Cyware Daily Threat Intelligence, June 16, 2025

Daily Threat Briefing • June 16, 2025
Daily Threat Briefing • June 16, 2025
A trusted developer platform is now a delivery system for stealthy malware. The newly uncovered threat actor Water Curse is abusing GitHub to distribute weaponized repositories aimed at cybersecurity pros, game developers, and DevOps teams. With payloads hidden in build scripts and obfuscated, the campaign enables data theft, remote access, and persistent control.
Some ransomware isn’t just extorting, it’s erasing everything in its path. Anubis, a new RaaS group, adds a destructive twist with its “wipe mode,” ensuring file recovery is impossible even if a ransom is paid. With ties to the older Sphinx malware, Anubis is now offering flexible affiliate terms, data extortion, and encryption via ECIES.
A critical bug is still lurking across thousands of Grafana dashboards. A client-side redirect flaw leaves over 46,000 internet-facing Grafana instances at risk of account takeovers and plugin-based attacks. Despite a patch issued in May, more than a third of deployments remain exposed.
Water Curse drops multistage malware
Water Curse is a newly identified threat actor exploiting GitHub to distribute weaponized repositories containing multistage malware. At least 76 GitHub accounts are linked to the campaign, targeting cybersecurity professionals, game developers, and DevOps teams. The malware facilitates data exfiltration (credentials, browser data, session tokens), remote access, and long-term persistence. Malicious payloads are embedded in build scripts and project files, exploiting trust in open-source tools. The infection chain includes obfuscated VBS and PowerShell scripts, encrypted payloads, and anti-debugging techniques. Attackers use privilege escalation, registry modifications, and scheduled tasks to maintain persistence. Water Curse employs a multivertical approach, targeting cybersecurity tools, game cheats, crypto wallets, and more.
Anubis: New RaaS emerges
Anubis is a newly identified RaaS group that integrates file encryption and destruction, making recovery impossible even if ransom is paid. The ransomware features a "wipe mode" that permanently erases files, adding a destructive element to its operations. Anubis runs a flexible affiliate program offering negotiable revenue splits and additional monetization paths like data extortion and access sales. The group evolved from an earlier malware sample called Sphinx, with improved branding and functionality. Anubis encrypts files using Elliptic Curve Integrated Encryption Scheme (ECIES), similar to other ransomware like EvilByte.
New Katz Stealer and its capabilities
Katz Stealer is a MaaS platform designed for credential theft, system fingerprinting, and stealthy persistence mechanisms. It targets sensitive information such as browser passwords, cookies, session tokens, cryptocurrency wallets, VPN and Wi-Fi credentials, and game accounts. Katz Stealer operates through phishing campaigns and fake software downloads, utilizing obfuscated JavaScript droppers and PowerShell loaders for infection. The malware employs advanced obfuscation techniques, including polymorphic string manipulation and in-memory execution, to evade detection. The malware hijacks Discord by modifying its JavaScript files, establishing a persistent backdoor for attacker control. It aggressively targets cryptocurrency wallets, scanning for desktop wallet files and browser-based wallet extensions to steal private keys and seeds.
GrayAlpha deploys PowerNet and NetSupport RAT
GrayAlpha, a cybercriminal group associated with FIN7, has been identified using new infrastructure for malware distribution. The group uses custom PowerShell loaders like PowerNet and MaskBat to deploy NetSupport RAT. Three primary infection vectors were identified: fake browser update pages, fake 7-Zip download sites, and the traffic distribution system (TDS TAG-124). Analysis reveals that while all three infection methods were used simultaneously, only the fake 7-Zip download pages remained active as of April.
Bug impacts 46,000+ Grafana instances
Over 46,000 internet-facing Grafana instances are vulnerable to a client-side open redirect flaw. Tracked as CVE-2025-4123, the vulnerability allows attackers to execute malicious plugins and perform account takeovers. The bug affects multiple versions of Grafana and was patched on May 21. Despite the fix, approximately 36% of Grafana instances remain unpatched. Attackers can exploit this flaw to hijack user sessions, change account credentials, and, if the Grafana Image Renderer plugin is installed, conduct SSRF attacks. The exploitation process does not require elevated privileges or authentication, significantly increasing the risk of attacks.
Tenable patches high-severity flaws
Tenable has patched three high-severity vulnerabilities in its Nessus Agent for Windows, tracked as CVE-2025-36631, CVE-2025-36632, and CVE-2025-36633. These flaws could allow non-administrative users to overwrite local system files, execute arbitrary code, and delete files with System privileges. The vulnerabilities affect Nessus Agent versions 10.8.4 and earlier. The first vulnerability (CVE-2025-36631) has a CVSS score of 8.4, while the second (CVE-2025-36632) scores 7.8, and the third (CVE-2025-36633) scores 8.8. Tenable has released version 10.8.5 to address these issues.
Critical vulnerability in IBM BRMS for i
A critical vulnerability (CVE-2025-33108) has been identified in IBM Backup, Recovery, and Media Services (BRMS) for i versions 7.5 and 7.4, allowing attackers to escalate privileges and execute malicious code with system-level access. This flaw arises from an unqualified library call within the BRMS program and is classified as CWE-250: Execution with Unnecessary Privileges. Exploitation requires network access and low user privileges, posing significant risks to enterprise environments where backup systems often have extensive access. The vulnerability carries a CVSS base score of 8.5, indicating high severity, and could compromise the confidentiality, integrity, and availability of affected systems.