• Dragon Sight
  • Posts
  • Dragon Sight: Emerging Threats & Security Strategies

Dragon Sight: Emerging Threats & Security Strategies

WEEK OF APRIL 28–MAY 02, 2025 | ISSUE 07 | "Stay informed. Stay prepared. Stay secure with Dragon Sight"

This Week in Issue

Zero-click spyware is surging, forcing a reexamination of mobile security practices across enterprise environments. North Korean hackers have begun leveraging generative AI to enhance cyber operations, marking a dangerous evolution in state-sponsored threat tactics. SAP NetWeaver users are urged to patch critical flaws amid active exploitation. Meanwhile, ransomware gangs are shifting to aggressive affiliate models, hammering healthcare and education sectors. Finally, Verizon’s latest DBIR confirms that small businesses are now prime targets no organization is too small to escape the crosshairs.

CYBER NEWS ROUNDUP

The Growing Threat of Zero-Click Spyware
Zero-click spyware exploits mobile device vulnerabilities without any user interaction, making detection and prevention extremely difficult. These attacks target executives, journalists, and government officials, often bypassing traditional security layers. The implications include deep surveillance and unauthorized data access at scale. Organizations should reevaluate mobile security strategies and prioritize endpoint detection and response (EDR) tools designed for mobile threats.
Read more: https://www.cybersecurity-insiders.com/the-growing-threat-of-zero-click-spyware-why-organizations-must-rethink-smartphone-security-2/

SAP NetWeaver Patch Urgency
SAP has issued critical patches for its NetWeaver Application Server, addressing a severe vulnerability (CVSS score 9.8) that allows remote code execution. Affected organizations risk full system compromise if the flaw is exploited. Threat actors are actively scanning for this weakness, placing unpatched systems in immediate jeopardy. IT teams should apply the latest security updates without delay to mitigate exposure.
Read more: https://www.theregister.com/2025/04/25/sap_netweaver_patch/

AI DJ Deployed Without Disclosure in Australia
An Australian radio station replaced its afternoon host with an AI-generated DJ trained on the real host’s voice without informing listeners. While framed as innovation, the move raises ethical questions about transparency and digital identity. The AI, “Arnie,” delivered pre-recorded segments, blurring lines between automation and authenticity. This incident underscores the importance of clear AI policies in content creation.
Read more: https://www.theverge.com/news/656245/australian-radio-station-ai-dj-workdays-with-thy

MTN Data Breach Compromises Customer Information
Telecom giant MTN confirmed a cyberattack that exposed customer data in Zambia, including subscriber identities and SIM-related information. While the company claims core systems remain unaffected, the breach still presents risks for fraud and identity theft. Affected individuals may face phishing attempts or account compromise. MTN is collaborating with authorities and enhancing its cybersecurity posture.
Read more: https://www.bleepingcomputer.com/news/security/mobile-provider-mtn-says-cyberattack-compromised-customer-data/

Baltimore City Public Schools Breach Affects 31,000+
Baltimore City Public Schools disclosed a data breach affecting over 31,000 individuals, exposing names, Social Security numbers, and other sensitive data. The breach may lead to identity theft or fraudulent activity, particularly among students and staff. It highlights ongoing challenges in securing education sector infrastructure. Those impacted are advised to monitor credit and enroll in identity protection services.
Read more: https://www.bleepingcomputer.com/news/security/baltimore-city-public-schools-data-breach-affects-over-31-000-people/

North Korean Hackers Using GenAI to Infiltrate Jobs
North Korean threat actors are leveraging generative AI tools to pose as remote tech workers and infiltrate Western companies. By producing convincing résumés and deepfake interviews, they secure employment and funnel intelligence or revenue back to state operations. This tactic represents a dangerous evolution in cyber-espionage. Organizations must strengthen background checks and monitor anomalous remote activity.
Read more: https://cybersecuritynews.com/north-korean-hackers-using-genai/

FBI Offers $10M Bounty on State-Backed Cybercriminals
The FBI is offering up to $10 million for information on the Salt Typhoon hacking group, believed to be a Chinese state-sponsored threat actor. The group has targeted U.S. critical infrastructure and telecom networks. The bounty highlights the growing geopolitical stakes of cyberwarfare. Security teams should remain vigilant and share threat intelligence with federal agencies.
Read more: https://cybersecuritynews.com/fbi-to-offer-reward-up-to-10-million/

