Cybersecurity Weekly Recap: Top Cyber Attacks, Vulnerabilities & Data Breaches

Cybersecurity Weekly Recap: Top Cyber Attacks, Vulnerabilities & Data Breaches

Introduction

In the first half of April 2025, cybersecurity threats have escalated in both volume and complexity. From state-sponsored cyber activity to new strains of evasive malware and significant data breaches, security leaders are facing increasing pressure to protect their organizations. This weekly recap provides an analytical overview of the most impactful cyber attacks, vulnerabilities, and strategic developments, highlighting key insights and actionable recommendations for security teams.

1. Abuse of Trusted Infrastructure: Exploiting Legitimacy in Cyber Attacks

SourceForge Malware Campaign

Cybercriminals are leveraging trusted platforms to distribute malicious software. In the case of SourceForge, attackers are repackaging executables as Microsoft Office files, delivering malware like cryptocurrency miners and credential-stealing Trojans. These malicious files are often encrypted within password-protected ZIPs, making detection difficult.

Email-Based Bifurcation Attacks

Phishing attacks are evolving, with attackers combining phishing lures and malware delivery methods. Cybercriminals are targeting Microsoft Office365 credentials while dropping remote access Trojans (RATs), such as ConnectWise RAT, via third-party file hosting platforms.

Implications for Cybersecurity Defenders

These attacks highlight the growing trend of attackers exploiting legitimate infrastructure. Defenders need to look beyond traditional security models and adopt behavior-based detection to mitigate these stealth-based threats.

2. Rise of Advanced Malware Execution Techniques

CatB Ransomware and DLL Hijacking

Advanced ransomware variants like CatB are embedding stealth techniques to evade detection. By exploiting Microsoft Distributed Transaction Coordinator (MSDTC), CatB evades sandbox environments and exfiltrates browser-stored credentials.

AkiraBot and CAPTCHA Bypass

AkiraBot uses AI-generated messages to bypass CAPTCHA systems and target over 80,000 websites, performing SEO manipulation and distributing spam content.

Fake mParivahan App Malware

A new wave of malicious apps is targeting Android users in India. The fake mParivahan app, propagated via WhatsApp, installs data-harvesting malware that includes anti-analysis and message monitoring modules.

Impact of Sophisticated Attack Techniques

These malware campaigns illustrate the convergence of data theft, espionage, and commercial fraud. They operate at multiple layers of application, browser, and protocol levels, necessitating more advanced detection strategies for cybersecurity teams.

3. State-Sponsored Cyber Attacks Escalate in April 2025

Russian Threat Actor Campaigns

Russian-backed threat groups have increased their attacks on European government systems by deploying malicious .RDP files that steal clipboard and filesystem data upon execution.

North Korean Threat Actor Activities

North Korean cyber actors are utilizing Python-based obfuscated scripts to bypass traditional email gateways. These scripts are part of sophisticated spear-phishing emails aimed at government and private sector targets.

SideCopy APT Targets Indian Government

The SideCopy Advanced Persistent Threat (APT), attributed to Pakistani cyber actors, is using fake e-governance portals and open-source malware (like XenoRAT) to compromise Indian government systems.

Adapting to State-Sponsored Threats

Nation-state cyber operations are increasingly blending social engineering, open-source tools, and zero-day vulnerabilities. This requires advanced threat intelligence sharing and cross-border detection capabilities.

4. Emerging Malware Families: Evasion, Extortion and Persistence

Sapphire Werewolf and Amethyst Stealer

Sapphire Werewolf, a new malware family, is targeting energy sector companies with an advanced variant named Amethyst. The malware uses virtual machine evasion and encrypted string obfuscation to stay undetected.

HollowQuill: A Stealth Data Exfiltration Campaign

HollowQuill uses weaponized PDFs and multi-stage infection processes to exfiltrate data from global government agencies over extended dwell times.

Hellcat Ransomware and Double Extortion

Hellcat Ransomware is employing reflective code loading and double extortion tactics, particularly targeting public sector organizations.

The Rise of Cybercrime-as-a-Service

The evolution of modular malware toolkits and customizable payloads is enabling larger-scale cybercrime operations. Cybersecurity teams must remain vigilant against these emerging threats.

5. Vulnerabilities in April 2025: Exploited Flaws and Patching Imperatives

Top Exploited Vulnerabilities

Here are some critical vulnerabilities that security teams must prioritize:

CVE / Component Risk Summary Action

CVE-2025-30401 (WhatsApp for Windows)

Spoofing via MIME mismatch, allowing execution of disguised executables

Upgrade to v2.2450.6+

Chrome (23-year-old CSS Bug)

History snooping via :visited selector

Chrome v136 patch issued

Shopware Plugin 6

SQL injection flaw in version 2.0.10

Immediate patch required

Microsoft CLFS (CVE-2025-29824)

Exploited in ransomware attacks, enables privilege escalation

CISA mandates patch by April 29

VMware Tanzu Greenplum

47 critical flaws across components

Urgent updates needed

Despite proactive patch releases, attackers continue to exploit outdated systems or unmonitored updates, as seen in the persistent exploitation of patched Fortinet devices via symbolic links and SonicWall NetExtender VPN clients with elevation bugs.

6. Data Breaches: Legacy Systems and Supply Chain Vulnerabilities

Oracle Identity Manager Breach

Oracle confirmed a breach of its Identity Manager, exposing historical client credentials. The attackers demanded a ransom of $20M before leaking sensitive data.

WK Kellogg Co. Third-Party Breach

Kellogg Co. was breached via third-party file transfer software, exposing sensitive employee data, including Social Security Numbers (SSNs).

WooCommerce Data Leak

A hacker known as “Satanic” exploited third-party integration flaws in WooCommerce, leading to the leak of over 4.4 million records.

Security Risks in Legacy Systems and Supply Chains

These breaches underscore the critical need for robust third-party risk management, legacy system isolation, and proactive breach response planning.

7. Innovation in Cyber Defense Tools

AI-Powered Subdomain Discovery

Hadrian’s Subwiz, an AI-driven subdomain discovery tool, has outperformed traditional scanners by 10.4% in detection efficacy.

Post-Quantum Cryptography in OpenSSH 10.0

OpenSSH 10.0 and IPFire 2.29 now support post-quantum cryptography, marking significant progress in future-proofing network security protocols.

Law Enforcement Actions Against Cybercrime

Phase two of Operation Endgame led to the arrest of key operators behind the Smokeloader botnet, highlighting the growing focus on dismantling cybercrime infrastructure.

Strategic Recommendations for CISOs and Security Teams

Strategic Recommendations for CISOs and Security Teams

At Prophaze, our mission is to empower enterprises to meet these evolving challenges through real-time, AI-driven application and API security solutions. As we move deeper into 2025, visibility, automation, and resilience will define security leadership.

Facebook
Twitter
LinkedIn

Recent Blog Posts

Best End-to-End Encryption Tools for 2025
Top 6 WAF Alternatives for Cloud-Native Apps
Top F5 WAF Alternatives for 2025
Top 10 Bot Mitigation Tools for 2025
Top 5 WAAP Platforms Compared (2025 Guide)

WAF Solution