Weekly Cybersecurity Threat Advisory

  • Home
  • Blog
  • Weekly Cybersecurity Threat Advisory

Threat Landscape Summary (19 – 26 May, 2025)

I. Executive Summary

The week of May 19-26, 2025, witnessed significant law enforcement successes against major cybercriminal operations, particularly impacting malware distribution networks. Microsoft announced a major takedown of the Lumma Stealer infrastructure, seizing over 2,300 domains and disrupting its command structure. This coincided with Europol’s “Operation Endgame 2.0,” which neutralized 300 servers and 650 domains linked to several prominent malware strains, including Bumblebee and Qakbot. Despite these notable achievements, new critical vulnerabilities, especially in Ivanti Endpoint Manager Mobile (EPMM) and SAP NetWeaver, saw active exploitation, emphasizing the persistent challenge of patching and secure configuration. Ransomware activity, while impacted by takedowns, continued to target various sectors, with notable incidents affecting healthcare and education. The pervasive use of Artificial Intelligence (AI) by both attackers and defenders remains a central theme, with AI-driven social engineering and automated malware evasion techniques posing escalating risks.  

Organizations must remain highly vigilant, prioritizing rapid patching of known exploited vulnerabilities, strengthening identity and access management, and enhancing employee awareness against sophisticated social engineering tactics. The disruption of Malware-as-a-Service (MaaS) platforms may offer a temporary reprieve, but is unlikely to halt the overall threat evolution, as threat actors rapidly adapt their strategies.

II. Global Cyber Threat Landscape Overview

Continued Evolution of Ransomware

Ransomware continues to be a dominant threat, characterized by evolving Tactics, Techniques, and Procedures (TTPs) and a discernible shift towards more disruptive and financially motivated attacks. The landscape is increasingly defined by “double extortion” tactics, where attackers not only encrypt data but also exfiltrate sensitive information, threatening its public release if ransom demands are not met. An even more aggressive approach, termed “quadruple extortion,” has emerged, where threat actors demand ransom for decrypting data, preventing data leaks, halting Distributed Denial-of-Service (DDoS) attacks, and even returning stolen credentials.  

While global ransomware incidents reportedly declined in April 2025, falling to 450 from 564 in March, marking the lowest level since November 2024, the overall volume in early 2025 remains notably higher than in previous years. This suggests a recalibration or temporary shift in activity rather than a sustained decrease in threat. Prolific groups like Cl0p and RansomHub continued to dominate the first quarter of 2025, demonstrating significant impact. Concurrently, new groups such as Gunra, which surfaced in April 2025, and BlackLock, identified in March 2024, have rapidly emerged and gained prominence, with BlackLock showing a staggering 1,425% surge in activity in the last quarter of 2024.  

The resilience of the ransomware ecosystem, despite high-profile takedowns, is a critical observation. Law enforcement operations, such as “Operation Endgame 2.0,” explicitly targeted major malware distribution networks and initial access brokers, neutralizing hundreds of servers and domains. Similarly, Microsoft announced a significant takedown of the Lumma Stealer infrastructure, seizing over 2,300 domains and disrupting its central command structure. These actions are designed to dismantle cybercriminal operations and their supporting infrastructure. However, the continued high volume of attacks and the rapid emergence of new groups and variants, as evidenced by BlackLock’s exponential growth and Gunra’s rapid appearance, indicate that while law enforcement can effectively disrupt specific malware families or groups, the underlying Ransomware-as-a-Service (RaaS) model and the robust financial incentives for cybercriminals foster rapid adaptation. The ecosystem demonstrates significant resilience, with new variants and affiliates quickly filling the operational voids created by successful takedowns. This dynamic suggests that the “business” of ransomware is highly adaptable and capable of swift evolution. Therefore, organizations cannot rely solely on the success of law enforcement operations for their security posture. Instead, they must maintain continuous, proactive defense strategies that are adaptable to evolving threats, recognizing that the threat landscape will rapidly reconfigure itself even after major disruptions.  

 

AI’s Dual Role in Cybersecurity

Artificial Intelligence (AI) presents a complex challenge and opportunity, significantly impacting both offensive and defensive cybersecurity strategies.

On the offensive side, threat actors are increasingly leveraging AI to augment their capabilities. This includes automating reconnaissance, accelerating exploit development, and crafting highly convincing phishing emails, voice clones, and deepfake videos. The integration of AI tools into attack frameworks enhances the scale and speed of intrusions, making social engineering attacks more sophisticated and difficult to detect. For instance, reports indicate that 40% of detected Business Email Compromise (BEC) messages in July 2024 were created by AI, and deepfake scams have already resulted in significant financial losses.

Conversely, AI is becoming a critical line of defense in cybersecurity. It is improving threat prioritization, increasing Security Operations Center (SOC) efficiency, and accelerating threat analysis. AI-powered tools help identify patterns that signal impending threats and enable preemptive security measures. For example, 56% of organizations report that AI has improved their ability to prioritize threats and vulnerabilities, and 51% indicate increased SOC efficiency. However, significant challenges persist in the adoption of AI for defense. Many organizations struggle with integrating AI security technologies with legacy systems, citing complexity and interoperability issues as major barriers. Furthermore, applying AI-based controls consistently across the entire enterprise remains a hurdle.  

A critical observation is the widening AI preparedness gap within organizations. Multiple reports highlight that a large percentage of organizations (72-75%) are experiencing increased cyber risks, with generative AI explicitly identified as fueling more sophisticated social engineering and ransomware attacks. This indicates a clear recognition of AI’s growing role in cyber threats. However, despite this high awareness, a significant disconnect exists in practical implementation. While 66% of organizations acknowledge AI as the biggest cybersecurity game-changer, only a minority (37%) have established safeguards to assess AI tools before integrating them into their operations. Moreover, a substantial portion (52%) of respondents warn that without preemptive AI, attackers will succeed in launching targeted attacks at unprecedented speed and scale. This disparity reveals a critical lack of preparedness. Organizations are aware of the AI-driven threat but are lagging in implementing the necessary AI-powered defenses and governance frameworks. This unchecked adoption of AI without adequate security measures effectively widens their attack surface and increases their vulnerability to AI-augmented threats, creating a self-inflicted risk. This gap is likely to exacerbate existing cyber inequity, particularly affecting smaller organizations and public sector entities that often lack the resources and expertise for advanced AI defense. To mitigate this, organizations must not only invest in AI-driven security solutions but also prioritize comprehensive training and policy development to ensure secure and effective AI integration.  

