Cyware Daily Threat Intelligence, July 11, 2025

Daily Threat Briefing • July 11, 2025
Daily Threat Briefing • July 11, 2025
You don’t need to visit shady corners of the internet to get infected, GitHub will do. A malware campaign is disguising Lumma Stealer as tools like Free VPN for PC, using polished project pages, Base64 payloads, and trusted Windows processes to slip past defenses.
Meanwhile, MCP-based tools are facing a string of critical vulnerabilities, with CVE-2025-6514 leading the list. The flaw allows remote code execution via malicious MCP servers and affects users across platforms. Other bugs enable code injection, directory traversal, and symlink abuse.
Crypto users are being lured in by fake AI and gaming firms offering too-good-to-be-true deals. A social engineering campaign is using Telegram, Discord, and spoofed social media accounts to deliver stealer malware. Attackers impersonate legit teams on GitHub and Notion, promising crypto payouts in exchange for “testing” software.
GitHub abused to drop malware
Cybercriminals are exploiting GitHub to distribute malware disguised as free software, specifically targeting users with applications like "Free VPN for PC" and "Minecraft Skin Changer." The malware dropper, named Launch.exe, utilizes sophisticated techniques such as obfuscation, process injection, and DLL side-loading to implant Lumma Stealer. This campaign involves hosting multiple malware samples on GitHub, where they employ Base64-encoded payloads concealed within seemingly harmless applications. The malware's execution process involves dynamic loading and the use of legitimate Windows processes, such as MSBuild.exe, to bypass security measures.
Social engineering campaign targets crypto users
A social engineering campaign targets cryptocurrency users through fake AI, gaming, and Web3 firms, tricking them into downloading malware via Telegram and Discord. These fake companies use spoofed social media accounts and legitimate platforms like GitHub and Notion to appear credible. The campaign, active since at least March 2024, employs stealer malware like Realst and AMOS to siphon cryptocurrency and sensitive data from Windows and macOS systems. Attackers leverage verified and compromised X accounts to approach victims, urging them to test software in exchange for cryptocurrency payments.
Wing FTP Server bug under active exploitation
A critical vulnerability (CVE-2025-47812) in Wing FTP Server, rated with a maximum severity score of 10.0, is being actively exploited. The flaw stems from improper handling of null ('\0') bytes in the server's web interface, enabling remote code execution. The vulnerability allows attackers to inject arbitrary Lua code into user session files, execute system commands with high privileges, and exploit anonymous FTP accounts. Threat actors have used the flaw for reconnaissance, creating persistence through new user accounts, and deploying malicious Lua files, though no evidence of remote desktop software installation has been confirmed. Over 8,000 publicly accessible Wing FTP Server devices are at risk, with 5,004 exposing their web interfaces. Most affected servers are located in the U.S., China, Germany, the U.K, and India.
Critical flaw in mcp-remote
A critical vulnerability (CVE-2025-6514) in the mcp-remote project allows remote code execution, affecting versions 0.0.5 to 0.1.15. Users are advised to update to version 0.1.16 and connect to trusted MCP servers via HTTPS. The flaw stems from how malicious MCP servers can embed commands during the initial communication phase, leading to arbitrary OS command execution on Windows, macOS, and Linux systems. Another vulnerability (CVE-2025-49596) in MCP Inspector allows NeighborJacking attacks due to the lack of authentication in its web UI, enabling malicious code injection. Filesystem MCP Server vulnerabilities (CVE-2025-53110 and CVE-2025-53109) enable directory containment bypass and symlink attacks, potentially exposing sensitive files or escalating privileges. Fixes are available in versions 0.6.3 and 2025.7.1.