VerSprite Weekly Threat Intelligence #26

Date Range: 04 August 2025 – 08 August 2025
Issue: 26th Edition
Reported Period Victimology

Security Triumphs of the Week
This week saw significant international law enforcement successes against cybercrime, including the dismantling of BlackSuit ransomware infrastructure linked to $370M in extortion and the guilty pleas of Samourai Wallet founders for laundering $200M. Dutch authorities restored systems post-Citrix breach, while U.S. extradited a Nigerian hacker behind a $2.5M tax fraud scheme. WhatsApp disrupted 6.8M scam accounts, and crossborder collaboration countered illegal AI chip exports and data leaks. These efforts underscore global strides in disrupting cybercriminal ecosystems, prosecuting financial crimes, and mitigating threats to critical infrastructure and digital platforms.
US Confirms Takedown of BlackSuit Ransomware Behind 450+ Hacks
U.S. and international law enforcement agencies dismantled critical infrastructure of the BlackSuit ransomware group, linked to the Royal ransomware operation, responsible for over 450 attacks and $370 million in extorted cryptocurrency since 2022. The coordinated takedown, led by ICE’s Homeland Security Investigations with global partners, targeted servers, domains, and laundering mechanisms supporting double-extortion tactics against healthcare, education, energy, and government sectors. BlackSuit encrypted systems while threatening data leaks, endangering critical infrastructure operations. The operation involved Europol’s Checkmate initiative and agencies from seven countries, disrupting the group’s ecosystem and financial networks. Prosecution efforts continue as authorities emphasize the national security threat posed by ransomware targeting essential services. This marks a major step in combating cybercriminal enterprises through enhanced international collaboration.
Read full article: Gbhackers
Dutch Prosecutors Recover From Suspected Russian Hack
The Dutch Public Prosecution Service restored its networks after a cyberattack exploiting a Citrix vulnerability (CVE-2025-5777), which bypasses authentication and enables unauthorized access. Systems were taken offline July 17 following Citrix Bleed 2 warnings. Dutch media linked the attack to Russian hackers, possibly targeting intelligence or disrupting the Netherlands’ support for Ukraine, including recent NATO funding and military aid. The incident follows a 2024 breach of Dutch police data by Russia-linked “Laundry Bear,” associated with APT28. While China also exploited the Citrix flaw, Russia’s involvement aligns with its geopolitical tensions. No data theft or manipulation was confirmed in this breach.
Read full article: Bankinfosec
Cryptomixer founders pled guilty to laundering money for cybercriminals
The founders of Samourai Wallet cryptocurrency mixer, Keonne Rodriguez and William Lonergan Hill, pleaded guilty to laundering over $200 million for cybercriminals. They admitted to operating an unlicensed money-transmitting business and facilitating anonymous transactions through services like Whirlpool and Ricochet, which processed $2 billion in illicit Bitcoin from dark web markets, hacks, and fraud. The duo promoted their platform on dark web forums as a tool to “clean dirty BTC” and actively encouraged criminals to use it. Arrested in April 2024, they face up to five years in prison and agreed to forfeit $237.8 million. Their services generated $6 million in fees and were used in over 100,000 downloads before domains and servers were seized. Authorities highlighted their deliberate role in enabling financial crimes.
Read full article: Bleepingcomputer
WhatsApp Removes 6.8 million Accounts Over Malicious Activity Concerns
WhatsApp removed 6.8 million accounts in early 2024 to combat global scam networks, particularly targeting organized fraud centers in Southeast Asia using forced labor. Meta’s proactive detection systems disrupted these operations before scams escalated, alongside new features like group chat warnings for unknown contacts. A joint operation with OpenAI dismantled a Cambodian group using AI-generated content for a fake rental scheme. Critics urge Meta to adopt preventive measures instead of post-fraud removals, emphasizing scams often start via messages and shift to crypto payments. Consumer advocates demand stricter platform regulations and enforcement of online safety laws. Authorities advise vigilance and using security tools like two-step verification.
Read full article: Gbhackers
Hacker Extradited to U.S. for $2.5 Million Tax Fraud Scheme
Chukwuemeka Victor Amachukwu, a Nigerian national, was extradited from France to the U.S. for orchestrating a multi-year cybercrime scheme involving hacking, wire fraud, and identity theft. Targeting U.S. tax firms via spearphishing, he stole sensitive data to file fraudulent tax returns, securing $2.5 million in illicit refunds and $819,000 from fake disaster loan claims. The group also executed an investment fraud using fictitious financial instruments. Amachukwu faces charges including conspiracy, wire fraud, and aggravated identity theft, with potential sentences up to 20 years per count. The case highlights international law enforcement collaboration against cyber-enabled financial crimes. Prosecutors emphasize the exploitation of digital vulnerabilities to defraud institutions and individuals.
