Cyware Monthly Threat Intelligence, May 2025

Monthly Threat Briefing • June 1, 2025
Monthly Threat Briefing • June 1, 2025
Governments and institutions worldwide are stepping up efforts to strengthen cyber resilience through innovation and collaboration. NIST has introduced a new metric—Likely Exploited Vulnerabilities (LEV)—to enhance vulnerability risk assessments by offering detailed exploitation data alongside EPSS scores. In the U.K., the Ministry of Defence has launched a Cyber and Electromagnetic Command backed by a £1 billion investment to bolster digital warfare capabilities. Meanwhile, cybersecurity agencies from the U.S., U.K., Australia, Canada, and others have issued a joint advisory promoting the adoption of SIEM and SOAR platforms to improve threat detection, streamline response, and address operational challenges.
A wave of sophisticated cyberattacks continues to target high-profile individuals and organizations, using advanced social engineering and stealthy malware delivery methods. Trellix uncovered a highly targeted spear-phishing campaign impersonating Rothschild & Co recruiters to lure CFOs and finance executives across multiple regions. Another campaign is leveraging fake job offers from fashion and beauty brands to distribute the PureHVNC RAT through a complex infection chain. Meanwhile, Russian threat group Void Blizzard has escalated its attacks on over 20 NGOs in Europe and the U.S., using Evilginx phishing pages, malicious QR codes, and spoofed Microsoft Entra portals.
Cybercriminals continue to innovate with new malware strains and delivery techniques designed to bypass detection and maximize data theft. A newly discovered Rust-based infostealer, dubbed EDDIESTEALER, is spreading via fake CAPTCHA verification pages, using obfuscated PowerShell scripts and advanced Rust features. Meanwhile, the Interlock ransomware gang has introduced NodeSnake, a stealthy RAT targeting universities through phishing emails and obfuscated scripts. Additionally, a new campaign is deploying the Remcos RAT using PowerShell-based loaders, malicious LNK files, and mshta.exe to deliver memory-resident malware with capabilities like keylogging, webcam access, and browser credential theft.