Supply Chain and Cloud Risks

The increasing complexity of supply chains and a growing reliance on third-party vendors continue to pose significant cybersecurity risks. Cloud environments, despite their benefits, remain primary targets due to common misconfigurations, API vulnerabilities, and identity mismanagement. These factors create expanded attack surfaces that threat actors actively exploit.  

A significant observation is how supply chain vulnerabilities act as a force multiplier for attackers. A high percentage of large organizations (54%) identify supply chain challenges as a major barrier to cyber resilience, specifically citing complexity and lack of visibility into suppliers’ security practices. This points to a systemic weakness that attackers readily leverage. For instance, the Procolored incident demonstrated how malware-infected software drivers, distributed through a seemingly legitimate file-sharing database, could lead to widespread infections among customers. Similarly, the exploitation of critical SAP NetWeaver vulnerabilities (CVE-2025-31324 and CVE-2025-42999) by multiple China-based threat groups resulted in the compromise of 581 critical systems globally. These examples illustrate that supply chain vulnerabilities are not merely isolated entry points but act as force multipliers for attackers. By compromising a single vendor or a widely used software component within the supply chain, threat actors can gain access to and impact a vast number of downstream organizations simultaneously. This creates a “ripple effect” of breaches, significantly amplifying the scale of an attack. Therefore, organizations must extend their security assessments and controls beyond their immediate perimeter. This necessitates rigorous third-party risk management, continuous monitoring of software dependencies, and a deep understanding of the security posture of all components within their digital supply chain to prevent widespread compromise.  

III. Notable Incidents and Data Breaches

The week of May 19-26, 2025, saw a diverse range of cyber incidents and further disclosures of past breaches, underscoring the pervasive and long-lasting nature of cyber threats across various sectors globally.

Overview of Reported Incidents (May 19-26, 2025)

  • Healthcare: Kettering Health, a U.S. healthcare system based in Ohio, experienced a system-wide technology outage due to a cyberattack on May 20. This incident disrupted online patient portals, phone systems, and forced the cancellation or rescheduling of all elective procedures, highlighting the continued vulnerability and critical impact of attacks on the healthcare sector.  
  • Government/Public Sector: Several governmental entities reported cyberattacks. The Canton du Valais in Switzerland (May 22) and the Landratsamt Bodenseekreis in Germany (May 21) both reported cyberattacks on their administrations. A municipality in Arceburgo, Brazil, was also reported hacked on May 17. Additionally, the Union County government in Ohio reported a cyber incident on May 18.  
  • Media/Entertainment: The Instagram account of Teatro Castro Alves in Brazil was hacked on May 19. Noroeste Media, a media company in Mexico, suffered a DDoS attack on May 19. Tickify, a ticketing platform in Bangladesh, experienced a cyberattack on May 25, which affected sales for a qualifying match between Bangladesh and Singapore for the AFC Asian Cup.  
  • Other Sectors: A housing association in Belgium, Maison Liégeoise, was hit by a cyberattack on May 19. A nonprofit organization in Belgium also reported a cyberattack in May 2025, though a specific date was not provided.  

Ongoing Data Breaches Disclosed

Beyond new incidents, several significant data breaches from earlier periods had new developments or were publicly disclosed during this week, underscoring the prolonged consequences of cyber compromises.

  • Vastaamo Data Breach (Finland): New developments emerged in the 2020 breach of sensitive mental health records. Finland’s National Bureau of Investigation (NBI) named a second suspect in the case and planned to submit the case to prosecutors on May 19, 2025. This highlights the extensive and prolonged nature of cyber investigations and the enduring legal repercussions for those involved.  
  • SogoTrade Data Breach: This breach, which occurred in May 2024 but was publicly disclosed in May 2025, affected an online brokerage firm. It exposed sensitive client information, including names, financial account numbers, Social Security Numbers (SSNs), and tax identification numbers.  
  • PowerSchool Breach: New developments in May 2025 indicated that attackers resumed extortion attempts following the December 2024 breach, even after the company had reportedly paid the initial ransom. Attackers were observed emailing school officials across the U.S. and Canada, threatening to leak sensitive student and educator data. This led to North Carolina planning to stop using PowerSchool in July due to ongoing security concerns.  
  • TeleMessage Breach: A customized Signal app, specifically designed for US government officials to archive encrypted messages, was compromised in May 2025. A hacker gained access to an AWS-hosted server within 20 minutes, exposing unencrypted message fragments and contact information of US government personnel.  
  • SAP NetWeaver Breach: Multiple China-based threat groups (UNC5221, UNC5174, CL-STA-0048) exploited critical vulnerabilities (CVE-2025-31324 and CVE-2025-42999) in SAP NetWeaver to breach at least 581 critical systems globally. Attackers deployed web shells, reverse shells, and various malware such as PlugX and KrustyLoader. This incident underscores the widespread impact of exploiting vulnerabilities in widely used enterprise software.  

The persistent and evolving impact of past compromises is a crucial takeaway. The Vastaamo breach, which occurred in 2020, is still seeing legal and investigative developments in May 2025, with a second suspect named. This demonstrates that the repercussions of a cyberattack can extend for many years, highlighting the long tail of cyber incidents. The PowerSchool case further illustrates this, with renewed extortion attempts in May 2025, even after the company had reportedly paid the initial ransom. This scenario underscores that paying a ransom does not guarantee data deletion or prevent future re-extortion, and it can lead to significant operational changes, such as North Carolina discontinuing its use of PowerSchool due to security concerns. These cases collectively illustrate that cyber incidents are not isolated, short-term events. They have prolonged, multi-faceted impacts that can include ongoing legal proceedings, re-victimization through renewed extortion, and significant operational changes. The data also points to the systemic risk introduced by third-party services, as seen with TeleMessage using AWS, and widely adopted enterprise software like SAP NetWeaver, where a single compromise can ripple across numerous organizations. Therefore, incident response and recovery strategies must be comprehensive and long-term, extending beyond immediate containment to include legal preparedness, continuous monitoring for re-extortion, and rigorous vetting of third-party vendors. Organizations must understand that their security posture is intrinsically linked to the security of their supply chain and the software they utilize.  

