Visualização normal

Antes de ontemStream principal
  • ✇Pulsedive Blog
  • 2025 In Review Grace Chi
    This blog aims to highlight some of the major incidents and events in cyberspace in 2025. This year saw the disclosure of vulnerabilities that were rapidly exploited, the continued success of ransomware operators, and law enforcement takedowns disrupting malware-as-a-service operations. Apart from the continued targeting of public-facing sources such as firewalls and other networking appliances, this year also saw several supply chain compromises, including the Shai-Hulud worm. Read on for a rev
     

2025 In Review

18 de Dezembro de 2025, 13:26
2025 In Review

This blog aims to highlight some of the major incidents and events in cyberspace in 2025. This year saw the disclosure of vulnerabilities that were rapidly exploited, the continued success of ransomware operators, and law enforcement takedowns disrupting malware-as-a-service operations. Apart from the continued targeting of public-facing sources such as firewalls and other networking appliances, this year also saw several supply chain compromises, including the Shai-Hulud worm.

Read on for a review of:

  • Review of our predictions from 2024
  • State of vulnerability exploitation
  • Top malware
  • Law enforcement actions
  • Predictions for 2026
  • Pulsedive rewind

Recap

Looking Back at Our Predictions for 2025

Exploitation of Public-Facing Infrastructure 

In 2024, we predicted that exploitation attempts against public-facing infrastructure would remain commonplace. Moreover, we expected to observe rapid adoption of exploit and proof-of-concept code by threat actors seeking to exploit these devices. This prediction held, as evidenced by vulnerabilities such as ToolShell, React2Shell, and CVE-2025-59287, where exploitation attempts skyrocketed after researchers released proof-of-concept code. The Key Exploited Vulnerabilities section below discusses notable vulnerabilities from 2025.

Continued RMM Abuse

We also predicted that threat actors will continue to abuse RMM tools during intrusions. These tools allow threat actors to gain access to an environment and establish secondary persistence mechanisms within it. Part of the appeal of using these tools is that threat actors don’t need to deploy additional tooling and can blend in by using applications already used within a victim’s environment.

2025 In Review
Figure 1: Blackpoint Cyber identified incidents across 13 industries in which the threat actor used GoToResolve during the intrusion. Source: Blackpoint Cyber

Use of Gen AI in attacks

Last year, we predicted that threat actors would adopt Gen AI tooling to help create more effective social engineering lures and malicious tooling. While we had predicted that Gen AI tools would help threat actors, 2025 revealed that threat actors have integrated AI into malware and used prompt engineering to bypass AI safety controls. Notably, Anthropic reported on the first AI-orchestrated cyber espionage campaign. 

Cyber Espionage Campaign Detected by Anthropic

Anthropic released a report on November 13, 2025, detailing what they claimed was an AI-enabled cyber espionage campaign. Anthropic attributed the intrusion to a Chinese state-sponsored group that targeted around 30 organizations with multiple successful intrusions. The threat actor leveraged AI through the kill chain to help achieve their objectives.

AI uses:

  • Autonomous Reconnaissance 
    • Leveraged MCP servers to document infrastructure, authentication mechanisms, and identify vulnerabilities
    • Once access was obtained, Claude was used to map network services and IP ranges to identify services
  • Vulnerability Discovery
    • Claude used to generate payloads for vulnerabilities and analyze responses
  • Credential Collection
    • Extraction of authentication certificates
  • Lateral movement
    • Authentication to APIs, Database systems, and container registries
  • Data Collection
    • Collection of information from authenticated services such as databases, and sorts the data collected by value
  • Documentation
    • Detailed documentation was created that contains information about identified services and exfiltrated data

Anthropic outlined that the campaign predominantly leverages open-source red team tooling rather than custom malware. 

💡
For more details about Anthropic’s findings, read their report.
2025 In Review
Figure 2: Actions performed by Claude during the vulnerability scanning phase of the attack.

Recorded Future released the AI Malware Maturity Model, noting that most AI malware would fall into the experimenting, adopting, or optimizing categories instead of fully automated attacks. Current AI usage aligns with our prediction that AI is a tool to enable threat actors, not one that removes the human operator from the attack. Recorded Future also identified different types of AI malware.

2025 In Review
Figure 3: Types of AI malware as determined by Recorded Future. Source: Recorded Future

Key Exploited Vulnerabilities

This section is not intended to be an exhaustive list of vulnerabilities exploited in 2025, but rather a selection of some memorable ones that most impacted security teams.

