Threat intelligence summary based on real-time data from Baysec CTI and complementary open-source intelligence sources. Analysis accelerated by Baysec Intelligence AI.
Table of Contents
- BLUF (Bottom Line Up Front)
- Executive Summary
- Key Trends Observed
- Regional Focus: Poland
- Dark Web & Breach Intelligence
- Vulnerability Intelligence
- Campaign Analysis
- Malware Inventory
- Technical Appendix: Honeypot Intelligence
- Baysec Sensor Analysis
- SMB Bruteforce Campaign
- MSSQL Attack Patterns
- SSH Bruteforce Analysis
- NTLMv2-SSP Authentication Capture
- Egypt & Russia Deep Dive
- SMTP Honeypot Analysis
- React2Shell Exploitation
- RedTail Cryptominer & PHP CGI
- Cisco VPN (AnyConnect) Probing
- Rondo Botnet (Mirai Variant)
- IoT & Network Device Exploitation
- Environment & Secrets Harvesting
- MITRE ATT&CK Mapping
- Indicators of Compromise
- Recommendations
- Assessment Confidence Levels
- Conclusion
- References
BLUF (Bottom Line Up Front)
Supply-chain attacks via trusted platforms (GitHub, npm, PyPI) and critical vulnerabilities with active exploitation dominate December 2025. Patch immediately: PHP CGI (CVE-2024-4577, CISA KEV), React Server Components (CVE-2025-55182), n8n (CVE-2025-68613, 103K exposed). Poland: 4 alleged ransomware victims (LockBit5, SAFEPAY, Qilin, Anubis); 2.5M+ Polish credentials leaked. See Indicators of Compromise for blocklist.
Executive Summary
Supply-chain attacks, weaponized open-source repositories, and increasingly evasive malware dominate the current threat landscape. Threat actors abuse legitimate platforms (GitHub, npm, PyPI, Chrome Web Store) to reach developers, security researchers, and ordinary users.
Key Developments
- Fake exploit repositories distributing Webrat RAT via GitHub, targeting security researchers with lures for recent CVEs
- Malicious npm package (lotusbail) - 56K+ downloads, hijacks WhatsApp sessions via hardcoded pairing codes; attacker access persists after package removal
- Critical n8n vulnerability (CVE-2025-68613, CVSS 9.9) with 103K+ exposed instances and public PoC
- React2Shell exploitation active (CVE-2025-55182) - 223 attacks from 26 IPs with multiple C2 infrastructure
- PHP CGI mass exploitation (CVE-2024-4577, CVSS 9.8) - 1,276+ attempts deploying RedTail cryptominer
- Cisco VPN reconnaissance - coordinated probing of AnyConnect infrastructure from cloud IPs
- Rondo botnet active - Mirai variant exploiting Shellshock, PHPUnit RCE, and OpenWRT vulnerabilities
- IoT & network device exploitation (965+ events) - Hikvision cameras (CVE-2021-36260), GPON routers, D-Link devices, QNAP NAS (CVE-2024-21899), Realtek SDK routers (CVE-2021-35395), Docker registries exposed
- Environment file harvesting - 1,761 requests targeting application secrets and cloud credentials
- Steganography adoption by ClickFix and GhostPoster campaigns to evade detection
- macOS targeting increase - signed/notarized malware bypassing Gatekeeper (MacSync Stealer, DriverFixer0428)
- APT37 active targeting South Korean entities via Artemis campaign
Immediate Actions
- Patch critical vulnerabilities: n8n, Next.js/React Server Components, PHP CGI, Apache 2.4.49/2.4.50
- Audit dependencies: Remove malicious packages from npm (lotusbail) and PyPI (smtrlib)
- Remove browser extensions: GhostPoster Firefox extensions (17 total)
- Block C2 infrastructure: See Indicators of Compromise for full blocklist
Honeypot Intelligence
11 days of data (Dec 17-27) | 12.3M+ total events captured
Baysec sensors detected persistent exploitation across multiple protocols:
- SMB/Windows: 1.5M+ authentication events capturing NTLMv2 hashes
- SSH: 395K+ brute force attempts including Mirai botnet signatures and Solana validator targeting
- Web exploitation: React2Shell (223), PHP CGI (1,276), PHPUnit RCE (483), environment file harvesting (1,761)
- Infrastructure probing: Cisco VPN (73), SMTP open relay abuse (2,600) - attackers actively seek mail servers to use as phishing infrastructure, DNS reconnaissance (1,355)
Persistent threat sources: Russia (1.1M+ events) and Egypt (2.4M+ events) dominate attack traffic, with captured credentials revealing compromised corporate Active Directory environments.
Poland Assessment
Ransomware groups listed 4 organizations on leak sites: LockBit5 (mostykatowice.pl, Dec 26), SAFEPAY (polhun.pl, Dec 24-25), Qilin (PODOVIA, Dec 17), Anubis (Duhabex, Dec 5). Verified active threat actors: LockBit5, nova (RALord RaaS) with 10 victims.
Credential exposure: Baysec tracked 2.5M+ Polish credentials across December dumps and combolists; targeted combolists for Polish email providers appearing daily.
Dark Web Monitoring
Baysec CTI discovered 10 new ransomware leak sites in December: evolution, waissbein, osiris, black shrantac, ms13-089, minteye, dark shinigami, cry0, akirat, rustylocker.
Key Trends Observed
| Trend | Description | Examples / Indicators |
|---|---|---|
| Supply-chain attacks via package repositories | Threat actors upload malicious packages to PyPI and npm that steal credentials or download secondary payloads. Attackers use typosquatting, native extensions, or install-time execution. | smtrlib (PyPI), lotusbail (npm, 56k+ downloads), runtimeutils, ai-cypher, unizip |
| Malware-laced browser extensions | Extensions in Chrome Web Store and Firefox Add-ons posing as VPNs/productivity tools intercept traffic and harvest credentials. | Phantom Shuttle (Chrome), GhostPoster (Firefox, 17 extensions, 50k+ downloads) |
| GitHub as malware distribution | Repositories pretending to be exploits for high-profile CVEs lure security researchers. AI-generated descriptions and password-protected archives drop malware. | Webrat campaigns (CVE-2025-59295, CVE-2025-10294) |
| Steganography & evasion | Threat actors hide malicious code inside image files. macOS stealers shift to signed/notarized Swift applications. | ClickFix (LummaC2, Rhadamanthys), MacSync Stealer |
| Multi-platform credential stealers | Infostealers targeting macOS and Windows via fake updates, game cheats, or cracked software. | DriverFixer0428 (DPRK), Odyssey infostealer |
| Infostealer ecosystem at critical mass | Infostealer logs flood dark web markets daily. Threat actors trade fresh credentials within hours of theft. Lumma, Redline, Vidar, Raccoon dominate. Corporate VPN/SSO credentials fuel ransomware initial access. | Daily credential dumps on Russian Market, Genesis Market successors; Polish email providers heavily targeted |
| Ransomware activity | Baysec CTI tracks new ransomware families in intelligence feeds. | Abyss, Underground ransomware |
| Rapid CVE weaponization | Flood of GitHub Gist-hosted PoC exploits for recently disclosed vulnerabilities. | CVE-2025-68613 (n8n RCE, CVSS 9.9), CVE-2025-67443, CVE-2025-62094 |
| APT social-engineering | North Korean APT37 impersonates Korean TV writers to deliver malicious HWP documents. | Artemis campaign |
| Multi-stage operations | Campaigns use several stages (fake updates -> stego-loaded images -> manual execution) to evade detection. | ClickFix campaign |
| Developer targeting | Malicious packages and fake exploit repos aim at inexperienced security professionals. | Webrat’s pivot from game cheats to “exploit” repositories |
| Mass credential harvesting & phishing infrastructure | High-volume SSH brute force (366K+) and SMB authentication capture (1.4M+) targeting Windows/Linux infrastructure. SMTP honeypots detected 2,582 phishing distribution attempts - open relay abuse for financial and crypto scam campaigns. Egypt (2.4M+ events) and Russia (1.1M+ events) are persistent sources. | Baysec sensors: Russia: 1C:Enterprise credentials (USR1CV8); top SSH: root/123456, Mirai (345gs5662d34), Solana targeting (sol, solana, solv) |
Regional Focus: Poland
Intrusion-Sets Targeting Poland (December 2025)
Ransomware / Major Threat Groups
| Threat Actor | Type | December 2025 Status | Notes |
|---|---|---|---|
| LockBit5 | RaaS | VERIFIED (Dec 26, 2025) | Listed mostykatowice.pl on leak site |
| nova (formerly RALord) | RaaS | VERIFIED (10 victims Dec 2025) | Ransomware-as-a-Service; includes TELE-FONIKA Cable Americas (Dec 9) |
| SAFEPAY | Ransomware | VERIFIED (leak site listing) | Listed polhun.pl on Dec 24-25 |
| Qilin | RaaS | VERIFIED (leak site listing) | Listed PODOVIA on Dec 17 |
| Anubis | Ransomware | VERIFIED (leak site listing) | Listed Duhabex on Dec 5 |
Hacktivist / Defacement Groups
| Threat Actor | Type | December 2025 Status |
|---|---|---|
| Perun Svaroga | Hacktivist | VERIFIED and ACTIVE (Dec 7, 2025) |
| NoName057(16) | Pro-Russia DDoS | Active globally (10 attacks Dec 2025) - shifted focus away from Poland to France, Belgium, Denmark, Ukraine |
| Tunisian Maskers Cyber Force | Hacktivist | Targeting Poland (unverified Dec 2025) |
| RABBIT CYBER TEAM | Hacktivist | Targeting Poland (unverified Dec 2025) |
| D4RK 4RMY | Hacktivist | Previously active (last: Aug 2025) |
| SECT0R 16 | Hacktivist | Targeting Poland (unverified Dec 2025) |
| Z-ALLIANCE | Hacktivist | Previously active (last: Sep 2025) |
| UNIT 1948 | Hacktivist | Previously active (last: Aug 2025) |
| R3V0XAn0nymous | Hacktivist | Previously active (last: Jun 2025) |
| BlackH0le | Hacktivist | Targeting Poland (unverified Dec 2025) |
| Black Ember | Hacktivist | Targeting Poland (unverified Dec 2025) |
| Mr Root | Hacktivist | Targeting Poland (unverified Dec 2025) |
Data Brokers & Initial Access Sellers
| Actor | Focus | December 2025 Status |
|---|---|---|
| hitesh, Wieko, shamirrrrious, arsanelupin222 | General data brokerage | Active on forums |
| aisdata, BioHack, corptoday | Corporate/sector data | Active on forums |
| Bestcombo | Combolist vendor | Active on forums |
| telecoms | Telecom-specific data | Active on forums |
| KontrolaPracy | Polish-focused | Previously active (last: Jun 2025) |
| Cebulkowicz | Polish-focused | Previously active (last: May 2025) |
Alleged Ransomware Victims (Poland - December 2025)
DISCLAIMER: Ransomware groups listed the following organizations on their leak sites. Inclusion here indicates the threat actors claim to have compromised these organizations. This does not constitute confirmation of a successful breach - threat actors may have incorrectly listed organizations, victims may have paid ransom (data removed then re-added), or threat actors may have fabricated listings for reputation purposes.
| Organization | Threat Actor | Date Listed | Leak Site Status |
|---|---|---|---|
| mostykatowice.pl (construction) | LockBit5 | Dec 26, 2025 | Listed on leak site |
| polhun.pl (chemical manufacturer) | SAFEPAY | Dec 24-25, 2025 | Data allegedly posted |
| PODOVIA | Qilin | Dec 17, 2025 | Listed on leak site |
| Duhabex | Anubis | Dec 5, 2025 | Listed on leak site |
Analyst Note: Four distinct ransomware groups listed Polish organizations on their leak sites in December 2025. LockBit5 continues the LockBit franchise post-Operation Cronos; Qilin is a sophisticated RaaS operator with global reach; SAFEPAY and Anubis are mid-tier operators.
