Threat Watch Feed
🚩 – IOCs Added
The red flag indicates that Indicators of Compromise (IOCs) have been added to SRA’s Threat Feed used by CyberSOC clients. Articles may not be flagged if IOCs are not available at the time or are not applicable to the article.
🚩 USB-Borne VBScript Worm Deploys XMRig Miner Through LOLBin Abuse
Cybereason Security Services identified Tangerine Turkey, a cryptomining campaign first reported in late 2024, leveraging VBScript and batch files to deploy XMRig cryptocurrency mining payloads across victim environments. The campaign spreads globally, targeting organizations indiscriminately across multiple industries through infected USB drives containing malicious VBScript files. The attack begins when wscript.exe executes malicious VBScript x817994.vbs from a removable drive mounted on the victim system, which spawns cmd.exe to run secondary batch file x966060.bat. The campaign demonstrates defense evasion by creating a masqueraded directory C:\Windows \System32\ with a trailing space character, distinguishing it from the legitimate C:\Windows\System32 directory. The batch file abuses legitimate Windows binary printui.exe as a living-off-the-land binary to sideload malicious library svculdr64.dat alongside printui.dll, while simultaneously launching explorer.exe to open the USB Drive directory as user distraction. The malware uses xcopy.exe to copy printui.exe and payload components x209791.dat into the fake System32 directory. The attack chain continues with printui.exe spawning cmd.exe to execute obfuscated PowerShell commands that add Windows Defender exclusions for the System32 directory using Add-MpPreference -ExclusionPath “C:\Windows\System32”, blinding security controls from detecting further malicious activity. The malware attempts cleanup by deleting staging file svculdr64.dat and issuing rmdir /s /q “C:\Windows ” command, though the trailing space in the path prevents actual deletion of the operating system directory while highlighting destructive intent.
Impact: The VBScript worm spreads laterally across environments via removable USB drives, enabling rapid infection of multiple systems within organizations through physical device sharing. The abuse of living-off-the-land binaries including wscript.exe and printui.exe allows the malware to execute within trusted Windows processes, evading application whitelisting and behavioral detection mechanisms. Windows Defender exclusion additions prevent antivirus scanning of the System32 directory where malicious payloads reside, significantly reducing detection probability. The XMRig cryptocurrency miner consumes CPU and GPU resources for unauthorized Monero mining, degrading system performance, increasing electricity costs, and potentially causing hardware damage through sustained high utilization. The directory masquerading technique using trailing spaces complicates manual investigation and automated remediation efforts by creating visually identical paths that differ programmatically.
Recommendation: Block or strictly limit USB mass storage device usage through Group Policy configurations, disabling autorun features and restricting execution of .vbs and .bat files from removable media. Implement Device Control solutions to prevent unauthorized USB drive connections and enforce approval workflows for legitimate removable media requirements. Deploy application control using AppLocker or Windows Defender Application Control to restrict abnormal usage of wscript.exe and printui.exe, particularly when launching from removable drives or non-standard directories. Scan for file paths containing C:\Windows \System32\ with trailing spaces and investigate any scheduled tasks or services pointing to executables in non-standard System32 directories. Monitor for printui.exe process execution outside of legitimate printer configuration scenarios and investigate any DLL sideloading attempts. Block execution of files matching patterns x#####.vbs, x#####.bat, and x#####.dat from removable drives and temporary directories. Conduct user awareness training emphasizing USB hygiene and risks of connecting unknown removable media to corporate systems.
🚩 Russian Attackers Deploy Sandworm-Linked Webshell Against Ukrainian Organizations Using Living-off-the-Land Tactics
Symantec Threat Hunter Team researchers identified ongoing Russian-linked intrusions targeting a Ukrainian business services organization and local government entity in June through August 2025. The attackers gained initial access by deploying webshells on public-facing servers, including Localolive, which Microsoft associates with Sandworm (Seashell Blizzard), a Russian GRU military intelligence unit known for destructive operations against Ukraine’s infrastructure. The two-month campaign against the business services organization and week-long attack against the government entity focused on credential harvesting and maintaining persistent network access. The attackers used minimal malware, relying primarily on native Windows tools and legitimate applications to avoid detection. They deployed PowerShell backdoors, created scheduled tasks for memory dumping using rundll32.exe and Windows Resource Leak Diagnostic tool, and modified Windows Defender exclusions for the Downloads folder. The intrusion involved OpenSSH installation for remote access, registry modifications enabling unauthenticated RDP connections, and deployment of legitimate Microtik router management software. Multiple computers across the networks were compromised, with attackers extracting registry hives, performing Active Directory reconnaissance, and targeting KeePass password vaults through process enumeration and memory dumps.
