Bivash Nayak
27 Jul
27Jul

πŸ”₯ Top 10 Malware Threats – July 2025 (CyberDudeBivash Briefing Edition)

No.MalwareTypeKey DetailsIOC/BehaviorImpact
1CruxRansomwareNew strain by BlackByte. Disables recovery, encrypts via svchost.exe β†’ cmd.exe.Use of rclone, svchost.exe spikes, shadow copy deletion3 known attacks, lateral movement via RDP
2ToolShellWeb ShellDeployed via MS SharePoint 0‑day (CVE‑2025‑53770/71), persistent accessBackdoor in SharePoint logs, compromised cryptographic keysUsed by state-backed actors to breach U.S. gov servers
3DarkGateLoaderMalicious VBScript loader, uses PowerShell and AutoHotKeyAbnormal registry edits, task scheduler persistenceRapid global spread in SMBs
4PyLooseFileless MalwarePython-based loader running in-memory in Linux via cloud toolsUnusual Python execution in /tmp, C2 callsCloud-native Linux systems targeted
5Mystic StealerInfoStealerSteals browser data, cryptocurrency wallets, Telegram dataInjects into explorer.exe, steals clipboard + session tokensIncreasing in use across APAC & EU
6BumblebeeLoaderDelivered via phishing; stages ransomware like QuantumDLL sideloading, Windows Defender bypassPart of several ransomware ops
7AgentTeslaRAT / KeyloggerOngoing variant updates, steals creds, logs keystrokesHTTP POST exfiltration, C2 to bulletproof serversOften hidden in Excel/email macro lures
8RedLine StealerInfoStealerPopular on Telegram, uses cheap-as-a-service kitsLooks for browser passwords, cold wallet filesUsed in massive credential dumps
9LummaC2Stealer/LoaderNew hybrid C2 kit for malware-as-a-serviceC2 beaconing over Discord, obfuscated JS droppersGrowing in Southeast Asia & US
10Remcos RATRemote Access TrojanDelivered via cracked software and phishingUses Windows registry for persistence, keyloggingUsed in targeted espionage campaigns
Comments
* The email will not be published on the website.