Weekly Cybersecurity Threat Advisory

  • Home
  • Blog
  • Weekly Cybersecurity Threat Advisory

Threat Landscape Summary (May 12 – 19, 2025)

1. Executive Summary

This report provides a concise overview of the cybersecurity threat landscape from May 12th to May 19th, 2025. The period was marked by the continued dominance of ransomware and data extortion groups, a significant number of actively exploited zero-day and critical vulnerabilities, and persistent activity from nation-state and cybercrime actors. AI-driven threats, particularly in social engineering and malware evasion, remain a growing concern. Organizations across all sectors, especially critical infrastructure and those handling sensitive data, faced elevated risks. Proactive patching, enhanced detection capabilities, and robust incident response planning are essential to navigate this complex environment.

2. Current Threat Landscape

The cybersecurity landscape during this reporting period remained highly dynamic and increasingly complex. AI continues to reshape both defensive and offensive capabilities, with threat actors leveraging generative AI for more convincing social engineering attacks, such as sophisticated phishing emails, voice cloning, and deepfake videos. This trend makes traditional detection methods more challenging.  

Ransomware and data extortion continue to be prime threats, with a record number of victims posted to data leak sites in the first quarter of 2025. The frequency and sophistication of these attacks are on the rise. Beyond encryption, attackers are increasingly employing double and even anticipating triple extortion tactics, which may include data destruction or Distributed Denial-of-Service (DDoS) attacks. DDoS attacks themselves remain a formidable threat, capable of overwhelming networks and services.  

Supply chain vulnerabilities continue to pose a significant risk, with complexity and lack of visibility into vendor security practices identified as major barriers to cyber resilience. Geopolitical tensions also continue to drive cyber operations, influencing the targeting and tactics of various threat actors. Insider threats, whether malicious or accidental, also contribute to the risk landscape.  

3. Notable Security Incidents

The week of May 12th to May 19th saw several significant security incidents reported across various sectors globally. These incidents highlight the diverse range of threats organizations currently face:

Date ReportedAffected EntityLocationType of IncidentThreat Actor (if known)Data Compromised (if known)
May 16, 2025CoinbaseUnknownData Theft, Extortion AttemptUnknownUser data
May 15, 2025Nucor (Steelmaker)USACyber Incident (Production Halted)UnknownUnknown
May 14, 2025Granicus (GovDelivery email system)UnknownCompromiseUnknownUnknown
May 14, 2025Central Point School District 6Oregon, USACyber AttackUnknownUnknown
May 13, 2025Empresas Municipales de Cali (Emcali)ColombiaCyber Attack (System Shutdown)UnknownUnknown
May 12, 2025Drug Safety Testing CenterHong KongRansomwareUnknownUnknown
May 12, 2025Lekardo ClinicRussiaCyber AttackPro-Ukraine GroupUnknown
May 12, 2025Alabama State GovernmentUSACyber Event InvestigationUnknownUnknown
May 2025 (Disclosed/Reported)TeleMessage (US Officials’ App)UnknownData BreachHackerUnencrypted message data, names, and contact info
May 2025 (Disclosed/Reported)SogoTrade, Inc.USAData Breach (Occurred May 2024)UnknownNames, financial account numbers, SSNs, tax IDs
May 2025 (Disclosed/Reported)SAP NetWeaver UsersGlobalExploitationChina-linked APTs, Russian Ransomware GroupsUnknown (Potential system compromise)
May 2025 (Disclosed/Reported)PowerSchool UsersUSA, CanadaExtortion Attempts (Following Dec 2024 Breach)HackersSSNs, medical records, special education info
May 2025 (Disclosed/Reported)M&S (Marks & Spencer)UKCyber Attack (Operational Disruption)Scattered Spider (Likely)Basic contact info, dates of birth, order histories, possibly reference numbers
May 2025 (Reported)Arla (Dairy Cooperative)GermanyCyber IncidentUnknownUnknown
May 2025 (Reported)Prismecs (Power Plant Operator)SwitzerlandEmail Account HackedUnknownUnknown
May 2025 (Reported)Berliner Verkehrsbetriebe (BVG)GermanyCyber Attack (Service Provider)UnknownUnknown
May 2025 (Reported)Berufsbildende Schule WesterburgGermanyCyber AttackUnknownUnknown
May 2025 (Reported)Outwood Academy AcklamUKCyber Attack, Data Breach WarningUnknownUnknown
May 2025 (Reported)DiorFranceUnauthorized Access, Data Breach DisclosureUnknownUnknown

