Threat Research | Weekly Recap [16 Jun 2025]

This weekly recap covers global ransomware trends, including notable incidents like Fog and Spectra, and exploits of vulnerabilities such as CVE-2024-57727. It highlights ongoing activities from threat groups like Arkana, LockBit, and MISSION2025, along with malware campaigns like DCRat and GrayAlpha’s diverse infection vectors. #Arkana #LockBit #MISSION2025 #DCRat #GrayAlpha

Read More
SadFuture: Mapping XDSpy latest evolution

This report investigates a 2025 cyber-espionage campaign by the XDSpy threat actor targeting Eastern European and Russian government entities using the XDigo malware and exploiting a Microsoft Windows LNK vulnerability (ZDI-CAN-25373). It provides detailed technical analysis of the malware, infection chains, infrastructure, and attribution tying the activity to XDSpy. #XDSpy #XDigo…

Read More
Warning Against Distribution of Malware Disguised as Research Papers (Kimsuky Group)

The Kimsuky group conducted a phishing attack disguising as a paper review request, delivering a password-protected HWP document containing malicious OLE objects that executed multiple payload files and scheduled tasks. The attack employed a combination of PowerShell scripts, scheduled execution, and manipulation of AnyDesk remote access software to maintain persistence and…

Read More

Cybersecurity researchers have identified malicious packages on PyPI and npm that target developers by stealing sensitive data, including credentials and environment variables. These threats demonstrate sophisticated multi-stage attack methods and emphasize the importance of vigilant security practices in open-source development environments. #chimera-sandbox-extensions #Pypi #npm #PulsarRAT #slopsquatting…

Read More
Week in review: Microsoft fixes exploited zero-day, Mirai botnets target unpatched Wazuh servers – Help Net Security

Microsoft patched 66 vulnerabilities in its June 2025 update, including a zero-day exploited in cyber espionage (CVE-2025-33053). Several ongoing threats were highlighted, such as Mirai botnets targeting Wazuh servers and zero-click iOS attacks delivering Graphite spyware (CVE-2025-43200). #CVE202533053 #Mirai #GraphiteSpyware #CVE202543200

Read More
Reflective Kerberos Relay Attack CVE 2025 33073 NT AUTHORITY SYSTEM Privilege Escalation

The Reflective Kerberos Relay Attack (CVE-2025-33073) exploits a vulnerability in Windows environments to escalate privileges to SYSTEM level by bypassing NTLM protections using Kerberos. Discovered by RedTeam Pentesting in early 2025, this attack affects all unpatched Windows versions, highlighting a significant ongoing threat. #CVE-2025-33073 #KerberosRelay #PrivilegeEscalation #RedTeamPentesting

Read More
How Hackers Achieve Invisible Persistence in Active Directory Shadow Credentials &…

This article provides a comprehensive guide to exploiting the Shadow Credentials vulnerability in Active Directory, a stealthy technique used for privilege escalation and persistence. It highlights how attackers can leverage misconfigured permissions on msDS-KeyCredentialLink to bypass authentication and maintain covert access, emphasizing the importance of monitoring and restricting specific attribute modifications. #ShadowCredentials #ActiveDirectory #PKINIT #DCSync

Read More