Skip to content

Cyber Threat Weekly – #63

Derek Krein
5 min read

The week of January 27th through February 2nd, around 416 cyber news articles were reviewed.  A moderate amount of cyber threat trends and adversarial behavior news to share.  Been thinkin, complexity is the enemy of security.

How do we take a step back, consolidate, automate, and simplify our security programs?  It feels like technology is driving our security programs instead of engineering and architecture.  Are we focused on the critical things that will minimize business impact?

Let’s start with malvertising Bing and Microsoft ads on Google.  Possible backdoor in popular medical equipment.  Researchers find what appears to be split testing of ‘download’ vs ‘ClickFix’ in DarkGate campaign.

New pro-Russian hacktivist group hacking oil and gas facility control panels.  Adversaries stayed on target for two months.  Google AI abused by nation state threat actors.  Multi-stage browser syncjacking attack can lead to device takeover. 

Cisco Talos shares incident response trends for Q4 2024.  Multi-layered traffic distribution system (TDS) is used by multiple threat actors.  Hidden Lazarus group admin layer for C2 servers found.  Researchers observe SimpleHelp RMM software exploitation.

Attacker velocity is increasing, breakout times shrink.  Recorded Future 2024 Annual Report. 


Broken Record Alert: Please patch N-day bugs!!!

Known exploited software flaws are one of the top 5 initial access vectors.  We continue to share n-day vulnerabilities being actively exploited.  You can prioritize starting with the CISA known exploited vulnerability (KEV) catalog. 

A close #2 priority is flaws with weaponized proof of concept (PoC) code available.  Exploit chances are higher with weaponized PoC code available.  If you do nothing else with patching, have an emergency 24-to-48-hour patching process for exploited and weaponized PoC code available vulnerabilities.

You should consider what is exposed to the Internet.  Architecture and zero trust network access (ZTNA) can go a long way to minimizing the number of devices exposed to the Internet. 


CISA Known Exploited Vulnerabilities – January 27th to February 2nd:

CVE-2025-24085 – Apple Multiple Products Use-After-Free Vulnerability:
Apple iOS, macOS, and other Apple products affected - could allow a malicious application to elevate privileges.


Google Ads Malvertising Bing Ads / Microsoft Ads

New target, new lure, Microsoft Ads accounts.  Google was abused in a similar malvertising campaign we have covered in the past, utilizing the same redirects that hide the malicious websites.  We are seeing similar behavior with different lures and targets consistently.

https://www.malwarebytes.com/blog/news/2025/01/microsoft-advertisers-phished-via-malicious-google-ads


Popular Medical Equipment has Backdoor

FDA and CISA warn that the Contec CMS8000 and Epismed MN-120 patient monitors could put patients at risk.  There is a backdoor in the firmware that reports back to a hardcoded IP address.  Multiple versions of firmware were tested, all containing the backdoor code.  The onus is on IT / security departments to ensure proper operation of IoT, IoMT, OT, and other devices on the network.

https://www.csoonline.com/article/3814810/backdoor-in-chinese-made-healthcare-monitoring-device-leaks-patient-data.html

https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication

https://www.cisa.gov/sites/default/files/2025-01/fact-sheet-contec-cms8000-contains-a-backdoor-508c.pdf


DarkGate Campaign Testing ‘Download’ vs ‘ClickFix’

Split-testing ads, landing pages, and other portions of a campaign are popular for marketers optimizing their campaigns.  Apparently, cybercriminals are taking notice and testing their malvertising campaigns to see what works best.

https://www.malwarebytes.com/blog/news/2025/01/clickfix-vs-traditional-download-in-new-darkgate-campaign


Pro-Russian Hackivists ‘Sector 16’, Breaching Critical Infrastructure

This group, like Z-Pentest is hacking into supervisory control and data acquisition (SCADA) systems.  Both groups are posting screen recordings on the dark web showing the groups tampering with critical control panels.  Securing critical OT systems should be a high priority.

https://thecyberexpress.com/new-russian-threat-group-hacks-u-s-energy/


Data Pilfered Over Two Months

Mizuno USA detected suspicious activity in its network environment in November.  An investigation found that systems were accessed, and files stolen by unauthorized personnel over a two-month period.  The lesson here is that most attacks are persistent threats, both cybercriminals and nation states use similar techniques and behavior.  Yesterday’s nation state attack is tomorrow’s commodity attack.

https://www.bleepingcomputer.com/news/security/mizuno-usa-says-hackers-stayed-in-its-network-for-two-months/