Dark Web & Breach Intelligence
December 2025 Ransomware Landscape
December 2025 Statistics: 781 confirmed victims across 58 ransomware groups
Most Active Ransomware Groups (December 2025)
| Rank | Group | Victims | Rank | Group | Victims |
|---|---|---|---|---|---|
| 1 | Qilin | 122 | 9 | INC Ransom | 25 |
| 2 | Kairos | 88 | 10 | Coinbase Cartel | 17 |
| 3 | Devman2 | 64 | 11 | Everest | 15 |
| 4 | Akira | 64 | 12 | Direwolf | 14 |
| 5 | Sinobi | 48 | 13 | Lynx | 13 |
| 6 | LockBit5 | 45 | 14 | Play | 12 |
| 7 | SafePay | 43 | 15 | WorldLeaks | 11 |
| 8 | DragonForce | 28 | 16 | The Gentlemen | 11 |
Critical Global Incidents
| Date | Victim | Group | Data | Impact |
|---|---|---|---|---|
| Dec 25 | Wall Street English | INC Ransom | 3.5 TB | Global language academy |
| Dec 25 | The Salvation Army | Interlock | Unknown | Humanitarian org |
| Dec 24 | NCR, Tri-State Metal, Prime Label | DragonForce | Unknown | Multi-victim |
| Dec 22-23 | Romanian Waters Authority | BitLocker | 1,000 systems | Critical infrastructure |
| Dec 22 | University of Phoenix | Clop | 3.5M individuals | Oracle EBS exploit |
| Dec 19 | Gladinet CentreStack | Clop | 59K servers | Mass exploitation |
New Ransomware Leak Sites (December 2025)
| Group | Status | Group | Status |
|---|---|---|---|
| evolution | ACTIVE | dark shinigami | ACTIVE |
| waissbein | ACTIVE | cry0 | ACTIVE |
| osiris | ACTIVE | akirat | ACTIVE |
| black shrantac | ACTIVE | rustylocker | ACTIVE |
| ms13-089 | ACTIVE | minteye | ACTIVE |
Ransomware Tool Leaks
| Date | Leak | Forum | Risk |
|---|---|---|---|
| Dec 22 | VanHelsing Source | gerki.pw | HIGH |
| Dec 22 | NoCry Builder | xforums.st | MEDIUM |
| Dec 23 | Ransomware Dev Course | niflheim.top | MEDIUM |
Breach Reports & Credential Leaks
Polish Credential Exposure
Baysec CTI tracked credential dumps targeting Polish organizations:
| Source | Volume | Date | Risk |
|---|---|---|---|
| Polish email providers | 2.5M+ combined | Dec 2025 | HIGH |
| Historical breach recirculation | Ongoing | Throughout Dec | MEDIUM |
Major Credential Leaks (Global)
| Source | Records | Type |
|---|---|---|
| wakanim.tv (France) | 6.7M | Anime platform accounts |
| ICMR + Hi-Tek India | Unknown | Healthcare data |
| Fresh Indian Passport + Selfie | Unknown | Identity documents |
| SerpaExperian Brazil | Unknown | Credit bureau data |
| LastPass 2022 Vaults | Ongoing (still active in 2025) | Crypto theft via decryption |
Vulnerability Intelligence
Vulnerabilities Used as Lures (Webrat Campaign)
Assessment: Threat actors leverage recently disclosed, high-profile vulnerabilities as social engineering lures. Threat actors use the following CVEs to create convincing fake exploit repositories.
Confidence: HIGH (based on Kaspersky analysis of 15 malicious repositories)
| CVE Identifier | CVSS | Affected Product | Vulnerability Description | Weaponization Context |
|---|---|---|---|---|
| CVE-2025-59295 | High | Windows MSHTML / Internet Explorer | Heap-based buffer overflow in the MSHTML rendering engine. Attackers can achieve remote code execution by sending specially crafted data over the network that triggers memory corruption. The vulnerability affects the legacy Trident engine still present in Windows for compatibility. | Webrat operators use this as lure in fake GitHub repositories. No legitimate exploit exists in malicious repos - archives contain Webrat dropper instead. |
| CVE-2025-10294 | Critical | OwnID Passwordless Login (WordPress Plugin) | Authentication bypass due to improper validation of the shared secret mechanism. Unauthenticated attackers can log in as arbitrary users, including administrators, without providing credentials. Affects WordPress sites using this popular passwordless authentication plugin. | High interest from WordPress administrators makes this an effective lure. Fake PoCs target security researchers investigating WordPress vulnerabilities. |
| CVE-2025-59230 | High | Windows Remote Access Connection Manager (RasMan) | Elevation-of-privilege vulnerability. A locally authenticated attacker can exploit improper access control in the RasMan service to escalate privileges from standard user to SYSTEM level on affected Windows installations. | Local privilege escalation vulnerabilities attract red teamers and pentesters - ideal target demographic for Webrat operators. |
Analyst Note: The selection of these CVEs demonstrates operational sophistication. All three are recent, have media coverage, and affect widely-deployed products. The Webrat operators specifically chose vulnerabilities that would attract security professionals rather than general users.
Actively Weaponized Vulnerabilities
Assessment: The following vulnerabilities have confirmed public exploits and threat actors actively scan or exploit them in the wild.
Confidence: HIGH (NVD data, Censys scanning data, PoC repositories confirm active exploitation)
| CVE Identifier | CVSS | Affected Product | Vulnerability Description | Exploitation Status | Exposure |
|---|---|---|---|---|---|
| CVE-2024-4577 | 9.8 | PHP CGI (Windows) | Argument Injection leading to RCE. PHP CGI on Windows fails to properly sanitize certain character sequences, allowing attackers to inject arguments and execute arbitrary code. Affects PHP before 8.1.29, 8.2.20, 8.3.8 on Windows with specific locale configurations. | ACTIVELY EXPLOITED. CISA lists in KEV. RedTail cryptominer conducts mass exploitation. EPSS: 94.37%. | Windows PHP CGI deployments |
| CVE-2025-68613 | 9.9 | n8n Workflow Automation (versions 0.211.0 to <1.120.4) | Remote Code Execution via Expression Injection. The n8n platform allows JavaScript expressions inside workflows wrapped in {{ }} syntax, evaluated server-side using Node.js. Insufficient isolation of the expression evaluation context allows authenticated attackers to escape the sandbox and execute arbitrary code with the privileges of the n8n process. Exploitation requires authentication but published PoCs lower the technical barrier significantly. | Public PoC available. Baysec sensors detect active scanning. No confirmed ITW exploitation yet. | 103,476 vulnerable instances (Censys, Dec 22 2025). Majority in US, Germany, France, Brazil, Singapore. |
| CVE-2025-67443 | Medium | Schlix CMS | Cross-Site Scripting (XSS). Insufficient input sanitization allows injection of malicious scripts into web pages viewed by other users. Can be leveraged for session hijacking, credential theft, or further exploitation. | GitHub Gist PoC available. | Unknown |
| CVE-2025-62094 | High | WordPress Plugin (unspecified) | Unauthorized access/code execution in WordPress plugin. Specific technical details pending full disclosure. | GitHub Gist PoC available. | Potentially millions of WordPress installations |
| CVE-2025-55182 | Critical | React Server Components | Remote Code Execution. Improper handling of serialized data in React Server Components implementation allows attackers to execute arbitrary code on the server. Affects applications using vulnerable RSC implementations. | ACTIVELY EXPLOITED. Baysec captured 223 attacks with confirmed C2. | Applications using React Server Components / Next.js |
| CVE-2025-15007 | High | Tenda WH450 Router | Buffer overflow in router firmware. Exploitation allows remote code execution and complete device compromise. Attackers can gain persistent access to network infrastructure. | Trickest-hosted exploit available. | Consumer and SOHO networks |
| CVE-2019-16278 | Critical | Nostromo nhttpd Web Server | Directory traversal and RCE. Path traversal vulnerability allows unauthenticated attackers to execute arbitrary commands on the underlying system. Well-documented and reliable exploitation. | Metasploit module available. Widely exploited. | Legacy web servers |
| CVE-2021-41773 | 9.8 | Apache HTTP Server 2.4.49/2.4.50 | Path Traversal leading to RCE. Improper path normalization allows attackers to map URLs to files outside the expected document root. With mod_cgi enabled, leads to remote code execution. | ACTIVELY EXPLOITED. Baysec captured 402 attempts. | Apache 2.4.49/2.4.50 servers |
| CVE-2017-9841 | 9.8 | PHPUnit | Remote Code Execution via eval-stdin.php. Unprotected eval-stdin.php endpoint in PHPUnit allows unauthenticated attackers to execute arbitrary PHP code. Common in development environments accidentally exposed to production. | ACTIVELY EXPLOITED. Baysec captured 483 attempts. | PHP applications with exposed PHPUnit |
| CVE-2021-36260 | 9.8 | Hikvision IP Cameras | Command Injection via /SDK/webLanguage. Unauthenticated attackers can inject commands via crafted requests to the web management interface. Leads to full device compromise. | ACTIVELY EXPLOITED. Baysec captured 103 attempts. | Hikvision IP cameras/NVRs |
| CVE-2020-3452 | 7.5 | Cisco ASA/FTD (AnyConnect) | Path Traversal. Improper input validation in the web services interface allows unauthenticated attackers to read sensitive files from the device. Can expose configuration and credentials. | ACTIVELY EXPLOITED. Baysec captured 73 probing attempts. | Cisco ASA/FTD with AnyConnect |
| CVE-2014-6271 | 9.8 | GNU Bash (Shellshock) | Remote Code Execution via environment variables. Bash incorrectly processes trailing strings after function definitions, allowing attackers to execute arbitrary commands. Exploited via CGI, SSH, DHCP. | ACTIVELY EXPLOITED. Rondo botnet uses in mass scanning (441+ events). | Linux/Unix systems with exposed Bash |
| CVE-2023-1389 | 8.8 | TP-Link Archer (OpenWRT LuCI) | Command Injection via locale parameter. Unauthenticated attackers can inject commands via the country parameter in the web interface. Leads to full router compromise. | ACTIVELY EXPLOITED. Rondo botnet uses in mass scanning. | TP-Link routers, OpenWRT devices |
| CVE-2025-31324 | 10.0 | SAP NetWeaver | Unauthenticated File Upload. The metadatauploader endpoint allows unauthenticated attackers to upload arbitrary files, leading to remote code execution. | ACTIVELY EXPLOITED. Baysec captured 24 attempts. | SAP NetWeaver deployments |
| CVE-2024-36401 | 9.8 | GeoServer | OGC Filter SQL Injection leading to RCE. Improper evaluation of property names as XPath expressions allows unauthenticated attackers to execute arbitrary code. | ACTIVELY EXPLOITED. Baysec captured 18 attempts. | GeoServer instances |
Priority Assessment:
- CRITICAL - CVE-2024-4577: Patch immediately. CISA KEV, EPSS 94.37%, mass exploitation by RedTail. Block
178.16.55.224. - CRITICAL - CVE-2025-55182: Patch immediately. Threat actors actively exploit with confirmed C2 infrastructure. Block
94.154.35.154and193.142.147.209. - CRITICAL - CVE-2025-68613: Patch immediately. 103k+ exposed instances with public PoC represents significant risk.
- MEDIUM - Other CVEs: Monitor for exploitation; patch during normal maintenance windows.
Campaign Analysis
Campaign: Webrat RAT via Fake GitHub Exploits
Attribution: Unknown criminal actor (likely financially motivated)
Confidence: HIGH
First Observed: May 2025 (game cheats); September 2025 (pivot to fake exploits)
Status: ACTIVE (GitHub removed repositories, but operators will likely create new ones)
Summary: Kaspersky researchers discovered 15 malicious GitHub repositories distributing Webrat malware disguised as PoC exploits for the high-profile vulnerabilities documented above.
Targeting: Originally gamers (Rust, Counter-Strike, Roblox cheats). Since September 2025, operators pivoted to security researchers and students - likely to access more valuable credentials and potentially compromise security tooling.
Technical Execution:
Phase 1: Initial Access
- Victim discovers GitHub repository claiming PoC for CVE-2025-XXXXX
- Repository contains AI-generated README with convincing technical details
- Operators offer password-protected archive for download
Phase 2: Execution
- Victim extracts and executes
rasmanesc.exe - Dropper attempts privilege escalation
- Dropper disables Windows Defender via registry/policy manipulation
- Dropper downloads Webrat payload from hardcoded C2 URL
Phase 3: Actions on Objectives
- Exfiltrates cryptocurrency wallets
- Steals Steam/Discord/Telegram credentials
- Enables webcam surveillance
- Captures screenshots
- Logs keystrokes for additional credential harvesting
Indicators:
- Password-protected archives in GitHub repositories
- AI-generated README content (generic phrasing, formatting inconsistencies)
- File:
rasmanesc.exe(dropper) - Targeting recently disclosed CVEs with media coverage
Campaign: ClickFix Steganography
Attribution: Unknown criminal actor
Confidence: HIGH
First Observed: October 2025
Status: ACTIVE (infrastructure partially disrupted by Operation Endgame, November 2025)
Summary: Huntress documented a multi-stage attack combining social engineering with steganography. Security researchers track the campaign since October 2025. Attackers embed malicious payloads in images and trick users into executing PowerShell commands.
