ALERTS 2025 AUGUST  HOME  AI  APT  BOTNET  CAMPAIGN  CRIME  CRYPTOCURRENCY  EXPLOIT  HACKING  GROUP  OPERATION  PHISHING  RANSOM  SPAM  VIRUS  VULNEREBILITY


2025 January(36) February(50) March(77) April(54) May(54) June(65) July(50) August(54) SEPTEMBER(11) October(0) November(0) December(0)


DATE

NAME

CATEGORY

SUBCATE

INFO

31.8.25 Xworm RAT delivered through ScreenConnect disguised as a Fake Video file A recent campaign has been observed using AI-themed lures to trick victims into downloading a digitally signed ScreenConnect installer disguised as a video file. Once executed, the installer secretly establishes a hidden remote session and initiates a multi-stage infection chain.

ALERTS

VIRUS
31.8.25 SpyNote Android RAT spreads through fake Play Store sites. A new campaign is distributing the SpyNote Android RAT through deceptive websites mimicking Google Play Store pages, tricking users into installing dropper APKs. ALERTS VIRUS
31.8.25 Silver Fox Abuses Legit Drivers to Deploy RAT Researchers at Check Point observed a Silver Fox campaign where they exploited a Microsoft-signed vulnerable driver (amsdk.sys) in an attempt to silently disable EDR and antivirus protections on Windows 10 and 11.

ALERTS

VIRUS
31.8.25 TASPEN Impersonation Malware Exploits Indonesian Pensioners A sophisticated mobile malware campaign, potentially linked to Chinese actors, is actively targeting Indonesian pensioners and civil servants by impersonating PT Dana Tabungan dan Asuransi Pegawai Negeri (TASPEN), a state-owned pension fund.

ALERTS

EXPLOIT
31.8.25 ShadowSilk: A Mixed-Language APT Targeting Government in Asia A recently published report details the ShadowSilk threat actor group, a mixed-language (Chinese and Russian) actor primarily focused on data exfiltration from government targets. ALERTS APT
31.8.25 SmartApeSG uses fake CAPTCHAs to deploy NetSupport RAT and StealC v2 A multi-stage attack chain linked to SmartApeSG is exploiting compromised websites by injecting fake CAPTCHA pages that trick users into executing hidden commands through a ClickFix-style script.

ALERTS

VIRUS
31.8.25 Hook v3 evolves into banking, spyware and ransomware extortion A new variant of the Hook Android banking trojan has emerged, evolving beyond credential theft to include ransomware-style extortion via full-screen cryptocurrency payment overlays.

ALERTS

VIRUS
31.8.25 Cephalus Ransomware In mid‑August 2025, researchers observed two ransomware incidents involving a new variant dubbed “Cephalus.” According to their findings, the attackers gained entry via RDP using accounts without MFA and appeared to exfiltrate data via MEGA before deploying the payload.

ALERTS

RANSOM
31.8.25 "PlugX" Backdoor Powers UNC6384's Diplomatic Espionage A sophisticated cyber-espionage campaign, attributed to the PRC-nexus threat actor UNC6384, is actively targeting diplomats in Southeast Asia and other global entities. ALERTS VIRUS
31.8.25 ZipLine: Building Trust, Exploiting Trust – A New Attack Vector The sophisticated social engineering campaign, "ZipLine," targets US companies across diverse sectors like manufacturing, semiconductors, and biotech, seeking valuable data, vendor networks, or exploitable infrastructure. Unlike traditional phishing, ZipLine initiates contact via a company's public "Contact Us" form, generating initial legitimacy.

ALERTS

EXPLOIT
31.8.25 Datebug threat group uses custom malware to target Linux BOSS systems The Datebug threat group (aka APT36, Transparent Tribe) is a Pakistan-based group known to target various industries (government. media, military) primarily situated in India. In recent activity, the group was observed targeting the Linux BOSS operating system with custom malware, notably those systems associated with the Indian government.

