PSA and RMM

Solve any challenge with one platform

Operate more efficiently, reduce complexity, improve EBITDA, and much more with the purpose-built platform for MSPs.

Cybersecurity and Data Protection

Ensure security and business continuity, 24/7

Protect and defend what matters most to your clients and stakeholders with ConnectWise's best-in-class cybersecurity and BCDR solutions.

Automation and Integrations

Integrate and automate to unlock cost savings

Leverage generative AI and RPA workflows to simplify and streamline the most time-consuming parts of IT.

University

University Log-In

Check out our online learning platform, designed to help IT service providers get the most out of ConnectWise products and services.

About Us

Experience the ConnectWise Way

Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.

News and Press

Experience the ConnectWise Way

Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.

ConnectWise

11/20/2025 | 17 Minute Read

Monthly Threat Brief: October 2025

Topics:

Contents

    Ready to dive even deeper?

    Check out the 2025 MSP Threat Report for an in-depth analysis of overall trends.

    Welcome to the October 2025 edition of the ConnectWise Cyber Research Unit™ (CRU) Monthly Threat Brief. This report provides a comprehensive look at the most significant cybersecurity developments impacting the IT services and SMB landscape. We break down the month’s top stories, critical vulnerabilities, and prevalent malware families to help you stay informed and prepared in an evolving threat environment. We have also begun adding descriptions of all the new detection signatures added to the ConnectWise SIEM™.

    Top stories for October 2025

    Arbitrary Code Execution Vulnerability in Unity Runtime Affects Thousands of Games

    A newly disclosed vulnerability in the Unity Runtime (CVE-2025-59489) allows attackers to execute arbitrary code within Unity-built applications by exploiting how the engine handles command-line arguments and Android intents. Discovered by RyotaK of GMO Flatt Security, the flaw originates from Unity’s debugging infrastructure, which automatically registers external intent handlers without sufficient validation.

    By manipulating the “xrsdk-pre-init-library” argument, intended for internal use, attackers can trick Unity into dynamically loading malicious native libraries using “dlopen”, effectively executing code in the context of the legitimate application. The issue affects all Unity versions from 2017.1 through 6000.3 across Android, Windows, Linux, and macOS, and is particularly dangerous on Android, where other apps can exploit it without user interaction. Given Unity’s dominance in mobile and cross-platform development, millions of applications, including popular games such as “Among Us” and “Pokémon GO,” may be at risk.

    Unity has released patches for versions 2019.1 and later, alongside a binary patching utility for developers unable to rebuild immediately. However, patching remains complex and time-sensitive, especially for apps using anti-tamper or anti-cheat systems that block binary modification. For MSPs, this vulnerability demands urgent action: Audit client environments for Unity-based applications, coordinate with vendors or in-house developers to rebuild or patch affected software, and apply safelisting controls on sensitive systems. With full technical details now public, attackers are likely to weaponize this flaw soon. MSPs should prioritize remediation for Unity applications with elevated privileges or access to sensitive data to reduce the risk of privilege escalation or code execution attacks.

    Malicious Chromium Extension Steals Cryptocurrency via QR Codes

    The ConnectWise CRU analyzed an incident where a multi-stage loader chain (ClearFake → Emmenhtal → HijackLoader) ultimately delivered a malicious Chromium extension that steals cryptocurrency by swapping QR-code destinations to attacker-controlled addresses. Initial access was via a ClearFake/ClickFix social-engineering lure that convinced victims to run PowerShell, leading to Emmenhtal bypassing security and injecting shellcode into explorer.exe.

    That shellcode dropped HijackLoader, which established persistence (scheduled task), then staged multiple process-hollowing steps using legitimate binaries to deploy a final payload: A browser-extension bundle placed under “C:\ProgramData\Direct\swapper\” and launched by edited Chromium shortcuts (added command-line args to load the malicious extension and disable other extensions). The extension supports modular redirects, iframe overlays, and arbitrary JS injection, but its standout capability is detecting on-page QR codes and overlaying attacker QR images (and reporting swaps to C2), a novel combination of virtual QR manipulation and traditional clipboard/address-replacement tactics. Several inactive fake wallet extensions were also dropped alongside the QR-swapping module, apparently intended to act as replacement wallet UIs if activated.

