March 03, 2025 Cyber Threat Intelligence Briefing

March 03, 2025 Cyber Threat Intelligence Briefing

Mar 3, 2025

This week’s briefing covers:

00:00 - Intro and Situational Awareness

KTA080 (CL0P) Update
KTA080 has released the names of the previously redacted victim organizations ranging from E-H. Additionally, KTA080 has identified 183 victims’ organization names broadly covering H-W.

KTA374 (Salt Typhoon) Telecoms Targeting Update
Cisco Talos has released further information on the targeting of telecoms organizations identified in late 2024. This information includes the high level of living-off-the-land techniques used by the threat actor.

Attackers Steal Record $1.46 billion From Bybit ETH Cold Wallet
On 21st February 2025, cryptocurrency exchange Bybit disclosed the theft of more than $1.46 billion worth of cryptocurrency from one of its cold wallets in the largest cryptocurrency hack ever, almost doubling the $620 million stolen from Sky Mavis in March 2022.

3:01 [CAMPAIGN] KTA071 (Lazarus) Attack on Bybit
Key Takeaways

  • KTA071 (Lazarus) was attributed to stealing approximately $1.5 billion worth of Etherum from Bybit
  • The attack started from third party infrastructure, Safe{Wallet} who manages the smart contract system.
  • Malicious JavaScript was used to manipulate a transaction, causing the currency to be sent to an adversary-controlled address.

6:03 [CAMPAIGN] KTA405 (Silver Fox) Targets Medical Software in Malware Campaign
Key Takeaways

  • KTA405 disguised malware as medical software.
  • The execution of the disguised malware triggers a multistage infection chain leading to VALLEYRAT.
  • The malware adds several directories to Microsoft Denfender exclusions lists.
  • The malware attempts to terminate security software using TrueSightKiller.

8:05 [RANSOMWARE] KTA134 (AKA BLACKBASTA) Chat Logs Leaked

  • A 50MB trove of internal Matrix team chat logs of the BLACKBASTA ransomware group have been leaked online.
  • The group's members are exposed, including the alleged leader, Tramp, and several other key figures.
  • Infrastructure, tooling and financial operations are also detailed, exposing the internal workings of the group.
  • Internal discord is evident from the communications amid an exodus of key figures and operational failures.
  • Highly skilled operators from the group are likely to significantly increase the technical capabilities of other ransomware operators as they acquire former members.

Ransomware Roundup

12:39 – LOCKBIT’s Message to the FBI
On February 25, 2025, LOCKBIT created a post on its Telegram channel and data leak site to specifically address Kash Patel, director of the Federal Bureau of Investigation (FBI).

Dive deeper:

Kroll’s Monthly Threat Intelligence Spotlight Report: https://www.kroll.com/en/insights/publications/cyber/threat-intelligence-reports/cti-spotlight-trends-report

Kroll’s Q2 2024 Threat Landscape Report: https://www.kroll.com/en/insights/publications/cyber/threat-intelligence-reports/q2-2024-threat-landscape-report-threat-actors-ransomware-cloud-risks-accelerate

Playlist of Kroll's Weekly Cyber Threat Intelligence Briefings: Cyber Threat Intelligence Briefings

Kroll Cyber Blog: https://www.kroll.com/en/insights/publications/cyber

Kroll Cyber Threat Intelligence: https://www.kroll.com/en/services/cyber-risk/managed-security/threat-intelligence-services

Kroll Threat Intelligence Reports: https://www.kroll.com/en/insights/publications/cyber/threat-intelligence-reports

Kroll Responder MDR: https://www.kroll.com/en/services/cyber-risk/managed-security/kroll-responder

#krollcyber #threatintelligence #cyberthreats