Cyware Daily Threat Intelligence, August 05, 2025

Daily Threat Briefing • August 5, 2025
Daily Threat Briefing • August 5, 2025
A stealthy Python-based PXA Stealer is sweeping across 62 countries, pilfering sensitive data from unsuspecting victims. This infostealer campaign has exfiltrated hundreds of thousands of passwords and more. Using sideloading tricks with legitimate software, it targets browsers, cryptocurrency wallets, and financial sites, posing a severe threat to users and organizations alike.
ClickTok is luring TikTok Shop users into a trap with a crafty blend of phishing and malware. This global campaign deploys over 10,000 fake TikTok websites and 5,000 malicious apps, impersonating TikTok’s e-commerce platforms to steal cryptocurrency wallet credentials. Trojanized apps laced with SparkKitty spyware snatch sensitive data, making this a sophisticated scam targeting digital shoppers.
Google’s August 2025 Android security update is a critical shield against newly discovered vulnerabilities threatening millions of devices. Addressing six flaws, the update also patches high-severity Android framework bugs and issues in Arm and Qualcomm components. With two patch levels rolled out, manufacturers are now racing to deploy fixes to keep users secure.
Android malware targets Indian banking users
McAfee discovered Android malware targeting Indian banking users, stealing financial data and mining Monero cryptocurrency. The malware impersonates legitimate financial apps and is distributed through phishing websites resembling official banking sites. It employs dropper techniques with multi-stage encryption to evade static detection and analysis. The malware collects sensitive financial information and sends it to attackers while displaying fake interfaces. Hidden cryptomining is triggered remotely via Firebase Cloud Messaging, utilizing XMRig-compatible arguments.
PXA Stealer: Evasive cybercrime campaign
Researchers uncovered an ongoing infostealer campaign using the Python-based PXA Stealer. The campaign has infected systems in over 62 countries, exfiltrating 200,000 passwords, hundreds of credit card records, and millions of browser cookies. The attackers are linked to Vietnamese-speaking cybercriminal circles, monetizing stolen data through a Telegram-powered subscription ecosystem. Delivery methods include sideloading legitimate signed software (e.g., Haihaisoft PDF Reader, Microsoft Word 2013) with concealed malicious DLLs. The malware targets a wide range of browsers, cryptocurrency wallets, VPNs, and applications, as well as specific financial and cryptocurrency-related websites.
New ClickTok malware campaign spotted
CTM360 discovered ClickTok, a malware campaign targeting TikTok Shop users globally to steal cryptocurrency wallets and funds. The scam uses phishing and malware tactics, impersonating TikTok's e-commerce platforms like TikTok Shop, Wholesale, and Mall. Fake TikTok websites mimic the official interface, tricking users into entering credentials and making payments via cryptocurrency wallets. Trojanized apps infected with SparkKitty spyware steal sensitive data like screenshots containing wallet credentials. Over 10,000 fake TikTok websites and 5,000 malicious apps have been observed, distributed via QR codes, messaging apps, and in-app downloads.
Google patches six Android bugs
Google's August 2025 Android security update addressed six vulnerabilities, including CVE-2025-48530, a critical RCE flaw that does not require user interaction for exploitation. Additionally, two high-severity vulnerabilities were resolved: CVE-2025-22441 and CVE-2025-48533, both affecting the Android framework and also not requiring user privileges. The update includes two patch levels (2025-08-01 and 2025-08-05), addressing issues in Arm and Qualcomm components, with third-party manufacturers releasing patches on their own schedules.
New vulnerabilities in NVIDIA Triton
Security vulnerabilities in NVIDIA's Triton Inference Server for Windows and Linux could allow remote, unauthenticated attackers to gain control of AI servers, leading to RCE. The vulnerabilities include CVE-2025-23319 (CVSS score: 8.1), CVE-2025-23320 (CVSS score: 7.5), and CVE-2025-23334 (CVSS score: 5.9), which can result in information disclosure, denial of service, and data tampering. Attackers can chain these flaws to transform an information leak into a full system compromise, exploiting the Python backend designed for AI frameworks like PyTorch and TensorFlow. NVIDIA has addressed these issues in version 25.07.