• Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact
Menu

Exploring Information Security

Securing the Future - A Journey into Cybersecurity Exploration
  • Explore
  • Blog
  • Podcast
  • Community
  • About
  • Services
  • Contact

November 2025 - ExploreSec Cybersecurity Threat Intelligence Newsletter

November 19, 2025

This is a newsletter I create and share with my internal security team. Feel free to grab and do the same.

Impact Solutions: The Point-and-Click Toolkit Democratizing Malware Delivery 

A newly observed phishing toolkit—Impact Solutions—provides a user-friendly, point-and-click interface that lets low-skill threat actors generate weaponized attachments (e.g., .lnk shortcuts, HTML smuggling files, malicious SVGs) and staged payloads. The kit emphasizes social-engineering effectiveness (icon spoofing, decoy documents, Cloudflare-style verification prompts) and includes UAC bypasses, sandbox checks, and techniques intended to evade SmartScreen and many antivirus solutions. 

Key Insights 

  • Low skill, high impact: The toolkit produces ready-to-send malicious artifacts (shortcut builders, HTML smuggling templates, SVG payloads) that remove the need for malware development expertise. 

  • Social-engineering first: Files are crafted to look legitimate (PDF icons, real-looking invoices, faux verification pages) and often present decoy documents while executing payloads in the background. 

  • Evasion features: Built-in UAC bypass attempts, anti-VM/sandbox checks, AppData execution, and claims to bypass SmartScreen and common AV detection. 

  • ClickFix-style and staged attacks: Some templates instruct users to paste Win+R commands or open local file paths, enabling ClickFix-style execution flows and multi-stage downloads. 

  • Defender opportunity: Behavioral and contextual email analysis (rather than signature matching) is more effective at detecting these campaigns, since the artifacts intentionally evade static detection. 

Further Reading: Abnormal AI – Impact Solutions: The Point-and-Click Toolkit Democratizing Malware Delivery 

 

 

Massive Surge in Scans Targeting Palo Alto Networks Login Portals 

BleepingComputer has observed a significant spike in reconnaissance activity against Palo Alto Networks devices. Thousands of hosts globally are probing PAN-OS management or login endpoints (ports 443, 7239, 7777) in just a short timeframe. This wave of scanning appears preliminary—likely mapping vulnerable or misconfigured devices for potential follow-on attacks, such as exploitation, credential stuffing, or proxy pivoting. 

Key Insights 

  • Scans primarily target authentication portals for PAN-OS and administrative web UIs (e.g. ports 443, 7239, 7777). 

  • Most scanning traffic originates from distributed IP pools, indicating broad reconnaissance campaigns rather than focused attacks. 

  • Such scanning often precedes attacks like SSRF, zero-day exploits, credential brokering, or lateral pivots through exposed devices. 

  • Organizations should monitor unusual traffic to management endpoints and verify that PAN device interfaces are properly firewalled and accessible only to trusted networks. 

Further Reading: Bleeping Computer – Massive Surge in Scans Targeting Palo Alto Networks Login Portals 

 

 

ShinyHunters (UNC6040) Launches Corporate Extortion Blitz 

The ShinyHunters group, operating under aliases like Scattered LAPSUS$ Hunters and associated with threat cluster UNC6040, has initiated a broad extortion campaign threatening dozens of Fortune 500 companies. The group claims to have stolen sensitive Salesforce data through voice-phishing, along with terabytes of consulting/project files from Red Hat and token access data from Salesloft. They are demanding ransom under threat of public data release. 

Key Insights 

  • Theft method: voice phishing was used to trick organizations into granting access to Salesforce; stolen data includes authentication tokens and customer records. 

  • Victim profile: major companies such as Toyota, FedEx, Disney/Hulu, UPS, Red Hat, and others are alleged victims. 

  • Extortion tactics: the group has published a “victim shaming” blog demanding ransom, threatening to leak data otherwise; claims to have compromised large volumes of configuration, consulting, and secret infrastructure elements. 

  • Malware and targeting: They use malicious message attachments disguised as screensavers (.scr/.news-style), distributed via phishing; payloads include backdoors (e.g. ASYNCRAT) with capabilities like file exfiltration, keylogging, screenshot capture, etc. 

  • Legal and law-enforcement response: Some members are already indicted or convicted; companies such as Salesforce publicly refuse to negotiate with ransom demands, emphasizing forensic analysis and regulatory contact. 

 

Further Reading: Krebs on Security – ShinyHunters Wage Broad Corporate Extortion Spree 

 

 

ClickFix Generator: New Automated Toolkit Enables Mass Social Engineering Attacks 

Unit 42 has discovered a first-of-its-kind ClickFix Generator toolkit that enables threat actors to automate the creation of ClickFix-style phishing campaigns at scale. The generator crafts prompt texts, social engineering flows, and malicious payloads, allowing adversaries to produce campaign modules in a matter of minutes instead of hours. Early usage traces suggest the tool is already active in the wild, deployed in multiple targeted phishing campaigns. 

Key Insights 

  • Quick campaign assembly: With ClickFix Generator, attackers can build full campaigns (lures, messaging flow, payload delivery) rapidly. 

  • Template-based operations: The toolkit comes with prebuilt templates for lures (e.g., “Update Required,” “Verification Needed”) and payload strategies. 

  • Operational reuse: Once built, modules can be re-used or tweaked across multiple campaigns to reduce development overhead. 

  • Detection challenges: Automated tooling increases the volume and diversity of campaigns, making static signatures less effective; defenders must rely more on flow behavior analytics and anomaly detection. 

Further Reading: Unit 42 – ClickFix Generator: First-of-Its-Kind Automated Toolkit Observed in the Wild 

 

 

Employees Sharing Company Secrets with ChatGPT: Rising AI Data-Leak Risk 

New research shows a worrying trend: about 77% of enterprise employees regularly paste sensitive corporate data into generative AI tools like ChatGPT. Even more concerning, around 82% of those interactions come from unmanaged personal accounts, putting oversight, compliance, and data protection at risk. The study also flagged that 40% of files uploaded to these tools contain sensitive info like payment data, and 22% of pasted content includes regulated or proprietary information. 

Key Insights 

  • Using personal accounts to access AI tools creates blind spots for corporate IT and security teams. 

  • Routine copying and pasting of internal data into AI tools bypasses traditional data loss prevention tools. 

  • Sensitive data exposure isn’t limited to large uploads—small text snippets can still cause regulatory or competitive harm. 

  • Employee training and strict AI usage policies are essential to protect company data. 

Further Reading: Cyber Security News – “Employees Share Company Secrets on ChatGPT” 

 

 

Upcoming Changes to Internet Explorer Mode in Microsoft Edge 

Microsoft is updating how Internet Explorer Mode (IE Mode) works in Edge, with implications for compatibility, policy enforcement, and legacy application support. These changes impact how organizations manage legacy web apps relying on the IE11 engine via Edge’s integrated mode. 

Key Insights 

  • IE Mode enables legacy IE11 rendering (Trident/MSHTML engine) within Edge for compatibility with older intranet sites and applications. 

  • Only sites explicitly configured (via Enterprise Mode Site List or Group Policy) will load in IE Mode; others default to modern rendering. 

  • Upcoming updates may restrict or alter certain IE Mode behaviors—affecting ActiveX, legacy scripting, user agent emulation, or navigation fallback logic. 

  • Organizations should audit and catalog legacy Web apps now to ensure a smooth transition before changes take effect. 

Further Reading: Microsoft – Changes to Internet Explorer Mode in Microsoft Edge 

 

 

100,000+ IP Botnet Launches Coordinated RDP Attack Wave 

GreyNoise observed a coordinated botnet operation (started Oct 8, 2025) involving over 100,000 unique IPs from 100+ countries targeting U.S. Remote Desktop Protocol (RDP) infrastructure using RD Web Access timing attacks and RDP web-client login enumeration. 

Key Insights 

  • Mass scale & coordination: The activity involves over 100,000 IPs that share a similar TCP fingerprint, indicating centralized control. 

  • Primary vectors: Operators leveraged RD Web Access timing attacks and RDP Web Client login enumeration to probe and enumerate targets. 

  • Geographic distribution: Source IPs originated from 100+ countries, but attacks were concentrated on U.S. RDP infrastructure. 

  • High-confidence botnet assessment: GreyNoise attributes this as a single multi-country botnet campaign rather than unrelated scanners. 

Further Reading: GreyNoise – 100,000+ IP Botnet Launches Coordinated RDP Attack Wave 

 

 

7-Zip Vulnerabilities: Code Execution, MoTW Bypass & RAR5 Crashes 

Several significant vulnerabilities in 7-Zip (versions prior to 24.07 / 24.09 / 25.00 depending on the issue) have been discovered and/or exploited. These flaws allow attackers to bypass Windows’ “Mark-of-the-Web” protections, execute arbitrary code via crafted archives, or crash systems using malicious RAR5 files. 

Key Insights 

  • A critical vulnerability (CVE-2025-0411) lets nested archives bypass MoTW protections, enabling malware delivery without triggering usual warnings. 

  • Another high-severity bug in the Zstandard decompression module enables remote code execution in affected versions before 24.07. 

  • RAR5 decoder vulnerability (CVE-2025-53816) allows denial-of-service conditions via malicious RAR5 archives in versions before 25.00. 

  • Version 25.00 (and 25.01 for some symbolic link flaws) includes fixes; users must update manually since 7-Zip lacks automatic update features. 

Further Reading: CyberNews – 7-Zip Vulnerabilities 

 

 

Espionage Exposed: North Korean Remote Worker Network 

KELA’s investigation has uncovered thousands of North Korean operatives using fabricated identities and AI-assisted tools to land remote jobs in design, engineering, IT, and architecture. Their employment is a dual-purpose strategy: generate revenue for the regime and gain access to sensitive data, proprietary designs, or system access from within organizations. 

Key Insights 

  • Operatives use AI-generated headshots, edited identification, and falsified backgrounds to pass hiring checks. 

  • Target roles span technical and creative fields—beyond just software development. 

  • Evidence links some accounts to infostealer logs and developer-level system access. 

  • Detection patterns include reused passwords, temporary email domains, and unusually polished portfolios for new accounts. 

Further Reading: KELA – Espionage Exposed: Inside a North Korean Remote Worker Network 

 

 

Healthcare Ransomware Roundup: Q1–Q3 2025 

According to Comparitech’s 2025 report, ransomware and data breaches in healthcare have continued their alarming trend. The first three quarters saw more than 350 publicly disclosed attacks, resulting in over 140 million records impacted and ransom demands totaling over $350 million. The report highlights the prevalence of vulnerabilities, misconfigurations, and operational dependencies that make healthcare systems a persistent target. 

Key Insights 

  • Healthcare organizations face especially high ransomware pressure, given the value and sensitivity of patient data. 

  • Large-scale attacks disproportionately impact smaller entities, which lack mature cyber resilience strategies. 

  • Ransom demand sizes continue to escalate—multiple cases exceeded $10 million. 

  • Attack vectors remain consistent: phishing, unpatched systems, remote desktop exploits, and misconfigured cloud services. 

Further Reading: Comparitech – Healthcare Ransomware Roundup Q1–Q3 2025 

 

 

Tracking ClickFix Infrastructure (AITMFeed / Lab539) 

Security analysts have begun mapping core infrastructure used to support ClickFix campaigns, consolidating domain, redirect, and payload delivery patterns. The reconstruction aids defenders in identifying malicious modules tied to active campaigns. 

Key Insights 

  • Infrastructure layering: Redirect chains often pass through multiple affiliate or proxy domains before landing on ClickFix lures. 

  • Template reuse: Several ClickFix landing pages share structural and domain-naming patterns—indicating reuse by operators or shared kits. 

  • Payload hosting nodes: Final payload domains are typically short-lived or dynamically rotated, complicating static blocklists. 

  • Early indicators: Identified domains and redirect paths can serve as hunting indicators to uncover emerging ClickFix campaigns before payload execution. 

Further Reading: AITMFeed – Tracking ClickFix Infrastructure 

 

 

Record DDoS Botnet Targets U.S. ISPs (Krebs on Security) 

The Aisuru botnet, powered by hundreds of thousands of infected IoT devices, launched a record-breaking DDoS attack peaking at nearly 30 Tbps—impacting major U.S. ISPs such as AT&T, Comcast, and Verizon. Most compromised devices included routers and cameras running outdated firmware or default credentials. 

Key Insights 

  • IoT exploitation: Aisuru spreads by scanning for unsecured consumer devices with weak or factory passwords. 

  • Massive impact: Outbound attack traffic from U.S. networks degraded ISP and customer performance. 