Read full article: Gbhackers
Breach Roundup: Chinese Duo Held for Illegal AI Chip Exports
This week’s cybersecurity incidents include the arrest of two Chinese nationals in Los Angeles for illegally exporting advanced Nvidia AI chips to China via Singapore and Malaysia, bypassing U.S. export controls. France extradited a Nigerian hacker involved in a $2.5M tax fraud scheme targeting U.S. firms. Ukrainian hackers breached Russian-occupied Crimean servers, uncovering evidence of forced child deportations. A Florida prison leaked inmates’ visitor contact details via an email error, raising privacy concerns. A male-oriented clone of the Tea dating app exposed user data, including IDs and emails, due to a misconfigured database. These events highlight ongoing issues in illegal tech exports, cybercrime, and data security vulnerabilities.
Read full article: Bankinfosec
Security Setbacks of the Week
This week’s security setbacks underscore escalating cyber threats across sectors, with Chinese and cybercrime groups exploiting phishing-as-a-service, social engineering, and third-party vulnerabilities to breach healthcare, education, aviation, and entertainment entities. High-profile incidents included ransomware attacks on DaVita and medical providers, ShinyHunters’ Salesforce-focused campaigns, and UNC6040’s corporate espionage via vishing. Persistent gaps in device binding, MFA adoption, and vendor monitoring enabled large-scale data theft, financial fraud, and crypto asset compromises. Healthcare remained a prime target, with breaches impacting over 2 million patients, highlighting systemic risks from under-resourced IT and aggressive extortion tactics. The breaches collectively emphasize urgent needs for cross-industry collaboration, enhanced authentication protocols, and proactive threat hunting to mitigate evolving adversarial tradecraft.
Dialysis Firm Attack Affects 1 million, Costs $13.5M to Date
DaVita, a major global dialysis provider, reported a March-April 2025 cyberattack by the Interlock gang, affecting over 1 million U.S. patients and costing $13.5 million in remediation. Stolen data (1.5TB) includes sensitive patient information like Social Security numbers, health records, and check images. The breach, involving ransomware, disrupted operations and led to regulatory filings in multiple states, though not yet reported to federal HHS. Financial impacts include $12.5M in third-party remediation and $1M in patient care costs. DaVita claims the immediate effects are largely resolved but acknowledges ongoing cybersecurity risks. Interlock’s darkweb claims remain unverified by the company.
Read full article: Bankinfosec
Cisco Discloses Data Breach Exposed User Profiles from Cisco.com
Cisco disclosed a data breach exposing basic user profile data from Cisco.com due to a vishing attack targeting an employee. The attacker accessed a third-party cloud CRM system, exporting names, emails, phone numbers, and account metadata. Cisco terminated unauthorized access, confirmed no sensitive data (passwords, proprietary info) was compromised, and stated no product/services were impacted. The breach was contained to a single CRM instance, with notifications issued to affected users. Cisco plans enhanced security measures, including employee retraining on vishing threats. The incident underscores rising risks of social engineering attacks targeting human vulnerabilities over technical flaws.
Read full article: Gbhackers
Chinese Hackers Breach Exposes 115 million U.S. Payment Cards
Chinese hackers exploited smishing attacks and phishing-as-a-service platforms to compromise up to 115 million U.S. payment cards, tokenizing stolen data into digital wallets like Apple Pay and Google Wallet to bypass fraud detection. Since August 2023, syndicates led by actors such as “Lao Wang” used geofenced phishing kits, SMS/iMessage lures impersonating services like USPS, and fake e-commerce sites to harvest credentials, PII, and OTP codes. Attackers provisioned cards on controlled devices for contactless payments, POS laundering, and global monetization. Competing groups like Darcula expanded operations, targeting 80+ countries and leveraging SaaS-like infrastructure for scalability. The breach imposes massive financial costs, demanding urgent reforms in wallet authentication, device binding, and cross-industry collaboration to counter evolving threats.
Read full article: Gbhackers
Columbia University Data Breach Exposes Personal and Financial Data of 870,000
Columbia University experienced a major data breach between May and June 2025, exposing personal and financial data of approximately 870,000 individuals, including students, faculty, staff, and alumni. The breach, detected on July 8, 2025, involved unauthorized access to external systems, with compromised data including names and sensitive identifiers. Delayed detection highlighted potential gaps in monitoring and incident response protocols. Affected individuals were notified in August and offered 24 months of free credit monitoring and identity theft protection via Kroll, LLC. The university collaborated with cybersecurity experts, law enforcement, and legal counsel to investigate and secure systems. The incident underscores cybersecurity challenges in educational institutions managing vast personal data repositories.
Read full article: Gbhackers
Airlines KLM and Air France Detail Customer Data Breach
Air France and KLM disclosed a data breach linked to cybercrime group ShinyHunters, which targeted an external customer-service platform, likely Salesforce. Hackers accessed customer data via social engineering tactics like voice phishing, though sensitive information such as passwords or payment details were not compromised. The breach exposed names and contact details, prompting warnings to customers about potential phishing attempts. ShinyHunters, known for Salesforce-focused attacks, has previously targeted major firms like Google and Cisco. Salesforce emphasized the breaches stem from customer security gaps, not platform vulnerabilities, urging enhanced protections like MFA. The group overlaps with Scattered Spider, blending data extortion and ransomware tactics.