The following table provides a concise overview of notable security incidents reported during the week of May 19-26, 2025:

Table: Notable Security Incidents (May 19-26, 2025)

Affected EntityLocationType of IncidentDate ReportedBrief Description/Impact
Tickify (ticketing platform)Dhaka, BangladeshCyber attackMay 25, 2025Affected sales for a qualifying match between Bangladesh and Singapore for the AFC Asian Cup.
Canton du ValaisSion, SwitzerlandCyberattackMay 22, 2025Attack on the website of a Swiss canton.
Landratsamt BodenseekreisFriedrichshafen, GermanyCyber attackMay 21, 2025Attack on the mobile devices of the district administration.
Département Hauts-de-SeineNanterre, FranceCyber attackMay 20, 2025Attack on a department administration.
Kettering HealthKettering, Ohio, USACyber attackMay 20, 2025System-wide technology outage, disrupting patient portals, phones, and elective procedures.
Maison LiégeoiseLiège, BelgiumCyber attackMay 19, 2025Attack on a housing association.
Teatro Castro AlvesSalvador, BrazilInstagram account hackedMay 19, 2025The Instagram account of a theater was compromised.
Noroeste MediaCuliacán, MexicoDDoS attackMay 19, 2025A media company was affected by a Distributed Denial-of-Service attack.
Union CountyMarysville, Ohio, USACyber incidentMay 18, 2025Cyber incident affecting a county government.
Vastaamo Data BreachFinlandData Breach (Ongoing)May 19, 2025 (New Suspect)Second suspect named in 2020 mental health records breach; case to be submitted to prosecutors.
SogoTrade, Inc.Chesterfield, Missouri, USAData Breach (Disclosure)May 2025Disclosure of May 2024 breach exposing financial account numbers, SSNs, and tax IDs.
PowerSchoolU.S. & Canada (Schools)Data Breach (Re-extortion)May 2025Attackers resumed extortion attempts, exposed student/educator data; North Carolina to stop use.
TeleMessageUS Government Officials (AWS-hosted)Data BreachMay 2025Compromise of Signal app for US officials; exposed unencrypted message fragments, contacts.
SAP NetWeaverGlobalVulnerability ExploitationMay 2025China-based groups exploited CVE-2025-31324/42999, breaching 581 critical systems.

 

IV. Emerging Malware and Campaigns

The period of May 19-26, 2025, featured significant developments in the malware landscape, including a major law enforcement takedown and the emergence of new, sophisticated campaigns.

Lumma Stealer Takedown

On May 21, 2025, Microsoft, in coordination with global law enforcement agencies including the U.S. Department of Justice, Europol, and Japan’s Cybercrime Control Centre (JC3), announced a major takedown operation against Lumma Stealer.  

Lumma Stealer operates as a “Malware-as-a-Service” (MaaS), a model that facilitates its widespread distribution and makes it difficult for traditional security defenses to detect. This characteristic makes it a favored tool for cybercriminals seeking to steal data. The malware is specifically designed to exfiltrate sensitive information from popular web browsers such as Google Chrome, Mozilla Firefox, and Microsoft Edge. This stolen data includes cryptocurrency wallets, credit card details, bank account information, and passwords. First discovered in 2022, Lumma Stealer has also been linked to ransomware attacks and breaches of school security systems. Microsoft identifies it as one of the “leading tools” used by cybercriminals worldwide for large-scale information and money theft.  

Lumma Stealer is frequently deployed through spear-phishing emails, malvertising, and by impersonating trusted brands, including Microsoft itself. Recent campaigns observed in November 2024 and earlier in 2025 utilized deceptive lures such as fake AI video tools (e.g., EditPro) and phishing campaigns impersonating popular online travel agencies like Booking.com, all aimed at financial theft and fraud. The impact of this takedown operation was substantial. Between March 16 and May 16, 2025, Microsoft identified over 394,000 Windows PCs worldwide that had been infected by Lumma malware. The takedown successfully seized more than 2,300 domains that formed the backbone of Lumma’s infrastructure and disrupted its central command structure and underground marketplaces where the malware was being sold.  

ELPACO-team Ransomware

ELPACO-team ransomware, identified as a variant of Mimic ransomware, was observed in an attack that culminated in its deployment approximately 62 hours after initial compromise. This ransomware often spreads laterally via Remote Desktop Protocol (RDP) and Server Message Block (SMB).  

Initial access for this group was gained by exploiting a known template injection vulnerability (CVE-2023-22527) on an internet-facing Atlassian Confluence server, which allowed for remote code execution and the deployment of a Metasploit payload. The group’s TTPs are extensive and include using AnyDesk for remote access, creating new local administrator users (e.g., “noname” with password “Slepoy_123”), and attempting to exploit the Zerologon vulnerability (CVE-2020-1472) for privilege escalation. They leveraged tools such as Mimikatz, ProcessHacker, and Impacket’s Secretsdump for credential harvesting, enabled RDP, and disabled Windows Defender for defense evasion. Network scanning and SMB share enumeration were also observed as part of their reconnaissance and lateral movement. The impact of ELPACO-team ransomware includes the encryption of files, which are then appended with the ELPACO-team extension. The group also created MIMIC_LOG.txt and session.tmp files and made attempts to halt virtual machine (VM) operations. Actionable Indicators of Compromise (IOCs) identified include specific network IPs (45.227.254.124, 91.191.209.46) and numerous file hashes (SHA256).  

COLDRIVER’s LOSTKEYS Malware

The Russia-linked threat actor COLDRIVER, also known as UNC4057, Star Blizzard, and Callisto, is distributing a new information stealer called LOSTKEYS. This malware is spread using ClickFix-like social engineering lures, specifically fake CAPTCHA verification prompts designed to trick users into manually copying and pasting malicious PowerShell commands into their terminals.  

LOSTKEYS, which is a VBS script, is designed to steal sensitive files from hard-coded lists of extensions and directories, collect system information, and list running processes. It also aims to steal account credentials, emails, and contacts. COLDRIVER’s operations are strategically aligned, targeting NATO governments, Non-Governmental Organizations (NGOs), current and former Western government advisors, militaries, journalists, and think tanks, with the overarching goal of collecting sensitive information that aligns with Russian strategic objectives.  