  • Mirai lineage: Built from the leaked Mirai code, Aisuru now dominates global IoT botnet activity. 

  • Shared responsibility: ISPs and users must ensure devices are updated and secured to prevent botnet recruitment. 

Further Reading: Krebs on Security – DDoS Botnet Aisuru Blankets US ISPs in Record DDoS 

 

 

Stealthy Phishing Kit Targets Microsoft 365 Users (Barracuda) 

Barracuda researchers identified a new phishing kit, dubbed Whisper 2FA, designed to steal Microsoft 365 credentials and bypass multi-factor authentication. The kit operates in real time, capturing both login and MFA tokens through background scripts that validate credentials with attacker-controlled servers. 

Key Insights 

  • Real-time MFA capture: Uses live AJAX loops to exfiltrate credentials and prompt victims until valid MFA tokens are obtained. 

  • Anti-analysis techniques: Employs multiple layers of encoding, disables developer tools, and crashes browser inspection to avoid detection. 

  • Rapid adoption: Nearly one million attack attempts observed in a month, placing Whisper 2FA among the top three phishing kits globally. 

  • Kit evolution: Newer versions add stronger obfuscation and broader MFA method support, signaling active development and threat scalability. 

Further Reading: Barracuda – Threat Spotlight: Stealthy Phishing Kit Targets Microsoft 365 

 

 

PhantomVAI Loader Delivers Infostealers in Targeted Attacks 

Researchers at Palo Alto Networks’ Unit 42 have identified a new malware loader named PhantomVAI, which is being used to deliver well-known information stealers such as LummaC2 and Rhadamanthys. The loader uses deceptive Microsoft OneDrive-themed lures and employs advanced evasion tactics to bypass traditional security tools. 

Key Insights 

  • PhantomVAI leverages phishing campaigns to distribute malicious payloads disguised as OneDrive documents. 

  • The loader uses multilayered obfuscation and anti-analysis techniques to avoid detection. 

  • Once executed, it deploys info-stealing malware that exfiltrates sensitive data, including credentials and browser information. 

  • Its modular design allows threat actors to easily update and customize the loader for different payloads or delivery methods. 

Further Reading: Unit42 – PhantomVAI Loader Delivers Infostealers 

 

 

Non-Web Protocols: The Hidden Attack Surface (Zscaler ThreatLabz) 

Zscaler’s ThreatLabz team reports that attackers are increasingly leveraging non-web protocols—such as DNS, RDP, and SMB—to evade detection and exploit enterprise environments. The findings show that a significant share of modern intrusions now occur outside traditional web traffic channels. 

Key Insights 

  • DNS abuse dominates: DNS-based tunneling, dynamic updates, and domain generation algorithms account for nearly 84% of non-web protocol attacks. 

  • Brute-force activity surging: RDP represents over 90% of brute-force incidents, while SMB remains a key vector for lateral movement and ransomware propagation. 

  • Retail and energy sectors hit hardest: Retail accounted for 62% of observed attacks, followed by energy and manufacturing industries where legacy systems persist. 

  • Legacy protocols exploited: Long-trusted protocols like SMBv1 and RDP continue to be weaponized for access, persistence, and data exfiltration. 

Further Reading: Zscaler – Under the Radar: How Non-Web Protocols Are Redefining the Attack Surface 

 

 

Scattered LAPSUS$ Hunters Shift Tactics Toward EaaS & Insider Recruitment (Unit 42 / Palo Alto Networks) 

Unit 42 reports that the cybercriminal group Scattered LAPSUS$ Hunters—known for major extortion operations—is evolving its approach. The group appears to be transitioning toward an Extortion-as-a-Service (EaaS) model while recruiting insiders and experimenting with new ransomware capabilities. 

Key Insights 

  • Extortion-as-a-Service model: The group is offering affiliates the ability to run extortion campaigns without relying on traditional ransomware encryption. 

  • Insider recruitment drive: Members are openly seeking employees within telecom, gaming, SaaS, and hosting companies across several Western countries. 

  • Data leak activity: Following a public deadline, the group released data allegedly tied to multiple aviation, energy, and retail organizations. 

  • New ransomware development: References to a tool dubbed “SHINYSP1D3R” suggest potential expansion into full ransomware operations. 

  • Broader targeting: Beyond major tech platforms, the group’s focus now spans hospitality, retail, and loyalty program data. 

Further Reading: Unit 42 – Scattered LAPSUS$ Hunters Signal Shift in Tactics 

 

 

Tykit: New Phishing Kit Stealing Hundreds of Microsoft Accounts in Finance (ANY.RUN) 

Researchers at ANY.RUN have identified a new phishing kit framework, dubbed Tykit, that targets Microsoft 365 credentials across financial and corporate sectors. The kit demonstrates organized Phishing-as-a-Service (PhaaS) characteristics, allowing widespread deployment and efficient credential harvesting. 

Key Insights 

  • Broad targeting: Active since May 2025, Tykit campaigns have primarily targeted finance, construction, IT, and professional services organizations. 

  • Layered delivery chain: Attacks begin with an SVG image embedding encoded JavaScript that redirects victims to fake Microsoft 365 login pages. 

  • Credential exfiltration: After submission, stolen data is transmitted through encrypted POST requests to attacker-controlled command-and-control endpoints. 

  • Evasion and MFA bypass: The kit detects analysis tools, restricts developer console access, and supports methods to bypass two-factor authentication. 

  • Commercial reuse: Numerous samples share nearly identical domain patterns and code structures, indicating large-scale kit distribution. 

Further Reading: ANY.RUN – Tykit Technical Analysis 

 

 

Microsoft 365 Copilot — Arbitrary Data Exfiltration via Mermaid Diagrams (Adam Logue) 

Adam Logue demonstrated an indirect prompt-injection technique against Microsoft 365 Copilot where a specially crafted Office document caused Copilot to fetch sensitive tenant data (e.g., recent emails), hex-encode it, and embed that encoded data into a generated Mermaid diagram. The diagram contained a clickable “login” artifact whose link pointed to an attacker server with the hex data in the URL; when activated the data was exfiltrated. Microsoft has since patched the issue by removing interactive/dynamic hyperlink behavior from Mermaid diagrams in Copilot. 

Key Insights 

  • Indirect prompt injection + rendering chain: The attack chained prompt injection (hidden instructions in document sheets) with Copilot’s ability to call enterprise search tools and then render outputs into Mermaid. 

  • Mermaid as an exfil channel: Mermaid diagrams support CSS/hyperlink features that can be abused to place large, encoded payloads (hex strings) into clickable artifacts. 

  • Encoded-data transport: Exfiltration relied on Copilot hex-encoding fetched data and embedding it in a URL — simple to decode from server logs once received. 

  • Click vs zero-click nuance: Adam’s PoC required a click to transmit the data, but related research (e.g., Cursor IDE) shows remote rendering can enable zero-click variants — increasing risk where renderers auto-fetch remote content. 

  • Patch validated: Microsoft removed interactive/dynamic hyperlink behavior in Mermaid renders for Copilot, mitigating the specific vector; defenders should still treat diagram rendering and LLM tool integrations as risky. 

Further Reading: Adam Logue – Microsoft 365 Copilot: Arbitrary Data Exfiltration Via Mermaid Diagrams 

 

 

Beyond Credentials: Weaponizing OAuth Applications for Persistent Cloud Access (Proofpoint) 

Proofpoint researchers show how attackers are increasingly abusing OAuth applications to gain resilient, long-lived access inside compromised cloud environments. After an initial account takeover, adversaries can create or authorize internal OAuth apps with broad API scopes — allowing data access and command-and-control that survives password resets and MFA unless the malicious app is explicitly revoked. 

Key Insights 

  • Persistence beyond credentials: Malicious OAuth apps retain authorized access even after victims change passwords or enable MFA, creating durable backdoors. 

  • Automatable attack flow: Proofpoint developed a proof-of-concept and tooling that demonstrate how attackers can fully automate app creation, permission assignment, and authorization. 

  • Internal app abuse: Attackers leverage the ability to register or authorize internal (second-party) applications with custom scopes to read mailboxes, files, and other sensitive cloud resources. 

  • Long-lived tokens & stealth: Tokens and app permissions can remain valid for extended periods (months to years) and are often overlooked by standard account-centric detections. 

  • Detection gaps: Traditional defenses focused on credentials (password resets, MFA) are insufficient; defenders need app-centric telemetry and regular permission audits. 

Further Reading: Proofpoint – Beyond Credentials: Weaponizing OAuth Applications for Persistent Cloud Access 

 

 

Prompt Injection to RCE in AI Agents (Trail of Bits) 

Trail of Bits demonstrates that argument-injection flaws in agent platforms can bypass “human approval” protections and lead to remote code execution (RCE). By exploiting pre-approved system commands whose arguments aren’t properly sanitized or separated, researchers achieved RCE across multiple popular agent implementations and propose design changes—like sandboxing and strict argument handling—to reduce the risk. 

Key Insights 

  • Approved-command attack surface: Allowlisting commands (e.g., find, git, rg) while failing to validate or safely separate arguments creates a powerful injection vector. 

  • Argument injection practicalities: Attackers can craft arguments that append or alter behavior of pre-approved commands (e.g., via special characters, facet patterns or malformed flags) to escalate to arbitrary execution. 

  • Human-approval bypass: Workflows that auto-execute “safe” commands without robust argument checks let adversaries bypass intended human-in-the-loop controls. 

  • Cross-platform prevalence: Trail of Bits reproduced the class of vulnerability across three different agent platforms, suggesting the issue is a common design antipattern. 

  • Evasion & usability tradeoffs: Naïve blocking of arguments breaks legitimate functionality; secure designs require careful argument modeling or safer alternatives (e.g., dedicated APIs). 

  • Mitigations recommended: Use sandboxed execution, strong argument separation/parsing, avoid facade patterns that accept raw argument strings, and log/monitor command invocations for anomalous parameters. 

Further Reading: Trail of Bits – Prompt injection to RCE in AI agents 

 

 

Global Smishing Campaign Targets Mobile Users (Unit 42 / Palo Alto Networks) 

A large-scale smishing (SMS phishing) campaign has been identified by Unit 42, targeting mobile users across multiple regions. Attackers are exploiting promotional hooks and limited oversight on mobile endpoints to deliver malicious links and credential-harvesting portals. 

Key Insights 

  • Many messages impersonate banks, logistics firms, or retail brands and include URLs leading to credential-stealing sites or malicious apps. 

  • The campaign spans numerous countries and uses localized language and brand cues to increase trust and response rates. 

  • Because mobile devices often lack the endpoint protections found on desktops, the campaign leverages the low visibility of mobile threats to evade detection. 

  • Tactics include use of short-link services, dynamic domains, and rapid rotation of landing pages to defeat static blocklists. 

Further Reading: Unit 42 

 

 

Devman’s RaaS Launch: The Affiliate Who Aims to Become the Boss (Analyst1) 

Research by Analyst1 reveals how a ransomware affiliate known as Devman evolved from working under major cybercrime groups to launching his own Ransomware-as-a-Service (RaaS) platform in late 2025. The report highlights his shift from affiliate to operator, his use of the leaked DragonForce code, infrastructure consolidation, and efforts to recruit new affiliates. 

Key Insights 

  • Affiliate turned service operator: Devman transitioned from a high-performing affiliate to creating his own RaaS offering. 

  • Capital investment signals seriousness: He actively purchased initial access in Western countries and built a dedicated leak site with high ransom demands. 

  • Leveraging leaked code & bugs: His ransomware variant reused DragonForce/Conti code, showing both operational maturity and technical flaws. 

  • Recruitment & platform launch: The RaaS platform went live in late September 2025, featuring affiliate recruitment messaging and new infrastructure. 

  • Branding and self-promotion: Devman’s public persona projects a “gangster-entrepreneur” image, reflecting how ransomware operators blend crime with marketing. 

Further Reading: Analyst1 

 

 

Insider Threats Loom While Ransom Payment Rates Plummet (Coveware) 

Coveware’s latest report reveals that despite a sharp decline in ransom payments in Q3 2025, insider-caused incidents are growing in significance. Although organizations are less frequently paying ransoms, internal misuse, negligence, and compromised credentials by insiders are becoming key contributors to successful breaches. 

Key Insights 

  • Ransom payment decline: Payment rates have fallen substantially, suggesting organizations are shifting to alternative recovery approaches. 

  • Insider risk rise: The proportion of incidents involving insiders—whether malicious, negligent, or compromised—has increased notably. 

  • Less money, more tactics: While the ransom amounts may drop, attackers are still achieving impact through stolen credentials, insider access, or supply-chain leverage. 