CISA’s Known Exploited Vulnerabilities (KEV) Catalog was used to collect statistics about exploited vulnerabilities in 2025. CISA has added 236 vulnerabilities to the catalog in 2025. The data used in the graphs below is accurate as of December 14th, 2025, at 12:17:58 EST. 

2025 In Review
Figure 4: Unique vulnerabilities added to CISA’s known exploited vulnerabilities catalog in 2025.

Of the 236 vulnerabilities added to KEV in 2025, 23 have been used in ransomware campaigns. These vulnerabilities include those in edge devices such as SMA100, NetScaler ADC, and Connect Secure. Other public-facing devices, such as Oracle E-Business Suite, SharePoint, and CrushFTP, were also targeted in ransomware campaigns. 

2025 In Review
Figure 5: Number of vulnerabilities added to CISA KEV in 2025 that have been used in ransomware campaigns.

ToolShell

2025 In Review

ToolShell is a name given to two SharePoint vulnerabilities that allow a threat actor to bypass authentication (CVE-2025-49704) and remotely execute code by writing files to the server (CVE-2025-49706). CVE-2025-53770 and CVE-2025-53771 are CVEs assigned to subsequent vulnerabilities that bypassed patches for CVE-2025-49704 and CVE-2025-49706. Successful exploitation of these vulnerabilities led to files being dropped on the SharePoint servers. 

Threat actors exploited these vulnerabilities to collect machine keys from SharePoint servers. 

2025 In Review
Figure 6: Web shell used to collect machine scripts from compromised SharePoint hosts. Source: Canadian Center for Cyber Security
2025 In Review
Figure 7: Snippet of POST request used to exploit the vulnerability. Source: Kaspersky

React2Shell

2025 In Review

React2Shell (CVE-2025-55182) is a critical unauthenticated remote code execution vulnerability in the React Server Components (RSC) Flight protocol. Successful exploitation of the vulnerability will result in remote code execution. Threat actors have used this vulnerability to check for vulnerable components, conduct reconnaissance, and deploy additional payloads. Threat actors have used this vulnerability to deploy coinminers, such as XMRig, on vulnerable instances. 

2025 In Review
Figure 8: POST request where the threat actor attempts to initiate a ping request to an IP address. Source: eSentire

Mandiant has also reported on threat actors deploying XMRig to mine cryptocurrency. In one intrusion, the threat actor downloaded a shell script that, in turn, downloaded and executed XMRig from GitHub. 

Malware

Information stealers continued to prove valuable for cybercrime actors. Due to their popularity, new malware-as-a-service offerings emerged in 2025. One such malware is Katz, which was first observed in April 2025. It advertised the ability to extract information from Chromium- and Gecko-based web browsers. Aura Stealer is another information stealer that was first observed in July 2025. AURA advertised support for Telegram integration via a bot and several configuration options. 

Supply chain compromises have already been prominent throughout the year. We have seen several NPM and Python package compromises as well as malware masquerading as legitimate applications. 

EvilAI

The operators behind EvilAI disguise their malware as productivity tooling that uses AI to enhance user experience. These malicious applications claim to provide productivity functionality, such as merging PDFs, and are signed with valid digital signatures. These malicious applications were distributed through malicious advertisements, SEO manipulations, and social media links. 

2025 In Review
Figure 9: Example of a digital certificate used by EvilAI. Source: Trend Micro
2025 In Review
Figure 10: EvilAI infection flow identified by Trend Micro. Source: Trend Micro

NPM Compromises

Several major NPM compromise campaigns impacted popular packages in 2025. Two of these campaigns were tied to the Shai-Hulud worm, which was used to exfiltrate sensitive information from GitHub repositories.  

September 8th Campaign

The campaign from September 8th, 2025, compromised packages included chalk and debug. Both of these packages are downloaded over 250 million times a week. The compromised packages were modified to include malicious code. The malicious code targets cryptocurrency wallets by intercepting connections to cryptocurrency platforms and replacing the destination wallet with a hardcoded one. 

2025 In Review
Figure 11: Hardcoded Cryptocurrency Wallets added by the threat actor.

Shai-Hulud

💡
Pulsedive threat research covered the technical details of the first and second Shai-Hulud campaigns this year.

