Current Cyber Threats






Ransomware Attack on Food Distributor Spells More Pain for UK Supermarkets

Peter Green Chilled, a key supplier for UK supermarkets, has suffered a ransomware attack, significantly disrupting its operations. The attack occurred on May 14, 2025, and was disclosed to customers the following day. Though the company says transport operations are still running, it temporarily paused order processing, and communication has since been cut off through normal contact channels.


New Phishing Attack Mimic as Zoom Meeting Invites to Steal Login Details

A new phishing campaign is exploiting Zoom's widespread use in corporate settings to steal user credentials by sending fake meeting invitations that appear to come from colleagues. These emails are designed to look like legitimate Zoom notifications, featuring familiar branding, professional language, and urgent subject lines such as “Urgent Meeting Request” or “Missed Zoom Call.”


New Nitrogen Ransomware Targets Financial Firms in the US, UK and Canada

The Nitrogen ransomware strain has rapidly gained notoriety and represents a major and rapidly evolving ransomware landscape. The ransomware has been targeting the financial sector since its emergence in September 2024. This ransomware employs a sophisticated attack chain, initiating with malvertising campaigns on prominent search engines to trick users and distribute trojanized installers disguised as legitimate software.




5 BCDR Essentials for Effective Ransomware Defense

Ransomware is getting worse, and more insidious. It is not anymore that hoodie-wearing hacker. It is a full business model with Ransomware as a Service (RaaS), and it is enabling even low-skill attackers to launch high-end cyberattacks. One scary example: hackers are using legitimate tools like Microsoft's Quick Assist to actually deliver ransomware like Black Basta to organizations.


KeePass Trojanized in Advanced Malware Campaign

A sophisticated malware campaign targeting the open-source password manager KeePass has been uncovered by WithSecure's Threat Intelligence team. The attackers trojanised a legitimate KeePass installer (KeePass-2.56-Setup.exe), distributing it through malvertising via search ads on platforms like Bing and DuckDuckGo that lured users to download from fake lookalike domains keeppaswrd.com.







Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks

Cybercriminals are increasingly using PowerShell to conduct stealthy, fileless attacks that bypass traditional antivirus and endpoint defenses by executing code directly in memory. A recent campaign analyzed by Qualys Threat Research Unit demonstrates this trend through the deployment of Remcos RAT, a sophisticated remote access trojan known for its persistence and full system control capabilities.


New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors

In April 2025, NSFOCUS Fuying Lab's Global Threat Hunting system identified a surge in activity from a new Go-based botnet Trojan dubbed HTTPBot. Initially observed in August 2024, HTTPBot has rapidly expanded its reach, frequently leveraging compromised devices to conduct external attacks, primarily targeting China's gaming sector, but also affecting technology companies, educational institutions, and tourism websites.


US Officials Impersonated Via SMS and Voice Deepfakes

In a newly emerging trend, cybercriminals are using AI-generated deepfake voices and text messages to impersonate senior U.S. government officials in phishing attacks. According to a recent FBI advisory, these attacks have been ongoing since April 2025 and aim to trick victims, especially other officials or their contacts, into clicking malicious links or handing over sensitive information.



Operation RoundPress

cyber espionage campaign, dubbed Operation RoundPress, has been attributed with medium confidence to the Russia-linked threat actor APT28 (AKA Fancy Bear). Commencing in 2023, the operation targets webmail servers including Roundcube, Horde, MDaemon, and Zimbra through the exploitation of XSS vulnerabilities.




How Interlock Ransomware Affects the Defense Industrial Base Supply Chain

Interlock Ransomware, a cybercriminal group that emerged in September 2024, has evolved from opportunistic attacks to targeting high-value entities within the Defense Industrial Base supply chain. Their recent attack on National Defense Corporation and its subsidiary AMTEC, a manufacturer of military-grade ammunition and explosives, marks a strategic shift likely influenced by geopolitical conflicts and possibly state-sponsored motivations.





Microsoft May 2025 Patch Tuesday Fixes 5 Exploited Zero-Days, 72 Flaws

As part of the May Microsoft Patch Tuesday, Microsoft addressed 72 flaws, including 5 zero-days which are actively being exploited in attacks in the wild. Of the 57 flaws, there were 17 Elevation of Privilege Vulnerabilities, 2 Security Feature Bypass Vulnerabilities, 28 Remote Code Execution Vulnerabilities, 15 Information Disclosure Vulnerabilities, 7 Denial of Service Vulnerabilities, and 2 Spoofing Vulnerabilities. 6 flaws were rated critical in severity and can lead to remote code execution or the disclosure of information over a network.


DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoIt

In January 2025, researchers at Unit 42 uncovered ongoing attacks distributing the DarkCloud Stealer malware. These recent attacks exhibit an evolution in tactics, notably incorporating AutoIt to potentially evade traditional detection mechanisms. The observed attack chain typically commences with a phishing email, which may contain either a malicious RAR archive directly or a phishing PDF designed to trick victims into downloading such an archive from a file-sharing service.









Using Blob URLs to Bypass SEGs and Evade Analysis

Blob URIs (Uniform Resource Identifiers) are browser-generated links used to handle temporary, local data such as images, videos, or HTML content, allowing web applications like YouTube to display content securely without exposing direct file locations. While blob URIs serve legitimate purposes such as limiting access to media files and reducing network load, they have recently been exploited by cybercriminals for credential phishing.


Lumma Infostealer Continues Its GitHub Social Engineering Campaign

According to researchers at Piccus Security, Lumma Stealer is a rapidly evolving information-stealing malware that has played a significant role in numerous cybercrime campaigns throughout 2024 and 2025. Marketed as a Malware-as-a-Service by a threat actor using the aliases “Shamel” or “Lumma,” the malware is sold through tiered subscriptions, making it accessible to both skilled and inexperienced cybercriminals.


Compromised SAP Netweaver Instances Are Ushering in Opportunistic Threat Actors

A second wave of cyberattacks has emerged targeting SAP NetWeaver systems, involving opportunistic threat actors who are exploiting webshells planted during an earlier zero-day campaign. These webshells were deployed by initial attackers exploiting CVE-2025-31324, a critical vulnerability in the Visual Composer tool within SAP NetWeaver.


Hacker Finds New Technique to Bypass SentinelOne EDR Solution

A new report released on May 5th by researchers at Aon's Stroz Friedberg Incident Response Services detailed a novel "Bring Your Own Installer" technique that threat actors can exploit to bypass SentinelOne's EDR solution. This method leverages a vulnerability within the SentinelOne agent's upgrade/downgrade process, creating a temporary time window that provides an unprotected endpoint.






LockBit Ransomware Gang Hacked, Victim Negotiations Exposed

On May 7, 2025, the LockBit ransomware operation suffered a major blow when unknown actors defaced its dark web infrastructure, replacing the usual content with a provocative message: “Don't do crime CRIME IS BAD xoxo from Prague.” Accompanying the message was a link to download a file titled “paneldb_dump.zip,” which contained a MySQL database dump from LockBit's affiliate management panel.


New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms

A novel malware campaign has been uncovered by Morphisec researchers, leveraging the popularity of artificial intelligence to distribute a new information stealer named Noodlophile Stealer that's often bundled with XWorm to establish deeper control. Cybercriminals are creating deceptive fake AI platforms, advertised on social media platforms like Facebook, to lure unsuspecting users with promises of free AI video and image generation.