4. New Vulnerabilities and Critical CVEs

The week was notable for the release of Microsoft’s May 2025 Patch Tuesday updates on May 13th, which addressed a significant number of vulnerabilities, including several actively exploited zero-days.  

Key vulnerabilities addressed and/or actively exploited include:

  • Microsoft Patch Tuesday (May 13, 2025): Microsoft released 72-75 patches covering vulnerabilities across Windows, Office, Azure, and other products. Five to seven zero-day vulnerabilities were reported as actively exploited in the wild.
    • Windows Common Log File System (CLFS) Driver: Two Elevation of Privilege (EoP) zero-days, CVE-2025-32706 and CVE-2025-32701 (CVSS 7.8), were actively exploited. These allow a local authenticated attacker to gain SYSTEM privileges.  
    • Windows Ancillary Function Driver for WinSock: An EoP zero-day, CVE-2025-32709 (CVSS 7.8), was actively exploited, allowing an attacker to gain administrator privileges. Exploitation may involve persuading a user to open a crafted file or visit a malicious website.  
    • Microsoft DWM Core Library: An EoP zero-day, CVE-2025-30400 (CVSS 7.8), was actively exploited, allowing a local attacker to gain SYSTEM privileges.  
    • Microsoft Scripting Engine: A Memory Corruption zero-day, CVE-2025-30397 (CVSS 7.5), was actively exploited. This vulnerability has high attack complexity and requires user interaction (clicking a crafted URL) while running Microsoft Edge in Internet Explorer mode.  
    • Critical RCE Vulnerabilities: Patches included fixes for critical Remote Code Execution flaws in Windows Remote Desktop Services (CVE-2025-29966, CVE-2025-29967 – CVSS 8.8), Microsoft Office (CVE-2025-30377, CVE-2025-30386 – CVSS 8.4), and Windows Virtual Machine Bus (CVE-2025-29833 – CVSS 7.1).  
  • SAP NetWeaver Vulnerabilities: CVE-2025-31324 (Missing Authorization Check, CVSS 9.1) and a related flaw, CVE-2025-42999 (CVSS 9.1), in SAP NetWeaver’s Visual Composer were actively exploited. These vulnerabilities allow unauthenticated file uploads and remote code execution. Exploitation has been attributed to China-linked APTs and Russian ransomware groups. CISA added CVE-2025-42999 to its KEV catalog on May 15th.  
  • Commvault Command Center: CVE-2025-34028 (Path Traversal, CVSS 10.0) in Commvault Command Center (Innovation Release 11.38.0-11.38.19) was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog on May 2nd due to active exploitation. This flaw allows unauthenticated remote attackers to execute arbitrary code.  
  • OttoKit WordPress Plugin: CVE-2025-27007 (Privilege Escalation, CVSS 9.8) affecting OttoKit (formerly SureTriggers) WordPress plugin (versions <= 1.0.82) is under active exploitation. This allows unauthenticated attackers to potentially create administrator accounts. Mass exploitation was observed starting May 4th.  
  • Apple AirPlay: A set of vulnerabilities dubbed “AirBorne,” including CVE-2025-24252 (Use-after-free, CVSS 9.8), CVE-2025-24132 (Buffer Overflow), and CVE-2025-24206 (Authentication Bypass), allow zero-click Remote Code Execution and wormable exploits on devices on the same local network. Apple has released patches for affected devices.  
  • Output Messenger: A zero-day vulnerability, CVE-2025-27920 (Directory Traversal), in the messaging app Output Messenger is being exploited by the Marbled Dust threat actor.  
  • Fortinet Products: A critical zero-day RCE vulnerability, CVE-2025-32756, affecting multiple Fortinet products is being exploited in the wild.  
  • Ivanti EPMM: A vulnerability allowing unauthenticated RCE when chained with another flaw is being exploited in the wild.  
  • Adobe Products: Adobe released 13 updates addressing 39 CVEs, 33 of which are critical, in various products including Photoshop, Animate, InDesign, and others.  