The Shai-Hulud worm was used to exfiltrate secrets from GitHub repositories. In the first Shai-Hulud campaign, compromise activity was seen from September 15 at 03:46 to September 16 at 13:42 EST. The malware used TruffleHog to identify and collect credentials and secrets. The identified data was exfiltrated using GitHub actions to the webhook[.]site domain. 

As part of the attack, GitHub workflows were used to convert private repositories to public ones. The repositories that were turned into public ones had the description “Shai-Hulud Migration”, and the term -migration" was added to the name.

On November 24, 2025, multiple security vendors reported a new Shai-Hulud campaign that compromised several popular npm packages. The compromised packages include those from Zapier, ENS Domains, PostHog, and Postman. Researchers from Wiz identified that the earliest evidence of malicious npm packages being added to npm is from around 03:00 UTC on November 24th, 2025. The compromise results in a GitHub repository containing stolen information.

Law Enforcement Action and Disruption Operations

Operation Endgame

2025 In Review
Figure 12: Operation Endgame banner added by Law Enforcement on seized domains. Source: Vectra

Law enforcement continued their disruption operations through Operation Endgame. In 2024, law enforcement disrupted the operations of malware-as-a-service offerings by targeting their distribution networks. The operations impacted operations for the following malware:

  • IcedID
  • SystemBC
  • Pikabot
  • SmokeLoader
  • BumbleBee
  • Trickbot

This operation led to the arrest of individuals involved in cybercrime and the takedown of infrastructure. Disruptions through Operation Endgame continued in 2025. 

Law enforcement followed up their actions in 2024 by arresting customers of the SmokeLoader botnet operated by SuperStar. The botnet was sold on a pay-per-install basis, allowing customers to gain access to victim machines. 

In November 2025, law enforcement agencies took down more than 1025 servers and seized 20 domains associated with Rhadmanthys, VenomRAT, and Elysium. By taking down servers, law enforcement disrupted the infrastructure used to host, control, and disseminate malware. The action also led to the arrest of an individual in Greece.

Disrupting Lumma

Microsoft seized and helped take down 2,300 domains associated with Lumma. In conjunction with Microsoft's actions, the U.S. Department of Justice also took control of the Lumma command infrastructure. Similarly, the Europol’s European Cybercrime Center and Japan’s Cybercrime Control Center suspended local Lumma infrastructure.  

2025 In Review
Figure 13: Seizure notice displayed on Lumma domains. Source: Microsoft

Looking Ahead

In 2025, threat actors continued to operate similarly to how they operated in 2024. We expect this to continue in 2026. Identity-based threats, such as stolen credentials or Adversary-in-the-Middle threats like phishing kits, will continue to play a significant role in intrusions. CrowdStrike notes that valid account abuse was the primary initial access method in 35% of cloud intrusions, while access-broker advertisements on forums increased by 50% compared to previous years. 

The use of Generative AI will continue to increase in 2026, and we expect threat actors to embed AI in their operations. Furthermore, we expect AI malware to continue to mature, and we will see more automated intrusions that leverage AI in the future.

Pulsedive Rewind

GitHub Page

Towards the end of 2025, we created our GitHub page. The resources repository on our GitHub holds additional artifacts from the analysis we conducted for our blogs. These artifacts include samples, scripts, examples of exfiltrated data, and PCAPs. 

Pulsedive Research Blogs

2025 In Review

Here are the top blogs from 2025:

  1. Rilide Analysis: https://blog.pulsedive.com/rilide-an-information-stealing-browser-extension/
  2. Kimsuky Analysis: https://blog.pulsedive.com/dissecting-the-infection-chain-technical-analysis-of-the-kimsuky-javascript-dropper/
  3. Compromised Brower Extensions: https://blog.pulsedive.com/compromised-browser-extensions-a-growing-threat-vector/
  4. Assemblyline 101: https://blog.pulsedive.com/assemblyline-101-open-source-malware-triage/
  5. KiwiStealer Analysis: https://blog.pulsedive.com/unpacking-kiwistealer-diving-into-bitter-apts-malware-for-file-exfiltration/

2025 In Review

References

  • ✇Pulsedive Blog
  • Black Friday 2025 Grace Chi
    For Black Friday and Cyber Monday this year, our Annual Promotion Turkey (aka APT) is back with a deal for Pulsedive Pro.The Highlights30% Off 12 Months of Pro with BLACKFRIDAY25🏷️Get 30% off up to 12 months of a Pulsedive Pro plan by using code "BLACKFRIDAY" during checkout before midnight on December 1, 2025. For more information, read on:What's Pulsedive Pro?What's the Deal?FAQsMore Black Friday DealsWhat is Pulsedive Pro?Pro is an affordable upgrade of the Pulsedive Community experience, dev
     

Black Friday 2025

25 de Novembro de 2025, 15:35
Black Friday 2025

For Black Friday and Cyber Monday this year, our Annual Promotion Turkey (aka APT) is back with a deal for Pulsedive Pro.