Nation States Use Google AI to Enable Operations

The good news is that nation states are not using AI to create novel capabilities.  They are using it to bolster multiple aspects of attack campaigns.  Productivity gains are being made, but currently that’s as far as the abuse goes.

https://thehackernews.com/2025/01/google-over-57-nation-state-threat.html

https://cloud.google.com/blog/topics/threat-intelligence/adversarial-misuse-generative-ai


Browser Syncjacking using Chrome Extensions

Researchers discovered a multi-stage attack vector that can lead to device take over.  Using malicious user profiles, a Chrome extension, and social engineering to install an enrollment token, attackers can compromise a device.

https://www.bleepingcomputer.com/news/security/new-syncjacking-attack-hijacks-devices-using-chrome-extensions/

https://labs.sqrx.com/browser-syncjacking-cc602ea0cbd0


Talos Incident Response Trends Q4 2024

A sharp uptick in publicly available web shell usage against vulnerable or unpatched web applications.  Ransomware dwell times were quite high this quarter, from 17 to 44 days.  Ransomware actors utilized compromised valid accounts in 75% of engagements this quarter.  Persistent threats continue as nations state and criminal threat actor behavior continues to blur.

https://blog.talosintelligence.com/talos-ir-trends-q4-2024/


Researchers Share Multi-Layer TDS Infrastructure Findings

Various threat actors use the multi-layer TDS tracked as TAG-124.  Compromised WordPress sites, payload servers, a possible management server, central server, an additional panel, and other components make up this TDS.

https://www.recordedfuture.com/research/tag-124-multi-layered-tds-infrastructure-extensive-user-base

https://go.recordedfuture.com/hubfs/reports/cta-2025-0130.pdf


Lazarus Group Using Hidden Admin Layer to Manage C2 Servers

Newly discovered infrastructure has been tied to Lazarus Group.  It’s used to manage compromised systems, control payload delivery, and manage exfiltrated data.  While conducting operations, Astrill VPNs and proxies were used to conceal access to C2 servers.

https://www.darkreading.com/cyberattacks-data-breaches/researchers-uncover-lazarus-admin-layer-c2-servers

https://securityscorecard.com/wp-content/uploads/2025/01/Operation-Phantom-Circuit-Report_012725_03.pdf


Simple Help RMM Tool Actively Exploited

Researchers have observed initial access to victim devices through an unapproved SimpleHelp server.  A session is used to enumerate accounts and domain info.  Recent bugs fixed could be the culprit but that’s not confirmed.

https://www.securityweek.com/simplehelp-remote-access-software-exploited-in-attacks/

https://arcticwolf.com/resources/blog-uk/arctic-wolf-observes-campaign-exploiting-simplehelp-rmm-software-initial-access/


Adversaries Attack Speed Increases, Breakout Times Drop

Researchers share observations on attack velocity and drivers contributing to attacker’s speed.  Infostealer data and initial access brokers listings grow.  Social engineering is a big contributor to speedy attacks. 

https://www.infosecurity-magazine.com/news/breakout-time-accelerates-22/

https://www.reliaquest.com/blog/racing-the-clock-outpacing-accelerating-attacks/


Recorded Future 2024 Annual Report

Personal devices are increasingly targeted by infostealer malware.  New ransomware families continue to grow in numbers.  RMM tool usage is growing significantly in attack campaigns.  Defense evasion, fastest growing behavior.

https://www.recordedfuture.com/research/2024-annual-report

https://go.recordedfuture.com/hubfs/reports/cta-2025-0128.pdf


Member Reactions
Reactions are loading...

Sign in to leave reactions on posts

Newsletter
Comments

Sign in to join the conversation.
Just enter your email below to receive a login link.


Related Posts

Members Public

Cyber Threat Weekly – #62

The week of January 20th through January 26th, around 369 cyber news articles were reviewed.  A light amount of cyber threat trends and adversarial behavior news to share.  Fundamentals performed with excellence wins championships.  In the case of cybersecurity, fundamentals performed with excellence can minimize organizational impact from cyber-attacks.  Simplicity

Members Public

Cyber Threat Weekly – #61

The week of January 13th through January 19th, roughly 408 cyber news articles were reviewed.  A light amount of cyber threat trends and adversarial behavior news to share.  Let’s start with researchers find a NTLMv1 bypass tactic. Fortinet auth bypass bug and threat actors dump Fortinet config data.  Typosquatting

Members Public

Cyber Threat Weekly – #60

The week of January 6th through January 12th, roughly 358 cyber news articles were reviewed.  A light amount of cyber threat trends and adversarial behavior news to share.  This week it looks like it’s mostly social engineering behavior to report.  Let’s start with taking advantage of the familiar,