Self Assessment

Weekly Intelligence Report – 07 Mar 2025

Published On : 2025-03-06
Share :
Weekly Intelligence Report – 07 Mar 2025

Ransomware of the week

CYFIRMA Research and Advisory Team would like to highlight ransomware trends and insights gathered while monitoring various forums. This includes multiple – industries, geography, and technology – that could be relevant to your organization.

Type: Ransomware
Target Technologies: MS Windows

Introduction
CYFIRMA Research and Advisory Team has found Pe32s Ransomware while monitoring various underground forums as part of our Threat Discovery Process.

Pe32s Ransomware
Researchers have recently discovered a new ransomware strain named Pe32s. Once it infiltrates a victim’s system, it encrypts files and modifies their names using the following pattern:

“[original_filename].[victim_ID].[format].pe32s”

This structure includes the original filename, a unique victim ID, the file format (all enclosed in square brackets), and the “.pe32s” extension. After encryption, the ransomware generates a ransom note titled “README.txt”.

Screenshot of files encrypted by ransomware (Source: Surface Web)

The Pe32s ransomware informs victims that their files have been encrypted and sensitive data has been exfiltrated. It demands separate payments for file decryption and to prevent data leaks.

Ransom amounts range from hundreds to hundreds of thousands of USD, depending on the number of infected systems and the scale of the targeted organization. As a demonstration, attackers offer free decryption for a few small files (1-2 MB) that do not contain valuable data before payment is made.

Screenshot of Pe32s ransomware’s text file (“README.txt”):(Source: Surface Web)

Following are the TTPs based on the MITRE Attack Framework

Tactic ID Technique
Execution T1106 Native API
Execution T1129 Shared Modules
Persistence T1574 Hijack Execution Flow
Persistence T1574.002 DLL Side-Loading
Privilege Escalation T1574 Hijack Execution Flow
Privilege Escalation T1574.002 DLL Side-Loading
Defense Evasion T1027 Obfuscated Files or Information
Defense Evasion T1140 Deobfuscate/Decode Files or Information
Defense Evasion T1562 Impair Defenses
Defense Evasion T1562.001 Disable or Modify Tools
Defense Evasion T1574 Hijack Execution Flow
Defense Evasion T1574.002 DLL Side-Loading
Discovery T1018 Remote System Discovery
Discovery T1082 System Information Discovery
Discovery T1083 File and Directory Discovery
Discovery T1518 Software Discovery
Discovery T1518.001 Security Software Discovery
Collection T1560 Archive Collected Data
Command and Control T1071 Application Layer Protocol
Command and Control T1095 Non-Application Layer Protocol
Command and Control T1102 Web Service
Command and Control T1573 Encrypted Channel
Impact T1486 Data Encrypted for impact

Relevancy and Insights:

  • This ransomware specifically targets the widely used Windows Operating System, which is prevalent across numerous industries and organizations.
  • Detect-Debug-Environment: Debugging environments are used by developers to analyze and troubleshoot software. The ransomware uses this technique to determine whether it is operating in a debug environment. This feature aids the ransomware in avoiding analysis and detection attempts.
  • The Ransomware places itself in “HKEY_LOCAL_MACHINE\ SOFTWARE \Microsoft\Windows NT\CurrentVersion\Image File Execution Options\” to manipulate the execution behaviour of the image. This registry key allows the ransomware to achieve persistence, silently execute alongside or instead of legitimate images, and maintain control over compromised systems, evading detection.

ETLM Assessment:
CYFIRMA’s analysis with available data suggests that Pe32s ransomware may pose a significant threat across multiple regions, primarily targeting companies for financial gain. Industries such as manufacturing, finance, and other critical sectors face heightened risks. Future variants may adopt stronger encryption, advanced evasion techniques, and a broader attack scope. Staying vigilant and enforcing robust cybersecurity measures will be essential in countering these evolving threats.

Sigma rule:
title: Suspicious Non-Browser Network Communication With Telegram API tags:
– attack.command-and-control
– attack.t1102 logsource:
product: windows
category: network_connection detection:
selection:
DestinationHostname|contains: ‘api.telegram.org’
# Other browsers or apps known to use telegram should be added # TODO: Add full paths for default install locations filter_main_brave:
Image|endswith: ‘\brave.exe’ filter_main_chrome:
Image:
– ‘C:\Program Files\Google\Chrome\Application\chrome.exe’
– ‘C:\Program Files (x86)\Google\Chrome\Application\chrome.exe’ filter_main_firefox:
Image:
– ‘C:\Program Files\Mozilla Firefox\firefox.exe’
– ‘C:\Program Files (x86)\Mozilla Firefox\firefox.exe’
filter_main_ie:
Image:
– ‘C:\Program Files (x86)\Internet Explorer\iexplore.exe’
– ‘C:\Program Files\Internet Explorer\iexplore.exe’ filter_main_maxthon:
Image|endswith: ‘\maxthon.exe’ filter_main_edge_1:
– Image|startswith: ‘C:\Program Files (x86)\Microsoft\EdgeWebView\Application\’
– Image|endswith: ‘\WindowsApps\MicrosoftEdge.exe’
– Image:
– ‘C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe’
– ‘C:\Program Files\Microsoft\Edge\Application\msedge.exe’ filter_main_edge_2:
Image|startswith:
– ‘C:\Program Files (x86)\Microsoft\EdgeCore\’
– ‘C:\Program Files\Microsoft\EdgeCore\’ Image|endswith:
– ‘\msedge.exe’
– ‘\msedgewebview2.exe’ filter_main_opera:
Image|endswith: ‘\opera.exe’
filter_main_safari:
Image|endswith: ‘\safari.exe’ filter_main_seamonkey:
Image|endswith: ‘\seamonkey.exe’ filter_main_vivaldi:
Image|endswith: ‘\vivaldi.exe’ filter_main_whale:
Image|endswith: ‘\whale.exe’
condition: selection and not 1 of filter_main_* falsepositives:
– Legitimate applications communicating with the Telegram API e.g. web browsers not in the exclusion list, app with an RSS etc.
level: medium

