Cybersecurity Wiretap #49: From Discord-Based RATs to KoiLoader Campaigns with a Focus on Stealthy Malware Distribution (week of 03/24/2025)

Welcome to the weekly digest about the Cybersecurity & Threats in the wild.

Below you will find a very subjective summary of Cybersecurity events for the prior week.

1.TURNING AID INTO ATTACK: EXPLOITATION OF PAKISTAN’S YOUTH LAPTOP SCHEME TO TARGET INDIA by @CyfirmaR

  • analysed the dropped Android executable and also revealed metadata indicating that the PDF was created in same time zone that Pakistan is in

https://www.cyfirma.com/research/turning-aid-into-attack-exploitation-of-pakistans-youth-laptop-scheme-to-target-india/

2.ANALYSIS OF A DISCORD-BASED REMOTE ACCESS TROJAN (RAT) by @CyfirmaR

  • Python-based Discord Remote Access Trojan (RAT) that leverages Discord’s API as a Command and Control (C2) server to execute arbitrary system commands, steal sensitive information, capture screenshots, and manipulate both local machines and Discord servers

https://www.cyfirma.com/research/analysis-of-a-discord-based-remote-access-trojan-rat/

3. Analysis of Konni RAT: Stealth, Persistence, and Anti-Analysis Techniques by @CyfirmaR

  • malware exploits file extension hiding and the 260-character limit in LNK files to run commands undetected
  • uses batch files, PowerShell scripts, and VBScript to perform different attack stages
  • exfiltrates system and user data to a remote server using encrypted URLs
  • uses complex variables and dynamic URLs to avoid detection

https://www.cyfirma.com/research/analysis-of-konni-rat-stealth-persistence-and-anti-analysis-techniques/

4. CVE-2025-26633: How Water Gamayun Weaponizes MUIPath using MSC EvilTwin by @TrendMicro

  • campaign by the Russian threat actor Water Gamayun that exploits a zero-day vulnerability in the Microsoft Management Console framework to execute malicious code, named MSC EvilTwin (CVE-2025-26633)
  • threat actor manipulates .msc files and the Multilingual User Interface Path (MUIPath) to download and execute malicious payload, maintain persistence and steal sensitive data from infected systems

https://www.trendmicro.com/en_us/research/25/c/cve-2025-26633-water-gamayun.html

5. A Deep Dive into Water Gamayun’s Arsenal and Infrastructure by @TrendMicro

  • threat actor deploys payloads primarily by means of malicious provisioning packages, signed .msi files, and Windows MSC files, using techniques like IntelliJ runnerw.exe for C2
  • EncryptHub Stealer variants, and backdoors such as SilentPrism and DarkWisp, are also used to gain persistence and steal data.

https://www.trendmicro.com/en_us/research/25/c/deep-dive-into-water-gamayun.html

6. You will always remember this as the day you finally caught FamousSparrow by @ESETresearch

  • FamousSparrow compromised a trade group for the financial sector in the United States and a research institute in Mexico
  • APT group was also observed using the ShadowPad backdoor for the first time

https://www.welivesecurity.com/en/eset-research/you-will-always-remember-this-as-the-day-you-finally-caught-famoussparrow/

7. Shifting the sands of RansomHub’s EDRKillShifter by @ESETresearch

  • discovered clear links between the RansomHub, Play, Medusa, and BianLian ransomware gangs by following the trail of tooling that RansomHub offers its affiliates

https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/

8. Malware found on npm infecting local package with reverse shell by @ReversingLabs

  • 2 very interesting packages were published on npm: ethers-provider2 and ethers-providerz
  • simple downloaders whose malicious payload was cleverly hidden, with a second stage that “patches” the legitimate npm package ethers, installed locally, with a new file containing the malicious payload
  • patched file ultimately serves a reverse shell

https://www.reversinglabs.com/blog/malicious-npm-patch-delivers-reverse-shell

9. CoffeeLoader: A Brew of Stealthy Techniques by @Threatlabz

  • new sophisticated malware loader designed to deploy second-stage payloads and evade host-based detection
  • leverages a packer, that executes code on system’s GPU to hinder analysis in virtual environments

https://www.zscaler.com/blogs/security-research/coffeeloader-brew-stealthy-techniques

10. CVE-2025-29927: Next.js Middleware Authorization Bypass Flaw by @Threatlabz

  • flaw enables attackers to bypass authorization checks in Next.js Middleware, potentially granting unauthorized access to protected resources

https://www.zscaler.com/blogs/security-research/cve-2025-29927-next-js-middleware-authorization-bypass-flaw

11. The Shelby Strategy by @elasticseclabs

  • abuses GitHub for command-and-control, stealing data and retrieving commands
  • this C2 design has critical flaw: anyone with PAT token can control infected machines, exposing a significant security vulnerability
  • unused code and dynamic payload loading suggest malware is under active development, indicating future updates may address any issues with contemporary versions

https://www.elastic.co/security-labs/the-shelby-strategy

12. The Long and Short(cut) of It: KoiLoader Analysis by @esthreat

  • intrusion attempt involving use of a shortcut file leading to loading of new version of KoiLoader (malware loader that facilitates C2), and downloads/executes Koi Stealer, an info stealer written in C#

https://www.esentire.com/blog/the-long-and-shortcut-of-it-koiloader-analysis

13. ReaderUpdate Reforged | Melting Pot of macOS Malware Adds Go to Crystal, Nim and Rust Variants by @SentinelOne

  • further variants written in Go and attributed to same cluster of activity responsible for previously reported ReaderUpdate infections
  • technical breakdown of the Go variant

https://www.sentinelone.com/blog/readerupdate-reforged-melting-pot-of-macos-malware-adds-go-to-crystal-nim-and-rust-variants/

14. Gamaredon campaign abuses LNK files to distribute Remcos backdoor by @TalosSecurity

  • ongoing campaign(since Nov 2024) targeting users in Ukraine with malicious LNK files, which run PowerShell downloader
  • PowerShell downloader contacts geo-fenced servers located in Russia and Germany to download 2nd stage Zip file containing Remcos backdoor

https://blog.talosintelligence.com/gamaredon-campaign-distribute-remcos/

15. IngressNightmare: Unauth RCE in Ingress NGINX (CVE-2025-1974) by @pdiscoveryio

  • allows unauthenticated remote code execution (RCE) on ingress controller pod
  • Originally discovered by Wiz research team (Nir Ohfeld, Ronen Shustin, Sagi Tzadik, Hillai Ben-Sasson) in late 2024 & disclosed in March 2025
  • CVE-2025-1974 is part of series of vulnerabilities collectively called IngressNightmare

https://projectdiscovery.io/blog/ingressnightmare-unauth-rce-in-ingress-nginx

16. CrushFTP Authentication Bypass – CVE-2025-2825 by @pdiscoveryio

  • originally discovered & reported by Outpost24 team to CrustFTP, received a CVSS score of 9.8 (Critical) due to its low complexity, network-based attack vector, and potential impact
  • how seemingly minor implementation details in authentication mechanisms—particularly the reuse of authentication flags for multiple purposes—can lead to severe security implications

https://projectdiscovery.io/blog/crushftp-authentication-bypass

Thank you for reading.

Please add interesting items you came across during the week in the comments below.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.