ALERTS

VIRUS
31.8.25 Biotech and Semiconductor Firms Impersonated to Spread Snake Keylogger Symantec has identified an actor running two coordinated malspam campaigns that impersonated well-known companies to distribute Snake Keylogger, a prevalent information-stealing malware designed to harvest credentials, system details, and other sensitive data before transmitting them to attacker-controlled Telegram bots. ALERTS VIRUS
31.8.25 New Android Backdoor Impersonates Antivirus to Spy on Russian Business Leaders A new sophisticated Android malware, Android.Backdoor.916.origin, has been identified, specifically targeting executives of Russian businesses.

ALERTS

VIRUS
31.8.25 Anatsa - Android banking malware Anatsa, a banking Trojan targeting Android devices, has been in circulation since 2020. A recently observed campaign saw the malware being downloaded after installation of a decoy document reader application from the Google Play Store. Some features present in the recent release include:

ALERTS

VIRUS
31.8.25 Gayfemboy malware campaign A stealthy malware strain, dubbed "Gayfemboy," has been observed exploiting a range of vulnerabilities to infiltrate systems. Most recent attacks target vulnerabilities in products from vendors such as DrayTek, TP-Link, Raisecom, and Cisco. ALERTS CAMPAIGN
26.8.25 Gigabud Malware Masquerades as Grab Super-App in Southeast Asia A recent variant of the Gigabud Android malware has been found impersonating the popular GRAB super-app—offering ride-hailing, food delivery, and digital payments—widely used across Southeast Asia. The trojanized APK, named Grab.apk, was detected in Thailand, disguised as the legitimate application.

ALERTS

VIRUS
26.8.25 Sinobi Ransomware The Sinobi ransomware ransom note uses standard double-extortion techniques. It mixes intimidation (stolen documents, 7-day deadline, threats of leaks) with persuasion (test decryption and stolen file list).

ALERTS

RANSOM
26.8.25 Global Industries and Government Agencies Targeted in Remcos Campaign A recently observed malspam campaign is leveraging impersonation of a global supplier in the valves and actuators industry to deliver Remcos RAT. The lure comes in the form of emails with the subject line “Price quote” or “Quotation” and a malicious archive (Quote_pdf.z) as attachment.  ALERTS CAMPAIGN
26.8.25 APT36 is evolving with new delivery techniques A new campaign by APT36(aka Transparent Tribe) has been reported, leveraging phishing emails containing ZIP archives with malicious .desktop files disguised as PDFs to target users.

ALERTS

APT
26.8.25 Phishing campaign targeting Kazakhstan’s Public Sector A phishing campaign in Kazakhstan has been discovered that is targeting public sector clients by mimicking official government login portals and using Telegram’s Bot API as a covert channel to exfiltrate stolen credentials.

ALERTS

CAMPAIGN
26.8.25 FamiPay users targeted by new phishing campaign Recently, Symantec has observed phish runs targeting users of FamiPay, a Japanese digital wallet and mobile payment service offered by FamilyMart.

ALERTS

CAMPAIGN
26.8.25 Fake IBM Trusteer Mobile App Used in SpyNote Campaign During ongoing monitoring of mobile threats, Symantec identified a malicious Android application masquerading as an IBM security product. The app, distributed under the name IBMTMOBILE.apk, was hosted on a domain designed to typosquat IBM Trusteer.

ALERTS

CAMPAIGN
26.8.25 TA-NATALSTATUS cryptojacking campaigns TA-NATALSTATUS is a threat actor engaged in conduct of cryptojacking operations around the world. The attackers are targeting vulnerable Redis server instances for the purpose of cryptominer malware deployments.

ALERTS

CRYPTOCURRENCY
26.8.25 Warlock Ransomware Leverages SharePoint ToolShell vulnerability (CVE-2025-53770) for Widespread Attacks Warlock ransomware threat actors have been aggressively targeting organizations globally by exploiting a critical vulnerability (CVE-2025-53770) in Microsoft SharePoint, known as the ToolShell exploit chain. ALERTS RANSOM
26.8.25 BQTLOCK Ransomware BQTLOCK is a new ransomware variant offered for sale in the form of a Ransomware-as-a-Service (Raas) model. The malware has the functionality to encrypt user data and append .bqtlock extension to the locked files.