Read full article: Gbhackers
Hacks on 3 Specialty Medical Providers Affect Nearly 800,000
Three specialty medical providers Compumedics USA, Mount Baker Imaging/Northwest Radiologists, and Highlands Oncology Group reported cyberattacks impacting nearly 800,000 patients collectively. Compumedics’ breach (318,150 patients) involved unauthorized access from February to March 2025, exposing medical and insurance data. Mount Baker Imaging (348,118 affected) suffered a January 2025 network disruption, compromising Social Security numbers and treatment details. Highlands Oncology (113,575 patients) faced a six-month intrusion ending in June 2025, with encrypted files and stolen financial/medical data. Experts highlight healthcare’s vulnerability due to sensitive data and under-resourced IT, noting ransomware gangs’ use of double extortion and aggressive tactics. Recommendations include securing identity systems, third-party audits, phishing-resistant MFA, and rapid recovery plans to mitigate escalating threats.
Read full article: Bankinfosec
Google’s Salesforce Environment Compromised – User Information Exfiltrated
Google confirmed a June breach of its corporate Salesforce environment by threat group UNC6040, resulting in theft of contact information for small and medium businesses. The attackers used voice phishing (vishing) to impersonate IT staff, manipulating employees into authorizing malicious Salesforce-connected apps for data exfiltration. Stolen data included publicly available business details, with Google swiftly mitigating access. UNC6040 evolved tactics, shifting from standard tools to custom Python scripts and anonymizing techniques via TOR/VPNs. The breach links to extortion campaigns (UNC6240) demanding bitcoin payments, potentially involving ShinyHunters-branded threats. The incident underscores risks of social engineering targeting cloud platforms and the need for enhanced verification protocols.Schools.
Read full article: Gbhackers
Biggest-Ever Bitcoin Hack Uncovered: $3.5B Stolen in Silent Breach
A massive $3.5 billion Bitcoin theft from LuBian, a major mining pool controlling 6% of Bitcoin’s hash rate in 2020, remained undetected for over four years. Hackers stole 90% of LuBian’s Bitcoin holdings on December 28, 2020, followed by an additional $6 million in crypto assets the next day. The breach, uncovered recently by blockchain firm Arkham, exploited vulnerabilities in LuBian’s infrastructure. Despite fund transfers to recovery wallets, most assets were irrecoverable. The incident highlights critical security gaps in crypto mining operations and raises concerns about undetected breaches industry-wide. It surpasses previous crypto hacks, emphasizing the need for enhanced security and transparency in handling digital assets.
Read full article: Gbhackers
Microsoft PlayReady DRM Used by Netflix, Amazon, and Disney+ Allegedly Leaked Online
Microsoft’s PlayReady DRM, used by Netflix, Amazon Prime Video, and Disney+, reportedly had SL2000 and SL3000 security certificates leaked on GitHub, enabling potential decryption of protected streams. SL3000, designed for ultra-high-definition content with hardware-based security, poses severe piracy risks if exploited, while SL2000’s software-based protections are more easily mitigated. Microsoft issued a DMCA takedown to remove SL3000 certificates but left SL2000 accessible, prioritizing hardware-tier threats. Amazon suspended accounts using leaked credentials, detecting anomalies in license requests. The incident highlights vulnerabilities in DRM systems, emphasizing the need for continuous updates and adaptive enforcement to combat evolving piracy tactics.
Read full article: Gbhackers
Data center firm leaks massive 38GB database containing thousands of personal records online
A Florida-based data services provider, IMDataCenter, exposed a 38GB database containing 10,820 records of sensitive personal information, including names, addresses, emails, phone numbers, and lifestyle data. Discovered by security researcher Jeremiah Fowler, the unsecured, non-password-protected database included CSV files with extensive PII, potentially used for sales and marketing across industries like insurance, healthcare, and elections. While no abuse has been confirmed, the leaked data posed risks of phishing or identity theft. IMDataCenter, a division of Brooks Integrated Marketing, secured the database after notification. The incident highlights risks tied to third-party data management, though it remains unclear if malicious actors accessed the data beforehand.
Read full article: Techradar
Venice Film Festival hacked, attendee data leaked online
The Venice Film Festival suffered a data breach on July 7, 2025, exposing personal information of attendees, including journalists. Leaked data encompassed names, email addresses, phone numbers, mailing addresses, and tax codes for VAT-eligible individuals. Festival organizers isolated affected systems promptly and notified authorities, adhering to GDPR requirements. While payment and ticketing data remained secure, the breach heightens risks of phishing and identity theft for victims. The entertainment sector, a growing target for cyberattacks, faced similar incidents like Cannes 2022’s ticketing bot attacks. Affected individuals are advised to update passwords, enable multi-factor authentication, and remain vigilant against phishing attempts.