    Operationally, the samples tested are largely nonfunctional on up-to-date Google Chrome due to Manifest V3 and the disabling of “--load-extension” and “--disable-extensions” flags, but other Chromium-based browsers may still be vulnerable. Evidence links the extension to the Acreed infostealer ecosystem, shared C2 domains, overlapping IOCs, and code similarities with a GitHub repository, which suggests the extension may be an Acreed module or companion payload.

    Antivirus products appear to be removing the extension files from “swapper”, but leftover modified shortcuts persist and still attempt to load removed payloads. The chain’s use of fileless stages, process hollowing, and scheduled-task persistence complicates detection and recovery, and the combination of QR overlay and clipboard/address tampering represents a dangerous evolution in crypto-theft tooling that defenders should treat as high priority.

    TikTok “Activation Hacks” Are Luring Users into Running Infostealers

    A new ClickFix campaign is exploiting TikTok’s viral format to distribute info-stealing malware by masquerading as software activation tutorials. The videos instruct users to run a PowerShell command that connects to a remote domain and downloads additional payloads, typically Aura Stealer and a secondary .NET-based injector. Once executed, Aura Stealer harvests browser credentials, cookies, crypto wallets, and application logins, while the .NET payload compiles and injects further code in memory to evade detection.

    This approach combines polished, AI-generated TikTok content with trusted branding like Windows and Adobe, creating a potent form of social engineering that requires no exploit, only user interaction. Researchers have also identified related variants deploying other well-known infostealers such as Vidar, StealC, and Latrodectus.

    The campaign underscores how social media is being weaponized as an initial access vector. Because the infection chain relies entirely on user execution rather than exploiting vulnerabilities, it easily bypasses traditional network defenses. For MSPs, this emphasizes the need to combine user education with tighter PowerShell controls and behavioral endpoint detection. Organizations should restrict PowerShell execution, enforce logging, monitor for in-memory injection, and strengthen credential hygiene through MFA. Ultimately, this wave of TikTok-driven malware highlights the growing intersection between social engineering and influencer-style content, where trust and familiarity become the attacker’s most effective tools.

    Critical RCE in WSUS Trigger Out-of-Band Patch

    A critical remote code execution vulnerability in Windows Server Update Services (CVE-2025-59287) allows unauthenticated attackers to execute arbitrary code on WSUS servers, threatening the integrity of patch distribution systems. The flaw, rated CVSS 9.8, stems from unsafe object deserialization in a legacy WSUS component and can be exploited via a single crafted request, no credentials or user interaction required. A compromised WSUS server effectively gives attackers a trusted delivery mechanism to push malicious code across entire client environments. While Microsoft initially patched the issue during Patch Tuesday, a subsequent out-of-band update was required after the first fix proved insufficient. Because WSUS servers often have privileged access and distribute software to hundreds or thousands of endpoints, a successful exploit could lead to mass compromise, backdoor insertion, and manipulation of legitimate update packages.

    For MSPs, the implications are severe: A single exploited WSUS instance could cascade across multiple customer networks, resulting in widespread endpoint compromise, ransomware propagation, and supply chain contamination. Traditional endpoint defenses offer little protection, as the attack bypasses user interaction entirely. MSPs must immediately patch WSUS servers with the latest out-of-band update, enforce strict network segmentation, disable unnecessary internet exposure, and implement continuous monitoring for anomalous WSUS behavior.

    This vulnerability underscores the importance of treating patch management infrastructure as a Tier 0 asset, on par with domain controllers and VPN gateways, requiring hardened configurations, forensic visibility, and ongoing validation to preserve client trust and service integrity.