(Source: Surface Web)

IOCs:
Kindly refer to the IOCs section to exercise control of your security systems.

STRATEGIC RECOMMENDATION

  • Implement competent security protocols and encryption, authentication, or access credentials configurations to access critical systems in your cloud and local environments.
  • Ensure that backups of critical systems are maintained which can be used to restore data in case a need arises.

MANAGEMENT RECOMMENDATION

  • A data breach prevention plan must be developed considering, (a) the type of data being managed by the company; (b) the remediation process; (c) where and how the data is stored; (d) if there is an obligation to notify the local authority.
  • Enable zero-trust architecture and multifactor authentication (MFA) to mitigate the compromise of credentials.
  • Foster a culture of cybersecurity, where you encourage and invest in employee training so that security is an integral part of your organization.

TACTICAL RECOMMENDATION

  • Update all applications/software regularly with the latest versions and security patches alike.
  • Add the Sigma rule for threat detection and monitoring which will help to detect anomalies in log events, identify and monitor suspicious activities.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.

Trending Malware of the Week

Type: Backdoor | Objectives: Infiltration, Espionage, Stealing Sensitive Information| Target Industries: Government, Defense, Telecommunications, Education, and Aviation Sectors | Target Technologies: Windows and Linux | Target Geographies: Southeast Asia and South America

CYFIRMA collects data from various forums based on which the trend is ascertained. We identified a few popular malwares that were found to be distributed in the wild to launch cyberattacks on organizations or individuals.

Active Malware of the week
This week “Squidoor” is trending.

Summary
Researchers have identified Squidoor, aka FinalDraft, a sophisticated backdoor capable of infiltrating both Windows and Linux systems. This advanced threat has been observed targeting government, defense, telecommunications, education, and aviation sectors across Southeast Asia and South America. It is designed to collect sensitive information from compromised organizations and gather details about high-ranking officials. This malware not only infiltrates critical industries but also employs stealth tactics like Pastebin abuse and LOLBAS techniques to evade detection.

Squidoor
Squidoor is an advanced backdoor designed for stealth and adaptability, allowing it to evade detection even in highly secured environments. It supports multiple modules and operates on both Windows and Linux, making it a versatile tool for cybercriminals. Once deployed, it enables attackers to maintain access, move laterally within networks, establish covert communication channels with its operators, and collect sensitive information about the targeted organizations.

One of Squidoor’s most distinctive features is its ability to communicate with its command-and-control (C2) server through multiple methods. The Windows variant offers 10 different methods of C2 communication, while the Linux version provides 9, including rarely seen techniques such as Outlook API, DNS tunneling, and ICMP tunneling. Some methods facilitate external communication with the C2 server, while others allow internal coordination between infected systems, helping attackers remain undetected. Beyond communication, Squidoor can execute various commands, such as gathering system information, running arbitrary code, and injecting or delivering additional payloads.

These capabilities make it a powerful tool for prolonged access and data collection within compromised networks.

Attack Method
To infiltrate networks, the threat actor exploited vulnerabilities in Internet Information Services (IIS) servers as an initial entry point. After gaining access, they deployed multiple web shells to establish persistent control over compromised systems. These web shells functioned as backdoors, allowing the attackers to execute commands remotely and maintain long-term access. To expand their reach, the attackers attempted to spread the web shells across different servers using curl and Impacket. They also disguised one of the web shells as a certificate and used Windows Management Instrumentation (WMI) to copy it to additional systems, enhancing their persistence. The web shells shared common decryption key structures, extensive obfuscation, and consistent code patterns. Some were stored on Bashupload, a web application that allows users to upload files via the command line and download them to another server, and later retrieved using certutil, enabling the attackers to discreetly sustain their presence.

Execution and Persistence: LOLBAS Technique
To deploy Squidoor, the attackers abused a legitimate Microsoft debugging tool, cdb.exe, a rarely used technique that helps evade detection. They delivered cdb.exe to infected systems, renamed it as fontdrvhost.exe, and used it to execute malicious shellcode in memory. This method, known as a living-off-the-land (LOLBAS) technique, leverages trusted system tools to carry out attacks while avoiding security alerts. Once executed, the renamed cdb.exe loaded shellcode from a file called config.ini, initiating Squidoor’s operations. The attackers then used LoadShellcode.x64.dll, injected into mspaint.exe, to decrypt and load another Squidoor implant from a file named wmsetup.log. This multi-step execution process helped maintain stealth and avoid detection. To ensure persistence, Squidoor created a scheduled task named Microsoft\Windows\AppID\EPolicyManager, which repeatedly executed the shellcode, allowing the malware to remain active even after system reboots. This approach ensured long-term access to compromised systems while blending in with normal Windows processes.

