This browser is not actively supported anymore. For the best passle experience, we strongly recommend you upgrade your browser.
Subscribe

Social Media Links

| 3 minute read

Ankura CTIX FLASH Update - July 3, 2025

Malware Activity

 

North Korean Malware and Sophisticated Phishing Campaigns

Cybersecurity analysts are warning of an escalating threat landscape characterized by sophisticated attacks from North Korean-aligned actors targeting Web3 and cryptocurrency sectors. These campaigns utilize advanced malware written in Nim, such as NimDoor. They employ multi-stage techniques including process injection, TLS-encrypted WebSocket channels, and innovative persistence methods via signal handlers to evade detection. The malware’s deployment often involves social engineering tactics like fake Zoom updates delivered through messaging platforms. This leads to payloads that enable system reconnaissance, credential theft, and persistent remote access across macOS and other systems. Concurrently, cybercriminals are ramping up social engineering scams. Notably callback phishing (TOAD). Which use branded impersonations, QR codes, and malicious links embedded in PDFs to deceive victims into divulging sensitive information or installing malware. These campaigns frequently exploit trust in well-known organizations. They utilize spoofed caller IDs, and leverage AI tools to manipulate online content. This highlights a sophisticated and adaptive threat environment that demands vigilant security measures and advanced detection capabilities. CTIX analysts will continue to report on the latest malware strains and attack methodologies.

 

Threat Actor Activity

 

North Korea’s Global IT Scam: DOJ Uncovers Massive Fraud and Espionage Network

The U.S. Department of Justice exposed a vast North Korean fraud and espionage scheme in which remote IT workers, posing as legitimate professionals using stolen or AI-generated identities, infiltrated over one hundred (100) U.S. companies (including Fortune 500 firms), generating more than $88 million in illicit revenue over six (6) years. These operatives were aided by facilitators in the U.S., China, Taiwan, and the UAE, who ran "laptop farms," set up shell companies and fake websites, and laundered money through financial accounts and cryptocurrency mixers like Tornado Cash. The DOJ-led enforcement action, part of the “DPRK RevGen: Domestic Enabler Initiative,” included searches at twenty-nine (29) suspected laptop farms across sixteen (16) states, the seizure of twenty-nine (29) financial accounts, twenty-one (21) fraudulent websites, and over 130 laptops. Sensitive data, including ITAR-controlled military technology and over $900,000 in cryptocurrency, was stolen. This was most notably done by North Korean national Kim Kwang Jin, who exploited his position at a Georgia blockchain firm to alter smart contracts and siphon funds. U.S. national Zhenxing “Danny” Wang was arrested for facilitating access through more than eighty (80) stolen identities, while eight (8) Chinese and Taiwanese nationals were also indicted. Microsoft, tracking the operation under the name "Jasper Sleet," has since suspended 3,000 related accounts, and the U.S. is offering $5 million in rewards for the four (4) North Korean operatives who remain at large. Security experts warn this widespread campaign highlights the urgent need for stronger identity verification and hiring protocols across corporate America. To learn more about the recent origins of this campaign, read the CTIX article published in October 2024.

 

Vulnerabilities

 

Critical Forminator Plugin Vulnerability Threatens Over 400,000 WordPress Sites with Full Takeover Risk

A high-severity vulnerability in the widely used Forminator WordPress plugin (active on over 600,000 websites) exposes sites to unauthenticated arbitrary file deletion attacks that can lead to complete site takeover. The flaw, tracked as CVE-2025-6463 (CVSS 8.8/10), stems from improper sanitization of form field inputs and unsafe backend logic that fails to restrict file deletion to designated upload fields. Attackers can craft form submissions that mimic file uploads, referencing critical files like "wp-config.php". If such a form is later deleted (either manually by an admin or automatically through configured settings), the plugin could erase these core files, forcing the site into a setup state and enabling attackers to hijack it by connecting to a database they control. Discovered by security researcher "Phat RiO – BlueRock" and disclosed through Wordfence’s bug bounty program ($8,100 reward), the vulnerability affects all Forminator versions up to 1.44.2. A patch in version 1.44.3 (released June 30) adds file path validation and field-type checks, but only around 200,000 users have downloaded the update so far, leaving an estimated 400,000+ sites still exposed. While there are no confirmed exploitation cases yet, the ease of abuse and public technical disclosure make immediate patching or temporary deactivation imperative. CTIX analysts urge any administrators implementing the Forminator plugin to ensure that they've updated to patch the vulnerability and prevent future exploitation.

 

📧 Never Miss a Briefing

Stay informed and secure. Subscribe to Ankura's Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure. 

Join the Cyber Flash Update community today.

© Copyright 2025. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.

Tags

report, cybersecurity & data privacy, data & technology, cyber response, data privacy & cyber risk

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in

I need help with