5. Threat Actor Activities

Threat actor activity remained high and diverse during the reporting period, encompassing nation-state espionage, financially motivated cybercrime, and politically motivated hacktivism.

  • Nation-State Actors:
    • China-linked APTs: Multiple China-based threat groups, including UNC5221, UNC5174, and CL-STA-0048, were observed exploiting vulnerabilities in SAP NetWeaver. U.S. Cyber Command previously discovered Chinese malware implanted on partner networks in Latin America. UNC5174 is noted for its stealth and use of open-source tools.  
    • Iran-linked Lemon Sandstorm: This state-sponsored group (also known as Rubidium, Parisite, Pioneer Kitten, UNC757, Fox Kitten) was attributed to a long-term intrusion into critical national infrastructure in the Middle East, leveraging VPN flaws and custom backdoors.  
    • North Korean Kimsuky: This APT group (also known as Emerald Sleet, Velvet Chillima) continues to be active, employing social engineering, malicious documents, and living-off-the-land tools, often using PowerShell, to gather intelligence related to the Korean peninsula and nuclear policy. They have been observed using ClickFix social engineering tactics.  
    • Russia-linked COLDRIVER: This threat actor was observed distributing the new LOSTKEYS malware, designed for file theft and system information gathering, using ClickFix social engineering lures.  
    • Marbled Dust: Microsoft Threat Intelligence tracks this actor, observed exploiting a zero-day in Output Messenger (CVE-2025-27920) for regional espionage, potentially leveraging DNS hijacking or typo-squatted domains for initial access.  
  • Cybercrime Groups:
    • Golden Chickens: This financially motivated group (also known as Venom Spider) operates a Malware-as-a-Service (MaaS) platform and has recently developed new credential theft and keylogging tools, TerraStealerV2 and TerraLogger. They supply malware to other prominent groups like FIN 6, Cobalt Group, and Evilnum.  
    • Play Ransomware: Actors linked to the Play ransomware family were observed exploiting a Windows zero-day (CVE-2025-29824). Notably, in the observed activity, they deployed the Grixba info stealer instead of ransomware, indicating a potential shift towards data theft and extortion without encryption.  
    • Scattered Spider: This notorious group (also known as Octo Tempest or UNC3944) is believed to be linked to recent cyberattacks causing operational disruption at UK retailers like M&S. They are known for targeting organizations with large quantities of PII and financial data.  
    • BlackLock: This rapidly rising RaaS group, first seen in March 2024, uses custom malware and double extortion tactics, targeting Windows, VMware ESXi, and Linux systems.  
    • DragonForce: This ransomware group is offering a white-label branding service for affiliates.  
  • Hacktivist Groups:
    • NoName057(16): This pro-Russian group claimed responsibility for DDoS attacks against multiple Romanian government websites on May 4th. They have also targeted Dutch and other European organizations in retaliation for support of Ukraine and previously targeted Italian banks and airports. Their primary tactic is DDoS, often using their tool DDoSia.  