ALERTS

RANSOM
26.8.25 SHAMOS macOS malware SHAMOS is a new variant of AMOS (aka Atomic macOS Stealer) malware targeting the macOS platform. The malware is sold by the threat group known as Cookie Spider in form of a MaaS (Malware-as-a-Service) offering.

ALERTS

VIRUS
26.8.25 QuirkyLoader: A stealthy new malware loader A newly identified malware loader dubbed QuirkyLoader has emerged as a sophisticated cyber threat, actively distributing a range of infostealers and RATs including Agent Tesla, AsyncRAT, FormBook, MassLogger, Remcos and others. ALERTS VIRUS
26.8.25 Fake Electricity subsidy App phishing campaign An Android phishing campaign impersonating an Indian government electricity subsidy scheme has been discovered. Victims are lured through YouTube and a GitHub-hosted phishing site mimicking an official subsidy portal.

ALERTS

PHISHING
26.8.25 VIP Keylogger Spreads via Multi-Org Impersonation Campaign Symantec has recently observed a series of malicious email campaigns delivering VIP Keylogger, in which attackers impersonated multiple legitimate organizations across industries such as logistics, engineering, and manufacturing—leveraging run-of-the-mill purchase orders, quotations, shipment notices, and sales contracts for social engineering.

ALERTS

CAMPAIGN
26.8.25 Turkish Bank-themed Malspam spreads Snake Keylogger Across Sectors Symantec has identified a recent malspam campaign distributing Snake Keylogger under the guise of a major financial institution in Turkey.

ALERTS

VIRUS
26.8.25 Deployment of the RealBlindingEDR tool among the recent activities of the Crypto24 threat group Threat actor known as Crypto24 has been observed to recently conduct multi-stage attacks against high-profile organizations from various sectors. ALERTS GROUP
26.8.25 CVE-2024-36401 in OSGeo GeoServer GeoTools exploited in a recent resource monetization campaign According to latest report from Palo Alto Networks, a new campaign leveraging exploits of a remote code execution (RCE) vulnerability CVE-2024-36401 has been spotted in the wild.

ALERTS

VULNEREBILITY
26.8.25 SoupDealer Loader malware SoupDealer is a new loader malware variant observed recently in the wild and targeting users from Turkey. The malware is Java-based and distributed via malicious .jar attachments in malspam campaigns.

ALERTS

VIRUS
26.8.25 ConfuserEx Obfuscation Spotted in Latest DarkCloud Stealer Campaign A recent threat report from Unit 42 (Palo Alto Networks) highlights an evolved infection chain delivering the DarkCloud Stealer, now using ConfuserEx for obfuscation and a final payload written in Visual Basic 6. ALERTS CAMPAIGN
26.8.25 CORNFLAKE.V3 in “ClickFix” campaign Researchers have uncovered a new campaign where the CORNFLAKE.V3 backdoor is being used, spread through fake CAPTCHA “ClickFix” pages run by the threat group UNC5518.

ALERTS

CAMPAIGN
26.8.25 UNC1151 leverages macro-enabled Spreadsheets and Cloud C2 in latest campaign The UNC1151 APT group has been observed conducting a malware campaign targeting Ukraine and Poland through malicious archive files containing decoy spreadsheets with embedded obfuscated macros.

ALERTS

APT
26.8.25 MountBot Botnet Researchers recently reported MountBot, a new IoT botnet first observed in April exploiting ASUS AiCloud vulnerabilities and operating on the same infrastructure as RapperBot.

ALERTS

BOTNET
20.8.25 Fake Flash updates deliver Winos Trojan A new Silver Fox campaign masquerading as a Flash plugin update has been observed. Users are lured through fake online tools, such as counterfeit translation sites, where they are prompted to install a fraudulent Flash update.

