Phishing campaign impersonates Booking[.]com to deliver infostealers via ClickFix technique
Microsoft researchers identified a phishing campaign, attributed to Storm-1865 and active since December 2024, that delivers various infostealers via emails impersonating the online travel agency. The campaign employs the ClickFix technique to deliver its malware, including XWorm, Lumma Stealer, VenomRAT, AsyncRAT, Danabot, and NetSupport RAT. The attack specifically targets hospitality organisations in North America, Oceania, South and Southeast Asia, and Europe that work with Booking Holdings. The initial infection vector is via a seemingly legitimate email from Booking Holdings, which includes either a link or PDF attachment containing a link. Clicking on the link redirects the user to a webpage displaying a fake CAPTCHA. Users are instructed to use a keyboard shortcut to open a Windows Run window, then paste and launch a command that downloads and launches malicious code.
OBSCURE#BAT social engineering campaign delivers r77 rootkit
Securonix researchers analysed an ongoing social engineering campaign, dubbed OBSCURE#BAT, that tricks users into executing a heavily obfuscated batch script to deliver the r77 user-mode rootkit. The campaign primarily targets English-speaking individuals, with the attacker’s infrastructure indicating a base in the United States and telemetry in Canada, Germany, and the United Kingdom. r77 monitors clipboard and command history, and saves them into hidden files for exfiltration. The malware is delivered via either a legitimate software download or fake CAPTCHA using the ClickFix technique. Successful exploitation leads to the download of a ZIP file containing legitimate files and a malicious batch file.
MirrorFace APT’s Operation AkaiRyū leverages custom AsyncRAT variant and ANEL backdoor
ESET researchers detailed Operation AkaiRyū, an espionage campaign by the advanced persistent threat actor (APT), MirrorFace. The campaign was first detected in Q2 and Q3 2024 and targeted a Japanese research institute and a Central European diplomatic institute using a World Expo 2025 lure, marking the first time MirrorFace has targeted a European entity. As part of the campaign, MirrorFace introduced new tools and techniques, including a customised version of AsyncRAT and the use of ANEL backdoor. MirrorFace conducted multiple spear phishing campaigns in the observed period, to trick users into opening malicious attachments or links as an initial access vector. The campaign also involved the abuse of McAfee and JustSystems applications to sideload the ANEL backdoor.
Phishing campaign exploits Microsoft 365 infrastructure for BEC attacks
Guardz researchers discovered a highly sophisticated phishing campaign that exploits Microsoft 365’s infrastructure for potential credential harvesting and account takeover attempts. The campaign utilises legitimate Microsoft domains and tenant misconfigurations to conduct business email compromise (BEC) attacks. The campaign also leverages Microsoft service-generated emails and operates entirely within Microsoft’s ecosystem, allowing the threat actors to evade detection and deliver authentic phishing lures. The infection chain involves six phases and begins with the threat actor registering or gaining control of multiple Microsoft tenants, which are used for various malicious purposes such as unauthorised purchases, brand impersonation, and to serve as a relay point. The final phase involves the attackers engaging with the targeted victim via a fake support number embedded within the phishing email.
Phishing campaign uses health concerns and products as lures to steal payment details
JUMPSEC researchers observed a multi-stage phishing campaign that exploited health-related concerns as lures to steal payment information. The phishing emails claimed to be offering health products and contained links that redirected victims to a ‘Human Verification Check’ page. Upon completing the verification process, victims were redirected to a shopping website that was designed to mimic a legitimate online store. Victims who attempted to add products to their online shopping cart were redirected to a payment page hosted on the ClickBank marketplace. Victims were then deceived into entering their payment details under the guise of making a legitimate purchase. The researchers identified multiple other phishing emails that followed a similar attack chain and originated from the same phishing domains.
Ransomware
Dragon RaaS | Pro-Russian Hacktivist Group Aims to Build on “The Five Families” Cybercrime ReputationSentinelOne – Mar 19 2025BlackLock Ransomware Strikes Over 40 Organizations in Just Two MonthsGBHackers On Security – Mar 17 2025New Akira ransomware decryptor cracks encryptions keys using GPUsBleeping Computer – Mar 15 2025LockBit Ransomware v4.0 Reverse Engineering · 15 Mar 2025 Malware Analysis Report Chuong Dong – Mar 15 2025Black Basta Ransomware Attack Edge Network Devices With Automated Brute Force AttacksCyberSecurityNews.com – Mar 14 2025SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub RansomwareTrend Micro – Mar 14 2025Fraudsters Impersonate Clop Ransomware to Extort BusinessesInfosecurity Today – Mar 14 2025
Financial Services
AMOS and Lumma stealers actively spread to Reddit users Malwarebytes Labs Blog – Mar 18 2025Coinbase phishing email tricks users with fake wallet migrationBleeping Computer – Mar 14 2025Android Banking Trojan – OctoV2, masquerading as Deepseek AIK7 Computing – Lab Blog – Mar 14 2025DNSFilter Finds Surge in Tax-Related Scams as Tax Day ApproachesPR Newswire – Mar 13 2025Investigating Scam Crypto Investment Platforms Using Pyramid Schemes to Defraud VictimsUnit42 Palo Alto – Mar 13 2025
Geopolitics
CERT-UA Warns: Dark Crystal RAT Targets Ukrainian Defense via Malicious Signal MessagesThe Hacker News – Mar 20 2025ZDI-CAN-25373: Windows Shortcut Exploit Abused as Zero-Day in Widespread APT CampaignsTrend Micro Simply Security – Mar 18 2025Italy in the Crosshairs NETSCOUT Blog – Mar 18 2025Denmark warns of increased state-sponsored campaigns targeting the European telcosSecurity Affairs – Mar 16 2025Head Mare and Twelve join forces to attack Russian entitiesKaspersky Lab – Mar 13 2025
High Priority Vulnerabilities
Name | name | Software | Base Score |
Temp Score |
---|---|---|---|---|
CVE-2025-30066 | changed-files | 8.6 | 5.3 | |
Related: Supply Chain Compromise of Third-Party GitHub Action, CVE-2025-30066 | ||||
CVE-2025-24813 | Tomcat | 5.6 | 5.4 | |
Related: Actively exploited remote code execution flaw patched in Apache Tomcat | ||||
CVE-2024-27564 | ChatGPT | 6.5 | 6.1 | |
Related: OpenAI Under Attack: CVE-2024-27564 Actively Exploited in the Wild | ||||
CVE-2024-55591 | FortiProxy | 9.8 | 9.8 | |
Related: New Mora_001 gang exploits Fortinet firewall flaws to deploy SuperBlack ransomware | ||||
CVE-2017-12637 | NetWeaver AS JAVA | 7.5 | 6.4 | |
Related: NAKIVO, SAP, and Edimax flaws under active exploitation |