
New Threat Detection Added | 3 |
• CrushFTP - CVE-2025-31161 • Totolink A3700R • D-Link DIR-605L/DIR |
|
New Threat Protections | 244 |
Weekly Detected Threats
The following threats were added to Crystal Eye this week:
Threat name:
|
CrushFTP | |||||||||||||||||||||||||||||||||||||||||||||||||||
CVE-2025-31161 is a critical severity vulnerability allowing attackers to control how user authentication is handled by CrushFTP managed file transfer (MFT) software. We strongly recommend patching immediately to avoid affected versions 10.0.0 through 10.8.3 and 11.0.0 through 11.3.0. Successful exploitation of CVE-2025-31161 would give attackers admin-level access across the CrushFTP application for further compromise. This blog outlines our re-created proof-of-concept for CVE-2025-31161 and attackers’ use of both legitimate and malicious RMM tooling for post-exploitation activities.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Threat Protected:
|
01 | |||||||||||||||||||||||||||||||||||||||||||||||||||
Rule Set Type:
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||
Class Type:
|
Trojan-activity | |||||||||||||||||||||||||||||||||||||||||||||||||||
Kill Chain:
|
|
Threat name:
|
Totolink A3700R | ||||||||||||||||||
A protection mechanism failure in Windows BitLocker allows an unauthorised attacker to bypass a security feature with a physical attack.
|
|||||||||||||||||||
Threat Protected:
|
03 | ||||||||||||||||||
Rule Set Type:
|
|
||||||||||||||||||
Class Type:
|
|
||||||||||||||||||
Kill Chain:
|
|
Threat name:
|
D-Link DIR-605L/DIR | ||||||||||||||||||||||||||||
This vulnerability exists in the /goform/formAdvFirewall endpoint of the router's Firewall Service component. Due to improper access controls, an attacker on the local network can manipulate this endpoint to gain unauthorised access or modify firewall settings without authentication.
Affected Products: D-Link DIR-618 and DIR-605L routers, firmware versions 2.02 and 3.02
Vulnerability Details: This vulnerability exists in the /goform/formAdvFirewall endpoint of the router's Firewall Service component. Due to improper access controls, an attacker on the local network can manipulate this endpoint to gain unauthorised access or modify firewall settings without authentication.
|
|||||||||||||||||||||||||||||
Threat Protected:
|
01 | ||||||||||||||||||||||||||||
Rule Set Type:
|
|
||||||||||||||||||||||||||||
Class Type:
|
Trojan activity
|
||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
Kill Chain:
|
|
Known Exploited Vulnerabilities (Week 3 - April 2025)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog
Vulnerability
|
CVSS
|
Description | |
CVE-2025-31200
|
7.5 (High)
|
Apple iOS, iPadOS, macOS, and other Apple products contain a memory corruption vulnerability that allows for code execution when processing an audio stream in a maliciously crafted media file.
|
|
CVE-2025-31201
|
6.8 (Medium)
|
Apple iOS, iPadOS, macOS, and other Apple products contain an arbitrary read-and-write vulnerability that allows an attacker to bypass Pointer Authentication.
|
|
CVE-2025-24054
|
6.5 (Medium)
|
Microsoft Windows NTLM contains an external control of file name or path vulnerability that allows an unauthorised attacker to perform spoofing over a network.
|
Updated Malware Signatures (Week 3 - April 2025)
Threat
|
Description
|
|
Gholoader
|
Gholoader is a JavaScript-based malware loader associated with the SocGholish campaign, which utilises fake browser update prompts to deceive users into downloading malicious files. This malware is typically delivered through compromised legitimate websites that have been injected with malicious JavaScript code.
|
|
SonicWall Command Injection
|
The SonicWall SMA Post-Auth sitecustomisation CGI Command Injection vulnerability refers to a remote command injection flaw affecting SonicWall Secure Mobile Access (SMA) appliances. This vulnerability exists in the sitecustomisation CGI component and requires authentication (i.e., the attacker must be logged in or have valid session credentials).
|
|
Lumma Stealer
|
The alert “Win32/Lumma Stealer Related CnC Domain in DNS Lookup (shiftvc[.]digital)” indicates that a system on your network attempted to resolve a domain known to be associated with the Lumma Stealer malware family. Specifically, it attempted a DNS lookup for shiftvc.digital, which is a command-and-control (C2) or exfiltration domain used by Lumma Stealer.
