Cyware Daily Threat Intelligence, June 04, 2025

shutterstock_1427728523

Daily Threat Briefing June 4, 2025

Cybercriminals are turning CAPTCHA prompts into malware gateways. A recent multi-stage malware campaign is using spoofed sites like fake Git repositories and bogus Docusign pages to lure users into executing PowerShell scripts that drop NetSupport RAT. By layering downloaders that each fetch the next stage, the attackers dodge detection and prolong infection.

In a similar vein, a free software download could end up costing your entire crypto wallet. ViperSoftX is back in circulation, targeting crypto users with malicious PowerShell scripts bundled into cracked apps, keygens, and torrent packages. Beyond wallet theft, it pulls in additional payloads like Quasar RAT and PureHVNC, while using scheduled tasks and registry tricks to quietly maintain persistence.

Meanwhile, Google’s June 2025 Android security update fixed a slate of high-severity issues, including a critical privilege escalation vulnerability in the System component affecting Android 13, 14, and 15. While most bugs haven't been exploited in the wild, three Qualcomm-related flaws made it to CISA’s KEV Catalog.

Top Malware Reported in the Last 24 Hours

ViperSoftX malware targets cryptocurrency users

ViperSoftX malware is actively targeting cryptocurrency users, distributing PowerShell scripts to execute malicious commands, steal cryptocurrency wallets, and deploy additional payloads like Quasar RAT, PureCrypter, and PureHVNC. The malware is distributed via cracked software, key generators, illegal duplication programs, or torrent sites, affecting victims worldwide, including South Korea. ViperSoftX ensures persistence by leveraging task schedulers that execute obfuscated PowerShell scripts and registry-stored commands.

The rise of multi-stage malware campaigns

Attackers use spoofed websites, such as Gitcodes and fake Docusign verification pages, to trick users into running malicious PowerShell scripts that install the NetSupport RAT. The campaign employs multi-stage downloader scripts to evade detection, with each stage downloading and executing additional scripts. Key recommendations include avoiding running scripts from unverified sources, scrutinizing CAPTCHA-like prompts, and verifying website authenticity.

Operation Phantom Enigma targets Brazil

Positive Technologies identified a malicious campaign, "Operation Phantom Enigma," targeting Brazilian users since early 2025. Phishing emails were used to distribute malware disguised as invoices, leading to the installation of malicious browser extensions or RATs. The attackers used PowerShell scripts and BAT files to download and execute malicious extensions, targeting Google Chrome, Microsoft Edge, and Brave browsers.

Top Vulnerabilities Reported in the Last 24 Hours

Authentication Bypass Vulnerability in HPE

Hewlett Packard Enterprise (HPE) has released security patches for eight vulnerabilities in its StoreOnce data backup solution, including a critical authentication bypass flaw (CVE-2025-37093) with a CVSS score of 9.8. The flaws, reported in late 2024, could allow remote code execution, information disclosure, and other exploits. Users are advised to update to the latest version for protection.

Google patches 34 bugs in Android

Google released the June 2025 Android security update, addressing multiple high-severity vulnerabilities, including a critical privilege escalation flaw in the System component (CVE-2025-26443), affecting Android versions 13, 14, and 15. While Google has not reported any active exploitation of these vulnerabilities, three Qualcomm flaws (CVE-2025-21479, CVE-2025-21480, and CVE-2025-27038) have been added to CISA’s Known Exploited Vulnerabilities catalog. Google urged users to update to patch levels 2025-06-01 and 2025-06-05 to install the fixes.

CISA warns of Schneider Electric bug

The CISA warned of a stack-based buffer overflow vulnerability (CVE-2025-3916) in Schneider Electric’s EcoStruxure Power Build Rapsody software, affecting version 2.7.12 FR and earlier. This vulnerability could allow local attackers to execute arbitrary code when a user opens a malicious SSD project file. The vulnerability is rated with a CVSS v4 base score of 4.6 and a CVSS v3.1 base score of 5.3. Schneider Electric recommends updating to version 2.8.1 FR of EcoStruxure Power Build Rapsody to mitigate the vulnerability. Users should reboot the system after installation.

Top Scams Reported in the Last 24 Hours

FBI reports Hedera Hashgraph crypto scam

The FBI issued a Public Service Announcement (PSA) on cybercriminals exploiting NFT airdrops in Hedera Hashgraph non-custodial wallets to defraud users. Scammers embed malicious URLs in transaction memos, social media, phishing emails, or third-party sites, tricking users into sharing login details or seed phrases, enabling cryptocurrency theft. The FBI advises verifying offers, avoiding unsolicited links, and reporting incidents to the IC3 with transaction details.

Related Threat Briefings