Cyware Daily Threat Intelligence, July 21, 2025

Daily Threat Briefing • July 21, 2025
Daily Threat Briefing • July 21, 2025
A new ransomware strain named Crux, allegedly tied to the BlackByte group, has been uncovered. It gains access via RDP and abuses legitimate processes for malicious activity.
A severe vulnerability (CVE-2025-54309) in CrushFTP servers affects over 10,000 instances globally, enabling remote attackers to gain admin rights via HTTPS. The flaw stems from AS2 validation mishandling and impacts servers lacking the DMZ proxy.
PoisonSeed threat actors have devised a way to bypass FIDO key authentication using adversary-in-the-middle (AitM) phishing. By exploiting the cross-device sign-in feature, attackers trick users into scanning malicious QR codes.
A new ransomware variant has been spotted
Huntress has identified a new ransomware variant named "Crux," which claims affiliation with the BlackByte ransomware group. Crux ransomware encrypts files with a .crux extension and uses ransom notes named "crux_readme_[random].txt." The ransomware employs Remote Desktop Protocol (RDP) as one of its initial access vectors and uses legitimate processes like svchost.exe and bcdedit.exe for malicious activities.
Iran-linked Spyware poses as VPN
Four new Android spyware samples linked to Iran's Ministry of Intelligence and Security (MOIS) have emerged, disguised as VPN apps, targeting WhatsApp data, audio/video recordings, and sensitive files. The spyware, attributed to the MuddyWater espionage group, reflects Iran's evolving surveillance tactics amid Middle Eastern tensions. Researchers identified these samples shortly after the Iran-Israel conflict began, with distribution methods including Telegram channels, phishing emails, and messaging apps.
New CrushFTP critical vulnerability exploited in the wild
A critical vulnerability (CVE-2025-54309) in CrushFTP servers affects at least 10,000 instances globally, allowing remote attackers to gain admin access via HTTPS. The flaw involves AS2 validation mishandling and impacts servers without the DMZ proxy feature. CrushFTP disclosed the vulnerability on July 18, assigning it a CVSS score of 9, and urged users to update to fixed versions (11.3.4_26 and 10.8.5_12).
Hackers exploit Microsoft software vulnerability
Microsoft issued an alert about "active attacks" on SharePoint server software used by businesses and government agencies for document sharing, recommending immediate security updates. The attacks, identified as "zero-day" exploits, targeted a previously unknown vulnerability in SharePoint servers, putting tens of thousands of servers at risk. SharePoint Online in Microsoft 365 (cloud-based) is not affected. Microsoft has been coordinating with global cybersecurity partners, including CISA and DOD Cyber Defense Command.
FIDO keys under siege
PoisonSeed attackers have developed a method to bypass FIDO key authentication using adversary-in-the-middle (AitM) phishing attacks. These attacks exploit the cross-device sign-in feature of FIDO keys by tricking users into scanning QR codes, granting attackers access to accounts. FIDO keys, though secure, are not immune to identity-based attacks, which made up 66.2% of incidents in Q1 2025.