  • Mitigation gap: Many organisations focused on external threat vectors but lack rigorous controls for internal access monitoring, exit protocols, and third-party liaison. 

Further Reading: Coveware – Insider Threats Loom While Ransom Payment Rates Plummet 

 

 

Catching Credential Guard Off-Guard (SpecterOps) 

SpecterOps researchers have detailed new techniques that undermine Windows Credential Guard, a key defensive feature meant to isolate and protect user credentials. The findings demonstrate how attackers with elevated privileges can bypass Credential Guard to extract sensitive authentication data, even in systems considered fully protected. 

Key Insights 

  • Bypass through privilege misuse: Attackers can exploit accounts with specific service permissions to sidestep Credential Guard’s memory isolation. 

  • In-memory data extraction: New tools enable credential dumping directly from protected memory regions, exposing NTLM hashes and LSA secrets. 

  • Detection blind spots: Many defenders rely on Credential Guard as a standalone safeguard; this research highlights the need for behavioral detection and anomaly monitoring. 

  • Lateral movement risk: Compromised credentials obtained through these methods allow stealthier privilege escalation and movement within the network. 

Further Reading: SpecterOps 

 

 

LockBit Returns — and It Already Has Victims (Check Point Research) 

The ransomware group LockBit, previously disrupted in early 2024, has re-emerged under a new variant known as LockBit 5.0 (ChuongDong). Check Point Research confirmed new attacks spanning Windows, Linux, and ESXi systems across multiple regions, signaling a full return of one of the most prolific Ransomware-as-a-Service (RaaS) operations. 

Key Insights 

  • Affiliate recruitment resumes: LockBit is again advertising in underground forums, rebuilding its affiliate ecosystem. 

  • Expanded platform targeting: The updated variant includes support for Windows, Linux, and ESXi environments. 

  • Enhanced capabilities: Faster encryption and new evasion methods improve operational efficiency for attackers. 

  • Global victim impact: Confirmed incidents across multiple continents indicate the group’s infrastructure is fully operational again. 

  • RaaS resilience: Despite past takedowns, the LockBit model demonstrates the durability of ransomware service ecosystems. 

 Further Reading: Check Point Research 

 

 

The YouTube Ghost Network (Unmasked – Check Point Research) 

Researchers at Check Point Research uncovered a large-scale malware-distribution operation on YouTube — dubbed the YouTube Ghost Network — which used compromised and fake channels to post over 3,000 videos offering game cheats and cracked software, but in fact delivering infostealers like Rhadamanthys and Lumma Stealer. Those videos amassed hundreds of thousands of views and were deliberately boosted with fake likes and comments to create trust. The network mapped multiple account-roles (video-uploads, community posts, interaction bots) and showed how malware actors are abusing platform trust and engagement tools to run self-infection traps at scale. 

Key Insights 

  • Role-based account structure: The network divided labor across accounts: content uploaders, engagement bots, and link/post sharers — enabling resilience even when channels were banned. 

  • High-engagement deception: Some videos had hundreds of thousands of views and positive comment streams, increasing perceived legitimacy. 

  • Infostealer distribution via “free” software lure: The campaigns baited users with cracked software or game hacks, directing them to archives hiding infostealers. 

  • Massive scale and rapid growth: Over 3,000 malicious videos were identified, with 2025 upload volume tripling from prior years. 

  • Platform-trust exploitation: Attackers leveraged YouTube’s social features to amplify reach and bypass traditional detection systems. 

Further Reading: Check Point Research 

 

 

Microsoft WSUS Remote Code Execution (CVE-2025-59287) Actively Exploited (Unit 42 / Palo Alto Networks) 

A critical vulnerability in the Windows Server Update Services (WSUS) role—tracked as CVE-2025-59287—allows unauthenticated remote code execution (RCE) on Windows servers where WSUS is enabled. Researchers observed active exploitation following Microsoft’s emergency patch, making this a high-priority threat for enterprises. 

Key Insights 

  • Unauthenticated system-level access: Attackers exploiting the vulnerability can execute arbitrary code as SYSTEM on affected WSUS servers. 

  • Wide exposure: Thousands of publicly exposed WSUS instances were detected, broadening the potential attack surface. 

  • Rapid post-patch exploitation: Exploitation began shortly after an out-of-band update and the vulnerability was added to the U.S. known-exploited vulnerabilities catalog. 

  • Reconnaissance & exfiltration patterns: Observed attack chains include WSUS service processes spawning shells that gather domain data and exfiltrate via webhooks. 

  • Preventable risk exposure: WSUS should never be Internet-facing; failing to block default WSUS ports or disable unused roles significantly increases risk. 

Further Reading: Unit 42 

 

 

New Phishing Attack Uses Invisible Characters to Evade Filters (Cybersecurity News) 

Security researchers have observed a campaign that embeds invisible Unicode characters (zero-width and similar) into email subjects and URLs to evade keyword-based filters and URL reputation checks. The technique breaks up recognisable words and link patterns so automated scanners miss them while email clients render the content normally for users — increasing click-through risk and lowering detection rates. 

Key Insights 

  • Invisible-character obfuscation: Attackers insert zero-width spaces, soft hyphens, and other invisible Unicode characters into subject lines and URLs to defeat pattern-matching and reputation checks. 

  • MIME/encoding abuse: Malicious emails use MIME tricks and encoded attachments (SVGs, HTML) to hide payloads and redirect chains from straightforward inspection. 

  • SafeLinks & gateway bypasses: The obfuscation can break or bypass URL-rewriting and safe-link protections, causing scanners to misclassify or truncate suspicious links. 

  • User-facing normalcy: Message lists may display garbled or incomplete subjects while the opened email shows a readable, convincing lure — increasing the chance a recipient will engage. 

  • Hunting signals: Look for unusually high counts of zero-width/unicode characters in subjects/URLs, mismatched subject rendering between list view and message view, and abnormal redirect chains from SVG/HTML attachments. 

Further Reading: Cybersecurity News 

 

 

Exploiting Trust in Collaboration: Microsoft Teams Vulnerabilities Uncovered (Check Point Research) 

Check Point Research found multiple vulnerabilities in Microsoft Teams that let attackers manipulate conversations and notifications to impersonate colleagues, alter message content silently, and forge caller identities. The flaws exploit trust built into collaboration features—such as message identifiers, conversation topics, and call initiation fields—allowing attackers to mislead recipients without obvious signs of tampering. 

Key Insights 

  • Invisible message edits: Attackers can rewrite previously sent messages without triggering the “Edited” label, undermining the integrity of chat history. 

  • Spoofed notifications: Notification fields can be manipulated so alerts appear to originate from trusted executives or colleagues. 

  • Display-name manipulation: Conversation topics in private chats can be changed to alter displayed participant names, misleading recipients about who they’re speaking with. 

  • Forged caller identity: Call initiation fields can be abused to present arbitrary names during audio/video calls, enabling convincing impersonation. 

  • Platform-trust attack surface: Collaboration apps’ built-in trust signals (notifications, display names, edit markers) can be weaponized to bypass user assumptions and social-engineering defenses. 

Further Reading: Check Point Research 

 

 

Phishing Campaign Abuses Cloudflare Services (Cyber Security News) 

A new large-scale phishing campaign has been discovered exploiting the infrastructure of Cloudflare Pages and ZenDesk to host malicious login portals, leveraging trusted cloud platforms to evade detection and harvest credentials. Over 600 malicious *.pages.dev domains were involved, using typosquatting of support portals and live chat operators to further trick victims. Cyber Security News 

Key Insights 

  • Trusted-platform exploitation: Attackers register domains under *.pages.dev (Cloudflare Pages) and use Zendesk hubs to make pages appear legitimate, thereby defeating reputation-based defenses. 

  • Mass-scale credential harvest: More than 600 malicious domains were identified in the campaign, showing rapid registration and deployment of phishing infrastructure. 

  • Live-chat assault vector: In some cases, human operators engaged victims via embedded chat interfaces, requesting phone numbers and convincing them to install remote tools under the guise of “support.” 

  • Technical advance in delivery: The attackers used Google Site Verification and Microsoft Bing Webmaster tokens to validate fake pages and improve its search legitimacy and SSO poisoning potential. 

  • Multi-vector exit stratagem: Beyond credential theft, the campaign steered victims to install legitimate remote-monitoring tools repurposed for malicious access, increasing post-compromise risk. 

Further Reading: Cyber Security News 

In News Tags newsletter, threat intelligence
Comment

August 2025 - ExploreSec Cybersecurity Threat Intelligence Newsletter

August 6, 2025

This is a newsletter I create and share with my internal security team. Feel free to grab and do the same.

LNK Malware Strategies: Surge in Shortcut File Attacks 

Unit 42 has detected a significant uptick in malicious use of Windows shortcut (LNK) files, with infections rising from approximately 21,100 in 2023 to over 68,400 in 2024. Their in-depth analysis of 30,000 samples highlights how attackers exploit the flexibility of LNK files to execute malware via four main techniques: exploit execution, file-on-disk execution, in-argument scripts, and overlay content. 

Key Insights: 

  • Exploit Delivery: Malicious LNK files leverage OS vulnerabilities to trigger payload execution directly when folders are opened. 

  • File Execution: Attackers use LNK shortcuts to launch hidden executables or scripts residing on disk. 

  • In-Argument Scripts: LNK files embed commands within their arguments, often invoking PowerShell or cmd.exe with encoded scripts for stealthy execution. 

  • Overlay Payloads: Hidden payloads are appended to LNK files, with execution triggered via utilities like findstr, mshta, or PowerShell to extract and run embedded code. 

Between March and April 2025, the rapid expansion in campaigns underscores the need for caution around downloading or opening unknown LNK files, especially those received via email or untrusted sources. 

Further Reading: Unit 42 

 

 

BERT Ransomware Hits Asia & Europe Across Multiple Platforms 

Trend Micro researchers have identified BERT, a newly emerged ransomware group targeting organizations in Asia, Europe, and the U.S.—notably within healthcare, technology, and event services sectors. First observed in April 2025, BERT operates across both Windows and Linux environments and stands out for its streamlined execution and powerful impact despite a relatively simple codebase. 

Key Insights: 

  • Multi‑Platform Reach: BERT deploys across Windows and Linux systems. Windows attacks disable security tools and escalate privileges via PowerShell, while Linux variants operate with high parallelization—encrypting up to 50 threads and forcibly shutting down ESXi virtual machines to maximize impact. 

  • Efficient Encryption Tactics: The ransomware halts critical processes, encrypts files quickly using AES, appends a .encrypted_by_bert extension, and drops ransom notes immediately. 

  • Active Development & Russian Code Artifacts: Multiple variants have been identified, with code including Russian-language comments and hosted on Russian infrastructure—raising potential attribution links to Russia-aligned threat actors. 

  • REvil Code Lineage: Analysts note similarities to the Linux variant of the now-dismantled REvil ransomware, suggesting BERT may be built using its leaked codebase. 

Further Reading: Trend Micro Research 

 

 

NordDragonScan: A Stealthy Data‑Harvester Targeting Windows 

FortiGuard Labs recently uncovered NordDragonScan, a covert Windows infostealer silently dropped via HTA scripts. Once executed, the malware harvests documents, full browser profiles, screenshots, system details, and even network inventory before exfiltrating everything to a command-and-control server. Installation begins through deceptive RAR archives and LNK files that trigger mshta.exe, concealing activity behind a decoy Ukrainian-language document. 

Key Insights: 

  • Begins with a weaponized HTA dropped by a malicious LNK shortcut, leading to an invisible PowerShell installation of the payload. 

  • NordDragonScan performs deep data collection, including documents (.docx, .pdf, .xls), screenshots, Chrome and Firefox history, system and network details. 

  • Persistence is established via a Run-key registry entry; C2 communication occurs over TLS using custom headers (e.g. MAC-based user-agent). 

  • Targets local network hosts for broader reconnaissance and evades static detection through string obfuscation and hidden executable tactics. 

Further Reading: Fortinet 

 

 

June 2025 Malware Spotlight: Discord Exploits Rise 

Check Point Research’s June 2025 malware spotlight reveals an escalating threat vector: hijacked Discord invite links. Attackers are exploiting expired or deleted invite codes—especially vanity URLs—to redirect users into malicious servers. Over 1,300 victims globally have been impacted, with malware like AsyncRAT and Skuld Stealer delivered via trusted platforms such as GitHub, Pastebin, and Bitbucket. 

Key Insights: 

  • Hijacking Trusted Links: Threat actors reclaim expired or custom Discord invite links to lure users into malicious servers. 