Technical Execution:
Phase 1: Social Engineering (ClickFix)
- Victim encounters fake Windows Update full-screen interface
- Interface instructs user to press Win+R
- Malware auto-pastes malicious command from clipboard
- User executes MSHTA payload
Phase 2: Payload Retrieval
- MSHTA contacts C2 at
141.98.80.175 - MSHTA downloads and executes PowerShell script
- PowerShell retrieves PNG images containing hidden payloads
Phase 3: Steganography Extraction
- Custom algorithm targets red channel of BGRA pixel data
- Extracts shellcode by XORing calculated values with red channel bytes
- XOR key:
114 - Loader injects decrypted shellcode into memory
Phase 4: Execution
- Donut-packed payload executes entirely in memory
- Malware creates no disk artifacts
- ctrampoline technique: 10,000 empty function calls to evade analysis
- Final payload: LummaC2 or Rhadamanthys infostealer
Evasion Assessment: SOPHISTICATED
- Memory-only execution defeats file-based detection
- Steganography bypasses network content inspection
- ctrampoline technique complicates dynamic analysis
- Legitimate-appearing image files avoid suspicion
Infrastructure:
- C2:
141.98.80.175(MSHTA stages, PowerShell loaders) - Payload delivery: PNG images on attacker-controlled servers
Payloads: LummaC2, Rhadamanthys
Campaign: GhostPoster Firefox Extensions
Attribution: Unknown criminal actor (financially motivated - ad fraud, affiliate hijacking)
Confidence: HIGH
First Observed: September 2025
Status: MITIGATED (Mozilla removed extensions)
Summary: Koi Security uncovered 17 compromised Firefox extensions with 50,000+ combined downloads. Attackers use steganography to hide malicious JavaScript in extension icons.
Kill Chain Analysis:
| Phase | MITRE ATT&CK | Description |
|---|---|---|
| Delivery | T1189 Drive-by Compromise | User installs extension from Firefox Add-ons store |
| Installation | T1176 Browser Extensions | Malicious extension persists in browser |
| Defense Evasion | T1027.003 Steganography | Payload hidden in PNG icon after === marker |
| Defense Evasion | T1497 Sandbox Evasion | 48-hour dormancy, 10% activation probability |
| Collection | T1185 Browser Session Hijacking | Affiliate link hijacking, cookie manipulation |
| Impact | T1565 Data Manipulation | Security header stripping (CSP, X-Frame-Options), ad fraud |
Affected Extensions:
| Extension Name | Downloads | Status |
|---|---|---|
| Free VPN Forever | 16,000+ | Removed |
| screenshot-saved-easy | Unknown | Removed |
| weather-best-forecast | Unknown | Removed |
| google-translate-pro-extension | Unknown | Removed |
| dark-reader-for-ff | Unknown | Removed |
Remediation: Mozilla removed all extensions and updated automated detection systems.
Campaign: lotusbail npm Package (WhatsApp Stealer)
Attribution: Unknown criminal actor
Confidence: HIGH
First Observed: May 2025
Status: ACTIVE (npm removed package, but attacker access persists for infected users)
Summary: Koi Security discovered a malicious npm package with 56,000+ downloads. The package provides a functional WhatsApp API while simultaneously exfiltrating credentials to attacker infrastructure.
Technical Execution:
Phase 1: Developer Integration
- Developer installs
lotusbailfor WhatsApp functionality - Attacker based package on legitimate Baileys library
- Package provides real, working WhatsApp API functions
Phase 2: Credential Harvesting
- Library hijacks 8-character device pairing code mechanism
- Hardcoded pairing code adds attacker device as trusted endpoint
- Library intercepts all messages in real-time
- Library harvests contacts
- Library steals credentials and AES-encrypts before exfiltration
Phase 3: Persistence
- CRITICAL: Attacker’s linked device remains connected even after package removal
Anti-Analysis Capabilities:
- 27 infinite loop traps detect debugging tools
- Unicode variable manipulation obfuscation
- LZString compression
- Base-91 encoding
- AES encryption of exfiltrated data
CRITICAL REMEDIATION NOTE: Uninstalling the package does NOT remove attacker access. Victims must manually unlink ALL devices from WhatsApp settings.
Campaign: MacSync Stealer Evolution
Attribution: Criminal actor “Mentalpositive”
Confidence: HIGH
First Observed: April 2025 (as Mac.C); July 2025 (rebrand to MacSync)
Status: MITIGATED (Apple revoked certificate)
Summary: This macOS infostealer evolved to use signed and notarized Swift applications, bypassing Gatekeeper and XProtect. Jamf Threat Labs analyzed the evolution and documented new evasion techniques.
Technical Execution:
Phase 1: Distribution
- Victim downloads
zk-call-messenger-installer-3.9.2-lts.dmg - Source:
zkcall.net/download - Attacker inflates DMG to 25.5MB with decoy PDFs
Phase 2: Gatekeeper Bypass
- Legitimately signed and notarized Swift application
- Initial app contains NO malware (passes all checks)
- Gatekeeper and XProtect approve execution
Phase 3: Payload Retrieval
- App performs internet connectivity check (sandbox evasion)
- App retrieves encoded script from remote server
- App decodes and executes script
Phase 4: Credential Theft
- Exfiltrates iCloud Keychain credentials
- Extracts browser passwords
- Collects system metadata
- Steals cryptocurrency wallet data
- Go-based agent provides full C2 capability
Phase 5: Cleanup
- Wipes scripts after execution
- Removes temp files
- Memory-only execution minimizes forensic artifacts
Remediation Status: Apple revoked the developer certificate after Jamf’s report.
Campaign: APT37 Artemis
Attribution: APT37 / Reaper / ScarCruft (North Korea, state-sponsored)
Confidence: HIGH
First Observed: October 2023 (C2 infrastructure); December 2025 (current campaign)
Status: ACTIVE
Summary: North Korean threat group APT37 targets South Korean academics, journalists, and policy experts via social engineering. Genians Security Center analyzed the campaign and attributed it to DPRK state actors.
Targeting: Individuals with expertise in:
- North Korean affairs
- Human rights issues
- Korean peninsula policy
Technical Execution:
Phase 1: Social Engineering
- Spearphishing email from “Korean TV program writer”
- Proposes interview about North Korean affairs
- Attachment: Malicious HWP (Hangul Word Processor) document
Phase 2: Initial Compromise
- Victim opens HWP document and enables content
- Malicious OLE object executes
- Malware deploys files to temporary folder
Phase 3: DLL Side-Loading
- Executes legitimate Microsoft Sysinternals utilities
- Places malicious
version.dllin same directory - Windows loads attacker DLL instead of legitimate library
- Executables:
vhelp.exe,mhelp.exe
Phase 4: Payload Decryption
- Multi-stage XOR decryption
- Loader activates final shellcode
Phase 5: RoKRAT Deployment
- Data-stealing payload with full remote access capability
C2 Infrastructure:
| Platform | Region | Account | Registration |
|---|---|---|---|
| Yandex Cloud | Russia | tanessha.samuel | October 2023 |
| pCloud | Switzerland | tanessha.samuel | October 2023 |
Analyst Note: Geographic separation of C2 across Russia and Switzerland demonstrates deliberate tradecraft to complicate attribution and evade geographic blocking.
Campaign: DriverFixer0428 (Contagious Interview)
Attribution: Contagious Interview / DEV#POPPER (North Korea, state-sponsored)
Confidence: HIGH
First Observed: 2023 (campaign); December 2025 (current sample)
Status: PARTIALLY DISRUPTED (FBI seized BlockNovas domain, April 2025)
Summary: Security researchers attribute macOS credential stealer to North Korean Contagious Interview campaign.
Targeting: Software developers and cryptocurrency professionals seeking employment.
Technical Execution:
Phase 1: Social Engineering
- Victim contacted for fake job interview
- Request to install “VCam” or “CameraAccess” for video call
- Malware delivered as required interview software
Phase 2: Credential Harvesting
OverlayWindowControllercreates fullscreen overlay- Overlay prevents interaction until credentials entered
- Impersonates macOS system prompts
- Impersonates Chrome permission dialogs
Phase 3: Sandbox Evasion
sysctlbynameAPI checks for VMIOKitchecks for virtualizationNSScreenchecks for analysis environment- Static analysis: clearly malicious; Dynamic sandbox score: 4/10 “likely benign”
Phase 4: Exfiltration
- Credentials sent to attacker via Dropbox API
Law Enforcement Action: FBI seized BlockNovas domain (April 2025).
Malware Inventory
| Malware | Type | Platform | Attribution | Notes |
|---|---|---|---|---|
| Webrat | Backdoor/RAT | Windows | Criminal | Fake GitHub exploits; crypto/credential theft; screen recording; keylogging |
| MacSync Stealer | Infostealer | macOS | Criminal (Mentalpositive) | Signed/notarized Swift apps; Go-based C2 agent |
| DriverFixer0428 | Credential Stealer | macOS | DPRK (Contagious Interview) | Fullscreen overlay; Dropbox exfil |
| Odyssey | Infostealer | Windows | Criminal | Credential theft |
| RUSTRIC / PYTRIC | Malware families | Cross-platform | Unknown | Extensive ATT&CK technique coverage |
| ShellcodeRunner | Dropper | Windows | Unknown | Multi-stage attack component |
| Abyss / Underground | Ransomware | Windows | Criminal | Newly tracked families |
| LummaC2 | Infostealer | Windows | Criminal | ClickFix/steganography delivery |
| Rhadamanthys | Infostealer | Windows | Criminal | ClickFix/steganography delivery |
| RoKRAT | RAT | Windows | DPRK (APT37) | Artemis campaign payload |
Technical Appendix: Honeypot Intelligence
Baysec Sensor Analysis (December 2025)
Data Source: Baysec Sensor cluster
Period: December 17-27, 2025 (11 days)
Total Events: 12.3M+ events
Risk Level: HIGH - Sustained
Top Threat Actors by Attack Volume
| Rank | Source IP | Country | Organization | Events | Primary Target | Comment |
|---|---|---|---|---|---|---|
| 1 | 159.195.63.33 | 🇩🇰 Denmark | DXC Technology | 364,336 | SMB/RDP | CVE-2020-0796 (SMBGhost) |
| 2 | 189.124.135.33 | 🇧🇷 Brazil | Alares Cabo | 312,299 | MSSQL (1433) | SQL Server 2022 targeting |
| 3 | 34.29.105.211 | 🇺🇸 USA | Google Cloud | 252,507 | Multi-service | CVE-2023-44487 (HTTP/2 Rapid Reset) + 11 others |
| 4 | 113.160.186.2 | 🇻🇳 Vietnam | VNPT | 229,560 | SMB | Compromised hospital |
| 5 | 41.35.41.90 | 🇪🇬 Egypt | TE Data | 186,396 | SMB | - |
| 6 | 23.30.86.197 | 🇺🇸 USA | Comcast (Houston) | 166,823 | Mixed | Residential IP |
| 7 | 191.6.143.142 | 🇧🇷 Brazil | Claro | 146,204 | SMB | - |
| 8 | 197.43.35.230 | 🇪🇬 Egypt | TE Data | 142,845 | Mixed | - |
| 9 | 85.175.217.90 | 🇷🇺 Russia | Rostelecom (Krasnodar) | 129,360 | Mixed | - |
Primary Threat: 159.195.63.33 (DXC Technology, Denmark) is the top attacking IP with 364K+ events targeting SMB/RDP services, exploiting CVE-2020-0796 (SMBGhost).
SMB Bruteforce Campaign Analysis (Port 445)
Attack Volume: PRIMARY ATTACK VECTOR
| Rank | Attacker IP | Country | SMB Events | Technique |
|---|---|---|---|---|
| 1 | 189.124.135.33 | 🇧🇷 Brazil | 138,692 | NTLM brute force |
| 2 | 113.160.186.2 | 🇻🇳 Vietnam | 103,889 | SMB1/SMB2 negotiation |
| 3 | 41.35.41.90 | 🇪🇬 Egypt | 82,773 | IPC$ enumeration |
| 4 | 191.6.143.142 | 🇧🇷 Brazil | 64,917 | Credential stuffing |
SMB Attack Techniques Baysec Observed:
- SMB1/SMB2 protocol negotiation (downgrade attacks)
- NTLM authentication brute force
- IPC$ share enumeration (
\\192.168.56.20\IPC$,\\192.168.1.1\IPC$) - STATUS_ACCESS_DENIED (0xc0000022) response harvesting
- STATUS_MORE_PROCESSING_REQUIRED (0xc0000016) exploitation
Legacy Systems Targeted: Honeypot responses show attackers probing for Windows Server 2003 3790 Service Pack 2 - indicating searches for EOL/unpatched systems.
MSSQL Attack Patterns (Port 1433)
Concentrated Attack Source: IP range 185.242.246.* (coordinated scanning/exploitation)
Attack Techniques:
- Port 1433 scanning and connection attempts
- Database credential brute forcing (sa, admin accounts)
- TDS protocol exploitation attempts
- SQL Server version fingerprinting
Primary Attacker: 189.124.135.33 (Brazil) running Microsoft SQL Server 2022 GDR (16.0.1121.0) - attackers likely use this compromised database server for attacks.
