Weekly Cybersecurity Threat Advisory

  • Home
  • Blog
  • Weekly Cybersecurity Threat Advisory
Weekly Cybersecurity Threat Advisory

Threat Landscape Summary (17 – 24 November 2025)

I. EXECUTIVE SUMMARY

The week of November 17 to November 24, 2025, represented a critical peak in data exfiltration activity, characterized by a series of high-impact breaches targeting the finance, retail, and higher education sectors. A significant shift was observed in the “Clop” syndicate’s operations, which successfully exfiltrated nearly 2TB of data from a major hardware manufacturer, while the “ShinyHunters” group capitalized on legacy cloud exposures to target global fintech platforms.

The discovery of the “Shai-Hulud” worm variant—which compromised nearly 1,000 NPM packages—further highlighted the fragility of the software supply chain. Additionally, the retail sector faced unprecedented pressure as South Korea’s largest online retailer, Coupang, disclosed a breach affecting over 33 million accounts, marking one of the largest regional exposures of the year.

II. GLOBAL CYBER THREAT LANDSCAPE OVERVIEW

Adversaries have increasingly moved away from traditional encryption-heavy ransomware in favor of high-volume data theft and “silent” persistence. This week, we observed a 38% increase in identity-focused attacks, with “Scattered Spider” and similar collectives utilizing sophisticated vishing (voice phishing) to bypass multi-factor authentication (MFA) at prestigious institutions like Harvard University.

Geopolitically, the landscape is seeing a convergence of financial crime and state-sponsored espionage. Groups like Silk Typhoon (China-nexus) have been identified conducting reconnaissance on economic forecasting data, while Russian-linked groups continue to pressure the Japanese retail market. The focus has moved from “disruption” to “economic intelligence acquisition.”

III. NOTABLE INCIDENTS AND DATA BREACHES

Under Armour (Retail/Apparel): On November 17, the company fell victim to a ransomware incident that targeted internal corporate systems. Threat actors claim to have exfiltrated data involving millions of personal records.

Logitech (Technology): The Clop ransomware group officially claimed responsibility for a massive 1.8TB data theft from the hardware giant. The breach reportedly utilized a zero-day in a third-party software platform to bypass perimeter defenses.

Harvard University (Education): Disclosed a breach on November 24 originating from a sophisticated voice-phishing (vishing) campaign. The attack successfully compromised contact details and donor information for alumni, students, and faculty.

SitusAMC (Finance): The real-estate finance giant reported a breach exposing sensitive client data, including legal agreements and accounting documents tied to major global banks like JPMorgan Chase and Citi.

Coupang (Retail): The South Korean e-commerce leader discovered unauthorized access to 33.7 million accounts. Investigation revealed that the intrusion likely began in June 2025 but was only fully detected on November 18.

IV. COMPREHENSIVE INCIDENT SUMMARY TABLE

DateAffected OrganizationSectorIncident TypeImpact
Nov 17, 2025Under ArmourRetailRansomwareMillions of records claimed
Nov 17, 2025LogitechTechnologyData Extortion1.8TB of corporate data stolen
Nov 18, 2025CoupangE-commerceData Breach33.7M account profiles exposed
Nov 20, 2025Linux InfrastructureGlobalActive ExploitCVE-2024-1086 used in ransomware
Nov 24, 2025Harvard UniversityEducationVishingDonor and alumni PII leaked
Nov 24, 2025SitusAMCFinanceData BreachSensitive banking & loan data

V. CURRENT THREAT LANDSCAPE ANALYSIS

The Rise of Vibe-Coding and AI-Agents:

A notable development this week is the emergence of “AI-jailbroken” attack chains. Reports from major AI labs indicate that threat actors are successfully using compromised LLM agents to automate the reconnaissance and initial vulnerability scanning phases of a breach. This allows for a “constant-pressure” environment where vulnerabilities are identified and weaponized in minutes rather than days.

