A series of cybersecurity threats and vulnerabilities have been identified in recent months, involving state-sponsored hacking groups and ransomware gangs. Notably, a critical remote code execution vulnerability (CVE-2025-32433) in Erlang/OTP SSH has been disclosed, allowing unauthenticated attackers full control over affected systems, including those running Cisco, Ericsson, and IoT devices. Proof-of-concept exploits have been developed, raising concerns about imminent attacks. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a SonicWall SMA100 Appliance flaw to its Known Exploited Vulnerabilities catalog. Meanwhile, a Node.js-powered malware campaign has been active since October 2024, targeting cryptocurrency users through fake Binance and TradingView installers, deploying malware via Node.js and PowerShell. This campaign includes threats such as ClickFix social engineering tricks, SectopRAT malware, and HR-themed phishing. The ClickFix tactic, originally developed by cybercriminals, is now being weaponized by state-sponsored groups from North Korea, Iran, and Russia, as well as ransomware groups like Interlock, to trick users into executing malware. China-backed advanced persistent threat (APT) group Mustang Panda has upgraded its arsenal with new tools including TONESHELL v3, StarProxy, and stealth keyloggers (PAKLOG, CorKLOG), enabling network hopping and evasion of endpoint detection and response (EDR) systems. Mustang Panda has also targeted Myanmar with these updated tools. Additionally, a widespread smishing scam linked to a China-based group known as Smishing Triad is targeting drivers in eight U.S. states with fake E-ZPass toll payment texts to steal card information. Other reported vulnerabilities include a Windows NTLM hash leak exploited in phishing attacks on governments and an authentication bypass exploit affecting ASUS routers with AiCloud. Ransomware groups such as Black Basta and Clop continue to exploit software flaws, with Clop leading in victim count during the first quarter of 2025 by exploiting Cleo software vulnerabilities. Overall, these developments highlight an evolving cyber threat landscape involving sophisticated malware campaigns, social engineering tactics, and critical software vulnerabilities impacting global targets across government, corporate, and consumer sectors.
ASUS routers with AiCloud vulnerable to auth bypass exploit: https://t.co/l5MGDGk8DN by Security Affairs #infosec #cybersecurity #technology #news
Interlock ransomware gang pushes fake IT tools in ClickFix attacks https://t.co/wGBLySEGne
Chinese APT Mustang Panda Debuts 4 New Attack Tools: https://t.co/nWmBuKsSXN by darkreading #infosec #cybersecurity #technology #news