SSH Bruteforce Analysis (Port 22)
Data Source: Baysec SSH honeypot
Total Events: 366,000+ authentication attempts (December 2025)
Successful Logins (honeypot): 1,401+ events
MITRE ATT&CK: T1110.001 - Brute Force: Password Guessing, T1110.003 - Password Spraying
Top 10 Usernames Attempted:
| Rank | Username | Count | % of Total | Notes |
|---|---|---|---|---|
| 1 | root | 34,327 | 9.4% | Linux/Unix superuser |
| 2 | sol | 3,569 | 1.0% | Cryptocurrency (Solana) |
| 3 | admin | 3,543 | 1.0% | Generic admin |
| 4 | solana | 2,156 | 0.6% | Cryptocurrency |
| 5 | user | 2,013 | 0.5% | Generic user |
| 6 | test | 1,884 | 0.5% | Test accounts |
| 7 | solv | 1,742 | 0.5% | Solana validator |
| 8 | ubuntu | 1,655 | 0.5% | Ubuntu default |
| 9 | oracle | 1,600 | 0.4% | Database service |
| 10 | postgres | 1,322 | 0.4% | PostgreSQL |
Top 10 Passwords Attempted:
| Rank | Password | Count | % of Total | Pattern |
|---|---|---|---|---|
| 1 | 123456 | 375 | 5.11% | Sequential |
| 2 | password | 279 | 3.80% | Dictionary |
| 3 | 12345 | 254 | 3.46% | Sequential |
| 4 | 123 | 174 | 2.37% | Sequential |
| 5 | 12345678 | 166 | 2.26% | Sequential |
| 6 | 345gs5662d34 | 162 | 2.21% | Mirai botnet |
| 7 | 123456789 | 158 | 2.15% | Sequential |
| 8 | 3245gs5662d34 | 157 | 2.14% | Mirai botnet |
| 9 | 123123 | 120 | 1.63% | Repeating |
| 10 | 1234 | 117 | 1.59% | Sequential |
Successful Credential Pairs (Honeypot Captures):
| Username | Password | Source IP | Country |
|---|---|---|---|
| root | 1234 | 167.71.10.33 | 🇳🇱 Netherlands |
| support | support2009 | 122.187.227.145 | 🇮🇳 India |
| root | 123456 | 121.166.191.164 | 🇰🇷 South Korea |
| demo | test | 211.24.41.44 | 🇲🇾 Malaysia |
| root | ashok123 | 202.8.127.134 | 🇮🇳 India |
| root | changeme | 196.61.37.18 | 🇬🇭 Ghana |
| user | user2019 | 31.173.0.26 | 🇷🇺 Russia |
Analyst Notes:
- Cryptocurrency targeting:
sol,solana,solv(validator) usernames show heavy targeting of Solana infrastructure - attackers targeting crypto validator nodes for fund theft - Service accounts:
postgres,oracleshow database infrastructure targeting - Mirai signatures:
345gs5662d34username/password in password attempts indicates active Mirai botnet scanning for IoT devices
SMB Attack Analysis - NTLMv2-SSP Authentication Capture
Data Source: Baysec Windows honeypot
Total Authentication Attempts: Baysec honeypot captured 1,447,000+ SMB authentication events (December 2025)
Intelligence: Attackers attempting SMB authentication send NTLMv2-SSP credentials to the honeypot, revealing their usernames, domains, and crackable password hashes.
MITRE ATT&CK: T1021.002 - SMB/Windows Admin Shares
Top 10 Usernames in NTLM Captures:
| Username | Count | Origin | Risk Level |
|---|---|---|---|
Administrator | 97,529 | Windows default | CRITICAL |
\\ (null/blank) | 79,211 | Anonymous auth | HIGH |
admin | 61,455 | Common admin | HIGH |
User | 52,094 | Generic | MEDIUM |
for | 50,126 | Malformed request | MEDIUM |
accounts | 49,870 | Targeted enum | HIGH |
DefaultAccount | 16,629 | Windows 10+ | MEDIUM |
Cyrillic ѓ®бвм Ђ¤¬ЁЁбва в®а | 15,400+ | 🇷🇺 Russian (corrupted encoding) | HIGH |
WDAGUtilityAccount | 12,818 | Windows Defender AG | LOW |
hp | 10,476 | HP device default | MEDIUM |
Top 10 Attacking IPs for NTLM Capture:
| IP Address | Hash Count | Country | ASN/ISP |
|---|---|---|---|
189.124.135.33 | 71,594 | 🇧🇷 Brazil | Telefônica Brasil |
113.160.186.2 | 57,198 | 🇻🇳 Vietnam | VNPT (Hospital) |
41.35.41.90 | 41,033 | 🇪🇬 Egypt | TE Data |
85.175.217.90 | 34,368 | 🇷🇺 Russia | Beeline |
168.149.46.165 | 34,285 | 🇺🇸 USA | Microsoft |
197.43.35.230 | 31,001 | 🇪🇬 Egypt | TE Data |
191.6.143.142 | 30,822 | 🇧🇷 Brazil | Claro S.A. |
213.177.102.89 | 27,830 | 🇷🇺 Russia | JSC Rostelecom |
41.33.252.147 | 26,327 | 🇪🇬 Egypt | TE Data |
194.158.193.22 | 25,575 | 🇧🇾 Belarus | Beltelecom |
Sample Captured Hash (attacker-sourced):
| |
Intelligence Value: Windows honeypot captures NTLM hashes that attackers inadvertently send when attempting to authenticate. These are attacker credentials - revealing usernames, domain configurations, and potentially crackable passwords captured from threat actor infrastructure.
Persistent Threat Sources: Egypt & Russia Deep Dive
Assessment: IPs from Egypt and Russia represent persistent, high-volume threat sources across multiple attack vectors. Both show sustained activity throughout December 2025 with distinct operational patterns.
🇪🇬 Egyptian IPs Threat Assessment
| Metric | Value |
|---|---|
| Total Attack Volume | 2,437,000+ events |
| Primary Protocol | SMB (TCP/445) |
| Secondary | NTLM credential harvesting |
| SSH Activity | Minimal |
| Primary ISP | TE Data (Telecom Egypt) |
Top Egyptian Attacking IPs:
| IP Address | Events | Attack Type | ASN |
|---|---|---|---|
41.35.41.90 | 186,396 | SMB brute force, NTLM capture | TE-AS |
197.43.35.230 | 142,845 | Mixed protocol | TE-AS |
41.33.252.147 | 11,654 | NTLM hash harvesting | TE-AS |
Top Egyptian Usernames Captured (SMB/NTLM):
| Username | Count |
|---|---|
Administrator | 48,019 |
moh | 2,051 |
Isaac | 1,924 |
Fady | 1,924 |
managsaied | 1,235 |
alaa | 1,207 |
mohamed | 983 |
Ahmed | 816 |
norhan | 816 |
salma | 810 |
Hassan | 714 |
Khaled | 713 |
Operational Pattern: Egyptian IPs focus exclusively on Windows/SMB environments. No SSH activity observed. Targeting suggests Windows Active Directory credential harvesting for lateral movement or resale.
🇷🇺 Russian IPs Threat Assessment
| Metric | Value |
|---|---|
| Total Attack Volume | 1,103,000+ events |
| Primary Protocols | SSH, SMB, NTLM, General TCP |
| Attack Style | Multi-vector, persistent |
| Primary ISPs | Rostelecom, Selectel, Beeline |
Top Russian Attacking IPs:
| IP Address | Events | Attack Type | ASN |
|---|---|---|---|
213.177.102.89 | 20,220 | SMB, SSH, Mixed | JSC Rostelecom |
185.22.24.175 | 14,666 | SMB, SSH, Mixed | Selectel |
82.204.234.110 | 12,502 | SMB, SSH, NTLM | PJSC Rostelecom |
91.135.146.163 | 10,116 | SMB, SSH, Mixed | JSC RTComm.RU |
87.76.12.43 | 6,638 | SMB, SSH, Mixed | JSC Rostelecom |
92.38.31.29 | 6,501 | SMB, SSH, Mixed | Selectel |
94.141.60.92 | 5,017 | SMB, SSH, Mixed | JSC Rostelecom |
95.70.94.177 | 4,988 | SMB, SSH, Mixed | JSC Rostelecom |
Top Russian Usernames Captured (SMB/NTLM):
| Username | Count | Analysis |
|---|---|---|
Nasyy | 1,849 | Russian nickname |
progadmin | 1,848 | “Program Admin” - service account |
Admin | 1,617 | Generic admin |
Sergey | 462 | Russian name (Сергей) |
USR1CV8 | 462 | 1C:Enterprise user - Russian ERP |
marina | 462 | Russian name (Марина) |
operatorent | 462 | “Enterprise Operator” |
aleksey | 461 | Russian name (Алексей) |
formozasvc | 461 | Service account |
artem | 460 | Russian name (Артём) |
yula | 460 | Russian name (Юля) |
igor | 459 | Russian name (Игорь) |
Cyrillic Username Analysis:
| Raw Capture | Decoded (Windows-1251) | Count | Meaning |
|---|---|---|---|
ѓ®бвм | Гость | 15,441 | Guest |
Ђ¤¬ЁЁбва в®а | Администратор | 15,182 | Administrator |
ЃгеЈ «вҐаЁп | Бухгалтерия | 1,102 | Accounting Dept |
的使用者帳戶 | (Chinese) | 2,494 | User Account |
Operational Pattern: Russian IPs demonstrate multi-protocol capabilities - attacking SSH, SMB, and web services simultaneously. The scale (20,000+ events from single IPs) and persistence suggest organized campaigns rather than opportunistic scanning.
Key Finding: Russian and Egyptian IPs are major persistent threat sources. Russian IPs show sophisticated multi-vector capabilities while Egyptian ones focuse exclusively on Windows credential harvesting. Both warrant enhanced monitoring and blocking.
Targeted Services Summary
| Port | Service | Activity Level | Attack Type |
|---|---|---|---|
| 445 | SMB | CRITICAL | NTLM brute force, share enum |
| 1433 | MSSQL | VERY HIGH | Credential brute force |
| 3389 | RDP | HIGH | Authentication attacks |
| 25 | SMTP | HIGH | Open relay abuse, credential brute force |
| 22 | SSH | HIGH | Credential stuffing |
| 5985/5986 | WinRM | MEDIUM | Remote execution |
| 389 | LDAP | MEDIUM | Directory enumeration |
| 53 | DNS | MEDIUM | Zone enumeration, tunneling |
SMTP Honeypot Analysis (Port 25)
Data Source: Baysec SMTP honeypot
Period: December 2025
Total Events: 2,582
Risk Level: HIGH - Threat actors actively attempt to abuse SMTP for phishing distribution
Baysec SMTP honeypot captured active attempts to abuse open mail relays for phishing and spam distribution. Attackers probe for misconfigured mail servers to distribute malicious emails without attribution.
Top SMTP Attackers
| Source IP | Country | Events | Activity |
|---|---|---|---|
103.39.64.54 | 🇮🇳 India | 1,095 | AUTH LOGIN brute force |
45.144.212.19 | Unknown | 1,038 | AUTH LOGIN brute force |
45.144.212.238 | Unknown | 66 | AUTH LOGIN brute force |
78.153.140.207 | 🇷🇺 Russia | 49 | Phishing distribution attempt |
87.251.78.220 | 🇷🇺 Russia | 17 | Open relay testing, phishing |
Observed Attack Patterns
1. Credential Brute Force (AUTH LOGIN)
| |
Primary attackers: 103.39.64.54, 45.144.212.19 - high-volume automated credential stuffing against SMTP authentication.
2. Phishing Distribution Attempts
| Attacker IP | From Address | Target | Campaign Type |
|---|---|---|---|
87.251.78.220 | accounts@globalfinancesolutions.com | buddum119@hotmail.com | Financial phishing |
77.83.39.209 | dpr@priv8shop.com | davebruce06@outlook.com | Unknown |
102.211.42.66 | office@cryptoyieldx.com | cryptoyieldx@protonmail.com | Cryptocurrency scam |
34.79.203.164 | info@pcsprojectmanager.com | info@msthardware.ca | Business impersonation |
3. Open Relay Testing
Multiple IPs from 158.94.x.x, 178.16.x.x, 185.169.x.x (Railnet LLC infrastructure) testing relay capabilities with spameri@tiscali.it sender - coordinated open relay reconnaissance.
4. Security Scanner Traffic
Legitimate scanner traffic excluded: Censys, Palo Alto Cortex Xpanse, cypex.ai, Reposify - reconnaissance traffic, not malicious.
