25-August-31-August IOC-Weekly

Weekly Threat Advisory: Top Cyber Threats from August 25- August 31 2025

Weekly Threat Advisory: Top Cyber Threats from August 25- August 31 2025

🛡️ Weekly Threat Advisory – Critical Trends Shaping the Cybersecurity Landscape

NAME_OF_ADVERSARYADVERSARY_TYPESEVERITYNUMBER_OF_IOCIOC_TYPE_COUNT_SUMMARY
Chinese state-sponsored APTThreat ActorHigh92IP–>86 | HASH–>6
UNC6384Threat ActorHigh14IP–>2 | HASH–>7 | URL–>5
Silver FoxThreat ActorHigh18IP–>5 | HASH–>13
APT-Q-1Threat ActorHigh23IP–>3 | DOMAIN–>2 | HASH–>13 | URL–>5
Cobalt StrikeThreat ActorHigh80IP–>17 | DOMAIN–>3 | HASH–>60
NightSpireRansomwareHigh2HASH–>2
PromptLockRansomwareHigh6HASH–>6
CephalusRansomwareHigh5HASH–>2 | OTHERS–>3
JRansomwareHigh13IP–>2 | DOMAIN–>3 | HASH–>6 | URL–>1 | OTHERS–>1
Underground RansomwareRansomwareHigh2HASH–>2
Salty 2FAPhishing KitMedium13IP–>4 | DOMAIN–>4 | URL–>4 | EMAIL–>1
SEG bypass Phishing KitPhishing KitMedium7DOMAIN–>7
Fake digital signaturePhishing CampaignLow11HASH–>8 | URL–>3
AI Website Creation AppPhishing CampaignLow9IP–>1 | URL–>8
recruitment invitationsPhishing CampaignLow8DOMAIN–>8
UpCrypterPhishing CampaignLow29DOMAIN–>14 | HASH–>6 | URL–>9
PRC_APT_Router_Level_Global_Espionage_CampaignMalware_campaignHigh95IP–>89 | HASH–>6
Malicious Screen Connect CampaignMalware_campaignHigh32IP–>1 | HASH–>16 | URL–>15
ShadowSilkMalware_campaignHigh66IP–>15 | DOMAIN–>16 | HASH–>31 | URL–>4
TAOTH campaignMalware_campaignHigh47IP–>5 | DOMAIN–>6 | HASH–>17 | URL–>19
Taspen Malware CampaignMalware_campaignHigh7IP–>1 | DOMAIN–>2 | HASH–>4
AppSuite PDF EditorMalwareHigh16HASH–>7 | URL–>9
QuirkyLoaderMalwareHigh27IP–>3 | DOMAIN–>2 | HASH–>22
SSH tool PuTTYMalwareHigh38IP–>5 | DOMAIN–>13 | HASH–>12 | URL–>8
TINKYWINKEY KEYLOGGERMalwareHigh3HASH–>3
FileFixMalwareHigh119IP–>4 | DOMAIN–>41 | HASH–>10 | URL–>64
GayfemboyMalwareHigh62IP–>6 | DOMAIN–>5 | HASH–>51
Hook v3MalwareHigh11HASH–>9 | URL–>2
MystrodxMalwareHigh17IP–>5 | DOMAIN–>1 | HASH–>10 | URL–>1
PipeMagic backdoorMalwareHigh7DOMAIN–>1 | HASH–>6

Happy Threat Hunting

#threathunting #threatintelligence #cybersecurity #threatactor #malware #CVE #campaign #ransomware #phishing #threatadvisory #ThreatFeeds #APTGroups #InfosecIntel #CTI #IOC #CyberThreatIntel #TTPs #CyberThreatReport #campaigns

Core Working Areas :- Threat Intelligence, Digital Forensics, Incident Response, Fraud Investigation, Web Application Security Technical Certifications :- Computer Hacking Forensics Investigator | Certified Ethical Hacker | Certified Cyber crime investigator | Certified Professional Hacker | Certified Professional Forensics Analyst | Redhat certified Engineer | Cisco Certified Network Associates | Certified Firewall Solutions | Certified Network Monitoring Solution | Certified Proxy Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter Captcha Here : *

Reload Image