ALERTS 2025 SEPTEMBER  HOME  AI  APT  BOTNET  CAMPAIGN  CRIME  CRYPTOCURRENCY  EXPLOIT  HACKING  GROUP  OPERATION  PHISHING  RANSOM  SPAM  VIRUS  VULNEREBILITY


2025 January(36) February(50) March(77) April(54) May(54) June(65) July(50) August(54) SEPTEMBER(61) October(0) November(0) December(0)


DATE

NAME

CATEGORY

SUBCATE

INFO

27.9.25 SVG phishing campaigns deliver infostealer and cryptominer payloads Symantec has observed an uptick in malicious spam (malspam) using Scalable Vector Graphics (SVG) file attachments to initiate malicious activity. A report by security researchers at Fortinet corroborates this trend, highlighting recent SVG-based campaigns delivering Amatera Stealer and PureMiner.

ALERTS

PHISHING
27.9.25 Activities of the DeceptiveDevelopment threat group In a recent publication, ESET reserchers report on a financially motivated threat group called DeceptiveDevelopment. The group has been active since at least 2023 and primarily targets software developers across all major operating systems (Windows, Linux, macOS), particularly those involved in cryptocurrency and Web3 projects.

ALERTS

GROUP
27.9.25 New YiBackdoor Malware Cybersecurity researchers at Zscaler ThreatLabz have identified YiBackdoor, a newly discovered malware family exhibiting significant source code overlaps with the established loaders IcedID and Latrodectus. YiBackdoor operates as a powerful, modular backdoor capable of executing arbitrary commands, capturing screenshots, and extensive system information collection.

ALERTS

VIRUS
27.9.25 RedNovember threat group targets global entities for espionage A report by Insikt Group at Recorded Future details recent activity of a China-backed threat actor named RedNovember (previously known as TAG-100).

ALERTS

APT
27.9.25 Operation Rewrite leads to BadIIS malware distribution Researchers from Palo Alto reported on a SEO poisoning campaign, dubbed "Operation Rewrite". The primary tool used by the attackers in this operation is the BadIIS malware, that can intercept and modify web traffic, utilizing compromised legitimate servers to deliver malicious content.

ALERTS

OPERATION
27.9.25 CVE-2025-53690 - Deserialization of Untrusted Data vulnerability affecting multiple Sitecore products CVE-2025-53690 is a recently disclosed critical (CVSS score 9.0) ViewState deserialization of untrusted data vulnerability affecting Sitecore products including Sitecore Experience Manager (XM), Sitecore Experience Platform (XP) and Experience Commerce (XC)

ALERTS

VULNEREBILITY
27.9.25 Bitpanda users targeted by new phishing campaign Recently, Symantec has observed phish runs targeting users of Bitpanda GmbH, an Austrian digital asset platform headquartered in Vienna. ALERTS PHISHING
27.9.25 SystemBC botnet - new infrastructure uncovered Black Lotus Labs at Lumen Technologies has identified new infrastructure belonging to the SystemBC botnet, a large-scale operation averaging 1,500 daily victims. Unlike typical botnets using residential IPs, SystemBC exploits Virtual Private Server (VPS) systems to create high-volume, persistent proxies that fuel malicious activities for various criminal groups.

ALERTS

BOTNET
27.9.25 New malware distribution campaign attributed to the Rustfly APT group Rustfly APT group (also known as UNC1549 or Nimbus Manticore) is engaged in a sustained cyberespionage operation targeting defense manufacturing, telecommunications, and aviation sectors. Recently published report from Checkpoint reveals a heightened focus from this APT group on Western Europe, particularly Denmark, Sweden, and Portugal. The attackers employ sophisticated spear-phishing campaigns, posing as HR recruiters to lure victims to fake career portals.

ALERTS

APT
27.9.25 XWorm disguised as “Unreal Engine Auto Update” hosted on GitHub’s CDN An individual or group has been disguising XWorm malware as an “Unreal Engine Auto Updater” and hosting it on raw[.]githubusercontent[.]com, GitHub’s CDN endpoint that serves raw file contents from public repositories. ALERTS VIRUS
27.9.25 ClickFix techniques used in BeaverTail malware distribution on macOS and Windows systems The ClickFix social engineering technique relies on tricking users into running malicious commands by presenting fake CAPTCHAs. As reported by Gitlab, a recent campaign leveraging ClickFix techniques has been observed to spread a new BeaverTail malware variant. Previously targeting software developers, the APT group behind this malware has now shifted its focus to marketing, cryptocurrency trading and retail sectors. 

ALERTS

VIRUS
27.9.25 Leafperforator APT leverages Nepalese protest movement for mobile malware distribution A recent activity reported by the researchers from StrikeReady demonstrates a popular trend where geopolitical events serve as bait for targeted cyber threats.