Winos 4.0 Malware

A new campaign, first detected in February 2025, utilizes fake software installers, masquerading as popular tools like LetsVPN and QQ Browser, to deliver the Winos 4.0 framework. This malware was among those impacted by Operation Endgame, suggesting a temporary disruption to its distribution network.  

Procolored Printer Driver Malware

A digital printing solutions provider, Procolored, was found to have offered software drivers infected with multiple malware strains. This included new, previously undetected versions capable of modifying executable files and self-replicating within a network. This discovery highlights a significant and often overlooked supply chain risk, where seemingly legitimate software can become a vector for widespread compromise.  

The adaptability and diversification of malware distribution and persistence mechanisms are evident. While major law enforcement operations successfully disrupted the infrastructure of malware like Lumma Stealer and Winos 4.0, the overall volume of attacks and the emergence of new threats persist. This indicates that threat actors rapidly pivot when one avenue is closed or becomes less effective. The diverse initial access vectors observed include spear-phishing, malvertising, brand impersonation (Lumma Stealer), highly deceptive ClickFix social engineering with fake CAPTCHAs and PowerShell commands (COLDRIVER), exploitation of known vulnerabilities in public-facing applications (ELPACO-team), and crucially, malware distribution through seemingly legitimate software drivers (Procolored). The widespread use of “living off the land” techniques, such as leveraging PowerShell in ClickFix campaigns, and custom backdoors further enhances their stealth and persistence, making detection more challenging. This means that merely blocking known malware signatures is insufficient for robust defense; understanding and defending against the methods of delivery and persistence is paramount. Organizations must implement multi-layered and adaptive defenses. This includes not only technical controls such as rapid patching, advanced Endpoint Detection and Response (EDR), network segmentation, and application whitelisting, but also continuous, robust security awareness training for employees. Training should specifically cover recognizing sophisticated social engineering lures, suspicious downloads, and the dangers of executing untrusted commands, as the “human element” remains a critical and frequently exploited vulnerability.  

The following table summarizes key malware campaigns and takedowns during the reporting period:

Table: Key Malware Campaigns & Takedowns (May 19-26, 2025)

Malware NameAssociated Threat Actor(s)Description/FunctionalityDistribution MethodsKey TTPsImpact/StatusIdentified IOCs (Sample)
Lumma StealerLumma Stealer Group (MaaS)Information stealer: targets browser data (credentials, cookies, history), crypto wallets, credit cards, passwords.Spear-phishing emails, malvertising, brand impersonation (e.g., Microsoft, Booking.com), and fake AI video tools.The MaaS model, difficult to detect by traditional defenses.Major takedown by Microsoft & global law enforcement (May 21, 2025). Over 394,000 Windows PCs infected (Mar 16-May 16). >2,300 domains seized.Hashes (MD5, SHA1, SHA256), DLL binaries (iphlpapi.dll, winhttp.dll), numerous domains.
ELPACO-team RansomwareUnspecified (Mimic variant)Ransomware: encrypts files (.ELPACO-team extension), attempts to halt VMs.Exploitation of Atlassian Confluence (CVE-2023-22527), RDP, and SMB.Metasploit, AnyDesk, new admin users, Zerologon attempts, Mimikatz, ProcessHacker, Impacket, and disabling Windows Defender.Active exploitation, ransomware deployment.IPs: 45.227.254.124, 91.191.209.46. Hashes (SHA256) for elpaco-team.exe, mimikatz.exe, processhacker-2.39-setup.exe, etc..
LOSTKEYSCOLDRIVER (UNC4057, Star Blizzard, Callisto)Information stealer: steals files (hard-coded extensions/dirs), system info, running processes, credentials, emails, contacts.ClickFix social engineering (fake CAPTCHA, PowerShell commands).Leverages PowerShell, VBS scripts, and targets government/NATO.Active campaign, espionage-focused.Not explicitly listed in snippets, but advisory indicates IOCs are available.
Winos 4.0UnspecifiedMalware framework: delivered via multi-stage, memory-resident loader (Catena).Fake software installers (Let’s VPN, QQ Browser).Multi-stage infection chain.Impacted by Operation Endgame (May 19-22, 2025).Not explicitly listed in snippets.
Procolored MalwareUnspecifiedVarious malware strains, including new self-replicating variants.Infected printer software drivers from the vendor’s file-sharing database.Supply chain compromise, self-replication.Widespread infection, vendor removed infected downloads.Not explicitly listed in snippets.


V. Vulnerability Spotlight

The week of May 19-26, 2025, brought critical updates regarding actively exploited vulnerabilities, underscoring the dynamic nature of the threat landscape and the imperative for rapid patching.

CISA KEV Catalog Additions (May 19, 2025)

On May 19, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added six new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog. This designation signifies active exploitation in the wild and mandates urgent remediation for federal agencies, serving as a strong recommendation for all organizations.  

The newly added vulnerabilities include:

  • Ivanti Endpoint Manager Mobile (EPMM) Vulnerabilities: CVE-2025-4427 (Authentication Bypass) and CVE-2025-4428 (Code Injection). These critical flaws, when chained together, allow unauthenticated attackers to bypass authentication and execute arbitrary code on affected systems. Exploitation was observed in the wild beginning May 16, 2025, coinciding with public Proof-of-Concept (PoC) releases, indicating a rapid weaponization cycle.  
  • MDaemon Email Server Cross-Site Scripting (XSS) Vulnerability: CVE-2024-11182.  
  • Srimax Output Messenger Directory Traversal Vulnerability: CVE-2025-27920. This zero-day vulnerability was exploited by the Marbled Dust threat actor as early as April 2024, allowing authenticated users to drop malicious files into the server’s startup directory and gain indiscriminate access to communications.  
  • Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability: CVE-2024-27443.  
  • ZKTeco BioTime Path Traversal Vulnerability: CVE-2023-38950.  