  • ClickFix Social Engineering: Victims encounter fake verification bots that execute clipboard injections and PowerShell commands. 

  • Stealthy Delivery Chain: Malware is deployed in multiple stages using trusted cloud services to evade detection. 

  • Widespread Impact: The campaign has affected users in the U.S., Vietnam, Germany, France, and the U.K., primarily targeting cryptocurrency users. 

Further Reading: Check Point Research 

 

 

Jasper Sleet: North Korean Remote IT Workers Use AI to Infiltrate Organizations 

Microsoft Threat Intelligence has identified a surge in activity from the North Korea-linked threat actor Jasper Sleet, formerly tracked as Storm‑0287. These operatives are exploiting remote work arrangements to embed themselves within organizations worldwide. Using AI tools to enhance fake identities, they are securing employment, gaining access to sensitive systems, and exfiltrating data to support North Korea’s strategic and financial objectives. 

Key Insights: 

  • Jasper Sleet operatives use AI for facial and voice modification to impersonate real job seekers. 

  • Fake identities are supported by fabricated credentials, doctored online profiles, and complicit facilitators. 

  • The campaign targets a wide range of industries across North America, Europe, and Asia. 

  • Over 3,000 accounts have been suspended due to links to this operation. 

  • Common tactics include the use of residential IPs, remote access software, and resume laundering. 

Further Reading: Microsoft Security Blog 

 

 

Preventing ClickFix Attacks: A Critical Playbook 

Unit 42 outlines the growing prevalence of ClickFix social-engineering attacks—where users are duped into copying and executing malicious commands from deceptive web prompts. Given these attacks' reliance on clipboard manipulation and prompt hijacking (especially via PowerShell), defenders must adopt both technical and educational countermeasures. 

Key Insights: 

  • Clipboard Monitoring Defenses: Alerts should trigger when suspicious commands are copied, especially PowerShell scripts; clipboard activity monitoring complements traditional endpoint detection measures. 

  • Restricting Shell Execution: Limit or disable mshta.exe, PowerShell, and cmd.exe execution unless explicitly required—and particularly from web-origin contexts—to reduce attack success rates. 

  • Harden User Prompts: Implement policies to disable or neuter clipboard/paste functionality in browser environments vulnerable to web-based injection prompts. 

  • User Education is Key: Train users to recognize fake CAPTCHAs and unusual ‘copy-and-paste’ prompts. Clear guidance—such as “never paste commands into system prompts”—can disrupt the attack lifecycle. 

Further Reading: Unit 42 

 

 

RenderShock: Weaponizing Trust in File Rendering Pipelines 

Cybersecurity researchers at Cyfirma (with corroboration from IBM X-Force) have revealed a stealthy, zero-click attack strategy dubbed RenderShock. This sophisticated technique exploits passive file-rendering systems—like preview panes, metadata indexing, and sync clients—to discreetly trigger malicious activity without any user action. 

Key Insights: 

  • Zero-Click Payloads: Attackers embed malicious logic into document metadata, file previews, or automation workflows that execute when files are merely indexed or previewed—not opened. 

  • Multi-Vector Exploits: The framework targets diverse surfaces like Windows Explorer preview panes, macOS Quick Look, email client renderers, cloud sync tools, and antivirus scanners to activate payloads. 

  • Stealth & Modularity: RenderShock uses simple evasion tactics—like executing reverse-shell macros or NTLM beaconing via UNC paths—and also advanced payloads such as dual-format polyglots, remote Office templates, and poisoned EXIF metadata. 

  • Wide Impact Potential: Capabilities range from reconnaissance and credential harvesting to remote execution and lateral movement, all without requiring user interaction. 

  • Defense Strategies: Mitigation relies on disabling preview/indexing features, sandboxing file handling, blocking SMB egress, monitoring unusual network activity from renderer processes, and simulating RenderShock techniques in red team exercises. 

Further Reading: Cyfirma 

 

 

Gemini Email Summary Phishing: Invisible Prompt Injection Risk 

A newly discovered vulnerability in Google’s Gemini for Workspace demonstrates how attackers can embed hidden instructions in emails—styled with invisible text—so that clicking “Summarize this email” invokes the malicious prompt. This can result in fake security alerts, phishing links, or fraudulent phone numbers appearing in AI-generated summaries. 

Key Insights: 

  • Attackers hide directives using invisible HTML/CSS that Gemini parses but users can’t see. 

  • Summarized messages may falsely warn of compromised accounts and urge recipients to click links or call numbers. 

  • Because there are no obvious phishing signals (like attachments or visible links), these emails bypass typical threat detection. 

  • Security teams should flag summaries containing urgent calls to action and train users to verify full email content. 

Further Reading: Bleeping Computer 

 

 

Deepfake It ‘til You Make It: The New AI Criminal Toolset 

Cybercriminals are increasingly exploiting deepfake technology to conduct fraud, extortion, and manipulation campaigns. Originally built for creative or entertainment purposes, AI-driven tools for generating fake audio, video, and images are now widely available and being misused to impersonate individuals and mislead organizations. 

Key Insights: 

  • Democratized Deepfake Creation: Tools for generating synthetic media are now easy to use, enabling low-skilled actors to produce realistic forgeries. 

  • CEO Fraud & Recruitment Exploits: Deepfake audio and video are being used to impersonate executives during meetings or to create fake candidate profiles in hiring scams. 

  • KYC & Identity Fraud Risks: Attackers use deepfakes to bypass identity verification processes at banks and fintech platforms, facilitating account fraud. 

  • Plug-and-Play Underground: Criminal communities are sharing deepfake tools, tutorials, and services, lowering the barrier to entry for would-be attackers. 

Further Reading: Trend Micro 

 

 

PoisonSeed Bypasses FIDO Keys Using Cross‑Device Sign‑In Trick 

Expel researchers uncovered a clever social engineering tactic used by the PoisonSeed campaign to neutralize FIDO hardware key protections. Instead of exploiting a technical flaw, attackers employ phishing pages and QR codes in a man-in-the-middle scenario that targets FIDO’s cross-device sign-in feature, fooling victims into granting access without physical key interaction. 

Key Insights: 

  • A phishing website mimicking Okta captures login credentials and forwards them to the legitimate portal. 

  • It then prompts a cross-device sign-in, displaying a QR code that, when scanned by the user, inadvertently authenticates the attacker. 

  • No vulnerability in FIDO itself is exploited; attackers manipulate design workflows to bypass multi-factor authentication. 

  • Although FIDO keys remain strong, this tactic bypasses them in real time without user awareness. 

  • Organizations should monitor for unexpected cross-device login requests and consider options like requiring Bluetooth proximity or restricted registration policies. 

Further Reading: Expel 

 

 

SLOW#TEMPEST Malware Spotlight: Advanced Obfuscation Techniques Unveiled 

Unit 42 has analyzed a recent variant of the SLOW#TEMPEST malware campaign, revealing sophisticated obfuscation—such as dynamic jumps and indirect function calls—used by threat actors to hinder both static and dynamic analysis. 

Key Insights: 

  • Control-Flow Obfuscation: The loader DLL uses runtime-calculated jumps (JMP RAX) to scramble execution paths, making conventional CFG analysis unreliable. 

  • Indirect Calls: Instead of direct API calls, SLOW#TEMPEST employs dynamically resolved function pointers (CALL RAX), complicating detection of malicious functionality. 

  • Emulation-Based Deobfuscation: Researchers successfully reversed obfuscation by emulating dynamic jumps and calls in IDA Pro, restoring visibility into the control flow and API usage. 

  • Evasion of Sandboxes: These techniques prevent decompilers and automated sandboxes from recognizing malicious behavior, allowing the malware to remain hidden and active. 

  • Detection Takeaway: Security teams should enhance defenses with emulation, behavioral telemetry, and control-flow integrity mechanisms to detect threats that evade traditional signature-based analysis. 

Further Reading: Unit 42 

 

 

Matanbuchus Malware Delivered via Microsoft Teams Calls 

Security researchers have alerted to a targeted campaign where attackers exploit Microsoft Teams voice calls—impersonating IT support—to remotely deploy Matanbuchus 3.0 malware. Victims are persuaded to use Windows Quick Assist, opening remote access doors. A PowerShell script then deploys a malicious ZIP package containing a side-loaded DLL loader, which initiates memory-resident infection without leaving obvious traces. 

Key Insights: 

  • Social Engineering via Teams: Callers pose as IT personnel to earn trust and initiate remote-control sessions. 

  • Quick Assist Abuse: Remote assistance tools are misused to bypass controls and execute malicious scripts. 

  • In-Memory Loader: The malware uses PowerShell to unpack a DLL loader that sideloads the final payload without disk artifacts. 

  • Advanced Evasion: Version 3.0 introduces Salsa20-based encryption, syscall usage to evade EDR hooks, and anti-sandbox mechanisms. 

  • High-Risk Payload: Matanbuchus 3.0 can deploy additional threat tools like Cobalt Strike and ransomware, providing full system control. 

Further Reading: Bleeping Computer 

 

 

FileFix: A Social Engineering Evolution of ClickFix 

Check Point Research has uncovered FileFix, a new social engineering attack that refines the ClickFix method to trick users into executing malicious commands. Delivered through compromised or typo-squatted websites, FileFix prompts victims with a fake download link or “Fix” button—copying harmful PowerShell scripts to the clipboard. When users paste and run these snippets, the attacker gains system access through a stealthy, multi-stage infection chain. 

Key Insights: 

  • FileFix uses clipboard hijacking to push malicious payloads via user-initiated paste actions. 

  • Fake prompts mimic legitimate "fix" or software update buttons to build trust. 

  • Infection unfolds in stages—from initial PowerShell downloaders to final payloads like AsyncRAT or remote access trojans. 

  • This variation simplifies and accelerates command execution compared to previous ClickFix variants. 

  • Detection requires user awareness and endpoint policies that block shell execution from clipboard content. 

Further Reading: Check Point Research 

 

 

Linkable Token Identifiers Now GA for Enhanced Identity Threat Detection 

Microsoft Entra ID has launched linkable token identifiers—a new capability that allows security teams to trace a user session across Microsoft 365 services (including Teams, SharePoint, Exchange Online, and Graph). Each session is now tagged with a Session ID (SID) and Unique Token Identifier (UTI), enabling precise correlation of all actions originating from a single authentication event across multiple workloads. 

Key Insights: 

  • SID enables linkage of all access tokens and session activity from one login, while UTI uniquely identifies each issued token. 

  • Security analysts can now trace attacker movements—such as lateral access, API usage, or mailbox actions—across services using unified session tracking. 

  • This simplifies investigation workflows, reducing reliance on fragmented logs or inconsistent identifiers like IP addresses and device IDs. 

  • SOCs using Defender XDR and Entra ID Protection can now map anomalous activity with greater accuracy and speed. 

Further Reading: Microsoft Entra Blog 

 

 

FBI & CISA Update on Tactics & Threats for Scattered Spider 

Critical infrastructure and commercial entities are urged to review CISA's updated joint advisory AA23‑320A (last revised July 29, 2025), detailing evolving tactics used by the Scattered Spider cybercriminal group. Known for preying on IT and help desk personnel, this financially motivated threat actor now combines social engineering, ransomware, and data extortion with sophisticated new techniques. 

Key Insights: 

  • Scattered Spider continues targeting IT support channels using voice phishing (vishing), SMS phishing (smishing), and MFA fatigue attacks alongside SIM swapping to obtain access credentials. 

  • Once inside, attackers repurpose legitimate remote-access and tunneling tools (e.g. TeamViewer, AnyDesk, Ngrok) instead of relying on malware, enabling stealthy and persistent access. 

  • New variants like DragonForce ransomware are now being deployed as part of combined extortion operations (data theft + encryption). 

  • In recent operations, actors have refined social engineering methods while rotating TTPs to evade detection and extend dwell time. 

  • Updated mitigations emphasize phishing-resistant MFA, verifying helpdesk contacts out-of-band, limiting remote access tool use, and continuous validation of security controls against evolving attack behaviors. 

Further Reading: CISA Advisory AA23‑320A (Scattered Spider) 

 

Phishing Trends Q2 2025: Microsoft at the Helm, Spotify Rejoins the Spotlight 

Check Point Research’s latest Brand Phishing report reveals that in the second quarter of 2025, cybercriminals continued to impersonate high-trust brands to trick users into revealing credentials or financial data. Microsoft remained the most spoofed brand—used in 25% of phishing attempts—followed by Google (11%), Apple (9%), and Spotify (6%), marking Spotify’s first reappearance in the charts since late 2019. 

