Cyware Daily Threat Intelligence, August 06, 2025

Daily Threat Briefing • August 6, 2025
Daily Threat Briefing • August 6, 2025
Phishing emails disguised as court summons are delivering a malicious payload to Ukrainian government and defense sectors, courtesy of UAC-0099. These attacks use shortened URLs to deploy HTA files that execute obfuscated VB scripts, installing malware like MATCHBOIL, MATCHWOK, and DRAGSTARE.
The CISA is sounding the alarm on three actively exploited vulnerabilities in D-Link Wi-Fi cameras and video recorders, now added to its KEV catalog. These flaws, with severity scores up to 8.8, include a remote password disclosure issue, an authenticated command injection vulnerability, and an unpatched code execution flaw tied to end-of-life models.
A critical set of flaws dubbed ReVault is exposing over 100 Dell laptop models to devastating firmware attacks. Affecting the ControlVault3 firmware in Latitude and Precision series, these vulnerabilities allow attackers with physical access to bypass Windows login, execute arbitrary code, and install persistent malware that survives system reinstalls.
Malware deployed via Facebook ads
Malware disguised as a cryptocurrency exchange is being distributed through Facebook ads, specifically targeting cryptocurrency users. This malware prompts victims to download a malicious file named “installer.msi” from a fake website resembling Binance. Once installed, the malware opens a listening port on the victim's system and communicates with the disguised website to execute various commands. It collects sensitive system information, including browser data and screen captures, using specific parameters. If the system is not virtual, additional PowerShell scripts are executed, allowing further malicious downloads. The malware ultimately performs keylogging and gathers information related to the victim's online activities, posing significant security risks.
UAC-0099 targets Ukrainian government agencies
CERT-UA issued a warning about cyberattacks by the threat actor UAC-0099, which is targeting Ukrainian government agencies, defense forces, and enterprises in the defense-industrial sector. These attacks utilize phishing emails featuring court summons lures to deliver various malware families, including MATCHBOIL, MATCHWOK, and DRAGSTARE. The infection process involves shortened URLs leading to HTA files that execute obfuscated Visual Basic scripts, ultimately creating scheduled tasks for persistence. MATCHWOK can execute PowerShell commands and transmit results to remote servers, while DRAGSTARE collects sensitive system information and files.
Trend Micro addresses critical Apex One flaws
Trend Micro has confirmed the active exploitation of critical vulnerabilities in its on-premise Apex One Management Console, specifically CVE-2025-54948 and CVE-2025-54987. Both vulnerabilities, rated 9.4 on the CVSS scale, involve command injection and remote code execution, allowing pre-authenticated attackers to upload malicious code and execute commands on affected systems. While the two flaws share similarities, CVE-2025-54987 targets a different CPU architecture. Trend Micro observed attempts to exploit them in real-world scenarios. Although mitigations for the cloud version were deployed earlier, the on-premise systems are awaiting a formal patch expected in mid-August.
CISA adds 3 bugs to KEV catalog
The CISA has added three vulnerabilities affecting D-Link Wi-Fi cameras and video recorders to its KEV catalog due to evidence of active exploitation. These vulnerabilities, identified as CVE-2020-25078, CVE-2020-25079, and CVE-2020-40799, have severity scores ranging from 7.5 to 8.8. CVE-2020-25078 allows for remote administrator password disclosure, while CVE-2020-25079 is an authenticated command injection vulnerability. CVE-2020-40799 enables code execution without integrity checks and remains unpatched since the affected model reached end-of-life status in November 2021. The vulnerabilities have raised concerns following reports of exploitation, particularly related to ongoing HiatusRAT campaigns targeting vulnerable devices.
Dell laptops vulnerable to ReVault flaws
Dell ControlVault3 firmware vulnerabilities, referred to as ReVault, impact over 100 laptop models, including the Latitude and Precision series. These vulnerabilities consist of five key issues: two out-of-bounds flaws (CVE-2025-24311, CVE-2025-25050), an arbitrary free vulnerability (CVE-2025-25215), a stack overflow (CVE-2025-24922), and an unsafe deserialization issue (CVE-2025-24919) affecting ControlVault's Windows APIs. Attackers can exploit these flaws to bypass Windows login, execute arbitrary code on the firmware, and install persistent malware that survives system reinstalls. Physical access to the laptop allows attackers to manipulate the USH board, enabling them to escalate privileges and compromise fingerprint authentication, potentially granting unauthorized access to sensitive systems.