    AI-Generated Code: The Hidden Security Debt of Automated Development

    AI-assisted coding tools are transforming software development speed and scale, but also amplifying existing security flaws. Aikido Security’s latest report found that nearly 70% of organizations have discovered vulnerabilities in AI-generated code, and one in five have suffered serious incidents tied to it. The issue isn’t new exploit types but the faster, less visible reproduction of long-standing flaws like XSS, input validation failures, and access-control errors. As CISA’s former director Jen Easterly noted, “We don’t have a cybersecurity problem—we have a software quality problem.”

    The challenge lies in the collision between automation and oversight: Developers increasingly rely on AI to write and fix code, yet 65% admit to disabling security tools due to deadline pressure and alert fatigue. Larger tool stacks compound the issue, as overlapping security platforms create slower remediation and more false positives. Meanwhile, the unclear provenance of AI-generated code blurs accountability, raising the risk that critical vulnerabilities persist unpatched.

    For MSPs, the rise of AI-driven development introduces a new form of hidden risk: Code that is deployed, modified, or fixed by AI with little or no documentation. Without visibility into code lineage, MSPs may inherit vulnerabilities they didn’t create but will be expected to remediate. The operational impact is significant: Faster deployment cycles mean vulnerabilities reach production sooner, and multi-client MSP environments already strained by alert fatigue face longer remediation times.

    To mitigate risk, MSPs must treat AI-generated code like any third-party dependency, requiring labeling, provenance tracking, and layered review with both automated scanning and human validation. Security education and process discipline are key. AI can accelerate innovation, but only when paired with deliberate, transparent oversight. MSPs who integrate these controls into their service models will be better positioned to manage the growing security debt of AI-assisted software development.

    Top threats in October 2025

    The Diamond Model

    This section leverages the Diamond Model of Intrusion Analysis to structure the examination of recent malware activity, providing a clear analytical framework that links adversary, capabilities, infrastructure, and victimology. By applying the Diamond Model, we can better contextualize malicious behavior, identify patterns across campaigns, and highlight the relationships between threat actors, tools, and targeted entities.

    Akira

    The ransomware‑as‑a‑service (RaaS) group Akira first emerged in March 2023 and has since carved out a significant niche in the global threat landscape. According to a detailed risk‑brief from October 2025, the group routinely conducts double‑extortion attacks, stealing data before encrypting victim environments, and then threatening publication of the stolen material if payment is not rendered. Its modus operandi includes cross‑platform targeting (Windows, Linux, VMware ESXi) and high‑speed intrusion‑to‑encryption timelines.

    Recent threat intelligence from October 2025 reflects a sustained surge in Akira activity. For example, security firms report that the group has increasingly exploited VPN and edge‑device infrastructure for initial access, particularly SonicWall SSL VPN appliances and firewalls. Notably, the ConnectWise CRU has observed threat actors deploying Akira payloads after exploiting compromised SonicWall SSL VPN devices. This correlates directly with SonicWall’s own advisory about the exploitation of CVE‑2024‑40766 and misconfigured credentials or migrations from Gen 6 to Gen 7 firewalls. In one October report, more than 100 SSL VPN accounts across 16 environments were accessed, with Akira used to encrypt systems very rapidly thereafter.  

    Aliases

    • Akira, Megazord, Redbike

    Infrastructure  

    Recent IOCs

    Related File(s)
    SHA256 Filename(s)
    0408a25c557308d9820d48f7c8fbfe185002f376c9595d2c1ac8d33a3c7f6523 GhinAutoPlay.EXE
    23d0b0a9e1715f3fac4440f8e7669044b2c4f82e33a9bfa2c94d90a76c6855ed GHINTld.EXE
    Related Domain Name(s)
    arnoldshrad[.]com
    Related IP Address(es)
    84.32.84[.]32