SAP NetWeaver Critical Vulnerabilities

Two critical vulnerabilities in SAP NetWeaver, CVE-2025-31324 (Missing Authorization Check) and CVE-2025-42999 (a flaw in the Visual Composer component), have been under active exploitation. These flaws allow unauthenticated file uploads and remote code execution, potentially granting backdoor access to the entire hosted environment. This unauthorized access can then enable lateral movement into additional connected applications, including Industrial Control Systems (ICS). Multiple China-based threat groups, including UNC5221, UNC5174, and CL-STA-0048, exploited these vulnerabilities, deploying web shells, reverse shells, and various malware such as PlugX and KrustyLoader. Reports indicated that thousands of servers were reportedly vulnerable before patches were released, underscoring the widespread risk.  

Other Noteworthy Vulnerabilities

Beyond the CISA KEV additions and SAP NetWeaver issues, other vulnerabilities warrant attention:

  • Google Chrome Vulnerability: A vulnerability allowing for arbitrary code execution was highlighted in an MS-ISAC advisory on May 15, 2025, urging users to update their browsers.  
  • DrayTek Vigor Routers: CVE-2024-12987, an OS command injection vulnerability in DrayTek Vigor2960, Vigor300B, and Vigor3900 routers, was noted as needing urgent updates.  
  • Google Chromium: CVE-2025-4664, an insufficient policy enforcement vulnerability allowing cross-origin data leakage, also requires updates.  

The accelerating exploitation lifecycle and the criticality of patch management are increasingly evident. Multiple critical vulnerabilities, including those in Ivanti EPMM, SAP NetWeaver, Srimax Output Messenger, and ZKTeco BioTime, are explicitly stated to be actively exploited in the wild. The exploitation of Ivanti EPMM was observed just days after the public PoC releases. Similarly, the SAP NetWeaver flaws were exploited by multiple groups, impacting thousands of servers, before patches were widely applied. CISA’s rapid addition of these to the KEV catalog signifies an immediate, real-world threat. This pattern demonstrates an accelerating exploitation lifecycle. The time window between vulnerability disclosure and active exploitation, often fueled by the rapid availability of public Proof-of-Concept exploits, is shrinking. Attackers prioritize widely adopted software and critical infrastructure components because a single exploit can yield a high number of vulnerable targets. Inadequate or delayed patching, even by a few days or weeks, creates a significant and easily exploitable window of opportunity for attackers. This makes timely and comprehensive patch management not just a best practice, but a critical, time-sensitive defense. Organizations must move beyond traditional, scheduled patching cycles. They need to implement a robust, risk-based vulnerability management program that prioritizes patching of actively exploited and critical vulnerabilities, especially those in internet-facing systems, widely used enterprise software, and critical infrastructure components. Automated patching, continuous vulnerability scanning, and integration with real-time threat intelligence feeds are essential to reduce the attack surface and minimize exposure.  

The following table details the critical vulnerabilities added to CISA’s KEV Catalog on May 19, 2025:

Table: Critical Vulnerabilities Added to CISA KEV (May 19, 2025)

CVE IDVulnerability NameAffected Product(s)DescriptionCVSS ScoreCISA KEV Date AddedRecommended Mitigation Due Date
CVE-2025-4427Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass VulnerabilityIvanti EPMMAllows unauthenticated attackers to bypass authentication.Not explicitly listed, but criticalMay 19, 2025June 9, 2025
CVE-2025-4428Ivanti Endpoint Manager Mobile (EPMM) Code Injection VulnerabilityIvanti EPMMAllows unauthenticated attackers to execute arbitrary code when chained with CVE-2025-4427.Not explicitly listed, but criticalMay 19, 2025June 9, 2025
CVE-2024-11182MDaemon Email Server Cross-Site Scripting (XSS) VulnerabilityMDaemon Email ServerAllows a remote attacker to load arbitrary JavaScript code via HTML email.Not explicitly listedMay 19, 2025Not explicitly listed
CVE-2025-27920Srimax Output Messenger Directory Traversal VulnerabilitySrimax Output MessengerAllows authenticated users to drop malicious files to the server’s startup directory.Not explicitly listedMay 19, 2025Not explicitly listed
CVE-2024-27443Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) VulnerabilitySynacor Zimbra Collaboration Suite (ZCS)XSS vulnerability in CalendarInvite feature.Not explicitly listedMay 19, 2025Not explicitly listed
CVE-2023-38950ZKTeco BioTime Path Traversal VulnerabilityZKTeco BioTimeAllows unauthenticated attacker to read arbitrary files via crafted payload.Not explicitly listedMay 19, 2025Not explicitly listed


VI. Threat Actor Activity Updates

The week of May 19-26, 2025, provided further insights into the evolving tactics and targets of several prominent threat actors, highlighting the diverse motivations and sophisticated approaches employed in the cyber domain.

Scattered Spider (aka UNC3944, Octo Tempest)

This prominent cybercriminal group has reportedly shifted its primary focus from the UK to US retailers. Scattered Spider is notorious for its sophisticated social engineering tactics, particularly impersonating employees during IT help desk calls to gain unauthorized system access and bypass traditional security controls. Their motivations appear to be a blend of financial gain and notoriety, often timing their attacks to generate maximum media exposure and impact. During this period, luxury brands like Dior, Harrods, and Marks & Spencer were compromised, with Dior’s breach specifically exposing sensitive customer data in China and South Korea.  

COLDRIVER (aka UNC4057, Star Blizzard, Callisto)

Identified as a Russia-linked threat actor group, COLDRIVER continues to pose a significant espionage threat. This group employs ClickFix-like social engineering lures, presenting fake CAPTCHA prompts to trick users into manually copying and pasting malicious PowerShell commands into their terminals. They are distributing a new information stealer, LOSTKEYS, which is designed to steal sensitive files (based on hard-coded extensions and directories), collect system information, and list running processes. COLDRIVER is also known to steal account credentials, emails, and contacts. Their operations are strategically aligned, targeting NATO governments, Non-Governmental Organizations (NGOs), current and former Western government advisors, militaries, journalists, and think tanks, with the goal of collecting sensitive information that aligns with Russian strategic objectives.  

FamousSparrow

This Chinese threat actor has been linked to recent cyberattacks targeting a U.S. trade group and a Mexican research institute. FamousSparrow deploys web shells on Internet Information Services (IIS) servers, often exploiting outdated Windows Server and Microsoft Exchange Server versions to gain initial access. They then proceed to deliver their flagship backdoor, SparrowDoor, and the ShadowPad malware.  

