Cybersecurity News July 2025 – Threats, Trends & Insights

Cybersecurity threats surged in July, from zero-day exploits and deepfake diplomacy to ransomware campaigns hitting governments and virtual infrastructure.

Cybercrime Breaking News

  • Microsoft confirms active exploitation of SharePoint zero-day CVE-2025-53770 by ransomware gang Storm-2603.
  • Lazarus Group plants malware in 230+ npm and PyPI packages in a massive developer-targeted espionage campaign.
  • Iranian spyware DCHSpy resurfaces, exfiltrating WhatsApp and files from regime critics via fake VPN apps.

Cybersecurity Justice & Regulation

  • Authorities dismantle pro-Russian NoName057(16), seize 100+ servers, and issue arrest warrants.
  • A former U.S. soldier pleads guilty to telecom hacks and a $1M extortion scheme conducted while on duty.
  • Ukrainian and French police arrest the suspected admin of dark web forum XSS.is, tied to €7M in criminal gains.

As global cybercrime escalates, July’s cases highlight not only evolving threat tactics but also the growing overlap between espionage, AI abuse, and high-profile digital extortion.

Cybercrime Breaking News

Microsoft warns of active global exploitation of a critical zero-day flaw (CVE-2025-53770) in on-premise SharePoint servers that allows persistent access via stolen cryptographic keys, urging immediate mitigation, patching, and investigation. Meanwhile, Chinese threat group Storm-2603 is exploiting the same vulnerability to deploy Warlock ransomware, with attacks targeting over 400 government and business systems worldwide.

A newly discovered version of the Iranian spyware DCHSpy is being used by the MuddyWater group to target regime critics by exfiltrating WhatsApp data, files, and other sensitive information via politically themed lures and malicious apps disguised as VPN or banking tools.

Chinese-linked cyber spies, tracked as “Fire Ant,” are targeting VMware ESXi virtualization infrastructure worldwide using stealthy tools to gain long-term, hard-to-detect access, according to cybersecurity researchers.

North Korean hackers from the Lazarus Group have embedded malware in over 230 open-source packages on npm and PyPI to spy on developers and infiltrate critical infrastructure in a sweeping espionage campaign that may have affected more than 36,000 users.

French authorities revealed that a Chinese-linked hacking group dubbed Houken exploited zero-day flaws in Ivanti CSA devices to infiltrate critical French sectors – including government, telecom, media, finance, and transport, using advanced rootkits and web shells, with evidence suggesting Houken operates as part of a multi-party access-broker scheme selling entry points to state-aligned actors.

BERT appears as a newly emerged ransomware group targeting Windows and Linux systems across healthcare, tech, and event sectors in Asia, Europe, and the U.S., using PowerShell loaders, privilege escalation, and rapid encryption methods – often shutting down ESXi virtual machines – with code tactics resembling REvil and Babuk.

Three previously unknown Chinese state-backed groups launched spear-phishing campaigns between March and June 2025 targeting Taiwan’s semiconductor industry and related investment analysts, deploying tools like Cobalt Strike and a custom backdoor called Voldemort through deceptive job applications and malicious PDF links.

IT giant Ingram Micro confirmed it was hit by ransomware just before the July 4 holiday, disrupting internal systems used to process and ship orders. The attack has been linked to the SafePay group, known for stealing large volumes of data in recent incidents across the tech and healthcare sectors.

Australian airline Qantas confirmed that hackers breached a third-party contact center, exposing data of 5.7 million customers – including names, emails, phone numbers, birthdates, and frequent flyer numbers – though the company says the leaked information isn’t sufficient to access accounts.

The FBI and other federal agencies warned that the Interlock ransomware group is targeting healthcare and critical infrastructure in North America and Europe using deceptive tactics like fake browser updates and drive-by downloads, with victims selected opportunistically and ransom demands made in Bitcoin.

CISA has ordered federal agencies to patch the critical Citrix Bleed 2 vulnerability (CVE-2025-5777), warning it poses an “unacceptable risk” to national cybersecurity.

Google has uncovered a cyber campaign targeting end-of-life SonicWall SMA 100 appliances, where attackers use a custom backdoor and stolen credentials, including one-time password (OTP) seeds, to regain access, evade detection by wiping logs, and potentially exfiltrate data for extortion.

