Cyware Weekly Threat Intelligence, June 09–13, 2025

Weekly Threat Briefing • June 13, 2025
Weekly Threat Briefing • June 13, 2025
A global sweep just knocked out thousands of malicious command centers. INTERPOL’s Operation Secure led to the dismantling of over 20,000 malicious IPs tied to 69 malware strains across 26 countries. NIST has published new guidance to help organizations put Zero Trust Architecture into action, offering 19 real-world implementations built with industry partners.
Unpatched IT tools are once again opening the door to ransomware attacks. CISA has warned about vulnerabilities in SimpleHelp RMM software being exploited by groups like Play and DragonForce in double-extortion campaigns. Fog ransomware operators are blurring the line between admin tools and attack chains. In a recent incident, they deployed a mix of open-source and legitimate software to gain persistence and exfiltrate data undetected. Over 20 phishing applications impersonating popular crypto wallets have been found stealing mnemonic phrases to drain users’ funds.
CyberEye lowers the barrier for cybercrime with a plug-and-play toolkit. This .NET-based RAT uses Telegram for command and control while offering modules for keylogging, credential theft, and platform-specific data grabbing. The TokenBreak attack manipulates how text is tokenized in classification models to sneak past defenses. A Mirai variant is actively exploiting a command injection vulnerability in TBK DVR-4104 and DVR-4216 devices, to conscript them into a botnet for DDoS attacks.