159 CVEs Exploited in the Wild During Q1 2025
A new report confirms 159 vulnerabilities were actively exploited in Q1 2025, with nearly 9% attacked within 24 hours of disclosure. These rapid exploit timelines underscore the critical need for timely patch management. Common targets included Microsoft, Adobe, and web application platforms. Organizations must streamline vulnerability scanning and prioritize high-risk CVEs immediately.
Read more: https://cybersecuritynews.com/159-cves-exploited-in-the-wild-in-q1-2025/

Small Businesses Face Rising Cyber Threats, Verizon DBIR Finds
Verizon’s latest Data Breach Investigations Report shows small businesses are increasingly targeted due to limited defenses. The report identifies ransomware, phishing, and credential abuse as top threats. Breaches in this sector often have severe operational and financial consequences. Small enterprises must invest in affordable, layered security solutions to survive in today’s threat landscape.
Read more: https://cybersecuritynews.com/verizon-dbir-report-small-businesses-emerges-as-prime-targets/

Ransomware Gangs Adopt Affiliate Models to Scale Operations
Ransomware groups are evolving into franchise like affiliate programs, enabling less skilled actors to launch attacks with prebuilt infrastructure. This model significantly increases attack volume and diversity across sectors. Victims face a higher risk of double extortion, data leaks, and re-attacks. Businesses must deploy continuous monitoring and endpoint protections to counter this shift.
Read more: https://www.darkreading.com/data-privacy/ransomware-gangs-innovate-new-affiliate-models

Microsoft Advances Security Culture Overhaul Post-Breaches
Following high-profile security lapses, Microsoft is reforming its security culture, embedding cybersecurity into employee performance metrics and development cycles. Key actions include default multi-factor authentication, stronger internal audits, and secure-by-design engineering practices. These moves aim to reduce attack surfaces across all products and teams. Microsoft’s shift could serve as a blueprint for other enterprises.
Read more: https://www.darkreading.com/cybersecurity-operations/microsoft-steady-progress-revamp-security-culture

Healthcare Sector Hit by Wave of Ransomware Attacks
Recent ransomware attacks have crippled multiple healthcare organizations, including DaVita and Bell Ambulance, disrupting operations and threatening patient data. Cybercriminals increasingly view healthcare as a soft, high-value target. The incidents stress the need for backup resilience, segmented networks, and staff awareness training. Regulatory pressure may increase to force improved cyber hygiene across the sector.
Read more: https://www.darkreading.com/cyberattacks-data-breaches/healthcare-orgs-hit-ransomeware-attacks

Medusa Ransomware Adopts RaaS Model, Increases Attacks
The Medusa group has pivoted to a Ransomware-as-a-Service (RaaS) model, offering affiliates easy deployment tools and broader target lists. The group’s attacks are becoming more frequent and impactful, hitting industries like healthcare and education. Their model leverages data extortion, public shaming, and encrypted lockouts. Defenders must enhance incident response playbooks and update offline backups regularly.
Read more: https://www.darkreading.com/threat-intelligence/medusa-momentum-ransomware-as-a-service-pivot

Why This matters

This week’s cybersecurity landscape reveals a clear and pressing shift: attackers are becoming faster, smarter, and more relentless. From zero click spyware targeting mobile devices to ransomware gangs using affiliate models and nation state actors deploying generative AI, the threat environment is evolving rapidly. Critical sectors like healthcare, education, and small businesses are under sustained pressure, while CISA’s latest advisories warn of serious vulnerabilities in industrial systems that support essential infrastructure.

The takeaway is urgent traditional defenses are no longer enough. With vulnerabilities now being exploited within hours of disclosure, organizations must adopt a proactive mindset rooted in real-time threat intelligence, rapid patching, and a zero-trust approach. The cost of hesitation is no longer measured in data loss alone it’s operational disruption, financial damage, and compromised safety.

Cyber Hygiene Tips (Based on This Week’s Threats)

Protect smartphones against zero-click spyware
Turn on automatic updates for all mobile devices and avoid clicking unknown links even legitimate-looking apps can be compromised by spyware attacks.

Lock down SIM and mobile account information
Following the MTN breach, protect your phone accounts with PINs or additional authentication to prevent SIM swap attacks and identity theft.

Strengthen school and education network defenses
In light of the Baltimore City Schools breach, implement endpoint protection and segment school networks to limit the spread of attacks.

