Weekly Cybersecurity Threat Advisory

  • Home
  • Blog
  • Weekly Cybersecurity Threat Advisory

Threat Landscape Summary (March 17 – 24, 2025)

I. EXECUTIVE SUMMARY

The week of March 17 to March 24, 2025, was characterized by a surge in “Ideological Extortion” and high-impact supply chain compromises. The most prominent event was the New York University (NYU) data breach on March 22, where threat actors defaced the university’s infrastructure to leak records of 3 million applicants. Additionally, the discovery of a critical supply chain vulnerability in a widely used GitHub Action surfaced, impacting over 23,000 repositories. This week also saw the first major wave of exploitations targeting the Windows Fast FAT and NTFS zero-days (CVE-2025-24985 and CVE-2025-24993), which were weaponized by ransomware groups shortly after the monthly patch cycle. The period ended with the initial reports of unauthorized access at Oracle Cloud, signaling the beginning of a broader identity-based campaign that would escalate in the following week.

II. GLOBAL CYBER THREAT LANDSCAPE OVERVIEW

The global landscape remains dominated by “Vulnerability-to-Exfiltration” (V2E) cycles, where the time between zero-day disclosure and active exploitation has shrunk to under 48 hours. This week, we observed a 42% increase in attacks against the higher education and research sectors, driven by both financial gain and political activism. Geopolitically, Iranian state-sponsored actors intensified their use of “living-off-the-land” (LotL) techniques against telecommunications hubs in Yemen and government offices in Iraq, utilizing hijacked internal emails to propagate custom backdoors. In the retail sector, the focus has shifted toward the exploitation of legacy WordPress plugins, with over 1,200 unique attacks recorded against e-commerce themes this week.

III. NOTABLE INCIDENTS AND DATA BREACHES

New York University (NYU): On March 22, a hacker group identifying as “Computer Niggy Exploitation” (@bestn-gy) compromised NYU’s internal data warehouse. The attackers defaced the university’s homepage with charts of SAT/ACT scores and demographic data, alleging continued race-based admissions practices. The breach exposed sensitive PII and financial aid details for 3 million applicants dating back to 1989.

SpyX (Stalkerware): A massive breach of the SpyX parental monitoring platform was uncovered this week, exposing the personal data of approximately 2 million users. The leak included 17,000 iCloud usernames and passwords stored in plaintext, highlighting the severe security risks inherent in “gray-market” surveillance software.

Ukrzaliznytsia (Ukraine Railway): On March 20, the Ukrainian national railway suffered a “multi-level” cyber attack that paralyzed its online ticket sales portal. While train operations were maintained through backup protocols, the incident was described as a highly systematic effort to disrupt civilian logistics.

GitHub Action Supply Chain: Researchers disclosed a compromise of the tj-actions/changed-files GitHub Action. Between March 14 and March 15, malicious code was injected into version tags, allowing attackers to exfiltrate CI/CD secrets from over 23,000 repositories. Organizations are now in the recovery phase, rotating thousands of leaked cloud tokens and API keys.

National Defense Corporation (NDC): Reports surfaced on March 19 regarding a massive data exfiltration event where the Interlock Ransomware Group claimed to have stolen 4.2TB of sensitive defense data from NDC and its subsidiary AMTEC.

IV. COMPREHENSIVE INCIDENT SUMMARY TABLE

DateAffected OrganizationSectorIncident TypeImpact
Mar 17, 2025SpyXTech/SurveillanceData Breach2M records; 17K iCloud credentials
Mar 19, 2025National Defense CorpDefenseRansomware4.2TB of defense data stolen
Mar 20, 2025UkrzaliznytsiaTransportInfrastructureOnline ticket systems offline
Mar 22, 2025NYUEducationIdeological Breach3M applicant records leaked
Mar 23, 2025AscomManufacturingRansomware44GB of internal reports stolen
Mar 24, 2025Oracle CloudTechnologyInitial CompromisePreliminary reports of SSO access

V. CURRENT THREAT LANDSCAPE ANALYSIS

The “Ideological Hacker” Resurgence:

The NYU breach marks a shift where data theft is used as a tool for “social auditing.” By leaking demographic and performance data, the threat actors aimed to force a public conversation on university policy. This suggests that high-profile institutions must now guard not only against financial theft but also against “whistleblower-style” breaches where the data is curated to support a specific narrative.