Lemon Sandstorm (aka Pioneer Kitten, Fox Kitten, UNC757, Parisite, RUBIDIUM)

Lemon Sandstorm is an Iran-based state-sponsored cyber actor, also operating under the moniker “xplfinder” since 2024. This group actively exploits U.S. organizations across various sectors, including education, finance, healthcare, defense, and local government, as well as entities in Israel, Azerbaijan, and the UAE. Their techniques include capturing login credentials using webshells on compromised Netscaler devices, deploying webshells to specific directories, placing additional webshells after system owners patch vulnerabilities, creating accounts on victim networks, requesting exemptions to zero-trust policies, and using DLL side-loading. They have demonstrated the ability to maintain long-term access (nearly two years) to Middle East critical national infrastructure (CNI) via VPN flaws and custom backdoors like HanifNet and HXLibrary. Notably, Lemon Sandstorm has been observed working with financially motivated ransomware groups such as NoEscape, ALPHV (BlackCat), and Ransomhouse. In some cases, they provide initial access to these ransomware affiliates or work in tandem with them to lock victim networks and implement extortion strategies.  

NoName057(16)

NoName057(16) is a pro-Russian hacktivist group primarily known for Distributed Denial-of-Service (DDoS) attacks. They utilize a custom DDoS tool named DDoSia and frequently escalate attacks during periods of heightened geopolitical tension. On May 4, 2025, they launched DDoS attacks against multiple Romanian government websites on election day. They had also targeted Italian ministries and critical infrastructure in January 2025. Their targets are consistently Western and pro-NATO countries, including financial institutions, government websites, transportation services, and critical infrastructure in Ukraine, Poland, Denmark, Lithuania, Italy, the Czech Republic, Canada, and Romania.  

The blurring lines and convergence of cybercrime and state-sponsored activities represent a significant and evolving threat. Lemon Sandstorm, an Iranian state-sponsored Advanced Persistent Threat (APT) group, is explicitly documented to collaborate with financially motivated ransomware groups like NoEscape and BlackCat. This collaboration can manifest as providing initial access to these ransomware affiliates or working jointly on extortion campaigns. This direct link between the nation-state and cybercriminal operations is a concerning development. Broader reports corroborate this trend, mentioning the “proliferation of cyber mercenaries” and the blurring of lines between criminal and nation-state activity. As another example, COLDRIVER, identified as a Russian government-backed threat group, is distributing new information-stealing malware (LOSTKEYS) via social engineering tactics, which are commonly employed in financially motivated cybercrime. This consistent pattern indicates a significant trend of convergence where nation-state actors increasingly leverage or directly employ existing cybercriminal infrastructure, tools, and expertise for their strategic objectives, such as espionage or disruption. This symbiotic relationship provides financial gain to the criminals while offering nation-states plausible deniability and access to a wider range of TTPs. This convergence fundamentally complicates threat attribution and defense, as the motivations behind an attack may be mixed—for instance, financial gain as a cover for espionage, or disruption as a means to an end. Therefore, organizations must recognize that a seemingly financially motivated attack, such as ransomware, could be a cover or an enabler for state-sponsored objectives. Defensive strategies need to be comprehensive enough to account for a wider range of TTPs, including those traditionally associated with cybercrime, even when the ultimate objective might be geopolitical influence or intelligence gathering. This requires a holistic threat intelligence approach that analyzes both criminal and state-sponsored playbooks to anticipate and defend against complex, multi-faceted threats.  

VII. Official Advisories and Intelligence Sharing

Effective cybersecurity relies heavily on timely and actionable intelligence sharing. The past week saw critical advisories and updates from key government and industry bodies, emphasizing the growing importance of collaborative defense.

CISA/FBI Joint Advisory on LummaC2 Malware (May 21, 2025)

On May 21, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) released a joint Cybersecurity Advisory (CSA). This advisory detailed the Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs) associated with threat actors deploying LummaC2 malware. This malware poses a serious threat, capable of infiltrating networks and exfiltrating sensitive information from vulnerable individuals’ and organizations’ computer networks across U.S. critical infrastructure sectors. The advisory includes IOCs tied to infections observed from November 2023 through May 2025, underscoring the ongoing nature of this threat.  

MS-ISAC Updates

The Multi-State Information Sharing and Analysis Center (MS-ISAC) continued to provide crucial updates and resources:

  • Cyber Threat Alert Level: As of May 21, 2025, the MS-ISAC’s Cyber Threat Alert Level remained at Blue (Guarded), specifically due to ongoing vulnerabilities in Ivanti and Google products. This indicates a moderate but persistent threat level, requiring continued vigilance.  
  • Advisories: On May 15, 2025, MS-ISAC released two significant advisories. The first highlighted multiple vulnerabilities in Ivanti Endpoint Manager Mobile (EPMM), with the most severe potentially allowing for remote code execution. The second advisory addressed a vulnerability in Google Chrome that could also allow for arbitrary code execution, urging users to update their browsers.  
  • Real-time Indicator Feeds: The MS-ISAC provides real-time cyber threat intelligence (CTI) indicator feeds at no cost to U.S. State, Local, Tribal, and Territorial (SLTT) entities and election offices. These feeds are designed for easy implementation and ingestion into most modern security and analysis tools due to their industry-standard formatting. The feeds include Domains, IPs (both v4 and v6), Full URLs, Email addresses, File hashes, and Unique HTTP requests. They are available in industry-standard formats such as Structured Threat Intelligence eXpression (STIX), Trusted Automated eXchange of Intelligence Information (TAXII), and Malware Information Sharing Platform (MISP), facilitating direct integration into security devices.  
  • K-12 Cybersecurity Report: The “2025 CIS MS-ISAC K-12 Cybersecurity Report” highlighted significant vulnerabilities within the education sector. An analysis of over 5,000 K-12 organizations between July 2023 and December 2024 revealed that 82% experienced cyber threat impacts, with nearly 14,000 security events and over 9,300 confirmed cyber incidents. Schools are identified as prime targets for ransomware, Denial-of-Service (DoS) attacks, phishing, and data breaches, often lacking adequate funding and expertise compared to businesses.  