Once Squidoor is loaded into memory, it executes its UpdateTask function, which decrypts its hard-coded configuration. This configuration determines how the malware will communicate with its command-and-control (C2) server. A key element of Squidoor’s setup is a single-digit value (0-9) that acts as a switch, selecting one of its multiple communication methods. Depending on the variant, additional configuration fields may be included, such as domain names, IP addresses, listening ports, encryption keys, or access tokens.

Communication Methods
The Windows version of Squidoor supports 10 different methods for communicating with its command-and-control (C2) server. Each method is selected based on a predefined switch case digit within the malware’s configuration. This flexibility allows attackers to adapt their communication strategy based on the environment, ensuring continued access while evading detection.

Switch Case Digit Internal Class Name Description
0 CHttpTransChannel HTTP-based communication
1 CReverseTcpTransChannel Reverse TCP connection to a remote server
2 CReverseUdpTransChannel Reverse UDP connection to a remote server
3 CBindTcpTransChannel Listen for incoming TCP connections (suspected to be used for only internal communication)
4 CBindHttpTransChannel Listen for incoming HTTP connections (become an HTTP Server)
5 COutLookTransChannel Communicate via an Outlook mail API
6 CIcmpTransChannel Utilize ICMP tunneling for communication
7 CDnsTransChannel Utilize DNS tunneling for communication
8 CWebTransChannel Communicate via a mail client retrieved from the configuration file
9 CBindSMBTransChannel Use named pipes for communication (only internal communication, and only on the Windows version)

When Squidoor is configured to use COutLookTransChannel, it exploits Microsoft’s identity platform to establish communication with its operators. It logs in using a hard-coded refresh token and stores the Microsoft Graph API token in the system registry. To track infected machines, Squidoor sends an HTTP request to a specific Pastebin page, which attackers likely monitor to count active implants. It then searches the Outlook drafts folder for emails with a specific subject pattern. If no such email exists, it sends a new encoded message to attackers.

Once the initial connection is established, Squidoor continuously checks the drafts folder for messages containing instructions. If it finds a command, it retrieves the email, deletes it from the mailbox, and then decrypts its contents. This method allows it to blend in with normal Outlook activity, making detection difficult.

Decoding and Execution: How Squidoor Executes Commands
Once Squidoor retrieves an email command from its operators, it undergoes multiple layers of decoding. The malware first converts the email content into bytes, then decodes it from Base64, decrypts it using a mix of AES and XOR, and finally decompresses the data. This decoded content determines the command Squidoor should execute, which could include deploying additional payloads or executing specific actions.

Key Capabilities of Squidoor
Squidoor can receive a set of commands from its C2 server, providing attackers with various capabilities to take complete control of the compromised machine. These include:

  • Host reconnaissance and fingerprinting, including:
  • Username and privileges
  • Hostname
  • IP address
  • Operating system (OS) type
  • Executing arbitrary commands
  • Querying files and directories
  • Querying running processes
  • Exfiltrating files
  • Deploying additional malware
  • Injecting payloads into additional processes
  • Sending commands to other Squidoor implants via TCP
  • Sending commands to other Squidoor implants via named pipes (Windows variant only)

Squidoor Code Injection
Squidoor injects malicious code into legitimate processes to evade detection. It does this through DLL injection, selecting targets like mspaint.exe or conhost.exe based on the system’s configuration. If needed, it can also inject code into an already running process chosen by the attackers.

Modular Design and Lateral Movement
The threat actor leverages Squidoor’s modular nature to execute additional payloads within multiple system processes, including taskhostw.exe and vmtoolsd.exe. These modules facilitate lateral movement using Windows Remote Management (WinRM), data theft, and remote command execution. To evade detection, the injected payloads operate entirely in memory and require a password to run, preventing easy sandbox analysis. The attackers also use these modules for advanced techniques such as:

  • Uploading or deleting files remotely
  • Executing PowerShell scripts without invoking the powershell.exe binary
  • Executing arbitrary commands
  • Stealing specific files
  • Performing pass the hash attacks
  • Enumerating specific user accounts

Squidoor’s Pastebin Tactics
Squidoor’s operators used Pastebin to store critical components of their malware’s communication methods. They maintained at least two accounts, using them to store access tokens, API keys, and other critical data. One of these accounts had been active for nearly a year, with the attacker periodically updating its content. In early February 2025, the attackers deleted existing files and replaced them with new ones containing Microsoft Graph API tokens, with filenames suggesting specific targets. Additionally, they likely used these accounts to monitor the spread of Squidoor by tracking how often implants queried Pastebin.

