Self Assessment

Weekly Intelligence Report – 25 Apr 2025

Published On : 2025-04-24
Share :
Weekly Intelligence Report – 25 Apr 2025

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware
Target Technologies: MS Windows

Introduction
CYFIRMA Research and Advisory Team has found Qilra Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

Qilra Ransomware
Qilra is a newly discovered ransomware strain recently identified by researchers. Upon infecting a victim’s system, Qilra encrypts files, appends the “.qilra” extension to the affected files, and drops a ransom note titled “RESTORE-MY-FILES.TXT”.

Screenshot of files encrypted by ransomware (Source: Surface Web)

The ransom note informs the victim that their important files have been encrypted and exfiltrated. According to the attackers, only they possess the means to decrypt the stolen data. If the victim fails to comply, the decryption key will be permanently destroyed, and the stolen data will be publicly released.

The note includes an email address for contact and provides a unique decryption ID. It also offers to decrypt one file for free as proof. Furthermore, the message imposes a 72- hour deadline for the victim to initiate communication and complete the ransom payment.

Screenshot of Qilra’s text file (“RESTORE-MY-FILES.TXT”):(Source: Surface Web)

Following are the TTPs based on the MITRE Attack Framework

Tactic Technique ID Technique Name
Execution T1059 Command and Scripting Interpreter
Execution T1129 Shared Modules
Persistence T1542.003 Pre-OS Boot: Bootkit
Persistence T1574.002 Hijack Execution Flow: DLL Side-Loading
Privilege Escalation T1055 Process Injection
Privilege Escalation T1574.002 Hijack Execution Flow: DLL Side-Loading
Defense Evasion T1014 Rootkit
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1027.002 Obfuscated Files or Information: Software Packing
Defense Evasion T1036 Masquerading
Defense Evasion T1055 Process Injection
Defense Evasion T1070.004 Indicator Removal: File Deletion
Defense Evasion T1070.006 Indicator Removal: Timestomp
Defense Evasion T1202 Indirect Command Execution
Defense Evasion T1497.001 Virtualization/Sandbox Evasion: System Checks
Defense Evasion T1542.003 Pre-OS Boot: Bootkit
Defense Evasion T1564.001 Hide Artifacts: Hidden Files and Directories
Defense Evasion T1564.003 Hide Artifacts: Hidden Window
Defense Evasion T1574.002 Hijack Execution Flow: DLL Side-Loading
Credential Access T1003 OS Credential Dumping
Credential Access T1552.001 Unsecured Credentials: Credentials in Files
Discovery T1057 Process Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1497.001 Virtualization/Sandbox Evasion: System Checks
Discovery T1518.001 Software Discovery: Security Software Discovery
Collection T1005 Data from Local System
Collection T1114 Email Collection
Command and Control T1071 Application Layer Protocol
Impact T1485 Data Destruction
Impact T1486 Data Encrypted for Impact
Impact T1490 Inhibit System Recovery
Impact T1496 Resource Hijacking

Relevancy and Insights:

  • This ransomware specifically targets the widely used Windows Operating System, which is prevalent across numerous industries and organizations.
  • Detect-Debug-Environment: Debugging environments are used by developers to analyze and troubleshoot software. The ransomware uses this technique to determine whether it is operating in a debug environment. This feature aids the ransomware in avoiding analysis and detection attempts.
  • Calls to WMI: The ransomware is making calls to the Windows Management Instrumentation (WMI) framework. WMI is a powerful tool used by many legitimate applications and services, but it can also be exploited by malware to execute commands, collect information, or perform system modifications.
  • The ransomware’s attempt to delete Volume Shadow Copies (VSS) indicates a deliberate effort to hinder data recovery options for victims.

