Operate more efficiently, reduce complexity, improve EBITDA, and much more with the purpose-built platform for MSPs.
Protect and defend what matters most to your clients and stakeholders with ConnectWise's best-in-class cybersecurity and BCDR solutions.
Leverage generative AI and RPA workflows to simplify and streamline the most time-consuming parts of IT.
Join fellow IT pros at ConnectWise industry & customer events!
Check out our online learning platform, designed to help IT service providers get the most out of ConnectWise products and services.
Search our resource center for the latest MSP ebooks, white papers, infographics, webinars and more!
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
Welcome to the October 2025 edition of the ConnectWise Cyber Research Unit™ (CRU) Monthly Threat Brief. This report provides a comprehensive look at the most significant cybersecurity developments impacting the IT services and SMB landscape. We break down the month’s top stories, critical vulnerabilities, and prevalent malware families to help you stay informed and prepared in an evolving threat environment. We have also begun adding descriptions of all the new detection signatures added to the ConnectWise SIEM™.
A newly disclosed vulnerability in the Unity Runtime (CVE-2025-59489) allows attackers to execute arbitrary code within Unity-built applications by exploiting how the engine handles command-line arguments and Android intents. Discovered by RyotaK of GMO Flatt Security, the flaw originates from Unity’s debugging infrastructure, which automatically registers external intent handlers without sufficient validation.
By manipulating the “xrsdk-pre-init-library” argument, intended for internal use, attackers can trick Unity into dynamically loading malicious native libraries using “dlopen”, effectively executing code in the context of the legitimate application. The issue affects all Unity versions from 2017.1 through 6000.3 across Android, Windows, Linux, and macOS, and is particularly dangerous on Android, where other apps can exploit it without user interaction. Given Unity’s dominance in mobile and cross-platform development, millions of applications, including popular games such as “Among Us” and “Pokémon GO,” may be at risk.
Unity has released patches for versions 2019.1 and later, alongside a binary patching utility for developers unable to rebuild immediately. However, patching remains complex and time-sensitive, especially for apps using anti-tamper or anti-cheat systems that block binary modification. For MSPs, this vulnerability demands urgent action: Audit client environments for Unity-based applications, coordinate with vendors or in-house developers to rebuild or patch affected software, and apply safelisting controls on sensitive systems. With full technical details now public, attackers are likely to weaponize this flaw soon. MSPs should prioritize remediation for Unity applications with elevated privileges or access to sensitive data to reduce the risk of privilege escalation or code execution attacks.
The ConnectWise CRU analyzed an incident where a multi-stage loader chain (ClearFake → Emmenhtal → HijackLoader) ultimately delivered a malicious Chromium extension that steals cryptocurrency by swapping QR-code destinations to attacker-controlled addresses. Initial access was via a ClearFake/ClickFix social-engineering lure that convinced victims to run PowerShell, leading to Emmenhtal bypassing security and injecting shellcode into explorer.exe.
That shellcode dropped HijackLoader, which established persistence (scheduled task), then staged multiple process-hollowing steps using legitimate binaries to deploy a final payload: A browser-extension bundle placed under “C:\ProgramData\Direct\swapper\” and launched by edited Chromium shortcuts (added command-line args to load the malicious extension and disable other extensions). The extension supports modular redirects, iframe overlays, and arbitrary JS injection, but its standout capability is detecting on-page QR codes and overlaying attacker QR images (and reporting swaps to C2), a novel combination of virtual QR manipulation and traditional clipboard/address-replacement tactics. Several inactive fake wallet extensions were also dropped alongside the QR-swapping module, apparently intended to act as replacement wallet UIs if activated.
Operationally, the samples tested are largely nonfunctional on up-to-date Google Chrome due to Manifest V3 and the disabling of “--load-extension” and “--disable-extensions” flags, but other Chromium-based browsers may still be vulnerable. Evidence links the extension to the Acreed infostealer ecosystem, shared C2 domains, overlapping IOCs, and code similarities with a GitHub repository, which suggests the extension may be an Acreed module or companion payload.
Antivirus products appear to be removing the extension files from “swapper”, but leftover modified shortcuts persist and still attempt to load removed payloads. The chain’s use of fileless stages, process hollowing, and scheduled-task persistence complicates detection and recovery, and the combination of QR overlay and clipboard/address tampering represents a dangerous evolution in crypto-theft tooling that defenders should treat as high priority.