INSIGHTS

  • Squidoor’s campaign underscores how modern cyber threats are evolving beyond traditional attack methods. Instead of relying on a single infiltration technique, its operators demonstrate adaptability, using multiple communication channels, trusted system tools, and cloud-based services like Pastebin to avoid detection. The ability to target both Windows and Linux environments also reflects a growing shift where attackers design cross-platform malware to ensure maximum reach. This approach not only allows Squidoor to remain stealthy but also makes mitigation more complex, as defenders must address multiple layers of persistence across different operating systems.
  • What stands out in this campaign is the strategic use of legitimate tools for malicious purposes. Squidoor’s operators rely on Living-off-the-Land (LotL) techniques, exploiting trusted Microsoft utilities and leveraging IIS vulnerabilities to deploy web shells. By avoiding the introduction of typical malware binaries, the attackers significantly reduce their footprint, making it difficult for security solutions to detect and flag malicious activity. This highlights a larger challenge in cybersecurity, when attackers can blend in seamlessly with normal system operations, traditional detection methods alone may not be enough.
  • Another key takeaway is how Squidoor’s campaign management goes beyond simple execution, it involves long-term planning, adaptability, and active monitoring. The use of Pastebin is not just for storing critical malware components but also for tracking infections worldwide, suggesting that the attackers continuously refine and update their tactics based on real-time insights. This level of operational sophistication indicates that Squidoor is not a standalone malware but rather part of a larger cyber-espionage effort, likely backed by a well-funded threat group. With their structured approach and evolving tactics, Squidoor’s operators will likely continue modifying their techniques, making this an ongoing and highly persistent threat.

ETLM ASSESSMENT
From the ETLM perspective, CYFIRMA anticipates that Squidoor’s advanced capabilities suggest that future malware will increasingly rely on modular architectures, allowing attackers to adapt their tools for different environments and operating systems. With its current focus on governments, defense, telecommunications, education, and aviation sectors in Southeast Asia and South America, it is likely that future variants could expand to a wider range of industries and regions.

The use of multiple communication methods, including cloud-based services and covert tunneling techniques, indicates a shift toward more resilient and harder-to-detect malware. Additionally, the reliance on legitimate services like Pastebin and Microsoft APIs points to a growing trend where cybercriminals leverage everyday digital infrastructure for persistence and stealth. As attackers refined these strategies, future threats may become even more decentralized, making traditional signature-based detection methods less effective and increasing the need for more adaptive cybersecurity defenses.

IOCs:
Kindly refer to the IOCs Section to exercise controls on your security systems.

Recommendations:

STRATEGIC:

  • Identify assets that may be vulnerable to attackers and ensure they conduct regular checks for the latest security patches.
  • Deploy a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Configure organization’s intrusion detection systems (IDS), intrusion prevention systems (IPS), or any network defence mechanisms in place to alert on — and upon review, consider blocking connection attempts to and from — the external IP addresses and domains listed in the appendix.

MANAGEMENT:

  • Implement real-time website monitoring to analyze network traffic going in and out of the website to detect malicious behaviours.
  • Firewalls should be used to control and monitor network traffic to and from IIS servers, limiting exposure to potential threats.
  • Move beyond the traditional model of security awareness towards Improved Simulation and training exercises that mimic real attack scenarios, account for behaviors that lead to a compromise, and are measured against real attacks the organization receives.

TACTICAL RECOMMENDATIONS

  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defence based on the tactical intelligence provided.
  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed because vulnerabilities are one of the top attack vectors.

CYFIRMA’S WEEKLY INSIGHTS

1. Weekly Attack Types and Trends

Key Intelligence Signals:

  • Attack Type: Ransomware Attacks, Social Engineering, Vulnerabilities & Exploits, Data Leaks.
  • Objective: Unauthorized Access, Data Theft, Data Encryption, Financial Gains, Espionage.
  • Business Impact: Data Loss, Financial Loss, Reputational Damage, Loss of Intellectual Property, Operational Disruption.
  • Ransomware – Lynx Ransomware, Hunters International Ransomware| Malware – Squidoor
  • Lynx Ransomware – One of the ransomware groups.
  • Hunters International Ransomware – One of the ransomware groups. Please refer to the trending malware advisory for details on the following:
  • Malware – Squidoor Behavior – Most of these malwares use phishing and social engineering techniques as their initial attack vectors. Apart from these techniques, exploitation of vulnerabilities, defense evasion, and persistence tactics are being observed.

2. Threat Actor in Focus

North Korea-Linked Threat Actor Uses RustDoor and Koi Stealer Malware to Target macOS Systems in the Cryptocurrency Sector

  • Threat actor: Alluring Pisces (Lazarus)
  • Initial Attack Vector: Social engineering
  • Objective: Financial gain
  • Target Technology: MacOS
  • Target Industries: Cryptocurrency Sector
  • Business Impact: Operational downtime, data theft, and potential destruction of sensitive information.