ETLM Assessment:
CYFIRMA’s assessment, based on currently available data, indicates that Qilra ransomware is likely to evolve with heightened stealth capabilities and broader targeting of critical infrastructure sectors. Future variants may incorporate zero-day exploits or exploit supply chain channels to increase distribution efficiency. Its observed use of anti-debugging techniques, WMI abuse, and shadow copy deletion points to a trajectory of more aggressive defense evasion and persistence methods. Given its emphasis on data exfiltration, Qilra is expected to further refine its extortion strategies, posing greater risks to sensitive data.

Sigma rule:
title: Delete shadow copy via WMIC threatname:
behaviorgroup: 18
classification: 0 mitreattack:

logsource:
category: process_creation product: windows
detection: selection:
CommandLine:
– ‘*wmic*shadowcopy delete*’ condition: selection
level: critical
(Source: Surface Web)
IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.

STRATEGIC RECOMMENDATION

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATION

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATION

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Trending Malware of the Week

Type: Trojan | Objectives: Operational Disruption | Target Technology: Linux OS | Target Geographies: Asia, Europe, and the Americas

CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malware that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week “XorDDoS” is trending.

XorDDoS
Researchers discovered that the XorDDoS malware, a known threat since 2014, has been actively spreading across the globe between November 2023 and February 2025. This Linux-targeting malware hijacks systems and turns them into bots used for disruptive DDoS attacks. A newly upgraded variant of the XorDDoS controller, referred to as the “VIP” version, has played a key role in enabling large-scale operations through an expanded botnet infrastructure. A striking detail in the latest findings reveals that more than 70 percent of these attacks were directed at the United States during this period. Still, the campaign has left its mark globally, affecting systems in countries across Asia, Europe, and the Americas. Despite its age, XorDDoS continues to be a powerful tool in the hands of its operators. Researchers strongly believe the group behind this operation is Chinese speaking, based on language indicators found within the malware’s infrastructure. As the malware maintains its momentum, organizations worldwide remain at risk from these persistent and widespread attacks.

Attack Method
XorDDoS spreads by launching brute-force attacks over SSH, targeting Linux systems with weak or default credentials. It repeatedly attempts various username and password combinations until it gains access to a vulnerable server. Once inside, the malware quickly establishes persistence by installing scripts that ensure it runs automatically every time the system restarts. These scripts are embedded within the malware itself and are designed to help it avoid detection and maintain control over the compromised machine.

After securing access and ensuring it remains active on the infected device, XorDDoS proceeds to decrypt its internal configuration using a XOR key. This step reveals a list of remote servers—either IP addresses or URLs—that the malware contacts to receive further instructions. These servers, part of the command-and-control infrastructure, play a crucial role in coordinating attacks by delivering commands and managing the botnet. The infected system then becomes part of a larger network of compromised devices, ready to be used in disruptive DDoS operations. This organized method of communication and control reflects the increasingly structured nature of these campaigns.

To expand its reach and streamline command execution, XorDDoS uses a component called the controller binder, which links individual controllers to a central control hub. By injecting into a specified process on the host machine, attackers can manage multiple sub-controllers at once, sending DDoS commands to all of them simultaneously. This centralized approach makes large-scale attacks easier to coordinate and more efficient. The central controller itself includes features that let attackers fine-tune their operations—for example, adjusting SYN packet size or launching round-robin style attacks, where each infected host takes turns sending packets. However, the tool is designed to work only with specific versions of the sub- controller, limiting compatibility with older underground variants. Notably, the developer behind this tool even embedded their instant messaging contact and references to other versions being sold, reinforcing the idea that this is part of a commercial offering aimed at other cybercriminals.

Fig: XorDDoS control flow

Following the control flow, a closer look at how XorDDoS operates behind the scenes reveals the level of coordination involved in its campaigns. Once the malware is installed on a compromised system, it sends encrypted “phone home” data to report back to its controller, including system details and version identifiers. This marks the start of a controlled communication loop between the infected device and the sub-controller. After the initial handshake, the sub-controller receives instructions from the main controller using a unique header that confirms the authenticity of the command. This system mirrors a basic client-server model, ensuring only legitimate commands are executed.