ALERTS

APT
27.9.25 DarkCloud Campaign Targets European Energy, Finance, and Maritime Sectors Symantec has observed a DarkCloud malspam run that used invoice/shipping-themed lures to deliver a Windows stealer. The attackers spoofed two German industrial suppliers (one industrial-machinery vendor, one tank/storage-construction firm) while using logistics and invoice-style social engineering. ALERTS CAMPAIGN
27.9.25 HybridPetya - a Petya/NotPetya offshoot with a UEFI bootkit ESET security researchers have identified new malware samples, dubbed HybridPetya, which exhibit characteristics of the impactful Petya and NotPetya campaigns from 2016-2017.

ALERTS

VIRUS
27.9.25 New campaign distributing SnakeDisk worm and the Toneshell backdoor IBM X-Force identified a new malicious operation attributed to the threat actor known as Fireant (aka Hive0154, Mustang Panda).

ALERTS

CAMPAIGN
27.9.25 XillenStealer malware In their latest report, Cyfirma's analysts reveal XillenStealer as an open-source, Python-based information stealer readily available on GitHub. ALERTS VIRUS
27.9.25 RevengeHotels New Tactics Deliver Potent VenomRAT Securelist researchers have identified RevengeHotels, also known as TA558, as a cybercriminal group targeting the hospitality and tourism industries to steal credit card data.

ALERTS

VIRUS
27.9.25 WhiteCobra Targets Developer Tools for Data Heists KOI Research has identified WhiteCobra, a sophisticated threat actor, in a year-long campaign targeting users of VSCode, Cursor, and Windsurf.

ALERTS

GROUP
17.9.25 EvilAI Malware Mimics Legitimate Tools As reported by Trend Micro researchers, a new malware campaign dubbed EvilAI is posing a threat by impersonating legitimate productivity and AI-powered tools.

ALERTS

VIRUS
17.9.25 Phishing Campaign Targets UK Government Gateway User IDs and Passwords Symantec has observed a phishing campaign delivering HTML attachments via email that masquerade as official GOV.UK Government Gateway confirmations. The email (subject: "Confirmation - Government Gateway") spoofed a no-reply government address and carried a file named attachement.service.gov.uk.html.

ALERTS

PHISHING
17.9.25 Phishing Emails Masquerade as Internal Messages to Deliver SHTML Credential Traps A newly identified phishing campaign, discovered by Symantec, leverages SHTML attachments disguised as password-protected documents to harvest employee credentials.

ALERTS

PHISHING
17.9.25 NPM packages infected by self-replicating worm Malicious activity reported by multiple sources was observed impacting numerous packages in the npm JavaScript repository. The activity revolves around a self-replicating worm named Shai-Hulud, which after infecting a locally available NPM, searches for and infects other accessible packages based on user access. It's responsible for stealing secrets, exfiltrating data, and marking private GitHub projects as public for impacted users.

ALERTS

HACKING
17.9.25 CVE-2025-5086 - Delmia Apriso vulnerability CVE-2025-5086 is a recently disclosed critical (CVSS score 9.0) deserialization of untrusted data vulnerability affecting DELMIA Apriso Manufacturing Operations Management (MOM) software.

ALERTS

VULNEREBILITY
17.9.25 Maranhão Stealer A recent campaign involving the Maranhão Stealer has been identified by the researchers from Cyble. The attack is targeting gaming users through social engineering websites hosted on cloud platforms. ALERTS VIRUS
17.9.25 kkRAT: A new Remote Access Trojan A malware campaign targeting China-speaking users has been identified, deploying a previously undocumented kkRAT alongside ValleyRAT and FatalRAT.

ALERTS

VIRUS
17.9.25 Buterat Backdoor Targeting Enterprise and Government Networks The Lat61 Threat Intelligence Team from Point Wild has identified Backdoor.Win32.Buterat, a sophisticated malware designed for persistent, long-term network infections.

ALERTS

VIRUS
17.9.25 Contagious Interview operation continues SentinelLABS has identified North Korean threat actors associated with the "Contagious Interview" campaign cluster exhibiting a sophisticated approach to operational security.

ALERTS

OPERATION
17.9.25 New Go-Based ZynorRAT Leverages Telegram for Linux and Windows The Sysdig Threat Research Team (TRT) has identified ZynorRAT, a novel Go-based Remote Access Trojan (RAT) demonstrating robust command and control (C2) features for both Linux and Windows platforms.

ALERTS

VIRUS

12.9.25 Yurei ransomware First observed in September, Yurei is a new ransomware group whose operations incorporate a double-extortion model of both file encryption and data theft.

ALERTS

RANSOM
12.9.25 AMOS Stealer malware continues to be distributed via cracked apps rend Micro's latest report reveals a sophisticated campaign leveraging the AMOS infostealer (also known as Atomic macOS Stealer). Attackers employ social engineering, disguising the malware binaries as cracked software or tricking users into pasting malicious commands into the macOS Terminal thus bypassing built-in protections like Gatekeeper.