Summary:
The recent cyberattack campaign involving macOS malware has been attributed to North Korean threat actor Alluring Pisces. The campaign primarily targets job-seeking software developers in the cryptocurrency industry, using social engineering tactics to deploy malicious software disguised as legitimate updates. The malware identified includes a Rust-based macOS malware called RustDoor and a previously undocumented variant of Koi Stealer, an infostealer focused on cryptocurrency wallets. The attack begins with the delivery of a malicious Visual Studio project or software update, which installs RustDoor, a backdoor designed to execute various malicious actions. Upon execution, it attempts to download additional malware, steal sensitive data such as passwords from browser extensions, and exfiltrate information to command-and-control servers. One of the RustDoor variants tries to establish a reverse shell connection to further compromise the system. The second stage of the attack involves the execution of a new variant of Koi Stealer. This malware, masquerading as a Visual Studio update, seeks root privileges to install itself on the infected system. Once installed, it collects and exfiltrates a wide array of sensitive data, including system information, user credentials, browser data, and cryptocurrency wallet files. It uses AppleScript to mute the system’s volume during its operations to avoid detection, further enhancing its stealth. The Koi Stealer’s operation is similar to a Windows variant, sharing data collection techniques and communication with the same command-and-control infrastructure. Both variants exfiltrate stolen data by transmitting memory streams to avoid detection from traditional file-based analysis. The attack is consistent with previously observed activity from North Korean threat actors, utilizing tools and infrastructure linked to previous campaigns. The attack’s social engineering focus on software developers in the cryptocurrency sector and the deployment of sophisticated malware tools suggest a nation-state actor behind the operation.

Relevancy & Insights:
North Korean threat actors, particularly groups like “Lazarus” and “BlueNoroff,” have a history of cyberattacks targeting financial sectors, cryptocurrency exchanges, and tech industries. Notable incidents include the 2017 WannaCry ransomware attack, the 2016 Bangladesh Bank heist, and the targeting of cryptocurrency exchanges to steal digital assets. These groups are known for using sophisticated social engineering tactics to infiltrate organizations, often masquerading as legitimate recruiters or employers, as seen in attacks like the “Contagious Interview” campaign.

The current campaign correlates with past North Korean tactics, specifically the use of social engineering to target software developers in the cryptocurrency industry. The deployment of malware such as RustDoor and Koi Stealer aligns with North Korea’s continued focus on stealing financial data, including cryptocurrency wallets. The use of previously unseen malware variants and the infrastructure linked to past operations, such as the C2 server at apple-ads-metric[.]com, suggests a continuation of their targeted efforts in cybercrime for financial gain.

ETLM Assessment:
North Korean state-sponsored APT groups, such as Lazarus and BlueNoroff, are known for cyber espionage and financially motivated attacks. These groups primarily target cryptocurrency exchanges, software developers, and financial institutions, leveraging social engineering tactics to infiltrate victims. The current attack campaign primarily targets software developers in the cryptocurrency sector, using macOS malware like RustDoor and Koi Stealer. The malware is designed to steal sensitive information, such as cryptocurrency wallets and user credentials, and exfiltrate data to command and control (C2) servers. This aligns with past North Korean operations, including the infamous WannaCry ransomware and RedLine Stealer campaigns. The attackers often exploit social engineering (posing as recruiters), zero-day vulnerabilities, and weak authentication protocols to gain access. As North Korea’s reliance on cybercrime for financial gain grows, future threats are expected to focus on cloud services, supply chain vulnerabilities, and critical infrastructure. Organizations must remain vigilant and invest in advanced security measures.

Recommendations:

Strategic Recommendations:

  • Adopt a Zero Trust Architecture: Given the sophisticated nature of North Korean threats, we recommend transitioning towards a Zero Trust Security Model. This architecture minimizes reliance on perimeter defenses and ensures that all internal and external traffic is verified before access is granted, thereby reducing the attack surface for future campaigns.

Tactical Recommendations:

  • Fine-tune Endpoint Detection and Response (EDR) rules: In detecting and blocking malware like RustDoor and Koi Stealer, we recommend fine-tuning detection rules for macOS systems, ensuring that suspicious behaviors related to these types of malwares, such as the execution of bash scripts or attempts to establish reverse shell connections, are promptly flagged and blocked.
  • Continuous Monitoring of Network Traffic: We advise setting up monitoring rules in the SOC to detect suspicious C2 communications. Monitoring outgoing traffic for known malicious IP addresses, such as 31.41.244[.]92, and domains like apple-ads- metric[.]com will allow for real-time alerting and prevent data exfiltration attempts.

Operational Recommendations:

  • Regular Security Awareness Training: Given the social engineering tactics used in this campaign, we recommend implementing ongoing phishing simulation exercises and training for software developers, particularly those working in the cryptocurrency space. It is essential to educate them on spotting malicious job offers and verifying the legitimacy of any software requests or updates.
  • Update Vulnerability Management Processes: Ensure that all development tools, especially Visual Studio and related environments, are regularly updated and patched to prevent exploitation of known vulnerabilities. Review and address gaps in vulnerability management to ensure faster remediation of critical flaws, particularly those that could be exploited in the supply chain.
  • Enhanced Malware Detection for macOS: Given the emergence of new malware variants targeting macOS systems, it is critical to configure macOS Analytics in XDR to enhance behavioral detection capabilities, especially for advanced malware evasion tactics.
MITRE Framework
Tactic ID Technique
Defense Evasion T1070.004 Indicator Removal: File Deletion
Command and Control T1071 Application Layer Protocol
Command and Control T1095 Non-Application Layer Protocol
Command and Control T1573 Encrypted Channel

IOCs:
Kindly refer to the IOCs (Indicators of Compromise) Section to exercise controls on your security systems.