Meanwhile, the central controller uses a controller binder to inject itself into the sub- controller, taking full command. Once this link is active, the sub-controller returns key system information in plain text—such as IP address and hostname—back to the central controller. Every command exchanged between the controllers and the infected devices is tracked with an incrementing message ID, making it easier for attackers to coordinate tasks like launching or stopping a SYN DDoS attack or targeting specific IP addresses. This structured system not only strengthens the malware’s efficiency but also highlights how far the XorDDoS ecosystem has evolved into a well-oiled, large-scale attack network.

INSIGHTS

  • Over the past few years, XorDDoS has quietly expanded its foothold, evolving beyond its original scope and exploiting overlooked entry points in modern infrastructure. By exploiting weak SSH credentials, the malware gains access, installs itself, and turns compromised hosts into bots. Notably, it has extended its reach to Docker environments, signalling a shift toward targeting containerized systems and cloud-native setups. The surge in malicious DNS requests linked to its C2 infrastructure highlights the growing scale and sophistication of the botnet, showing that XorDDoS is adapting to become a more persistent and efficient threat.
  • What’s especially noteworthy is how the attackers maintain such a high degree of control across a distributed network of infected machines. Through a tightly orchestrated communication chain—from initial compromise to command execution—they ensure each system remains aligned with campaign objectives. This speaks to a disciplined operation, where every phase of the attack lifecycle is fine-tuned for consistency and impact. It’s not just about creating noise through DDoS attacks but about sustaining control, adapting to environments, and reinforcing the infrastructure needed to keep attacks persistent.
  • While XorDDoS has roots dating back nearly a decade, its continued activity into 2025 demonstrates the staying power of threats that are methodically maintained and modernized. The campaign’s current footprint, spanning continents and showing deliberate focus on certain regions, suggests it is not a relic of the past but a resilient player in today’s threat landscape. It serves as a reminder that legacy malware, when backed by a determined and well-resourced group, can continue to pose significant risks—especially when it evolves faster than the defenses built to stop it.

ETLM ASSESSMENT
From the ETLM perspective, CYFIRMA anticipates that XorDDoS represents a growing shift toward more structured and scalable attack models that could significantly disrupt organizations and employees in the near future. As these campaigns become more coordinated and commercialized, we may see DDoS attacks used not just for disruption but as cover for deeper intrusions, putting additional pressure on security teams to detect multi-layered threats. Employees across departments could face more frequent service outages, delayed operations, or tighter internal protocols, all stemming from the growing unpredictability of such campaigns. If the tools behind XorDDoS continue to circulate in underground markets, even less-skilled actors could launch impactful attacks, broadening the target pool and forcing organizations to elevate cyber resilience from a technical concern to a business-wide priority.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

Recommendations:

STRATEGIC:

  • Opt for DDoS prevention providers who can implement cloud scrubbing services for attack traffic to remove most of the problematic traffic before it ever hits a victim’s network.
  • Configure organization’s intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defence mechanisms in place to alert on — and upon review, consider blocking connection attempts to and from — the external IP addresses and domains listed in the appendix.

MANAGEMENT:

  • For protection against a DDoS attack, activate a potent Web Application Firewall (WAF) alongside the activation of specific country blocking.
  • Conduct regular security checks of your server and internet-facing assets.
  • Effective implementation of security initiatives that encompass awareness building and training across the organization.

TACTICAL RECOMMENDATIONS

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Secure your organization’s internet-facing assets with robust security protocols and encryption, including authentication or access credentials configuration, to ensure that critical information stored in databases/servers is always safe.