|
Ransomware Report | |
The Red Piranha Team conducts ongoing surveillance of the dark web and other channels to identify global organisations impacted by ransomware attacks. In the past week, our monitoring revealed multiple ransomware incidents across diverse threat groups, underscoring the persistent and widespread nature of these cyber risks. Presented below is a detailed breakdown of ransomware group activities during this period. |
|
Name of Ransomware Group | Overall %age of total attack coverage |
Inc ransom
|
4.26%
|
Leaked Data
|
5.67%
|
4.96%
|
|
Qilin
|
10.64%
|
Crypto24
|
0.71%
|
1.42%
|
|
Lynx
|
7.8%
|
Termite
|
0.71%
|
NightSpire
|
4.96%
|
Devman
|
0.71%
|
Akira
|
9.93%
|
4.26%
|
|
Dragonforce
|
8.51%
|
7.8%
|
|
RAlord
|
2.84%
|
WikiLeaksv2
|
0.71%
|
Chaos
|
0.71%
|
Nitrogen
|
1.42%
|
Team Underground
|
0.71%
|
0.71%
|
|
8.51%
|
|
Kairos
|
0.71%
|
Sarcoma
|
3.55%
|
Space Bears
|
1.42%
|
Hunters
|
0.71%
|
Money Message
|
0.71%
|
Cloak
|
3.55%
|
RansomHouse
|
0.71%
|
Skira Team
|
0.71%
|

Maui Ransomware Group
Maui is a manually operated ransomware strain first identified in early 2021 and attributed to North Korean state-sponsored threat actors. Unlike ransomware-as-a-service (RaaS) models, Maui does not automatically display ransom notes or exfiltrate data. Instead, it is designed for targeted attacks against critical infrastructure, particularly within the healthcare sector. Its operations are human-driven at every stage—from deployment to ransom negotiation—reflecting a highly curated approach.
Although not equipped with automated features such as lateral movement or backup deletion, Maui’s encryption mechanisms are sophisticated and highly disruptive. The ransomware is typically executed with command-line arguments, targeting specific directories and encrypting data using a hybrid AES-RSA scheme. Its selective and stealthy behaviour, coupled with the absence of widespread campaigns, signals a strategic focus on high-value targets.
Detailed TTPs
Initial Access
North Korean actors gain entry via spear-phishing campaigns or exposed RDP services. The FBI and CISA have highlighted that, although no universal initial access vector has been confirmed, phishing and RDP exploitation remain consistent with previous nation-state tactics.
Persistence & Lateral Movement
Once inside, attackers establish persistence using valid credentials or by creating local accounts. Tools like Cobalt Strike, Empire, and Metasploit are employed for post-exploitation control, lateral movement, and privilege escalation.
Execution
Maui is launched manually using command-line instructions (maui.exe <target directory>). Operators specify parameters such as thread count and logging directories, confirming hands-on execution.
Encryption Behaviour
Maui uses:
- AES-128 (CBC mode) for per-file encryption
- RSA encryption for AES keys
- XOR obfuscation of key files
It writes encrypted data to .tmp files before renaming them and generates an execution log (maui.log), which is exfiltrated along with the RSA private keys for later decryption post-payment.
Command & Control
Maui does not feature built-in C2 communication. Instead, attackers leverage external tools like Cobalt Strike to maintain remote control, often communicating over HTTPS to blend in with normal traffic.
Impact
The impact centres on data encryption (T1486) and disruption of services, particularly healthcare operations. Maui does not delete backups but may disable or remove them manually. The lack of data exfiltration shifts the focus from double-extortion to targeted ransom demands.
MITRE ATT&CK TTP Mapping
Tactic
|
Technique (ID)
|
Description
|
Initial Access
|
Spearphishing Attachment
(T1566.001)
|
Phishing emails with malicious attachments or links.
|
Initial Access
|
External Remote Services – RDP
(T1133)
|
Use of weak or stolen RDP credentials to gain access.
|
Execution
|
Command & Scripting Interpreter
(T1059.003)
|
Manual CLI-based execution of maui.exe
|
Persistence
|
Valid Accounts (T1078)
|
Attackers reuse or steal legitimate user credentials.
|
Persistence
|
Create Account (T1136) (possible)
|
Potential creation of new accounts for persistent access.
|
Defence Evasion
|
Masquerading (T1036)
|
Executable renamed to evade detection (e.g. aui.exe).
|
Defence Evasion
|
Obfuscated Files or Information
(T1027)
|
XOR encoding of RSA keys.
|
Credential Access
|
Credentials from Password Stores
(T1555) (suspected)
|
Likely use of credential dumping tools like Mimikatz.
|
Discovery
|
Network Share Discovery (T1135)
|
Manual identification of valuable file shares.
|
C2
|
Ingress Tool Transfer (T1105)
|
Uploading of Maui or other tools via SMB.
|
C2
|
Application Layer Protocol (T1071.001)
|
Cobalt Strike beacons over HTTPS.
|
Impact
|
Data Encrypted for Impact (T1486)
|
Strong AES-RSA encryption renders files inaccessible.
|
Impact
|
Inhibit System Recovery (T1490)
(partial)
|
Backup deletion is manual, not automated.
|
IOCs
Filenames:
Mitigation Strategies
- Endpoint Detection & Response (EDR): Use behaviour-based EDRs like SentinelOne or CrowdStrike to catch CLI encryption behaviours and automatically roll back changes.