Read full article: Techradar
The New Emerging Threats
Emerging threats highlight AI’s dual role in escalating cyberattacks, enabling scalable phishing via GenAI-crafted sites and AI-assisted malware development, while state actors like North Korea’s ScarCruft and Lazarus pivot to financially motivated campaigns using Rust/Go-based tools. Attackers exploit hybrid cloud vulnerabilities, abuse RMM software, and weaponize legal document trust to bypass AI safeguards. The convergence of statesponsored tactics, malware-as-a-service, and AI democratization underscores a shift toward sophisticated, cross-platform attacks demanding Zero Trust, behavioral analytics, and supply-chain hardening.
ScarCruft Hacker Group Launches New Rust-Based Malware Attack Leveraging PubNub
The North Korean state-sponsored group ScarCruft has launched a sophisticated malware campaign targeting South Korean users via a fake postal-code update. The attack, attributed to the subgroup ChinopuNK, employs Rust-based backdoors, ransomware, and PubNub’s messaging infrastructure for stealthy command-and-control operations. This marks a shift from ScarCruft’s traditional espionage focus to financially motivated tactics, including data exfiltration and encryption for extortion. The malware arsenal includes tools like NubSpy, LightPeek, and CHILLYCHINO, leveraging modern languages like Rust and Go for evasion and cross-platform compatibility. The campaign highlights ScarCruft’s adaptability in abusing legitimate cloud services to bypass detection, blending espionage with disruptive capabilities. This evolution underscores the growing convergence of state-sponsored cyber operations and cybercrime methodologies.
Read full article: Gbhackers
Weaponized AI is making hackers faster, more aggressive, and more successful
Hackers are increasingly leveraging generative AI to enhance attack speed, scale, and sophistication, enabling less-skilled actors to execute advanced campaigns. CrowdStrike reports a shift toward targeting enterprise AI tools, particularly agentic AI systems, which are now a core attack surface. Attackers exploit vulnerabilities in AI development tools to steal credentials, deploy malware, and infiltrate systems. Groups like Scattered Spider and Famous Chollima use AI to automate attacks, with ransomware deployed within 24 hours of access. Despite AI’s role, 81% of intrusions remain malware-free, relying on human-driven tactics. AI democratization and agentic system vulnerabilities are escalating cybersecurity risks.
Read full article: Techradar
Threat Actors Use GenAI to Launch Phishing Attacks Mimicking Government Websites
Threat actors are utilizing generative AI (GenAI) tools like DeepSite AI to create highly realistic phishing websites impersonating government entities, such as Brazil’s State Department of Traffic and Ministry of Education. These AI-generated sites employ SEO poisoning to appear prominently in search results, mimicking official aesthetics with TailwindCSS and FontAwesome while including non-functional UI elements and overly descriptive code comments. Attackers collect sensitive data (e.g., taxpayer IDs) and leverage Brazil’s Pix payment system to steal funds. Despite low per-victim losses, the scalability of GenAI poses risks of widespread, sophisticated attacks. Zscaler recommends Zero Trust architecture and multilayered detection (e.g., HTML.Phish.AIGen) to counter these threats.
Read full article: Gbhackers
Lazarus Hackers Use Fake Camera/Microphone Alerts to Deploy PyLangGhost RAT
The North Korean Lazarus Group’s Famous Chollima subgroup has deployed PyLangGhost RAT, a Python-based malware derived from GoLangGhost, using AI-assisted code porting. It spreads via targeted social engineering campaigns, such as fake job interviews, where victims are tricked into executing malicious scripts under the guise of fixing camera/microphone errors. The RAT employs modular components for system control, credential theft (targeting crypto wallets and Chrome data), and communication with C2 servers using weak encryption. It establishes persistence via registry keys and uses deceptive tactics like UAC prompts mimicking legitimate processes. Defenses include behavior-based sandbox detection, employee training, and traffic monitoring. IoCs include suspicious domains, IPs, and file hashes.
Read full article: Gbhackers
Threat Actors Exploit Smart Contracts to Drain Over $900K from Crypto Wallets
Threat actors exploited malicious smart contracts disguised as automated trading bots to steal over $900,000 from crypto wallets. These scams used obfuscated Solidity code deployed via platforms like Remix, promoted through AI-generated YouTube tutorials from aged accounts. Attackers manipulated comment sections to feign legitimacy, luring victims to fund contracts with ETH under promises of MEV bot profits. Once funded, hidden functions routed assets to attacker-controlled addresses, aided by advanced obfuscation techniques like XOR operations to mask EOAs. Campaigns leveraged social engineering and technical deception, emphasizing risks of unverified code. Users are urged to audit contracts and avoid rushed deployments promoted via unvetted channels.