Weekly Intelligence Trends/Advisory

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Qilin Ransomware, NightSpire Ransomware| Malware – XorDDoS
  • Qilin Ransomware– One of the ransomware groups.
  • NightSpire Ransomware– One of the ransomware groups.
    Please refer to the trending malware advisory for details on the following:
  • Malware – XorDDoS
    Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

Decoding Mustang Panda’s Arsenal: ToneShell, StarProxy, PAKLOG, CorKLOG & SplatCloak

  • Threat Actor: Mustang Panda
  • Attack Type: DLL sideloading and Malware Implant
  • Objective: Espionage
  • Target Technology: Windows OS.
  • Target Geographies: Myanmar, East Asia.
  • Target Industries: Government entities, Military groups, NGOs, Minority organizations
  • Business Impact: Data exfiltration, Operational disruption, and reputational damage.

SUMMARY:
The threat actor behind this campaign is Mustang Panda, a China-sponsored espionage group well known for targeting government entities, military groups, NGOs, and minority organizations. This specific activity is focused on Myanmar, with tools discovered on machines belonging to a targeted organization within the region. However, Mustang Panda has also been observed targeting victims in East Asia and Europe. The campaign shows the group’s continued evolution and sophistication in deploying malware and evading detection.

In this operation, researchers identified several new variants of the backdoor ToneShell, along with a new lateral movement tool named StarProxy. ToneShell variants implement updates such as custom GUID creation, rolling XOR key encryption, and FakeTLS protocol spoofing to mimic legitimate TLS communication. These variants support commands for file operations, reverse shells, and DLL injection using shellcode. StarProxy, on the other hand, facilitates network proxying through compromised machines to bypass firewalls and maintain access to otherwise unreachable targets. It uses XOR-based encryption, FakeTLS headers, and custom C2 protocols for covert communication.

The group also utilizes various tactics and techniques to stay undetected. A key tactic is DLL sideloading, where malicious payloads are bundled with legitimate signed executables inside RAR or ZIP archives. These are used to load malicious DLLs like ToneShell or StarProxy without triggering endpoint defenses. The malware further employs custom encryption, command-line configurations, random seed generation, and dynamic shellcode injection to obfuscate behavior and resist analysis.

Researchers also observed two newly developed keyloggers—PAKLOG and CorKLOG—as well as a sophisticated EDR evasion driver named SplatCloak. These tools were discovered alongside previously documented Mustang Panda malware such as ToneShell and StarProxy, and share similarities in techniques, including API hashing and obfuscation methods.

Mustang Panda is known for frequently updating its malware toolkit and deploying it in targeted attacks.

The keyloggers serve different roles: PAKLOG monitors both keystrokes and clipboard data using high-level Windows APIs, encoding the data before writing it locally. It lacks built-in exfiltration capabilities. CorKLOG, on the other hand, uses RC4 encryption with a 48- character key to encrypt keylog data and achieves persistence by creating scheduled tasks or installing itself as a service depending on privilege level. CorKLOG includes a multi-stage XOR-based decryption routine for configuration data. Both keyloggers are deployed using DLL sideloading techniques via archives containing legitimate binaries.

SplatCloak, deployed by a dropper named SplatDropper, is a Windows kernel driver designed to disable kernel-level notification callbacks used by Windows Defender and Kaspersky, including routines for process, thread, and image creation. It uses techniques such as control flow flattening, mixed boolean arithmetic, and manual resolution of API addresses from system modules. SplatCloak identifies callback routines associated with security tools by analyzing their code signing certificates and disables or removes them to avoid detection.

These tools reflect Mustang Panda’s continued evolution in developing stealthy and persistent malware for targeted espionage campaigns.

