CYBERSECURITY THREAT INTELLIGENCE Weekly REPORT

  • Home
  • Blog
  • CYBERSECURITY THREAT INTELLIGENCE Weekly REPORT
CYBERSECURITY THREAT INTELLIGENCE Weekly REPORT

I. EXECUTIVE SUMMARY

The week of December 22–29, 2025 saw rapid exploitation of newly disclosed flaws, continued evolution of nation-state espionage tooling, and impactful supply-chain and credential-theft campaigns.

Key Highlights

  • MongoBleed (CVE-2025-14847): A high-severity MongoDB information-disclosure vulnerability was under active exploitation within days of public disclosure, affecting over 87 000 internet-exposed instances.
  • Trust Wallet Extension Breach: A malicious code injection into the Chrome extension siphoned ~$7 million in cryptocurrency across nearly 2 600 wallets before remediation.
  • Mustang Panda & Evasive Panda: Chinese APT groups deployed signed kernel-mode rootkits and DNS-poisoning techniques to deliver ToneShell and MgBot backdoors in Southeast Asia and beyond.
  • LangChain “LangGrinch” (CVE-2025-68664): A critical serialization-injection flaw in the LangChain Core library could allow secret theft and prompt manipulation in AI applications.
  • 27 Malicious npm Packages: A sustained spear-phishing campaign abused the npm registry to host fake document-sharing and Microsoft sign-in lures targeting critical-infrastructure personnel.

Dominant Trends

  • Time-to-Exploit Collapse: Vendors and defenders face near-zero-day windows as attackers weaponize disclosures within hours.
  • AI-Supply-Chain Targets: Emerging flaws in AI/ML frameworks highlight a new attack surface as enterprises rush to integrate LLM tooling.
  • Signature Evasion via Signed Rootkits: State actors increasingly leverage stolen certificates to cloak kernel-mode payloads, bypassing driver-signature checks.

II. GLOBAL CYBER THREAT LANDSCAPE OVERVIEW

The final week of 2025 underscored the accelerating cadence of threat actor agility, with adversaries weaponizing fresh disclosures before many organizations could even inventory affected assets. Critical-infrastructure sectors—energy, manufacturing, healthcare—remained prime targets for both espionage and financially motivated campaigns. Nation-state groups refined stealthy delivery mechanisms, while cybercriminal syndicates demonstrated renewed focus on cryptocurrency platforms and developer-centric registries (e.g., npm). The convergence of AI adoption and security gaps in AI frameworks introduced a novel risk vector, prompting calls for “AI-native” security controls.

III. NOTABLE INCIDENTS AND DATA BREACHES

This week witnessed several significant incidents that underscore the diverse and persistent nature of cyber threats

  • Trust Wallet Chrome Extension (Dec 26)
    Malicious code injected into version 2.68 led to unauthorized transactions draining ~$7 million from 2 596 affected wallets. Trust Wallet issued v2.69 and committed to full refunds.
  • Coupang Data Breach (Dec 29)
    South Korea’s largest retailer will pay $1.17 billion to compensate 33.7 million customers exposed in a breach discovered last month.
  • Korean Air Employee Data Exposure (Dec 29)
    A hack of Korean Air Catering & Duty-Free subsidiary exposed personal data of thousands of Korean Air staff.
  • Romanian Energy Provider Ransomware (Dec 26)
    Oltenia Energy Complex, Romania’s largest coal-based energy producer, suffered a Gentlemen ransomware attack that disrupted IT systems on Boxing Day.
  • WIRED Alleged Database Leak (Dec 28)
    A hacker claimed to leak 2.3 million WIRED subscriber records and threatened further dumps of up to 40 million Condé Nast records.
  • Rainbow Six Siege Breach (Dec 28)
    Ubisoft’s R6 servers were abused to manipulate in-game currency and moderation feeds, resulting in billions of illicit credits across player accounts.

IV. Comprehensive Incident Summary Table

DateIncidentAffected OrganizationImpact
2025-12-26Trust Wallet Extension Malicious CodeTrust Wallet$7 M stolen across 2 596 wallets; v2.68 → v2.69 patch issued
2025-12-29Coupang Customer Data Breach CompensationCoupang33.7 M customers; $1.17 B compensation fund
2025-12-29Korean Air Employee Data ExposureKorean Air Catering & Duty-FreeThousands of employee records exposed
2025-12-26Gentlemen Ransomware on Energy ProviderOltenia Energy ComplexIT infrastructure disrupted
2025-12-28Alleged WIRED Subscriber Database LeakCondé Nast (WIRED)2.3 M records leaked; up to 40 M threatened
2025-12-28Rainbow Six Siege In-Game Currency ManipulationUbisoftBillions of illicit R6 credits distributed

V. Current Threat Landscape Analysis

Emerging Trends

  • Race-to-Exploit: The MongoBleed campaign exemplifies how adversaries leverage automation to scan and exploit flaws within hours of publication, outpacing many patch-management cycles.
  • AI Framework Attacks: CVE-2025-68664 in LangChain Core highlights that as organizations rush LLM integrations, security reviews lag—exposing systems to classic injection flaws repurposed for AI contexts.
  • Kernel-Mode Evasion: Mustang Panda’s use of a signed, minifilter-based rootkit demonstrates an increasing barrier to detection, demanding endpoint solutions that verify driver behavior beyond signature validity.

