Cyware Weekly Threat Intelligence, April 21–25, 2025

The Good
AI security finally has a global playbook. ETSI has released TS 104 223, a first-of-its-kind technical specification outlining how to secure AI systems across their entire lifecycle - from design to decommissioning. MITRE’s latest update is catching up with the cloud. ATT&CK v17 expands the framework to include ESXi and adds more than 140 defensive analytics. Platform-specific data collection advice, improved mitigation mapping, and deeper coverage of mobile threats like SIM swaps round out the upgrade.
ETSI has released new technical specifications, ETSI TS 104 223, to establish a global benchmark for securing AI models and systems. The specifications include 13 core principles and 72 trackable principles across five lifecycle phases: secure design, development, deployment, maintenance, and end of life. These standards address unique AI challenges such as data poisoning and model obfuscation. ETSI's initiative is seen as a global first in setting a baseline for AI security, developed with input from international bodies, including significant contributions from the UK's Department for Science, Innovation and Technology and the National Cyber Security Centre.
MITRE introduced ATT&CK v17, enhancing its cybersecurity framework to address evolving threats. Key updates include the addition of the ESXi platform to the Enterprise matrix, reflecting increased attacks on virtualization infrastructure. Defensive improvements feature over 140 new analytics, optimized data collection with platform-specific guidance, and enriched mitigation strategies. Mobile updates encompass new techniques and tools, such as SIM Card Swap and virtualization-based malware. The CTI section now tracks additional groups and campaigns, highlighting state-sponsored and criminal operations.
The Bad
An APT group with deep roots in Southeast Asia is quietly siphoning data through everyday cloud platforms. Earth Kurma has been active since late 2020, targeting government and telecom entities across the Philippines, Vietnam, Thailand, and Malaysia. Signal and WhatsApp are the new frontline for cloud compromise. Russian actors are running OAuth phishing campaigns against Microsoft 365 users tied to Ukraine and human rights work. A forged email that passes every security check - that’s the new phishing trick. Attackers are using DKIM replay tactics to forward legitimate Google security alerts to unsuspecting victims.
Trend Research has uncovered the Earth Kurma APT campaign, targeting government and telecommunications sectors in Southeast Asia, particularly in the Philippines, Vietnam, Thailand, and Malaysia. Active since November 2020, this group uses advanced malware and rootkits for data exfiltration via Dropbox and OneDrive, posing significant risks like espionage and credential theft. Tools such as TESDAT, SIMPOBOXSPY, KRNRAT, and MORIYA facilitate their operations. While some tools overlap with groups like ToddyCat and Operation TunnelSnake, differences prevent clear attribution.
Iran-linked hackers, UNC2428, targeted Israel with MURKYTOUR malware through a fake job campaign in October 2024. The campaign involved impersonating Israeli defense contractor Rafael and tricking individuals into downloading malware disguised as a job application tool. The operation was linked to broader Iranian cyber espionage activities, including other groups like Black Shadow, Cyber Toufan, and UNC3313, which employed various tactics to infiltrate and gather information from Israeli entities.
Since March, Volexity has observed Russian threat actors targeting individuals and organizations linked to Ukraine and human rights through Microsoft 365 OAuth phishing campaigns. These attacks involve impersonating European officials, using legitimate Microsoft authentication workflows, and leveraging compromised accounts to gain unauthorized access to victims' data. The campaigns are primarily conducted via Signal and WhatsApp, requiring victims to share Microsoft-generated authorization codes.
The Kimsuky group is distributing PebbleDash malware, previously associated with the Lazarus group, using spear-phishing tactics. The initial access involves executing JavaScript via LNK files, which then runs PowerShell for persistence and malware installation. The attackers use tools like AsyncRAT alongside PebbleDash for remote control. The modification of termsrv.dll disables RDP authentication, allowing unauthorized access. Users are advised to verify file extensions, check for modified DLLs using hash comparisons, and monitor for suspicious accounts like ‘Root’.
Cybercriminals are spreading FOG ransomware by impersonating ties to the Department of Government Efficiency (DOGE) and using phishing attacks. Trend Micro discovered nine ransomware samples with .flocked extension and readme.txt notes uploaded on VirusTotal, targeting individuals and organizations. The ransomware operators have claimed 100 victims since January, with various sectors affected. The ransomware payload includes scripts for data collection, privilege escalation, and a Monero wallet address.