Relevancy & Insights:
The recent Mustang Panda campaign demonstrates a clear evolution in both tactics and tooling compared to their previous operations. Historically, the group relied on malware like PlugX and earlier versions of ToneShell for initial access and control, primarily leveraging basic obfuscation, simple keyloggers, and standard DLL sideloading techniques. In contrast, the current campaign showcases significant advancements, including enhanced persistence via scheduled tasks and services, sophisticated keyloggers like Paklog and CorKLOG, and a powerful kernel driver (SplatCloak) capable of disabling EDR routines of security products like Windows Defender and Kaspersky. The use of custom FakeTLS communication, rolling XOR encryption, and dynamic GUID-based victim tracking indicate a strategic shift toward stealthier, more resilient intrusions. Additionally, the re-use of familiar delivery methods, such as signed binaries and RAR archives, reflects Mustang Panda’s continued reliance on tried-and-tested entry techniques while upgrading the payload sophistication.

ETLM Assessment:
Mustang Panda, a well-known China-sponsored espionage group, is attributed to this campaign based on infrastructure overlap and the reuse of malware families like ToneShell, StarProxy, and PlugX. Known for targeting geopolitical entities, Mustang Panda has historically focused on espionage operations against Southeast Asian countries, particularly Myanmar, as well as NGOs and religious groups. In this campaign, their activity aligns with previously observed behavior, aiming at surveillance and intelligence collection. The group’s consistent use of RAR archives containing legitimately signed binaries and malicious DLLs highlights their preference for DLL sideloading as an infection vector.

The threat actor’s latest toolkit demonstrates a technological escalation. Tools such as Paklog and CorKLOG (advanced keyloggers), SplatDropper (a stealthy DLL loader), and SplatCloak (a Windows kernel driver used to disable EDR mechanisms) mark a significant upgrade. These tools showcase Mustang Panda’s ability to bypass modern defenses using RC4 encryption, XOR-based obfuscation, API hashing, and privilege-aware persistence mechanisms. The use of revoked driver certificates and stealthy evasion techniques illustrates their focus on avoiding detection and maintaining long-term access in targeted environments.

Recommendations:

Strategic Recommendations:

  • Strengthen endpoint security posture with EDR and memory scanning tools capable of detecting kernel-level threats like SplatCloak.
  • Ensure visibility across systems for identifying behaviors like clipboard monitoring, keystroke logging, and RC4-encrypted data exfiltration.
  • Implement strict policies on driver signing to prevent misuse of revoked certificates, reducing risk from malicious drivers.

Tactical Recommendations

  • Audit systems for persistence mechanisms such as unusual services, scheduled tasks, and DLL sideloading (e.g., mscorsvc.dll, pa_lang2.dll).
  • Monitor creation of scheduled tasks like TabletlnputServices and alert on unauthorized tasks running at frequent intervals.
  • Set up alerts for new services created with suspicious or random names—common in SplatDropper and CorKLOG deployments.
  • Cross-check any suspicious artifacts or behaviors against known IOCs from the current and past Mustang Panda activity.
  • Train security teams in malware analysis to handle obfuscated and encrypted payloads (e.g., RC4-encrypted CorKLOG data).
  • Use behavioral analytics to detect DLL sideloading techniques, especially those involving legitimate executables (e.g., PACLOUD.exe, BugSplatHD64.exe).
  • Integrate IOC feeds into SIEM solutions to automatically flag communication with known malicious infrastructure.
  • Continuously update threat-hunting rules to detect techniques like clipboard monitoring, keylogging, and EDR evasion.

