Threat Watch Feed
🚩 – IOCs Added
The red flag indicates that Indicators of Compromise (IOCs) have been added to SRA’s Threat Feed used by CyberSOC clients. Articles may not be flagged if IOCs are not available at the time or are not applicable to the article.
Microsoft Details Asset-Aware Protections Designed to Block Attacks Targeting Domain Controllers, Web Servers, and Other High-Value Infrastructure
Microsoft Defender Security Research published guidance describing how Defender uses high-value asset context to strengthen detection and prevention against attacks targeting critical infrastructure such as domain controllers, Exchange and SharePoint servers, and identity systems. Microsoft states that in more than 78% of human-operated attacks, threat actors successfully compromise a high-value asset to deepen access and increase impact across the environment. Rather than relying only on raw behavioral telemetry, Microsoft’s approach adds device role, criticality, and attack path context so that activity which may appear routine on ordinary systems can be treated as high risk on Tier-0 or internet-facing assets. Microsoft highlights examples including attempted NTDS.DIT dumping on a domain controller through ntdsutil.exe, creation of remote scheduled tasks for credential theft preparation, and deployment of tailored webshells on Exchange servers. In the scenarios described, Defender used that asset context to block execution, remediate malicious files, and trigger automated disruption such as disabling a compromised Domain Admin account.
Impact: Compromise of a high-value asset can quickly shift an intrusion from an isolated incident to a broader enterprise-wide risk. Systems such as domain controllers, identity infrastructure, and internet-facing application servers provide attackers with opportunities for credential theft, privilege escalation, persistence, and access to critical business services. Asset-aware protections can improve detection fidelity and reduce the chance that malicious activity is dismissed as normal administrative behavior.
Recommendation: Organizations should review the source material and assess whether all high-value assets are accurately identified and prioritized within their security tooling, since gaps in classification can create gaps in protection. Security hardening, vulnerability remediation, and alert triage should be weighted more heavily for domain controllers, identity systems, and internet-facing application servers because even moderate issues on these assets may carry outsized risk. Administrative activity on these systems should be closely monitored for outlier combinations of behavior, such as remote task creation paired with credential-dumping utilities or unexpected file placement in exposed web directories. Organizations should also review attack paths and trust relationships that could allow a lower-tier compromise to lead to privileged systems, and use that visibility to tighten access, reduce unnecessary privilege, and accelerate response for alerts involving critical infrastructure.
🚩 Censys ARC Discovers Previously Undocumented Russian .NET Access Framework “CTRL”
Censys reported on the discovery of a previously undocumented remote access toolkit named “CTRL,” assessed to be developed by a Russian-speaking operator. The toolkit is delivered via a weaponized LNK file disguised as a folder and was identified through open directory scanning of exposed infrastructure. At the time of reporting, associated infrastructure, including hui228[.]ru and supporting IPs, remained active and had not appeared in public threat intelligence sources, indicating limited or private circulation. The attack chain relies on a multi-stage, fileless execution process beginning with a malicious LNK that launches obfuscated PowerShell. Payloads are decoded, stored in the registry, and executed in memory to avoid disk artifacts. The toolkit deploys multiple components that enable credential phishing via a realistic Windows Hello interface, continuous keylogging, RDP session hijacking, and reverse proxy tunneling using FRP. Operator access is conducted through RDP over these tunnels, avoiding traditional command-and-control beaconing. Persistence is established through scheduled tasks, registry storage, and hidden administrative accounts, while data collection and operator interaction remain largely local to the compromised host.
Impact: CTRL provides operators with persistent, hands-on-keyboard access while minimizing detectable network activity. Its use of reverse tunneling and local named pipe communication reduces visibility for traditional network-based detections. Compromised systems may experience credential theft, unauthorized RDP access, and long-term persistence with limited forensic artifacts. The lack of public detection signatures increases the risk of undetected compromise in targeted environments.
Recommendation: Organizations should review the source material and assess exposure. Prioritize identifying signs of registry-resident payloads under HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ and investigate any unusual binary values such as ShellStateVersion1, IconSizeVersion1, or IconUnderlineVersion1. Review scheduled task creation for anomalies including DriverSvcTask, NetTcpSvc, TermSvcHost, and WindowsHealthMonitor, and validate that no unauthorized persistence mechanisms have been introduced. Monitor for unexpected changes to RDP configurations, including modification of termsrv.dll, installation of RDP Wrapper, or systems enabling concurrent RDP sessions outside normal policy. Investigate local account activity to identify hidden or newly created administrative users, particularly those added to Remote Desktop Users.
