Weekly Threat Advisory

Weekly Threat Advisory Top Cyber Threats from March 17 – March 23 2025

⚠ Weekly Threat Advisory: Top Cyber Threats from March 17 – March 23, 2025 ⚠

This Weekly Threat Advisory highlights the latest Threat Actors, Malware, Ransomware, Campaigns, CVEs, and Phishing Kits actively targeting organizations. Adversaries are leveraging newly exploited vulnerabilities, advanced phishing tactics, and evolving malware strains to bypass security defenses. Ransomware operations continue to grow, incorporating double extortion and supply chain attacks for maximum impact. Phishing kits are becoming more sophisticated, enabling large-scale credential theft and unauthorized access. Security teams must stay vigilant, prioritize patching, enhance threat hunting, and strengthen detection capabilities to mitigate emerging cyber threats.

🚨 Through continuous research and intelligence gathering, we have identified active and trending adversaries targeting multiple industries.
🚨 This week’s analysis highlights evolving cyber threats, including new Threat Actors, Malware, Ransomware, Campaigns, and CVEs.
🚨 Emerging attack techniques reveal increasing sophistication in exploitation, persistence, and defense evasion tactics.
🚨 Newly exploited vulnerabilities pose critical risks, requiring immediate attention from security teams.
🚨 Threat actors are leveraging zero-day exploits, advanced phishing schemes, and privilege escalation techniques.
🚨 Ransomware operations continue to expand, with a rise in double extortion tactics and supply chain compromises.
🚨 Credential theft and abuse of cloud services are becoming more frequent attack vectors.
🚨 Nation-state and financially motivated groups are refining their strategies to bypass traditional security controls.
🚨 Targeted sectors include financial institutions, healthcare, critical infrastructure, and cloud environments.
🚨 Weaponized exploits for newly disclosed CVEs are actively being integrated into attack frameworks.
🚨 Dark web discussions indicate increased interest in automation tools for mass exploitation.
🚨 Malware variants are evolving, incorporating polymorphic and fileless attack capabilities.
🚨 Security teams should prioritize patching critical vulnerabilities and enhancing threat detection mechanisms.
🚨 Proactive threat hunting efforts should focus on early indicators of compromise and anomalous behaviors.
🚨 Strengthening incident response plans and cross-sector intelligence sharing will enhance cyber resilience.

Threat Actors

💡 APT-C-36
💡 Squid Werewolf (APT37)
💡 Ricochet_Chollima – APT 37
💡 Rose87168
💡 UAT-5918

Malware

📌 NetSupport RAT
📌 gh0st RAT
📌 Cobalt Strike Cat (CS Cat)

Ransomware

📍 Play
📍 Ruthless Mantis
📍 Lynx Ransomware
📍 Ransomhub
📍 Moroccan Dragons Ransomware
📍 MONIP”d Ransomware
📍 VanHelsing Ransomware
📍 Mora_001
📍 Black Basta (RaaS)

Phishing Kit

🛡️ Signal Messenger

Campaigns

✅ Virtual Hard Disk (VHD) image files distribute VenomRAT and Other Malware
✅ Free online Converters to install Malwares

CVE

👉 CVE-2025-0589
👉 CVE-2025-2323
👉 CVE-2025-30066
👉 CVE-2025-23411
👉 CVE-2025-25067
👉 CVE-2025-24865
👉 CVE-2025-22896
👉 CVE-2025-20061
👉 CVE-2025-20014

Happy Threat Hunting

#threathunting #threatintelligence #cybersecurity #threatactor #malware

Core Working Areas :- Threat Intelligence, Digital Forensics, Incident Response, Fraud Investigation, Web Application Security Technical Certifications :- Computer Hacking Forensics Investigator | Certified Ethical Hacker | Certified Cyber crime investigator | Certified Professional Hacker | Certified Professional Forensics Analyst | Redhat certified Engineer | Cisco Certified Network Associates | Certified Firewall Solutions | Certified Network Monitoring Solution | Certified Proxy Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter Captcha Here : *

Reload Image