Key Insights: 

  • Microsoft led phishing campaigns, accounting for a quarter of all spoofed brands. 

  • Spotify saw a surprising resurgence in impersonation attempts after a long absence, used in campaigns involving fake credential and payment pages. 

  • Booking.com–themed domains surged by over 700 in Q2, many embedding personal user data to deceive targets convincingly. 

  • Tech remained the top spoofed sector, with social networks, travel, and retail brands also seeing elevated impersonation activity. 

  • Seasonal alignment played a key role: the rise in travel scams coincided with summer holiday planning, amplifying phishing success. 

Further Reading: Check Point Research 

 

Microsoft OAuth Phishing Campaign: MFA Bypass via App Impersonation 

Proofpoint has exposed a sophisticated phishing campaign where attackers used malicious Microsoft OAuth applications—disguised as trusted brands like Adobe, DocuSign, and SharePoint—to trick users into granting access to their Microsoft 365 accounts. These apps operated within legitimate authorization flows, enabling attackers to bypass multi-factor authentication (MFA) with minimal-risk consent requests. 

Key Insights: 

  • The fake OAuth apps mimicked trusted publishers to obtain permissions for profile, email, and openid scopes—enough to capture credentials and session tokens without raising suspicion. 

  • Once approved, users were redirected to phishing pages that intercepted login credentials and session tokens using AiTM (attacker-in-the-middle) kits like Tycoon or EvilProxy. 

  • Attackers were able to maintain access via stolen tokens even after password resets, remaining linked to accounts until consent was manually revoked. 

  • The campaign compromised multiple sectors—including finance, healthcare, and retail—targeting executives and high-privilege users. 

  • Standard security controls such as DMARC or domain reputation were largely ineffective since the phishing originated from within Microsoft's system. 

  • Microsoft is rolling out updated defaults that require administrative approval for third-party app permissions, aiming to limit similar attacks going forward. 

Further Reading: Proofpoint Threat Insight 

 

 

GreyNoise: Early Warning Signals Reveal Emerging Vulnerabilities Before Public Disclosure 

GreyNoise’s latest research, “Early Warning Signals: When Attacker Behavior Precedes New Vulnerabilities”, demonstrates that spikes in malicious activity—such as scanning or brute force attempts—often occur weeks before a corresponding CVE is officially disclosed. This pattern is most pronounced in edge technologies like VPNs, firewalls, and remote access tools. Of 216 observed spikes since September 2024, 80% were followed by a CVE within six weeks, and 50% within just three weeks. 

Key Insights: 

  • Attacker reconnaissance frequently precedes public identification of the vulnerability they are probing. 

  • Spikes in exploit activity offer a critical 6-week window for defenders to prepare before official disclosure. 

  • This trend is particularly prevalent in enterprise perimeter devices—typical initial access points for adversaries. 

  • Relying solely on EPSS or KEV can miss these pre-disclosure threats and delay defensive response. 

Further Reading: GreyNoise Early Warning Signals Report 

In News Tags newsletter, threat intelligence
Comment

February 2025 - ExploreSec Cybersecurity Awareness newsletter

February 4, 2025

This is a security awareness focused newsletter that I share internally. Feel free to grab and use for your own internal security awareness program. Created with help from ChatGPT.

How HIPAA Security Rule Updates Could Impact Healthcare Employees 

The U.S. Department of Health and Human Services (HHS) has proposed significant updates to the HIPAA Security Rule, aiming to enhance the protection of electronic protected health information (ePHI). These changes, the first major revision since 2013, will have implications for individuals working in healthcare organizations. 

What You Need to Know: 

  • New Security Measures: Employees will be required to use multifactor authentication (MFA) for accessing systems containing ePHI. This adds an extra layer of security by requiring a second verification step, such as a code sent to your phone or email. 

  • Improved Data Encryption: All ePHI must be encrypted, meaning employees may encounter updated tools or workflows for handling sensitive information securely. 

  • Annual Audits: Organizations will perform regular audits to ensure compliance with the updated rules. Employees may be asked to participate in training or assessments to demonstrate understanding of security policies. 

Why It Matters to You: 

These updates are designed to strengthen defenses against data breaches and ensure the safety of patient information. As healthcare professionals, compliance with these measures not only protects patient data but also safeguards the organization from potential penalties and operational disruptions. 

The proposed rule will be open for public comment starting January 6, 2025. Employees should stay informed about the changes and prepare for any updates to internal policies and procedures. 

Further Reading: Dark Reading 

 

 

Phishing Campaign Delivers ConnectWise RAT via Spoofed Social Security Emails 

A recent phishing campaign has been identified wherein attackers impersonate the U.S. Social Security Administration to distribute the ConnectWise Remote Access Trojan (RAT). 

Key Developments: 

  • Spoofed Emails: Beginning in September 2024, fraudulent emails masquerading as official communications from the Social Security Administration were disseminated, claiming to provide updated benefits statements. These emails contained links designed to deceive recipients into downloading malicious software. 

  • Malware Delivery Mechanism: The embedded links directed users to a ConnectWise RAT installer. Initially, the campaign utilized ConnectWise infrastructure for command and control (C2) operations but later transitioned to dynamic DNS services and domains controlled by the threat actors. 

  • One-Time Use Links: The malicious links employed a one-time-use mechanism, redirecting users to the malware installer upon first access and subsequently to the legitimate Social Security Administration website on further attempts. This tactic complicates detection and analysis efforts. 

  • Timing and Volume: The campaign's activity surged in early to mid-November, peaking around Election Day, suggesting a potential link to the political climate during that period. 

Further Reading: GBHackers 

 

 

Phishing Campaign Targets Gamers with Fake Video Game Testing Offers 

Cybercriminals are employing deceptive emails that promise opportunities to test new video games, aiming to steal personal information and credentials from unsuspecting gamers. 

Key Details: 

  • Deceptive Invitations: Victims receive emails inviting them to participate in exclusive game testing, often for highly anticipated titles. 

  • Malicious Links: These emails contain links to counterfeit websites designed to mimic legitimate gaming platforms, prompting users to enter sensitive information. 

  • Data Theft: Information entered on these fake sites is harvested by attackers for malicious purposes, including identity theft and unauthorized account access. 

Further Reading: KnowBe4 Blog 

 

 

New 'US Cyber Trust Mark' Labels to Identify Secure Smart Devices 

The U.S. government has introduced the 'US Cyber Trust Mark,' a voluntary labeling initiative to help consumers identify smart devices that meet federal cybersecurity standards. 

Key Details: 

  • Purpose: The label aims to guide consumers in selecting internet-connected devices—such as baby monitors, home security cameras, and fitness trackers—that are less susceptible to hacking. 

  • Label Features: Devices meeting the standards will display a distinctive shield logo and include QR codes. Scanning the QR code provides detailed security information about the product. 

  • Availability: Products bearing the 'US Cyber Trust Mark' are expected to be available later this year, as manufacturers begin submitting devices for approval. 

  • Industry Participation: Companies including Amazon, Best Buy, Google, LG Electronics USA, Logitech, and Samsung have expressed support for the initiative. 

Implications for Consumers: 

With the average American household containing numerous internet-connected devices, each potentially serving as an entry point for cybercriminals, this labeling system offers a straightforward method to assess the cybersecurity of products before purchase. 

Further Reading: SecurityWeek 

 

 

PowerSchool Software Cyberattack Potentially Affects 45 Million U.S. Students 

A recent cyberattack targeting PowerSchool, a widely used student information system in K-12 schools across the United States, has led to a significant data breach. This incident may impact over 45 million students and educational staff nationwide. 

Key Details: 

  • Compromised Data: The breach has exposed sensitive information, including grades, attendance records, medical histories, Social Security numbers, student profiles, and communications between parents and educators. 

  • Potential Risks: The stolen data could be exploited for malicious activities such as phishing attempts, identity theft, and unauthorized access to personal and financial information. 

  • Regional Impact: Schools in North Dakota, including West Fargo Public Schools, have notified parents about the breach, indicating that the incident may have far-reaching implications across various educational districts. 

Further Reading: Cybersecurity Insiders 

 

 

Data Breach at Leading U.S. Addiction Treatment Provider 

BayMark Health Services, the largest provider of substance use disorder treatment in North America, has reported a data breach potentially compromising patient personal and health information. 

Key Details: 

  • Incident Timeline: Unauthorized access to BayMark's systems occurred between September 24 and October 14, 2024. The breach was discovered on October 11, leading to immediate actions to secure systems and involve third-party forensic experts. 

  • Compromised Information: While the exact data types accessed have not been publicly detailed, such breaches typically involve personal identifiers and health-related information. 

  • Patient Notification: BayMark is in the process of notifying affected individuals and has stated that it will offer complimentary credit monitoring and identity protection services to those impacted. 

Further Reading: BleepingComputer 

 

 

Sophisticated Voice Phishing Scams Exploit Apple and Google Services 

Recent investigations have uncovered that cybercriminals are leveraging legitimate Apple and Google services to execute advanced voice phishing (vishing) attacks, deceiving users into divulging sensitive information. 

Key Details: 

  • Exploiting Legitimate Services: Attackers initiate contact through genuine Apple and Google communication channels, such as Google Assistant and Apple's support lines, making the interactions appear authentic. 

  • Manipulating System Notifications: By abusing these services, scammers can trigger legitimate system-level messages, emails, and automated phone calls, adding credibility to their fraudulent schemes. 

  • Case Example: In one instance, a cryptocurrency investor was deceived into transferring over $4.7 million after receiving what seemed to be legitimate communications from Google and Apple, orchestrated by the attackers. 

Recommendations: 

  • Verify Contacts: Be cautious of unsolicited communications claiming to be from Apple or Google. Always verify the authenticity of such interactions by contacting the company directly through official channels. 

  • Protect Personal Information: Never share sensitive information, such as passwords or financial details, over the phone or through unsolicited messages. 

  • Stay Informed: Familiarize yourself with common phishing tactics and remain vigilant for signs of fraudulent activity. 

Further Reading: Krebs on Security 

 

 

OneBlood Confirms Data Breach Following Ransomware Attack 

OneBlood, a prominent not-for-profit blood donation organization serving over 250 hospitals across the United States, has confirmed that personal information of donors was compromised during a ransomware attack in July 2024. 

Key Details: 

  • Incident Timeline: Unauthorized access to OneBlood's network occurred between July 14 and July 29, 2024. The breach was discovered on July 28, prompting immediate containment measures. 

  • Compromised Information: The attackers accessed and copied files containing personal data, including names and Social Security numbers. OneBlood has begun notifying affected individuals and is offering complimentary credit monitoring services. 

  • Operational Impact: The ransomware attack led to the encryption of virtual machines, forcing OneBlood to revert to manual processes for blood collection, testing, and distribution. This disruption resulted in delays and shortages, prompting urgent calls for donations, particularly of O Positive, O Negative, and Platelet blood types. 

Further Reading: BleepingComputer 

 

 

Phishing Campaigns Exploit YouTube Links and Microsoft 365 Themes 

Cybercriminals are deploying sophisticated phishing attacks targeting Microsoft 365 users by utilizing deceptive URLs that closely resemble legitimate Office 365 domains. These attacks often involve claims of imminent password expiration to create urgency, prompting users to click on malicious links. 

Key Developments: 

  • Deceptive URLs: Attackers craft URLs that appear to be legitimate, incorporating prefixes like "youtube.com" followed by obfuscation characters or using the "@" symbol to redirect users to malicious domains while maintaining a facade of legitimacy. 

  • Social Engineering Tactics: Phishing emails are designed to induce panic by falsely claiming that the recipient's password has expired, urging immediate action. The emails contain malicious buttons labeled to appear as legitimate account maintenance actions. 

  • Obfuscation Techniques: The use of "%20" for HTML space encoding and the "@" symbol in URLs helps attackers conceal the true destination of the links, making it challenging for users to identify the threat. 

Further Reading: GBHackers 

 

 

Phishing Texts Target Apple iMessage Users by Disabling Link Protections 

Cybercriminals are employing a new tactic to deceive Apple iMessage users into disabling built-in phishing protections, thereby exposing them to potential scams. 

Key Details: 

  • Disabled Links for Unknown Senders: Apple's iMessage automatically disables links in messages received from unknown senders to protect users from potential phishing attacks. 

  • Deceptive Tactics: Recent smishing (SMS phishing) attacks have been observed where attackers send messages prompting users to reply with "Y" or another response. This action re-enables the disabled links, making users susceptible to malicious websites. 

  • Common Scenarios: Examples include fake shipping issue notifications or unpaid toll alerts, urging immediate action and instructing users to reply to the message to resolve the fabricated issue. 

