{"id":10070,"date":"2025-08-18T13:53:29","date_gmt":"2025-08-18T10:53:29","guid":{"rendered":"https:\/\/cyberone.bg\/?p=10070"},"modified":"2025-11-10T13:37:33","modified_gmt":"2025-11-10T10:37:33","slug":"weekly-cybersecurity-report-week-33-2025","status":"publish","type":"post","link":"https:\/\/cyberone.bg\/en\/weekly-cybersecurity-report-week-33-2025","title":{"rendered":"Weekly Cybersecurity Report | Week 33, 2025"},"content":{"rendered":"<p>As your dedicated cybersecurity services provider,<strong>\u00a0<a href=\"https:\/\/cyberone.bg\/\">Cyberone<\/a><\/strong>\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape.<\/p>\n<h2>Weekly Cybersecurity Report | Week 33, 2025<\/h2>\n<p><strong><u>Information security updates and events from the past we<\/u><\/strong><strong><u>ek<\/u><\/strong><\/p>\n<ol>\n<li>\n<h3><strong> Advanced Ransomware Campaign \u2013 Charon Group in the Middle East<\/strong><strong><br \/>\n<\/strong><\/h3>\n<p>The ransomware group <strong>Charon<\/strong> conducted a targeted campaign in the Middle East against both business and public sectors. Advanced techniques typically associated with APT groups were observed, including <strong>BYOVD (Bring Your Own Vulnerable Driver)<\/strong> to disable EDR systems. This reinforces the growing notion of blurred lines between criminal cybercrime operations and state-backed activity.<\/li>\n<li>\n<h3><strong>Hacktivist Operations Against Israeli Targets \u2013 SiegedSec<br \/>\n<\/strong><\/h3>\n<p>During the week, reports indicated an expansion of SiegedSec\u2019s <strong>\u201cFourth Operation\u201d<\/strong> campaign. The hacktivist group claimed to have leaked data stolen from Israeli companies including <strong>Israir, Bezeq, and Cellcom<\/strong>. Some of the material was distributed via Telegram, although not all of the information has been independently verified. The incident aligns with the group\u2019s recent <strong>pro-Palestinian activities<\/strong>.<\/li>\n<li>\n<h3><strong> United States \u2013 Cyberattack on the Pennsylvania Attorney General\u2019s Office<br \/>\n<\/strong><\/h3>\n<p>The website, email systems, and phone lines of the <strong>Pennsylvania Attorney General\u2019s Office<\/strong> were disrupted early in the week due to a cyberattack. Services were gradually restored after several days. Authorities are investigating whether the incident was a ransomware attack.<\/li>\n<li>\n<h3><strong>BlackSuit Ransomware Group Takedown \u2013 $1 Million Seized<br \/>\n<\/strong><\/h3>\n<p>Authorities in the <strong>U.S. and Europe<\/strong> conducted a joint operation against the ransomware group <strong>BlackSuit<\/strong>, seizing servers, taking down domains, and confiscating approximately <strong>$1 million in cryptocurrency<\/strong>. The group had been responsible for dozens of ransomware attacks against critical U.S. organizations since 2022.<\/li>\n<li>\n<h3><strong> Norway \u2013 Pro-Russian Hackers Breach Hydropower Dam<br \/>\n<\/strong><\/h3>\n<p>Hackers linked to Russia infiltrated the control systems of a <strong>Norwegian dam<\/strong>, triggering a controlled opening of floodgates that released over <strong>1.9 million gallons of water<\/strong>. No physical damage was reported, but the incident highlighted severe vulnerabilities in <strong>critical infrastructure<\/strong>.<\/li>\n<li>\n<h3><strong> Poland \u2013 Water Supply Attack Foiled<br \/>\n<\/strong><\/h3>\n<p>Polish authorities reported successfully <strong>thwarting a cyberattack<\/strong> targeting water supply systems in a major city. The intrusion was detected and blocked before causing disruptions. Poland continues to invest billions in cybersecurity to protect vital infrastructure.<\/li>\n<li>\n<h3><strong> United Kingdom \u2013 Sensitive Data Breach at Aviation Contractor<br \/>\n<\/strong><\/h3>\n<p><strong>Inflite<\/strong>, a contractor at Stansted Airport, experienced a breach in which data from around <strong>3,500 individuals<\/strong> was leaked. Victims included Afghan refugees, former government ministers, and military personnel. The UK government has launched a formal investigation.<\/li>\n<li>\n<h3><strong> Global Intelligence Assessments \u2013 Akira, PXA Stealer, and CERT-UA Warnings<\/strong><\/h3>\n<ul>\n<li>The <strong>Akira ransomware<\/strong> group has been observed conducting widespread campaigns, particularly exploiting vulnerable VPNs.<\/li>\n<li>Extensive data theft was attributed to <strong>PXA Stealer<\/strong> malware.<\/li>\n<li><strong>CERT-UA<\/strong> issued warnings about <strong>UAC-0099<\/strong>, which targeted government and defense entities in Ukraine.<\/li>\n<\/ul>\n<\/li>\n<li>\n<h3><strong>New Ransomware Variant \u2013 Jackpot Ransomware<br \/>\n<\/strong><\/h3>\n<p>A new ransomware strain called <strong>Jackpot<\/strong> was identified on underground forums. Analysts noted its <strong>advanced capabilities<\/strong> and similarities to the infamous <strong>LockBit<\/strong> group\u2019s tools and techniques.<\/li>\n<li>\n<h3><strong> Critical Security Updates \u2013 Microsoft<br \/>\n<\/strong><\/h3>\n<p>On <strong>August 13<\/strong>, Microsoft released its monthly <strong>Patch Tuesday<\/strong>, addressing <strong>111 vulnerabilities<\/strong>, including a <strong>critical zero-day flaw in Kerberos (CVE-2025-53779)<\/strong> affecting Active Directory environments<\/li>\n<\/ol>\n<p><strong><em>The cybersecurity attacks highlighted in this report aren&#8217;t just incidents, they&#8217;re blueprints of the adversary&#8217;s arsenal. To protect your business you need the right partner. Cyberone is here to help! Check out our <a href=\"https:\/\/cyberone.bg\/en\/services\">services<\/a>.<\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As your dedicated cybersecurity services provider,\u00a0Cyberone\u00a0equips you with timely and in-depth information about current cyber attacks. Discover a weekly cybersecurity report of the latest exploits and breaches shaping the ever-evolving cybersecurity landscape. Weekly Cybersecurity Report | Week 33, 2025 Information security updates and events from the past week Advanced Ransomware Campaign \u2013 Charon Group in [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8600,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[65],"class_list":["post-10070","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-cyber-updates","tag-weekly-cybersecurity-report"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/10070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/comments?post=10070"}],"version-history":[{"count":3,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/10070\/revisions"}],"predecessor-version":[{"id":10073,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/posts\/10070\/revisions\/10073"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media\/8600"}],"wp:attachment":[{"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/media?parent=10070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/categories?post=10070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberone.bg\/en\/wp-json\/wp\/v2\/tags?post=10070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}