Critical CVE-2025-53521 Flaw Added to CISA KEV Catalog
On March 27th, 2026, CISA added the vulnerability CVE-2025-53521 to its KEV catalog. This CVE originally was rated at a CVSS score of 8.7 as a DoS vulnerability, but received an increased score to 9.3 and was added to the KEV catalog due to new info discovered about it in March 2026. This includes confirmation of active exploitation in the wild. The vulnerability involves F5 BIG-IP Access Policy Manager configurations that can allow specific malicious traffic to gain RCE capabilities. F5 has listed several indicators to look out for to determine if a system has been affected. These include, but are not limited to, /run/bigtlog.pipe and/or /run/bigstart.ltm files on the system, file hash/size mismatch of /usr/bin/umount and/or /usr/sbin/httpd compared to known calid versions, local users accessing the iControl REST API from localhost, and HTTP 201 response codes and CSS content types, which may indicate attack obfuscation.
Impact: If left unpatched, vulnerable systems may be susceptible to RCE attacks. CVE-2025-53521 affects the following versions of F5 BIG-IP APM: 17.5.0 – 17.5.1, 17.1.0 – 17.1.2, 16.1.0 – 16.1.6, and 15.1.0 – 15.1.10.
Recommendation: CISA has recommended organizations prioritize remediation of KEV catalog vulnerabilities. Patched versions of F5 BIG-IP APM are available and should be downloaded from known reputable sources as soon as possible.
🚩 TikTok Business Account Phishing Campaign Deploys AITM Kits Targeting Marketing Teams and SSO Credentials
Push Security researchers detected a new phishing campaign targeting TikTok for Business accounts used by company marketing teams to manage advertising campaigns, disclosed on March 26, 2026. Attackers registered a cluster of phishing domains on March 24 within a nine-second window, all hosted behind Cloudflare using registrar Nicenic International Group commonly abused for bulk phishing domain registration. The campaign deploys adversary-in-the-middle phishing kits featuring both TikTok-themed pages and Google-themed “Schedule a Call” imitation pages similar to campaigns reported in October 2025, suggesting operational continuity. The domains follow a common naming convention using variations of welcome.careers with different suffixes. Victims are tricked into clicking malicious links redirected through legitimate Google Storage infrastructure before loading Cloudflare Turnstile bot checks preventing security analysis, ultimately serving AITM phishing pages harvesting Google credentials. The TikTok-themed login pages replace legitimate “Log in with TikTok” buttons with “Log in with Google” options and implement input validation requiring business email addresses.
Impact: The campaign targets business users authenticating to TikTok for Business using Google SSO, enabling attackers to compromise both TikTok advertising accounts and Google accounts simultaneously. Compromised TikTok business accounts provide platforms for malvertising scams, with the platform historically abused to distribute infostealers like Vidar, StealC, and Aura Stealer through ClickFix-style malware delivery and AI-generated activation guides achieving hundreds of thousands of views. Compromised Google credentials obtained through AITM kits grant access to Google Ad Manager accounts, enabling deployment of additional malicious advertisements, ad fraud campaigns siphoning company advertising budgets, and SSO access to additional applications for data theft and extortion.
Recommendation: Block network connections to identified phishing domains. Monitor for redirects through Google Storage bucket storage.googleapis[.]com/fiz2a4s014vt8q4l5i0m1m7b0gl/ and treat all linked pages and files as malicious. Implement browser-based security platforms detecting AITM phishing kits, credential stuffing, and session hijacking attempts targeting SSO authentication flows. Deploy phishing-resistant multi-factor authentication using FIDO2 security keys or passkeys rather than SMS or authenticator app-based MFA vulnerable to AITM proxy attacks.
🚩 Malwarebytes Identifies PureHVNC RAT Campaign Abusing Google Forms and Business Lures
Malwarebytes reported a campaign that uses Google Forms as the starting point for malware delivery, rather than a traditional phishing page or direct attachment. The forms impersonate legitimate companies and use business-themed lures such as job interviews, project briefs, and financial documents to convince victims to download ZIP archives. Malwarebytes identified links distributed through platforms including LinkedIn, with archives hosted on services such as Dropbox, filedn.com, fshare.vn, and URL shorteners. The final malware observed in the campaign is PureHVNC, a modular .NET remote access trojan that can remotely control infected devices, collect system and user information, steal browser and wallet data, extract data from apps such as Telegram and Foxmail, install plugins, and establish persistence. The infection chain is multi-stage and designed to reduce detection. The downloaded ZIP typically contains lure documents, an executable, and a malicious DLL used for DLL hijacking. The DLL decrypts strings, performs anti-debugging and sandbox checks, opens decoy PDFs, establishes persistence via the registry Run key, and extracts a secondary archive. That archive is unpacked into a random ProgramData folder and launches an obfuscated Python script that ultimately decodes and runs Donut shellcode. Malwarebytes observed PureHVNC injected into SearchUI.exe in the analyzed case. The malware also used WMI queries to enumerate antivirus products, operating system details, and connected image or camera devices, then created a scheduled task for persistence. Malwarebytes said the campaign targeted organizations in healthcare, government, hospitality, and education across countries including Germany, Canada, the United States, and Australia.