    Victimology

    • Recently targeted business sectors: Construction, realty, manufacturing

    Capabilities

    MITRE ATT&CK Techniques

    Tactic Technique ID Technique Name
    Initial Access   T1078   Valid Accounts
    Initial Access   T1190   Exploit Public-Facing Application
    Initial Access   T1133   External Remote Services
    Initial Access   T1566.001   Phishing: Spearphishing Attachment
    Initial Access   T1566.002   Phishing: Spearphishing Link
    Credential Access   T1003   OS Credential Dumping
    Credential Access   T1003.001   OS Credential Dumping: LSASS Memory
    Discovery   T1016   System Network Configuration Discovery
    Discovery   T1082   System Information Discovery
    Discovery   T1482   Domain Trust Discovery
    Discovery   T1057   Process Discovery
    Discovery   T1069.001   Permission Groups Discovery: Local Groups
    Discovery   T1069.002   Permission Groups Discovery: Domain Groups
    Discovery   T1018   Remote System Discovery
    Persistence   T1136.002   Create Account: Domain Account
    Defense Evasion   T1562.001   Impair Defenses: Disable or Modify Tools
    Command and Control   T1219   Remote Access Software
    Command and Control   T1090   Proxy
    Collection   T1560.001   Archive Collected Data: Archive via Utility
    Exfiltration   T1048   Exfiltration Over Alternative Protocol
    Exfiltration   T1537   Transfer Data to Cloud Account
    Exfiltration   T1567.002   Exfiltration Over Web Service: Exfiltration to Cloud Storage
    Impact   T1486   Data Encrypted for Impact
    Impact   T1490   Inhibit System Recovery
    Impact   T1657   Financial Theft

    KongTuke

    KongTuke is a traffic distribution system (TDS) first observed in 2024, primarily leveraging compromised WordPress sites to redirect users to malicious payloads. It injects JavaScript into legitimate websites, creating redirection chains that lead to fake update pages or direct malware delivery. KongTuke is known for distributing a variety of threats, including loaders such as D3F@ck, MintsLoader, WARMCOOKIE, and ransomware variants such as Rhysida and Interlock. Its infrastructure allows attackers to deliver context-aware payloads while maintaining evasion through wide distribution and layered redirection mechanisms.

    As of October 2025, KongTuke remains an active and prevalent threat. Red Canary ranked it as the second most observed threat in its September/October intel report, highlighting its continued use in widespread malware campaigns. While no novel TTPs were disclosed for the month, ongoing abuse of WordPress CMS platforms and redirection infrastructure shows sustained activity. KongTuke’s role as an initial access and payload delivery vector underscores the need for defenders to monitor for script injections, anomalous redirects, and web server compromise, particularly within unmanaged or outdated web infrastructure.  

    Aliases

    • LOandUpdate808, TAG-124

    Infrastructure

    Recent IOCs

    Related File(s)
    SHA256 Filename(s)
    91c321fef04c30e2840e98b2f51196d765ddd0e09b9c9e1accda8a92f083c933 scriptv2.ps1
    2ce638b8c791b23cc353c44d90794af22b719be3d841e3bf4a0e63f1b016d81c main.ps1
    dc73bf970b1ddc0809e6e8f9d58dbb2d9d2f56c2642bcbb4a0f0f0729ed9dca7 script.ps1
    Related IP Address(es)
    64.7.199[.]155
    144.31.221[.]127

    Victimology

    • Recently targeted business sectors: Engineering, marketing, communications, non-profit

    Capabilities

    MITRE ATT&CK Techniques

    Tactic Technique ID Technique Name
    Initial Access   T1189   Drive-by Compromise  
    Execution   T1059.007   Command and Scripting Interpreter: JavaScript
    Execution   T1203   Exploitation for Client Execution
    Execution   T1204.004   User Execution: Malicious Copy and Paste
    Execution   T1106   Native API
    Defense Evasion   T1564.003   Hide Artifacts: Hidden Window
    Defense Evasion   T1202   Indirect Command Execution
    Defense Evasion   T1112   Modify Registry
    Defense Evasion   T1027   Obfuscated Files or Information
    Discovery   T1082   System Information Discovery
    Discovery   T1018   Remote System Discovery
    Discovery   T1518   Software Discovery