3. Major Geopolitical Developments in Cybersecurity

Pentagon Denies Report of Halt in Cyber Operations Versus Russia
During the week the media broke news on alleged U.S. Defense Secretary Pete Hegseth’s order to Cyber Command to pause offensive cyber operations against Russia. However, according to a later DOD statement, Hegseth has neither canceled nor delayed any cyber operations directed against malicious Russian targets and there has been no stand-down order whatsoever from that priority.

ETLM Assessment:
The news on the heels of President Trump ordering a pause to all military assistance to Ukraine until Ukraine’s leaders demonstrate “a good-faith commitment to peace negotiations”. However, the US administration did not put similar conditions on Russia, which has shown little interest in peace, including by continuing cyber-attacks on Western governments and businesses.

Lotus Blossum targets Southeast Asia in a cyber espionage campaign
Researchers are monitoring several cyber espionage campaigns by the Lotus Blossom threat actor, targeting government, manufacturing, telecommunications, and media sectors in Vietnam, Taiwan, Hong Kong, and the Philippines.

Researchers report that the operation appears to have achieved significant success in penetrating its targets. These campaigns utilize the Sagerunex remote access tool, which is exclusively deployed by Lotus Blossom, a threat actor that has previously been linked to China.

ETLM Assessment:
These campaigns seem to be classic state-driven espionage with many similar campaigns like it probably underway at the same time. The effort is likely part of a broader Chinese strategy to gather intelligence on geopolitical developments and intellectual property.

4. Rise in Malware/Ransomware and Phishing

The Lynx Ransomware Impacts Xepa-Soul Pattinson (M) Sdn Bhd

  • Attack Type: Ransomware
  • Target Industry: Manufacturing
  • Target Geography: Malaysia
  • Ransomware: Lynx Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Malaysia; Xepa-Soul Pattinson (M) Sdn Bhd (https[:]//xepasp[.]com/), was compromised by Lynx Ransomware. Xepa-Soul Pattinson (M) Sdn Bhd is a leading pharmaceutical manufacturing enterprise in Malaysia. The compromised data includes 500GB of internal documents, encompassing financial records, contracts, patents, HR files, and more.

Source: Dark Web

Relevancy & Insights:

  • Lynx offers multiple encryption modes (fast, medium, slow, and entire) to balance the speed and depth of encryption. It uses Curve25519 Donna and AES-128 encryption algorithms.
  • Lynx offers cross-platform ransomware binaries for Windows and Linux environments, supporting various architectures like x86, ARM, MIPS, PPC, and ESXi.
  • Lynx provides a comprehensive platform for affiliates, including tools for managing victims, negotiating ransoms, and sharing access with sub-affiliates.
  • The Lynx Ransomware group primarily targets countries, such as the United States of America, the United Kingdom, Sweden, Germany, and Thailand.
  • The Lynx Ransomware group primarily targets industries, including Heavy Construction, Retail, Business Support Services ,Specialized Consumer Services and Industrial Machinery.
  • Based on the Lynx Ransomware victims list from 1st June 2024 to 05th March 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries, most affected by Lynx Ransomware from 1st June 2024 to 05th March 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Lynx ransomware has emerged as a significant threat in the cybersecurity landscape, leveraging advanced encryption and double extortion tactics to target small and medium-sized businesses. Its structured affiliate program and versatile ransomware toolkit make it a formidable force in the RaaS ecosystem.

The Hunters International Ransomware Impacts Nichino Ryokka Co Ltd

  • Attack Type: Ransomware
  • Target Industry: Construction
  • Target Geography: Japan
  • Ransomware: Hunters International Ransomware
  • Objective: Data Theft, Data Encryption, Financial Gains
  • Business Impact: Financial Loss, Data Loss, Reputational Damage

Summary:
From the External Threat Landscape Management (ETLM) Perspective, CYFIRMA observed in an underground forum that a company from Japan; Nichino Ryokka Co., Ltd. (www[.]nichino-ryokka[.]co[.]jp) was compromised by Hunters International Ransomware. Nichino Ryokka Co., Ltd. is a Japanese company specializing in various services related to landscaping, turf management, and horticultural supplies. The compromised data includes confidential and sensitive information belonging to the organization. The scale of the data exposure measures approximately 576.6 GB, comprising a total of 3,00,323 discrete files.

Source: Dark Web

Relevancy & Insights:

  • Hunters International operates under a RaaS model, allowing affiliates to exploit vulnerabilities and conduct attacks across various industries.
  • The Hunters International Ransomware group primarily targets countries, such as the United States of America, Italy, the United Kingdom, Canada, and India.
  • The Hunters International Ransomware group primarily targets industries, including Heavy Construction, Business Support Services, Government Agencies, Telecommunications, and Industrial Machinery.
  • Based on the Hunters International Ransomware victims list from 1st January 2024 to 05th March 2025, the top 5 Target Countries are as follows:
  • The Top 10 Industries, most affected by Hunters International Ransomware from 1st January 2024 to 05th March 2025 are as follows:

ETLM Assessment:
According to CYFIRMA’s assessment, Hunters International ransomware represents a significant threat within the ransomware landscape due to its sophisticated tactics and focus on double extortion strategies. Organizations are advised to enhance their cybersecurity measures by implementing robust backup solutions, conducting regular employee training on phishing awareness, and maintaining updated security protocols to mitigate risks associated with this evolving threat actor. Continuous monitoring of Hunters International’s activities will be essential for understanding its impact on global cybersecurity efforts.

