Weekly Cybersecurity Threat Advisory

  • Home
  • Blog
  • Weekly Cybersecurity Threat Advisory

Threat Landscape Summary (April 28 – May 5, 2025)

1. Report Overview

The global cybersecurity environment exhibited increased threat activity during the reporting period, driven by a surge in ransomware attacks, active exploitation of critical vulnerabilities, third-party supply chain risks, and emerging AI-enhanced threats. Healthcare, finance, government, and critical infrastructure sectors were significantly affected. Threat actors demonstrated evolving tactics including credential abuse, sophisticated phishing campaigns, Linux-targeted malware, and data exfiltration through compromised vendors. This report details the week’s key incidents, vulnerabilities, threat actor behaviors, malware trends, and provides actionable recommendations for defense enhancement.

2. Top 5 Security Incidents

DateOrganizationThreatSectorImpact
Apr 30Yale New Haven HealthData BreachHealthcare5.5M individuals’ data compromised
May 02VeriSource ServicesData BreachServices4M individuals’ data exposed
May 01Blue Shield of CaliforniaData BreachHealthcare4.7M members affected
Apr 29HertzData BreachTravel1 M+ customers notified
May 03Marks & SpencerRansomwareRetailDisrupted deliveries, online transactions

Other notable incidents:

  • Hitachi Vantara: Ransomware attack by the Akira group
  • Epicenter K (Ukraine): Cyberattack disrupting operations
  • Doctor’s Hospital (Cayman Islands): Systems crippled by cyberattack
  • PJM Interconnection LLC: Breach claimed by threat actor “l33tfg”
  • U.S. Cyber Command: Chinese malware discovered in Latin American networks

3. New Critical Vulnerabilities (CVEs)

CVE IDSeverityProductExploited?Action Needed
CVE-2025-29824CriticalWindows Common Log File System DriverYesPatch Immediately
CVE-2025-22457CriticalIvanti Connect SecureYesPatch Immediately
CVE-2025-24813CriticalApache TomcatYesPatch Immediately
CVE-2025-32432CriticalCraft CMSYesPatch Immediately
CVE-2025-1976CriticalBroadcom Brocade Fabric OSYesPatch Immediately
CVE-2025-42599CriticalQualitia Active! MailYesPatch Immediately
CVE-2025-3928CriticalCommvault Web ServerYesPatch Immediately
CVE-2025-31324CriticalSAP NetWeaverYesPatch Immediately

Vendor Updates:

  • Microsoft: 121 vulnerabilities patched in April, including 1 zero-day and 11 critical flaws
  • Apple: “Airborne” vulnerabilities affecting macOS, iOS, tvOS, iPadOS, and visionOS
  • Multiple critical RCE vulnerabilities in Windows LDAP, RDP, TCP/IP, and Hyper-V
  • Critical RCE flaws in Microsoft Office products

4. Malware Spotlight

  • FOG Ransomware:
    • Exploits compromised SonicWall VPN credentials
    • Uses publicly available tools for attack stages
    • Shows operational connections to Akira ransomware
  • Gunra Ransomware:
    • New strain targeting Windows systems
    • Appends “.ENCRT” extension to encrypted files
    • Employs anti-analysis techniques
    • Attempts to delete Volume Shadow Copies
  • Brain Cipher Ransomware:
    • Uses double-extortion model
    • Employs AES-256 and RSA-2048 encryption
    • Targets critical infrastructure sectors
  • Crocodilus:
    • New Android banking trojan
    • Targets cryptocurrency wallets
    • Uses deceptive overlays to steal seed phrases
    • Includes extensive RAT capabilities
  • Other Active Malware:
    • TRAILBLAZE and BRUSHFIRE (deployed by UNC5221)
    • Akira, RansomHub, and Cl0p ransomware

5. Threat Actor Activity Highlights

  • Ransomware Groups:
    • RansomHub: Most active during the reporting period
    • Cl0p: Significant resurgence, exploiting Cleo file transfer vulnerabilities
    • Black Basta: Leveraging AI tools like ChatGPT for malicious operations
    • Akira: Claimed responsibility for Hitachi Vantara attack
    • Brain Cipher: Targeting critical infrastructure sectors
  • Nation-State Actors:
    • UNC5221 (China-nexus): Exploiting Ivanti vulnerability (CVE-2025-22457)
    • Billbug/Lotus Blossom: Targeting Southeast Asian entities
    • UTA0352/UTA0355 (Russia-linked): Social engineering via Signal and WhatsApp
    • APT28 (Russian GRU): Attributed to cyber espionage against French entities
    • Iranian Islamic Revolutionary Guard Corps: “Peach Sandstorm” campaign targeting aerospace
  • Emerging Tactics:
    • AI-enhanced malware creation and evasion
    • Sophisticated supply chain attacks
    • Mobile malware targeting cryptocurrency assets
    • Geopolitically motivated targeting of critical infrastructure

6. Actionable Recommendations

Technical Recommendations:

  • Implement a robust patch management program, prioritizing actively exploited vulnerabilities
  • Secure remote access points with strong multi-factor authentication
  • Deploy and maintain endpoint detection and response (EDR) solutions
  • Implement network segmentation to limit lateral movement
  • Conduct regular vulnerability assessments
  • Monitor threat intelligence feeds from reputable sources
  • Review and update incident response plans
  • Apply specific recommendations for ICS as outlined in CISA advisories
  • Patch Apple devices to mitigate AirBorne vulnerabilities

Non-Technical Recommendations:

  • Conduct regular phishing awareness training
  • Reinforce password security and multi-factor authentication
  • Encourage prompt reporting of suspicious activity
  • Educate on third-party vendor security risks
  • Train on proper handling of sensitive data
  • Create awareness of new ransomware tactics

CONTACT INFORMATION

For further inquiries or guidance regarding this report, please contact the Meraal Cyber Security (MCS) Threat Intelligence Team.

Note on Sources and Intelligence: This report synthesizes information from various credible sources, including public advisories from organizations like CISA, MITRE, and MS-ISAC, alongside internal analysis and emerging threat intelligence. Efforts have been made to differentiate between confirmed intelligence and speculative or unverified information to maintain accuracy and credibility.

Leave a Reply

Your email address will not be published. Required fields are marked *