Cyware Weekly Threat Intelligence, August 11–15, 2025

Weekly Threat Briefing • August 15, 2025
Weekly Threat Briefing • August 15, 2025
Ransomware gangs are taking heavy hits on multiple fronts. In Operation Checkmate, U.S. authorities seized $1.1 million in ransom-linked cryptocurrency and shut down four servers and nine domains tied to the BlackSuit group. At the same time, researchers dealt a critical blow to DarkBit ransomware, linked to Iran’s MuddyWater APT, by exploiting flaws in its AES-128-CBC key generation to crack the encryption.
A crafty malvertising campaign is slipping PS1Bot into systems through deceptive compressed archives. With techniques like environmental polling and dynamic C# DLL compilation, PS1Bot evades detection while siphoning off passwords and cryptocurrency wallet data. GitHub repositories are turning into unexpected traps, with SmartLoader malware lurking behind seemingly legitimate projects like game cheats and software cracks. ScarCruft is pulling out all the stops with a malware campaign disguised as a simple postal code update, blending languages and abusing legitimate services for maximum stealth.
Crypto24 is striking high-profile organizations with surgical precision, blending legitimate IT tools like PSExec and AnyDesk with custom malware to devastating effect. A formidable new ransomware, Charon, is borrowing pages from APT playbooks to deliver tailored strikes against organizations. A fresh twist on the DarkCloud malware is catching victims off guard through phishing emails packed with obfuscated JavaScript in RAR archives. Written in Visual Basic 6, this variant dodges sandboxes by monitoring user activity.