Operational Recommendations

  • Apply regular patches and updates to all systems, especially Windows kernel components, to prevent exploitation via drivers like SplatCloak.
  • Automate patch management to ensure timely remediation of vulnerabilities exploited in EDR bypass techniques.
  • Implement network segmentation to contain threats and limit lateral movement in case of compromise.
  • Monitor network traffic in real-time to detect anomalies or outbound connections to known IOC-related IPs/domains.
  • Deploy file integrity monitoring to detect unauthorized changes like creation of log files (record.txt) used by Paklog and CorKLOG.
  • Block execution of unsigned or revoked drivers to prevent installation of kernel-mode malware.
  • Enforce strict control over sideloading behavior by auditing DLL usage and execution paths.
MITRE FRAMEWORK
Tactic ID Technique
Initial Access T1566.001 Phishing: Spear phishing Attachment
Execution T1059 Command and Scripting Interpreter
Execution T1129 Shared Modules
Persistence T1574.002 Hijack Execution Flow: DLL Side- Loading
Defense Evasion T1574.002 Hijack Execution Flow: DLL Side- Loading
Defense Evasion T1218.011 System Binary Proxy Execution : Rundll32
Defense Evasion T1497 Virtualization/Sandbox Evasion
Credential Access T1056.001 Input Capture: Keylogging
Discovery T1082 System Information Discovery
Discovery T1614.001 System Location Discovery: System Language
Collection T1056.001 Input Capture: Keylogging
Collection T1115 Clipboard Data
Command and Control T1071 Application Layer Protocol
Command and Control T1573 Encrypted Channel
Exfiltration T1041 Exfiltration Over C2 Channel
Exfiltration T1048 Exfiltration Over Alternative Protocol

IOCs:
Kindly refer to the IOCs (Indicators of Compromise) Section to exercise controls on your security systems.

3. Major Geopolitical Developments in Cybersecurity

Trump economic policy fallout: potential for underinvestment in cyber security
Concerns stem from unpredictable U.S. trade policies, with tariffs on Chinese goods reaching 124% as of April 12. But it’s the lack of clarity that truly rattles businesses, since most business leaders want predictability first to schedule out long term capital investments and right now, no one has a clear read on what’s coming.

The recession risk has jumped to 45%, according to a recent poll among investment firms, with most of them considering recession a given should the paused tariffs go into effect at the end of the 90-day pause. FED Chair Jerome Powell acknowledged the challenge of balancing inflation and employment, warning of a scenario where the Fed’s dual goals of keeping inflation and unemployment low are in conflict.

During COVID-19, cybersecurity rebounded quickly, driven by remote work and digital consumption. A new downturn, driven by tariffs, may not directly hit cybersecurity—many firms provide services, not goods—but tight budgets could still slow spending. Uncertainty could pressure cyber security budgets.

ETLM Assessment:
As the Trump administration rolls out a chaotic tariff policy (a subject to a future CYFIRMA report)—announcing steep tariffs only to pause most for 90 days— economists are increasingly predicting a recession within a year. Business leaders are pulling back amid rising inflation and uncertainty. Cybersecurity, however, may be more resilient. Analysts call the sector a “defensive” play, with many services mandated by regulation and risk management, yet some organizations might face hard budgetary choices with some managers preferring to cut cybersecurity first.

That would be a critical mistake, as many more cyberattacks typically occur during economic downturns and we are moving into a more chaotic geopolitical environment, where predatory states like China, Iran, or North Korea will use the resources of the state to aid their flailing business. Security should be viewed as vital for continuity and competitiveness and cutting cyber security budgets in a volatile environment (both economically and geopolitically) would be a mistake.

4. Rise in Malware/Ransomware and Phishing

The Qilin Ransomware Impacts Algas Engineering Pte Ltd

  • Attack Type: Ransomware
  • Target Industry: Construction
  • Target Geography: Singapore
  • Ransomware: Qilin Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Singapore; Algas Engineering Pte Ltd (http[:]//www[.]algas[.]com[.]sg), was compromised by Qilin Ransomware. Algas Engineering Pte Ltd is a Singapore-based company specializing in gas pipe installation and related services for residential and commercial developments. The compromised data consists of confidential and sensitive information related to the organization.