Recommendations: 

  • Avoid Responding to Unknown Messages: Do not reply to messages from unknown senders, especially those prompting you to take specific actions. 

  • Verify Sender Authenticity: If a message claims to be from a legitimate organization, contact the entity directly using official channels to confirm the message's legitimacy. 

  • Maintain Built-in Protections: Refrain from actions that disable iMessage's security features, such as replying to suspicious messages or adding unknown contacts without verification. 

Stay Vigilant: Always exercise caution when receiving unsolicited messages, and be aware of tactics that attempt to bypass security measures designed to protect your personal information. 

Further Reading: BleepingComputer 

 

 

Surge in Phishing Scams Exploiting California Wildfires 

As California confronts devastating wildfires, cybercriminals are exploiting the crisis by launching phishing scams targeting affected individuals and those seeking to assist. 

Key Insights: 

  • Emergence of Suspicious Domains: Within a 72-hour period, multiple domains mimicking official services related to the wildfires have been registered. Examples include malibu-fire[.]com and fire-relief[.]com. These domains are likely intended for phishing attacks, fake donation requests, and malicious downloads. 

  • Tactics Employed by Scammers: Attackers are creating domains that resemble legitimate services or agencies, distributing phishing emails urging recipients to click on fraudulent links, and using social engineering techniques to create a sense of urgency, such as fake donation drives or critical safety alerts. 

Recommendations: 

  • Verify Authenticity: Before engaging with any disaster-related communications or websites, confirm their legitimacy through official channels. 

  • Be Cautious with Donations: When donating to relief efforts, use established and reputable organizations. Avoid unsolicited requests for donations, especially those asking for unusual payment methods. 

  • Stay Informed: Keep abreast of common phishing tactics and remain vigilant for signs of fraudulent activity, particularly during disaster situations. 

Further Reading: Veriti Blog 

 

 

U.S. Sanctions Target North Korean IT Worker Network 

The U.S. Treasury Department has imposed sanctions on a network of individuals and front companies associated with North Korea's Ministry of National Defense, aiming to disrupt revenue streams generated through illicit remote IT work schemes. 

Key Insights: 

  • Entities Sanctioned: The Office of Foreign Assets Control (OFAC) has designated North Korean front companies Korea Osong Shipping Co. (Osong) and Chonsurim Trading Corporation (Chonsurim), along with their presidents, Jong In Chol and Son Kyong Sik. Additionally, Chinese firm Liaoning China Trade has been sanctioned for supplying electronics equipment to North Korea's Department 53, a weapons-trading entity that also operates IT and software development front companies. 

  • Revenue Generation Tactics: North Korea employs thousands of IT workers who conceal their identities to secure employment with companies abroad. The earnings from these positions are funneled back to the regime, supporting its illegal weapons programs and contributing to destabilizing activities, including support for Russia's war in Ukraine. 

  • Legal Implications: As a result of these sanctions, U.S. individuals and organizations are prohibited from engaging in transactions with the designated entities and individuals. Furthermore, any assets linked to them within U.S. jurisdiction are subject to freezing. 

Further Reading: BleepingComputer 

 

 

Cybercriminals Exploit Fake Google Ads to Hijack Advertiser Accounts 

Cybercriminals are conducting a sophisticated malvertising campaign targeting Google Ads users by deploying fraudulent advertisements that impersonate legitimate Google Ads services. This tactic aims to steal advertiser account credentials, leading to unauthorized access and potential misuse of advertising budgets. 

Key Insights: 

  • Impersonation of Google Ads: Attackers create deceptive ads that appear to be official Google Ads promotions. When clicked, these ads redirect users to counterfeit login pages designed to harvest Google account credentials. 

  • Use of Google Sites for Phishing: The fraudulent ads often lead to phishing pages hosted on Google Sites, lending an air of legitimacy and making detection more challenging. These pages are crafted to closely mimic authentic Google login interfaces. 

  • Credential Theft and Account Compromise: Once users enter their credentials on these fake pages, attackers gain unauthorized access to their Google Ads accounts. This access can be exploited to run malicious ad campaigns, deplete advertising budgets, or sell the compromised accounts on blackhat forums. 

Recommendations: 

  • Verify Ad URLs: Before clicking on any Google Ads-related advertisements, hover over the link to inspect the URL. Ensure it directs to an official Google domain. 

  • Enable Multi-Factor Authentication (MFA): Implement MFA on your Google accounts to add an extra layer of security, making unauthorized access more difficult even if credentials are compromised. 

Further Reading: Malwarebytes 

 

 

Ransomware Gangs Exploit Microsoft Teams by Impersonating IT Support 

Cybersecurity researchers have identified ransomware groups, including Black Basta, using Microsoft Teams to impersonate IT support and gain unauthorized access to corporate networks. 

Key Insights: 

  • Email Bombardment: Attackers flood employee inboxes with non-malicious emails to create confusion and urgency. 

  • Fake IT Support: Posing as help desk personnel, attackers use Teams to contact employees and build trust. 

  • Remote Access: Victims are tricked into installing remote tools, enabling ransomware deployment and network access. 

Further Reading: BleepingComputer 

 

Introducing 'Identity Check' 

Google has recently unveiled a new security feature for Android devices called "Identity Check," designed to bolster protection against unauthorized access, especially in the event of device theft. This feature mandates biometric authentication—such as fingerprint or facial recognition—to access sensitive settings when the device is outside of trusted locations like home or work. 

Key Highlights: 

  • Biometric Verification: Critical actions, including changing the device's PIN, disabling theft protection, turning off 'Find My Device,' performing a factory reset, and modifying biometric data, now require biometric authentication when the device is in untrusted locations. 

  • Trusted Locations: Users can designate specific areas, such as home or workplace, as trusted locations. Outside these zones, the enhanced security measures are activated to prevent unauthorized access. 

  • Device Compatibility: Initially, 'Identity Check' is available on Google Pixel devices running Android 15 and Samsung Galaxy devices with One UI 7. Plans are underway to extend this feature to other manufacturers' devices later this year. 

Further Reading: BleepingComputer 

 

 

Banshee Stealer Targets macOS Users 

A sophisticated malware known as "Banshee Stealer" is actively targeting macOS users, posing significant risks to personal and financial data. 

Key Details: 

  • Stealthy Operation: Banshee operates undetected, blending seamlessly with normal system processes while stealing browser credentials, cryptocurrency wallets, user passwords, and sensitive file data. 

  • Distribution Methods: The malware is distributed through phishing websites and malicious GitHub repositories, posing as popular software tools such as Chrome, Telegram, and TradingView. 

Protective Measures: 

  • Verify Software Sources: Only download software from official and reputable sources. Be cautious of unsolicited links or prompts to install applications. 

  • Update Security Systems: Ensure your macOS and security software are up-to-date to detect and prevent the latest threats. 

  • Monitor for Suspicious Activity: Regularly check for unusual system behavior or unauthorized access to accounts. 

Further Reading: Check Point Research 

 

 

Texas Investigates Automakers Over Consumer Data Practices 

Texas has broadened its investigation into how automakers collect, use, and share consumer data from modern connected vehicles. The focus is on whether manufacturers are obtaining proper consent, how data is shared with third parties, and whether it is being sold without transparency. This follows growing concerns over privacy risks associated with the data generated by advanced vehicle technologies. 

Key Insights: 

  • Automakers Under Scrutiny: Texas is investigating Ford, Hyundai, Toyota, and Fiat Chrysler over data collection, sharing, and sales practices. 

  • Data Concerns: The focus includes how consumer data is collected, shared with third parties, and whether consumer consent is obtained. 

  • Legal Background: This expands on previous investigations and lawsuits, including action against General Motors for alleged unauthorized data sales. 

Further Reading: Malwarebytes News 

 

 

Phishing Campaign Exploits Legitimate Services to Send Fraudulent PayPal Requests 

A recent phishing campaign has been identified that abuses legitimate services to send fraudulent PayPal payment requests, aiming to deceive recipients into compromising their accounts. 

Key Insights: 

  • Methodology: Attackers register free Microsoft 365 test domains and create distribution lists containing target email addresses. They then use these lists to send payment requests via PayPal's web portal. 

  • Deceptive Tactics: Recipients receive a legitimate-looking PayPal payment request. Clicking the link directs them to a PayPal login page displaying the payment request. If the recipient logs in, their PayPal account becomes linked to the scammer's account, potentially granting the attacker unauthorized access. 

Further Reading: KnowBe4 Security Awareness Training Blog 

 

 

Malicious WordPress Plugin Assists in Phishing Attacks 

A newly identified malicious WordPress plugin is being exploited by attackers to conduct phishing campaigns. This plugin allows cybercriminals to send phishing emails from compromised WordPress sites, emphasizing the need for vigilance in securing web platforms and carefully managing plugins. 

Key Insights: 

  • The malicious plugin facilitates phishing attacks by using compromised websites to send emails to targets. 

  • Regular audits of WordPress sites and plugin installations are essential for mitigating such threats. 

  • Ensuring plugins are sourced from trusted providers can help reduce the risk of exploitation. 

Further Reading: Malicious WordPress Plugin Assists in Phishing Attacks 

 

 

Insurance Company Accused of Using Secret Software to Illegally Collect and Sell Location Data 

A prominent insurance company is under scrutiny for using secret software to collect and sell location data on millions of Americans without their knowledge or consent. This case raises serious concerns about privacy violations and the unethical use of personal data for profit. It serves as a reminder of the importance of transparency and consent in handling personal information, particularly when it comes to sensitive data like location tracking. 

Key Insights: 

  • The insurance company allegedly used secret software to gather location data from individuals without their consent. 

  • The collected data was sold, violating privacy laws and raising ethical concerns about data exploitation. 

  • Organizations must prioritize transparency and user consent when collecting and using personal data to avoid legal and reputational risks. 

Further Reading: Malwarebytes 

 

 

Google Chrome AI Extensions Deliver Info-Stealing Malware in Broad Attack 

A new wave of cyberattacks is targeting Google Chrome users through AI-powered extensions that deliver information-stealing malware. These malicious extensions are designed to steal sensitive data, including login credentials and financial information, from unsuspecting victims. The attack highlights the growing threat posed by browser extensions and the need for users to exercise caution when installing third-party software. 

Key Insights: 

  • AI-powered Chrome extensions are being used to deliver info-stealing malware, potentially compromising users' personal and financial information. 

  • The use of AI in these extensions makes them more difficult to detect and mitigate. 

  • Users should carefully vet any browser extensions they install and prioritize security practices such as using trusted sources and multi-factor authentication. 

Further Reading: Malwarebytes 

 

  

Phishing Campaign Targets Mobile Banking Users with Sophisticated Techniques 

A new phishing campaign is targeting mobile banking users with increasingly sophisticated techniques. The attackers are using fake mobile apps and messages that appear to come from trusted financial institutions, convincing victims to provide sensitive information such as account credentials and personal identification details. This attack highlights the growing threat to mobile banking and the importance of user vigilance in identifying fraudulent communications. 

Key Insights: 

  • The phishing campaign uses fake mobile apps and messages that mimic legitimate banking services to deceive users. 

  • Attackers are focusing on mobile platforms, where users may be less cautious about security risks. 

  • Financial institutions and mobile users should remain vigilant, employing multi-factor authentication and other security measures to protect sensitive information. 

Further Reading: Infosecurity Magazine 

 

 

Phishing Attack Protection for Teams Chat 

Phishing attacks targeting communication platforms like Microsoft Teams are becoming more prevalent. These attacks often involve malicious links, fake login prompts, or social engineering tactics aimed at stealing sensitive information. Microsoft is introducing a feature that flags external messages, helping users identify and avoid potentially harmful communications. Organizations should also reinforce security measures and provide ongoing training to users to strengthen defenses against these threats. 

Key Insights: 

  • Phishing attacks are increasingly targeting platforms such as Microsoft Teams, using malicious links and social engineering techniques. 

  • Microsoft is rolling out a feature that flags external messages, which helps users spot potential phishing attempts. 

  • Ongoing user education and security best practices remain essential to defending against evolving phishing tactics. 

Further Reading: GBHackers 

 

 

These Are the 10 Worst PIN Codes 

A new report highlights the 10 worst PIN codes that are most commonly used, making accounts highly vulnerable to unauthorized access. Cybersecurity experts have long warned against using simple, predictable PINs, but many users still rely on easily guessable codes. This report serves as a reminder to always choose strong, unique PINs to safeguard sensitive accounts. 

Key Insights: 

  • Many users still rely on simple, predictable PIN codes, which increases the risk of unauthorized access. 

  • The 10 worst PIN codes are some of the most common and easiest to guess, highlighting the importance of stronger security practices. 