The growing importance of collaborative threat intelligence and sector-specific focus is a key observation. The CISA/FBI joint advisory on LummaC2 targeting critical infrastructure and the MS-ISAC’s provision of real-time indicator feeds highlight a concerted effort by government agencies to disseminate actionable threat intelligence. The MS-ISAC’s K-12 Cybersecurity Report specifically details the high rate of cyberattacks on schools, emphasizing their unique vulnerabilities and the need for tailored defenses. The success of the Lumma Stealer takedown operation, involving coordination among Microsoft, the U.S. Department of Justice, Europol, and Japan’s JC3, further underscores the necessity of global collaboration. Effective defense against the increasingly sophisticated and widespread cyber threats requires a collaborative approach to threat intelligence. This involves not only formal government advisories but also real-time sharing of Indicators of Compromise (IOCs) and detailed, sector-specific reports. Such collaboration enables organizations to leverage collective defense capabilities, receive targeted intelligence relevant to their unique risk profiles, and participate in broader efforts to disrupt cybercriminal operations. The emphasis on K-12 schools, for instance, shows a recognition that general advisories may not be sufficient for all sectors, necessitating specialized guidance. Therefore, organizations should actively engage with and contribute to threat intelligence platforms and Information Sharing and Analysis Centers (ISACs/ISAOs) relevant to their industry or sector. Integrating these real-time feeds and specialized reports into their security operations allows for more proactive and tailored defense strategies, moving beyond generic security measures to address specific, evolving threats.  

The following table provides specific Indicators of Compromise (IOCs) for LummaC2 malware, as detailed in the CISA advisory:

Table: LummaC2 Indicators of Compromise (IOCs)

Indicator TypeHash/DomainDescription
MD5 Hashes4AFDC05708B8B39C82E60ABE3ACE55DBLummaC2.exe (November 2023)
E05DF8EE759E2C955ACC8D8A47A08F42LummaC2.exe (November 2023)
C7610AE28655D6C1BCE88B5D09624FEFLummaC2.exe
SHA1 Hashes1239288A5876C09D9F0A67BCFD645735168A7C80LummaC2.exe (November 2023)
B66DA4280C6D72ADCC68330F6BD793DF56A853CBLummaC2.exe (November 2023)
TLSH Hash3B267FA5E1D1B18411C22E97B367258986E871E5LummaC2.exe
SHA256 Hashes19CC41A0A056E503CC2137E19E952814FBDF14F8D83F799AEA9B96ABFF11EFBBLummaC2.exe (November 2023)
2F31D00FEEFE181F2D8B69033B382462FF19C35367753E6906ED80F815A7924FLummaC2.exe (November 2023)
4D74F8E12FF69318BE5EB383B4E56178817E84E83D3607213160276A7328AB5DLummaC2.exe
325daeb781f3416a383343820064c8e98f2e31753cd71d76a886fe0dbb4fe59aLummaC2.exe
76e4962b8ccd2e6fd6972d9c3264ccb6738ddb16066588dfcb223222aaa88f3cLummaC2.exe
7a35008a1a1ae3d093703c3a34a21993409af42eb61161aad1b6ae4afa8bbb70LummaC2.exe
a9e9d7770ff948bb65c0db24431f75dd934a803181afa22b6b014fac9a162dabLummaC2.exe
b287c0bc239b434b90eef01bcbd00ff48192b7cbeb540e568b8cdcdc26f90959LummaC2.exe
ca47c8710c4ffb4908a42bd986b14cddcca39e30bb0b11ed5ca16fe8922a468bLummaC2.exe
DLL Binariesiphlpapi.dllIP Helper API
winhttp.dllWindows HTTP Services
Observed DomainsPinkipinevazzey[.]pw, Fragnantbui[.]shop, Medicinebuckerrysa[.]pw, Musicallyageop[.]pw, stogeneratmns[.]shop, wallkedsleeoi[.]shop, Tirechinecarpet[.]pw, reinforcenh[.]shop, reliabledmwqj[.]shop, Musclefarelongea[.]pw, Forbidstow[.]site, gutterydhowi[.]shop, Fanlumpactiras[.]pw, Computeryrati[.]site, Contemteny[.]site, Ownerbuffersuperw[.]pw, Seallysl[.]site, Dilemmadu[.]site, Freckletropsao[.]pw, Opposezmny[.]site, Faulteyotk[.]site, Hemispheredodnkkl[.]pw, Goalyfeastz[.]site, Authorizev[.]site, ghostreedmnu[.]shop, Servicedny[.]site, blast-hubs[.]com, offensivedzvju[.]shop, friendseforever[.]help, blastikcn[.]com, vozmeatillu[.]shop, shiningrstars[.]help, penetratebatt[.]pw, drawzhotdog[.]shop, mercharena[.]biz, pasteflawwed[.]world, generalmills[.]pro, citywand[.]live, hoyoverse[.]blog, nestlecompany[.]pro, esccapewz[.]run, dsfljsdfjewf[.]info, naturewsounds[.]help, travewlio[.]shop, decreaserid[.]world, stormlegue[.]com, touvrlane[.]bet, governoagoal[.]pw, paleboreei[.]biz, calmingtefxtures[.]run, foresctwhispers[.]top, tracnquilforest[.]life, sighbtseeing[.]shop, advennture[.]top, collapimga[.]fun, holidamyup[.]today, pepperiop[.]digital, seizedsentec[.]online, triplooqp[.]world, easyfwdr[.]digital, strawpeasaen[.]fun, xayfarer[.]live, jrxsafer[.]top, quietswtreams[.]life, oreheatq[.]live, plantainklj[.]run, starrynsightsky[.]icu, castmaxw[.]run, puerrogfh[.]live, earthsymphzony[.]today, weldorae[.]digital, quavabvc[.]top, citydisco[.]bet, steelixr[.]live, furthert[.]run, featureccus[.]shop, smeltingt[.]run, targett[.]top, mrodularmall[.]top, ferromny[.]digital, ywmedici[.]top, jowinjoinery[.]icu, rodformi[.]run, legenassedk[.]top, htardwarehu[.]icu, metalsyo[.]digital, ironloxp[.]live, cjlaspcorne[.]icu, navstarx[.]shop, bugildbett[.]top, latchclan[.]shop, spacedbv[.]world, starcloc[.]bet, rambutanvcx[.]run, galxnetb[.]today, pomelohgj[.]top, scenarisacri[.]top, jawdedmirror[.]run, changeaie[.]top, lonfgshadow[.]live, liftally[.]top, nighetwhisper[.]top, salaccgfa[.]top, zestmodp[.]top, owlflright[.]digital, clarmodq[.]top, piratetwrath[.]run, hemispherexz[.]top, quilltayle[.]live, equatorf[.]run, latitudert[.]live, longitudde[.]digital, climatologfy[.]top, starofliught[.]topDomains observed deploying LummaC2 malware (historical, may not be currently malicious)


