may-june CTI report

Summary

Over the past month, multiple sectors—including finance, healthcare, critical infrastructure, and technology—have suffered sophisticated cyber attacks. A recurring theme across these incidents is slow detection and protracted remediation cycles, primarily due to legacy systems, insufficient monitoring, under-resourced teams, or ineffective playbooks. Below, each incident is detailed with analysis, MITRE ATT&CK TTPs, and clear mitigation strategies, with separate highlights on why cases remained uncontained for extended periods.

1. Ransomware Attack on Medilance Health Group

  • Date: 2025-06-08

  • Target Sector: Healthcare

  • Attack Type & Vector: Ransomware (BlackSuit variant), initial access via phishing and exploitation of unpatched Citrix ADC (CVE-2024-6320)

  • Adversary Group: BlackSuit RaaS

  • Techniques/IoCs:

    • Initial Access: Phishing (T1566), Exploit Public Facing Application (T1190)

    • Execution: User Execution (T1204)

    • Lateral Movement: SMB/PSExec (T1021.002, T1570)

    • Impact: Data Encrypted for Impact (T1486)

    • IoCs: IPs 146.190.54[.]230, hashes on CISA Alert AA25-159A

  • Immediate Impact: 80% of patient record systems offline across 13 facilities, scheduled surgeries delayed, malicious data exfiltration confirmed—some files posted to dark web.

  • Response Actions: All systems isolated, forensics activated, incident reported to HHS, negotiation coordinators engaged, disclosure to patients/public.

  • Security Gaps:

    • End-of-life Citrix ADC appliances, months behind on updates.

    • Weak email filtering; no MFA on remote interfaces.

    • Slow detection (roughly 36 hours post-initial compromise).

  • Remediation & Mitigation:

    • Immediate: Patch/vacate vulnerable Citrix systems, roll out EDR network-wide, block known C2 domains.

    • Medium-term: Enforce phishing simulations, implement Zero Trust/NAC, architectural review of internet-facing infrastructure.

    • Could have prevented: Routine vulnerability scanning with enforced patching SLAs, application whitelisting, early adoption of behavioral EDR.

  • Links:

Delay Analysis: Detection lag was due to a lack of centralized log collection and disparate security tools with poor correlation capabilities. No 24/7 SOC monitoring meant overnight attacks went undetected.

2. Zero-Day Supply Chain Attack on Finware Cloud

  • Date: Disclosed 2025-06-01 (Attack began ~2025-05-22)

  • Target Sector: Financial SaaS customers globally (2,300 orgs)

  • Attack Type & Vector: Zero-day supply chain compromise of Finware's build server (vulnerability in CI/CD plugin)

  • Adversary Group: Suspected APT29 (Cozy Bear), evidence still under joint Mandiant/DHS review

  • Techniques/IoCs:

    • Initial Access: Supply Chain Compromise (T1195.002)

    • Execution: DLL Side-Loading (T1574.002)

    • Persistence: Web Shell (T1505.003)

    • Defense Evasion: Time Stomping (T1070.006)

    • IoCs: trojanized FinwareClient.dll, C2: dev-finupdates[.]com

  • Immediate Impact: Widespread credential harvesting, Trojan deployment in at least 440 banks, potential wire fraud attempts.

  • Response: Emergency rollback of affected builds, mandatory credential resets for all customers, coordinated takedown of C2 domains, broad notifications via ISACs.

  • Security Gaps:

    • Insufficient code-signing enforcement and build integrity checks.

    • No runtime behavior analysis or app attestation for client updates.

    • Delayed public disclosure (>8 days from initial discovery) due to legal/PR bottlenecks.

  • Remediation/Mitigation:

    • Short-term: Retrospective scan for trojanized DLLs, SIEM rule deployment, YARA detection of specific loader code.

    • Long-term: SBOM (Software Bill of Materials) mandates, build pipeline isolation from corporate IT, digital code-signing upgrades.

    • Could have reduced impact: Mandatory strong runtime attestation, regular third-party code reviews.

  • Links:

Delay Analysis: The lack of automated build verification and runtime detection for new clients meant the compromise spread undetected for at least a week, before customer banks saw anomalous transactions.