    FAKEUPDATES/SocGholish

    SocGholish, also known as “FakeUpdates,” is a long-running JavaScript-based malware loader active since at least 2017, commonly attributed to the TA569 threat actor. It typically spreads through compromised legitimate websites, where it displays fake browser or application update prompts to unsuspecting users. Once executed, the fake update downloads a malicious JavaScript payload that acts as a loader for further malware, commonly stealers, remote access tools (RATs), or ransomware affiliates. SocGholish is often linked with larger intrusion operations, sometimes acting as an initial access vector for follow-on access brokers or ransomware groups such as those leveraging the RansomHub framework.

    As of October 2025, SocGholish remains active and continues to evolve in its delivery methods. Recent threat intelligence from Red Canary and Trustwave confirms it is still widely distributed through compromised websites and traffic distribution systems (TDS) such as Keitaro and Parrot TDS, which tailor the malicious redirections to specific targets. Notably, the CRU has observed recent campaigns where SocGholish was used in tandem with MintsLoader, acting as a dropper chain that enables payload staging and follow-on infections.  

    Aliases

    • SocGholish 

    Infrastructure

    Recent IOCs

    Related File(s)
    SHA256 Filename(s)
    438daa4bd754feb0df1edcf2b74c35b25aeac365044adc40f3aa6b707cbc7bdc New Version (CLICK).js
    cf5c97bddb5b2719ea2b344a5bf38f903846e4436d2302bae1612199a3fab457 New Version (CLICK).js
    b734e830f0ff35070c59e33083692e9b13692810ee87122194fbcb43933beac2 New Version (CLICK).js
    635b39fc783bd70ab8cf032b52eea2508805dcb95df239d7f1b8590daa2d076e New Version (CLICK) (1).js
    af1f60be66b361fb1d63c38f4a44123116f1f82cf09155867a9f58b0ac0b0eb7 New Version (CLICK).js
    9ad60e5ad66e299a2c660d17fef0b6055d437bfc0c2c37df510e4a0fdfd6670d Click to Install New Version.js
    1b43c96f568338d334ed5ee2aec569bcdb309bff93b89ced9a2b439bf1a9ddc3 Click to Install New Version.js
    bf9858833d82c7864be1c6de85fa3b7be23b646db6e153f8f9ed91c66118b2a5 Click to Install New Version.js
    705d11a0e19699eed5e5a2a39c567b7c64cc9823f515afd492ca0bb78b9159aa Click to Install New Version.js
    Related Domain Name(s)
    yvhi21[.]top
    register.toastmasters86[.]org
    s8yhgv8ebat[.]top
    global.coachmyresume[.]com
    dyvbz361[.]top
    onboard.veranobuilders[.]com
    ryvnx9373[.]top
    panel.futurainternationalrealty[.]com
    Related IP Address(es)
    173.44.141[.]44
    45.41.187[.]31

    Victimology

    • Recently targeted business sectors: Agriculture, manufacturing, attorneys, financial services, publishing

    Capabilities

    MITRE ATT&CK Techniques

    Tactic Technique ID Technique Name
    Resource Development   T1608.006   Stage Capabilities: SEO Poisoning
    Initial Access   T1189   Drive-by Compromise
    Execution   T1059.001   Command and Scripting Interpreter: PowerShell
    Execution   T1059.007   Command and Scripting Interpreter: JavaScript
    Execution   T1204.002   User Execution: Malicious File
    Persistence   T1547.001   Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder
    Discovery   T1482   Domain Trust Discovery
    Discovery   T1087.001   Account Discovery: Local Account
    Discovery   T1087.002   Account Discovery: Domain Account
    Discovery   T1069.002   Permission Groups Discovery: Domain Groups
    Discovery   T1082   System Information Discovery
    Discovery   T1018   Remote System Discovery
    Discovery   T1069.001   Permission Groups Discovery: Local Groups
    Discovery   T1033   System Owner/User Discover
    Command and Control   T1105   Ingress Tool Transfer
    Credential Access   T1555   Credentials from Password Stores