A new ClickFix campaign is exploiting TikTok’s viral format to distribute info-stealing malware by masquerading as software activation tutorials. The videos instruct users to run a PowerShell command that connects to a remote domain and downloads additional payloads, typically Aura Stealer and a secondary .NET-based injector. Once executed, Aura Stealer harvests browser credentials, cookies, crypto wallets, and application logins, while the .NET payload compiles and injects further code in memory to evade detection.
This approach combines polished, AI-generated TikTok content with trusted branding like Windows and Adobe, creating a potent form of social engineering that requires no exploit, only user interaction. Researchers have also identified related variants deploying other well-known infostealers such as Vidar, StealC, and Latrodectus.
The campaign underscores how social media is being weaponized as an initial access vector. Because the infection chain relies entirely on user execution rather than exploiting vulnerabilities, it easily bypasses traditional network defenses. For MSPs, this emphasizes the need to combine user education with tighter PowerShell controls and behavioral endpoint detection. Organizations should restrict PowerShell execution, enforce logging, monitor for in-memory injection, and strengthen credential hygiene through MFA. Ultimately, this wave of TikTok-driven malware highlights the growing intersection between social engineering and influencer-style content, where trust and familiarity become the attacker’s most effective tools.
A critical remote code execution vulnerability in Windows Server Update Services (CVE-2025-59287) allows unauthenticated attackers to execute arbitrary code on WSUS servers, threatening the integrity of patch distribution systems. The flaw, rated CVSS 9.8, stems from unsafe object deserialization in a legacy WSUS component and can be exploited via a single crafted request, no credentials or user interaction required. A compromised WSUS server effectively gives attackers a trusted delivery mechanism to push malicious code across entire client environments. While Microsoft initially patched the issue during Patch Tuesday, a subsequent out-of-band update was required after the first fix proved insufficient. Because WSUS servers often have privileged access and distribute software to hundreds or thousands of endpoints, a successful exploit could lead to mass compromise, backdoor insertion, and manipulation of legitimate update packages.
For MSPs, the implications are severe: A single exploited WSUS instance could cascade across multiple customer networks, resulting in widespread endpoint compromise, ransomware propagation, and supply chain contamination. Traditional endpoint defenses offer little protection, as the attack bypasses user interaction entirely. MSPs must immediately patch WSUS servers with the latest out-of-band update, enforce strict network segmentation, disable unnecessary internet exposure, and implement continuous monitoring for anomalous WSUS behavior.
This vulnerability underscores the importance of treating patch management infrastructure as a Tier 0 asset, on par with domain controllers and VPN gateways, requiring hardened configurations, forensic visibility, and ongoing validation to preserve client trust and service integrity.
AI-assisted coding tools are transforming software development speed and scale, but also amplifying existing security flaws. Aikido Security’s latest report found that nearly 70% of organizations have discovered vulnerabilities in AI-generated code, and one in five have suffered serious incidents tied to it. The issue isn’t new exploit types but the faster, less visible reproduction of long-standing flaws like XSS, input validation failures, and access-control errors. As CISA’s former director Jen Easterly noted, “We don’t have a cybersecurity problem—we have a software quality problem.”
The challenge lies in the collision between automation and oversight: Developers increasingly rely on AI to write and fix code, yet 65% admit to disabling security tools due to deadline pressure and alert fatigue. Larger tool stacks compound the issue, as overlapping security platforms create slower remediation and more false positives. Meanwhile, the unclear provenance of AI-generated code blurs accountability, raising the risk that critical vulnerabilities persist unpatched.
For MSPs, the rise of AI-driven development introduces a new form of hidden risk: Code that is deployed, modified, or fixed by AI with little or no documentation. Without visibility into code lineage, MSPs may inherit vulnerabilities they didn’t create but will be expected to remediate. The operational impact is significant: Faster deployment cycles mean vulnerabilities reach production sooner, and multi-client MSP environments already strained by alert fatigue face longer remediation times.
To mitigate risk, MSPs must treat AI-generated code like any third-party dependency, requiring labeling, provenance tracking, and layered review with both automated scanning and human validation. Security education and process discipline are key. AI can accelerate innovation, but only when paired with deliberate, transparent oversight. MSPs who integrate these controls into their service models will be better positioned to manage the growing security debt of AI-assisted software development.