5. Vulnerabilities and Exploits

Vulnerability in VMware Fusion

  • Attack Type: Vulnerabilities & Exploits
  • Target Technology: Virtualization software
  • Vulnerability: CVE-2025-22226
  • CVSS Base Score: 7.1 Source
  • Vulnerability Type: Out-of-bounds read
  • Summary: The vulnerability allows a malicious guest to gain access to potentially sensitive information.

Relevancy & Insights: The vulnerability exists due to a boundary condition in HGFS.

Impact: A malicious guest can trigger an out-of-bound read error and read contents of memory on the system.

Affected Products: https[:]//support[.]Broadcom[.]com/web/ecx/support-content- notification/-/external/content/SecurityAdvisories/0/25390

Recommendations:
Monitoring and Detection: Implement monitoring and detection mechanisms to identify unusual system behavior that might indicate an attempted exploitation of this vulnerability.

TOP 5 AFFECTED TECHNOLOGIES OF THE WEEK
This week, CYFIRMA researchers have observed significant impacts on various technologies, due to a range of vulnerabilities. The following are the top 5 most affected technologies.

ETLM Assessment
Vulnerability in VMware Fusion can pose significant threats to user privacy and security. This can impact various industries globally, including technology, finance, healthcare, and beyond. Ensuring the security of VMware Fusion is crucial for maintaining the integrity and protection of users’ data worldwide. Therefore, addressing these vulnerabilities is essential to safeguarding virtualization environments, including the secure operation of multiple operating systems on macOS, across different geographic regions and sectors.

6. Latest Cyber-Attacks, Incidents, and Breaches

Fog Ransomware attacked and published the data of Fligno

  • Threat Actor: Fog Ransomware
  • Attack Type: Ransomware
  • Objective: Data Leak, Financial Gains
  • Target Technology: Web Applications
  • Target Industry: Information Technology and Consulting
  • Target Geography: Philippines
  • Business Impact: Operational Disruption, Data Loss, Financial Loss, Potential Reputational Damage

Summary:
Recently, we observed that Fog Ransomware attacked and published the data of Fligno(https[:]//fligno[.]com/) on its dark web website. Fligno is a software development company specializing in various Information Technology services, including mobile and web-based software development, infrastructure, security, server setup and maintenance, website design, and digital marketing. The company operates primarily in the Philippines, serving clients across multiple sectors, such as retail, hospitality, education, fintech, and B2C industries. The company’s main areas of business include debt management, insurance services, credit card applications and hire purchases, corporate businesses and personal loans, assets refinancing plans, and investment portfolios. The data leak, following the ransomware attack, encompasses sensitive and confidential records, originating from the organizational database. The total size of compromised data is approximately 5GB.

Source: Dark Web

Relevancy & Insights:
Fog Ransomware has been observed targeting both Windows and Linux systems, making it a versatile threat.

ETLM Assessment:
CYFIRMA’s assessment indicates that Fog Ransomware, despite utilizing advanced techniques, presents a substantial threat due to its double extortion methods and wide-ranging targets. To effectively reduce the risk of Fog Ransomware attacks, organizations should prioritize strong security measures, including regular data backups, security awareness training, vulnerability management, and comprehensive incident response planning.

7. Data Leaks

Saudi Arabia’s General Intelligence Presidency (GIP) Data Advertised on a Leak Site

  • Attack Type: Data leak
  • Target Industry: Government
  • Target Geography: Saudi Arabia
  • Objective: Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed a data sale related to Saudi Arabia’s General Intelligence Presidency (GIP) in an underground forum. Saudi Arabia’s General Intelligence Presidency (GIP) is the country’s primary intelligence agency, responsible for gathering, analyzing, and acting on national security and foreign intelligence. It operates under the authority of the King and is tasked with protecting the Kingdom from external threats, countering terrorism, and ensuring national security. The data for sale includes sensitive files, phone numbers, and secret communications. The total size of data for sale is approximately 11 GB. The asking price for data for sale is 3,000$. The breach has been attributed to a threat actor known as “The_Sn1p3r.”

Source: Underground forums

Menara Imperium Business Center (Indonesia) Data Advertised on a Leak Site

  • Attack Type: Data Leak
  • Target Geography: Real Estate and Commercial Property
  • Target Industry: Indonesia
  • Objective: Data Theft, Financial Gains
  • Business Impact: Data Loss, Reputational Damage

Summary:
The CYFIRMA Research team observed a data leak related to the Menara Imperium Business Center (Indonesia) in an underground forum. Menara Imperium is a prominent office building located in Jakarta, Indonesia. Menara Imperium offers office spaces with areas ranging from 100 to 1,519 square meters. The compromised data includes the database, backdoor shell access, website source code, and billing documents in PDF format. The total size of the data leak is approximately 4.47 GB. The breach has been attributed to a threat actor known as “LordVoldemort”.