  • Users should choose complex, unique PIN codes for their accounts to protect personal and financial information from attackers. 

Further Reading: Malwarebytes 

 

 

Chinese Innovations Spawn Wave of Toll Phishing via SMS 

A new wave of phishing attacks is emerging, primarily driven by Chinese technological innovations. Cybercriminals are using SMS-based toll phishing to trick users into paying for services or accessing malicious websites. This surge in attacks highlights the growing sophistication of phishing tactics and the need for stronger protections against mobile-based threats. 

Key Insights: 

  • Toll phishing attacks via SMS are on the rise, with cybercriminals using Chinese innovations to make the attacks more convincing and widespread. 

  • Victims are tricked into paying for non-existent services or clicking on malicious links. 

  • Organizations and individuals should implement mobile security practices and be cautious when receiving unsolicited SMS messages. 

Further Reading: Krebs on Security 

 

 

Your Location or Browsing Habits Could Lead to Price Increases When Buying Online 

A recent study reveals that online retailers may use your location and browsing habits to adjust prices, leading to potential price increases for certain customers. This practice, known as dynamic pricing, raises privacy concerns and the need for transparency in how personal data is used for commercial purposes. Consumers are advised to be aware of these tactics and consider using privacy tools to protect their online behavior. 

Key Insights: 

  • Retailers may adjust prices based on location and browsing behavior, potentially leading to higher costs for some users. 

  • Dynamic pricing practices raise concerns about privacy and the ethical use of personal data. 

  • Consumers can protect themselves by using privacy tools and being mindful of how their data is shared with online retailers. 

Further Reading: Malwarebytes 

 

 

New Syncjacking Attack Hijacks Devices Using Chrome Extensions 

A new form of attack called "Syncjacking" is targeting users by exploiting Chrome extensions to hijack their devices. This attack allows cybercriminals to gain access to users' synchronized data across multiple devices, including passwords, browsing history, and other sensitive information. This highlights the need for users to be cautious when installing browser extensions and to regularly review their sync settings. 

Key Insights: 

  • Syncjacking attacks exploit vulnerabilities in Chrome extensions to hijack synced data across multiple devices. 

  • The attack compromises sensitive information, such as passwords and browsing history, by gaining access to synchronized accounts. 

  • Users should be cautious when installing extensions and ensure they review their sync settings regularly to prevent unauthorized access. 

Further Reading: BleepingComputer 

 

 

States Get Failing Grades for Privacy Laws, but Tide May Be Turning 

A new report from the Electronic Privacy Information Center (EPIC) and U.S. PIRG Education Fund reveals that nearly half of U.S. states with consumer privacy laws received failing grades for protecting citizens' data. Of the 19 states with laws, eight received an F, and none earned an A. While many of these laws are seen as weak and influenced by major tech companies, some states like Maryland are starting to adopt stronger privacy protections, offering hope for a more secure future. 

Key Insights: 

  • Many states with consumer privacy laws received failing grades due to weak protections for personal data. 

  • Big Tech companies have influenced state privacy laws, leading to minimal consumer protection. 

  • Maryland’s recent privacy law is one of the strongest in the U.S., limiting data collection and banning targeted ads to minors. 

  • States like Vermont, Massachusetts, and Maine are moving toward stronger privacy laws this year. 

Further Reading: EPIC 

 

In News Tags newsletter
Comment

Image created with ChatGPT

Phishing Threat Intelligence From August 2024

September 9, 2024

These are news articles from August 2024. Feel free to take and share with your internal cybersecurity team. A mention of explores.com would be great!

Dismantling Smart App Control 

Elastic Security Labs recently uncovered multiple vulnerabilities in Windows Smart App Control (SAC) and SmartScreen. These weaknesses allow attackers to bypass security measures using techniques such as signed malware, reputation hijacking, and LNK stomping. These methods enable initial access without triggering security warnings, posing significant risks. Security teams should focus on detecting these evasive tactics and not rely solely on OS-native features. 

Key Insights: 

  • Signed Malware: Attackers use valid certificates to bypass SAC. 

  • Reputation Hijacking: Leveraging trusted apps to execute malicious code. 

  • LNK Stomping: Crafting LNK files to evade MotW checks. 

For more details, visit the Elastic Security Labs article. 

 

 

Securing Domain Names from Takeover 

Recent research highlights vulnerabilities in domain name management that leave over a million domains susceptible to hijacking. This issue arises from weak authentication practices at several web hosting providers and domain registrars. Cybercriminals exploit these weaknesses to take control of domains, using them for phishing, spam, and malware distribution. To mitigate risks, it is crucial to ensure proper DNS configuration and use DNS providers with strong verification processes. 

Key Insights: 

  • Vulnerability: Over a million domains at risk. 

  • Exploitation: Hijacked domains used for malicious activities. 

  • Recommendation: Strengthen DNS configuration and provider verification. 

For more details, visit the Krebs on Security article. 

 

 

Exploitation of Google Drawings and WhatsApp 

A newly identified phishing campaign exploits Google Drawings and WhatsApp's URL shortener to create convincing redirects to malicious sites. This method allows attackers to bypass security filters and deceive users into thinking they are visiting legitimate sites like Amazon. These tactics highlight the increasing sophistication of phishing threats, emphasizing the need for heightened vigilance and advanced security measures. 

Key Insights: 

  • Exploited Tools: Google Drawings and WhatsApp's URL shortener. 

  • Attack Strategy: Redirects users to malicious sites mimicking trusted brands. 

  • Recommendation: Implement advanced phishing detection and maintain user vigilance. 

For more details, visit the Menlo Security article. 

 

 

Concerns Over Cloudflare’s Anti-Abuse Posture 

Spamhaus has raised concerns about Cloudflare's anti-abuse policies, highlighting that cybercriminals are exploiting Cloudflare’s services to mask malicious activities. Despite numerous abuse reports, Cloudflare's current approach often shields the true location of harmful content, complicating efforts to combat cybercrime. This situation underscores the need for stronger abuse management practices to prevent cybercriminals from leveraging trusted services to conduct illegal activities. 

Key Insights: 

  • Exploitation: Cybercriminals are using Cloudflare to hide malicious activities. 

  • Response: Current anti-abuse measures are inadequate in addressing the issue. 

  • Recommendation: Enhanced abuse management and accountability are needed. 

For more details, visit the Spamhaus article. 

 

 

Royal Ransomware Rebrands as BlackSuit 

The ransomware group formerly known as Royal has rebranded as BlackSuit, increasing their ransom demands to over $500 million. This shift indicates a more aggressive approach, with the group targeting larger organizations across various sectors. BlackSuit continues to use sophisticated tactics, including double extortion, where they threaten to release stolen data if their demands are not met. Organizations should strengthen their defenses and ensure incident response plans are up-to-date. 

Key Insights: 

  • Rebranding: Royal ransomware is now BlackSuit. 

  • Increased Ransom: Demands exceed $500 million. 

  • Tactics: Double extortion remains a primary threat. 

  • Recommendation: Strengthen defenses and update incident response plans. 

For more details, visit the KnowBe4 article. 

 

 

New Phishing Scam Using Cross-Site Scripting 

A recent phishing scam uncovered by KnowBe4 employs cross-site scripting (XSS) attacks to harvest personal details from unsuspecting victims. Attackers use this method to inject malicious scripts into legitimate websites, tricking users into entering sensitive information like login credentials. This technique bypasses traditional security measures, making it a particularly dangerous threat. Users should be cautious when clicking on links in emails and ensure that websites they interact with are secure. 

Key Insights: 

  • Attack Method: Cross-site scripting (XSS) used to steal personal details. 

  • Target: Login credentials and sensitive information. 

  • Recommendation: Verify website security before entering personal information. 

For more details, visit the KnowBe4 article. 

 

 

Surge in File-Sharing Phishing Attacks 

KnowBe4 reports a staggering 350% increase in file-sharing phishing attacks over the past year. These attacks often disguise themselves as notifications from popular file-sharing services, tricking users into revealing sensitive information or downloading malware. The rapid rise in these attacks highlights the need for enhanced email security and ongoing employee training. 

Key Insights: 

  • 350% Increase: Significant rise in file-sharing phishing attacks. 

  • Attack Method: Disguised as legitimate file-sharing notifications. 

  • Recommendation: Strengthen email security and employee awareness. 

For more details, visit the KnowBe4 article. 

 

 

Rising Use of URL Shorteners in Phishing Attacks 

Recent intelligence highlights a growing trend where cybercriminals use URL shorteners to obscure malicious links in phishing campaigns. This tactic effectively conceals the true destination of links, making it difficult for users and traditional security tools to detect threats. These shortened URLs often appear in seemingly legitimate emails or text messages, leading to fraudulent websites designed to steal credentials or deploy malware.  

For more details, visit the KnowBe4 article. 

 

 

Surge in Microsoft Brand Impersonation Attacks 

A recent report shows a 50% increase in phishing attacks impersonating Microsoft in just one quarter. These attacks target users by mimicking Microsoft’s branding to steal credentials or deploy malware. Given Microsoft’s widespread use in organizations, employees should be extra cautious when receiving emails claiming to be from Microsoft, especially those requesting login details or prompting downloads. Always verify the sender's address and report suspicious emails to IT. 

For more details, visit the KnowBe4 article. 

 

 

Dark Angels Ransomware Group Rakes in Record Ransoms 

The Dark Angels ransomware group has secured a record $75 million ransom payment from a fortune 50 company recently. Unlike other groups, Dark Angels avoid public leaks and minimize operational disruptions for their victims, making it easier to coerce payments quietly.  

For more details, visit the Krebs on Security article. 

 

 

Inc Ransom Attack Analysis 

Overview: In April 2024, the "Inc Ransom" group targeted a ReliaQuest customer, employing a double-extortion strategy without encrypting files. They exploited an unpatched Fortinet vulnerability to gain access, installed remote management tools like AnyDesk, and used techniques like pass-the-hash for lateral movement. Data was exfiltrated using unconventional tools such as Restic. 

Key Insights: 

  • Mitigations: Prioritize patch management, enforce network segmentation, and deploy host-based controls to prevent unauthorized software execution. 

  • Emerging Trends: Use of legitimate tools by attackers to blend in with normal activity. 

Actionable Steps: Strengthen defenses by regularly updating and auditing systems, ensuring proper segmentation, and limiting privileges to essential accounts. 

For a detailed analysis, visit the full report here. 

 

 

URL Rewriting Exploited by Threat Actors 

Overview: Threat actors are increasingly abusing URL rewriting, a security feature intended to protect against phishing, to mask malicious links. By compromising legitimate email accounts and using URL rewriting, attackers can disguise phishing URLs as safe, often leveraging the security vendor's domain to gain trust. 

Key Insights: 

  • Mitigations: Enhance vigilance when clicking on links, even those appearing to be from trusted sources. 

  • Emerging Trends: Attackers are exploiting the gap between initial scans and later weaponization of URLs. 

For a detailed analysis, visit the full report here. 

 

 

Exfiltration Tools on the Rise 

A recent analysis by ReliaQuest highlights the growing use of advanced exfiltration tools by cybercriminals to steal sensitive data. Tools like Rclone, WinSCP, and FileZilla are increasingly being leveraged to exfiltrate data from compromised networks. These tools are difficult to detect as they mimic legitimate traffic, making traditional defenses less effective.  

For more details, visit the ReliaQuest article. 

 

 

North Korean IT-Worker Scheme Exposed in Tennessee 

A Nashville resident, Matthew Isaac Knoot, was arrested for facilitating a scheme that funneled hundreds of thousands of dollars to North Korea’s illicit weapons program. Knoot allegedly helped North Korean IT workers secure remote jobs with U.S. and British companies by using stolen identities. The funds, earned through six-figure salaries, were laundered and funneled back to North Korea. This case underscores the growing threat of North Korean cyber operations targeting remote work environments. 

For more details, visit the full article. 

 

 

Top Malware in July 2024: Remcos and RansomHub 

The July 2024 Threat Index highlights a surge in activity by the RansomHub ransomware group and a new Remcos malware campaign. RansomHub continues to dominate as the most prevalent ransomware, accounting for 11% of attacks, while LockBit3 and Akira follow closely behind. A critical security lapse led to the distribution of Remcos via a malicious ZIP file disguised as a CrowdStrike update. Additionally, FakeUpdates remains a persistent threat, utilizing fake browser updates to deploy RATs like AsyncRAT. 

Key Insights: 

  • RansomHub: Leading ransomware, targeting Windows, macOS, Linux, and VMware ESXi. 

