[April-11-2025] Daily Cybersecurity Threat Report – Part 2

1. Executive Summary

The cybersecurity landscape over the past 24 hours has been characterized by a high volume of disruptive activities, primarily Distributed Denial-of-Service (DDoS) attacks targeting governmental entities across Europe and other regions. Concurrently, the cybercriminal underground remains active with Initial Access Brokers (IABs) offering privileged network access to organizations in diverse sectors including government, healthcare, hospitality, and manufacturing. Ransomware groups continue their operations, claiming data exfiltration from victims in the UAE, USA, UK, and Belgium. Furthermore, several significant data leaks and breaches have been reported, exposing sensitive personal information, government records, and corporate data. The sale of sophisticated malicious tools, such as crypters designed to evade security measures, also persists on specialized forums. Key platforms facilitating these activities include Telegram for DDoS coordination and claims, Tor-based sites for ransomware leaks, and specific OpenWeb forums (BreachForums, XSS.is) for illicit trading of data and access.

2. Incident Analysis by Category

This section provides detailed accounts of cybersecurity incidents reported within the last 24 hours, categorized by attack type.

2.1. Distributed Denial-of-Service (DDoS) Attacks

A significant surge in DDoS activity was observed, predominantly targeting government websites and critical infrastructure across multiple countries. Several hacktivist groups claimed responsibility, often providing links to check-host reports as proof of impact.

NoName057(16) Campaign (Finland):

  • Incident: Finnish Transport and Communications Agency Traficom website targeted.
  • Date & Time (UTC): 2025-04-11T07:46:20Z
  • Threat Actor: NoName057(16)
  • Victim: Finnish Transport and Communications Agency Traficom (Government Administration, Finland)
  • Targeted Site: extidpevaluointi.traficom.fi
  • Details: Claim made on Telegram with proof of downtime.
  • Source Network: telegram
  • Source Link: https://t.me/nnm05716rus/502
  • Downtime Proof: http://check-host.net/check-report/24dc6daek18d
  • Evidence Links:
  • Date & Time (UTC): 2025-04-11T07:37:50Z
  • Threat Actor: NoName057(16)
  • Victim: Association of Finnish Local and Regional Authorities (Government Administration, Finland)
  • Targeted Site: kuntaliitto.fi
  • Details: Claim made on Telegram with proof of downtime.
  • Source Network: telegram
  • Source Link: https://t.me/nnm05716rus/502
  • Downtime Proof: http://check-host.net/check-report/24dc6d22kfe7
  • Evidence Links:

Dark Storm Team Campaign (France, Belgium, Kosovo):

  • Incident: Rennes City and Metropolis website targeted.
  • Date & Time (UTC): 2025-04-11T00:52:08Z
  • Threat Actor: Dark Storm Team
  • Victim: Ministry of Education, Science, Technology and Innovation (Government Administration, Kosovo)
  • Targeted Site: masht.rks-gov.net
  • Details: Claim made on Telegram with proof of downtime.
  • Source Network: telegram
  • Source Link: https://t.me/DarkStormTeam3/212
  • Downtime Proof: https://check-host.net/check-report/24da1490k637
  • Evidence Links:

Mr Hamza Campaign (Spain):

  • Incident: CCN-CERT National Cryptologic Center website targeted.

Keymous+ Campaign (Mali):

  • Incident: Journal du Mali website targeted.
  • Date & Time (UTC): 2025-04-11T00:04:09Z
  • Threat Actor: Keymous+
  • Victim: Ministry of Environment, Sanitation, and Sustainable Development (Government Administration, Mali)
  • Targeted Site: environnement.gov.ml
  • Details: Claim made on Telegram with proof of downtime.
  • Source Network: telegram
  • Source Link: https://t.me/KeymousTeam/1276
  • Downtime Proof: https://check-host.net/check-report/24d98a08k6c2
  • Evidence Links:

Other DDoS Incidents:

  • Incident: Red wolf ceyber targets Interfax-Ukraine News Agency.
  • Date & Time (UTC): 2025-04-11T04:57:28Z
  • Threat Actor: AnonSec
  • Victim: Government of Gujarat (Government Administration, India)
  • Targeted Site: gujaratindia.gov.in
  • Details: Claim made on Telegram with proof of downtime for multiple hosts.
  • Source Network: telegram
  • Source Link: https://t.me/c/2389372004/164
  • Downtime Proof:

2.2. Initial Access Brokerage (IAB)

Multiple threat actors advertised network access for sale on underground forums, targeting organizations across various sectors and geographies. This highlights the ongoing commodification of network intrusions, providing starting points for ransomware deployment or espionage.