Phishing Infrastructure Indicators
| Indicator | Type | Context |
|---|---|---|
accounts@globalfinancesolutions.com | Sender | Financial phishing |
office@cryptoyieldx.com | Sender | Crypto scam |
dpr@priv8shop.com | Sender | Unknown campaign |
87.251.78.220 | IP | Russian phishing infrastructure |
102.211.42.66 | IP | African phishing node |
Assessment: Threat actors actively scan for and attempt to abuse misconfigured SMTP servers for phishing distribution. Organizations should ensure mail servers are not open relays and implement proper authentication (SPF, DKIM, DMARC).
Observed Campaign: React2Shell Exploitation (CVE-2025-55182)
Vulnerability: React Server Components RCE
Risk Level: CRITICAL
Status: ACTIVE
Period: 2025-12-17 → 2025-12-27
Total Events: 223+ (IDS-confirmed attacks)
Baysec honeypots captured 223+ confirmed React2Shell (CVE-2025-55182) exploit attempts from 26 unique source IPs across 11 days. Activity is persistent automated mass scanning with payloads containing active C2 callbacks, staged malware downloads, and reverse shell commands - clear evidence of weaponized exploitation beyond vulnerability scanning.
C2 INFRASTRUCTURE:
- Staging:
94.154.35.154/weball.sh- post-exploitation script - Reverse Shell:
193.142.147.209:12323- active listener - Malware Delivery:
5.255.121.141- binary payload server
Attack Volume & Source IPs
| Source IP | Country | Events | Role |
|---|---|---|---|
95.214.55.246 | 🇵🇱 Poland | 78 | Primary scanner (persistent 11-day campaign) |
193.142.147.209 | 🇳🇱 Netherlands | 67 | C2 operator - reverse shell target (port 12323) |
45.154.98.124 | 🇳🇱 Netherlands | 31 | Actor 2 - uses 5.255.121.141 payload server |
5.187.35.21 | 🇪🇸 Spain | 14 | Vulnerability scanner (Go-http-client) |
130.12.180.207 | 🇺🇸 USA | 5 | Low-volume scanner |
192.159.99.95 | 🇬🇧 UK | 4 | Multi-vector scanner |
194.127.199.125 | 🇱🇺 Luxembourg | 2 | Reconnaissance |
195.24.237.218 | 🇷🇺 Russia | 2 | Reconnaissance |
216.250.122.216 | 🇺🇸 USA | 2 | Reconnaissance |
84.234.98.89 | 🇸🇪 Sweden | 2 | Reconnaissance |
170.64.136.199 | 🇺🇸 USA (DO) | 1 | DigitalOcean scanner |
170.64.145.146 | 🇺🇸 USA (DO) | 1 | DigitalOcean scanner |
170.64.193.109 | 🇺🇸 USA (DO) | 1 | DigitalOcean scanner |
170.64.204.250 | 🇺🇸 USA (DO) | 1 | DigitalOcean scanner |
209.38.18.241 | 🇺🇸 USA (DO) | 1 | DigitalOcean scanner |
209.38.23.246 | 🇺🇸 USA (DO) | 1 | DigitalOcean scanner |
Timeline: 2025-12-17 → 2025-12-27 UTC (sustained 11-day campaign with daily activity)
C2 Infrastructure
Two distinct threat actors identified:
| Indicator | Type | Actor | Usage |
|---|---|---|---|
http://94.154.35.154/weball.sh | Staging URL | Actor 1 | Shell script download |
193.142.147.209:12323 | C2 Callback | Actor 1 | Reverse shell listener |
http://5.255.121.141/nuts/... | Payload URL | Actor 2 | Binary payload download |
45.154.98.124 | Scanner | Actor 2 | Primary operator |
weball.sh, /tmp/x.sh | Payloads | Actor 1 | Post-exploitation scripts |
/tmp/lrt, /dev/lrt, /dev/shm/lrt | Binary | Actor 2 | Staged binary locations |
Actor 2 Characteristics:
- Uses distinctive boundary marker (see IoCs below)
- Downloads binary from
5.255.121.141 - Writes to multiple locations (
/tmp/lrt,/dev/lrt,/dev/shm/lrt) for persistence - Makes binary executable and runs in background
Targeted Endpoints
Attackers probed multiple paths across standard and non-standard ports:
| Endpoint | Ports Targeted |
|---|---|
/ | 80, 88, 445 |
/api | 80, 88 |
/api/route | 80 |
/app | 80, 88 |
/_next | 80, 88 |
/_next/server | 80, 88 |
Exploit Technique
Attack Vector: RSC serialization exploitation via prototype pollution
Exploit Pattern (canonical):
| |
RCE Payload Example (captured):
| |
HTTP Indicators (Detection Signatures)
Custom Headers (HIGH confidence):
| Header | Value Pattern | Occurrences | Notes |
|---|---|---|---|
Next-Action | x | 39 | RSC action trigger |
Accept | text/x-component | Rare | RSC-specific content type |
Content-Type | multipart/form-data; boundary=... | All | Custom boundary patterns |
Boundary Marker Variants (Actor Fingerprints):
| Boundary Pattern | Actor | Notes |
|---|---|---|
WebKitFormBoundaryx8jO2oVc6SWP3Sad | Actor 1 | Used with weball.sh payload |
WebKitFormBoundaryxtherespoopalloverme | Actor 2 | Distinctive boundary marker |
WebKitFormBoundaryx883003851297 | Variant | Numeric suffix pattern |
B1766123121029386113 | Probe | Timestamp-based boundary |
Boundary Pattern Analysis:
The distinctive boundary markers indicate:
- A specific exploit toolkit or threat actor
- Actor 2 downloads a binary payload rather than shell scripts
Targeted Ports (non-standard):
- Port 80 (standard HTTP)
- Port 88 (Kerberos - commonly exposed)
- Port 445 (SMB - probing for web services on Windows)
User-Agents Observed:
| |
User-Agent Analysis: The variety of User-Agents (desktop, mobile, ChromeOS, Android TV) indicates the scanning toolkit rotates UAs to evade detection. The SM-F9560 (Samsung Galaxy Z Fold 6) and NEO-X5 (Android TV box) are unusual and may indicate spoofing or compromised devices.
Detection Signatures
Detection Strings (regex):
| |
Detection Rules
IDS Rule:
| |
WAF Rule:
| |
Network-Level Indicators:
- Block egress to
193.142.147.209:12323(reverse shell) - Block downloads from
94.154.35.154/weball.shand5.255.121.141 - Alert on distinctive boundary markers (see IoC table)
Assessment
| Factor | Finding |
|---|---|
| Attack type | Automated mass exploitation |
| Sophistication | MEDIUM (public PoC + custom staging) |
| C2 presence | CONFIRMED (staging + reverse shell) |
| Successful exploitation | NOT CONFIRMED in honeypot (designed to fail) |
| Risk to production | HIGH for unpatched Next.js/RSC |
| Attribution | Opportunistic criminal scanning (no APT indicators) |
Threat Actor Analysis: Opportunistic, automated scanning tools drive this activity, quickly incorporating CVE-2025-55182 post-disclosure. The variety of User-Agents and targeted endpoints indicates broad scanning. RCE payloads with C2 callbacks show attackers seek persistent access, not just vulnerability identification.
References
- Baysec honeypot events (2025-12-17 → 2025-12-27)
- CVE-2025-55182 public PoCs (GitHub)
- Captured payloads and request bodies
Observed Campaign: RedTail Cryptominer & PHP CGI Exploitation (CVE-2024-4577)
Vulnerability: PHP CGI Argument Injection + Docker API targeting
Risk Level: CRITICAL
Status: ACTIVE
Period: 2025-12-17 → 2025-12-27
Total Events: 1,276+ (libredtail-http user-agent signature)
Baysec web honeypot captured 1,276+ exploitation attempts from 30+ unique source IPs (including IPv6) over 11 days, revealing four distinct threat patterns: mass exploitation of CVE-2024-4577 (PHP CGI Argument Injection), PHPUnit RCE exploitation (CVE-2017-9841), ThinkPHP RCE (CVE-2018-20062), and Docker API targeting.
Key Finding: RedTail operators demonstrate multi-vector capability, combining PHP exploitation with Docker API targeting and systematic credential harvesting. IPv6 infrastructure detected - attackers use 2001:41d0:601:1100::779b as primary scanner (162 events).
CVE-2024-4577 Mass Exploitation
Vulnerability Profile:
| Attribute | Value |
|---|---|
| CVE | CVE-2024-4577 |
| CVSS v3 | 9.8 CRITICAL |
| EPSS | 94.37% (Top 0.04%) |
| Type | PHP CGI Argument Injection (Windows) |
| Status | CISA KEV Listed |
Attack Vector Observed:
| |
C2 Infrastructure: 178.16.55.224 (USA, Railnet LLC) - 15 malicious detections on VirusTotal, self-signed certificate infrastructure.
RedTail Cryptominer - PHP CGI & Docker API Targeting
Evolution Assessment: RedTail has expanded from traditional cryptomining operations to targeting containerized infrastructure via exposed Docker APIs. Security researchers first observed this tactical evolution in public reporting November 2025.
| Source IP | Country | Events | Role |
|---|---|---|---|
2001:41d0:601:1100::779b | 🇫🇷 France (IPv6) | 162 | Primary scanner - IPv6 infrastructure |
163.5.148.15 | 🇫🇷 France | 94 | PHP CGI + PHPUnit RCE scanner |
62.146.234.188 | 🇩🇪 Germany | 72 | Multi-vector scanner |
152.42.188.148 | 🇸🇬 Singapore | 66 | PHP CGI exploitation |
178.128.89.216 | 🇸🇬 Singapore | 66 | PHP CGI exploitation |
103.168.91.76 | Unknown | 47 | PHPUnit RCE scanner |
144.126.203.185 | 🇺🇸 USA | 47 | Multi-vector scanner |
152.69.216.125 | 🇺🇸 USA | 47 | PHP CGI exploitation |
157.173.105.78 | 🇬🇧 UK | 47 | PHPUnit RCE scanner |
158.220.81.232 | 🇨🇭 Switzerland | 47 | PHP CGI probing |
165.154.231.140 | 🇨🇦 Canada | 47 | Multi-vector scanner |
173.249.5.123 | 🇩🇪 Germany | 47 | Multi-vector scanner |
207.244.246.26 | 🇺🇸 USA | 47 | PHP CGI exploitation |
216.108.237.50 | 🇺🇸 USA | 47 | PHP CGI exploitation |
217.154.69.208 | 🇬🇧 UK | 47 | PHPUnit RCE scanner |
45.192.10.196 | 🇿🇦 South Africa | 47 | PHP CGI exploitation |
Timeline: 2025-12-17 → 2025-12-27 UTC (continuous 11-day campaign with daily activity)
Significance: RedTail’s pivot to Docker infrastructure indicates opportunistic targeting of cloud-native environments. Organizations with exposed Docker APIs face dual risk: cryptomining resource abuse and potential container escape. Activity is geographically distributed across 9 countries with no single dominant source.
Credential Harvesting Campaign
Attribution: Russian-nexus infrastructure (operators host via UK proxy)
Primary Sources: 78.153.140.179, 78.153.140.224
Events: 61 combined
Targeted Paths:
| |
Assessment: Systematic enumeration targeting AWS credentials and application secrets. Pattern indicates automated tooling scanning for misconfigured deployments.
PHP Framework Exploitation
Multiple PHP framework RCE attempts captured:
| Framework | Exploit Path | Risk |
|---|---|---|
| ThinkPHP | /index.php?s=/index/\think\app/invokefunction | RCE |
| PHPUnit | /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php | RCE |
| Pearcmd | /index.php?lang=/../../../usr/local/lib/php/pearcmd | RCE |
Attack Source Analysis
| Source IP | Country | Events | Activity |
|---|---|---|---|
163.5.148.15 | 🇫🇷 France | 44 | RedTail scanner |
173.249.5.123 | Unknown | 44 | Multi-vector scanning |
78.153.140.179 | 🇷🇺 Russia (UK hosted) | 31 | Credential harvesting |
78.153.140.224 | 🇷🇺 Russia (UK hosted) | 30 | Credential harvesting |
188.237.58.92 | 🇲🇩 Moldova | 16 | Protocol attacks |
Detection Signatures
User-Agent Detection:
| |
Path-Based Detection (WAF/IDS):
| |
Risk Assessment
| Threat | Severity | EPSS/Likelihood | Impact |
|---|---|---|---|
| CVE-2024-4577 | CRITICAL | 94.37% | RCE, full system compromise |
| RedTail Docker | HIGH | MEDIUM | Cryptomining, container escape |
| Credential Harvesting | HIGH | HIGH | AWS account compromise |
| PHP Framework RCE | HIGH | MEDIUM | Application takeover |
References
- CVE-2024-4577 - NVD
- CISA KEV Catalog
- Baysec honeypot telemetry (2025-12-17 → 2025-12-27)
- VirusTotal: 163.5.148.15, 78.153.140.179, 178.16.55.224
Observed Campaign: Cisco VPN (AnyConnect) Probing (CVE-2020-3452)
Threat Type: Vulnerability Reconnaissance
Risk Level: MEDIUM
Status: ACTIVE
Period: 2025-12-17 → 2025-12-27
Total Events: 73
Baysec honeypots captured 73 probing attempts targeting Cisco AnyConnect VPN infrastructure from 19 unique source IPs - all originating from DigitalOcean infrastructure. The coordinated nature (4 events per IP, identical patterns) indicates automated reconnaissance tooling.
