Bivash Nayak
27 Jul
27Jul

🔥 Top 10 Malware Threats – July 2025 (CyberDudeBivash Briefing Edition)

No.MalwareTypeKey DetailsIOC/BehaviorImpact
1CruxRansomwareNew strain by BlackByte. Disables recovery, encrypts via svchost.exe → cmd.exe.Use of rclone, svchost.exe spikes, shadow copy deletion3 known attacks, lateral movement via RDP
2ToolShellWeb ShellDeployed via MS SharePoint 0‑day (CVE‑2025‑53770/71), persistent accessBackdoor in SharePoint logs, compromised cryptographic keysUsed by state-backed actors to breach U.S. gov servers
3DarkGateLoaderMalicious VBScript loader, uses PowerShell and AutoHotKeyAbnormal registry edits, task scheduler persistenceRapid global spread in SMBs
4PyLooseFileless MalwarePython-based loader running in-memory in Linux via cloud toolsUnusual Python execution in /tmp, C2 callsCloud-native Linux systems targeted
5Mystic StealerInfoStealerSteals browser data, cryptocurrency wallets, Telegram dataInjects into explorer.exe, steals clipboard + session tokensIncreasing in use across APAC & EU
6BumblebeeLoaderDelivered via phishing; stages ransomware like QuantumDLL sideloading, Windows Defender bypassPart of several ransomware ops
7AgentTeslaRAT / KeyloggerOngoing variant updates, steals creds, logs keystrokesHTTP POST exfiltration, C2 to bulletproof serversOften hidden in Excel/email macro lures
8RedLine StealerInfoStealerPopular on Telegram, uses cheap-as-a-service kitsLooks for browser passwords, cold wallet filesUsed in massive credential dumps
9LummaC2Stealer/LoaderNew hybrid C2 kit for malware-as-a-serviceC2 beaconing over Discord, obfuscated JS droppersGrowing in Southeast Asia & US
10Remcos RATRemote Access TrojanDelivered via cracked software and phishingUses Windows registry for persistence, keyloggingUsed in targeted espionage campaigns
Comments
* The email will not be published on the website.