Read full article: Gbhackers
New Active Directory Attack Method Bypasses Authentication to Steal Data
A novel attack method targeting hybrid Active Directory (AD) and Entra ID environments was disclosed, exploiting synchronization vulnerabilities to bypass authentication. By compromising Entra Connect servers, attackers extract certificates and private keys to forge valid tokens, impersonate users (including privileged accounts), and evade MFA or conditional access policies. The technique enables data exfiltration via Exchange hybrid configurations using unsigned Service-to-Service tokens, which leave no logs. Attackers can also manipulate Graph API policies to inject backdoor credentials or disable security controls. While Microsoft has patched some vulnerabilities, organizations remain at risk until hybrid services are fully segregated. Mitigations include auditing sync servers, enforcing hardware-backed keys, and monitoring Graph API activity.
Read full article: Gbhackers
SocGholish Uses Parrot and Keitaro TDS to Spread Malware via Fake Updates
SocGholish, operated by TA569, functions as a Malware-as-a-Service (MaaS) provider and Initial Access Broker, distributing malware via fake browser updates through compromised websites. Using Traffic Distribution Systems (Parrot TDS and Keitaro TDS), the group profiles victims via IP, device, and browser data to deliver targeted payloads. The attack chain starts with malicious JavaScript injections redirecting users to fake update pages, leading to downloads of disguised Windows agents. These agents communicate with command-and control servers using obfuscated paths and domain rotation. SocGholish collaborates with ransomware groups like Evil Corp and has potential ties to Russian state-sponsored actors. Mitigation requires blocking associated infrastructure and proactive threat intelligence..
Read full article: Gbhackers
Threat Actors Weaponizing RMM Tools to Gain System Control and Exfiltrate Data
Threat actors are increasingly exploiting legitimate Remote Monitoring and Management (RMM) tools like Atera and Splashtop Streamer to gain persistent system control, deploy ransomware, and exfiltrate data. A recent campaign used phishing emails impersonating OneDrive notifications to trick users into downloading malicious .msi files disguised as .docx documents, hosted on abused platforms like Discord’s CDN. Attackers deployed dual RMM agents to ensure redundancy, combining visible installations with silent backdoors for persistence. The attack chain leverages social engineering (MITRE T1566) and remote access software (T1219) to bypass traditional defenses. Detection requires behavioral analytics to identify anomalies like file extension tampering or unexpected RMM installations. Mitigation strategies include enforcing MFA, URL filtering, EDR monitoring, and user education on verifying file sources.
Read full article: Gbhackers
North Korean Hackers Exploit NPM Packages to Steal Cryptocurrency and Sensitive Data
North Korean state-sponsored hackers deployed twelve malicious NPM packages, including typosquatted ones like cloud-binary, to steal cryptocurrency and sensitive data. Posing as recruiters, they lured developers into fake job interviews, tricking them into installing malware via coding tasks. The payloads, linked to the Beavertail family, used AES-256 encryption and cross-platform capabilities to exfiltrate crypto wallet data, browser credentials, and system files. Attackers reused infrastructure and encryption keys, connecting campaigns to prior operations. Malware variants fetched secondary payloads, executed scripts, and established remote shells via C2 servers. Veracode and NPM removed the packages, highlighting risks in open-source ecosystems and supply-chain vulnerabilities.
Read full article: Gbhackers
LegalPwn Attack Tricks AI Tools Like ChatGPT and Gemini into Running Malicious Code
A new “LegalPwn” attack exploits AI systems’ trust in legal language, embedding malicious code within disclaimers, terms of service, or copyright notices to bypass security protocols. Researchers at Pangea demonstrated that leading AI models (ChatGPT, Gemini, Grok, LLaMA, Phi-3) executed harmful code when manipulated legal text instructed them to misclassify or run dangerous payloads. Live tests showed Gemini-cli recommending execution of disguised reverse-shell code, while GitHub Copilot mislabeled malicious networking scripts as benign. Anthropic’s Claude and Meta’s LLaMA Guard resisted attacks due to robust security-focused system prompts. The attack highlights vulnerabilities in AI’s automatic processing of legal documents without scrutiny. Experts urge stronger guardrails, input validation, and detection mechanisms to counter this evolving threat.
Read full article: Gbhackers
Vulnerability Spotlight: Critical Exposures Unveiled
Critical vulnerabilities across diverse systems—including video management, AI tools, secrets management, and IoT devices—expose organizations to remote code execution, authentication bypass, and data theft. Exploits targeting Trend Micro, SonicWall, and DLink devices highlight active ransomware and botnet risks, while systemic flaws in Dell hardware and AWS ECS undermine trusted security models. Vendors released patches, but delayed updates and exposed systems persist, requiring immediate prioritization of mitigations, network segmentation, and input validation. Zero-days in Adobe, HashiCorp, and Nvidia tools emphasize the urgency of auditing configurations and restricting access. These exposures collectively underscore escalating cyber-physical threats to critical infrastructure and collaborative environments.