    ClearFake

    ClearFake is a malicious JavaScript-based framework first identified in mid-2023 that leverages compromised websites, primarily WordPress, to deliver payloads through social engineering and script injection. Originally focused on fake browser update lures, ClearFake has since evolved to incorporate more deceptive tactics, such as fake CAPTCHA/Cloudflare Turnstile pages and the “ClickFix” method, which manipulates users into executing PowerShell commands.

    Notably, it also uses blockchain-based hosting mechanisms (e.g., “EtherHiding” via Binance Smart Chain) to retrieve malicious scripts, making traditional detection more difficult. ClearFake has been observed distributing a range of threats, including info-stealers such as Lumma and Vidar, and loaders such as Emmenhtal (also known as PEAKLIGHT).

    As of October 2025, ClearFake remains a prevalent and adaptable delivery mechanism in the malware ecosystem. Recent analysis by the CRU confirmed active campaigns where ClearFake was used in conjunction with the Emmenhtal loader, illustrating its continued role in multi-stage attack chains. These campaigns typically began with users visiting a compromised site and interacting with a ClearFake lure, which then fetched secondary payloads through obfuscated JavaScript, ultimately delivering Emmenhtal for follow-on access or additional malware deployment. This sustained activity highlights ClearFake’s value to threat actors seeking stealthy, flexible distribution at scale.  

    Aliases

    • clearfake

    Infrastructure

    Recent IOCs

    Related File(s)
    SHA256 Filename(s)
    6fca6af282da62653e5f7b6970329c0681b47208912105f87a0a8d24816c05bc 7yx46ynsyo[1].md5
    6dt5b1dj91[1].md5

    7dd53099640f2822c6c8e858e568d8c15ec5077c129f46af584b37d0b2d3f955 v9d1cq3mnr.md5
    dr5rqawzw3.md5

    241110434ceb37d5028a0c035e7dabf7bd316c045a677eb2dc720b7080425e92 s4eg6t1o90.md5
    j0qxul66ox.md5

    Related Domain Name(s)
    d.i-433[.]ru
    xt.n0y8j[.]ru
    unpopularnational[.]com
    mi.barbertingling[.]com
    ede3.vototao9[.]ru
    m7.n6e8h[.]ru
    m8.mexizo[.]ru
    pdfs.vototao9[.]ru
    p.henyta[.]ru
    t1n.w9k6m9[.]ru
    gfjl.ba5eq[.]ru
    io.comecola[.]digital
    kv.mt-3-o-4[.]ru
    eyzl.ba5eq[.]ru
    mi.limpingbronco[.]com
    Related IP Address(es)
    178.17.53[.]49

    Victimology

    • Recently targeted business sectors: Healthcare

    Capabilities

    MITRE ATT&CK Techniques

    Tactic Technique ID Technique Name
    Initial Access   T1189   Drive-by Compromise
    Command and Control   T1102   Web Service
    Execution   T1059.001   Command and Scripting Interpreter: PowerShell
    Defense Evasion   T1027.010   Obfuscated Files or Information: Command Obfuscation
    Execution   T1059.007   Command and Scripting Interpreter: JavaScript
    Resource Development   T1584   Compromise Infrastructure
    Defense Evasion   T1027   Obfuscated Files or Information
    Command and Control   T1132.001   Data Encoding: Standard Encoding
    Defense Evasion   T1036   Masquerading
    Defense Evasion   T1140   Deobfuscate/Decode Files or Information
    Exfiltration   T1041   Exfiltration Over C2 Channel
    Command and Control   T1071.001   Application Layer Protocol: Web Protocols
    Command and Control   T1105   Ingress Tool Transfer
    Defense Evasion   T1574.001   Hijack Execution Flow: DLL
    Defense Evasion   T1218.005   System Binary Proxy Execution: Mshta

    New detections

    The following is a list of new detection signatures added to the ConnectWise SIEM in October 2025.

