Malware Activity
How Hacking Groups Are Evolving to Steal Data and Evade Detection
Recent reports reveal that cybercriminal groups like TA584 and Mustang Panda are becoming more advanced and targeted in their operations. TA584 has increased its activity since 2020, using clever methods such as compromised emails and malicious links to install malware like Tsundere Bot and XWorm, which can spy on systems, move within networks, and prepare for ransomware attacks. Tsundere Bot is particularly tricky because it communicates via the Ethereum blockchain, making it hard to detect. Meanwhile, Mustang Panda, a cyber-espionage group attributed to China by multiple cybersecurity firms, has upgraded its malware tools, especially its CoolClient backdoor, to steal login info, monitor screens, and control infected devices covertly. They often hide their malware inside legitimate software and use cloud services to exfiltrate data, making detection more difficult. Overall, these groups are continuously refining their techniques to spy on governments and steal sensitive information, demonstrating a growing sophistication and determination to stay ahead of security defenses. CTIX analysts will continue to report on the latest malware strains and attack methodologies.
- BleepingComputer: Initial Access Hackers Switch to Tsundere Bot for Ransomware Attacks article
- BleepingComputer: Chinese Mustang Panda Hackers Deploy Infostealers Via Coolclient Backdoor article
- TheHackerNews: Mustang Panda Deploys Updated article
Threat Actor Activity
FBI Seizes RAMP Cybercrime Forum, Disrupting Ransomware Operations
The FBI has seized the RAMP (Russian Anonymous Marketplace) cybercrime forum, a notorious platform for advertising malware and hacking services, notably allowing the promotion of ransomware operations. Both the forum’s Tor site and clearnet domain,
- Bleeping Computer: RAMP Takedown Article
- The Register: RAMP Takedown Article
- The Record: RAMP Takedown Article
Vulnerabilities
Persistent Exploitation of WinRAR Vulnerability Exploited by State-Sponsored and Criminal Threat Actors
Google’s Threat Intelligence Group (GTIG) has documented sustained and widespread exploitation of a high-severity WinRAR path traversal vulnerability months after it was patched in WinRAR 7.13 in July 2025, underscoring the enduring risk posed by widely weaponized n-day flaws. The vulnerability, tracked as
- Security Week: CVE-2025-8088Article
- The Register: CVE-2025-8088Article
- The Hacker News: CVE-2025-8088Article
📧 Never Miss a Briefing
Stay informed and secure. Subscribe to Ankura’s Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure.
Join the Cyber Flash Update community today.

© Copyright 2026. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.
