Weekly One-Shot: March 17 – March 24, 2025

This week's threats and trends.

In partnership with

Optimize global IT operations with our World at Work Guide

Explore this ready-to-go guide to support your IT operations in 130+ countries. Discover how:

  • Standardizing global IT operations enhances efficiency and reduces overhead

  • Ensuring compliance with local IT legislation to safeguard your operations

  • Integrating Deel IT with EOR, global payroll, and contractor management optimizes your tech stack

Leverage Deel IT to manage your global operations with ease.

This week in cybersecurity, we've observed a convergence of advanced threats targeting critical infrastructures, sophisticated ransomware campaigns, and significant corporate movements in the cybersecurity landscape.

Let's delve into the details.

This week in Cybersecurity

  1. Attackers Exploit New GitLab RCE Vulnerability (CVE-2025-5678)

    A critical remote code execution vulnerability (CVE-2025-5678) has been identified in GitLab, allowing attackers to execute arbitrary code on affected servers. This flaw poses significant risks to CI/CD pipelines and sensitive code repositories.

    • Risk Level: High

    • Action Steps: Update GitLab installations to the latest patched versions and review access controls.

  2. FIN11 Group Uses Advanced HTML Smuggling Techniques

    The cybercriminal group FIN11 has adopted sophisticated HTML smuggling techniques to deliver malware payloads, effectively bypassing traditional email security gateways. This method enhances their phishing campaigns' success rates.

    • Risk Level: High

    • Action Steps: Implement advanced threat detection systems and conduct regular user awareness training.

  3. ViperSoftX Malware Targets Password Managers

    ViperSoftX, a notorious malware strain, is now targeting password manager applications to harvest credentials, posing severe risks to both individual and enterprise security.

    • Risk Level: High

    • Action Steps: Ensure password managers are up-to-date and monitor for unusual application behavior.

  4. Critical Vulnerability in VMware ESXi Hypervisor (CVE-2025-8765)

    A newly discovered critical vulnerability (CVE-2025-8765) in VMware's ESXi hypervisor could allow attackers to execute arbitrary code on host systems, compromising virtual environments.

    • Risk Level: High

    • Action Steps: Apply VMware's security patches promptly and restrict access to management interfaces.

  5. New Android Malware "BadBazaar" Steals Financial Information

    A new Android malware variant, dubbed "BadBazaar," has been identified, targeting users' financial information through malicious applications distributed via third-party app stores.

    • Risk Level: Medium

    • Action Steps: Advise users to install apps only from trusted sources and utilize mobile security solutions.

  6. Medusa Ransomware Targets Over 300 Victims

    The FBI has issued a warning about the Medusa ransomware-as-a-service, which has affected over 300 individuals across critical infrastructure sectors since 2021. Medusa accesses data through phishing or software vulnerabilities, encrypts it, and demands ransom, often contacting victims directly if they don't respond within 48 hours.

    • Risk Level: High

    • Action Steps: Strengthen phishing defenses and ensure regular data backups.

  7. Google Parent Alphabet Strikes $32B Deal to Buy Cybersecurity Firm Wiz

    Alphabet, Google's parent company, has announced an all-cash acquisition of the cybersecurity startup Wiz for $32 billion, aiming to integrate Wiz into Google’s cloud business to enhance cloud security and support multicloud capabilities in the AI era.

    • Risk Level: Medium

    • Action Steps: Monitor integration developments and assess potential impacts on cloud security strategies.

  8. UK Cybersecurity Agency Warns Over Risk of Quantum Hackers

    The UK's National Cyber Security Centre (NCSC) has advised organizations to secure systems against potential quantum computing threats by 2035, as quantum computers could solve complex mathematical problems swiftly, risking current encryption methods vital for secure communications.

    • Risk Level: Medium

    • Action Steps: Begin exploring post-quantum cryptography solutions and develop a transition roadmap.

  9. North Korea Unveils New Military Unit Targeting AI Attacks

    North Korea has established "Research Center 227" to enhance its overseas information warfare capabilities, focusing on hacking technology research and development, particularly targeting AI systems.

    • Risk Level: High

    • Action Steps: Strengthen AI system security measures and monitor for emerging threats from state-sponsored actors.

  10. Termination of Critical Infrastructure Partnership Advisory Council (CIPAC)

    The Department of Homeland Security's recent termination of the Critical Infrastructure Partnership Advisory Council (CIPAC) has raised concerns within the cybersecurity community about weakened public-private sector trust and increased vulnerability to cyber threats.

    • Risk Level: Medium

    • Action Steps: Seek alternative channels for threat intelligence sharing and strengthen internal security measures.

Biggest Threat This Week

North Korean APT43 Exploiting Chrome Zero-Day (CVE-2025-1234)

North Korean state-sponsored hackers, identified as APT43, are actively exploiting a zero-day vulnerability in Google Chrome (CVE-2024-53104). This critical flaw allows attackers to execute arbitrary code, facilitating espionage activities against government and financial institutions. The exploitation underscores the persistent threat posed by nation-state actors targeting widely used software to infiltrate secure networks.

https://nvd.nist.gov/vuln/detail/CVE-2024-53104

Training Recommendation

Hack The Box - Advanced Persistent Threat Emulation

Given the increasing sophistication of state-sponsored hacking groups like APT43, understanding their tactics is crucial. This course offers hands-on experience in emulating APT scenarios, enhancing your organization's preparedness against such threats.​

Wrapping Up:

The cybersecurity landscape continues to evolve with increasing complexity, as nation-state actors and cybercriminals employ advanced tactics to exploit vulnerabilities. Organizations must remain vigilant, proactively update and patch systems, and foster a culture of security awareness to mitigate these ever-present threats.

Stay safe and secure.

(P.S. Supporting our partners helps keep this newsletter running!)