ALERTS

VIRUS

12.9.25 Fireant group continues activity in Myanmar with ToneShell backdoor ToneShell is a backdoor that is deployed by the Fireant (aka Mustang Panda) threat group. Security researchers at Intezer have published details about a recently observed variant, with related activity indicating that the group continues acting against targets in Myanmar. ALERTS GROUP
12.9.25 BlackField (aka BlackFL) Ransomware BlackField (aka BlackFL) is a double-extortion ransomware actor first observed around July 2025. Analysis of its ransomware demonstrates the typical double-extortion model, using both encryption and data theft to pressure victims.

ALERTS

RANSOM
12.9.25 BlackNevas Ransomware BlackNevas is a ransomware variant that initially emerged in November 2024. This encryptor targets businesses and critical infrastructure across Asia, North America, and Europe, with a strong focus on the Asia-Pacific region.

ALERTS

RANSOM
12.9.25 Luno - Linux botnet with cryptomining and DDoS capabilities Cyble researchers have identified a new sophisticated Linux botnet campaign dubbed "Luno." This malware framework combines cryptocurrency mining with modular DDoS attack capabilities, showcasing advanced features like process masquerading, binary replacement, and a self-update mechanisms, indicative of professional threat actor involvement. ALERTS BOTNET
12.9.25 NightshadeC2 Botnet emerges NightshadeC2 is a newly identified botnet uncovered by eSentire, notable for its advanced stealth and persistence techniques. It is distributed through trojanized installers of legitimate software such as CCleaner, ExpressVPN and others, as well as phishing campaigns using fake ClickFix-themed landing pages.

ALERTS

BOTNET
12.9.25 Kamasers Malware Kamasers is a bot with backdoor capabilities that has recently been observed in the wild. Once deployed, it communicates with its C2 server to retrieve commands that enable it to download and execute files, perform HTTP and DNS flooding attacks, access local files, load malicious JavaScript, and direct browsers to attacker-specified URLs.

ALERTS

VIRUS
12.9.25 NFSkate's RatOn Android Banking Trojan In a recent report, ThreatFabric MTI analysts have identified a sophisticated new Android banking trojan dubbed "RatOn," crafted by the NFSkate threat actor group. RatOn represents a significant advancement in mobile cybercrime by combining classic overlay attacks with powerful Automated Transfer System (ATS) functionalities and NFC relay capabilities.

ALERTS

VIRUS
12.9.25 New Threat Actor GhostRedirector Targets Windows Servers with SEO Fraud and Backdoors In a recent report, ESET researchers have identified a new threat actor, GhostRedirector, that has compromised at least 65 Windows servers across Brazil, Thailand, and Vietnam. Operating in diverse sectors including insurance, healthcare, retail, and education, this actor utilizes a sophisticated custom toolkit.

ALERTS

GROUP
12.9.25 Gentlemen Ransomware Gentlemen is a newly emerged ransomware threat group as reported by Trend Micro researchers. The attackers have been observed to leverage legitimate drivers, abuse Group Policy Objects (GPO) as well as deliver KillAV tools aimed at disabling installed security products in the targeted environments

ALERTS

RANSOM
12.9.25 Tamperedchef Malware Lurks in AppSuite PDF Editor According to a report from Truesec a sophisticated malware campaign masquerading as a free utility, "AppSuite PDF Editor," which silently deploys an information-stealing malware named "Tamperedchef" has been identified. This operation employs highly obfuscated code, possibly AI-generated, and exploits Google advertising to achieve widespread distribution.

ALERTS

CAMPAIGN
12.9.25 RapperBot: Fast-moving IoT botnet exploits NVRs for DDoS RapperBot is a fast-moving IoT botnet that is quickly turning compromised DVRs and NVRs into nodes for large-scale DDoS attacks.

ALERTS

BOTNET
12.9.25 Credential theft: Threat actors spoof Hungarian Post (Magyar Posta Zrt.) services A new wave of phishing attacks targeting Hungarian Post (Magyar Posta Zrt.) services has been identified by Symantec, aiming to steal user credentials.

ALERTS

PHISHING
12.9.25 TinyLoader delivers stealers while clipping wallets In a recent report, researchers have spotlighted TinyLoader, a stealthy malware loader harnessed to siphon cryptocurrency and deploy additional payloads like Redline Stealer and DCRat. ALERTS VIRUS
12.9.25 XWorm adopts multi-stage infection chain Trellix has identified a shift in the XWorm backdoor campaign, which has evolved from simple .lnk-based delivery to a more deceptive, multi-stage infection chain

ALERTS

VIRUS
12.9.25 TAG-150 MaaS group deploys their Castle family of malware TAG-150 is a newly identified threat actor group which operates as a Malware-as-a-Service (MaaS) provider. Activity associated with TAG-150 is highlighted by deployment of multiple custom developed malware, CastleBot, CastleLoader, and CastleRAT.

