Additional CTI / notes (V2)
Summary
Over the past month, multiple critical sectors—including finance, healthcare, government, critical infrastructure, and technology—experienced advanced cyberattacks. Common patterns include:
Slow detection and delayed remediation driven by outdated infrastructure, insufficient 24/7 monitoring, fragmented tooling, and immature incident response procedures.
Sophisticated tactics such as supply chain compromise, zero-day exploitation, ransomware, DDoS distraction, and phishing-resistant MFA bypasses.
High-profile adversaries including APT29, APT41, Lazarus Group, and ransomware-as-a-service operators (BlackSuit, Nokoyawa affiliates).
Each incident has been analyzed using MITRE ATT&CK techniques, IOCs, root cause analysis, and sector-tailored remediation strategies.
MAJOR INCIDENTS
1. Medilance Health Group – BlackSuit Ransomware
Date: June 8, 2025
Sector: Healthcare
Attack Vector: Phishing and Citrix ADC exploit (CVE-2024-6320)
Adversary: BlackSuit RaaS
TTPs:
Initial Access: T1566, T1190
Lateral Movement: T1021.002, T1570
Impact: T1486
IoCs: IP 146.190.54[.]230, CISA Alert AA25-159A
Impact: 80% of patient records offline in 13 hospitals; surgery delays; dark web leaks
Response: Isolation, HHS reporting, forensic investigation, patient disclosures
Gaps: End-of-life systems, no MFA, weak filtering
Remediation:
Short-term: Patch Citrix, EDR rollout, C2 blocks
Long-term: Zero Trust, phishing drills, architectural hardening
2. UnitedHealth Partners – BlackRansom/Nokoyawa Affiliate
Date: May 28, 2025
Sector: Healthcare
Attack Vector: Follina-style zero-day via Office document
Adversary: BlackRansom (Nokoyawa-linked)
TTPs:
T1566.001, T1204.002, T1550.002
Impact: EHR outages in 50+ hospitals, 4.5M PHI records breached
Response: Network segmentation, reimaging, FBI coordination
Gaps: Zero-day exploit left unpatched; weak phishing defenses
Remediation:
Accelerated patching, 100% EDR coverage, Zero Trust, offline backup rotation
3. Finware Cloud – Zero-Day Supply Chain Attack
Date: Disclosed June 1, 2025
Sector: Finance (SaaS)
Attack Vector: CI/CD plugin vulnerability
Adversary: Suspected APT29 (Cozy Bear)
TTPs: T1195.002, T1574.002, T1505.003, T1070.006
IoCs: C2: dev-finupdates[.]com
Impact: Trojanized DLLs in 440+ banks; credential harvesting; wire fraud
Response: Build rollback, forced credential reset, FS-ISAC alerts
Gaps: No code-signing enforcement, delayed public disclosure
Remediation:
YARA rules, runtime attestation, SBOM adoption, build isolation
4. Fiscalis Banking Middleware – Lazarus Group (FINSMASH)
Date: May 16, 2025
Sector: Fintech
Attack Vector: CI/CD pipeline compromise
Adversary: Lazarus (UNC2564)
TTPs: T1078, T1195, T1218, T1059
IoCs: DPRK IP ranges, fiscalis-service[.]cloud
Impact: $21M in financial impact; builds infected for 2 weeks
Response: Forced updates, credential revocation, regulatory notifications
Gaps: CI/CD segmentation, anomaly detection, disclosure delay
Remediation:
HSMs for keys, provenance checks, dev-to-prod isolation
5. Finlandski Bank – Triple Attack (DDoS + Credential Stuffing + API Exploit)
Date: June 3, 2025
Sector: Finance (Nordics)
Attack Vector: Multi-vector
Adversary: Zarya (Pro-Kremlin hacktivist)
TTPs: T1078, T1190, T1499
IoCs: Mirai variant, bot-check[.]ru
Impact: 9-hour outage, Telegram leak of PII
Response: CDN filtering, WAF rules, LE notification