This section leverages the Diamond Model of Intrusion Analysis to structure the examination of recent malware activity, providing a clear analytical framework that links adversary, capabilities, infrastructure, and victimology. By applying the Diamond Model, we can better contextualize malicious behavior, identify patterns across campaigns, and highlight the relationships between threat actors, tools, and targeted entities.
The ransomware‑as‑a‑service (RaaS) group Akira first emerged in March 2023 and has since carved out a significant niche in the global threat landscape. According to a detailed risk‑brief from October 2025, the group routinely conducts double‑extortion attacks, stealing data before encrypting victim environments, and then threatening publication of the stolen material if payment is not rendered. Its modus operandi includes cross‑platform targeting (Windows, Linux, VMware ESXi) and high‑speed intrusion‑to‑encryption timelines.
Recent threat intelligence from October 2025 reflects a sustained surge in Akira activity. For example, security firms report that the group has increasingly exploited VPN and edge‑device infrastructure for initial access, particularly SonicWall SSL VPN appliances and firewalls. Notably, the ConnectWise CRU has observed threat actors deploying Akira payloads after exploiting compromised SonicWall SSL VPN devices. This correlates directly with SonicWall’s own advisory about the exploitation of CVE‑2024‑40766 and misconfigured credentials or migrations from Gen 6 to Gen 7 firewalls. In one October report, more than 100 SSL VPN accounts across 16 environments were accessed, with Akira used to encrypt systems very rapidly thereafter.
Aliases
Infrastructure
Recent IOCs
| Related File(s) | |
| SHA256 | Filename(s) |
| 0408a25c557308d9820d48f7c8fbfe185002f376c9595d2c1ac8d33a3c7f6523 | GhinAutoPlay.EXE |
| 23d0b0a9e1715f3fac4440f8e7669044b2c4f82e33a9bfa2c94d90a76c6855ed | GHINTld.EXE |
| Related Domain Name(s) | |
| arnoldshrad[.]com | |
| Related IP Address(es) | |
| 84.32.84[.]32 | |
Victimology
Capabilities
MITRE ATT&CK Techniques
| Tactic | Technique ID | Technique Name |
| Initial Access | T1078 | Valid Accounts |
| Initial Access | T1190 | Exploit Public-Facing Application |
| Initial Access | T1133 | External Remote Services |
| Initial Access | T1566.001 | Phishing: Spearphishing Attachment |
| Initial Access | T1566.002 | Phishing: Spearphishing Link |
| Credential Access | T1003 | OS Credential Dumping |
| Credential Access | T1003.001 | OS Credential Dumping: LSASS Memory |
| Discovery | T1016 | System Network Configuration Discovery |
| Discovery | T1082 | System Information Discovery |
| Discovery | T1482 | Domain Trust Discovery |
| Discovery | T1057 | Process Discovery |
| Discovery | T1069.001 | Permission Groups Discovery: Local Groups |
| Discovery | T1069.002 | Permission Groups Discovery: Domain Groups |
| Discovery | T1018 | Remote System Discovery |
| Persistence | T1136.002 | Create Account: Domain Account |
| Defense Evasion | T1562.001 | Impair Defenses: Disable or Modify Tools |
| Command and Control | T1219 | Remote Access Software |
| Command and Control | T1090 | Proxy |
| Collection | T1560.001 | Archive Collected Data: Archive via Utility |
| Exfiltration | T1048 | Exfiltration Over Alternative Protocol |
| Exfiltration | T1537 | Transfer Data to Cloud Account |
| Exfiltration | T1567.002 | Exfiltration Over Web Service: Exfiltration to Cloud Storage |
| Impact | T1486 | Data Encrypted for Impact |
| Impact | T1490 | Inhibit System Recovery |
| Impact | T1657 | Financial Theft |
KongTuke is a traffic distribution system (TDS) first observed in 2024, primarily leveraging compromised WordPress sites to redirect users to malicious payloads. It injects JavaScript into legitimate websites, creating redirection chains that lead to fake update pages or direct malware delivery. KongTuke is known for distributing a variety of threats, including loaders such as D3F@ck, MintsLoader, WARMCOOKIE, and ransomware variants such as Rhysida and Interlock. Its infrastructure allows attackers to deliver context-aware payloads while maintaining evasion through wide distribution and layered redirection mechanisms.
