Cyware Weekly Threat Intelligence, September 22–26, 2025

Weekly Threat Briefing • September 26, 2025
Weekly Threat Briefing • September 26, 2025
European authorities have crushed a €100 million crypto fraud ring, nabbing five suspects across multiple countries. Active since 2018, this scam lured victims in 23 nations with fake investment platforms. Operation HAECHI VI has clawed back $439 million from global cybercrime, striking a blow against financial fraud. Spanning 40 countries, this effort blocked 68,000 bank accounts and 400 crypto wallets, recovering $16 million in illicit crypto and $342 million in currencies.
China’s UNC5221 is sneaking Brickstorm into network appliances, lurking undetected. This Go-based backdoor, mimicking legit software, hits SaaS and tech firms with custom C2 servers. Cloaked in fake copyright notices, the Lone None group is sneaking Pure Logs and Lone None Stealer into systems. With fake job portals as bait, Iran’s Nimbus Manticore targets Europe’s defense and telecom sectors. Their spear-phishing campaign uses multi-stage DLL sideloading to deploy MiniJunk and MiniBrowse.
North Korean hackers are reeling in crypto developers with fake LinkedIn job offers, hiding AkdoorTea malware. This Contagious Interview campaign uses BeaverTail and Tropidoor to pilfer data across platforms. Russia’s COLDRIVER is baiting victims with a fake CAPTCHA in the ClickFix campaign. Using BAITSWITCH to download SIMPLEFIX, a PowerShell backdoor, this multi-stage attack targets Russian civil society and Western groups, gathering system data via stealthy C2 communication. Since 2022, a stealthy campaign has been hijacking DLLs to unleash a PlugX variant on Asia’s telecom and manufacturing sectors. It uses malicious documents and shared cryptographic tools to deploy RainyDay and Turian-like backdoors.