An Iranian-linked ransomware group, Pay2Key.I2P, is offering higher payouts to affiliates who launch attacks against U.S. and Israeli targets.

Cyberwar between Russia and Ukraine: Updates

Two new pro-Russian hacktivist groups, IT Army of Russia and TwoNet, have recently emerged, coordinating DDoS attacks, data theft, and insider recruitment against Ukraine and its allies, as part of a broader shift in tactics and alliances among pro-Russian cyber actors.

A Russian court sentenced a man to 16 years in a high-security prison for launching pro-Ukraine cybe rattacks that damaged critical infrastructure and disrupted local company systems, in one of several treason cases tied to cyber activity since the war began.

Cybersecurity and AI

An unknown actor used AI to impersonate U.S. Secretary of State Marco Rubio on Signal, leaving deepfake voicemails for foreign ministers and lawmakers, prompting a State Department investigation into the growing threat of voice cloning in diplomacy.

Cybersecurity Justice

An international law enforcement operation has disrupted the pro-Russian hacker group NoName057(16), dismantling over 100 servers, issuing arrest warrants for key members, and warning hundreds of online supporters aiding their DDoS attacks on Ukraine and allied nations.

The BlackSuit ransomware gang’s darknet extortion sites were seized in an international law enforcement operation led by U.S. Homeland Security Investigations, marking a major blow to the group responsible for over $500 million in ransom demands.

The U.S. Treasury sanctioned Russian bulletproof hosting provider Aeza Group for enabling ransomware groups, info-stealer operations, and darknet drug markets targeting global victims. Several affiliated companies and key executives were also designated, following joint actions with U.K. authorities and arrests by Russian law enforcement.

A U.S. woman has been sentenced to over eight years in prison for running a scheme that helped North Korean operatives pose as American remote workers using stolen identities, enabling them to earn millions from over 300 U.S. companies and funnel funds to North Korea’s weapons program.

UK police arrested four suspects, aged 17 to 20, in connection with ransomware attacks that disrupted operations at M&S, Co-op, and Harrods.

Ukrainian authorities, with support from France and Europol, arrested the suspected administrator of the dark web forum XSS.is, a long-running Russian-language marketplace for malware, stolen data, and ransomware services, accused of enabling cybercriminal activity and earning over €7 million in illicit profits.

The FBI, with help from Dutch authorities, seized and dismantled several major piracy websites used to illegally download Nintendo Switch and PS4 games, citing over 3.2 million downloads and $170 million in losses.

Microsoft shut down 3,000 Outlook and Hotmail accounts linked to North Korean IT workers who used AI-enhanced identities, voice-changing software, and fake documentation to infiltrate global tech jobs and generate millions in crypto for the regime.

Ransomware gang Hunters International announced it is shutting down and offering free decryption tools to victims, though experts question the tools’ effectiveness and suspect the group may be rebranding as the extortion-focused World Leaks, potentially continuing ties to the dismantled Hive operation.

CISA and Sandia National Laboratories have launched Thorium, a free, scalable malware analysis platform that automates forensic workflows by integrating commercial, open-source, and custom tools to help cyber defenders rapidly assess and respond to threats.

Japanese police released a free decryptor for Phobos and 8Base ransomware, following a global law enforcement takedown that dismantled the group’s infrastructure, led to multiple arrests, and revealed over $16 million extorted from victims since 2019.

FinTech Updates

Over $40 million was stolen from decentralized exchange GMX in a cyber attack, with the hacker quickly laundering the funds and prompting the platform to offer a 10% bounty for their return. The attacker has now returned the stolen assets after accepting a $5 million bounty, though legal consequences may still be possible.

Indian crypto exchange CoinDCX lost $44 million from an internal operational account in a breach that didn’t affect customer funds, with the company pledging to cover losses and offering rewards for help recovering the stolen assets.

Cybersecurity News Across The Globe

Want to find out more about:

Listen to the latest episodes from AMATAS Cybersecurity Podcast

AMATAS will continue to monitor this space and deliver salient information regularly. Stay tuned for our next report and if you are interested in any of our privacy and cybersecurity services, please do reach out through our website www.amatas.com or by e-mailing office@amatas.com.

As always – be vigilant, stay alert, and think twice.

Related Articles

Scroll to Top