Cyware Daily Threat Intelligence, July 14, 2025

Daily Threat Briefing • July 14, 2025
Daily Threat Briefing • July 14, 2025
A silent redirect to PowerShell is the entry point for a new Interlock RAT variant. Linked to the KongTuke cluster, the PHP-based malware uses compromised websites with hidden scripts to launch system profiling and establish Cloudflare Tunnel-based C2 with fallback IPs for persistence.
Users who trusted GravityForms’ official site got more than they expected. A supply chain attack injected backdoors into plugin files distributed via the official site and Composer, enabling attackers to collect WordPress environment data or more.
A single HTTP header is enough to hijack vulnerable FortiWeb servers. A critical SQL injection flaw in Fortinet’s Fabric Connector, allows pre-auth RCE through unsanitized bearer tokens, with PoC exploits using MySQL queries to drop and execute malicious scripts.
KongTuke campaign drops Interlock RAT
A new PHP-based variant of the Interlock RAT has been discovered, linked to the KongTuke web-inject cluster. The malware uses compromised websites with hidden scripts, prompting users to execute PowerShell commands that lead to infection. Automated system reconnaissance gathers detailed information about the compromised system, including processes, services, and network data. The malware establishes a robust C2 channel via Cloudflare Tunnel services, with fallback IPs for resilience.
Malware in GravityForms WordPress plugin
A supply chain attack targeted the GravityForms plugin for WordPress, injecting backdoor malware into files downloaded from its official website. The malware harvested WordPress environment data and sent it to a malicious domain, gravityapi[.]org, registered days earlier. The malware included a disguised backdoor capable of executing arbitrary code, managing content, and manipulating media through the WP_Content_Manager class.A second backdoor was embedded in class-settings.php, enabling unauthenticated remote commands like creating admin accounts, uploading files, and executing code via a hardcoded token. Only users who manually downloaded or installed via Composer appear to be affected, indicating the breach was targeted and short-lived.
eSIM bug in Kigen’s eUICC cards
A vulnerability in Kigen's eUICC cards exposes billions of IoT devices using eSIM technology to potential malicious attacks. The vulnerability stems from GSMA TS.48 Generic Test Profile versions 6.0 and earlier. Exploitation requires physical access to an eUICC and public keys, allowing attackers to install malicious JavaCard applets and extract identity certificates, enabling unauthorized profile downloads and tampering. Prior research revealed flaws in Oracle Java Card technology, which could lead to backdoors, memory breaches, and native code execution.
PoC released for FortiWeb RCE flaw
Proof-of-concept exploits for a critical SQLi vulnerability (CVE-2025-25257) in Fortinet FortiWeb were released, enabling pre-authenticated remote code execution on vulnerable servers. The vulnerability stems from improper neutralization of special elements in SQL commands, allowing attackers to execute unauthorized SQL code via crafted HTTP/HTTPS requests. The flaw resides in FortiWeb's Fabric Connector, specifically in the get_fabric_user_by_token() function, which fails to sanitize bearer tokens in HTTP headers. Attackers can bypass authentication checks and escalate the SQL injection to remote code execution by injecting SQL commands into the Authorization header. Exploits leverage MySQL's SELECT … INTO OUTFILE query to create arbitrary files, enabling malicious Python scripts to execute through FortiWeb's CGI functionality.