6. Malware Spotlights

Several malware families and trends were prominent during this reporting period:

  • AI-Enhanced Malware: AI is increasingly used by criminals to mutate malicious code in real-time to evade detection. The emergence of “agentic AI ransomware,” where AI bots automate and expedite all stages of an attack, is predicted.  
  • Fake Updates and Social Engineering: Malware distributed through malicious or compromised websites often uses fake browser or software update prompts to trick users into downloading payloads. The ClickFix social engineering technique, which manipulates users into executing malicious commands via fake prompts, is also being adopted by various actors, including Interlock and COLDRIVER.  
  • Information Stealers: Lumma Stealer and XWorm continue to be prevalent. Gremlin Stealer, a new C#-based infostealer, is being sold on cybercrime forums and Telegram, designed to exfiltrate browser data, crypto wallets, and credentials. Golden Chickens’ new tools, TerraStealerV2 and TerraLogger, are focused on stealing browser credentials, crypto wallet data, and keylogging. AgeoStealer was observed disguised as a video game.  
  • Remote Access Trojans (RATs): MintsLoader was found dropping the GhostWeaver RAT via phishing attacks. A malicious package in the PyPI repository disguised as Discord contained a fully functional RAT.  
  • Supply Chain Compromises: Malicious npm packages targeting users of the Cursor code editor were discovered, implanting backdoors and stealing credentials. A compromised legitimate npm package, “rand-user-agent,” was found injecting code for a RAT.  
  • Commodity Malware in Sophisticated Campaigns: Established malware families like FakeUpdates, Remcos, AgentTesla, Phorpiex, Rilide, Mirai, Qilin, Akira, and Anubis remain prevalent. Multi-stage campaigns are increasingly blending these commodity tools with advanced tactics like obfuscation and layered execution to evade detection.  
  • Living-Off-The-Land (LotL): Threat actors continue to leverage legitimate system tools and services, including PowerShell and trusted Windows utilities, to blend in and evade detection. LotL phishing, using URLs of legitimate services to host or redirect to malicious content, is also increasing.  


7. Recommendations

Given the current threat landscape, MCS recommends the following actions for organizations to enhance their cybersecurity posture:

For Technical Audiences:

  • Prioritize Patching: Immediately apply patches for critical vulnerabilities, especially those listed in CISA’s KEV catalog or reported as actively exploited, such as the Microsoft Patch Tuesday updates, SAP NetWeaver, Commvault Command Center, OttoKit, Apple AirPlay, Output Messenger, Fortinet, and Ivanti vulnerabilities.  
  • Enhance Endpoint Security: Deploy and configure advanced Endpoint Detection and Response (EDR) or Managed Detection and Response (MDR) solutions capable of detecting and preventing exploit-like behavior, monitoring process activity (including WMI abuse), and identifying unusual file encryption. Implement application whitelisting to restrict unauthorized software execution.  
  • Strengthen Network Defenses: Implement robust firewall rules, Intrusion Detection Systems (IDS), and DNS filtering to block access to known malicious domains and IPs, including those associated with C2 infrastructure and Tor.onion sites. Use network segmentation to isolate critical assets and limit lateral movement. Monitor network traffic for unusual outbound communication.  
  • Improve Identity and Access Management: Implement strong access controls and the principle of least privilege for users and applications. Enforce multi-factor authentication (MFA) for all accounts, especially for remote access and privileged users. Consider adopting a Zero Trust architecture.  
  • Secure Email and Collaboration Platforms: Implement advanced threat protection for emails to scan for malicious payloads and links. Disable macros by default in Office documents. Be vigilant about social engineering tactics used in email and collaboration platforms like Microsoft Teams.  
  • Monitor for Living-Off-The-Land (LotL) Techniques: Enhance detection rules to identify the misuse of legitimate system tools and services (e.g., PowerShell, WMI, trusted Windows utilities) for malicious purposes.  
  • Supply Chain Security: Increase visibility and oversight into the security practices of third-party vendors and suppliers. Monitor for compromises in software supply chains, including repositories like npm and PyPI.  