    [CRU][Windows] HookSignTool Root CA Certificate Registry Installation

    This detection identifies attempts to install the HookSignTool Root CA certificate directly into the Windows registry. This alert indicates potential abuse of HookSignTool, a tool known to manipulate code-signing certificate dates, often used in Lynx ransomware incidents. The certificate is installed by writing a registry key with a known thumbprint (E403A1DFC8F377E0F4AA43A83EE9EA079A1F55F2) under the SystemCertificates path. This detection highlights a reliable indicator of compromise tied to malicious certificate installation via registry manipulation.

    [EA][CRU][Windows] Logs cleared using EventLogSession via PowerShell

    Using the .NET class EventLogSession via PowerShell is an uncommon method of clearing logs. Such activities may indicate attackers trying to evade detection or destroy forensic evidence on a system. Any surrounding activity should be investigated immediately.

    [EA][CRU][Windows][LOLBAS] Suspicious mshta execution

    Mshta.exe is a living off the land binary (LOLBin) used to download and run malicious scripts with fewer security features than the context of an internet browser. Any surrounding activity should be investigated. Reference: https://github.com/LOLBAS-Project/LOLBAS/blob/master/yml/OSBinaries/Mshta.yml

    [EA][CRU][Windows] Powershell run with truncated UseBasicParsing parameter

    Prior to PowerShell version 6.0, Internet Explorer was required to run Invoke-Webrequest without the -UseBasicParsing parameter. Attackers will include the parameter due to the prevalence of versions <6.0 on victim machines, and one method of evading detection is truncating the parameter (useb...).

    [EA][CRU][Windows] Powershell Command Obfuscation via cmd escape character

    Cmd.exe allows escaping special characters using carets (^), but any character can be escaped. Attackers have been observed inserting carets in malicious cmd commands in attempts to evade detection. Surrounding activity for this user should be investigated.

    [EA][CRU][Windows] Possibly renamed rclone

    Rclone is a tool for synchronizing files that has been abused for data exfiltration. Attackers have been observed renaming the rclone executable in attempts to evade detection. Any surrounding activity should be investigated.

    [CRU][Windows] AppSuite ManualFinder InfoStealer Execution

    Detects the AppSuite executable “ManualFinder” being run. This software has been used by threat actors as an infostealer and backdoor to steal credentials, run arbitrary commands, and establish persistence. Using the values displayed from “process.pid” and “process.parent.pid” can be used to isolate an execution chain.

    [CRU][Windows] AppSuite PDF Editor InfoStealer Execution

    Detects execution of “PDF Editor” used by threat actors as an infostealer and backdoor to steal credentials and run arbitrary commands. Command flags observed can allow this software to read browser keys, change browser settings, execute arbitrary commands, or kill specific processes. Using the values displayed from “process.pid” and “process.parent.pid” can be used to isolate an execution chain. Reference: https://www.gdatasoftware.com/blog/2025/08/38257-appsuite-pdf-editor-backdoor-analysis

    [CRU][Windows] Attempted WSUS Remote Code Execution Exploitation (CVE-2025-59287)

    Detects attempts to exploit a critical vulnerability in Microsoft Windows Server Update Services. CVE-2025-59287 is a critical RCE vulnerability caused by unsafe deserialization of AuthorizationCookie data through BinaryFormatter in the EncryptionHelper.DecryptData() method. The vulnerability allows an unauthenticated attacker to achieve remote code execution with SYSTEM privileges by sending malicious encrypted cookies to the GetCookie() endpoint.  

    Related Articles