  • Incident: Alleged sale of access to an unidentified USA County Government Network.

2.3. Ransomware Incidents

Ransomware groups continue to list victims on their dedicated leak sites, often claiming significant data exfiltration and threatening publication to pressure victims into payment (double extortion).

  • Incident: Cloak Ransomware group adds an unknown victim (Pc***********.org).

2.4. Data Leaks & Breaches

Several incidents involved the alleged leak or sale of sensitive data, ranging from government intelligence lists to university student records and corporate information.

  • Incident: Alleged data leak of Names wanted by Syrian intelligence.

2.5. Website Defacement

One incident of website defacement was reported, claimed by a hacktivist group.

  • Incident: Arabian Ghosts targets the website of Cable Factory.
  • Date & Time (UTC): 2025-04-11T06:39:36Z
  • Threat Actor: Arabian Ghosts
  • Victim: Cable Factory (Hospitality & Tourism, Finland)
  • Targeted Site: cablefactory.fi
  • Details: Group claims to have taken down (and potentially defaced) the organization’s website. Claim made on Telegram.
  • Source Network: telegram
  • Source Link: https://t.me/ARABIAN_GHOSTS/604
  • Evidence Links:

2.6. Malware / Tool Sales

The sale of tools designed to facilitate cybercrime continues, lowering the barrier to entry for less sophisticated actors.

  • Incident: Alleged sale of a sophisticated crypter with code injection capabilities.
  • Date & Time (UTC): 2025-04-11T04:32:54Z
  • Threat Actor: Kernel
  • Victim: Not Applicable (Tool Sale)
  • Details: Advertised on XSS.is, the crypter allegedly features code injection, ASMI bypass, UAC evasion (unpatched systems), junk code generation, file hiding, AES-CBC encryption, C# injector, custom icon support, an anti-kill module causing BSODs, and DLL injection source code. Such tools are used to obfuscate malware from antivirus detection.
  • Source Network: openweb
  • Source Link: https://xss.is/threads/135964/
  • Evidence Links:
  • https://d34iuop8pidsy8.cloudfront.net/653c4017-5725-4382-9f0a-192f2528971c.png

3. Concluding Observations

The incidents reported over the last 24 hours underscore several persistent and evolving cyber threats:

  • Prevalence of DDoS: DDoS attacks remain a favored tactic, particularly for hacktivist groups aiming for disruption and visibility. The coordinated campaigns against government infrastructure in multiple countries (Finland, France, Belgium, Spain, Kosovo, Mali) suggest potentially geopolitical motivations or widespread use of DDoS-for-hire services. Telegram remains a primary platform for coordinating these attacks and publicizing claims.
  • Thriving Initial Access Market: The steady stream of network access offerings on underground forums like BreachForums and XSS.is demonstrates the maturity of the cybercrime supply chain. IABs provide specialized services, enabling other actors (e.g., ransomware groups) to bypass initial intrusion phases. The targeting spans diverse industries and geographies, indicating broad opportunistic efforts.
  • Persistent Ransomware Threat: Ransomware operations continue unabated, employing double-extortion tactics by listing victims and threatening data publication on Tor-based leak sites. The targeting of organizations across various sectors (Construction, IT, Manufacturing) and countries (UAE, USA, UK, Belgium) highlights the global nature of this threat.
  • Data Exposure Risks: Data leaks and breaches, whether through direct hacking or exposure on forums, continue to place sensitive information at risk. This includes PII (student data, customer info), potentially compromising government lists (Syrian intelligence, Chicago sex offenders), and organizational data (ValorUS).
  • Cybercrime Ecosystem: The coexistence of DDoS attacks, IABs, ransomware operations, data leaks, and malware tool sales illustrates an interconnected ecosystem. Access gained by IABs can be leveraged for ransomware; data stolen in breaches can be sold or leaked; tools like crypters enable malware deployment across various attack types. Platforms like Telegram, specific web forums, and Tor infrastructure are crucial enablers for this ecosystem.

Organizations must maintain robust defenses against DDoS attacks, implement proactive threat hunting to detect initial access attempts, enforce strong data security and access control measures, and stay informed about the evolving tactics, techniques, and tools used by threat actors proliferating in the cybercrime underground.