1-September-7-September IOC

Weekly Threat Advisory: Top Cyber Threats from September 01 – September 07 2025

Weekly Threat Advisory: Top Cyber Threats from September 01 – September 07 2025

🛡️ Weekly Threat Advisory – Critical Trends Shaping the Cybersecurity Landscape

NAME_OF_ADVERSARYADVERSARY_TYPESEVERITYNUMBER_OF_IOCIOC_TYPE_COUNT_SUMMARY
APT37Threat ActorHigh10HASH–>10
EncryptHubThreat ActorHigh11IP–>2 | DOMAIN–>7 | URL–>2
KimsukyThreat ActorHigh9IP–>1 | HASH–>3 | URL–>5
LazarusThreat ActorHigh46IP–>2 | DOMAIN–>20 | HASH–>24
Noisy BearThreat ActorHigh14IP–>2 | DOMAIN–>1 | HASH–>11
APT28Threat ActorHigh6HASH–>6
APT29Threat ActorHigh2DOMAIN–>2
GhostRedirectorThreat ActorHigh33IP–>4 | DOMAIN–>7 | HASH–>22
ShinyHuntersThreat ActorHigh39IP–>33 | DOMAIN–>3 | EMAIL–>3
LockBit 4.0 RansomwareRansomwareHigh122IP–>15 | DOMAIN–>65 | HASH–>42
ObscuraRansomwareHigh2HASH–>1 | OTHERS–>1
Dire Wolf RansomwareRansomwareHigh4HASH–>4
Sindoor DropperPhishing CampaignLow5HASH–>5
Luxury Shop Fraud CampaignPhishing CampaignLow24IP–>3 | DOMAIN–>15 | EMAIL–>6
JSCoreRunnerMalware_campaignHigh16HASH–>16
MintsLoaderMalware_campaignHigh40DOMAIN–>6 | HASH–>27 | URL–>7
s1ngularityMalware_campaignHigh5HASH–>4 | OTHERS–>1
SikkahBotMalware_campaignHigh33HASH–>13 | URL–>20
XWormMalware_campaignHigh6IP–>1 | HASH–>5
IPTV_PiracyMalwareHigh7DOMAIN–>7
Atomic macOS StealerMalwareHigh21DOMAIN–>11 | HASH–>5 | URL–>5
MetaStealerMalwareHigh8IP–>1 | DOMAIN–>3 | HASH–>3 | URL–>1
AI Waifu RATMalwareHigh20HASH–>7 | URL–>12 | EMAIL–>1
CastleRATMalwareHigh72IP–>28 | DOMAIN–>12 | HASH–>32
StealeriumMalwareHigh4HASH–>4
ToolShellMalwareHigh16IP–>4 | HASH–>4 | OTHERS–>8
ViewState DeserializationMalwareHigh11IP–>2 | HASH–>9
VShellMalwareHigh10HASH–>10
MeetC2C2Medium1DOMAIN–>1

Happy Threat Hunting

#threathunting #threatintelligence #cybersecurity #threatactor #malware #CVE #campaign #ransomware #phishing #threatadvisory #ThreatFeeds #APTGroups #InfosecIntel #CTI #IOC #CyberThreatIntel #TTPs #CyberThreatReport #campaigns

Core Working Areas :- Threat Intelligence, Digital Forensics, Incident Response, Fraud Investigation, Web Application Security Technical Certifications :- Computer Hacking Forensics Investigator | Certified Ethical Hacker | Certified Cyber crime investigator | Certified Professional Hacker | Certified Professional Forensics Analyst | Redhat certified Engineer | Cisco Certified Network Associates | Certified Firewall Solutions | Certified Network Monitoring Solution | Certified Proxy Solutions

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter Captcha Here : *

Reload Image