VI. Critical Vulnerabilities and CVEs

CVE IDDescriptionSeverity (CVSS)Affected Products/VersionsMitigation
CVE-2025-14847MongoDB zlib message decompression memory leak (MongoBleed)8.7MongoDB 8.2.0–8.2.3, 8.0.0–8.0.16, 7.0.0–7.0.26, 6.0.0–6.0.26, 5.0.0–5.0.31, 4.4.0–4.4.29, olderUpgrade to patched release; disable zlib compression if patching delayed.
CVE-2025-68664LangChain Core dumps()/dumpd() serialization injection9.3LangChain Core prior to patched versionUpdate LangChain Core; sanitize free-form dictionaries before serialization.
CVE-2025-14273Mattermost Jira plugin auth bypass8.1Mattermost ≤11.1.0, ≤11.0.5, ≤10.12.3, ≤10.11.7; Jira plugin ≤4.4.0Upgrade Mattermost and Jira plugin; enforce API key validation.
CVE-2025-62190Mattermost Calls CSRF protection missing6.5Mattermost Calls ≤1.10.0; Mattermost 11.0.x–10.11.xApply plugin updates; implement CSRF checks.
CVE-2025-62690Mattermost /error page open redirect6.1Mattermost 10.11.x ≤10.11.4Patch to validate redirect URLs on error page.

VII. Threat Actor Activities

Mustang Panda (Bronze University, Temp.Overbatch)

Objective: Cyber espionage against government entities in Southeast/East Asia.

TTPs:

  • Delivers signed kernel-mode rootkit via minifilter driver to inject TONESHELL backdoor.
  • Uses stolen/leaked certificates to bypass driver-signature enforcement.

Target Sectors: Government, diplomatic, energy.

Known Campaigns: Mid-2025 ToneShell variant deployment in Myanmar and Thailand.

Evasive Panda (Bronze Highland, StormBamboo)

Objective: Intelligence collection in Türkiye, China, India.

TTPs:

  • DNS-poisoning AitM attacks to deliver MgBot loader.
  • Encrypted payload staging on attacker-controlled servers.

Target Sectors: Diplomatic, telecommunications, research.

Known Campaigns: Observed Nov 2022–Nov 2024; resurges in late 2025.

VIII. Malware Analysis

TONESHELL

  • Capabilities: Reverse shell, payload downloader, process injection.
  • Delivery Method: Kernel-mode rootkit injects into system processes; protected by minifilter driver.
  • Affected Platforms: Windows.
  • Detection: Monitor for unsigned minifilter drivers; verify certificate chains.

MgBot

  • Capabilities: Backdoor with modular plugins for keylogging, file exfiltration, screen capture.
  • Delivery Method: DNS-poisoning AitM attacks; staged payload retrieval.
  • Affected Platforms: Windows.
  • Detection: Anomaly-based DNS monitoring; TLS/SSL inspection for C2 traffic.

KMSAuto Clipboard Stealer

  • Capabilities: Hijacks clipboard to replace cryptocurrency wallet addresses.
  • Delivery Method: Bundled with pirated Windows/Office activators.
  • Affected Platforms: Windows.
  • Detection: Application whitelisting; monitor clipboard access.

IX. Recommendations

For Technical Audiences

Immediate Actions (24–48 Hours)

  • Patch MongoDB instances per vendor guidance for CVE-2025-14847; disable zlib compression if patching delayed.
  • Review all LangChain Core deployments; apply patches for CVE-2025-68664.
  • Upgrade Mattermost instances to address multiple CSRF and redirect flaws.
  • Audit browser extensions in enterprise environments; block Trust Wallet v2.68.

Strategic Improvements

  • Implement kernel-mode driver monitoring to detect signed-but-malicious minifilter activity.
  • Deploy DNS-over-HTTPS/TLS to mitigate DNS-poisoning AitM vectors.
  • Integrate AI/ML security reviews into DevSecOps pipelines for LLM-based applications.

For Non-Technical Audiences

Security Awareness

  • Exercise heightened caution with browser extensions; only install from official, verified sources.
  • Report suspicious emails prompting extension updates or cryptocurrency transactions.

Incident Response Preparedness

  • Ensure clear reporting channels for suspicious extension behavior or unexpected wallet drains.
  • Regularly review and update security policies governing third-party software usage.

X. Analyst Notes

The convergence of near-zero-day exploitation and AI-supply-chain vulnerabilities signals a paradigm shift: adversaries now weaponize disclosures faster than many patch cycles, while simultaneously targeting emerging AI frameworks. We anticipate a rise in “AI-poisoning” attacks—where malicious model training data or compromised LLM libraries facilitate stealthy persistence. The continued use of stolen certificates to sign kernel-mode payloads suggests that driver attestation alone is insufficient; behavioral analysis and runtime integrity checks will be critical. Organizations should prepare for a landscape where the distinction between legitimate and malicious code blurs further, requiring zero-trust architectures and continuous validation.

XI. CONTACT INFORMATION

For further inquiries or guidance regarding this report, please contact the Meraal Cyber Security (MCS) Threat Intelligence Team.

Note on Sources and Intelligence: This report synthesizes information from various credible sources, including public advisories from organizations like CISA, MITRE, and MS-ISAC, alongside internal analysis and emerging threat intelligence. Efforts have been made to differentiate between confirmed intelligence and speculative or unverified information to maintain accuracy and credibility.

Leave a Reply

Your email address will not be published. Required fields are marked *