Tag Cobalt Strike

Hackers Exploit Microsoft Teams to Distribute Enhanced Matanbuchus 3.0 Malware to Targeted Companies

July 16, 2025
Threat Intelligence / Vulnerability

Cybersecurity researchers have identified a new variant of the established malware loader Matanbuchus, which boasts enhanced stealth features to evade detection. Matanbuchus, a malware-as-a-service (MaaS) offering, serves as a launchpad for various next-stage payloads, including Cobalt Strike beacons and ransomware. Initially advertised in February 2021 on Russian-speaking cybercrime forums for a rental fee of $2,500, the malware has been utilized in ClickFix-like schemes to deceive users into visiting compromised yet legitimate sites. Over time, Matanbuchus’ delivery methods have evolved, incorporating phishing emails with malicious Google Drive links, drive-by downloads from compromised websites, harmful MSI installers, and malvertising. It has been instrumental in deploying numerous secondary payloads such as DanaBot, QakBot, and Cobalt Strike, all of which are precursors to ransomware attacks.

Hackers Exploit Microsoft Teams to Distribute Matanbuchus 3.0 Malware Targeting Businesses August 16, 2025 In a concerning development within the realm of cybersecurity, researchers have identified a new variant of the Matanbuchus malware loader, which has been refined to enhance its stealth and evade detection by security systems. Matanbuchus represents…

Read More

Hackers Exploit Microsoft Teams to Distribute Enhanced Matanbuchus 3.0 Malware to Targeted Companies

July 16, 2025
Threat Intelligence / Vulnerability

Cybersecurity researchers have identified a new variant of the established malware loader Matanbuchus, which boasts enhanced stealth features to evade detection. Matanbuchus, a malware-as-a-service (MaaS) offering, serves as a launchpad for various next-stage payloads, including Cobalt Strike beacons and ransomware. Initially advertised in February 2021 on Russian-speaking cybercrime forums for a rental fee of $2,500, the malware has been utilized in ClickFix-like schemes to deceive users into visiting compromised yet legitimate sites. Over time, Matanbuchus’ delivery methods have evolved, incorporating phishing emails with malicious Google Drive links, drive-by downloads from compromised websites, harmful MSI installers, and malvertising. It has been instrumental in deploying numerous secondary payloads such as DanaBot, QakBot, and Cobalt Strike, all of which are precursors to ransomware attacks.

Exploitation of Ivanti Vulnerabilities Leads to MDifyLoader Deployment and In-Memory Cobalt Strike Attacks

Cybersecurity researchers have revealed new insights into MDifyLoader, a malware recently linked to cyber attacks exploiting security weaknesses in Ivanti Connect Secure (ICS) appliances. A report from JPCERT/CC highlights that threat actors have exploited vulnerabilities CVE-2025-0282 and CVE-2025-22457 between December 2024 and July 2025 to deploy MDifyLoader, which is then utilized to initiate in-memory Cobalt Strike operations. CVE-2025-0282 is a critical vulnerability allowing unauthenticated remote code execution, addressed by Ivanti in January 2025. Meanwhile, CVE-2025-22457, patched in February 2025, involves a stack-based buffer overflow potentially enabling arbitrary code execution. Previous findings indicate that CVE-2025-0282 was actively weaponized in the wild as a zero-day beginning in mid-December 2024, facilitating the delivery of various malware families.

Ivanti Vulnerabilities Exploited to Deploy MDifyLoader and Initiate In-Memory Cobalt Strike Attacks In a recent cybersecurity report released by JPCERT/CC, researchers have uncovered a sophisticated new malware strain known as MDifyLoader, which is linked to a series of cyber incursions targeting Ivanti Connect Secure (ICS) appliances. The findings detail how…

Read More

Exploitation of Ivanti Vulnerabilities Leads to MDifyLoader Deployment and In-Memory Cobalt Strike Attacks

