Threat Landscape Summary (22 – 29 December, 2025)
I. EXECUTIVE SUMMARY
The week of December 22–29, 2025 saw rapid exploitation of newly disclosed flaws, continued evolution of nation-state espionage tooling, and impactful supply-chain and credential-theft campaigns.
Key Highlights
Dominant Trends
II. GLOBAL CYBER THREAT LANDSCAPE OVERVIEW
The final week of 2025 underscored the accelerating cadence of threat actor agility, with adversaries weaponizing fresh disclosures before many organizations could even inventory affected assets. Critical-infrastructure sectors—energy, manufacturing, healthcare—remained prime targets for both espionage and financially motivated campaigns. Nation-state groups refined stealthy delivery mechanisms, while cybercriminal syndicates demonstrated renewed focus on cryptocurrency platforms and developer-centric registries (e.g., npm). The convergence of AI adoption and security gaps in AI frameworks introduced a novel risk vector, prompting calls for “AI-native” security controls.
III. NOTABLE INCIDENTS AND DATA BREACHES
This week witnessed several significant incidents that underscore the diverse and persistent nature of cyber threats
IV. Comprehensive Incident Summary Table
| Date | Incident | Affected Organization | Impact |
| 2025-12-26 | Trust Wallet Extension Malicious Code | Trust Wallet | $7 M stolen across 2 596 wallets; v2.68 → v2.69 patch issued |
| 2025-12-29 | Coupang Customer Data Breach Compensation | Coupang | 33.7 M customers; $1.17 B compensation fund |
| 2025-12-29 | Korean Air Employee Data Exposure | Korean Air Catering & Duty-Free | Thousands of employee records exposed |
| 2025-12-26 | Gentlemen Ransomware on Energy Provider | Oltenia Energy Complex | IT infrastructure disrupted |
| 2025-12-28 | Alleged WIRED Subscriber Database Leak | Condé Nast (WIRED) | 2.3 M records leaked; up to 40 M threatened |
| 2025-12-28 | Rainbow Six Siege In-Game Currency Manipulation | Ubisoft | Billions of illicit R6 credits distributed |
V. Current Threat Landscape Analysis
Emerging Trends
VI. Critical Vulnerabilities and CVEs
| CVE ID | Description | Severity (CVSS) | Affected Products/Versions | Mitigation |
| CVE-2025-14847 | MongoDB zlib message decompression memory leak (MongoBleed) | 8.7 | MongoDB 8.2.0–8.2.3, 8.0.0–8.0.16, 7.0.0–7.0.26, 6.0.0–6.0.26, 5.0.0–5.0.31, 4.4.0–4.4.29, older | Upgrade to patched release; disable zlib compression if patching delayed. |
| CVE-2025-68664 | LangChain Core dumps()/dumpd() serialization injection | 9.3 | LangChain Core prior to patched version | Update LangChain Core; sanitize free-form dictionaries before serialization. |
| CVE-2025-14273 | Mattermost Jira plugin auth bypass | 8.1 | Mattermost ≤11.1.0, ≤11.0.5, ≤10.12.3, ≤10.11.7; Jira plugin ≤4.4.0 | Upgrade Mattermost and Jira plugin; enforce API key validation. |
| CVE-2025-62190 | Mattermost Calls CSRF protection missing | 6.5 | Mattermost Calls ≤1.10.0; Mattermost 11.0.x–10.11.x | Apply plugin updates; implement CSRF checks. |
| CVE-2025-62690 | Mattermost /error page open redirect | 6.1 | Mattermost 10.11.x ≤10.11.4 | Patch to validate redirect URLs on error page. |
VII. Threat Actor Activities
Mustang Panda (Bronze University, Temp.Overbatch)
Objective: Cyber espionage against government entities in Southeast/East Asia.
TTPs:
Target Sectors: Government, diplomatic, energy.
Known Campaigns: Mid-2025 ToneShell variant deployment in Myanmar and Thailand.
Evasive Panda (Bronze Highland, StormBamboo)
Objective: Intelligence collection in Türkiye, China, India.
TTPs:
Target Sectors: Diplomatic, telecommunications, research.
Known Campaigns: Observed Nov 2022–Nov 2024; resurges in late 2025.
VIII. Malware Analysis
TONESHELL
MgBot
KMSAuto Clipboard Stealer
IX. Recommendations
For Technical Audiences
Immediate Actions (24–48 Hours)
Strategic Improvements
For Non-Technical Audiences
Security Awareness
Incident Response Preparedness
X. Analyst Notes
The convergence of near-zero-day exploitation and AI-supply-chain vulnerabilities signals a paradigm shift: adversaries now weaponize disclosures faster than many patch cycles, while simultaneously targeting emerging AI frameworks. We anticipate a rise in “AI-poisoning” attacks—where malicious model training data or compromised LLM libraries facilitate stealthy persistence. The continued use of stolen certificates to sign kernel-mode payloads suggests that driver attestation alone is insufficient; behavioral analysis and runtime integrity checks will be critical. Organizations should prepare for a landscape where the distinction between legitimate and malicious code blurs further, requiring zero-trust architectures and continuous validation.
XI. CONTACT INFORMATION
For further inquiries or guidance regarding this report, please contact the Meraal Cyber Security (MCS) Threat Intelligence Team.
Note on Sources and Intelligence: This report synthesizes information from various credible sources, including public advisories from organizations like CISA, MITRE, and MS-ISAC, alongside internal analysis and emerging threat intelligence. Efforts have been made to differentiate between confirmed intelligence and speculative or unverified information to maintain accuracy and credibility.