As of October 2025, KongTuke remains an active and prevalent threat. Red Canary ranked it as the second most observed threat in its September/October intel report, highlighting its continued use in widespread malware campaigns. While no novel TTPs were disclosed for the month, ongoing abuse of WordPress CMS platforms and redirection infrastructure shows sustained activity. KongTuke’s role as an initial access and payload delivery vector underscores the need for defenders to monitor for script injections, anomalous redirects, and web server compromise, particularly within unmanaged or outdated web infrastructure.
Aliases
Infrastructure
Recent IOCs
| Related File(s) | |
| SHA256 | Filename(s) |
| 91c321fef04c30e2840e98b2f51196d765ddd0e09b9c9e1accda8a92f083c933 | scriptv2.ps1 |
| 2ce638b8c791b23cc353c44d90794af22b719be3d841e3bf4a0e63f1b016d81c | main.ps1 |
| dc73bf970b1ddc0809e6e8f9d58dbb2d9d2f56c2642bcbb4a0f0f0729ed9dca7 | script.ps1 |
| Related IP Address(es) | |
| 64.7.199[.]155 | |
| 144.31.221[.]127 | |
Victimology
Capabilities
MITRE ATT&CK Techniques
| Tactic | Technique ID | Technique Name |
| Initial Access | T1189 | Drive-by Compromise |
| Execution | T1059.007 | Command and Scripting Interpreter: JavaScript |
| Execution | T1203 | Exploitation for Client Execution |
| Execution | T1204.004 | User Execution: Malicious Copy and Paste |
| Execution | T1106 | Native API |
| Defense Evasion | T1564.003 | Hide Artifacts: Hidden Window |
| Defense Evasion | T1202 | Indirect Command Execution |
| Defense Evasion | T1112 | Modify Registry |
| Defense Evasion | T1027 | Obfuscated Files or Information |
| Discovery | T1082 | System Information Discovery |
| Discovery | T1018 | Remote System Discovery |
| Discovery | T1518 | Software Discovery |
SocGholish, also known as “FakeUpdates,” is a long-running JavaScript-based malware loader active since at least 2017, commonly attributed to the TA569 threat actor. It typically spreads through compromised legitimate websites, where it displays fake browser or application update prompts to unsuspecting users. Once executed, the fake update downloads a malicious JavaScript payload that acts as a loader for further malware, commonly stealers, remote access tools (RATs), or ransomware affiliates. SocGholish is often linked with larger intrusion operations, sometimes acting as an initial access vector for follow-on access brokers or ransomware groups such as those leveraging the RansomHub framework.
As of October 2025, SocGholish remains active and continues to evolve in its delivery methods. Recent threat intelligence from Red Canary and Trustwave confirms it is still widely distributed through compromised websites and traffic distribution systems (TDS) such as Keitaro and Parrot TDS, which tailor the malicious redirections to specific targets. Notably, the CRU has observed recent campaigns where SocGholish was used in tandem with MintsLoader, acting as a dropper chain that enables payload staging and follow-on infections.
Aliases
Infrastructure
Recent IOCs
| Related File(s) | |
| SHA256 | Filename(s) |
| 438daa4bd754feb0df1edcf2b74c35b25aeac365044adc40f3aa6b707cbc7bdc | New Version (CLICK).js |
| cf5c97bddb5b2719ea2b344a5bf38f903846e4436d2302bae1612199a3fab457 | New Version (CLICK).js |
| b734e830f0ff35070c59e33083692e9b13692810ee87122194fbcb43933beac2 | New Version (CLICK).js |
| 635b39fc783bd70ab8cf032b52eea2508805dcb95df239d7f1b8590daa2d076e | New Version (CLICK) (1).js |
| af1f60be66b361fb1d63c38f4a44123116f1f82cf09155867a9f58b0ac0b0eb7 | New Version (CLICK).js |
| 9ad60e5ad66e299a2c660d17fef0b6055d437bfc0c2c37df510e4a0fdfd6670d | Click to Install New Version.js |
| 1b43c96f568338d334ed5ee2aec569bcdb309bff93b89ced9a2b439bf1a9ddc3 | Click to Install New Version.js |
| bf9858833d82c7864be1c6de85fa3b7be23b646db6e153f8f9ed91c66118b2a5 | Click to Install New Version.js |
| 705d11a0e19699eed5e5a2a39c567b7c64cc9823f515afd492ca0bb78b9159aa | Click to Install New Version.js |
| Related Domain Name(s) | |
| yvhi21[.]top | |
| register.toastmasters86[.]org | |
| s8yhgv8ebat[.]top | |
| global.coachmyresume[.]com | |
| dyvbz361[.]top | |
| onboard.veranobuilders[.]com | |
| ryvnx9373[.]top | |
| panel.futurainternationalrealty[.]com | |
| Related IP Address(es) | |
| 173.44.141[.]44 | |
| 45.41.187[.]31 | |
Victimology
Capabilities
MITRE ATT&CK Techniques
| Tactic | Technique ID | Technique Name |
