Weekly Cybersecurity Threat Advisory

  • Home
  • Blog
  • Weekly Cybersecurity Threat Advisory

Threat Landscape Summary (March 24 – 31, 2025)

I. EXECUTIVE SUMMARY

The final week of March 2025 marked a historic escalation in cyber activity, with March becoming the first month on record to exceed 100 publicly disclosed ransomware attacks. The week of March 24 to March 31 was dominated by high-impact “Identity and Supply Chain” compromises. The most significant event was the alleged breach of Oracle Cloud’s SSO and LDAP systems, potentially impacting thousands of downstream tenants. Simultaneously, the automotive and higher education sectors faced severe pressure, with Jaguar Land Rover and New York University confirming major data exposures.

The landscape has shifted toward “Credential Commoditization,” where massive aggregations of infostealer data are being used to fuel automated brute-force attacks against edge infrastructure. This was exemplified by the emergence of the BRUTED framework, which systematically targets enterprise VPN solutions.

II. GLOBAL CYBER THREAT LANDSCAPE OVERVIEW

The global threat environment this week was characterized by a 223% surge in activity from the Safepay group and the continued dominance of the Qilin ransomware syndicate. Attackers are increasingly bypassing traditional EDR (Endpoint Detection and Response) by exploiting “unmanaged” devices, such as unsecured webcams and IoT sensors, to gain a foothold in corporate networks.

Geopolitically, North Korean-linked actors (tracked as Moonstone Sleet) have officially shifted from custom malware to using the Qilin RaaS platform, signaling a tactical merge between state-sponsored espionage and financial crime. In the EMEA region, the UK retail and transport sectors remain under “coordinated siege” by the Scattered Spider collective.

III. NOTABLE INCIDENTS AND DATA BREACHES

Oracle Cloud (Technology): Reported on March 31, a threat actor known as “rose87168” claimed to have exfiltrated 6 million records from Oracle’s Single Sign-On (SSO) and LDAP systems. The haul includes sensitive Java KeyStore (JKS) files and encrypted passwords, representing a massive risk for Oracle Cloud’s 140,000+ tenants who rely on these systems for identity federation.

New York University (Education): NYU disclosed a breach affecting 3 million applicants. A threat actor using the handle “@bestn-gy” defaced the university’s homepage and leaked sensitive demographic data, SAT/ACT scores, and financial aid details dating back to 1989.

Jaguar Land Rover (Automotive): A hacker named “Rey” (linked to the Hellcat group) claimed to have exposed 700 internal documents, including development logs and source code. The breach reportedly stemmed from compromised Jira credentials likely harvested via infostealer malware.

Bank Sepah (Finance): The “Codebreakers” collective breached this major Iranian financial institution, allegedly stealing 42 million customer records. The group demanded a $42 million Bitcoin ransom, highlighting the continued vulnerability of regional banking infrastructure to large-scale exfiltration.

SpyX (Stalkerware): A massive breach of the SpyX parental monitoring tool exposed the personal data of nearly 2 million individuals, including 17,000 iCloud usernames and passwords stored in plaintext, posing a severe privacy risk to Apple users.

IV. COMPREHENSIVE INCIDENT SUMMARY TABLE

DateAffected OrganizationSectorIncident TypeImpact
Mar 24, 2025SpyXTech/MobileData Breach2M profiles; 17K iCloud credentials
Mar 26, 2025Bank SepahFinanceData Extortion42M customer records stolen
Mar 28, 2025NYUEducationDefacement/Theft3M applicant records leaked
Mar 29, 2025Jaguar Land RoverAutomotiveIP Theft700 docs (Source code/Jira)
Mar 31, 2025Oracle CloudTechnologyIdentity Breach6M SSO/LDAP records
Mar 31, 2025Utsunomiya ClinicHealthcareRansomware140GB of medical records (Qilin)

V. CURRENT THREAT LANDSCAPE ANALYSIS

The “Identity as a Target” Trend:

The Oracle and NYU breaches underscore that the “Identity Provider” (IdP) is now the primary target. By compromising SSO systems, attackers gain “golden tickets” to access dozens of connected SaaS applications (Salesforce, Slack, AWS) without ever triggering a login alert.

