Weekly Threat Advisory: Top Cyber Threats from March 10 – March 16, 2025
This Weekly Threat Advisory highlights the latest Threat Actors, Malware, Ransomware, Campaigns, CVEs, and Phishing Kits actively targeting organizations. Adversaries are leveraging newly exploited vulnerabilities, advanced phishing tactics, and evolving malware strains to bypass security defenses. Ransomware operations continue to grow, incorporating double extortion and supply chain attacks for maximum impact. Phishing kits are becoming more sophisticated, enabling large-scale credential theft and unauthorized access. Security teams must stay vigilant, prioritize patching, enhance threat hunting, and strengthen detection capabilities to mitigate emerging cyber threats.
🚨 Through continuous research and intelligence gathering, we have identified active and trending adversaries targeting multiple industries.
🚨 This week’s analysis highlights evolving cyber threats, including new Threat Actors, Malware, Ransomware, Campaigns, and CVEs.
🚨 Emerging attack techniques reveal increasing sophistication in exploitation, persistence, and defense evasion tactics.
🚨 Newly exploited vulnerabilities pose critical risks, requiring immediate attention from security teams.
🚨 Threat actors are leveraging zero-day exploits, advanced phishing schemes, and privilege escalation techniques.
🚨 Ransomware operations continue to expand, with a rise in double extortion tactics and supply chain compromises.
🚨 Credential theft and abuse of cloud services are becoming more frequent attack vectors.
Nation-state and financially motivated groups are refining their strategies to bypass traditional security controls.
🚨 Targeted sectors include financial institutions, healthcare, critical infrastructure, and cloud environments.
🚨 Weaponized exploits for newly disclosed CVEs are actively being integrated into attack frameworks.
🚨 Dark web discussions indicate increased interest in automation tools for mass exploitation.
🚨 Malware variants are evolving, incorporating polymorphic and fileless attack capabilities.
🚨 Security teams should prioritize patching critical vulnerabilities and enhancing threat detection mechanisms.
🚨 Proactive threat hunting efforts should focus on early indicators of compromise and anomalous behaviors.
🚨 Strengthening incident response plans and cross-sector intelligence sharing will enhance cyber resilience.
Threat Actors
💡 Sidewinder- T-APT-04 or RattleSnake
💡 cobalt strike
💡 UNC3886
💡 Lazarus_Group
Malware
📌 BadBox 2.0
📌 Lumma Stealer C2
📌 JSPSpy
📌 Anubis Backdoor
📌 Mirai C2
📌 Coyote Banking Trojan
📌 HTA trojan
📌 Phantom_Goblin
📌 Pikabot
📌 REMCOS RAT
📌 SocGholish
Ransomware
📍 Boramae_Ransomware
📍 LithiumWare Ransomware
Phishing Kit
🛡️ LARVA-147- CryptoChameleon or UNK-12
🛡️ Company Logo API
Campaigns
✅ Iranian hackers
CVE
👉 CVE-2025-27363
👉 CVE-2025-24813
👉 CVE-2025-30066
Happy Threat Hunting