Impact: The attacks provide system access for credential theft and data exfiltration. Memory dumping techniques extract passwords, authentication tokens, and sensitive information from running processes including password managers. Registry hive extraction exposes stored credentials and system configurations. The attackers’ modifications to Windows Defender and firewall rules create persistent backdoors while disabling security controls. RDP configuration changes allowing unauthenticated connections enable continued remote access. The limited malware footprint and heavy reliance on legitimate administrative tools significantly complicate detection and forensic analysis.
Recommendation: Organizations should implement DNS monitoring for connections to identified command-and-control infrastructure. Monitor for unauthorized webshell deployment on public-facing servers, particularly files named service.aspx or cloud.aspx in web directories. Deploy detection rules for Windows Resource Leak Diagnostic tool usage with fullmemdmp parameters and rundll32.exe memory dumping through comsvcs.dll. Alert on Windows Defender exclusion modifications, particularly for Downloads folders. Block unauthorized OpenSSH installations and monitor for registry changes enabling RDP without authentication. Apply patches for vulnerabilities allowing webshell deployment on internet-facing servers. Monitor for legitimate tools like Microtik Winbox appearing in unexpected locations.
🚩 Suspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain Attack
Palo Alto Networks’ Unit 42 has identified a new Windows-based malware family named Airstalk, available in PowerShell and .NET variants. The malware is assessed with medium confidence to be associated with a suspected nation-state actor and linked to a supply chain attack tracked as CL-STA-1009. Airstalk uses VMware’s AirWatch (Workspace ONE) MDM API to establish covert command-and-control (C2) channels. It is capable of exfiltrating browser data such as cookies, bookmarks, history, and screenshots. The malware communicates via the /api/mdm/devices/ endpoint using custom device attributes to exchange serialized JSON messages. The .NET variant includes multi-threaded C2 communication, versioning, and beaconing, and supports a broader set of tasks than the PowerShell variant. Both variants use signed binaries, including certificates that appear to be stolen and later revoked. The malware also manipulates timestamps and mimics legitimate applications to evade detection.
Impact: Airstalk enables unauthorized access to sensitive browser session data and system information, particularly in environments managed by third-party vendors such as BPOs. Its use of trusted APIs and signed binaries complicates detection and response efforts. If deployed successfully, it may allow attackers to impersonate users, access internal systems, and maintain long-term persistence across multiple organizations.
Recommendation: Monitor AirWatch/Workspace ONE API usage for unusual file upload and custom attribute activity. Track known IOCs and binaries with revoked or suspicious certificates, including those issued by Aoteng Industrial Automation. Enforce script execution restrictions for PowerShell and .NET scripts.
🚩 Malicious NuGet Packages Use Homoglyph Attack to Steal Cryptocurrency Wallet Keys
Socket Threat Research Team discovered malicious NuGet packages typosquatting Nethereum, the standard .NET library for Ethereum with tens of millions of downloads, to exfiltrate cryptocurrency wallet keys and transaction data. The primary package Netherеum.All, published October 16, 2025, employed a Cyrillic “e” character (U+0435) instead of Latin “e” in its name, appearing identical during casual inspection and in copyable install commands. Socket reported the package on October 18, 2025, and NuGet removed Netherеum.All and suspended publisher account nethereumgroup on October 20, 2025, resulting in a four-day exposure window. Investigators linked this sample to an earlier typosquat NethereumNet using identical exfiltration code, published by the same threat actor under NuGet aliases nethereumgroup and NethereumCsharp. The malicious code resides in EIP70221TransactionService.Shuffle method, which stores a 43-character seed string “jwwrs:./ronaoanettorkinstance[.]info/api/gads” and applies a 44-byte position-based XOR mask to decode the command-and-control endpoint hxxps://solananetworkinstance[.]info/api/gads at runtime. The method accepts caller-supplied data and transmits it via HTTPS POST with a single form field named “message” containing mnemonics, private keys, keystore JSON, or signed transaction data. The package references legitimate Nethereum libraries including Nethereum.Hex, Nethereum.Signer, Nethereum.RPC, and Nethereum.Util, ensuring normal NuGet restore operations and successful compilation while providing expected Ethereum functionality. The malware remains dormant during installation and activates only when wallet helpers invoke the Shuffle method directly or indirectly through transaction preparation, mnemonic import, keystore decryption, or transaction signing workflows. Both malicious packages displayed artificially inflated download counts reaching 11.6 million within days of publication through scripted download automation targeting v3 flat-container endpoints and rotating IP addresses, creating false legitimacy signals in NuGet search results sorted by relevance.