3. Watering Hole Attack — US Government Agency Portal

  • Date: Publicly reported 2025-05-27

  • Target: US Department of Transportation contractor portal

  • Attack Type & Vector: Watering hole with browser zero-day (Chrome v121), exploited vulnerable analytics script

  • Adversary Group: Suspected APT41 (Gadolinium)

  • TTPs/IoCs:

    • Initial Access: Drive-by Compromise (T1189), Exploit Web Browser (T1203)

    • Command & Control: Encrypted C2 over HTTPS (T1071.001)

    • Credential Access: KeePass dump executable

    • IoCs: JS loader: analytics-stat[.]usdot[.]gov/v1/init.js, C2: dash-serversync[.]com

  • Impact: Temporary theft of contractor credentials, undetected persistence in three federal sub-agencies.

  • Responded Actions: Portals taken offline, forced Chrome update push, IR initiated, federal warning to all contractors.

  • Security Gaps:

    • External JS scripts not integrity checked (no SRI).

    • Poor endpoint isolation on contractor endpoints.

    • No EDR telemetry from visitors (out-of-band attacks not detected).

  • Remediation/Mitigation:

    • Short-term: Review portal dependencies for SRI/upgrade, rapid browser patch enforcement, IOC sweeps for persistence.

    • Long-term: Stronger supply chain management, MFA for all contractor portals, endpoint monitoring for remote users.

  • Links:

Delay Analysis: Attacks were only discovered after anomalous behavior by a contractor. No browser telemetry and lack of anomaly detection for portal resource changes allowed silent exploitation for days.

4. Three-Pronged DDoS and Data Breach — Finlandski Bank

  • Date: 2025-06-03

  • Sector: Finance (Nordics)

  • Attack Type & Vector: Simultaneous DDoS (IoT botnet) + credential stuffing + data exfiltration via web API exploit

  • Adversary Group: Zarya (pro-Kremlin hacktivist alliance)

  • TTPs/IoCs:

    • Initial Access: Valid Accounts (T1078), Exploit API (T1190)

    • Impact: Network Denial of Service (T1499)

    • C2: bot-check[.]ru, known Mirai variant signatures

  • Immediate Impact: Online banking down for 9 hours, partial customer data leak (personal details) published on Telegram.

  • Response Actions: Traffic filtered via CDN/waf, API emergency patch, press briefings, law enforcement notified.

  • Security Gaps:

    • Unlocked admin APIs with missing rate-limits.

    • Weak password hygiene; multi-use credentials.

    • No proactive DDoS detection (public signal, not monitored internally).

  • Remediation:

    • Short-term: Password reset, increase WAF rules, expand API parameter validation.

    • Long-term: Adaptive rate-limiting, credential stuffing detection, contractable DDoS scrubbing.

    • Could have prevented: API scanning in CI/CD, required MFA, customer password blacklist enforcement.

  • Links:

Delay Analysis: Security teams focused on stopping DDoS while missing parallel data exfiltration. Lack of comprehensive API monitoring and credential hygiene allowed a multi-vector breach during the distraction.

5. Critical Infrastructure ICS Attack — Midwestern US Water Utility

  • Date: 2025-05-27 (disclosed 2025-06-06)

  • Sector: Critical Infrastructure (Water)

  • Attack Type & Vector: Attempted process manipulation via unsecured remote access; deployed backdoor through RDP brute-force.

  • Attribution: Suspected Iranian threat actors (DEV-0794)

  • MITRE TTPs/IoCs:

    • Initial Access: Brute Force (T1110.001), Remote Services (T1021.001)

    • Persistence: New Service (T1543.003)

    • Impact: Incomplete manipulation (fail-safe stopped chemicals drift)

    • IoCs: Backdoor hash a9ff12..., C2 on vps-water[.]com

  • Impact: Brief interruption, no water quality incident, but all IoT/ICS segments isolated for 72 hours, public confidence shaken.

  • Response Actions: IR teams from CISA, physical access audits, RDP disabled, password vaulting, all critical ICS reviewed.

  • Security Gaps:

    • Remote desktop available to internet.

    • No brute-force alerting; password reuse from breached accounts.