VIII. Recommendations and Mitigations

To effectively counter the evolving cyber threat landscape observed during May 19-26, 2025, organizations should implement a multi-layered and proactive defense strategy focusing on the following key areas:

  • Prioritize Patch Management:
    • Immediately apply patches for all critical and actively exploited vulnerabilities, especially those recently added to the CISA KEV Catalog on May 19, 2025. This includes, but is not limited to, Ivanti EPMM (CVE-2025-4427, CVE-2025-4428), SAP NetWeaver (CVE-2025-31324, CVE-2025-42999), Srimax Output Messenger (CVE-2025-27920), Synacor Zimbra (CVE-2024-27443), and ZKTeco BioTime (CVE-2023-38950).
    • Implement a risk-based patching strategy that prioritizes internet-facing systems, critical infrastructure components, and widely used enterprise software, given the rapid exploitation of new vulnerabilities.  
  • Strengthen Identity and Access Management (IAM):
    • Enforce Multi-Factor Authentication (MFA) across all services, particularly for remote access (VPN, RDP) and privileged accounts, as threat actors continue to target credentials.  
    • Implement Zero Trust principles, requiring continuous authentication and least-privilege access for all users, devices, and connections, whether inside or outside the organization’s network.
    • Regularly audit user accounts for unexpected administrator entries or signs of compromised credentials, as observed in ELPACO-team ransomware attacks.  
  • Enhance Endpoint and Network Security:
    • Deploy advanced Endpoint Detection and Response (EDR) and anti-ransomware solutions with behavioral analysis capabilities to detect encryption activities, process manipulation, and debugger detection in real-time.  
    • Monitor Windows Management Instrumentation (WMI) activity for suspicious actions, especially those related to shadow copy deletion or service manipulation, which are common ransomware TTPs.  
    • Implement robust network segmentation to limit lateral movement and contain infections, thereby reducing the attack surface.  
    • Use application whitelisting to ensure that only approved and legitimate software is allowed to run on endpoints, preventing the execution of unauthorized malicious binaries.  
    • Implement firewalls, intrusion detection systems (IDS), and DNS filtering to block access to known malicious domains and Command and Control (C2) infrastructure, including.onion URLs associated with threat actors.  
  • Improve Data Backup and Recovery:
    • Maintain regular, offsite, and offline backups that are logically and physically isolated from the primary network to prevent them from being affected during a ransomware attack.  
    • Regularly test backup and recovery procedures to ensure data integrity and the ability to swiftly restore essential business functions in the event of a compromise.  
    • Develop and test a comprehensive incident response plan specifically for ransomware attacks, outlining clear roles, responsibilities, and steps for containment, eradication, and recovery.  
  • Bolster Social Engineering Defenses:
    • Conduct continuous and adaptive security awareness training for all employees, focusing on recognizing sophisticated phishing attempts, fake software updates (including browser and security software updates), and social engineering techniques like ClickFix.  
    • Educate staff on the risks associated with AI-generated deepfake technology and vishing scams, which are becoming increasingly convincing.
    • Implement advanced threat protection for emails, including robust spam filtering, phishing detection, and sandboxing of suspicious attachments and links.  
  • Leverage Threat Intelligence:
    • Actively engage with threat intelligence platforms and information sharing and analysis centers (ISACs/ISAOs) relevant to your industry or sector.  
    • Integrate real-time threat intelligence feeds, such as those provided by MS-ISAC, into security devices and Security Information and Event Management (SIEM) systems for enhanced detection and response capabilities.  
  • Address AI in Security:
    • Invest strategically in AI-driven security solutions for enhanced threat detection, anomaly identification, and automated response, recognizing AI’s growing role in both offense and defense.
    • Implement robust governance and safeguards to assess AI tools before use and ensure their proper, secure integration with existing security systems and workflows.

 

 

 

 

 


IX. Outlook for the Coming Week

The cyber threat landscape is expected to remain highly dynamic in the coming week. The resilience of the cybercriminal ecosystem suggests that despite recent law enforcement successes against major malware distribution networks, new variants and affiliate groups are likely to emerge rapidly, adapting their tactics and infrastructure.

Organizations should anticipate ongoing exploitation of recently disclosed critical vulnerabilities, especially those with publicly available Proof-of-Concept exploits. Maintaining extreme vigilance and prioritizing rapid patching will be crucial to closing these windows of opportunity before widespread compromise occurs.

Social engineering, particularly AI-enhanced phishing and fake update campaigns, will continue to be a primary initial access vector. This necessitates continuous employee education and robust email and web security controls to mitigate the human element of risk.

Nation-state actors are expected to persist in their espionage and disruptive activities, potentially leveraging cybercriminal tools and techniques. This continued convergence will further blur the lines between motivations and complicate attribution, requiring a comprehensive threat intelligence approach.

The focus on critical infrastructure, healthcare, and education sectors is likely to continue, given their high impact potential and perceived vulnerabilities. These sectors should remain on high alert and implement sector-specific defense strategies.

In summary, continuous vigilance, adaptive defense strategies, and proactive consumption of actionable threat intelligence will be paramount for maintaining a strong security posture in the face of these evolving and increasingly sophisticated threats.

CONTACT INFORMATION

For further inquiries or guidance regarding this report, please contact the Meraal Cyber Security (MCS) Threat Intelligence Team.

Note on Sources and Intelligence: This report synthesizes information from various credible sources, including public advisories from organizations like CISA, MITRE, and MS-ISAC, alongside internal analysis and emerging threat intelligence. Efforts have been made to differentiate between confirmed intelligence and speculative or unverified information to maintain accuracy and credibility.

Leave a Reply

Your email address will not be published. Required fields are marked *