Targeted Endpoints
| Path | Events | Purpose |
|---|---|---|
/+CSCOL+/Java.jar | 19 | Java applet exploitation attempt |
/+CSCOE+/logon_forms.js | 18 | Login form fingerprinting |
/+CSCOE+/transfer.js | 18 | File transfer probe |
/+CSCOL+/a1.jar | 18 | Java applet exploitation attempt |
Source IPs (DigitalOcean Infrastructure)
| Source IP | Events | Notes |
|---|---|---|
104.248.12.12 | 4 | DigitalOcean NYC |
129.212.227.133 | 4 | DigitalOcean |
137.184.178.219 | 4 | DigitalOcean NYC |
137.184.254.136 | 4 | DigitalOcean NYC |
137.184.26.12 | 4 | DigitalOcean NYC |
138.68.141.22 | 4 | DigitalOcean NYC |
147.182.254.157 | 4 | DigitalOcean |
159.223.107.241 | 4 | DigitalOcean SF |
162.243.96.90 | 4 | DigitalOcean NYC |
165.22.228.96 | 4 | DigitalOcean |
170.64.138.231 | 4 | DigitalOcean SFO |
178.128.242.60 | 4 | DigitalOcean LON |
178.128.86.240 | 4 | DigitalOcean AMS |
206.189.40.243 | 4 | DigitalOcean NYC |
209.38.28.134 | 4 | DigitalOcean |
64.225.120.136 | 4 | DigitalOcean NYC |
64.225.51.246 | 4 | DigitalOcean NYC |
64.227.39.136 | 4 | DigitalOcean NYC |
134.209.7.54 | 1 | DigitalOcean |
Assessment
Pattern Analysis:
- All 19 IPs performed exactly 4 requests (one per path)
- All hosted on DigitalOcean infrastructure
- Targeting Cisco AnyConnect SSL VPN authentication/Java components
- Indicative of vulnerability scanning for CVE-2020-3452 (Cisco ASA Path Traversal) or similar
Risk: Organizations running Cisco ASA/FTD with AnyConnect should:
- Ensure patched against CVE-2020-3452 (CVSS 7.5)
- Monitor for
/+CSCOE+/and/+CSCOL+/path access - Block DigitalOcean ranges if not expected traffic source
Observed Campaign: Rondo Botnet (Mirai Variant)
Threat Type: IoT Botnet / Multi-Vector Scanner
Risk Level: HIGH
Status: ACTIVE
Period: 2025-12-17 → 2025-12-27
Events: 441+
Baysec honeypots captured 441+ exploitation attempts from the Rondo botnet, a Mirai variant targeting IoT devices and web applications. The botnet employs multiple attack vectors simultaneously, including Shellshock (CVE-2014-6271), PHPUnit RCE (CVE-2017-9841), and OpenWRT LuCI command injection (CVE-2023-1389).
Key Finding: Rondo operators embed their email attribution signature (rondo2012@atomicmail.io) directly in User-Agent strings and Shellshock payloads - unusual OPSEC failure suggesting amateur operators or deliberate false flag.
Attack Infrastructure
| Component | Value | Notes |
|---|---|---|
| Primary Scanner | 192.159.99.95 | United Kingdom |
| C2/Payload Server | 41.231.37.153 | Tunisia (Tunisie Telecom) |
| Contact Email | rondo2012@atomicmail.io | Embedded in payloads |
| Payload Scripts | rondo.*.sh | Multiple variants |
Exploitation Vectors
1. Shellshock (CVE-2014-6271) - User-Agent Injection:
| |
Targets: /cgi-bin/slogin/login.py, /cgi-bin/jarrewrite.sh
2. OpenWRT LuCI Command Injection (CVE-2023-1389):
| |
3. PHPUnit RCE (CVE-2017-9841):
| |
Payload Variants Observed
| Script | Target CVE | Description |
|---|---|---|
rondo.ame.sh | CVE-2014-6271 | Shellshock exploitation |
rondo.fve.sh | CVE-2014-6271 | Shellshock variant |
rondo.qre.sh | CVE-2014-6271 | Shellshock variant |
rondo.zqq.sh | CVE-2023-1389 | OpenWRT LuCI injection |
rondo.dtm.sh | CVE-2017-9841 | PHPUnit exploitation |
Detection Signatures
| |
Assessment: Rondo represents opportunistic mass scanning targeting legacy vulnerabilities in IoT devices. The embedded email signature and use of decade-old CVEs suggests low-sophistication operators. Primary risk is to unpatched routers and IoT devices that may be enrolled into DDoS botnets or cryptomining operations.
Observed Campaign: IoT & Network Device Exploitation
Threat Type: Multi-CVE Device Targeting
Risk Level: HIGH
Status: ACTIVE
Period: 2025-12-17 → 2025-12-27
Events: 965+
Baysec honeypots captured 965+ exploitation attempts targeting IoT devices, network equipment, and exposed management interfaces. Attackers systematically probe for vulnerable Hikvision cameras, GPON routers, D-Link devices, and enterprise infrastructure.
Hikvision SDK Reconnaissance (CVE-2021-36260)
Vulnerability: Scanning for Command Injection endpoint
CVSS: 9.8 CRITICAL
Events: 18
Attackers probe for the /SDK/webLanguage endpoint to identify Hikvision cameras vulnerable to CVE-2021-36260. All captured requests were GET-based reconnaissance - no command injection payloads observed.
| Source IP | Country | Events | First Seen | Last Seen |
|---|---|---|---|---|
89.42.231.239 | 🇷🇴 Romania | 11 | Dec 17 | Dec 26 |
5.187.35.158 | 🇳🇱 Netherlands | 7 | Dec 21 | Dec 27 |
Request Pattern:
| |
GPON Router Reconnaissance
Scanning for: GPON Home Gateway vulnerabilities (CVE-2018-10561)
Events: 47
| |
Probing for vulnerable GPON routers. No command injection payloads observed.
D-Link HNAP Reconnaissance
Scanning for: D-Link HNAP interface
Events: 30
| |
Probing for D-Link routers with HNAP enabled. No SOAPAction exploitation payloads observed.
Apache Solr Reconnaissance
Scanning for: Apache Solr instances
Events: 109
| Endpoint | Events | Purpose |
|---|---|---|
/solr/admin/info/system | 64 | Version fingerprinting |
/solr/admin/cores?action=STATUS&wt=json | 45 | Core enumeration |
Docker Registry Reconnaissance
Scanning for: Exposed Docker registries
Events: 63
| |
Probing for unauthenticated Docker API access.
SAP NetWeaver Reconnaissance (CVE-2025-31324)
Scanning for: Vulnerable metadatauploader endpoint
CVSS: 10.0 CRITICAL
Events: 24
| |
Probing for SAP NetWeaver instances. No file upload payloads observed.
GeoServer Reconnaissance (CVE-2024-36401)
Scanning for: GeoServer instances
CVSS: 9.8 CRITICAL
Events: 18
| |
Probing for GeoServer installations. No SQL injection payloads observed.
Apache Path Traversal (CVE-2021-41773 / CVE-2021-42013)
Vulnerability: Path Traversal → RCE via mod_cgi
CVSS: 9.8 CRITICAL
Events: 402
| Pattern | Events | Technique |
|---|---|---|
/cgi-bin/%%32%65%%32%65/... | 75 | Double URL-encoded traversal |
/cgi-bin/.%2e/.%2e/... | 75 | URL-encoded dot traversal |
/cgi-bin/.%%32%65/... | 17 | Mixed encoding |
Attack Payload (captured):
| |
This traverses to /bin/sh on vulnerable Apache 2.4.49/2.4.50 servers.
| Source IP | Country | Events |
|---|---|---|
192.159.99.95 | 🇬🇧 UK (Rondo) | 100 |
147.124.204.3 | 🇺🇸 USA | 22 |
163.5.148.15 | 🇫🇷 France | 16 |
87.121.84.181 | 🇧🇬 Bulgaria | 15 |
QNAP NAS Exploitation (CVE-2024-21899)
Vulnerability: Improper Authentication (CVE-2024-21899)
CVSS: 9.8 CRITICAL
Events: 52
| |
Attackers probe for QNAP NAS devices vulnerable to authentication bypass allowing unauthenticated access to device management.
InfluxDB Information Disclosure (CVE-2019-20933)
Vulnerability: Authentication Bypass (CVE-2019-20933)
CVSS: 9.8 CRITICAL
Events: 42
| |
Attackers probe for unauthenticated InfluxDB instances to extract internal configuration, credentials, and time-series data.
Realtek SDK Router Exploitation (CVE-2021-35395)
Vulnerability: Buffer Overflow leading to RCE (CVE-2021-35395)
CVSS: 9.8 CRITICAL
Events: 42
| Endpoint | Credentials | Events |
|---|---|---|
/boaform/admin/formLogin | (none) | 24 |
/boaform/admin/formLogin?username=ec8&psd=ec8 | ec8:ec8 | 9 |
/boaform/admin/formLogin?username=user&psd=user | user:user | 9 |
Targets routers with Realtek SDK - common in low-cost SOHO devices.
Netgear Router Exploitation
Vulnerability: Command Injection (CVE-2016-1555)
Events: 22
| |
Miscellaneous Router CGI Attacks
| Endpoint | Events | Target |
|---|---|---|
/apply.cgi | 42 | Generic router config |
/cgi-bin/login | 28 | Authentication probe |
/cgi-bin/httpd.cgi | 12 | Various routers |
/cgi-bin/login.cgi | 11 | Authentication probe |
/cgi-bin/system_mgr.cgi | 9 | System management |
WinRM Exploitation
Protocol: Windows Remote Management
Events: 219
Period: Dec 17 → Dec 26
| Source IP | Country | Events |
|---|---|---|
103.203.76.79 | 🇮🇳 India | 13 |
108.216.136.255 | 🇺🇸 USA | 13 |
111.92.61.249 | 🇮🇳 India | 13 |
113.160.1.118 | 🇻🇳 Vietnam | 13 |
114.143.212.195 | 🇮🇳 India | 13 |
117.192.9.243 | 🇮🇳 India | 13 |
124.106.67.118 | 🇵🇭 Philippines | 13 |
125.229.26.140 | 🇹🇼 Taiwan | 13 |
39.109.104.26 | 🇸🇬 Singapore | 13 |
41.210.171.82 | 🇰🇪 Kenya | 13 |
43.224.8.199 | 🇧🇩 Bangladesh | 13 |
| |
Assessment: Coordinated scanning campaign from Asian IP addresses targeting Windows hosts with exposed WinRM. Pattern suggests botnet-controlled scanning infrastructure.
Observed Campaign: Environment & Secrets Harvesting
Threat Type: Credential Theft / Reconnaissance
Risk Level: HIGH
Status: ACTIVE
Period: 2025-12-17 → 2025-12-27
Events: 1,883+
Baysec honeypots captured 1,883+ requests targeting environment files, Git repositories, and cloud credentials. This represents systematic automated scanning for exposed secrets in web applications.
Environment File Scanning
Total Events: 1,761
| Target Path | Events | Risk Level |
|---|---|---|
/.env | 229 | CRITICAL |
/api/.env | 76 | CRITICAL |
/admin/.env | 62 | CRITICAL |
/backend/.env | 60 | CRITICAL |
/.env.local | 58 | HIGH |
/.env.example | 47 | MEDIUM |
/app/.env | 33 | CRITICAL |
/core/.env | 27 | CRITICAL |
/.env.production | 25 | CRITICAL |
/.env.bak | 24 | CRITICAL |
/.env.save | 24 | CRITICAL |
/.env.zip | 15 | CRITICAL |
/.env.rar | 15 | CRITICAL |
/.aws/credentials | 6 | CRITICAL |
Git Repository Exposure
Total Events: 122
| Target Path | Events | Information Leaked |
|---|---|---|
/.git/config | 55 | Remote URLs, credentials |
/.git/index | 19 | File structure |
/.git/HEAD | 6 | Branch information |
/admin/.git/config | 4 | Admin repo secrets |
/api/.git/config | 4 | API repo secrets |
Top Credential Harvesters
| Source IP | Country | Events | Primary Target |
|---|---|---|---|
78.142.18.135 | 🇷🇺 Russia | 128 | .env files |
78.153.140.177 | 🇷🇺 Russia | 119 | .env files |
62.146.234.188 | 🇩🇪 Germany | 115 | .env + .git |
152.42.188.148 | 🇸🇬 Singapore | 105 | .env + .git |
178.128.89.216 | 🇸🇬 Singapore | 105 | .env + .git |
78.153.140.203 | 🇷🇺 Russia | 101 | .env files |
206.71.149.226 | 🇺🇸 USA | 99 | .env files |
78.153.140.224 | 🇷🇺 Russia | 91 | .env files |
78.153.140.179 | 🇷🇺 Russia | 87 | AWS credentials |
213.209.159.150 | 🇩🇪 Germany | 19 | .git repos |
Note: 78.153.140.x subnet shows coordinated Russian-nexus scanning with multiple IPs from same /24 block.