Impact: This campaign presents a practical enterprise risk because it uses trusted services and realistic business workflows to gain execution, then deploys a capable remote access trojan that supports credential theft, wallet theft, plugin delivery, host reconnaissance, and persistent control of the victim system. The use of Google Forms, legitimate file-sharing services, and professional lures increases the likelihood of user interaction, while the multi-stage Python and Donut-based execution chain makes the activity harder to identify through basic static analysis or simple file-based blocking.
Recommendation: Organizations should reinforce user guidance around unsolicited Google Forms, shared ZIP archives, and business documents received through job, partnership, or project outreach, especially when links are hidden behind URL shorteners or redirects. Monitor and or for unexpected DLL sideloading, registry Run key additions such as CurrentVersion\Run\Miroupdate, execution of Python from unusual ProgramData paths, scheduled task creation from user-writable directories, and suspicious WMI queries targeting antivirus inventory.
Microsoft Details Disruption of GPO-Based Ransomware Attack Using Predictive Shielding
Microsoft published a case study on March 23, 2026 detailing a human-operated ransomware intrusion targeting a large educational institution. The attacker had already obtained Domain Admin access and conducted reconnaissance, credential harvesting, and lateral movement over several days before attempting ransomware deployment. Microsoft observed the attacker using Active Directory enumeration, Kerberoasting, NTDS dumping, and account creation to expand access across the environment before transitioning to the impact phase. According to Microsoft, the attacker attempted to weaponize Group Policy Objects (GPOs) to first disable security controls and then distribute ransomware via scheduled tasks across domain-joined systems. Malicious payloads were staged in SYSVOL and executed through a command chain leveraging cmd.exe and rundll32.exe. In parallel, the attacker also attempted ransomware deployment via SMB using multiple compromised accounts. Microsoft notes that this approach leverages trusted administrative infrastructure, allowing attackers to distribute ransomware at scale without directly interacting with each endpoint.
Impact: This activity highlights a high-impact ransomware technique that targets enterprise management infrastructure rather than individual endpoints. By abusing GPOs, attackers can disable security tools and deploy ransomware across hundreds or thousands of systems simultaneously. This significantly reduces detection opportunities and accelerates impact. In this case, Microsoft reports that without intervention, the attacker would likely have achieved widespread encryption across the organization due to existing privileged access and centralized deployment mechanisms.
Recommendation: Organizations should review the source material and assess exposure. Priority actions include monitoring for unauthorized or anomalous Group Policy changes, especially those modifying security controls or creating scheduled tasks across multiple systems. Closely track access and activity involving Domain Admin accounts, including credential theft techniques such as Kerberoasting and NTDS access, as these are strong indicators of impending large-scale impact. Additional focus should be placed on detecting activity within SYSVOL and NETLOGON shares, suspicious use of rundll32.exe for payload execution, and abnormal SMB-based file distribution across the network. Because attackers increasingly abuse trusted administrative mechanisms, organizations should implement controls that validate and audit GPO changes, and restrict privileged account usage.
Sign up here!
To receive the TIGR Threat Watch email bulletin and critical vulnerability notifications, simply complete the form below.
Follow on Twitter
@SRA_ThreatWatch will keep you up to date with the most recent posts on your social media feed.
Subscribe to the RSS
Just copy and add this link to your RSS app and be notified immediately when new intel is posted.
How to use RSS
Following the RSS feed is easy. RSS can be added in your Outlook desktop app, and there are many free RSS readers available for your mobile device.
To follow using Outlook:
- In Outlook, right-click the RSS Feeds folder and choose Add a New RSS Feed.
- In the New RSS Feed dialog box, enter the URL of the RSS Feed: https://sra.io/category/tigr/feed
(click here for detailed instructions and additional options for Outlook)
Popular mobile RSS reader apps include:
- Feedly
- NewsBlur
- RSS Reader
- Inoreader
After installing your preferred RSS reader, you will be able to add this feed by entering the URL: https://sra.io/category/tigr/feed
Threat Bulletin Archive
About TIGR Threat Watch
Our Threat Intelligence Gathering & Research (TIGR) team is focused on threat intelligence and curates a daily intelligence report, TIGR Threat Watch, with information collected from several industry intel sources. We also create and publish ad-hoc critical vulnerability notifications in case of critical and time-sensitive vulnerabilities or threats. These notifications include details and recommendations for mitigation/remediation.