Update ransomware response plans
With ransomware gangs launching more affiliate-based attacks, regularly back up critical data offline and rehearse rapid recovery procedures.

Tighten MFA and authentication practices
Microsoft’s internal reforms show the importance of strong authentication enforce multi-factor authentication (MFA) across all employee accounts.

Prioritize fast patching for newly disclosed CVEs
Since over 150 vulnerabilities were actively exploited this quarter, shorten your patch cycles to days not weeks to close critical gaps quickly.

Protect small business systems with layered defenses
Verizon’s DBIR shows small businesses are primary ransomware targets deploy layered security like firewalls, EDR, and phishing training even on limited budgets.

Government advisories

ICSA-25-114-05 Siemens Mendix SAML Authentication Bypass Vulnerability
https://www.cisa.gov/news-events/ics-advisories/icsa-25-114-05

ICSA-25-114-02 Siemens SINEC Infrastructure Network Services
https://www.cisa.gov/news-events/ics-advisories/icsa-25-114-02

AA25-022A: North Korean State-Sponsored Cyber Actors Use Social Engineering to Enable Hacking for Financial Gain
https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-022a

AA24-290A: Scattered Spider Cyber Actors Social Engineering Tactics
https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-290a

THREAT FOCUS INFORMATION

Inside the “ToyMaker” Campaign

Overview
A newly identified initial access broker (IAB), dubbed ToyMaker, has emerged as a financially motivated threat actor exploiting exposed internet-facing systems to gain entry into target environments. First reported by Cisco Talos, ToyMaker leverages a custom backdoor named LAGTOY to establish persistence, exfiltrate credentials, and enable follow-on activity, including ransomware deployment. Once access is established, ToyMaker facilitates hands-on intrusion using tools like Cactus ransomware, PowerShell, WinSCP, AnyDesk, and Impacket, providing flexibility across various enterprise environments. The campaign targets a broad range of sectors and plays a critical role in the ransomware-as-a-service (RaaS) ecosystem by monetizing footholds for more destructive threat groups.

Tools and Techniques
The LAGTOY backdoor is capable of spawning reverse shells, executing arbitrary commands, and serving as a staging platform for additional payloads. ToyMaker’s tooling arsenal suggests modular capabilities, including remote desktop abuse, file transfers, credential theft, and command-and-control via alternative protocols. These activities map across a wide set of MITRE ATT&CK https://attack.mitre.org/ techniques, revealing the operation’s depth and sophistication:

  • T1003 – OS Credential Dumping

  • T1021 – Remote Services (e.g., SSH, RDP)

  • T1059 – Command and Scripting Interpreter

  • T1562 – Impair Defenses

  • T1070 – Indicator Removal on Host

  • T1048 – Exfiltration Over Alternative Protocol

  • T1543 – Create or Modify System Process

  • T1560 – Archive Collected Data

  • T1608 – Stage Capabilities

  • T1136 – Create Account

Strategic Implications
ToyMaker’s campaign highlights the growing importance of initial access brokers in today’s cybercrime supply chain. By selling or trading access to compromised networks, IABs like ToyMaker enable more destructive actors such as ransomware operators or state-aligned APTs to move quickly from breach to impact. In a geopolitical environment where ransomware has become both a criminal and political weapon, the existence of scalable access-as-a-service platforms increases the operational tempo of cybercriminals. This campaign also reflects a growing technical overlap between cybercrime and espionage, blurring lines between financially motivated and state-sponsored operations.

Defensive Recommendations

  • Patch and harden internet-facing assets, especially RDP, SSH, and outdated web applications.

  • Audit and rotate credentials regularly, particularly domain admin and service accounts.

  • Implement EDR and NDR tools that can detect lateral movement, scheduled tasks, and PowerShell misuse.

  • Disable unnecessary services and ports to reduce the attack surface exploited by ToyMaker.

  • Monitor for IOCs linked to known LAGTOY infrastructure and malware hashes (see below).

  • Train SOC analysts to recognize signs of IAB-related activity and prepare for potential ransomware escalation.

Indicators of Compromise (IOCs)
The following indicators are defanged to prevent accidental engagement. Use caution and validate within your own threat intel platforms.

