Cyware Daily Threat Intelligence, August 18, 2025

shutterstock 1772847728 (1)

Daily Threat Briefing August 18, 2025

Trojan Horses are making a comeback as AI-powered apps like "JustAskJacky" disguise malware within useful tools such as recipe or image search apps. By leveraging AI-generated websites, attackers make them look legitimate while slipping past antivirus defenses.

A critical flaw (CVE-2025-7353) in Rockwell’s ControlLogix Ethernet modules could let hackers remotely manipulate memory and hijack industrial processes. Rockwell has released firmware version 12.001 and urges immediate patching, with no workarounds available.

Cybercriminals are cashing in on the back-to-school rush with fake e-commerce sites posing as trusted retailers. Luring victims with deep discounts and realistic AI-driven ads, these fraudulent shops steal money and personal data.

Top Malware Reported in the Last 24 Hours

Multi-stage attack using termncolor and colorinal packages

Zscaler ThreatLabz identified malicious Python packages termncolor and colorinal, which facilitate multi-stage malware operations. The malware uses terminate.dll for AES decryption, stealthy file deployment, and persistence via registry entries. The attack targets both Windows and Linux systems, employing terminate.dll and terminate.so files for execution.

AI fuels the comeback of Trojan Malware

AI-powered tools like "JustAskJacky" and other apps have led to a resurgence of true Trojan Horses, which were previously rare. Websites and applications appear professional and legitimate, making them indistinguishable from safe platforms, bypassing traditional user caution. Trojan Horses now integrate malicious code within functional applications, such as recipe apps or image search tools, exploiting AI-generated content. Large Language Models (LLMs) enable threat actors to create convincing websites and applications, reducing the effort required to evade antivirus detection.

Top Vulnerabilities Reported in the Last 24 Hours

Severe vulnerability in Elastic's EDR system

A critical 0-day vulnerability was discovered in Elastic’s Endpoint Detection and Response (EDR) kernel driver, allowing attackers to exploit the system it is supposed to protect. The attack chain involves bypassing Elastic’s security solutions, enabling remote code execution, establishing persistence, and triggering a DoS attack. The vulnerability stems from mishandled memory operations in the kernel driver, leading to a CWE-476: NULL Pointer Dereference that causes system crashes (BSOD). The flaw allows the trusted Elastic driver to exhibit malware-like behavior, making it a weapon against its own host system.

Critical flaw in ControlLogix modules

Rockwell Automation has identified a critical vulnerability (CVE-2025-7353) in its ControlLogix Ethernet modules, which could allow remote attackers to execute malicious code on industrial control systems. The flaw stems from an insecurely configured web-based debugger agent that enables unauthorized access, memory manipulation, and control of industrial processes. The vulnerability carries a CVSS score of 9.8, highlighting its severity. Affected modules include several ControlLogix communication models, essential for industrial automation. Rockwell Automation has released firmware version 12.001 to address the issue, urging immediate patching as no workarounds are available. 

Top Scams Reported in the Last 24 Hours

Chinese cybercriminals exploit NFC technology for retail fraud

Chinese-speaking threat actors are leveraging Ghost-tapping techniques, a new way to commit retail fraud via NFC relay fraud, utilizing stolen payment card details linked to mobile wallets like Apple Pay and Google Pay. Cybercriminals sell burner phones loaded with stolen payment card credentials and proprietary software capable of relaying payment card data for ghost-tapping campaigns. Chinese syndicates recruit mules to purchase physical goods using ghost-tapping techniques, resell them for cash, and launder funds through platforms like Huione Guarantee, Xinbi Guarantee, and Tudou Guarantee.

Scammers capitalize on back-to-school deals

Scammers exploit the back-to-school shopping season by creating fraudulent e-commerce sites that mimic legitimate retailers to steal funds and personal data. These sites offer fake discounts on high-demand items and use phishing tactics to harvest sensitive information. Social media and AI-driven ads target shoppers with realistic promotions, leading them to scam domains. Smishing campaigns also pose risks, impersonating delivery notifications to lure users into malware-laden sites.

Related Threat Briefings