The “Shai-Hulud” NPM Worm:

A self-propagating worm was identified infecting over 1,000 NPM packages. This malware automatically publishes stolen credentials and victim data back to GitHub, creating a feedback loop that fuels further automated attacks. This marks a significant evolution in “autonomic” malware that requires little to no human intervention to spread.

VI. CRITICAL VULNERABILITIES AND CVEs

CVE IDDescriptionSeverityMitigation Status
CVE-2025-61757Oracle Identity Manager Auth Bypass: Allows full admin access via URL manipulation.9.8 (Critical)Tier 0 Risk. Added to CISA KEV; patch immediately.
CVE-2025-64446Fortinet FortiWeb RCE: Path traversal and unauthenticated command execution.9.8 (Critical)CISA Directive. 7-day mandatory patch for US agencies.
CVE-2025-62215Windows Kernel EoP: Race condition allowing SYSTEM privilege escalation.7.0 (High)Actively Exploited. Part of Nov Patch Tuesday.
CVE-2025-62354Cursor AI Command Injection: Unauthorized OS command execution via Cursor.9.8 (Critical)Update to version 0.43.x or later.

VII. THREAT ACTOR ACTIVITIES

Clop (Ransomware/Extortion)

  • Focus: Large-scale exfiltration via Third-Party Managed File Transfer (MFT) and ERP systems.
  • Recent Activity: Linked to the Logitech and SitusAMC breaches. They are currently the most prolific group in the data-extortion space, largely ignoring encryption in favor of multi-terabyte thefts.

Scattered Spider (UNC3944)

  • Focus: High-end social engineering and helpdesk compromise.
  • Activity: Credited with the “vishing” wave hitting North American universities and law firms this week. They are experts at manipulating IT support staff to reset MFA devices.

Silk Typhoon (APT – China-nexus)

  • Focus: Critical Infrastructure and Government policy centers.
  • Activity: Continued persistence in Western government economic offices, focusing on stealing non-public economic forecasts and trade strategy documents.

VIII. MALWARE ANALYSIS

Oyster Backdoor (via TamperedChef)

  • Delivery: Weaponized recipe PDFs and kitchen equipment manuals.
  • Behavior: Sideloads via signed Windows binaries to establish a persistent foothold. It has been seen moving laterally to POS (Point of Sale) systems in the hospitality sector.

“The Shai-Hulud Worm” (Version 2.0)

  • Mechanism: Infiltrates the developer build pipeline via compromised NPM credentials.
  • Payload: Scans the local environment for .env files, SSH keys, and cloud tokens, then automatically commits them to public repositories to facilitate further breaches.

IX. RECOMMENDATIONS

For Technical Audiences:

  • Developer Hygiene: Force a global “NPM Cache Clear” and require all developers to rotate their registry tokens. Conduct a search for “Shai-Hulud” signatures in your CI/CD pipelines.
  • Identity Protection: Transition from SMS/Push-based MFA to FIDO2 hardware security keys for all administrative and helpdesk accounts to mitigate the current vishing wave.For Non-Technical Audiences:
  1. Vishing Awareness: Be aware that “IT Support” will never call you and ask for an MFA code or a password. If you receive such a call, hang up and report it via your internal security portal.
  2. Retail Caution: If you are a customer of Under Armour or Coupang, monitor your bank statements for small “test” transactions and consider placing a fraud alert on your credit profile.

X. ANALYST NOTES

The convergence of the Oracle Identity Manager bypass and the Fortinet FortiWeb RCE creates a dangerous situation for corporate perimeters. Attackers can now theoretically bypass the “front door” (Fortinet) and immediately take control of the “keys to the kingdom” (Oracle Identity Manager). This “Double-Zero-Day” scenario requires security teams to assume a state of compromise and prioritize internal network segmentation and lateral movement detection.

XI. CONTACT INFORMATION

Meraal Cyber Security (MCS) Threat Intelligence Team

Would you like me to prepare a focused analysis on the “Shai-Hulud” worm’s impact on your specific software development environment?

Leave a Reply

Your email address will not be published. Required fields are marked *