Current Cyber Threats












Experts Confirm JS#SMUGGLER Uses Compromised Sites to Deploy NetSupport RAT

The highly sophisticated threat activity, JS#SMUGGLER, is a multi-stage web-based malware campaign engineered for stealth and the delivery of NetSupport RAT. The chain begins with Stage 1, a heavily obfuscated JavaScript loader injected via silent redirects, which uses advanced obfuscation, device-aware branching, and local storage for first-visit tracking before fetching the next stage from rotating C2 domains.












New Wave of VPN Login Attempts Targets Palo Alto Globalprotect Portals

A campaign has been observed targeting publicly exposed security devices, namely Palo Alto Networks GlobalProtect portals and SonicWall SonicOS API endpoints, starting on December 2nd. According to GreyNoise, this large-scale reconnaissance originated from over 7,000 distinct IP addresses within the infrastructure of German hosting provider 3xK GmbH (AS200373).



China-linked Threat Actors Weaponized React2Shell Hours After Disclosure

Within hours of the React2Shell flaw (CVE-2025-55182) becoming public, China-linked threat actors began exploiting this pre-authentication Remote Code Execution (RCE) vulnerability. The flaw exists in React Server Components versions 19.0.0, 19.1.0, 19.1.1, and 19.2.0 across packages like react-server-dom-parcel, react-server-dom-turbopack, and react-server-dom-webpack.




Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery

The Intellexa Leaks, a new joint investigation published by Inside Story, Haaretz, and the WAV Research Collective, with technical analysis from Amnesty International's Security Lab, has exposed the persistent global threat posed by the mercenary Predator spyware and its maker, Intellexa, despite the company and its executives being subjected to U.S. sanctions.



BRICKSTORM Campaign Uses MSP Credentials to Compromise Virtual Infrastructures

More details on the BRICKSTORM campaign emerge, as Chinese nexus adversaries were seen leveraging Managed Service Provider (MSP) credentials for initial access. The attackers' strategy focused on high-value, centralized management platforms, specifically VMware vCenter servers and Active Directory Federation Services (ADFS), in both Windows and VMware ESXi environments.






Fake Calendly Invites Spoof Top Brands to Hijack Ad Manager Accounts

A long-running and increasingly sophisticated phishing operation is targeting Google Workspace and Facebook Business accounts, specifically those tied to business ad management. The campaign begins with highly tailored, multi-stage job-recruitment lures impersonating brands like LVMH, LEGO, Mastercard, and Uber, using Calendly-themed links to avoid email scanners.










Technical Analysis of Matanbuchus 3.0

Matanbuchus is a C++ downloader malware that has been active since 2020, evolving through multiple versions to enhance its capabilities. The latest, version 3.0, was identified in July 2025 and introduces significant improvements such as the integration of Protocol Buffers for network communication, making its communication more efficient and harder to detect.



Canada Flags Urgent Threat from Nation-state and Criminal Groups to Critical Infrastructure

Canada issued a warning this week on escalating cyber threats to critical infrastructure, specifically, sectors like energy, water, healthcare, financial services, and transportation. In their advisory, they note that both nation-state actors and cybercriminal groups are poised to create significant service outages, economic losses, and could endanger public health and safety.