Axis Security Camera Flaws Enable Remote Takeover
Researchers identified four critical vulnerabilities in Axis Communications’ video management systems (Axis Device Manager and Axis Camera Station) affecting over 6,500 exposed servers globally. These flaws (CVE-2024-3159 to CVE-2024-3161) allow unauthenticated attackers to execute remote code, bypass authentication, manipulate files, or crash systems via the Axis. Remoting protocol. Exploitation could enable full control of surveillance networks, compromising live feeds, erasing data, or pivoting to internal systems. Axis patched the issues in ADM 5.32+ and ACS 5.58+/6.9.0+, urging immediate upgrades and network segmentation. Critical infrastructure using these systems faces heightened cyber-physical risks, though no active exploits are reported yet. Security teams should prioritize patching and monitor port 55752 for suspicious activity.
Read full article: Bankinfosec
HashiCorp Vault 0-Day Flaws Enable Remote Code Execution Attacks
Cyata researchers identified nine critical zero-day vulnerabilities in HashiCorp Vault, a popular secrets management tool, allowing attackers to bypass authentication, escalate privileges, and execute remote code (RCE). The flaws, now patched, stemmed from logic errors in authentication backends, MFA enforcement, and policy handling, affecting both open-source and enterprise editions. Exploitable via methods like username enumeration, brute-force bypass, and MFA evasion, vulnerabilities such as CVE-2025-6000 enabled RCE by abusing audit logging to deploy malicious plugins. Systemic trust model weaknesses, present for up to nine years, risk infrastructure-wide compromise, including ransomware or stealth persistence. Organizations are urged to update Vault, audit configurations, and monitor for suspicious activity.
Read full article: Gbhackers
Adobe AEM Forms 0-Day Vulnerability Allows Attackers to Run Arbitrary Code
Adobe addressed two critical 0-day vulnerability (CVE-2025-54253 and CVE-2025-54254) in AEM Forms on JEE, enabling arbitrary code execution (CVSS 10.0) and file system access (CVSS 8.6). The flaws affect versions 6.5.23.0 and earlier, allowing unauthenticated attackers to exploit network-based attacks. Public proof-of-concept exploits exist, though no active exploitation is confirmed. Adobe released patch 6.5.0-0108, urging immediate Priority 1 updates. Organizations must prioritize patching to mitigate risks of data exposure or system compromise via these vulnerabilities.
Read full article: Gbhackers
Trend Micro Apex One Hit by Actively Exploited RCE Vulnerability
Trend Micro has warned of two critical remote code execution vulnerabilities (CVE-2025-54948 and CVE-2025-54987) in its Apex One on-premises management console, actively exploited in attacks. These command injection flaws, rated CVSS 9.4, allow pre-authenticated attackers to execute arbitrary commands on Windows-based systems running Apex One 2019 Management Server Version 14039 or earlier. Trend Micro released an emergency mitigation tool (FixTool_Aug2025) that disables the Remote Install Agent function temporarily, with a full patch expected mid-August 2025. Cloud-based services were automatically protected, but on-premise users must apply the fix manually. Organizations with exposed management consoles are urged to restrict access and apply mitigations immediately.
Read full article: Gbhackers
Millions of Users Have Fallen Victim to Malicious Browser Extensions Because of a Critical Flaw, But Things are Changing — Here’s What You Need to KnoMCP Protocol Bug Let Attackers Execute Code in Cursor
A critical vulnerability in Cursor’s AI-powered coding environment allowed attackers to execute malicious code via the Model Context Protocol (MCP). Check Point researchers found that once a user approved an MCP configuration file, subsequent malicious modifications to it would execute without revalidation, enabling silent remote code execution. Attackers could exploit this by replacing a trusted configuration with harmful commands, compromising systems when projects were reopened. Cursor patched the flaw (dubbed MCPoison) in version 1.3, introducing manual approval for configuration changes. The issue highlights risk in AI-assisted development tools, where trust models may inadequately handle dynamic, collaborative workflows. Researchers warn such vulnerabilities could enable persistent compromise in shared environments.
Read full article: Bankinfosec
Five-Year-Old D-Link Bugs Under Active Exploitation
U.S. authorities warn that hackers are actively exploiting three D-Link vulnerabilities (CVE-2020-25078, CVE-2020-25079, CVE-2022-40799) in obsolete IP cameras and network video recorders, added to CISA’s exploited list. These flaws, allowing password theft, command injection, and network access, are linked to HiatusRAT campaigns targeting IoT devices for botnets. Attackers, suspected to align with Chinese interests, previously probed U.S. military systems and Taiwanese entities. Despite patches, thousands of vulnerable devices remain exposed online. CISA urges users to apply updates or decommission affected hardware to prevent exploitation.