| Resource Development | T1608.006 | Stage Capabilities: SEO Poisoning |
| Initial Access | T1189 | Drive-by Compromise |
| Execution | T1059.001 | Command and Scripting Interpreter: PowerShell |
| Execution | T1059.007 | Command and Scripting Interpreter: JavaScript |
| Execution | T1204.002 | User Execution: Malicious File |
| Persistence | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
| Discovery | T1482 | Domain Trust Discovery |
| Discovery | T1087.001 | Account Discovery: Local Account |
| Discovery | T1087.002 | Account Discovery: Domain Account |
| Discovery | T1069.002 | Permission Groups Discovery: Domain Groups |
| Discovery | T1082 | System Information Discovery |
| Discovery | T1018 | Remote System Discovery |
| Discovery | T1069.001 | Permission Groups Discovery: Local Groups |
| Discovery | T1033 | System Owner/User Discover |
| Command and Control | T1105 | Ingress Tool Transfer |
| Credential Access | T1555 | Credentials from Password Stores |
ClearFake is a malicious JavaScript-based framework first identified in mid-2023 that leverages compromised websites, primarily WordPress, to deliver payloads through social engineering and script injection. Originally focused on fake browser update lures, ClearFake has since evolved to incorporate more deceptive tactics, such as fake CAPTCHA/Cloudflare Turnstile pages and the “ClickFix” method, which manipulates users into executing PowerShell commands.
Notably, it also uses blockchain-based hosting mechanisms (e.g., “EtherHiding” via Binance Smart Chain) to retrieve malicious scripts, making traditional detection more difficult. ClearFake has been observed distributing a range of threats, including info-stealers such as Lumma and Vidar, and loaders such as Emmenhtal (also known as PEAKLIGHT).
As of October 2025, ClearFake remains a prevalent and adaptable delivery mechanism in the malware ecosystem. Recent analysis by the CRU confirmed active campaigns where ClearFake was used in conjunction with the Emmenhtal loader, illustrating its continued role in multi-stage attack chains. These campaigns typically began with users visiting a compromised site and interacting with a ClearFake lure, which then fetched secondary payloads through obfuscated JavaScript, ultimately delivering Emmenhtal for follow-on access or additional malware deployment. This sustained activity highlights ClearFake’s value to threat actors seeking stealthy, flexible distribution at scale.
Aliases
Infrastructure
Recent IOCs
| Related File(s) | |
| SHA256 | Filename(s) |
| 6fca6af282da62653e5f7b6970329c0681b47208912105f87a0a8d24816c05bc | 7yx46ynsyo[1].md5 6dt5b1dj91[1].md5 |
| 7dd53099640f2822c6c8e858e568d8c15ec5077c129f46af584b37d0b2d3f955 | v9d1cq3mnr.md5 dr5rqawzw3.md5 |
| 241110434ceb37d5028a0c035e7dabf7bd316c045a677eb2dc720b7080425e92 | s4eg6t1o90.md5 j0qxul66ox.md5 |
| Related Domain Name(s) |
|
| d.i-433[.]ru | |
| xt.n0y8j[.]ru | |
| unpopularnational[.]com | |
| mi.barbertingling[.]com | |
| ede3.vototao9[.]ru | |
| m7.n6e8h[.]ru | |
| m8.mexizo[.]ru | |
| pdfs.vototao9[.]ru | |
| p.henyta[.]ru | |
| t1n.w9k6m9[.]ru | |
| gfjl.ba5eq[.]ru | |
| io.comecola[.]digital | |
| kv.mt-3-o-4[.]ru | |
| eyzl.ba5eq[.]ru | |
| mi.limpingbronco[.]com | |
| Related IP Address(es) | |
| 178.17.53[.]49 | |
Victimology
Capabilities
MITRE ATT&CK Techniques
| Tactic | Technique ID | Technique Name |
| Initial Access | T1189 | Drive-by Compromise |
| Command and Control | T1102 | Web Service |
| Execution | T1059.001 | Command and Scripting Interpreter: PowerShell |
| Defense Evasion | T1027.010 | Obfuscated Files or Information: Command Obfuscation |
| Execution | T1059.007 | Command and Scripting Interpreter: JavaScript |
| Resource Development | T1584 | Compromise Infrastructure |
| Defense Evasion | T1027 | Obfuscated Files or Information |
| Command and Control | T1132.001 | Data Encoding: Standard Encoding |
| Defense Evasion | T1036 | Masquerading |
| Defense Evasion | T1140 | Deobfuscate/Decode Files or Information |
| Exfiltration | T1041 | Exfiltration Over C2 Channel |
| Command and Control | T1071.001 | Application Layer Protocol: Web Protocols |
| Command and Control | T1105 | Ingress Tool Transfer |
| Defense Evasion | T1574.001 | Hijack Execution Flow: DLL |
| Defense Evasion | T1218.005 | System Binary Proxy Execution: Mshta |
The following is a list of new detection signatures added to the ConnectWise SIEM in October 2025.