  • Remcos Campaign: Exploits a security software update issue, spreading via phishing attacks. 

  • FakeUpdates: Tops the malware list, leveraging compromised websites to deliver Remote Access Trojans. 

For a deeper dive, visit Checkpoint’s Threat Index. 

 

 

Focus on Malware Loaders: Evolving Threats in 2024 

In 2024, nearly 40% of malware incidents involved advanced loaders like SocGholish, GootLoader, and Raspberry Robin. These loaders are pivotal in deploying ransomware and Remote Access Trojans (RATs). SocGholish has notably enhanced its tactics with Python scripts, making it harder to detect, while GootLoader and Raspberry Robin use sophisticated evasion techniques, posing significant threats to critical sectors. 

Key Insights: 

  • SocGholish: Now using Python for persistence. 

  • GootLoader: Continues to exploit legitimate platforms. 

  • Raspberry Robin: Notable for its complex evasion tactics. 

For more detailed insights, visit the full article here. 

Emerging Malware Variants to Watch in 2024 

In recent months, several malware variants have gained prominence in the cyber threat landscape. Notable among them are LummaC2, Rust-based stealers, SocGholish, AsyncRAT, and Oyster, each posing significant risks to organizations across all sectors. 

Key Insights: 

  • LummaC2: A powerful infostealer with increasing reach. 

  • Rust-based Stealers: Notable for their advanced evasion techniques. 

  • SocGholish: Continues to be a persistent threat through fake browser updates. 

  • AsyncRAT: Versatile and widely used for remote access. 

  • Oyster: A backdoor linked to Wizard Spider, signaling targeted attacks. 

For more details, visit ReliaQuest. 

 

 

Exploring the Abuse of Impacket: A Growing Threat 

Impacket, a versatile Python-based toolkit, has become a favored tool among threat actors for lateral movement, privilege escalation, and remote code execution in Windows environments. Threat actors commonly exploit Impacket scripts like psexec.py, smbexec.py, and wmiexec.py to perform these actions stealthily. The toolkit’s ability to mimic legitimate network activity complicates detection, making it a significant challenge for organizations to defend against. 

Key Insights: 

  • psexec.py: Used for executing remote commands with elevated privileges. 

  • smbexec.py: Facilitates lateral movement without additional software installation. 

  • wmiexec.py: Enables stealthy command execution through WMI. 

For more information, visit ReliaQuest. 

Copybara Android Malware: A Rising Threat 

The latest variant of Copybara, an Android malware family, has evolved to use the MQTT protocol for command-and-control (C2) communication, enhancing its stealth. This malware exploits Android’s Accessibility Service for keylogging, screen capturing, and phishing attacks, particularly targeting cryptocurrency exchanges and financial institutions. Copybara’s ability to impersonate legitimate apps makes it especially dangerous. 

Key Insights: 

  • MQTT Protocol: Used for stealthy C2 communication. 

  • Accessibility Service Exploitation: Enables comprehensive device control. 

  • Targeted Attacks: Focus on financial institutions and cryptocurrency exchanges. 

For more details, visit Zscaler. 

 

 

Massive QR Code Phishing Campaign Abuses Microsoft Sway 

A significant phishing campaign has been detected, exploiting Microsoft Sway to host malicious landing pages targeting Microsoft 365 users. The campaign, identified by Netskope Threat Labs, saw a 2,000-fold increase in activity, primarily targeting sectors in Asia and North America. Attackers use QR codes embedded in phishing emails, redirecting victims to malicious sites. This method exploits the weaker security controls of mobile devices and evades email scanners, making it particularly effective and dangerous. 

Key Insights: 

  • Targeted Sectors: Technology, manufacturing, and finance. 

  • Attack Method: QR codes bypass traditional security by embedding in images. 

  • Risk Increase: Heightened threat to mobile device users. 

For more details, visit BleepingComputer. 

Malvertising Campaign Impersonates Google Products 

A recent malvertising campaign has been detected, impersonating various Google products to lure users into tech support scams. These malicious ads, exploiting Google’s Looker Studio, redirect victims to fake Microsoft or Apple warning pages, urging them to call a fraudulent support number. This campaign serves as a reminder to be cautious of online ads, even those that appear to represent trusted brands. 

Key Insights: 

  • Target: Users of Google products. 

  • Tactics: Fake tech support scams via malvertising. 

  • Impact: Potential malware installation and data theft. 

For more details, visit KnowBe4. 

 

 

Deceptive AI: A New Wave of Cyber Threats 

As AI technology advances, cybercriminals are increasingly using AI-generated content (AIGC) to deceive users on social media. This includes creating fake profiles, deepfake videos, and AI-crafted messages that are nearly indistinguishable from real content. A recent survey revealed that a significant portion of users struggle to identify these threats, which can lead to fraud, identity theft, and misinformation. It's crucial to be aware of these risks and stay vigilant online. 

For more details, visit KnowBe4. 

 

 

North Korean IT Workers Target U.S. Tech Companies 

North Korean IT workers are increasingly applying for remote jobs at U.S. tech firms using false identities. They employ AI-generated profile images and fake job histories, aiming to funnel earnings back to the North Korean regime, posing security risks and potential sanctions violations. Key insights include the importance of rigorous background checks and enhanced candidate verification processes to counter this threat. Collaboration with security experts and intelligence sharing is critical. 

For more insights, visit Cinder. 

 

 

Risks in Publicly Exposed GenAI Development Services 

A recent analysis highlights significant security risks in publicly exposed GenAI development services, particularly vector databases and low-code LLM tools. These platforms often handle sensitive data but can be misconfigured, leading to potential data leakage, data poisoning, and exploitation of vulnerabilities. To mitigate these risks, organizations should enforce strict access controls, monitor activity, and ensure all software is updated. 

For a deeper dive, visit Legit Security. 

 

 

How Attackers Exploit Digital Analytics Tools 

Cybercriminals are increasingly weaponizing digital analytics tools like link shorteners, IP geolocation services, and CAPTCHA challenges. These tools, often used for legitimate purposes, are repurposed to obscure malicious activity, evade detection, and tailor attacks to specific targets. Organizations should implement automated analysis and monitor suspicious patterns in these tools to mitigate risks. 

Key Insights: 

  • Threat actors use link shorteners to mask phishing URLs. 

  • IP geolocation data helps attackers target specific regions. 

  • CAPTCHA services are abused to bypass automated security scans. 

Further Reading: Google Cloud Blog 

 

 

GenAI and the Surge of AI-Driven Fraudulent Websites 

 Cybercriminals are increasingly leveraging large language models (LLMs) to scale the creation of fraudulent websites, including phishing sites and fake online stores. Netcraft reports a significant rise in AI-generated content for scams, with a 3.95x increase in such websites from March to August 2024. These AI tools enhance the credibility of scams by improving text quality, making malicious content more convincing and harder to detect. Organizations must enhance their defenses to mitigate the risks posed by this emerging threat. 

Key Insights: 

  • LLMs are used to generate convincing text for scams. 

  • AI-driven scams have seen a sharp increase in recent months. 

  • Monitoring and takedown strategies are essential to combat this trend. 

Further Reading: Netcraft Blog 

 

 

So-Phish-ticated Attacks: A New Wave of Social Engineering 

A sophisticated threat actor is conducting targeted social engineering attacks against over 130 U.S. organizations. These attacks, which include phishing via SMS and direct phone calls, are designed to harvest credentials and one-time passcodes. The use of native English speakers and tactics that bypass traditional security tools makes these attacks particularly challenging to detect.  

Key Insights: 

  • Attacks bypass traditional detection. 

  • Focus on credential harvesting. 

  • Targeting multiple industry verticals. 

Further Reading: GuidePoint Security Blog 

 Originally posted on exploresec.com

In News Tags newsletter, phishing, threat intelligence
Comment

Exploring the newsletter below - Image created with the help of ChatGPT

Security Awareness Newsletter March 2024

April 1, 2024

This is a security newsletter I’ve put together as part of our security awareness program. This leans more towards healthcare and news items that are more general in nature. I’ll have a more technical focused newsletter later this week that’s targeted at security teams. Feel free to take this newsletter and use it internally as part of your security awareness program.

The Great Zoom-Skype-Google Masquerade: Beware of digital doppelgängers. Fake Zoom, Skype, and Google Meet sites are the latest traps set by cyber tricksters.  These spoofed meetings can trick users into downloading harmful software that compromises their computer. Ensure you’re clicking on the real deal to keep those malware masqueraders at bay. Beware of QR codes that will try to steal credentials as part of this type of attack. 

Beware of fake websites mimicking popular brands!: Typosquatting attacks are surging, and cybercriminals are exploiting user mistakes to steal login credentials and spread malware. Typosquatting is where an attacker registers a similar domain to one a person is familiar with. This increases the chance a malicious link will be clicked. 

Small Businesses Hit Hard by Cybercrime: Some social engineering techniques highlighted in the article include: malicious ads; attackers starting a conversation before trying to get the person to take an action; and the move to PDF attachments. These types of attacks help launch ransomware against small businesses. 

Beware of AI-Driven Voice Cloning in Vishing Scams: The Better Business Bureau (BBB) has issued a warning about the rise of voice phishing (vishing) scams utilizing AI-driven voice cloning technology. Scammers can now mimic voices convincingly with just a small audio sample, leading to fraudulent requests for money transfers or sensitive information. Tips to Stay Safe: 

  • Pause Before Acting: Resist the urge to act immediately on unexpected requests, even if they seem to come from a familiar voice. 

  • Verify Directly: Contact the supposed caller using a known, saved number—not the one provided in the suspicious call. 

  • Question the Caller: Ask specific questions that an impostor would struggle to answer correctly. 

  • Secure Your Accounts: Implement multi-factor authentication and verify any changes in information or payment requests. 

Update on Change Healthcare Cyberattack Recovery: Change Healthcare is on track to bring its systems back online by mid-March following a cyberattack that has caused widespread disruption since February 21. The cyberattack has significantly affected healthcare operations nationwide, with providers facing difficulties in payment processing, insurance verification, and clinical data exchange. This highlights why security awareness is so important. Identifying and reporting security threats to the organization is the responsibility of everyone. 

Beware of Tax Season Scams Targeting SMBs and Self-Employed Individuals: As tax season unfolds, a new scam has surfaced targeting small business owners and self-employed individuals. Scammers are using emails to lure victims to a fraudulent site, claiming to offer IRS EIN/Federal tax ID number applications. However, this service is free through the IRS, and the scam site is designed to steal personal information, including social security numbers, creating a significant risk for identity theft and fraud. A Microsoft report identifies green card holders, small business owners, new taxpayers under 25, and older taxpayers over 60 as prime targets for these scams. Check Point has some example phishes in their tax scam article. 

Apple Users Beware: "MFA Bombing" Phishing Attacks on the Rise: Leveraging Apple's password reset system attackers can bombard users with password reset prompts. If a person clicks "allow" on one of the prompts, the attackers can gain access to the user's account. The attackers may also call the person pretending to be Apple support. Some ways to protect yourself from this attack include not clicking on any of the prompts and contacting Apple directly if you receive a suspicious call. 

In News Tags newsletter, Security Awareness, social engineering, Typosquatting, AI, Healthcare, tax fraud, Multi-Factor Authentication
Comment

Latest PoDCASTS

Featured
Nov 25, 2025
How to Close the Cybersecurity Skills Gap with a Student Powered SOC
Nov 25, 2025
Nov 25, 2025
Nov 18, 2025
What is the 2025 State of the API Report From Postman?
Nov 18, 2025
Nov 18, 2025
Nov 11, 2025
How AI Will Transform Society and Affect the Cybersecurity Field
Nov 11, 2025
Nov 11, 2025
Nov 4, 2025
[RERELEASE] How Macs get Malware
Nov 4, 2025
Nov 4, 2025
Oct 28, 2025
[RERELEASE] Why communication in infosec is important - Part 2
Oct 28, 2025
Oct 28, 2025
Oct 21, 2025
[RERELEASE] Why communication in infosec is important
Oct 21, 2025
Oct 21, 2025
Oct 14, 2025
Exploring AI, APIs, and the Social Engineering of LLMs
Oct 14, 2025
Oct 14, 2025
Oct 7, 2025
How to Prepare a Presentation for a Cybersecurity Conference
Oct 7, 2025
Oct 7, 2025
Sep 23, 2025
Exploring the Rogue AI Agent Threat with Sam Chehab
Sep 23, 2025
Sep 23, 2025
Sep 16, 2025
A conversation with Kyle Andrus on Info Stealers and Supply Chain Attacks
Sep 16, 2025
Sep 16, 2025

Powered by Squarespace