Cybersecurity researchers have revealed new insights into MDifyLoader, a malware recently linked to cyber attacks exploiting security weaknesses in Ivanti Connect Secure (ICS) appliances. A report from JPCERT/CC highlights that threat actors have exploited vulnerabilities CVE-2025-0282 and CVE-2025-22457 between December 2024 and July 2025 to deploy MDifyLoader, which is then utilized to initiate in-memory Cobalt Strike operations. CVE-2025-0282 is a critical vulnerability allowing unauthenticated remote code execution, addressed by Ivanti in January 2025. Meanwhile, CVE-2025-22457, patched in February 2025, involves a stack-based buffer overflow potentially enabling arbitrary code execution. Previous findings indicate that CVE-2025-0282 was actively weaponized in the wild as a zero-day beginning in mid-December 2024, facilitating the delivery of various malware families.

FBI and CISA Alert: Interlock Ransomware Threatens Critical Infrastructure

The Federal Bureau of Investigation (FBI), in collaboration with the Cybersecurity and Infrastructure Security Agency (CISA), the Department of Health and Human Services (HHS), and the Multi-State Information Sharing and Analysis Center (MS-ISAC), has issued a critical alert regarding the intensified activities of the Interlock ransomware group. This group is…

Read MoreFBI and CISA Alert: Interlock Ransomware Threatens Critical Infrastructure

China-Supported Hackers Ramp Up Attacks on Taiwan’s Chip Manufacturing Sector

Anti-Phishing, DMARC, Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime State-Sponsored Groups Target Semiconductor Sector with Spear-Phishing Attacks Prajeet Nair (@prajeetspeaks) • July 17, 2025 Chinese state-aligned hackers have escalated their espionage tactics against Taiwan’s semiconductor ecosystem through concentrated spear-phishing efforts. (Image: Shutterstock) Chinese state-aligned hackers are intensifying their espionage…

Read MoreChina-Supported Hackers Ramp Up Attacks on Taiwan’s Chip Manufacturing Sector

Exposed Shellter Elite Tool is Driving Global Infostealer Attacks

A recent report outlines the security implications of the advanced hacking tool, Shellter Elite, which has been leaked and is now exploited by cybercriminals. The report delves into evasion techniques and the associated infostealer campaigns. Shellter Elite, originally designed for cybersecurity professionals, has entered the hands of malicious actors following…

Read MoreExposed Shellter Elite Tool is Driving Global Infostealer Attacks

AHA Alerts Hospitals to Recent Ransomware Threats from Play Group

Fraud Management & Cybercrime, Healthcare, HIPAA/HITECH Advisory Highlights Evolving Threats from Play Ransomware Group Marianne Kolbasuk McGee (HealthInfoSec) • June 11, 2025 Image: Getty Images The American Hospital Association (AHA) has issued a warning to hospitals and healthcare organizations regarding an increase in double-extortion attacks by the Play ransomware group.…

Read MoreAHA Alerts Hospitals to Recent Ransomware Threats from Play Group

Chinese Hackers Target US Local Governments by Exploiting Cityworks 0-DayChinese Hackers Target US Local Governments by Exploiting Cityworks Zero-Day Vulnerability

Cisco Talos has issued a warning regarding active exploitation of a zero-day vulnerability (CVE-2025-0994) in Cityworks, allegedly by the Chinese-speaking threat group UAT-6382. This article provides an overview of the malware involved, the organizations at risk, and essential security measures. Cisco Talos has raised an alarm about targeted cyberattacks focusing…

Read MoreChinese Hackers Target US Local Governments by Exploiting Cityworks 0-DayChinese Hackers Target US Local Governments by Exploiting Cityworks Zero-Day Vulnerability

Ohio Health System Addresses Cyberattack and Fraud Schemes

Fraud Management & Cybercrime, Healthcare, Incident & Breach Response Experts Identify Interlock Ransomware Gang Behind Kettering Health Cyberattack Marianne Kolbasuk McGee (HealthInfoSec) • May 21, 2025 Kettering Health, which manages 14 medical centers and 120 outpatient facilities in Ohio, is addressing a cyberattack detected on Tuesday. (Image: Kettering Health) Kettering…

Read MoreOhio Health System Addresses Cyberattack and Fraud Schemes