[CRU][Windows] HookSignTool Root CA Certificate Registry Installation
This detection identifies attempts to install the HookSignTool Root CA certificate directly into the Windows registry. This alert indicates potential abuse of HookSignTool, a tool known to manipulate code-signing certificate dates, often used in Lynx ransomware incidents. The certificate is installed by writing a registry key with a known thumbprint (E403A1DFC8F377E0F4AA43A83EE9EA079A1F55F2) under the SystemCertificates path. This detection highlights a reliable indicator of compromise tied to malicious certificate installation via registry manipulation.
[EA][CRU][Windows] Logs cleared using EventLogSession via PowerShell
Using the .NET class EventLogSession via PowerShell is an uncommon method of clearing logs. Such activities may indicate attackers trying to evade detection or destroy forensic evidence on a system. Any surrounding activity should be investigated immediately.
[EA][CRU][Windows][LOLBAS] Suspicious mshta execution
Mshta.exe is a living off the land binary (LOLBin) used to download and run malicious scripts with fewer security features than the context of an internet browser. Any surrounding activity should be investigated. Reference: https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSBinaries/Mshta.yml
[EA][CRU][Windows] Powershell run with truncated UseBasicParsing parameter
Prior to PowerShell version 6.0, Internet Explorer was required to run Invoke-Webrequest without the -UseBasicParsing parameter. Attackers will include the parameter due to the prevalence of versions <6.0 on victim machines, and one method of evading detection is truncating the parameter (useb...).
[EA][CRU][Windows] Powershell Command Obfuscation via cmd escape character
Cmd.exe allows escaping special characters using carets (^), but any character can be escaped. Attackers have been observed inserting carets in malicious cmd commands in attempts to evade detection. Surrounding activity for this user should be investigated.
[EA][CRU][Windows] Possibly renamed rclone
Rclone is a tool for synchronizing files that has been abused for data exfiltration. Attackers have been observed renaming the rclone executable in attempts to evade detection. Any surrounding activity should be investigated.
[CRU][Windows] AppSuite ManualFinder InfoStealer Execution
Detects the AppSuite executable “ManualFinder” being run. This software has been used by threat actors as an infostealer and backdoor to steal credentials, run arbitrary commands, and establish persistence. Using the values displayed from “process.pid” and “process.parent.pid” can be used to isolate an execution chain.
[CRU][Windows] AppSuite PDF Editor InfoStealer Execution
Detects execution of “PDF Editor” used by threat actors as an infostealer and backdoor to steal credentials and run arbitrary commands. Command flags observed can allow this software to read browser keys, change browser settings, execute arbitrary commands, or kill specific processes. Using the values displayed from “process.pid” and “process.parent.pid” can be used to isolate an execution chain. Reference: https://www.gdatasoftware.com/blog/2025/08/38257-appsuite-pdf-editor-backdoor-analysis
[CRU][Windows] Attempted WSUS Remote Code Execution Exploitation (CVE-2025-59287)
Detects attempts to exploit a critical vulnerability in Microsoft Windows Server Update Services. CVE-2025-59287 is a critical RCE vulnerability caused by unsafe deserialization of AuthorizationCookie data through BinaryFormatter in the EncryptionHelper.DecryptData() method. The vulnerability allows an unauthenticated attacker to achieve remote code execution with SYSTEM privileges by sending malicious encrypted cookies to the GetCookie() endpoint.