, the Gentlemen Ransomware is a highly adaptive and globally active threat that leverages dual-extortion tactics, combining data theft with file encryption. The group employs advanced evasion and persistence techniques, supports cross-platform and scalable ransomware deployment, and conducts targeted attacks across multiple industries and geographic regions. This combination of capabilities makes it a significant risk to enterprise cybersecurity defenses, particularly for organizations with limited detection and incident-response maturity.

5. Vulnerabilities and Exploits

Vulnerability in E-Mail MFA Provider

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Authentication Systems / Multi-Factor Authentication (MFA) Solutions
  • Vulnerability: CVE-2026-4208
  • CVSS Base Score: 7.7 Source
  • Vulnerability Type: Authentication Bypass
  • Summary: The vulnerability allows a remote attacker to bypass the authentication process.

Relevancy & Insights:
The vulnerability exists since the affected extension fails to properly reset the generated MFA code after successful authentication.

Impact:
A remote user can bypass authentication and gain access to the target system.

Affected Products:
https[:]//typo3[.]org/security/advisory/typo3-ext-sa-2026-007/

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerability in the E-Mail MFA Provider introduces significant risks to identity and access management systems that rely on multi-factor authentication to secure user accounts and critical services. As MFA mechanisms are widely deployed across enterprise applications, cloud platforms, and authentication infrastructures, exploitation of this vulnerability could allow attackers to bypass authentication controls and gain unauthorized access to protected systems. Organizations leveraging MFA-based authentication frameworks must ensure timely patching and continuous monitoring of authentication processes to detect abnormal access attempts. Addressing this vulnerability is essential to maintaining the integrity of authentication mechanisms and safeguarding sensitive organizational resources across industries and geographic regions.

6. Latest Cyber-Attacks, Incidents, and Breaches

Killsec Ransomware attacked and published the data of Meena Health

  • Threat Actor: Killsec Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Healthcare
  • Target Geography: Saudi Arabia
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that Killsec Ransomware attacked and published the data of Meena Health(www[.]meena-health[.]com) on its dark web website. Meena Health is a healthcare service provider and medical group operating in the Hospitals & Healthcare industry, primarily based in Saudi Arabia. The compromised data appears to consist of highly sensitive healthcare and patient-related information, indicating a breach of medical records. The exposed dataset includes structured directories, such as laboratory results, radiology reports, prescriptions, and sick leave documents, suggesting unauthorized access to an internal medical records system. The leaked files likely contain Protected Health Information (PHI), including patient identities, diagnostic results, treatment details, and official medical documents issued by healthcare providers.

Source: Dark Web

Relevancy & Insights:

  • KillSec is a ransomware group that has gained notoriety for its ransomware-as-a- service (RaaS) model and a series of high-profile attacks.
  • KillSec Ransomware employs various sophisticated methods to infiltrate systems, including phishing attacks, exploiting known vulnerabilities, and using custom malware to maintain persistence within compromised networks.

ETLM Assessment:

  • The emergence and evolution of KillSec’s Ransomware-as-a-Service (RaaS) platform represents a concerning development in the cybercrime landscape. By lowering the technical barrier to entry, this RaaS model allows less skilled individuals to engage in sophisticated ransomware attacks, potentially leading to an increase in such incidents globally.
  • According to CYFIRMA’s assessment, the KillSec ransomware group is expected to continue targeting a wide range of industries worldwide. Their advanced tactics, such as exploiting website vulnerabilities and conducting credential theft, make them a significant threat to organizations with inadequate security measures in place.

7. Data Leaks

Koiride Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Transportation
  • Target Geography: Saudi Arabia
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA research team identified a post on a dark web forum by a threat actor using the alias “stalker8083”, claiming to be in possession of a large dataset allegedly associated with Koiride[.]com, a provider of airport transfer and transportation services, which has allegedly been compromised in a massive data breach. The incident involves an unidentified individual who recently posted on a cybercrime forum, claiming to possess a database containing 47 million rows of sensitive company information and offering it for sale for $1,000.

The allegedly compromised data encompasses extensive records pertaining to both drivers and passengers. According to the actor, the exposed information includes:

  • First and last names
  • Email addresses
  • Phone numbers (including WhatsApp contacts)
  • Physical addresses (city, country, zip code)
  • Driver details (including car information, license details, and number plates for 11,891 drivers)
  • Passenger data (accounting for 1 million rows)
  • Payoneer account data and payout details
  • Future reservation records
  • Account passwords (hashed)

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

Usha International Limited Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Manufacturing
  • Target Geography: India
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary: The CYFIRMA research team identified a post on a dark web forum by a threat actor operating under the alias “Alpha02z”, advertising the sale of a database allegedly belonging to Usha International Limited, a major Indian consumer durables and manufacturing company. The threat actor claims that the dataset contains sensitive employee and infrastructure-related information and is being offered for sale at a price of $10,000 USD. The post suggests that the data is being sold as a one-time transaction, indicating exclusivity and potential urgency for buyers.

According to the forum post, the dataset includes a wide range of personally identifiable information (PII) and employee-related records, such as:

  • Employee codes and identifiers
  • First and last names
  • Family details (father/husband name)
  • Gender and date of birth
  • Blood group and marital status
  • Nationality and religion
  • Residential and permanent addresses (city, state, PIN codes)
  • Employee email addresses
  • Employee cell phone numbers
  • Employment details (employee number, join date, start date, resignation date, employment status)
  • Government-issued identification numbers:
  • Aadhaar card number
  • PAN number
  • ESIC (Employee State Insurance) number
  • Banking information:
  • Bank name
  • Bank account number

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously looking for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to gain access and steal valuable data. Subsequently, the stolen data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The threat actor operating under the alias “Alpha02z” is considered an active entity within underground cybercriminal forums, primarily engaged in the sale and distribution of allegedly compromised data. Various reports link this actor to multiple incidents involving claimed unauthorized access to organizational systems and the advertisement of stolen datasets on dark web marketplaces. Their activities reflect the ongoing and evolving nature of cyber threats originating from such platforms, where sensitive information is monetized. These developments emphasize the need for organizations to strengthen their cybersecurity posture through continuous monitoring, the use of advanced threat intelligence, and the implementation of proactive security measures to safeguard critical data and infrastructure.

Recommendations: Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related attacks.
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA research team identified a post on a dark web forum advertising an alleged data breach involving E-accounting[.]co[.]kr, a South Korea-based SaaS company. The post was published by a threat actor using the alias “888”, who claims responsibility for compromising the organization and exfiltrating its source code. The actor is offering the data for download, including a sample file, indicating an attempt to distribute or monetize the stolen information.

Details of the Alleged Compromise According to the forum post:

  • The target is a South Korean SaaS (Software-as-a-Service) company
  • The attacker claims to have stolen the complete source code of the platform
  • The data is being made available for:
  • Free download (sample)
  • Full dataset access (via forum interaction or upgrade)

The post includes references to downloadable content, suggesting that the data is already accessible to other threat actors.
Type of Compromised Data

  • Source Code
  • Application backend and/or frontend code
  • Potential exposure of APIs, business logic, and system architecture

The authenticity of this breach remains unverified at the time of reporting, as the claim originates solely from the threat actor.

Source: Underground Forums

RECOMMENDATIONS

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Deploy a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence, providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions, remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Ensure that detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies should be continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security controls, such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.