VPN Brute-Forcing Maturity:

The release of the BRUTED framework this week has automated the discovery and exploitation of edge devices. This tool specifically scans for SonicWall, Palo Alto GlobalProtect, and Cisco AnyConnect instances. It utilizes sub-domain enumeration to find “hidden” VPN portals (e.g., vpn.company.com) and applies massive credential lists from recent breaches.

VI. CRITICAL VULNERABILITIES AND CVEs

CVE IDDescriptionSeverityMitigation Status
CVE-2025-24178Apple iOS/macOS Sandbox Escape: Allows apps to break out of sandbox.9.8 (Critical)Fixed in iOS 18.4 / macOS 15.4 (Released Mar 31).
CVE-2025-30841Path Traversal in Countdown & Clock: Allows Remote Code Inclusion.9.9 (Critical)Actively targeted in WordPress environments.
CVE-2024-36336AMD Ryzen AI Software Integer Overflow: Leads to privilege escalation.7.9 (High)Update AMD NPU Drivers to latest version.
SQLi (Multiple)PHPGurukul Bank Locker System: Remote SQL injection in critical files.9.8 (Critical)Listed in CISA Bulletin SB25-090 (Mar 31).

VII. THREAT ACTOR ACTIVITIES

Qilin (Ransomware-as-a-Service)

  • Activity: Most active group of the week, claiming victims like Utsunomiya Central Clinic (Japan) and Chicago Doorways. They are currently focusing on healthcare data for high-pressure extortion.

Hellcat (Extortion Group)

  • Activity: Linked to the Jaguar Land Rover source code theft. They specialize in compromising developer tools (Jira, Confluence, GitHub) rather than encrypting endpoints.

Safepay (Ransomware)

  • Activity: Observed a massive 223% increase in activity this month. They are rapidly filling the vacuum left by the decline of LockBit and ALPHV.

VIII. MALWARE ANALYSIS

WRECKSTEEL

  • Type: Data Wiper / Stealer.
  • Analysis: Identified by CERT-UA targeting state systems. It combines the ability to exfiltrate browser data with a destructive payload designed to overwrite the Master Boot Record (MBR) once exfiltration is complete.

BPFDoor (Linux RAT)

  • Behavior: Operates entirely in memory using Berkeley Packet Filters. It was observed this week targeting telecommunications backbones in Southeast Asia. It requires no open ports to receive commands, making it nearly impossible to detect with standard firewalls.

IX. RECOMMENDATIONS

For Technical Audiences:

  • SSO & LDAP Audit: If your organization uses Oracle Cloud or federated identity, conduct an immediate audit of all service accounts and rotate Java KeyStore (JKS) certificates.
  • VPN Hardening: Disable any unused VPN portals and implement “Geofencing” to block login attempts from high-risk regions. Check logs for the signature of the BRUTED framework.For Non-Technical Audiences:
  1. Password Hygiene: If you have applied to NYU or use “parental monitoring” apps like SpyX, change your passwords immediately and enable App-based MFA (e.g., Google Authenticator).
  2. Infostealer Prevention: Avoid saving passwords in browsers (Chrome/Edge/Safari). Use a dedicated password manager to protect against “Rey” style Jira compromises.

X. ANALYST NOTES

The “Identity Spring” of 2025 is here. Organizations can no longer rely on the assumption that their Identity Provider is a “secure black box.” The Oracle incident suggests that even the largest cloud providers are susceptible to credential-based pivoting. We recommend a “Zero Trust” approach where internal app access is verified by device health, not just a successful SSO login.

XI. CONTACT INFORMATION

Meraal Cyber Security (MCS) Threat Intelligence Team

Leave a Reply

Your email address will not be published. Required fields are marked *