Cyware Daily Threat Intelligence, July 07, 2025

Daily Threat Briefing • July 7, 2025
Daily Threat Briefing • July 7, 2025
SHELLTER has gone rogue—what was once a legit security tool is now fueling infostealer campaigns with AES-128 encryption, polymorphic junk code, and sneaky call stack tricks to dodge detection. Meanwhile, Hpingbot, a Go-based botnet with a flair for innovation, uses Pastebin, hping3, and persistent tactics to do more than just DDoS—hinting at nastier payloads like ransomware or APT tools.
Critical bugs are back on the menu—this time hitting low-code platforms and the Linux boot process. ScriptCase’s Production Environment module harbors two flaws (CVE-2025-47227 & CVE-2025-47228, enabling remote command execution and admin password resets, risking full server compromise, while CVE-2016-4484 in Linux lets attackers gain root access during boot by exploiting the initramfs debug shell.
Misuse of the commercial evasion framework
SHELLTER, a commercial evasion framework, has been illicitly acquired and used in infostealer campaigns since April 2025. It employs advanced evasion techniques such as polymorphic junk code, API hashing obfuscation, and call stack corruption to evade detection. The framework includes payload encryption using AES-128 CBC mode and compression via the LZNT1 algorithm.
Go-based botnet launches DDoS attack
Hpingbot is a newly discovered botnet family developed using the Go language, showing significant innovation and efficiency in leveraging existing resources for malicious activities. It uses Pastebin for payload distribution, hping3 for DDoS attacks, and employs multiple persistence mechanisms while iterating rapidly. Attackers are focusing on payload execution and distribution rather than just DDoS, with potential risks of spreading more dangerous components such as ransomware or APT tools.
Hackers exploit the Inno Setup installer framework
Cybercriminals are exploiting trusted software installers like Inno Setup to distribute malware, leveraging its Pascal scripting capabilities to disguise malicious payloads and evade detection. Attackers use multi-stage infection chains involving shellcode execution and tools like HijackLoader to deliver malware such as RedLine Stealer, which steals sensitive data like browser credentials and cryptocurrency wallet information.
Two critical vulnerabilities in ScriptCase
ScriptCase, a low-code PHP web application platform, has two critical vulnerabilities (CVE-2025-47227 and CVE-2025-47228) in its Production Environment module that allow pre-authenticated remote command execution. The first vulnerability enables attackers to reset the administrator password without authentication, while the second allows authenticated users to inject arbitrary system commands via unsanitized SSH configurations. These vulnerabilities can lead to server and database compromise.
Linux Boot flaw bypasses Secure Boot
A newly highlighted vulnerability in Linux boot processes allows attackers to bypass Secure Boot protections by exploiting the initramfs debug shell. Major Linux distributions like Ubuntu, Fedora, and Debian are affected by CVE-2016-4484, enabling attackers to gain root-level access during boot by repeatedly entering incorrect passwords or blank inputs.