ALERTS

VIRUS
20.8.25 EncryptHub attackers exploit MMC CVE-2025-26633 vulnerability for payload delivery A recent campaign attributed to threat group EncryptHub (aka LARVA-208 and Water Gamayun), blends social engineering with the exploitation of the Microsoft Management Console (MMC) vulnerability tracked as CVE-2025-26633, dubbed MSC EvilTwin.

ALERTS

EXPLOIT
20.8.25 Cracked Games lead to Lumma Stealer and SectopRAT infections A multi-stage malware campaign has been uncovered where users searching for cracked games are tricked into downloading installers that first deploy Lumma Stealer and then install SectopRAT. ALERTS VIRUS
20.8.25 Modular PipeMagic backdoor masquerades as a ChatGPT application Recent activity by a financially motivated threat actor group involved deployment of the modular PipeMagic malware under the guise of a ChatGPT desktop application.

ALERTS

VIRUS
20.8.25 Recent vulnerabilities affecting Adobe Experience Manager (CVE-2025-54253 / CVE-2025-54254 / CVE-2025-49533) Three vulnerabilities affecting Adobe Experience Manager (AEM) software solutions have been recently disclosed. The vulnerabilities are tracked as follows:

ALERTS

VULNEREBILITY
20.8.25 njRAT masquerades as browser-based Minecraft Game The renewed hype around Minecraft, driven by its upcoming film adaptation, is being exploited by cybercriminals who are distributing what appears to be a browser-based clone of the game but in reality conceals njRAT, a powerful remote access trojan. ALERTS VIRUS
20.8.25 Android malware masquerading as GiftFlipSoft A sophisticated Android banking malware dubbed Lazarus Stealer, masquerading as the seemingly benign GiftFlipSoft app has been observed.

ALERTS

VIRUS
20.8.25 NOVABLIGHT MaaS after Wallets NOVABLIGHT is a sophisticated new Malware-as-a-Service (MaaS) information stealer leveraging Telegram and Discord for both distribution and operational support. Posing as an "educational tool," it stealthily distributes itself through social engineering lures like fake video game installers often repackaged with French-language titles.

ALERTS

CRYPTOCURRENCY
20.8.25 PhantomCard mobile malware A novel NFC-based malware, dubbed PhantomCard, has been identified in the wild and is actively targeting Android banking customers.

ALERTS

VIRUS
20.8.25 Charon Ransomware Charon represents a recently identified ransomware variant that utilizes DLL-injection techniques for the compromise of targeted endpoints.

ALERTS

RANSOM
20.8.25 Phishing emails targeting U-Next users pose account takeover risk U-Next is a Japanese video streaming platform (OTT). Recently, Symantec detected a phishing campaign targeting U-Next's users and its accounts.

ALERTS

PHISHING
20.8.25 A new variant of the FireWood Linux malware found in the wild A new variant of the Linux malware dubbed FireWood has been discovered in the wild. The malware is linked to Project Wood malware family and attributed to the Gelsemium APT group. ALERTS VIRUS
20.8.25 CVE-2017-11882 exploits still lead to malicious infections CVE-2017-11882 is an older vulnerability affecting the Equation Editor component in Microsoft Office. If successfully exploited the flaw might allow attackers remote code execution on the targeted systems.

ALERTS

VULNEREBILITY
20.8.25 BytesFromHeaven ransomware A new ransomware strain, BytesFromHeaven, has surfaced in the wild. Upon execution, the malware encrypts user data, appends random extensions to locked files, and changes the desktop wallpaper to signal a successful attack.

ALERTS

RANSOM
20.8.25 SmartLoader delivered via Github repositories A new campaign leveraging Github repositories to deliver the SmartLoader malware has been reported in the wild. The repositories are disguised as projects involving automation tools, DDoS protection applications, software cracks or game hacks. ALERTS VIRUS
20.8.25 New malicious campaign delivering PS1Bot malware A new malicious operation delivering PowerShell-based malware variant dubbed PS1Bot has been reported by the researchers from Cisco Talos.

ALERTS

VIRUS