Discover more from ESSGroup
Subscribe to get the latest posts sent to your email.
Threat Actor Profile
OilRig, also known as APT34 and Helix Kitten, is a sophisticated state-sponsored threat actor believed to be aligned with Iranian interests. Active since 2016, OilRig primarily targets organizations in the Middle East, focusing on sectors such as government, technology, and energy.
Tactics, Techniques, and Procedures (TTPs)
OilRig employs advanced tactics including:
Tools and Infrastructure Used
Reported Activity
Recent campaigns have demonstrated OilRig’s proficiency in exploiting critical vulnerabilities and harvesting credentials, posing a persistent threat to targeted organizations.
Recommendations
Based on this report, here are some recommendations to enhance your security posture:
Resources
– AlienVault OTX Pulse: https://otx.alienvault.com/pulse/677419937948350d192be461
– PicardSecurity Blog: https://www.picussecurity.com/resource/blog/oilrig-exposed-tools-techniques-apt34
**
Subscribe to get the latest posts sent to your email.
Lorem Ipsum is simply dummy text of the printing and typesetting
industry. Lorem Ipsum has been the industry's
Threat Overview
The Security Operations Center (SOC) has identified a critical threat report published by CheckPoint on April 16, 2025. The report details CVE-2025-24054, an NTLM exploit that is actively being used in the wild. This vulnerability allows attackers to disclose NTLM hashes through spoofing techniques, leveraging maliciously crafted .library-ms files.
Short Description of the Report
CVE-2025-24054 is a significant security flaw related to NTLM hash disclosure via spoofing. Attackers can exploit this vulnerability using specially designed .library-ms files. Active exploitation has been observed since March 19, 2025, potentially enabling attackers to leak NTLM hashes or user passwords and compromise systems.
Microsoft released a patch for this vulnerability on March 11, 2025. However, threat actors had over a week to develop and deploy exploits before the vulnerability began to be actively abused. This highlights the importance of timely patch management and continuous monitoring within an organization’s security infrastructure.
Confidence Level and Reliability
The confidence level for this report is 100%, indicating that the information provided is highly reliable. The reliability of the report is rated as A – Completely reliable, ensuring that the data can be trusted for making critical security decisions.
Revoke Status
As of now, the revoke status for this threat report is false, meaning that the information remains valid and actionable.
Number of Connected Elements
The report contains 27 connected elements, providing a comprehensive overview of the threat landscape associated with CVE-2025-24054. These elements include detailed technical analysis, indicators of compromise (IOCs), and mitigation strategies.
External References
For additional information, please refer to the following external references:
Recommendations for Mitigation
To protect against the CVE-2025-24054 NTLM exploit, organizations should consider the following recommendations:
Monitoring and Detection: Deploy advanced threat detection tools to monitor for suspicious activities related to NTLM hash disclosure. Use Security Information and Event Management (SIEM) systems to correlate logs and identify potential threats in real-time.
User Education: Educate users about the risks associated with phishing attacks and malicious files. Encourage them to be cautious when opening email attachments or downloading files from untrusted sources.
Access Controls: Implement strict access controls to limit who can access sensitive data and systems. Use the principle of least privilege (PoLP) to ensure that users have only the permissions necessary for their roles.
Regular Audits: Conduct regular security audits to identify vulnerabilities and assess the effectiveness of existing security measures. Address any gaps or weaknesses promptly to enhance overall security posture.
Incident Response Plan: Develop and maintain an incident response plan to quickly respond to potential breaches. Ensure that all stakeholders are aware of their roles and responsibilities in case of a security incident.
Conclusion
The CVE-2025-24054 NTLM exploit poses a significant threat to organizations, potentially leading to the compromise of sensitive data and systems. By following the recommendations outlined above, organizations can enhance their security posture and protect against this emerging threat. Stay informed about the latest developments in cybersecurity and remain vigilant to safeguard your organization’s assets.
For more detailed information, please visit the CheckPoint Research page on CVE-2025-24054: https://research.checkpoint.com/2025/cve-2025-24054-ntlm-exploit-in-the-wild/
Threat Report for Security Operation Center
Published by CyberHunter_NL on May 2, 2025
Threat Overview
The security landscape is constantly evolving, and new threats emerge regularly. One of the latest threats identified involves malicious Go modules that fetch destructive payloads using wget. This report provides an in-depth analysis of this threat, its potential impact, and recommendations for mitigation.
Short Description of the Threat
The threat involves the use of malicious Go modules that leverage the wget command to download and execute destructive payloads on targeted systems. This method allows attackers to bypass traditional security measures and deliver malware that can cause significant damage to infrastructure and data integrity.
Confidence Level and Reliability
The confidence level for this report is 100, indicating a high degree of certainty in the information provided. The reliability of the report is rated as A – Completely reliable, ensuring that the data is accurate and trustworthy.
Key Elements of the Report
The report includes 52 connected elements, providing a comprehensive view of the threat landscape. These elements cover various aspects of the attack, including indicators of compromise (IOCs), tactics, techniques, and procedures (TTPs), and mitigation strategies.
External References
For additional information, please refer to the following external references:
Detailed Analysis
The threat involves the use of Go modules, which are packages that contain code and other resources used in Go programming. Attackers have found a way to embed malicious code within these modules, allowing them to execute arbitrary commands on the target system.
The wget command is commonly used for downloading files from the internet. In this case, attackers use wget to download a destructive payload that can wipe out critical data or disrupt essential services. This method is particularly effective because it leverages legitimate tools and protocols, making it difficult to detect using traditional security measures.
Impact of the Threat
The impact of this threat can be severe, especially for organizations that rely on Go modules in their development processes. The destructive payloads can cause significant data loss, service disruptions, and financial damage. Additionally, the use of legitimate tools makes it challenging to identify and mitigate the threat effectively.
Recommendations for Mitigation
To protect against this threat, organizations should consider the following recommendations:
Conclusion
The threat posed by malicious Go modules fetching destructive payloads using wget is significant and requires immediate attention. By understanding the tactics, techniques, and procedures used by attackers, organizations can implement effective mitigation strategies to protect their systems and data. Regular monitoring, strict access controls, and employee training are essential components of a comprehensive security strategy.
For more detailed information, please refer to the external references provided in this report.
Threat Overview
AlienVault has recently published a threat report highlighting the activities of several Chrome extensions that have been compromised. The affected extensions are linked to multiple suspicious domains resolving to the same IP address as cyberhavenext[.]pro.
Compromised Extensions and Domains
Some confirmed compromised extensions include Cyberhaven, with their corresponding URLs listed below. Users are advised to search for these extensions in their environments and monitor for any traffic to the IP address 149.28.124[.]84.
Threat Actor’s TTPs
The threat actor behind this compromise has been linked to multiple suspicious domains, suggesting a widespread attack targeting browser extensions. This could potentially put users’ data and privacy at risk.
Recommendations for Improving Cybersecurity Posture
Based on the threat report, several recommendations can be made:
* Monitor activity from known malware samples, such as those associated with cyberhavenext[.]pro.
* Implement strict security controls around access to sensitive systems.
* Regularly update software packages to prevent exploitation by zero-day vulnerabilities
* Implement layered web and network security mechanisms to detect and prevent lateral movement.
Resources
The Record Article on Cyberhaven Hack
LinkedIn Post by Jaime Blasco
Subscribe now to keep reading and get access to the full archive.