Type

IOC (Defanged)

IP Address

195[.]123[.]240[.]2

IP Address

206[.]188[.]196[.]20

IP Address

64[.]52[.]80[.]252

IP Address

75[.]127[.]0[.]235

IP Address

103[.]199[.]16[.]92

IP Address

149[.]102[.]243[.]100

IP Address

158[.]247[.]211[.]51

IP Address

162[.]33[.]177[.]56

IP Address

162[.]33[.]178[.]196

IP Address

178[.]175[.]134[.]52

IP Address

194[.]156[.]98[.]155

IP Address

209[.]141[.]43[.]37

IP Address

39[.]106[.]141[.]68

IP Address

47[.]117[.]165[.]166

IP Address

51[.]81[.]42[.]234

File Hash (SHA-256)

0a367cc7e7e297248fad57e27f83316b7606788db9468f59031fed811cfe4867

File Hash (SHA-256)

5831b09c93f305e7d0a49d4936478fac3890b97e065141f82cda9a0d75b1066d

File Hash (SHA-256)

70077fde6c5fc5e4d607c75ff5312cc2fdf61ea08cae75f162d30fa7475880de

File Hash (SHA-256)

c1bd624e83382668939535d47082c0a6de1981ef2194bb4272b62ecc7be1ff6b

File Hash (SHA-256)

fdf977f0c20e7f42dd620db42d20c561208f85684d3c9efd12499a3549be3826

Discover the Nexus-Dragon Ecosystem

Explore Everything at Nexus-Dragon.com. Your Launchpad for Elite Cybersecurity Training and Business-Grade Protection

Comprehensive Learning Subscription (CLS)
The CLS program is more than just certification prep it’s a full-spectrum, 4-year guided learning pathway for professionals committed to mastering information security and gaining long-term expertise in the field.

www.nexus-dragon.com

Included in CLS:

  • Full prep and resources for CISSP, CEH, CASP+, GBK, and Cyber Training certifications

  • Access to interactive cloud security labs, recorded workshops, and scheduled mentorship

  • Built-in progress tracking, skill assessments, and a structured roadmap to job-ready proficiency

  • Complimentary access to our Basic Cyber Operations (BCO) course for foundational knowledge in network security and incident response

Dragon Armor Cybersecurity Suite
Tailored for small and mid-sized businesses, Dragon Armor delivers serious protection without the complexity of big-ticket enterprise tools. It’s everything you need to secure your environment designed to scale as you grow.

Included with Dragon Armor:

  • AI-driven threat detection, endpoint security, and real-time response

  • Built-in alignment with HIPAA, NIST Cybersecurity Framework (CSF), and ISO 27001

  • Guided onboarding and a full cybersecurity risk assessment to identify gaps

  • Multi-year price lock and flexible plans that grow with your organization’s needs

Stay Ahead of Cyber Threats with Curated Threat Intelligence

In today’s fast-moving cyber landscape, raw data isn’t enough you need actionable intelligence tailored to your business. Our Curated Threat Intelligence Service delivers real-time insights, customized threat profiles, and prioritized alerts focused on your industry, your risks, and your critical assets.

We filter the noise, track evolving threat actors, and highlight only what matters most so you can act faster, defend smarter, and stay resilient. Every report includes high-confidence indicators of compromise (IOCs), mapped MITRE ATT&CK techniques, and strategic recommendations designed to strengthen your defenses.

Protect your business with intelligence built for action, not overwhelm.
Contact us today to start receiving tailored threat intelligence you can trust.

Whether you’re focused on penetration testing, compliance, data privacy, or building out your security operations, Nexus-Dragon equips you with the tools, knowledge, and strategies to lead from the front.

Partner Spotlight

Organize, Track, and Succeed with Monday.com

We’re proud to be sponsored by Monday.com, the all-in-one work operating system that helps teams stay organized, efficient, and ahead of schedule. Whether you're managing cybersecurity projects, coordinating threat intelligence reports, or streamlining daily operations, Monday.com offers customizable workflows, real-time collaboration, and powerful automation all in one easy-to-use platform.

Ready to take control of your projects and boost your team's productivity?
Get started today with Monday.com

Ready to move forward?
For full details, customized walkthroughs, or to begin onboarding, contact our team at:

[email protected]
Or explore our solutions directly at:

TELL US HOW WE’RE DOING!

We value your feedback! Let us know how we can improve future issues.

The information provided is for general purposes only and is accurate to the best of our knowledge. We do not guarantee its accuracy or reliability and are not responsible for any outcomes resulting from its use. This post contains affiliate links, meaning we may earn a commission if you purchase through them, at no additional cost to you. All trademarks belong to their respective owners.

CONTACT US

📞 850-684-0278