Impact: The homoglyph typosquat bypasses visual inspection and copy-paste verification, enabling developers to unknowingly install malicious packages believing they are adding legitimate Nethereum dependencies. The four-day dwell time between publication and takedown provided sufficient exposure for victims passing sensitive cryptographic material through compromised transaction workflows. Exfiltrated data includes mnemonics enabling complete wallet recovery, private keys granting direct asset access, keystore passwords unlocking encrypted wallet files, and signed transaction data revealing transaction details and potentially enabling transaction replay attacks. The XOR obfuscation conceals the command-and-control endpoint from static analysis and casual code review, while the integration with legitimate Nethereum libraries ensures applications compile and function normally, delaying detection. Download inflation artificially elevates package placement in search results and creates false social proof, increasing installation likelihood among developers evaluating packages by popularity metrics.
Recommendation: Scan NuGet package references for Netherеum.All and NethereumNet, removing any installations and treating exposed wallet keys, mnemonics, and transaction data as compromised. Rotate all cryptocurrency private keys and mnemonics that may have passed through systems running these malicious packages and transfer assets to newly generated wallets. Implement network monitoring for outbound connections to solananetworkinstance[.]info and alert on HTTPS POST requests containing form field “message” to unfamiliar domains. Monitor for methods containing position-based XOR operations applied to character arrays that decode URLs at runtime. Block NuGet publisher accounts nethereumgroup and NethereumCsharp and investigate any packages from these sources.
🚩 Iran-Linked MuddyWater APT Targets 100+ Government Entities Through Compromised Mailbox
Group-IB Threat Intelligence uncovered a phishing campaign attributed with high confidence to Iran-linked Advanced Persistent Threat group MuddyWater targeting over 100 government entities and international organizations across the Middle East, North Africa, Europe, and North America in August 2025. The attackers accessed a compromised mailbox through NordVPN exit node located in France and distributed Microsoft Word documents containing malicious Visual Basic for Applications macros that deploy Phoenix backdoor version 4. The phishing emails exploited the trust associated with authentic correspondence from compromised government accounts, prompting recipients to enable macros to view blurred document content. Upon macro execution, the documents write ManagerProc.log to C:\Users\Public\Documents\ and execute the FakeUpdate injector, which decrypts an embedded second-stage payload using Advanced Encryption Standard encryption and injects it into its own process. Phoenix backdoor version 4 copies itself to C:\ProgramData\sysprocupdate.exe and establishes persistence by modifying registry key HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon, altering the Shell value. The backdoor creates mutex sysprocupdate.exe and gathers system information including computer name, domain, Windows version, and username before connecting to command-and-control domain screenai[.]online via WinHTTP. The C2 domain was registered via NameCheap on August 17, 2025, with CloudFlare DNS servers masking the real IP address 159.198.36.115. Analysis of server banners reveals the C2 component ran on Uvicorn from August 19 through August 24, 2025, providing a five-day active attack window before operators replaced it with Apache returning “503 service unavailable” messages. Phoenix version 4 supports commands for sleep, file upload, file download, shell execution, and sleep interval updates. The backdoor contains an embedded but unused Component Object Model DLL designed to launch C:\Users\Public\Downloads\Mononoke.exe, linking to persistence techniques observed in MuddyWater’s CannonRat malware. The C2 infrastructure at 159.198.36.115 hosted additional tools including PDQ RMM and Action1 RMM for remote management, and a custom Chromium browser credential stealer disguised as a calculator application at port 4444. The credential stealer targets Google Chrome, Opera, Brave, and Microsoft Edge browsers, extracting os_crypt.encrypted_key from Local State files, terminating browser processes, decrypting saved login credentials, and writing encrypted results to C:\Users\Public\Downloads\cobe-notes.txt before restarting browsers to minimize user suspicion.