Read full article: Bankinfosec
SonicWall Probes Potential Zero-Day After Ransomware Hits
SonicWall is investigating a potential zero-day vulnerability in its Gen 7 firewalls after Akira ransomware attacks exploited SSL VPNs, bypassing multifactor authentication (MFA). Researchers observed attacks targeting devices with updated firmware, suggesting novel exploit. SonicWall urged customers to disable SSL VPN services, restrict trusted IPs, and enforce security features. The incidents follow recent breaches involving SonicWall’s SMA 100 series appliances, where attackers deployed rootkits using stolen credentials. Akira ransomware operators leveraged the vulnerability to gain network access, harvest credentials, and deploy ransomware. SonicWall advises firmware updates and system rebuilds for compromised devices. The attacks highlight evolving ransomware tactics targeting edge devices.
Read full article: Bankinfosec
Amazon ECS Internal Protocol Exploited to Steal AWS Credentials from Other Tasks
A critical vulnerability in Amazon Elastic Container Service (ECS), dubbed “ECScape,” allows malicious containers to steal AWS credentials from other tasks on the same EC2 instance. Exploiting an undocumented protocol, attackers impersonate the ECS agent via forged WebSocket connections, harvesting privileged credentials (including task and execution roles) without container breakout. The attack leverages the Instance Metadata Service (IMDS) and exposes sensitive resources like AWS Secrets Manager, undermining isolation in multi-tenant environments. Detection is challenging as stolen credentials appear legitimate in logs. AWS recommends isolating high-privilege tasks, using Fargate for micro-VM isolation, enforcing IMDSv2, and applying least-privilege policies. The flaw highlights risk in shared container environments and the need for robust credential management.
Read full article: Gbhackers
Millions of Dell PCs at Risk from Broadcom Vulnerability Enabling Remote Hijack
Cybersecurity researchers at Cisco Talos identified five critical vulnerabilities (dubbed “ReVault”) in Dell’s ControlVault3 security hardware, impacting over 100 business-focused Dell Latitude and Precision laptop models. These flaws allow attackers to remotely hijack systems, implant persistent malware surviving OS reinstallation, and extract cryptographic keys via compromised APIs. Physical attackers could bypass login screens and manipulate fingerprint authentication using custom USB connectors. The vulnerabilities exploit firmware and Windows API flaws, turning trusted security hardware into an attack vector. Dell issued patches (DSA-2025-053) to address the risks, urging organizations to update immediately and monitor for suspicious ControlVault activity.
Read full article: Gbhackers
MediaTek Chip Vulnerabilities Allow Attackers to Gain Elevated Access
MediaTek disclosed three critical vulnerabilities (CVE-2025-20696, CVE-2025-20697, CVE-2025-20698) affecting multiple chipsets in smartphones, tablets, and connected devices. The high-severity CVE-2025-20696 in the Download Agent allows local privilege escalation via out-of-bounds write, requiring physical access and user interaction. The two medium-severity flaws in the Power HAL enable privilege escalation without user interaction if attackers already have system access. All vulnerabilities stem from missing bounds checks (CWE-787). Patches were provided to OEMs two months prior to the August 2025 bulletin. MediaTek confirmed no active exploitation but highlighted risks to device security ecosystems.
Read full article: Gbhackers
Critical Flaw in ADOdb SQLite3 Driver Allows Arbitrary SQL Execution
A critical SQL injection vulnerability (CVE-2025-54119) was discovered in the ADOdb PHP library’s SQLite3 driver, affecting versions up to 5.22.9. The flaw allows attackers to execute arbitrary SQL via crafted table names in the metaColumns(), metaForeignKeys(), and metaIndexes() methods due to improper input sanitization. Exploitation could enable data theft, database manipulation, or administrative actions, particularly impacting applications using user input for dynamic metadata queries. ADOdb patched the issue in version 5.22.10; users must upgrade immediately or validate inputs to affected methods. Researcher Marco Nappi responsibly disclosed vulnerability, emphasizing risks in widely used open-source libraries. The flaw highlights the need for rigorous security audits in database abstraction layers.
Read full article: Gbhackers
Security flaws in key Nvidia enterprise tool could have let hackers run malware on Windows and Linux systems
Security researchers at Wiz identified three critical vulnerabilities (CVE-2025-23319, CVE-2025-23320, CVE-2025-23334) in Nvidia’s Triton Inference Server, an open-source tool for deploying AI models. When chained, these flaws allow remote attackers to execute arbitrary code, potentially compromising sensitive AI models, data, and network systems. The vulnerabilities, scoring up to 8.1/10 in severity, could enable theft, data exposure, or manipulation of AI responses. Nvidia patched the issues in version 25.07, urging immediate updates. While no active exploits are reported, unpatched systems remain at risk as attackers often target delayed updates. Triton’s widespread use across Windows and Linux systems heightens the urgency for organizations to mitigate these risks.
Read full article: Techradar
In-Depth Expert CTI Analysis
This week’s threat landscape underscores escalating state-sponsored and cybercriminal activities targeting critical infrastructure, healthcare, and digital platforms. International law enforcement disrupted BlackSuit ransomware operations, while Russian and North Korean actors exploited geopolitical tensions through Citrix vulnerabilities, AI-enhanced phishing, and hybrid ransomware-espionage campaigns. High-impact vulnerabilities in HashiCorp Vault, Adobe, and IoT devices exposed systemic risks, enabling credential theft and RCE. AI’s dual role emerged as both an attack enabler (generative phishing, code exploitation) and a vulnerability (Triton Server flaws). Persistent healthcare breaches and cryptocurrency laundering schemes highlight sector-specific targeting, demanding enhanced cross-border collaboration, proactive patching, and Zero Trust frameworks to mitigate evolving threats.