Source: Underground Forums

Relevancy & Insights:
Financially motivated cybercriminals are continuously scouring for exposed and vulnerable systems and applications to exploit. A significant number of these malicious actors congregate within underground forums, where they discuss cybercrime and trade stolen digital assets. Operating discreetly, these opportunistic attackers target unpatched systems or vulnerabilities in applications to illicitly gain access and steal valuable data. Subsequently, the pilfered data is advertised for sale within underground markets, where it can be acquired, repurposed, and utilized by other malicious actors in further illicit activities.

ETLM Assessment:
The threat actor claiming the alias “LordVoldemort” is reportedly involved in acquiring and attempting to sell sensitive data on various underground forums. This activity underscores the persistent risks posed by cyber threat actors who exploit vulnerabilities and engage in data theft. To mitigate these risks, organizations should implement robust security measures, including enhanced monitoring, secure data storage, and regular vulnerability assessments to protect against such malicious activities.

Recommendations: Enhance the cybersecurity posture by:

  1. Updating all software products to their latest versions is essential to mitigate the risk of vulnerabilities being exploited.
  2. Ensure proper database configuration to mitigate the risk of database-related attacks.
  3. Establish robust password management policies, incorporating multi-factor authentication and role-based access to fortify credential security and prevent unauthorized access.

8. Other Observations

The CYFIRMA Research team observed that on a dark web forum, an alleged cybercriminal operating under the alias “Penmy” has claimed to possess and sell unauthorized access to a major medical company’s database in Saudi Arabia. The individual is purportedly offering full access to backup data, customer information— including full names and salary details—as well as supplier records.

The alleged listing further claims that the compromised entity collaborates with various public sector organizations and academic institutions, including the Ministry of Health – Riyadh Diwan, King Abdulaziz City for Science and Technology, and King Saud University for Health Sciences. According to the post, the data set for sale contains sensitive records such as access logs, user accounts, financial details, and project updates.

The threat actor has allegedly set an asking price of $2 million for the database but stated that the price is negotiable. They also claim to be open to providing samples as proof of the data’s authenticity.

Source: Underground Forums

The CYFIRMA Research team observed that a threat actor claims to have compromised the Bank Mandiri Pension Fund, allegedly leaking website source code and user documents. According to the alleged post, the compromised data includes the website’s source code, user documents in PDF format, and image documentation in JPG format. The total size of the exposed files reportedly amounts to 1.30 GB, with a compressed version available for download at approximately 1.12 GB. The breach has been attributed to a threat actor known as “LordVoldemort”.

Source: Underground Forums

STRATEGIC RECOMMENDATIONS

  • Attack Surface Management should be adopted by organisations, ensuring that a continuous closed-loop process is created between attack surface monitoring and security testing.
  • Delay a unified threat management strategy – including malware detection, deep learning neural networks, and anti-exploit technology – combined with vulnerability and risk mitigation processes.
  • Incorporate Digital Risk Protection (DRP) in the overall security posture that acts as a proactive defence against external threats targeting unsuspecting customers.
  • Implement a holistic security strategy that includes controls for attack surface reduction, effective patch management, and active network monitoring, through next-generation security solutions and a ready-to-go incident response plan.
  • Create risk-based vulnerability management with deep knowledge about each asset. Assign a triaged risk score based on the type of vulnerability and criticality of the asset to help ensure that the most severe and dangerous vulnerabilities are dealt with first.

MANAGEMENT RECOMMENDATIONS

  • Take advantage of global Cyber Intelligence providing valuable insights on threat actor activity, detection, and mitigation techniques.
  • Proactively monitor the effectiveness of risk-based information security strategy, the security controls applied, and the proper implementation of security technologies, followed by corrective actions remediations, and lessons learned.
  • Consider implementing Network Traffic Analysis (NTA) and Network Detection and Response (NDR) security systems to compensate for the shortcomings of EDR and SIEM solutions.
  • Detection processes are tested to ensure awareness of anomalous events. Timely communication of anomalies and continuously evolved to keep up with refined ransomware threats.

TACTICAL RECOMMENDATIONS

  • Patch software/applications as soon as updates are available. Where feasible, automated remediation should be deployed since vulnerabilities are one of the top attack vectors.
  • Consider using security automation to speed up threat detection, improved incident response, increased the visibility of security metrics, and rapid execution of security checklists.
  • Build and undertake safeguarding measures by monitoring/ blocking the IOCs and strengthening defences based on the tactical intelligence provided.
  • Deploy detection technologies that are behavioral anomaly-based to detect ransomware attacks and help to take appropriate measures.
  • Implement a combination of security control such as reCAPTCHA (completely Automated Public Turing test to tell Computers and Humans Apart), Device fingerprinting, IP backlisting, Rate-limiting, and Account lockout to thwart automated brute-force attacks.
  • Ensure email and web content filtering uses real-time blocklists, reputation services, and other similar mechanisms to avoid accepting content from known and potentially malicious sources.

Situational Awareness – Cyber News

Please find the Geography-Wise and Industry-Wise breakup of cyber news for the last 5 days as part of the situational awareness pillar.

Geography-Wise Graph

Industry-Wise Graph

For situational awareness intelligence and specific insights mapped to your organisation’s geography, industry, and technology, please access DeCYFIR.