Source: Dark Web

Relevancy & Insights:

  • Qilin (also known as Agenda) is a Ransomware-as-a-Service (RaaS) group first observed in July 2022. It employs a double extortion method, encrypting victims’ data and exfiltrating it, threatening to leak it on their data leak site (DLS) if the ransom is not paid.
  • Qilin maintains variants written in both Golang and Rust, targeting both Windows and Linux operating systems.
  • Qilin ransomware now utilizes a hybrid encryption scheme combining AES-256 symmetric encryption with RSA-2048 asymmetric keys, making recovery without the decryption key extremely difficult.
  • The Qilin Ransomware group primarily targets countries such as the United States of America, Canada, France, Spain, and the United Kingdom.
  • The Qilin Ransomware group primarily targets industries, including Health Care Providers, Business Support Services, Heavy Construction, Manufacturing, and Industrial Machinery.
  • Based on the Qilin Ransomware victims list from 1st January 2024 to 23rd April 2025, the top 5 Target Countries are as follows:
  • The top 10 Industries, most affected by Qilin Ransomware from 1st January 2024 to 23rd April 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Qilin ransomware poses a significant threat to organizations of all sizes. Its evolving tactics, including double extortion (data encryption and leak threats), cross-platform capabilities (Windows and Linux, including VMware ESXi), and focus on speed and evasion make it a particularly dangerous actor.

The NightSpire Ransomware Impacts Nicera

  • Attack Type: Ransomware
  • Target Industry: Manufacturing
  • Target Geography: Japan
  • Ransomware: NightSpire Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Japan; Nicera (https[:]//www[.]nicera[.]co[.]jp/), was compromised by NightSpire Ransomware. Nicera specializes in the development, manufacturing, and sale of advanced ceramic products and materials used across various industries. The compromised data consists of confidential and sensitive information related to the organization. The total size of the compromised data is approximately 45 GB.

Source: Dark Web

Relevancy & Insights:

  • NightSpire employs strong encryption algorithms like AES-256 combined with RSA encryption for key protection, aligning with modern ransomware sophistication.
  • The NightSpire Ransomware group primarily targets countries such as the United States of America, Japan, Italy, Hong Kong, and Egypt.
  • The NightSpire Ransomware group primarily targets industries, including Manufacturing, Business Services, Logistics, Financial Services, and Industrial Machinery.
  • Based on the NightSpire Ransomware victims list from 1st January 2025 to 23rd April 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries, most affected by NightSpire Ransomware from 1st January 2025 to 23rd April 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, NightSpire is a new ransomware group that emerged in early 2025, marking itself as a formidable player in the rapidly evolving ransomware landscape. Despite its recent appearance, NightSpire has already gained attention for its aggressive tactics and well-structured operations.

5. Vulnerabilities and Exploits

Vulnerability in IBM i

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Operating Systems & Components
  • Vulnerability: CVE-2025-2947
  • CVSS Base Score: 7.2 Source
  • Vulnerability Type: Incorrect Permission Assignment for Critical Resource
  • Summary: The vulnerability allows a remote privileged user to escalate privileges on the system.

Relevancy & Insights:
The vulnerability exists due to incorrect profile swapping in an OS command.

Impact:
A remote privileged user can use the command to elevate privileges to gain root access to the host operating system.

Affected Products:
https[:]//www[.]ibm[.]com/support/pages/node/7231025

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies, due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerability in IBM i can pose significant threats to user privacy and security. This can impact various industries globally, including finance, healthcare, manufacturing, and government sectors. Ensuring the security of IBM i is crucial for maintaining the integrity and protection of users’ data worldwide. Therefore, addressing these vulnerabilities is essential to safeguarding enterprise-level computing environments, including database management, application hosting, and secure transaction processing, across different geographic regions and sectors.

6. Latest Cyber-Attacks, Incidents, and Breaches

Killsec Ransomware attacked and published the data of the Royal Saudi Air Force

  • Threat Actor: Killsec Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Defense
  • Target Geography: Saudi Arabia
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that Killsec Ransomware attacked and published the data of the Royal Saudi Air Force(https[:]//www[.]mod[.]gov[.]sa) on its dark web website. The Royal Saudi Air Force (RSAF) is the aerial warfare branch of the Saudi Arabian Armed Forces, operating under the Ministry of Defense. The data leak, following the ransomware attack, encompasses sensitive and confidential records originating from the organizational database.

