{"id":10070,"date":"2025-08-18T13:53:29","date_gmt":"2025-08-18T10:53:29","guid":{"rendered":"https:\/\/cyberone.bg\/?p=10070"},"modified":"2025-11-10T13:37:33","modified_gmt":"2025-11-10T10:37:33","slug":"weekly-cybersecurity-report-week-33-2025","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-33-2025","title":{"rendered":"Weekly Cybersecurity Report | Week 33, 2025"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong>\u00a0<a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong>\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h2>Weekly Cybersecurity Report | Week 33, 2025<\/h2>\n<p><strong><u>Information security updates and events from the past we<\/u><\/strong><strong><u>ek<\/u><\/strong><\/p>\n<ol>\n<li>\n<h3><strong> Advanced Ransomware Campaign \u2013 Charon Group in the Middle East<\/strong><strong><br \/>\n<\/strong><\/h3>\n<p>The ransomware group <strong>Charon<\/strong> conducted a targeted campaign in the Middle East against both business and public sectors. Advanced techniques typically associated with APT groups were observed, including <strong>BYOVD (Bring Your Own Vulnerable Driver)<\/strong> to disable EDR systems. This reinforces the growing notion of blurred lines between criminal cybercrime operations and state-backed activity.<\/li>\n<li>\n<h3><strong>Hacktivist Operations Against Israeli Targets \u2013 SiegedSec<br \/>\n<\/strong><\/h3>\n<p>During the week, reports indicated an expansion of SiegedSec\u2019s <strong>\u201cFourth Operation\u201d<\/strong> campaign. The hacktivist group claimed to have leaked data stolen from Israeli companies including <strong>Israir, Bezeq, and Cellcom<\/strong>. Some of the material was distributed via Telegram, although not all of the information has been independently verified. The incident aligns with the group\u2019s recent <strong>pro-Palestinian activities<\/strong>.<\/li>\n<li>\n<h3><strong> United States \u2013 Cyberattack on the Pennsylvania Attorney General\u2019s Office<br \/>\n<\/strong><\/h3>\n<p>The website, email systems, and phone lines of the <strong>Pennsylvania Attorney General\u2019s Office<\/strong> were disrupted early in the week due to a cyberattack. Services were gradually restored after several days. Authorities are investigating whether the incident was a ransomware attack.<\/li>\n<li>\n<h3><strong>BlackSuit Ransomware Group Takedown \u2013 $1 Million Seized<br \/>\n<\/strong><\/h3>\n<p>Authorities in the <strong>U.S. and Europe<\/strong> conducted a joint operation against the ransomware group <strong>BlackSuit<\/strong>, seizing servers, taking down domains, and confiscating approximately <strong>$1 million in cryptocurrency<\/strong>. The group had been responsible for dozens of ransomware attacks against critical U.S. organizations since 2022.<\/li>\n<li>\n<h3><strong> Norway \u2013 Pro-Russian Hackers Breach Hydropower Dam<br \/>\n<\/strong><\/h3>\n<p>Hackers linked to Russia infiltrated the control systems of a <strong>Norwegian dam<\/strong>, triggering a controlled opening of floodgates that released over <strong>1.9 million gallons of water<\/strong>. No physical damage was reported, but the incident highlighted severe vulnerabilities in <strong>critical infrastructure<\/strong>.<\/li>\n<li>\n<h3><strong> Poland \u2013 Water Supply Attack Foiled<br \/>\n<\/strong><\/h3>\n<p>Polish authorities reported successfully <strong>thwarting a cyberattack<\/strong> targeting water supply systems in a major city. The intrusion was detected and blocked before causing disruptions. Poland continues to invest billions in cybersecurity to protect vital infrastructure.<\/li>\n<li>\n<h3><strong> United Kingdom \u2013 Sensitive Data Breach at Aviation Contractor<br \/>\n<\/strong><\/h3>\n<p><strong>Inflite<\/strong>, a contractor at Stansted Airport, experienced a breach in which data from around <strong>3,500 individuals<\/strong> was leaked. Victims included Afghan refugees, former government ministers, and military personnel. The UK government has launched a formal investigation.<\/li>\n<li>\n<h3><strong> Global Intelligence Assessments \u2013 Akira, PXA Stealer, and CERT-UA Warnings<\/strong><\/h3>\n<ul>\n<li>The <strong>Akira ransomware<\/strong> group has been observed conducting widespread campaigns, particularly exploiting vulnerable VPNs.<\/li>\n<li>Extensive data theft was attributed to <strong>PXA Stealer<\/strong> malware.<\/li>\n<li><strong>CERT-UA<\/strong> issued warnings about <strong>UAC-0099<\/strong>, which targeted government and defense entities in Ukraine.<\/li>\n<\/ul>\n<\/li>\n<li>\n<h3><strong>New Ransomware Variant \u2013 Jackpot Ransomware<br \/>\n<\/strong><\/h3>\n<p>A new ransomware strain called <strong>Jackpot<\/strong> was identified on underground forums. Analysts noted its <strong>advanced capabilities<\/strong> and similarities to the infamous <strong>LockBit<\/strong> group\u2019s tools and techniques.<\/li>\n<li>\n<h3><strong> Critical Security Updates \u2013 Microsoft<br \/>\n<\/strong><\/h3>\n<p>On <strong>August 13<\/strong>, Microsoft released its monthly <strong>Patch Tuesday<\/strong>, addressing <strong>111 vulnerabilities<\/strong>, including a <strong>critical zero-day flaw in Kerberos (CVE-2025-53779)<\/strong> affecting Active Directory environments<\/li>\n<\/ol>\n<p><strong><em>The cybersecurity attacks highlighted in this report aren\u2019t just incidents, they\u2019re blueprints of the adversary\u2019s arsenal. To protect your business you need the right partner. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider,\u00a0Cyberone\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 33, 2025 Information security updates and events from the past week Advanced Ransomware Campaign \u2013 Charon Group in [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8600,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[65],"class_list":["post-10070","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates","tag-weekly-cybersecurity-report"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/10070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=10070"}],"version-history":[{"count":3,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/10070\/revisions"}],"predecessor-version":[{"id":10073,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/10070\/revisions\/10073"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8600"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=10070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=10070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=10070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}