⚠ Weekly Threat Advisory: Top Cyber Threats from March 30 – April 06, 2025 ⚠
This Weekly Threat Advisory delivers a comprehensive overview of emerging Threat Actors, Malware strains, Ransomware incidents, Campaigns, CVEs, and Phishing Kits targeting various sectors. Adversaries are actively exploiting recent vulnerabilities, using sophisticated phishing tactics, and deploying adaptive malware to bypass security controls. Ransomware campaigns are growing in scale and complexity, with attackers leveraging double extortion and supply chain infiltration for maximum disruption. At the same time, phishing kits are advancing, enabling widespread credential harvesting and unauthorized system access. To effectively mitigate these risks, security teams must stay ahead with proactive patching, robust threat hunting practices, and improved detection capabilities to fortify their defenses.
🚨 Continuous threat research and intel gathering have identified both active and emerging cyber risks impacting multiple sectors.
🚨 This week’s threat landscape showcases newly identified malicious actors, malware variants, ransomware groups, campaigns, and critical CVEs.
🚨 Adversaries are deploying more advanced techniques, enhancing their ability to exploit, persist, and evade detection within networks.
🚨 Recently uncovered vulnerabilities present serious risks, requiring prompt mitigation by security operations.
🚨 Attackers are leveraging zero-day flaws, sophisticated phishing tactics, and privilege escalation methods to breach systems.
🚨 Ransomware operations are on the rise, now incorporating double extortion and infiltrating supply chains for broader impact.
🚨 Tactics like credential harvesting and misuse of cloud services are becoming more prevalent for unauthorized access.
🚨 Both state-sponsored and financially driven threat groups are enhancing their techniques to bypass standard security controls.
🚨 High-risk sectors such as finance, healthcare, critical infrastructure, and cloud platforms remain top targets.
🚨 Newly weaponized CVEs are being rapidly adopted into attacker toolkits, accelerating the pace of exploitation.
🚨 Dark web activity shows increasing interest in automation tools to enable mass-scale attacks.
🚨 Malware is continuously adapting, using polymorphic capabilities and fileless execution to avoid detection.
🚨 Security teams must focus on aggressive patching strategies and improving threat detection systems.
🚨 Leading a proactive threat hunting effort is vital—searching for subtle signs of compromise and anomalous activity.
🚨 Enhancing incident response procedures and boosting cross-industry intelligence collaboration are essential for building cyber resilience.
Threat Actors
💡 Earth Alux
💡 FamousSparrow
💡 Water Gamayun
Malware
📌 DarkCloud
📌 Xworm RAT
📌 Gamaredon campaign
📌 HijackLoader
📌 Salvador Stealer
📌 Outlaw Linux Malware
Ransomware
📍 Hellcat
📍 BlackSuit ransomware
📍 DragonForce
📍 SafePay
Campaigns & Phishing Kit
🛡️ The QR Code Phenomenon
🛡️ RolandSkimmer
🛡️ DGA
🛡️ Tomcat Campaign
CVE
👉 CVE-2025-31192
👉 CVE-2025-2857.
👉 CVE-2025-29981
👉 CVE-2025-26054
👉 CVE-2025-26055
👉 CVE-2025-26056
👉 CVE-2025-22953
👉 CVE-2025-31137
Happy Threat Hunting