Cybersecurity Wiretap #56: From Fake Debugging Utilities to Drone Supply Chain Attacks with a Focus on Coordinated APT Campaigns (week of 05/12/2025)

Welcome to the weekly digest about the Cybersecurity & Threats in the wild.

Below you will find a very subjective summary of Cybersecurity events for the prior week.

1.APT GROUP123 by @CyfirmaR

  • North Korean state-sponsored advanced persistent threat (APT) group active since at least 2012
  • is known for its cyber espionage campaigns primarily targeting South Korea
  • since 2017 expanded its operations to Japan, Vietnam, Middle East & other regions.

https://www.cyfirma.com/research/apt-group123/

2.APT PROFILE : Transparent Tribe aka APT36 by @CyfirmaR

  • Pakistan-based advanced persistent threat (APT) group active since at least 2013
  • is widely attributed to Pakistani state interests and is primarily focused on cyber espionage against the Indian government orgs, military, defense contractors, research centers, diplomats & critical infrastructure

https://www.cyfirma.com/research/apt-profile-transparent-tribe-aka-apt36/

3. Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan by @TrendMicro

  • Earth Ammit, threat actor linked to Chinese-speaking APT groups, launched two waves of campaigns from 2023 to 2024
  • 1st wave, VENOM, mainly targeted software service providers, approach involved penetrating upstream segment of drone supply chain
  • 2nd wave, TIDRONE mainly targeted the military industry

https://www.trendmicro.com/en_us/research/25/e/earth-ammit.html

4.ResearchOperation RoundPress by @ESETresearch

  • compromise vector is spearphishing email leveraging XSS to inject malicious JavaScript code into victim’s webmail page
  • in 2023, only targeted Roundcube, but in 2024 expanded to other webmail software including Horde, MDaemon & Zimbra

https://www.welivesecurity.com/en/eset-research/operation-roundpress/

5. DarkCloud Stealer: Comprehensive Analysis of a New Attack Chain That Employs AutoIt by #PaloAlto’s #Unit42

  • Jan 2025, researchers identified series of attacks distributing DarkCloud Stealer
  • latest attack chain incorporated AutoIt to evade detection & used file-sharing server to host malware

https://unit42.paloaltonetworks.com/darkcloud-stealer-and-obfuscated-autoit-scripting/

6. Threat Group Assessment: Muddled Libra (Updated May 16, 2025) by PaloAlto’s #Unit42

  • describes evolution of Muddled Libra activity since the beginning of 2024
  • group is dynamic one, and as members cycle in and out of the group, its knowledgebase and skill set naturally shift
  • toolbox has now expanded to include: Social engineering of both end users and helpdesks traditional phishing inside access to business process outsourcers and ransomware affiliations for extortion

https://unit42.paloaltonetworks.com/muddled-libra/

7. Same name, different hack: PyPI package targets Solana developers by @ReversingLabs

  • research team’s latest discovery involves malicious PyPI open source package that poses app for Solana blockchain: solana-token
  • when installed, malicious package attempts to exfiltrate source code and developer secrets from the developer’s machine to hard-coded IP address

https://www.reversinglabs.com/blog/same-name-different-hack-pypi-package-targets-solana-developers

8. Backdoor implant discovered on PyPI posing as debugging utility by @ReversingLabs

  • malicious techniques used in this campaign, including specific type of backdoor implant and use of Python function wrapping, show that threat actor behind it is sophisticated & very careful to avoid detection
  • discordpydebug package discovered and documented by Socket managed to remain undetected for more than 3 years
  • dpgpkg package had shorter run before being detected.
  • use of function wrapping & tools like Global Socket Toolkit show that threat actors behind it were also looking to establish long-term presence on compromised systems without being noticed

https://www.reversinglabs.com/blog/backdoor-implant-discovered-on-pypi-posing-as-debugging-utility

9.Technical Analysis of TransferLoader by @Threatlabz

  • new malware loader active since Feb 2025
  • has multiple components including downloader, backdoor, & loader for the backdoor
  • being used to deploy Morpheus ransomware at American law firm
  • devs of TransferLoader use obfuscation methods to make reverse engineering process more tedious

https://www.zscaler.com/blogs/security-research/technical-analysis-transferloader

10. Horabot Unleashed: A Stealthy Phishing Threat by #FORTIGUARD LABS

  • threat actor using phishing emails with malicious HTML files to spread Horabot, malware that primarily targets Spanish-speaking users
  • known for using crafted emails that impersonate invoices or financial docs to trick victims into opening malicious attachments & can steal email creds, harvest contact lists & install banking trojans

https://www.fortinet.com/blog/threat-research/horabot-unleashed-a-stealthy-phishing-threat

11. CVE-2025-32464 – Overflowing HAProxy regsub converter by @CodeanIO

  • allows attacker to perform DoS attack exploiting specific usages of regsub converter to cause heap buffer overflow, making the whole HAProxy pool of workers crash
  • bug was introduced in HAProxy v2.2 with commit 07e1e3c & affects all versions up to and including 3.1.6-d929ca2.

https://codeanlabs.com/blog/research/cve-2025-32464-overflowing-haproxy-regsub-converter/

12.CVE-2025-4427/4428 : Ivanti EPMM Remote Code Execution – Technical Analysis by @pdiscoveryio

  • CVE-2025-4427 and its sibling CVE-2025-4428 serve as reminder that even well-intentioned security controls can be undermined by subtleties of framework internals
  • what appeared to be simple EL-injection patch in Ivanti’s EPMM validators actually masked deeper ordering flaw

https://projectdiscovery.io/blog/ivanti-remote-code-execution

Thanks a lot for reading.

Please add interesting items you came across during the week in the comments below.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.