Proactive Defense and Strategic Foresight
Proactive defense demands robust international collaboration and preemptive threat hunting, as evidenced by the BlackSuit ransomware takedown and Samourai Wallet prosecutions, which disrupted ecosystems enabling financial crimes. Strategic foresight must prioritize hardening AI infrastructure against adversarial exploitation, exemplified by vulnerabilities in Triton Inference Server and LegalPwn attacks subverting AI trust models. The healthcare sector’s recurring breaches underscore systemic underinvestment in identity governance and rapid recovery protocols. Meanwhile, evolving tactics—GenAI phishing, RMM abuse, and hybrid AD/Entra ID exploits—require adaptive controls like Zero Trust and behavioral analytics. Organizations must shift from reactive patching to continuous threat modeling, integrating threat intelligence on state-aligned groups (e.g., ScarCruft, Lazarus) and criminal innovation cycles. Only through anticipatory investments in resilience and cross-sector transparency can critical infrastructure withstand the convergence of geopolitical and cybercriminal threats.
Evolving Ransomware and Malware Tactics
Ransomware and malware tactics continue evolving with alarming sophistication, leveraging AI-driven automation, double extortion, and hybrid financial-espionage In-Depth Expert CTI Analysis VerSprite Weekly Threat Intelligence Newsletter 19 objectives. Recent operations highlight state-sponsored actors like ScarCruft adopting Rust-based malware and cloud service abuse, while ransomware groups exploit zero-day vulnerabilities in critical infrastructure (e.g., SonicWall firewalls) and pivot to data-centric attacks on healthcare. Social engineering remains pivotal, with vishing and smishing campaigns bypassing MFA via compromised CRM platforms. Cryptocurrency mixers and smart contract exploits enable laundering at scale, while AI-generated phishing sites and legal document exploits challenge detection. The convergence of geopolitical agendas and cybercrime, alongside weaponized AI tools, demands proactive defense strategies, rigorous patch management, and cross-sector collaboration to mitigate escalating risks.
State-Sponsored and Organized Cybercrime Convergence
The convergence of state-sponsored and organized cybercrime is accelerating, driven by shared infrastructure, tactics, and financial incentives. Operations like North Korea’s ScarCruft adopting ransomware for dual espionage-extortion goals and Lazarus Group’s AI-enhanced PyLangGhost RAT illustrate state actors weaponizing cybercrime methodologies. Similarly, Russian-aligned groups targeting Dutch infrastructure and Chinese card-skimming campaigns exploit geopolitical chaos for profit, blurring lines between national agendas and criminal enterprise. Ransomware alliances (e.g., BlackSuit/ Royal) and malware-as-a-service platforms enable scalable attacks on critical sectors, while AI-generated phishing and smart contract scams democratize advanced threats. This symbiosis demands global intelligence-sharing, hardened authentication frameworks, and proactive disruption of hybrid threat ecosystems.
Operational and Tactical Implications
- Law enforcement takedowns (e.g., BlackSuit) necessitate ransomware groups to adopt decentralized infrastructure and obfuscated financial channels, complicating future disruptions.
- Exploitation of unpatched vulnerabilities (Citrix, Axis, D-Link) and social engineering (vishing, fake updates) demand prioritized patch management, MFA enforcement, and user training.
- Ransomware’s pivot to hybrid extortion (data theft, AI-enhanced phishing) requires organizations to strengthen data backups, network segmentation, and AI-generated content detection.
- State-sponsored actors (ScarCruft, Lazarus) blending espionage with financial motives highlight risks to critical infrastructure, necessitating behavior-based threat hunting and cloud-service monitoring.
- Supply chain attacks (NPM, Triton) and AI tool vulnerabilities (LegalPwn, Cursor) underscore the need for rigorous code audits, least-privilege access, and adversarial testing of AI workflows.
Forward-Looking Recommendations
- Enhance international collaboration frameworks to disrupt ransomware ecosystems and prosecute cross-border cybercrime operations.
- Adopt AI-specific security protocols, including input validation and adversarial testing, to counter AI-driven phishing and code exploitation.
- Prioritize zero-day vulnerability management through proactive patching, network segmentation, and threat hunting in critical infrastructure sectors.
- Implement stringent third-party risk assessments and enforce MFA for cloud platforms to mitigate supply chain and social engineering attacks.
- Expand regulatory mandates for healthcare and education sectors to enforce encryption, rapid incident response, and ransomware-resistant backups.
- Develop cross-industry standards for cryptocurrency transaction monitoring to combat laundering via mixers and smart contract exploits.