- Patch Management: Regularly patch VPN/RDP services and internal applications to prevent exploitation.
- Network Segmentation: Isolate critical systems and implement strict access controls to hinder lateral movement.
- Multi-Factor Authentication (MFA): Enforce MFA for all administrative and remote access accounts.
- User Awareness Training: Train staff to detect and report phishing attempts to reduce the risk of initial access.
- Credential Hygiene: Regularly audit and disable unused accounts. Use strong, unique credentials.
- Backup and Disaster Recovery: Maintain offline, immutable backups and test restore procedures frequently.
- Monitoring and Incident Response: Deploy SIEMs and threat-hunting tools. Monitor for the presence of maui.exe, maui.log, or related indicators.
Ransomware Victims Worldwide
A recent analysis of the global ransomware threat landscape indicates that the United States continues to be the most heavily impacted nation, accounting for a staggering 58.16% of all reported ransomware incidents. This reinforces the country’s position as a prime target for financially and politically motivated threat actors.
Germany ranks second, experiencing 9.22% of global attacks — a sharp indication of the country's exposure within the European economic and industrial sphere. Canada follows with 4.96%, while the United Kingdom reports 4.26%, reflecting persistent threats across North American and Western European nations.
Several other countries also show notable ransomware activity. Spain and Italy each report 2.84% of incidents, while Portugal is close behind at 2.13%, highlighting a broader European trend. Australia, Norway, Brazil, and Switzerland each recorded 1.42%, suggesting ransomware groups are diversifying their target selection across regions and verticals.
A range of countries reported moderate to low levels of incidents, each contributing 0.71% of global ransomware cases. These include Vietnam, Chile, Argentina, Luxemburg, Indonesia, Saudi Arabia, India, Bolivia, China, Taiwan, Netherlands, Czech Republic, Ireland, and Greece. While smaller in share, these nations’ inclusion underscores the increasingly global footprint of ransomware operations.
This widespread distribution of ransomware victims emphasises the transnational nature of modern cybercrime. It calls for urgent international collaboration in intelligence sharing, the adoption of advanced threat detection mechanisms, and the strengthening of cyber resilience programs across both public and private sectors.

Ransomware Victims by Industry
In the most recent industry-specific analysis of ransomware activity, the Construction sector has emerged as the most targeted, accounting for 16.31% of global incidents. This sharp rise underscores persistent vulnerabilities in infrastructure development, engineering operations, and supply chain integration within the sector.
Manufacturing follows closely at 15.6%, continuing to be a major target due to its reliance on industrial control systems and just-in-time production workflows. Business Services ranks third with 12.77%, highlighting sustained targeting of consulting, outsourcing, and professional service firms that manage sensitive client data.
Retail accounts for 9.22% of incidents, signalling that consumer-facing sectors remain highly attractive to ransomware actors due to the potential for high-impact disruptions and large-scale data exposure. Law Firms reported 8.51%, reaffirming the value attackers place on confidential legal information and litigation assets.
Other significantly impacted sectors include Transportation (5.67%), Hospitality (4.26%), Consumer Services (4.26%), and Education (4.26%). These industries represent a mix of critical logistics infrastructure, customer-centric services, and institutions handling vast amounts of personally identifiable information.
Finance (3.55%), Healthcare (2.13%), Insurance (2.13%), and Agriculture (2.13%) also faced considerable ransomware threats, further reflecting attackers’ focus on sectors with high-value data and operational continuity requirements.
A range of industries experienced moderate levels of targeting, including Telecommunications (1.42%), Electronics (1.42%), Energy (1.42%), Media & Internet (1.42%), and Federal (1.42%) entities. These sectors present strategic interest to attackers due to their technological or governmental relevance.
Lower yet still notable levels of ransomware activity were observed in IT (0.71%), Organisations (0.71%), and Minerals & Mining (0.71%), suggesting that even smaller or niche industries are not immune to opportunistic targeting.
This comprehensive distribution highlights ransomware’s pervasive reach across all industrial domains. It reinforces the urgency for sector-specific threat models, proactive defence mechanisms, and continuous risk assessments to combat the evolving ransomware ecosystem.
