Cybersecurity Wiretap #65: From Fancy Bear to Matanbuchus 3.0 with a Focus on State-Sponsored & MaaS Ops (week of 07/14/2025)

Welcome to the weekly digest about the Cybersecurity & Threats in the wild.

Below you will find a very subjective summary of Cybersecurity events for the prior week.

1.APT PROFILE – FANCY BEAR by @CyfirmaR

  • notorious Russian cyberespionage group with history of targeting govs, military entities, and other high-value orgs worldwide
  • active since 2007, they are infamous for their stealthy and well-coordinated cyberattacks
  • Fancy Bear has been implicated in attempts to influence election processes in countries like the U.S., France, and Germany.

https://www.cyfirma.com/research/apt-profile-fancy-bear-2/

2.CVE-2025-5777 – Pre-Auth Memory Leak in Citrix NetScaler (CitrixBleed 2) by @CyfirmaR

  • active exploitation of CVE‑2025‑5777, based on observed attacker behavior & available public intel
  • functional PoC code has been widely circulated across offensive security communities & platforms
  • threat actors may exploit this vulnerability by sending malformed HTTP POST requests to exposed authentication endpoints, which may result in leakage of uninitialized memory content embedded in XML responses

https://www.cyfirma.com/research/cve-2025-5777-pre-auth-memory-leak-in-citrix-netscaler-citrixbleed-2/

3.Unmasking AsyncRAT: Navigating the labyrinth of forks by @ESETresearch

  • unique insights into landscape of AsyncRAT and its numerous variants in order to navigate labyrinth of forks easily
  • explore less common variants that feature unique plugins, ranging from basic screamer plugin to USB malware spreader

https://www.welivesecurity.com/en/eset-research/unmasking-asyncrat-navigating-labyrinth-forks/

4.Ongoing SonicWall Secure Mobile Access (SMA) Exploitation Campaign using the OVERSTEP Backdoor by @Mandiant

  • ongoing campaign by a suspected financially-motivated threat actor UNC6148, targeting fully patched end-of-life SonicWall Secure Mobile Access (SMA) 100 series appliances
  • new wave of activity, the actor has deployed previously unknown persistent backdoor/user-mode rootkit – OVERSTEP
  • Based on findings from Mandiant Incident Response engagements, our analysis shows this malware modifies appliance’s boot process to maintain persistent access, steal sensitive creds, and conceal its own components

https://cloud.google.com/blog/topics/threat-intelligence/sonicwall-secure-mobile-access-exploitation-overstep-backdoor

5.Behind the Clouds: Attackers Targeting Governments in Southeast Asia Implement Novel Covert C2 Communication by #PaloAlto’s #Unit42

  • threat actors have developed previously undocumented Windows backdoor named HazyBeacon
  • this backdoor leverages AWS Lambda URLs as C2 infra
  • AWS Lambda URLs are feature of AWS Lambda that allows users to invoke serverless functions directly over HTTPS.
  • this technique uses legitimate cloud functionality to hide in plain sight, creating reliable, scalable & difficult-to-detect communication channel

https://unit42.paloaltonetworks.com/windows-backdoor-for-novel-c2-communication/

6.Browser-Based Threats: Inside the CAMP.24.061 Cybercrime Web by @menlosecurity

  • multiple financially motivated threat clusters are targeting web browsers as primary attack surface
  • “CAMP.24.061” campaign demonstrates overlapping infrastructure and evolving TTPs (Tactics, Techniques, and Procedures)
  • fake browser updates, drive-by downloads, and novel obfuscation techniques are prevalent

https://www.menlosecurity.com/blog/browser-based-threats-inside-the-camp-24-061-cybercrime-web

7.Ghost Crypt Powers PureRAT with Hypnosis by @esthreat

  • attack targeting certified public accounting firm in the United States
  • attack utilized a new crypter called “Ghost Crypt” alongside multiple layers of obfuscation to deliver & execute PureRAT malware
  • PureRAT is RAT malware first observed in Hackforums on Jan 2023 and has seen significant surge in infections in 2025

https://www.esentire.com/blog/ghost-crypt-powers-purerat-with-hypnosis

8.Old Miner, New Tricks by #FORTIGUARD LABS

  • identified new variant of Lcryx ransomware, called Lcrypt0rx
  • Lcryx is relatively new VBScript-based ransomware strain first observed in Nov 2024
  • this family exhibits several unusual characteristics that suggest it may have been generated using AI.

https://www.fortinet.com/blog/threat-research/old-miner-new-tricks

9. NailaoLocker Ransomware’s “Cheese” by #FORTIGUARD LABS

  • ransomware variant targeting Microsoft Windows systems
  • like many ransomware families, it uses AES-256-CBC to encrypt user files
  • what sets it apart is presence of hard-coded SM2 cryptographic keys and a built-in decryption function—uncommon combination that raises immediate questions about intent

https://www.fortinet.com/blog/threat-research/nailaolocker-ransomware-cheese

10.Katz Stealer | Powerful MaaS On the Prowl for Credentials and Crypto Assets by @SentinelOne

  • stealer includes robust credential & data discovery with theft capabilities as well as modern evasion and anti-analysis features
  • used to exfil broad range of personal or sensitive info – passwords, cryptocurrency keys, private messaging tokens, browser session data etc.

https://www.sentinelone.com/blog/katz-stealer-powerful-maas-on-the-prowl-for-credentials-and-crypto-assets/

11. Linux Is No Longer Immune: Why Ransomware Gangs Are Going All-In on Linux Targets by #Morhisec #Labs

  • Linux ecosystem is under siege—not just from opportunistic criminals, but from state-sponsored actors and supply chain attackers who understand the platform’s weaknesses and exploit its strengths
  • Linux powers over 80+% of public cloud workloads and 96% of the top million web servers
  • it’s backbone of critical apps, APIs, DevOps pipelines, and virtual infra

https://www.morphisec.com/blog/linux-is-no-longer-immune

12.From a Teams Call to a Ransomware Threat: Matanbuchus 3.0 MaaS Levels Up by #Morhisec #Labs

  • Jul 2025 Morphisec customer was targeted through external Microsoft Teams calls impersonating IT helpdesk
  • during this engagement, Quick Assist was activated, and employees were instructed to execute a script that deployed Matanbuchus Loader

https://www.morphisec.com/blog/ransomware-threat-matanbuchus-3-0-maas-levels-up/

Thanks a lot for reading.

Please add interesting items you came across during the week in the comments below.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.