Cloud Identity Probing:

The first signals of the Oracle Cloud/SSO campaign appeared this week. Attackers are moving away from traditional server exploits to focus on Single Sign-On (SSO) and LDAP configurations. By targeting the “Identity Provider” (IdP), actors can gain broad access to downstream SaaS applications without triggering traditional perimeter alerts, a trend that is becoming the hallmark of early 2025 cybercrime.

VI. CRITICAL VULNERABILITIES AND CVEs

CVE IDDescriptionSeverityMitigation Status
CVE-2025-24985Windows Fast FAT RCE: Zero-day exploit in core file system driver.8.8 (High)Actively Exploited. Part of March Patch Tuesday.
CVE-2025-24993Windows NTFS RCE: Unauthenticated code execution via malformed file systems.8.8 (High)CISA KEV Addition. Priority patching required.
CVE-2025-0927Ubuntu Linux Heap Overflow: Vulnerability in HFS+ file system implementation.7.8 (High)Patch via apt upgrade available as of March 23.
CVE-2024-54525Apple visionOS/macOS Logic Issue: System file modification via crafted backups.8.8 (High)Update to visionOS 2.2 / macOS Sequoia 15.2.
CVE-2025-29980eTRAKiT.Net SQL Injection: Unauthenticated RCE as MS SQL account.9.8 (Critical)Disable CRM feature until patched.

VII. THREAT ACTOR ACTIVITIES

Interlock Ransomware Group

  • Focus: High-value industrial and defense targets.
  • Activity: Credited with the National Defense Corporation breach. They are known for “stealth exfiltration,” spending weeks inside a network before announcing the breach.

Computer Niggy Exploitation (C.N.E.)

  • Focus: Higher education and perceived social hypocrisy.
  • Activity: Responsible for the NYU defacement and leak. Their tactics include website takeover combined with a focus on “Data Warehouse” exfiltration.

Iranian Nexus APTs (OilRig/APT34)

  • Focus: Strategic espionage in the Middle East.
  • Activity: Observed using “hijacked email threads” from previously compromised government accounts to send malicious .rar attachments to telecommunications targets.

VIII. MALWARE ANALYSIS

PipeMagic (Storm-2460)

  • Type: Modular Backdoor/Post-Exploitation tool.
  • Analysis: Used in conjunction with CVE-2025-29824 (CLFS) and CVE-2025-24993 (NTFS). It establishes an encrypted tunnel and loads additional modules purely in memory, making it highly resistant to traditional forensic analysis.

WRECKSTEEL (Destructive variant)

  • Behavior: Identified in the Ukrainian railway incident. While primarily a wiper, this version includes a “session-harvesting” module that attempts to steal browser tokens for cloud services before initiating the system overwrite.

IX. RECOMMENDATIONS

For Technical Audiences:

  • Emergency Rotation: If your organization utilized the tj-actions/changed-files GitHub Action between March 14–20, rotate all secrets (AWS, Azure, GCP, GitHub) associated with that repository immediately.
  • File System Patching: Apply the Windows March 2025 Security Updates to address the NTFS and Fast FAT RCE vulnerabilities which are now under active exploit.For Non-Technical Audiences:
  1. SSO Monitoring: Users of Oracle-integrated services should be wary of any unexpected “Logon Succeeded” emails from locations they do not recognize.
  2. Stalkerware Check: If you have ever used parental or employee monitoring apps like SpyX, assume your iCloud credentials and personal messages have been exposed. Change your Apple ID password and enable Hardware Key MFA.

X. ANALYST NOTES

The convergence of the SpyX breach and the NYU leak highlights a “Privacy Crisis” in the spring of 2025. Data that was previously considered “safely stored” in university warehouses or “privately monitored” via stalkerware is being dumped en masse. We predict that the stolen iCloud credentials from the SpyX breach will be used in the coming weeks for targeted “Celebrity/VIP” social engineering campaigns. Organizations should warn their high-profile employees about a potential increase in “Account Recovery” phishing attempts.

XI. CONTACT INFORMATION

Meraal Cyber Security (MCS) Threat Intelligence Team

Leave a Reply

Your email address will not be published. Required fields are marked *