Detection Rules
| |
Assessment: Environment file scanning is fully automated and targets both development artifacts (.env.example) and production secrets. The systematic approach to backup file extensions (.bak, .save, .zip) indicates sophisticated tooling. Immediate risk to exposed deployments - attackers can obtain database credentials, API keys, and cloud access tokens.
MITRE ATT&CK Mapping
Execution
| Technique | ID | Observed In |
|---|---|---|
| Command and Scripting Interpreter: Visual Basic | T1059.005 | RUSTRIC, PYTRIC |
| Command and Scripting Interpreter: PowerShell | T1059.001 | ClickFix, Webrat |
| Windows Management Instrumentation | T1047 | PYTRIC |
Persistence
| Technique | ID | Observed In |
|---|---|---|
| Browser Extensions | T1176 | GhostPoster |
Defense Evasion
| Technique | ID | Observed In |
|---|---|---|
| Obfuscated Files or Information | T1027 | RUSTRIC, PYTRIC, lotusbail, GhostPoster |
| Obfuscated Files or Information: Steganography | T1027.003 | ClickFix, GhostPoster |
| Signed Binary Proxy Execution | T1218 | PYTRIC, APT37 Artemis |
| Subvert Trust Controls: Code Signing | T1553.002 | MacSync Stealer |
| Virtualization/Sandbox Evasion | T1497 | DriverFixer0428, MacSync Stealer |
Credential Access
| Technique | ID | Observed In |
|---|---|---|
| Credentials from Password Stores: Credentials from Web Browsers | T1555.003 | MacSync, Webrat, LummaC2 |
| Credentials from Password Stores: Keychain | T1555.001 | MacSync Stealer |
| Brute Force: Password Guessing | T1110.001 | Baysec Honeypot (SSH, SMTP AUTH) |
| Brute Force: Password Spraying | T1110.003 | Baysec Honeypot (SSH, SMB, NTLM) |
Lateral Movement
| Technique | ID | Observed In |
|---|---|---|
| Remote Services: SMB/Windows Admin Shares | T1021.002 | Baysec Honeypot (attackers attempting SMB auth) |
Discovery
| Technique | ID | Observed In |
|---|---|---|
| Software Discovery: Security Software Discovery | T1518.001 | RUSTRIC, PYTRIC, DriverFixer0428 |
Command and Control
| Technique | ID | Observed In |
|---|---|---|
| Application Layer Protocol: Web Protocols | T1071.001 | RUSTRIC, PYTRIC, MacSync, Webrat |
| Web Service | T1102 | APT37 Artemis (Yandex, pCloud), DriverFixer0428 (Dropbox) |
| Ingress Tool Transfer | T1105 | RUSTRIC, PYTRIC, ClickFix |
Initial Access
| Technique | ID | Observed In |
|---|---|---|
| Exploit Public-Facing Application | T1190 | Baysec Honeypot (React2Shell, PHP CGI, Hikvision, SAP NetWeaver, GeoServer, Apache, PHPUnit, Shellshock, OpenWRT) |
| Phishing: Spearphishing Attachment | T1566.001 | RUSTRIC, PYTRIC, APT37 Artemis |
| Phishing: Spearphishing Link | T1566.002 | RUSTRIC, PYTRIC, Contagious Interview |
| Supply Chain Compromise: Compromise Software Supply Chain | T1195.002 | lotusbail, GhostPoster, PyPI packages |
Reconnaissance
| Technique | ID | Observed In |
|---|---|---|
| Active Scanning: Vulnerability Scanning | T1595.002 | Baysec Honeypot (Cisco VPN, IoT devices, environment files) |
| Search Open Technical Databases | T1596 | Baysec Honeypot (DNS reconnaissance) |
Resource Development
| Technique | ID | Observed In |
|---|---|---|
| Acquire Infrastructure: Virtual Private Server | T1583.003 | React2Shell (DigitalOcean scanners), RedTail, Rondo Botnet |
Collection
| Technique | ID | Observed In |
|---|---|---|
| Automated Collection | T1119 | Baysec Honeypot (environment file harvesting, .git exposure scanning) |
| Data from Cloud Storage | T1530 | Baysec Honeypot (AWS credentials harvesting attempts) |
Indicators of Compromise
Network Indicators
React2Shell (CVE-2025-55182) - Extended IoCs (Dec 17-27, 2025) - 223 events, 26 IPs:
| Indicator | Campaign | Type | Action |
|---|---|---|---|
94.154.35.154 | React2Shell (Actor 1) | Staging Server /weball.sh | Block at perimeter |
193.142.147.209:12323 | React2Shell (Actor 1) | Reverse Shell C2 | Block egress |
5.255.121.141 | React2Shell (Actor 2) | Payload Server | Block at perimeter |
45.154.98.124 | React2Shell (Actor 2) | Scanner (31 events) | Block/monitor |
95.214.55.246 | React2Shell | Primary Scanner (78 events) | Block/monitor |
5.187.35.21 | React2Shell | Go-http-client Scanner (14 events) | Block/monitor |
130.12.180.207 | React2Shell | Scanner (USA) | Block/monitor |
192.159.99.95 | React2Shell | Multi-vector Scanner (UK) | Block/monitor |
194.127.199.125 | React2Shell | Scanner (Luxembourg) | Block/monitor |
195.24.237.218 | React2Shell | Scanner (Russia) | Block/monitor |
216.250.122.216 | React2Shell | Scanner (USA) | Block/monitor |
84.234.98.89 | React2Shell | Scanner (Sweden) | Block/monitor |
170.64.136.199 | React2Shell | DigitalOcean Scanner | Block/monitor |
170.64.145.146 | React2Shell | DigitalOcean Scanner | Block/monitor |
170.64.193.109 | React2Shell | DigitalOcean Scanner | Block/monitor |
170.64.204.250 | React2Shell | DigitalOcean Scanner | Block/monitor |
RedTail / PHP CGI (CVE-2024-4577) - Extended IoCs (Dec 17-27, 2025) - 1,276 events, 30+ IPs:
| Indicator | Campaign | Type | Action |
|---|---|---|---|
178.16.55.224 | RedTail | C2 Server | Block at perimeter |
2001:41d0:601:1100::779b | RedTail | IPv6 Primary Scanner (162 events) | Block/monitor |
163.5.148.15 | RedTail | PHP CGI + PHPUnit Scanner (94 events) | Block/monitor |
62.146.234.188 | RedTail | Multi-vector Scanner (Germany, 72 events) | Block/monitor |
152.42.188.148 | RedTail | PHP CGI Scanner (Singapore, 66 events) | Block/monitor |
178.128.89.216 | RedTail | PHP CGI Scanner (Singapore, 66 events) | Block/monitor |
103.168.91.76 | RedTail | PHPUnit RCE Scanner (47 events) | Block/monitor |
144.126.203.185 | RedTail | Multi-vector Scanner (USA) | Block/monitor |
152.69.216.125 | RedTail | PHP CGI Scanner (USA) | Block/monitor |
157.173.105.78 | RedTail | PHPUnit RCE Scanner (UK) | Block/monitor |
158.220.81.232 | RedTail | PHP CGI Scanner (Switzerland) | Block/monitor |
165.154.231.140 | RedTail | Multi-vector Scanner (Canada) | Block/monitor |
173.249.5.123 | RedTail | Multi-vector Scanner (Germany) | Block/monitor |
207.244.246.26 | RedTail | PHP CGI Scanner (USA) | Block/monitor |
216.108.237.50 | RedTail | PHP CGI Scanner (USA) | Block/monitor |
217.154.69.208 | RedTail | PHPUnit RCE Scanner (UK) | Block/monitor |
45.192.10.196 | RedTail | PHP CGI Scanner (South Africa) | Block/monitor |
Rondo Botnet (Mirai Variant) - IoCs:
| Indicator | Campaign | Type | Action |
|---|---|---|---|
41.231.37.153 | Rondo Botnet | C2/Payload Server (Tunisia) | Block at perimeter |
192.159.99.95 | Rondo Botnet | Primary Scanner (UK) | Block/monitor |
rondo2012@atomicmail.io | Rondo Botnet | Attribution marker | Hunt in logs |
http://41.231.37.153/rondo.*.sh | Rondo Botnet | Payload URLs | Block at proxy |
IoT & Network Device Exploitation - IoCs:
| Indicator | Campaign | Type | Action |
|---|---|---|---|
89.42.231.239 | Hikvision Scanner | CVE-2021-36260 (Romania) | Block/monitor |
89.42.231.244 | Hikvision Scanner | CVE-2021-36260 (Romania) | Block/monitor |
5.182.209.113 | Hikvision Scanner | CVE-2021-36260 (Luxembourg) | Block/monitor |
147.124.204.3 | Apache Traversal | CVE-2021-41773 (USA) | Block/monitor |
87.121.84.181 | Apache Traversal | CVE-2021-41773 (Bulgaria) | Block/monitor |
103.203.76.79 | WinRM Scanner | Remote Admin (India) | Block/monitor |
111.92.61.249 | WinRM Scanner | Remote Admin (India) | Block/monitor |
113.160.1.118 | WinRM Scanner | Remote Admin (Vietnam) | Block/monitor |
114.143.212.195 | WinRM Scanner | Remote Admin (India) | Block/monitor |
Cisco VPN (AnyConnect) Probing - IoCs (73 events, 19 DigitalOcean IPs):
| Indicator | Campaign | Type | Action |
|---|---|---|---|
104.248.12.12 | Cisco VPN | DigitalOcean Scanner | Monitor |
137.184.178.219 | Cisco VPN | DigitalOcean Scanner | Monitor |
137.184.254.136 | Cisco VPN | DigitalOcean Scanner | Monitor |
137.184.26.12 | Cisco VPN | DigitalOcean Scanner | Monitor |
138.68.141.22 | Cisco VPN | DigitalOcean Scanner | Monitor |
147.182.254.157 | Cisco VPN | DigitalOcean Scanner | Monitor |
159.223.107.241 | Cisco VPN | DigitalOcean Scanner | Monitor |
162.243.96.90 | Cisco VPN | DigitalOcean Scanner | Monitor |
170.64.138.231 | Cisco VPN | DigitalOcean Scanner | Monitor |
Environment & Secrets Harvesting - IoCs (360 events):
| Indicator | Campaign | Type | Action |
|---|---|---|---|
78.153.140.179 | Env Harvesting | .env Scanner (Russia, 118 events) | Block/monitor |
78.153.140.224 | Env Harvesting | .env Scanner (Russia, 37 events) | Block/monitor |
139.162.8.26 | Env Harvesting | .env Scanner (35 events) | Block/monitor |
78.153.140.151 | Env Harvesting | .env Scanner (Russia, 27 events) | Block/monitor |
213.209.159.150 | Git Exposure | .git Scanner (Germany, 19 events) | Block/monitor |
45.148.10.23 | Env Harvesting | .env Scanner (16 events) | Block/monitor |
78.153.140.203 | Env Harvesting | .env Scanner (Russia) | Block/monitor |
185.241.208.170 | Env Harvesting | .env Scanner | Block/monitor |
80.94.95.98 | Env Harvesting | .env Scanner | Block/monitor |
SSH Brute Force - Top Attackers (395K+ events):
| Indicator | Campaign | Type | Action |
|---|---|---|---|
34.29.105.211 | SSH Brute Force | Primary attacker (122K events) | Block at perimeter |
195.178.110.30 | SSH Brute Force | 7.4K events | Block/monitor |
92.118.39.62 | SSH Brute Force | 6.5K events | Block/monitor |
80.94.92.40 | SSH Brute Force | 6.4K events | Block/monitor |
91.92.241.148 | SSH Brute Force | 6.1K events | Block/monitor |
SMTP Open Relay Probing - 2,600 events:
| Indicator | Campaign | Type | Action |
|---|---|---|---|
103.39.64.54 | SMTP Abuse | Primary relay scanner (1K events) | Block at perimeter |
45.144.212.19 | SMTP Abuse | Relay scanner (1K events) | Block at perimeter |
45.144.212.238 | SMTP Abuse | Relay probing (66 events) | Block/monitor |
78.153.140.207 | SMTP Abuse | Open relay test emails to siagabaja.com | Block/monitor |
87.251.78.220 | SMTP Abuse | Relay probing (17 events) | Block/monitor |
158.94.209.3 | SMTP Abuse | Windows host WIN-7N1FIECL6IC | Block/monitor |
DNS Reconnaissance - 1,355 events:
| Indicator | Campaign | Type | Action |
|---|---|---|---|
141.98.83.48 | DNS Recon | Primary scanner (808 events) | Block/monitor |
176.65.134.118 | DNS Recon | TXT/A record probing (75 events) | Block/monitor |
206.191.154.44 | DNS Recon | DNS enumeration (62 events) | Block/monitor |
87.121.84.13 | DNS Recon | DNS probing (33 events) | Block/monitor |
