Weekly Threat Advisory

Weekly Threat Advisory Top Cyber Threats from March 10 – March 16 2025

Weekly Threat Advisory: Top Cyber Threats from March 10 – March 16, 2025

This Weekly Threat Advisory highlights the latest Threat Actors, Malware, Ransomware, Campaigns, CVEs, and Phishing Kits actively targeting organizations. Adversaries are leveraging newly exploited vulnerabilities, advanced phishing tactics, and evolving malware strains to bypass security defenses. Ransomware operations continue to grow, incorporating double extortion and supply chain attacks for maximum impact. Phishing kits are becoming more sophisticated, enabling large-scale credential theft and unauthorized access. Security teams must stay vigilant, prioritize patching, enhance threat hunting, and strengthen detection capabilities to mitigate emerging cyber threats.

🚨 Through continuous research and intelligence gathering, we have identified active and trending adversaries targeting multiple industries.
🚨 This week’s analysis highlights evolving cyber threats, including new Threat Actors, Malware, Ransomware, Campaigns, and CVEs.
🚨 Emerging attack techniques reveal increasing sophistication in exploitation, persistence, and defense evasion tactics.
🚨 Newly exploited vulnerabilities pose critical risks, requiring immediate attention from security teams.
🚨 Threat actors are leveraging zero-day exploits, advanced phishing schemes, and privilege escalation techniques.
🚨 Ransomware operations continue to expand, with a rise in double extortion tactics and supply chain compromises.
🚨 Credential theft and abuse of cloud services are becoming more frequent attack vectors.
Nation-state and financially motivated groups are refining their strategies to bypass traditional security controls.
🚨 Targeted sectors include financial institutions, healthcare, critical infrastructure, and cloud environments.
🚨 Weaponized exploits for newly disclosed CVEs are actively being integrated into attack frameworks.
🚨 Dark web discussions indicate increased interest in automation tools for mass exploitation.
🚨 Malware variants are evolving, incorporating polymorphic and fileless attack capabilities.
🚨 Security teams should prioritize patching critical vulnerabilities and enhancing threat detection mechanisms.
🚨 Proactive threat hunting efforts should focus on early indicators of compromise and anomalous behaviors.
🚨 Strengthening incident response plans and cross-sector intelligence sharing will enhance cyber resilience.

Threat Actors

💡 Sidewinder- T-APT-04 or RattleSnake
💡 cobalt strike
💡 UNC3886
💡 Lazarus_Group

Malware

📌 BadBox 2.0
📌 Lumma Stealer C2
📌 JSPSpy
📌 Anubis Backdoor
📌 Mirai C2
📌 Coyote Banking Trojan
📌 HTA trojan
📌 Phantom_Goblin
📌 Pikabot
📌 REMCOS RAT
📌 SocGholish

Ransomware

📍 Boramae_Ransomware
📍 LithiumWare Ransomware

Phishing Kit

🛡️ LARVA-147- CryptoChameleon or UNK-12
🛡️ Company Logo API

Campaigns

✅ Iranian hackers

CVE

👉 CVE-2025-27363
👉 CVE-2025-24813
👉 CVE-2025-30066


Happy Threat Hunting

threathunting #threatintelligence #cybersecurity #threatactor #malware

Core Working Areas :- Threat Intelligence, Digital Forensics, Incident Response, Fraud Investigation, Web Application Security Technical Certifications :- Computer Hacking Forensics Investigator | Certified Ethical Hacker | Certified Cyber crime investigator | Certified Professional Hacker | Certified Professional Forensics Analyst | Redhat certified Engineer | Cisco Certified Network Associates | Certified Firewall Solutions | Certified Network Monitoring Solution | Certified Proxy Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter Captcha Here : *

Reload Image