Cybersecurity Wiretap #71: From HTTP/2 DDoS to AI-Powered Ransomware with a Focus on Prompt Injection and Credential Abuse (week of 08/25/2025)

Welcome to the weekly digest about the Cybersecurity & Threats in the wild.

Below you will find a very subjective summary of Cybersecurity events for the prior week.

1.CVE-2025-8671 – HTTP/2 MadeYouReset Vulnerability DDoS Attack by @CyfirmaR

  • CVE-2025-8671 (“MadeYouReset“) – newly disclosed HTTP/2 denial-of-service (DoS) vuln identified by researchers at Tel Aviv University & Imperva
  • exploits weakness in some HTTP/2 implementations that incorrectly treat server-sent stream resets as stream closures
  • attackers can trigger servers to reset streams using crafted HTTP/2 frames, while backend processing continues-thus bypassing standard MAX_CONCURRENT_STREAMS limit & exhausting server resources

https://www.cyfirma.com/research/cve-2025-8671-http-2-madeyoureset-vulnerability-ddos-attack/

2.TINKYWINKEY KEYLOGGER by @CyfirmaR

  • comprehensive analysis of TinkyWinkey Keylogger, highlighting its use of advanced Windows system programming techniques, such as service management, low-level keyboard hooks, process handling, and system info collection
  • operates stealthily as service and executable, capturing extensive system data including CPU specifications, memory, OS version, and network details, while continuously monitoring active windows & keyboard layouts

https://www.cyfirma.com/research/tinkywinkey-keylogger/

3.UNVEILING A PYTHON STEALER – INF0S3C STEALER by @CyfirmaR

  • Python-based grabber designed to collect system info & user data
  • executable imports range of Windows APIs for file & directory operations, process enumeration, system configuration access, memory manipulation, and security management, supporting its data collection & operational functionality

https://www.cyfirma.com/research/unveiling-a-python-stealer-inf0s3c-stealer/

4. TAOTH Campaign Exploits End-of-Support Software to Target Traditional Chinese Users and Dissidents by @TrendMicro

  • campaign leveraged abandoned Sogou Zhuyin IME update server & spear-phishing operations to deliver multiple malware families—including TOSHIS, C6DOOR, DESFY, and GTELAM—primarily targeting users across Eastern Asia
  • attackers employed sophisticated infection chains, such as hijacked software updates and fake cloud storage or login pages, to distribute malware & collect sensitive info

https://www.trendmicro.com/en_us/research/25/h/taoth-campaign.html

5.First known AI-powered ransomware uncovered by ESET Research by @ESETresearch

  • malware, which ESET has named PromptLock, has the ability to exfiltrate, encrypt and possibly even destroy data, though this last functionality appears not to have been implemented in the malware yet

https://www.welivesecurity.com/en/ransomware/first-known-ai-powered-ransomware-uncovered-eset-research/

6.Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats by @Mandiant

  • complex, multifaceted campaign attributed to the PRC-nexus threat actor UNC6384
  • campaign targeted diplomats in Southeast Asia and other entities globally likely in support of cyber espionage ops aligned with strategic interests of People’s Republic of China (PRC).

https://cloud.google.com/blog/topics/threat-intelligence/prc-nexus-espionage-targets-diplomats

7.Stopping APT37 Before the First Click by @menlosecurity

  • threat actors like APT37 continue to innovate — hiding malware in images, documents, and web content — traditional detection-based tools fall short

https://www.menlosecurity.com/blog/stopping-apt37-before-the-first-click

8. Loophole allows threat actors to claim VS Code extension names by @ReversingLabs

  • discovery of loophole on VS Code platform that allowed for reuse of legitimate, but discontinued VS Code extension names by malicious actors

https://www.reversinglabs.com/blog/malware-vs-code-extension-names

9.Threat Actors Deploy Sinobi Ransomware via Compromised SonicWall SSL VPN Credentials by @esthreat

  • ransomware attack attributed to affiliate of Sinobi Group
  • fue to significant code overlaps and other similarities in ransomware binaries and data leak sites, Sinobi is suspected to be rebrand of Lynx, Ransomware-as-a-Service (RaaS) group that first emerged in 2024

https://www.esentire.com/blog/threat-actors-deploy-sinobi-ransomware-via-compromised-sonicwall-ssl-vpn-credentials

10.Phishing Campaign Targeting Companies via UpCrypter by #FORTIGUARD LABS

  • phishing campaign leveraging carefully crafted emails to deliver malicious URLs linked to convincing phishing pages
  • pages are designed to entice recipients into downloading JavaScript files that act as droppers for UpCrypter, malware that ultimately deploys various RATs

https://www.fortinet.com/blog/threat-research/phishing-campaign-targeting-companies-via-upcrypter

11.The ClickFix Attack That Wasn’t: From a Fake AnyDesk Installer to MetaStealer by @HuntressLabs

  • early indicators of attack look like another ClickFix scam – little bit of digging shows unique infection chain that involves fake Cloudflare Turnstile lure, the Windows search protocol, and MSI package disguised as a PDF that cleverly grabs the victim’s hostname
  • attack ultimately aims to drop MetaStealer, known for harvesting credentials and stealing files

https://www.huntress.com/blog/fake-anydesk-clickfix-metastealer-malware

12.How Prompt Injection Exposes Manus’ VS Code Server to the Internet by @wunderwuzzi23

  • end-to-end indirect prompt injection attack leading to a compromise of Manus’ dev box

https://embracethered.com/blog/posts/2025/manus-ai-kill-chain-expose-port-vs-code-server-on-internet/

13. AWS Kiro: Arbitrary Code Execution via Indirect Prompt Injection by @wunderwuzzi23

  • AWS Kiro was vulnerable to arbitrary command execution via indirect prompt injection
  • this means that remote attacker, who controls data that Kiro processes, could hijack it to run arbitrary operating system commands or write and run custom code

https://embracethered.com/blog/posts/2025/aws-kiro-aribtrary-command-execution-with-indirect-prompt-injection/

14.Cline: Vulnerable To Data Exfiltration And How To Protect Your Data by @wunderwuzzi2

  • Cline is vulnerable to data exfiltration through rendering of markdown images from untrusted domains in chat box

https://embracethered.com/blog/posts/2025/cline-vulnerable-to-data-exfiltration/

15.Windsurf MCP Integration: Missing Security Controls Put Users at Risk by @wunderwuzzi23

  • when adding MCP server there are often a lot of tools the server exposes
  • probably the best default option is to show list to user and let them configure which ones should run automatically, which are entirely disabled, and which ones should be suggestions

https://embracethered.com/blog/posts/2025/windsurf-dangers-lack-of-security-controls-for-mcp-server-tool-invocation/

16.AgentHopper: An AI Virus by @wunderwuzzi23

  • idea was to have one prompt injection payload that would operate across agents & exploit them accordingly
  • this was to demonstrate that conditional prompt injection can be leveraged as powerful mechanism to target specific agents

https://embracethered.com/blog/posts/2025/agenthopper-a-poc-ai-virus/

Thanks a lot for reading.

Please add interesting items you came across during the week in the comments below.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.