Hackers exploited a weakness called DKIM replay phishing to send fake emails appearing to originate from Google (no-reply@google[.]com). By creating a specially named Google OAuth app and granting it access, they triggered Google to send a legitimate, DKIM-signed security alert to their own inbox. They then forwarded this verified email to victims. The forwarded email passed DKIM checks because the signature was valid, tricking recipients. The phishing message led to a fake support portal on sites.google.com designed to steal Google credentials. A similar tactic targeted PayPal users.
New Threats
It starts with a fake sales order and ends with FormBook silently stealing your data. A recent phishing campaign has been abusing a long-patched Microsoft flaw to deliver a fileless variant of the malware. Docker containers aren’t always what they seem. A new threat named TenoBot is targeting systems running outdated Teneo Web3 node software, deploying malicious containers to hijack environments. A stealthy new RAT is slipping through Ivanti Connect Secure devices in Japan. Dubbed DslogdRAT, the malware exploits a zero-day flaw to execute commands via web shell and quietly exfiltrate data using encoded C2 traffic.
The ELENOR-corp ransomware, a variant of Mimic version 7.5, is targeting the healthcare sector with advanced features like data exfiltration and persistent access. It uses techniques such as command-line access via sticky keys, aggressive evidence tampering, and backup deletion to hinder recovery efforts. The malware spreads via RDP, harvesting credentials, and encrypting network shares.
A critical zero-day vulnerability, CVE-2025-31324, in SAP NetWeaver Visual Composer MetadataUploader has been actively exploited to deploy webshells and C2 frameworks, compromising enterprise and government systems. The vulnerability allows unauthenticated attackers to gain full control over affected systems by uploading and executing malicious binaries. Despite having the latest service packs, many systems were breached, with attackers bypassing protections to exploit the /developmentserver/metadatauploader endpoint. This has led to unauthorized file uploads and remote code execution. Techniques like Brute Ratel and Heaven’s Gate were used to maintain persistence and evade detection.
A new sophisticated phishing campaign has been identified by Fortinet, which distributes the FormBook info-stealer. This campaign targets Windows users through emails disguised as sales orders and utilizes a legacy Microsoft vulnerability (CVE-2017-11882) to deliver a fileless variant of the malware. The attack begins with a malicious Word document that exploits the altChunk feature to load an embedded RTF file, triggering a sequence that results in the execution of a DLL file disguised as "AdobeID.pdf" and executes it via process hollowing. The malware then downloads an encrypted payload disguised as a PNG file, decrypts it, and runs the FormBook malware in memory to evade detection.
A new Android spyware, Android.Spy.1292.origin, has been discovered in a fake Alpine Quest app, targeting Russian military personnel. The spyware, hidden in a trojanized version of the app, steals contacts, geolocation, and file information and can download additional modules to exfiltrate stored data. Distributed via Russian Android catalogs and a fake Telegram channel, the spyware sends data to a command-and-control server and shares geolocation updates with attackers' Telegram bots. The modular design allows it to perform a broader range of malicious activities.
DslogdRAT is a newly observed malware exploiting a zero-day vulnerability in Ivanti Connect Secure, targeting organizations in Japan. It operates by executing commands through a web shell and communicates with a C2 server using encoded data. The malware's configuration is hardcoded and designed to avoid detection by operating during business hours. Another malware, SPAWNSNARE, was found on the same compromised systems.
A new Docker malware, dubbed TenoBot, exploits vulnerabilities in Teneo Web3 node software. It deploys malicious containers that compromise system security, allowing attackers to manipulate blockchain transactions and steal sensitive information. TenoBot can execute unauthorized commands, effectively gaining control over affected systems. The malware utilizes known vulnerabilities within the Teneo software, making it particularly dangerous for users running outdated versions. The attack is characterized by its stealthy nature, as it blends in with legitimate Docker operations, complicating detection efforts.
A new Android malware named SuperCard X has emerged, targeting devices through NFC relay attacks to steal credit card data for point-of-sale and ATM transactions. The malware is linked to Chinese-speaking threat actors and is promoted through Telegram channels. Victims are tricked into installing a malicious app that reads card chip data and allows attackers to make contactless payments and ATM withdrawals using emulated cards. SuperCard X remains undetected by antivirus engines and employs advanced security measures like mTLS for secure communications.