Impact: The compromise of legitimate government mailboxes enables attackers to bypass email security controls and exploit institutional trust, increasing phishing success rates against high-value targets. Phoenix backdoor provides remote command execution, file transfer capabilities, and persistent access to compromised government systems, enabling intelligence collection aligned with Iranian geopolitical interests. The five-day C2 operational window suggests MuddyWater deployed additional malware or remote access tools on infected hosts to maintain access after primary infrastructure deactivation. Browser credential theft provides attackers with authentication credentials for government systems, personal accounts, and potentially classified resources.
Recommendation: Block C2 domain screenai[.]online and IP address 159.198.36.115 at network perimeters and investigate any historical connections to this infrastructure. Disable Office macros by default through Group Policy and deploy sandboxing solutions for documents containing embedded VBA code. Hunt for registry modifications in HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Winlogon with altered Shell values and investigate processes named sysprocupdate.exe in C:\ProgramData directory. Restrict and monitor Remote Monitoring and Management tools including PDQ RMM and Action1 to authorized instances only. Enforce multi-factor authentication across all email accounts and implement anomaly detection for logins from VPN services including NordVPN. Conduct phishing awareness training emphasizing risks of enabling macros in Office documents.
TP-Link Warns of Omada Gateway Vulnerabilities
TP-Link released an advisory warning for two vulnerabilities, CVE-2025-6541 and CVE-2025-6542, affecting a wide range of their Omada Gateway products. CVE-2025-6541 requires access to the device’s web management interface, however, CVE-2025-6542 can be exploited by remote unauthenticated actors. If exploited, either would allow the attacker to execute arbitrary commands on the system’s underlying operating system. Omada gateways provide full-stack solutions that encompass several different aspects of networking and are increasing in popularity. The vulnerabilities impact popular models including ER8411, ER7206, ER605, and G36 gateways running firmware versions released before October 2025. TP-Link released patches for all affected models between June and October 2025, with fixes available immediately for download.
Impact: These vulnerabilities present critical risk to organizations using Omada gateways as perimeter security devices, with unauthenticated RCE enabling attackers to pivot into internal networks, intercept traffic, and establish persistent backdoors. The 13 affected models represent TP-Link’s core enterprise gateway lineup, potentially exposing thousands of businesses globally to compromise. Given these devices’ role as network edge defenders, successful exploitation could bypass entire security architectures, allowing attackers to manipulate firewall rules, VPN configurations, and routing tables.
Recommendation: TP-Link strongly recommends immediate firmware updates to the specified fixed versions, with particular urgency for internet-facing deployments. Organizations should prioritize patching based on exposure, starting with ER605 (>= 2.3.1 Build 20251015), ER7206 (>= 2.2.2 Build 20250724), and ER8411 (>= 1.3.3 Build 20251013) models given their widespread enterprise use. Implement network segmentation to isolate gateway management interfaces from untrusted networks and deploy intrusion detection systems to monitor for exploitation attempts targeting command injection patterns. Consider temporarily restricting management interface access to specific trusted IP addresses until patches are applied, and audit logs for suspicious command execution or authentication bypass attempts dating back several months.
Sign up here!
To receive the TIGR Threat Watch email bulletin and critical vulnerability notifications, simply complete the form below.
Follow on Twitter
@SRA_ThreatWatch will keep you up to date with the most recent posts on your social media feed.
Subscribe to the RSS
Just copy and add this link to your RSS app and be notified immediately when new intel is posted.
How to use RSS
Following the RSS feed is easy. RSS can be added in your Outlook desktop app, and there are many free RSS readers available for your mobile device.
To follow using Outlook:
- In Outlook, right-click the RSS Feeds folder and choose Add a New RSS Feed.
- In the New RSS Feed dialog box, enter the URL of the RSS Feed: https://sra.io/category/tigr/feed
(click here for detailed instructions and additional options for Outlook)
Popular mobile RSS reader apps include:
- Feedly
- NewsBlur
- RSS Reader
- Inoreader
After installing your preferred RSS reader, you will be able to add this feed by entering the URL: https://sra.io/category/tigr/feed
Threat Bulletin Archive
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
About TIGR Threat Watch
Our Threat Intelligence Gathering & Research (TIGR) team is focused on threat intelligence and curates a daily intelligence report, TIGR Threat Watch, with information collected from several industry intel sources. We also create and publish ad-hoc critical vulnerability notifications in case of critical and time-sensitive vulnerabilities or threats. These notifications include details and recommendations for mitigation/remediation.