Gaps: Weak credential hygiene, exposed admin APIs, no DDoS visibility
Remediation:
API hardening, adaptive rate limits, credential blacklists
6. DOT Contractor Portal – Watering Hole with Chrome Zero-Day
Date: May 27, 2025
Sector: Government
Attack Vector: Browser exploit via JS analytics
Adversary: APT41 (Gadolinium)
TTPs: T1189, T1203, T1071.001
IoCs: analytics-stat[.]usdot[.]gov, dash-serversync[.]com
Impact: Contractor creds stolen; persistence in 3 sub-agencies
Response: Portal takedown, Chrome patch push, IOC sweep
Gaps: No SRI, no remote EDR, poor contractor endpoint control
Remediation:
SRI enforcement, contractor MFA, remote EDR coverage
7. Midwestern US Water Utility – ICS Breach Attempt
Date: May 27, 2025 (Disclosed: June 6, 2025)
Sector: Critical Infrastructure (Water)
Attack Vector: Brute-force RDP, process manipulation attempt
Adversary: Suspected DEV-0794 (Iran)
TTPs: T1110.001, T1021.001, T1543.003
IoCs: vps-water[.]com, backdoor hash a9ff12...
Impact: ICS lockdown for 72 hrs; no chemical incident due to failsafe
Response: CISA-led review, RDP disabled, vaulting initiated
Gaps: Flat IT/OT network, brute-force detection failure
Remediation:
Segment networks, disable RDP, deploy PAM tools
8. AppHive (MacOS) – ZeroMorph Privilege Escalation
Date: June 2, 2025
Sector: Technology
Attack Vector: MacOS LPE zero-day (CVE-2025-19832)
Adversary: ZeroMorph mercenary crew
TTPs: T1566.001, T1068, T1543.001
IoCs: PKG installers, WebSocket traffic on ports 8443, 9443
Impact: Developer SSH keys stolen; internal code repo access
Response: Emergency patch push, SSH key rotation, legal review
Gaps: Incomplete patching, unmanaged BYOD endpoints
Remediation:
MDM enforcement, key reuse audits, MacOS EDR parity
9. European Parliament – O365 Phishing & MFA Abuse (StarkPhish)
Date: May 31, 2025
Sector: Government
Attack Vector: MFA push fatigue via targeted phishing
Adversary: Likely APT28 (Fancy Bear)
TTPs: T1566.002, T1110, T1580, T1530
IoCs: Slack/Telegram-based C2, exfil paths
Impact: 60+ staff O365 accounts accessed
Response: MFA reset, OAuth detection rules, training overhaul
Gaps: Legacy MFA, stale accounts, slow response coordination
Remediation:
FIDO2 tokens, condition access policies, OAuth abuse monitoring
Patterns of Failure and Remediation Priorities
Category Observed Weaknesses Strategic Mitigations Detection Lag No 24/7 SOC, poor alert correlation SIEM+SOAR automation, anomaly detection Patch Delays Legacy/COTS systems ignored SLA-driven patching, auto-update MDMs MFA Gaps Push fatigue, legacy auth methods FIDO2, risk-based auth, token enforcement Endpoint Blind Spots macOS, remote, contractor systems Full telemetry across all platforms Supply Chain Risk Dev-prod flatness, no SBOM CI/CD segmentation, SLSA adoption User Training Deficit Poor phish awareness Simulations, onboarding education
IR Playbook: Key Phases
Preparation:
Asset inventory, contact validation, simulate supply chain and hybrid threats
Identification:
IOC alerting, SIEM baselining, behavioral deviations
Containment:
Affected subnets isolated, emergency firewall rules, rapid EDR deployment
Eradication:
Malware artifacts removed, root cause traced, patches applied
Recovery:
System integrity validated, backup restoration, enhanced monitoring
Lessons Learned:
Full AAR (After Action Report), update SOPs/playbooks, share intel with ISACs
References & Alerts