Source: Dark Web

Relevancy & Insights:

  • KillSec is a ransomware group that has gained notoriety for its ransomware-as- a-service (RaaS) model and a series of high-profile attacks.
  • KillSec Ransomware employs various sophisticated methods to infiltrate systems, including phishing attacks, exploiting known vulnerabilities, and using custom malware to maintain persistence within compromised networks.

ETLM Assessment:
The emergence and evolution of KillSec’s Ransomware-as-a-Service (RaaS) platform represents a concerning development in the cybercrime landscape. By lowering the technical barrier to entry, this RaaS model allows less skilled individuals to engage in sophisticated ransomware attacks, potentially leading to an increase in such incidents globally.

According to CYFIRMA’s assessment, the KillSec ransomware group is expected to continue targeting a wide range of industries worldwide. Their advanced tactics, such as exploiting website vulnerabilities and conducting credential theft, make them a significant threat to organizations with inadequate security measures in place.

7. Data Leaks

Philippines Corp Access Advertised on a Leak Site

  • Attack Type: Access sale
  • Target Geography: Philippines
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary: The CYFIRMA Research team observed that a threat actor is offering Fortinet access to a major company in the Philippines. The details are as follows:

  • Country: Philippines
  • Access type: Fortinet Access
  • Privilege: Admin + User privileges
  • Employees:432
  • Revenue: $380.6M
  • Number of accounts: 20+
  • Price: $1,000

Source: Underground Forums

The Construction Industry Development Board (CIDB) Malaysia Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Industry: Construction
  • Target Geography: Malaysia
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed that the threat group R00TK1T claims to have breached the Construction Industry Development Board (CIDB) Malaysia(https[:]//www[.]cidb[.]gov[.]my/), compromising 482GB of sensitive data. The stolen information reportedly includes confidential documents, sensitive accounts, and internal blueprints.

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously scouring for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to illicitly gain access and steal valuable data. Subsequently, the pilfered data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
R00TK1T ISC CYBER TEAM represents a significant and volatile hacktivist threat actor characterized by its public-facing operations and geopolitically motivated attacks. The group executes disruptive campaigns targeting a diverse range of sectors, including critical infrastructure (telecommunications, aviation), government entities, and multinational corporations across various geographic locations. From a defensive standpoint, R00TK1T highlights the importance of a layered security posture. Continuous monitoring of the external attack surface, prompt patching of identified vulnerabilities, implementation of strong access controls, and monitoring threat intelligence feeds for specific mentions or related TTPs are crucial mitigation strategies.

Recommendations: Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related
    attacks.
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA Research team observed that a threat actor claims to have breached Y-axis[.]com in April 2025 and is now offering over 2 million user records for sale, including extensive personal, employment, and immigration-related data.

Company: Y-axis[.]com

  • Country: India
  • Industry: Business Services / Immigration & Jobs
  • 8 Employees: ~1,500
  • Revenue: $317 Million
  • Record Count: 2,000,000+

Sample Fields Include:

  • Full name, email, phone, address, SSN equivalent
  • Employment history, job preferences, qualifications
  • Travel history, visa status, passport info
  • CRM and lead tracking fields
  • Parental, financial, and language proficiency details

Source: Underground Forums

The CYFIRMA Research team observed that a threat actor has announced the release of a sophisticated malware tool called “Baldwin Killer”. The tool bypasses major antivirus and EDR solutions such as Windows Defender, Kaspersky, Bitdefender, and Avast. It allegedly features memory injection, a special UAC bypass technique, Ring0 rootkit capabilities for stealth, early boot autostart, and SmartScreen circumvention via DLL sideloading.

Source: Underground Forums

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Delay a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies and continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security control such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

Geography-Wise Graph

Industry-Wise Graph

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR