Cyware Daily Threat Intelligence, May 16, 2025

shutterstock 2436658431

Daily Threat Briefing May 16, 2025

Procolored’s software downloads came bundled with more than just printer drivers. Researchers uncovered two embedded threats: SnipVex and XRedRAT. One BTC wallet linked to the malware racked up over $100,000, with infections traced back to nearly 40 compromised executables.

A jailbreak enabler reemerges from the patch notes. An iOS kernel vulnerability fixed last year has resurfaced through a public proof-of-concept exploit. The flaw allows unsigned apps to escalate privileges, potentially fueling future jailbreak chains. Devices running older OS versions remain at risk despite Apple’s tightened certificate validation.

Criminals are now cloning voices with AI and using them to phish officials. The FBI warns of deepfake audio-driven vishing campaigns impersonating senior U.S. figures to access sensitive accounts. These attacks often begin with smishing texts and evolve into sophisticated voice calls, combining stolen credentials and social engineering to extract more valuable data.

Top Malware Reported in the Last 24 Hours

Malware spotted in printer software

An investigation revealed the presence of SnipVex and XRedRAT malware in Procolored's software downloads, including Win32.Backdoor.XRedRAT.A and MSIL.Trojan-Stealer.CoinStealer.H.Malware. The XRed backdoor, identified in the PrintExp.exe sample, has existed since at least 2019 and allows malicious activities like keylogging, file downloads, and executing commands. The SnipVex virus, a clipbanker, diverts cryptocurrency transactions by replacing clipboard BTC addresses and infects executable files. The malware’s impact included 39 infected files and a BTC address linked to the attacker, which received approximately 9.3 BTC (~$100,000).

LNK files drop Remcos RAT

A new malware campaign utilizes a PowerShell-based loader to deploy the Remcos RAT, employing malicious LNK files and mshta.exe for execution. Delivered via malicious LNK files in ZIP archives, the attack utilizes mshta.exe to run obfuscated VBScript, bypassing Windows Defender. The malware modifies the Windows Registry for persistence, downloads multiple payloads, and executes code directly in memory using Win32 APIs. Remcos features modules for keylogging, webcam access, and credential theft from browsers, employing anti-analysis techniques to evade detection. The latest version includes enhanced functionalities for managing victim machines.

Top Vulnerabilities Reported in the Last 24 Hours

Critical iOS kernel vulnerability

A critical iOS kernel vulnerability (CVE-2023-41992), patched by Apple in September 2023, has resurfaced in a public proof of concept. The vulnerability allows malicious apps to bypass signature validation and elevate privileges, affecting iOS, iPadOS, macOS, and watchOS versions before iOS 16.7. Apple acknowledged the flaw may have been actively exploited and addressed it by enhancing certificate validation and kernel-level checks. The vulnerability could enable jailbreak tools like TrollStore or Serotonin and be integrated into future jailbreak chains, especially on older, unpatched devices.

New Intel CPU bugs enable memory leaks

ETH Zurich researchers have discovered a new security vulnerability in Intel processors, named Branch Privilege Injection. This flaw exploits speculative technologies in CPUs, enabling attackers to bypass security barriers and access sensitive data from other users on shared processors. All Intel processors manufactured since 2018 are affected, including those in PCs, laptops, and data center servers. The vulnerability arises from brief race conditions during prediction calculations, allowing hackers to gradually read the entire memory contents byte by byte. 

Top Scams Reported in the Last 24 Hours

U.S. officials targeted in vishing campaign

The FBI has issued a warning about cybercriminals using AI-generated audio deepfakes in voice phishing attacks targeting U.S. officials since April. These attackers impersonate senior officials to gain access to personal accounts and sensitive information through techniques like smishing and vishing. By compromising accounts, they can access contact information and employ social engineering to steal further sensitive data and funds.

Related Threat Briefings