192.210.187.83 | DNS Recon | DNS enumeration (28 events) | Block/monitor |
Other Campaigns:
| Indicator | Campaign | Type | Action |
|---|---|---|---|
141.98.80.175 | ClickFix | C2 Server | Block at perimeter |
zkcall.net | MacSync Stealer | Distribution | Block at DNS/proxy |
Yandex Cloud: tanessha.samuel | APT37 Artemis | C2 Account | Monitor for connections |
pCloud: tanessha.samuel | APT37 Artemis | C2 Account | Monitor for connections |
113.160.186.2 | Hospital SMB Scanning | Compromised Host | Block at perimeter |
78.153.140.179 | Credential Harvesting | Scanner | Block at perimeter |
78.153.140.224 | Credential Harvesting | Scanner | Block at perimeter |
188.237.58.92 | Protocol Attacks | Scanner | Block at perimeter |
103.39.64.54 | SMTP Brute Force | Scanner | Block at perimeter |
45.144.212.19 | SMTP Brute Force | Scanner | Block at perimeter |
87.251.78.220 | SMTP Phishing Distribution | Phishing Infra | Block at perimeter |
102.211.42.66 | SMTP Phishing Distribution | Phishing Infra | Block at perimeter |
Email/Sender Indicators (Phishing)
| Indicator | Campaign | Type | Action |
|---|---|---|---|
accounts@globalfinancesolutions.com | Financial Phishing | Sender | Block/flag in email gateway |
office@cryptoyieldx.com | Crypto Scam | Sender | Block/flag in email gateway |
dpr@priv8shop.com | Unknown Campaign | Sender | Block/flag in email gateway |
User-Agent Signatures
| User-Agent | Campaign | Events | Action |
|---|---|---|---|
libredtail-http | RedTail/PHP CGI | 574 | Block at WAF/proxy |
Mozilla/5.0 (rondo2012@atomicmail.io) | Rondo Botnet | 122 | Block at WAF/proxy |
() { :; }; ... | Rondo (Shellshock) | 27 | Block at WAF/proxy |
Python WinRM client | WinRM Exploitation | 70 | Block/monitor |
Go-http-client/1.1 | React2Shell, Scanning | 380 | Monitor (context-dependent) |
Mozilla/5.0 zgrab/0.x | ZGrab Scanner | 109 | Monitor (research tool) |
Mozilla/5.0 (compatible; Scanner/1.0) | Generic Scanner | 100 | Monitor |
chrome/1.2.3 | Malicious Scanner | 16 | Block |
xfa1 / xfa1,nvdorz,nvd0rz | Suspicious Scanner | 37 | Block |
cypex.ai/scanning | CYPEX Scanner | 194 | Monitor (commercial) |
Assetnote/1.0.0 | Assetnote Scanner | 40 | Monitor (commercial) |
l9scan/2.0 | LeakIX Scanner | 35 | Monitor (research) |
URL Indicators
| Indicator | Campaign | Type | Action |
|---|---|---|---|
http://94.154.35.154/weball.sh | React2Shell | Staging URL | Block at proxy |
https://178.16.55.224/sh | RedTail | Payload URL | Block at proxy |
File Indicators
| Indicator | Campaign | Type | Action |
|---|---|---|---|
rasmanesc.exe | Webrat | Dropper | Detect/block |
version.dll (side-loaded) | APT37 Artemis | Malicious DLL | Detect side-loading |
zk-call-messenger-installer-3.9.2-lts.dmg | MacSync Stealer | Installer | Block |
weball.sh | React2Shell | Post-exploit payload | Detect/block |
/tmp/x.sh | React2Shell | Staged script | Hunt on endpoints |
Malicious Packages
| Registry | Package Name | Campaign | Action |
|---|---|---|---|
| npm | lotusbail | WhatsApp Stealer | Remove; unlink WhatsApp devices |
| PyPI | smtrlib | Telegram Stealer | Remove |
| PyPI | runtimeutils | Infostealer | Remove |
| PyPI | ai-cypher | Infostealer | Remove |
| PyPI | unizip | Infostealer | Remove |
Browser Extensions (GhostPoster)
Remove and reset passwords if installed:
- Free VPN Forever
- screenshot-saved-easy
- weather-best-forecast
- google-translate-pro-extension
- dark-reader-for-ff
Recommendations
Immediate Actions
| Priority | Action | Details |
|---|---|---|
| CRITICAL | Patch SAP NetWeaver | CVE-2025-31324 - CVSS 10.0, unauthenticated file upload |
| CRITICAL | Patch n8n | CVE-2025-68613 - 103K+ exposed instances. Upgrade to 1.120.4+ |
| CRITICAL | Patch PHP | CVE-2024-4577 - EPSS 94.37%. Upgrade to 8.1.29+/8.2.20+/8.3.8+ |
| CRITICAL | Patch Next.js/RSC | CVE-2025-55182 - Actively exploited with confirmed C2 |
| CRITICAL | Patch Apache | CVE-2021-41773 - 402 attempts. Upgrade Apache 2.4.49/2.4.50 |
| HIGH | Patch Hikvision | CVE-2021-36260 - 103 attempts. Update camera firmware |
| HIGH | Block C2s | See Indicators of Compromise for full blocklist |
| HIGH | Audit npm/PyPI | Remove lotusbail (unlink WhatsApp devices), smtrlib, runtimeutils |
| HIGH | Remove extensions | GhostPoster Firefox extensions (17 total) |
| MEDIUM | Block User-Agent | libredtail-http (RedTail fingerprint) |
| MEDIUM | Audit Docker APIs | Restrict to authenticated access only |
Detection Signatures
WAF/IDS Rules (React2Shell CVE-2025-55182):
| |
HTTP Header Indicators (React2Shell):
| Header | Value | Confidence |
|---|---|---|
Next-Action | x or 1 | MEDIUM |
Path-Based Detection (WAF/IDS):
| |
Hunt Queries:
- File:
/tmp/x.sh,weball.shon web servers - User-Agent:
libredtail-http - Connections to:
94.154.35.154,193.142.147.209:12323
Network IOCs (Quick Block List):
| |
Assessment Confidence Levels
| Assessment | Confidence | Basis |
|---|---|---|
| Webrat campaign attribution (criminal) | HIGH | Kaspersky analysis; consistent TTPs with financially-motivated actors |
| APT37 Artemis attribution (DPRK) | HIGH | Genians analysis; infrastructure overlap; historical APT37 TTPs |
| Contagious Interview attribution (DPRK) | HIGH | FBI action; MITRE ATT&CK group documentation; historical patterns |
| CVE-2025-68613 exposure count | HIGH | Censys scan data (Dec 22 2025) |
| ClickFix campaign active status | MEDIUM | Some infrastructure disrupted by Operation Endgame; likely to reconstitute |
| MacSync Stealer mitigated | MEDIUM | Apple revoked certificate; operators may obtain new signing |
Conclusion
Key Judgments:
Supply chain is the primary attack vector for targeting developers and security professionals. npm, PyPI, and browser extension stores require continuous monitoring.
Steganography has become mainstream in criminal operations. Multiple independent campaigns (ClickFix, GhostPoster) adopted image-based payload delivery within the same period.
Code signing provides insufficient trust. Threat actors use signed and notarized macOS applications to bypass Gatekeeper, rendering signature-only trust models obsolete.
Developer targeting is strategic, not opportunistic. Webrat operators deliberately pivoted from game cheats to fake exploit repositories, recognizing the higher value of security researcher credentials.
State-sponsored actors remain active. Both APT37 (Artemis) and Contagious Interview demonstrate North Korean continued focus on credential theft and intelligence gathering.
Legacy vulnerabilities remain actively exploited. Baysec honeypots captured mass scanning for Shellshock (CVE-2014-6271), PHPUnit RCE (CVE-2017-9841), and Apache path traversal (CVE-2021-41773) - vulnerabilities years old but still profitable for attackers.
Geographic threat concentration persists. Russia (1.1M+ events) and Egypt (2.4M+ events) remain dominant sources of credential harvesting and brute force attacks, with captured credentials revealing compromised enterprise infrastructure.
Bottom Line: The boundary between “legitimate” open-source platforms and malware distribution has effectively dissolved. Defenders must extend monitoring to developer ecosystems and treat GitHub, npm, PyPI, and browser stores as potential attack vectors with the same rigor applied to traditional threat sources. Additionally, patching legacy vulnerabilities remains critical - attackers continue exploiting years-old CVEs at scale.
References
Closed Source Intelligence
Baysec CTI - proprietary threat intelligence platform providing real-time ransomware tracking, leak site monitoring, dark web surveillance, and credential exposure detection.
Baysec Intelligence AI - AI-assisted analysis for report enrichment, IOC correlation, and threat actor attribution.
Baysec Sensors - Distributed honeypot network capturing SSH/SMB/RDP/MSSQL/SMTP/DNS attacks, credential harvesting attempts, phishing distribution attempts, and exploit delivery.
Open Source Intelligence (OSINT)
Threat Research Reports
| Topic | Source | Link |
|---|---|---|
| Webrat via fake GitHub exploits | Kaspersky/Securelist | securelist.com |
| Webrat GitHub analysis | BleepingComputer | bleepingcomputer.com |
| ClickFix steganography | Huntress | huntress.com |
| ClickFix fake updates | Malwarebytes | malwarebytes.com |
| GhostPoster Firefox extensions | The Hacker News | thehackernews.com |
| GhostPoster steganography | BleepingComputer | bleepingcomputer.com |
| lotusbail npm package | SecurityWeek | securityweek.com |
| lotusbail WhatsApp theft | BleepingComputer | bleepingcomputer.com |
| MacSync Stealer evolution | Jamf Threat Labs | jamf.com |
| MacSync signed malware | SecurityWeek | securityweek.com |
| APT37 Artemis campaign | Genians | genians.co.kr |
| DriverFixer0428 (DPRK) | LunchM0n3y | lunchm0n3y.com |
| n8n CVE-2025-68613 | The Hacker News | thehackernews.com |
| Contagious Interview (FBI) | Infosecurity Magazine | infosecurity-magazine.com |
| Operation Endgame | Europol | europol.europa.eu |
Vulnerabilities
| CVE Identifier | Description | Link |
|---|---|---|
| CVE-2025-68613 | n8n RCE (CVSS 9.9) | nvd.nist.gov |
| CVE-2025-55182 | React Server Components RCE | nvd.nist.gov |
| CVE-2025-31324 | SAP NetWeaver File Upload (CVSS 10.0) | nvd.nist.gov |
| CVE-2024-4577 | PHP CGI Argument Injection | nvd.nist.gov |
| CVE-2024-36401 | GeoServer OGC Filter RCE | nvd.nist.gov |
| CVE-2024-21899 | QNAP NAS Authentication Bypass | nvd.nist.gov |
| CVE-2023-44487 | HTTP/2 Rapid Reset DoS | nvd.nist.gov |
| CVE-2023-1389 | TP-Link Archer Command Injection | nvd.nist.gov |
| CVE-2021-41773 | Apache HTTP Server Path Traversal | nvd.nist.gov |
| CVE-2021-42013 | Apache HTTP Server Path Traversal | nvd.nist.gov |
| CVE-2021-36260 | Hikvision Command Injection | nvd.nist.gov |
| CVE-2021-35395 | Realtek SDK Buffer Overflow | nvd.nist.gov |
| CVE-2020-3452 | Cisco ASA/FTD Path Traversal | nvd.nist.gov |
| CVE-2020-0796 | SMBGhost RCE | nvd.nist.gov |
| CVE-2019-20933 | InfluxDB Authentication Bypass | nvd.nist.gov |
| CVE-2019-16278 | Nostromo nhttpd RCE | nvd.nist.gov |
| CVE-2018-20062 | ThinkPHP RCE | nvd.nist.gov |
| CVE-2017-9841 | PHPUnit RCE | nvd.nist.gov |
| CVE-2016-1555 | Netgear Command Injection | nvd.nist.gov |
| CVE-2014-6271 | Shellshock (Bash RCE) | nvd.nist.gov |
| CISA KEV Catalog | Known Exploited Vulnerabilities | cisa.gov |