ALERTS

GROUP
12.9.25 GPUGate: Malware campaign targets IT Pros via GitHub and Google Ads A sophisticated malware campaign dubbed GPUGate, which exploits GitHub's infrastructure and Google Ads to distribute a malicious payload targeting IT professionals in Western Europe, has been reported by Arctic Wolf. ALERTS VIRUS
12.9.25 Salat Stealer: Go-Based Infostealer as Malware-as-a-Service Salat Stealer, a Go-based infostealer offered under a Malware-as-a-Service model, has been reported by Cyfirma. Likely operated by Russian-speaking actors, the malware employs layered persistence techniques, including registry Run keys, scheduled tasks, process masquerading and modifications to Windows Defender exclusions to evade detection.

ALERTS

VIRUS
12.9.25 Obscura: New Go-based ransomware emerges A new ransomware variant known as Obscura has emerged, adding itself to the growing list of active ransomware families targeting organizations in 2025.

ALERTS

RANSOM
12.9.25 Stealerium: An Open-Source Infostealer Fueling Widespread Attacks Stealerium is an open-source infostealer that has been observed in recent activity. The malware has been deployed by multiple groups across various campaigns over the last few months.

ALERTS

VIRUS
12.9.25 LockBeast ransomware LockBeast is a ransomware variant that combines file encryption with data theft to pressure victims into payment. Upon execution, it encrypts files with strong cryptographic algorithms, appends a victim-specific identifier plus the “.lockbeast” extension, and drops a ransom note named README.TXT.

ALERTS

RANSOM
6.9.25 Phishing campaign targets GMO Aozora Net Bank customers GMO Aozora Net Bank, an online-only bank in Japan established in 2018 by the GMO Internet and Aozora Bank groups, offers customized financial services for both individuals and businesses.

ALERTS

PHISHING
6.9.25 AI Waifu RAT exploits AI enthusiasm AI Waifu RAT is a newly identified Remote Access Trojan spreading in LLM role-playing communities by posing as an AI interaction or research tool.

ALERTS

AI
6.9.25 APT28 introduces NotDoor Backdoor A new backdoor called NotDoor, attributed to APT28, a Russian intelligence-linked threat group, has been identified by LAB52.  Delivered via Microsoft OneDrive with DLL side-loading, NotDoor uses an Outlook VBA macro to monitor emails for trigger words, enabling command execution, data exfiltration and file uploads.

ALERTS

APT
6.9.25 Indonesian-Language Agent Tesla Campaign Targets Firms Across Southeast Asia Symantec has observed a new Agent Tesla campaign targeting organizations in Southeast Asia, including both local companies and regional branches of large international firms.  ALERTS VIRUS
6.9.25 Iran-Nexus campaign exploits Omani MFA Mailbox A recent campaign exploiting the Oman Ministry of Foreign Affairs was first reported by ClearSky, with Dream Security researchers providing further insights.

ALERTS

CAMPAIGN
6.9.25 Jackpot ransomware
A new ransomware variant named Jackpot, linked to the MedusaLocker family, has emerged leveraging a double extortion strategy that combines file encryption with the theft of sensitive data.

ALERTS

RANSOM
6.9.25 MystRodX Backdoor As per recent reports from XLab, a new backdoor named MystRodX has been discovered, implemented in C++ and equipped with an extensive range of capabilities. It supports file management, port forwarding, reverse shell access and socket management, while also embedding anti-debugging and anti-VM techniques to bypass security analysis. ALERTS VIRUS
6.9.25 Masslogger actor switched from direct archive attachment to Discord CDN URL Masslogger, an information-stealing malware active since 2020, continues to rank among the most prevalent threats. It is designed to harvest credentials stored in browsers, email clients, and messaging applications.

ALERTS

VIRUS
6.9.25 Desolator Ransomware The Desolator ransomware group, also referred to as The Desolated Collective, is a relatively new actor recently observed in the wild. Alleged victims include construction and engineering firms in Latin America and Southern Europe, and a technology and software developer in Southeast Asia.

ALERTS

RANSOM
6.9.25 TinkyWinkey keylogger A new Windows keylogger, dubbed TinkyWinkey, analyzed by Cyfirma, leverages a service-based persistence model and DLL injection into trusted processes to evade detection while maintaining continuous surveillance.

ALERTS

VIRUS
6.9.25 North Korean Vedalia expands espionage via Operation HanKook Phantom An espionage campaign dubbed Operation HanKook Phantom, attributed to North Korean threat actor Vedalia (also known as APT37, ScarCruft), has been reported by Seqrite targeting South Korean academic and research organizations.

ALERTS

APT