    • Flat network between IT/OT systems.

  • Remediation:

    • Short-term: Disable RDP, patch & isolate ICS, MFA on control network.

    • Long-term: Permanent network segmentation, privileged access management, 24/7 threat monitoring.

    • Could have prevented: Stronger OTP/MFA requirements, regular password audits, aggressive external attack surface reduction.

  • Links:

Delay Analysis: No real-time monitoring of OT-side access or brute-force attempts. Detection triggered by physical anomaly, not the IT team.

Section II: Analysis of Remediation Failures and Recommendations for Improvement

Key Causes of Response Delays

  1. Detection Failures

    • Absence of 24/7 monitoring or effective SIEM correlation (cases #1, #4, #5).

    • Siloed teams and disparate tools leading to slow detection and fragmented response.

  2. MFA and Password Hygiene Lapses

    • Lack of mandatory multi-factor authentication on critical systems (cases #1, #4, #5).

    • Poor password management, reuse of breached credentials (cases #4, #5).

  3. Patch Management & Supply Chain Lag

    • Legacy or end-of-life systems increasingly targeted; slow patch cycles exploited (cases #1, #2).

    • Insecure build pipelines and missing integrity checks permit supply chain and watering hole attacks (#2, #3).

  4. Incident Response Playbook Gaps

    • Many organizations lacked clear procedures for supply chain attacks or multi-vector (DDoS + breach) scenarios (#2, #4).

    • Legal and PR concerns delayed public disclosure and collaborative defense actions (#2).

  5. Network Segmentation & API Security

    • Flat networks between IT/OT and excessive trust assumptions (case #5).

    • Missing rate-limits or input validation on APIs (case #4).

How to Reduce MTTD and MTTR

For All Teams

  • Centralized and Automated Logging: Deploy correlated SIEM/EDR with AI-driven anomaly detection. Ensure logs from all endpoints, cloud, network, and OT are aggregated and actionable within seconds.

  • Incident Simulation: Tabletop and red team exercises on latest breach types (supply chain, multi-factor DDoS, phishing/ransomware hybrids).

  • Standard Operating Procedures: Develop and rehearse playbooks for hybrid/supply chain attacks.

Threat Hunters / CTI Analysts

  • IOC sweeps and retrospective threat hunting for disclosed patterns after every major public breach.

  • Enrich internal threat intelligence with shared ISAC/CERT bulletins and dark web monitoring.

  • Use attack path simulations to spot overlooked lateral movement avenues.

Red/Blue/Purple Teams

  • Regular scenario-based assessments for edge-case vectors (watering hole, supply chain, OT attacks).

  • Targeted phishing/spear-phishing exercises for users and privileged groups.

  • Purple team reviews to validate detection logic for real-world adversary TTPs.

Technical Controls

  • Mandate MFA everywhere, especially legacy remote or privileged access ports.

  • Automated patch management with vulnerability scan/alert chaining.

  • Web application/API security reviews—ensure SRI, rate limiting, and input validation.

  • Segmentation and zero trust on OT/critical networks.

References, Official Alerts & Further Reading

IR Playbook - key focus areas

Preparation

  • Inventory critical assets and services

  • Validate contact lists for all departments

  • Maintain current threat models and TTP mappings

  • Train staff on phishing and initial response protocols

Identification

  • Establish anomaly baselines in SIEM

  • Trigger alerts for behavioral deviations or IOC matches

  • Initiate incident classification and severity rating

Containment

  • Short-term: Disconnect affected systems, isolate subnets

  • Long-term: Reconfigure firewall/ACL rules, deploy temp EDR rules

Eradication

  • Identify root cause and full TTPs

  • Remove malicious artifacts, close exploited vectors

  • Patch and validate systems

Recovery

  • Gradual system restoration and traffic monitoring

  • Validate backups and system integrity

  • Resume normal operations under enhanced monitoring

Lessons Learned

  • Conduct full forensic review and timeline analysis

  • Update IR playbook, patching schedule, and training content

  • Share intelligence with ISACs, sector peers, and public advisories

Previous
Previous

Additional CTI / notes (V2)

Next
Next

Ten Major cyber attacks of 2025 so far