For Non-Technical Audiences:

  • Security Awareness Training: Regularly train employees on recognizing and reporting phishing attempts, social engineering tactics (including fake updates and ClickFix lures), and suspicious communications. Emphasize the risks associated with clicking on links or downloading attachments from unknown sources.  
  • Be Skeptical of Urgent Requests: Educate staff to verify urgent requests for information or action, especially those involving financial transfers or credential disclosure, through alternative communication channels, even if they appear to come from trusted sources or executives (BEC, deepfakes).  
  • Use Strong, Unique Passwords and MFA: Encourage the use of strong, unique passwords for all accounts and enable multi-factor authentication whenever possible.  
  • Report Suspicious Activity: Establish clear procedures for reporting any suspicious emails, system behavior, or potential security incidents to the IT or security team promptly.
  • Understand Data Sensitivity: Ensure employees understand the importance of protecting sensitive data and the potential consequences of data breaches.

General Recommendations:

  • Maintain and Test Backups: Regularly back up critical data and systems, store backups offsite and offline, and regularly test the restoration process to ensure business continuity in the event of a ransomware attack or data loss.  
  • Develop and Practice Incident Response Plan: Have a well-defined and tested incident response plan in place to guide actions during a cyberattack, including roles, responsibilities, communication procedures, and containment strategies.  
  • Stay Informed: Monitor reputable threat intelligence sources (like CISA, MS-ISAC, and industry-specific advisories) to stay updated on the latest threats, vulnerabilities, and mitigation strategies.  


8. Analyst Notes

The observed trends this week underscore the increasing sophistication and adaptability of threat actors. The predicted rise of “agentic AI ransomware” highlights a potential future where attacks could become even faster and more autonomous. The continued use of fake victim claims by some ransomware groups complicates threat intelligence efforts and attribution. While zero-day exploitation remains a concern, the slight decline observed in some reports suggests that improved vendor security practices may be having some positive impact. However, the sheer volume and diversity of threats, coupled with the increasing cross-collaboration among different threat actor types, mean that organizations cannot afford to become complacent. The focus on less technical social engineering attacks targeting individuals, even high-value ones, demonstrates that the human element remains a critical vulnerability. The decrease in overall ransomware payments despite an increase in incidents suggests a growing reluctance among victims to pay, potentially influenced by poor decryptor quality and the risk of data leaks even after payment. Experts continue to strongly advise against paying ransoms.  

9. Threat Indicator Appendix

This appendix provides a list of observed Indicators of Compromise (IOCs) related to threats discussed in this report. Security teams should use these indicators to enhance their detection and prevention capabilities.

ThreatIndicator TypeIndicator
Gunra RansomwareMD-5 Hash9a7c0adedc4c68760e49274700218507
Gunra RansomwareSHA-256 Hash854e5f77f788bbbe6e224195e115c749172cd12302afca370d4f9e3d53d005fd
Gunra RansomwareProcess Namegunraransome.exe
Interlock RansomwareEncrypted File Extension.interlock
Interlock RansomwareRansom Note Filename!__ README__!. txt
Interlock RansomwareC2 IP Address150[.] 171[.] 27[.] 10
Interlock RansomwareFake Updater Hash (SHA-256)576d07cc8919c68914bf08663e0afd00d9f9fbf5263b5cccbded5d373905a296
Golden Chickens (TerraStealerV2)C2 Domainwetransfers[.] io
SAP NetWeaver ExploitationObserved IP Address103.153.41.17 – 103.153.41.222

CONTACT INFORMATION

For further inquiries or guidance regarding this report, please contact the Meraal Cyber Security (MCS) Threat Intelligence Team.

Note on Sources and Intelligence: This report synthesizes information from various credible sources, including public advisories from organizations like CISA, MITRE, and MS-ISAC, alongside internal analysis and emerging threat intelligence. Efforts have been made to differentiate between confirmed intelligence and speculative or unverified information to maintain accuracy and credibility.

Leave a Reply

Your email address will not be published. Required fields are marked *