The Highlights

30% Off 12 Months of Pro with BLACKFRIDAY25

🏷️
Get 30% off up to 12 months of a Pulsedive Pro plan by using code "BLACKFRIDAY" during checkout before midnight on December 1, 2025.

For more information, read on:

  • What's Pulsedive Pro?
  • What's the Deal?
  • FAQs
  • More Black Friday Deals
Black Friday 2025

What is Pulsedive Pro?

Pro is an affordable upgrade of the Pulsedive Community experience, developed for security analysts, engineers, researchers, and enthusiasts. Pro offers more of the data that Pulsedive users love, all in the same intuitive interface.

Features include:

  • Third party enrichment integrations: VirusTotal, Shodan, AbuseIPDB
  • Historical screenshots
  • Increased API limits
  • Critical-risk IPs and Domains Feed
Pro - Pulsedive
Enable screenshots, third-party integrations, and higher data limits with an affordable monthly subscription.
Black Friday 2025Pulsedive logoPulsedive
Black Friday 2025
Black Friday 2025

What's The Deal?

  • Discount: 30% off Pulsedive's Pro monthly or annual subscription
  • Term: Up to 12 months, cancel any time through your account page
  • Valid Until: Midnight on December 1, 2025 Eastern Time (GMT-5)
  • Who's Eligible: First time customers, limit 1 redemption per account
  • Link: https://pulsedive.com/purchase/pro
  • How to Redeem: After hitting "checkout" from Pulsedive's purchase page, enter "BLACKFRIDAY25" in the promotion code field. Complete payment information and subscribe. You'll need to first have an existing Pulsedive account, which you can create here: https://pulsedive.com/register
Black Friday 2025

FAQs: What If...

I want to cancel? You can cancel and manage your Pro subscription any time under: https://pulsedive.com/account/

When you cancel, your subscription will end immediately and you will not be billed in the future. You can re-subscribe or upgrade Pulsedive plans under your account page, but the discount will no longer apply.

I don't have an account? To purchase any Pulsedive plan, you must have an account. Register a free account here: https://pulsedive.com/register

I want a custom plan? (e.g. multiple Pro seats, multi-year subscription, or multiple products)? Contact sales@pulsedive.com. We offer discounts on bundles of Pro seats for organizations looking to grab multiple licenses in one go.

🦃 Happy Black Friday Deal Hunting!

For other infosec deals, we're tracking and adding Black Friday 2025 lists here:

GitHub - 0x90n/InfoSec-Black-Friday: All the deals for InfoSec related software/tools this Black Friday
All the deals for InfoSec related software/tools this Black Friday - 0x90n/InfoSec-Black-Friday
Black Friday 2025GitHub0x90n
Black Friday 2025
GitHub - davidalex89/Infosec-Deals: Ongoing Infosec Deals
Ongoing Infosec Deals. Contribute to davidalex89/Infosec-Deals development by creating an account on GitHub.
Black Friday 2025GitHubdavidalex89
Black Friday 2025
  • ✇Pulsedive Blog
  • Share Your Feedback! 2025 Research Blog Survey Grace Chi
    Calling all Pulsedive users and community members: we want your input.Whether you read every new Pulsedive Threat Research blog post or have only come across one, your feedback will help us create and share the content that matters most to you. Take our quick 5 minute survey to share what topics, research, and formats you’d like to see more of. Your insights will inform future research-focused articles and analysis.Take our 5 minute survey:Take SurveyURL: https://forms.gle/QhduoWXSd8s4GRtH6Thank
     

Share Your Feedback! 2025 Research Blog Survey

30 de Outubro de 2025, 21:52
Share Your Feedback! 2025 Research Blog Survey

Calling all Pulsedive users and community members: we want your input.

Whether you read every new Pulsedive Threat Research blog post or have only come across one, your feedback will help us create and share the content that matters most to you. Take our quick 5 minute survey to share what topics, research, and formats you’d like to see more of. Your insights will inform future research-focused articles and analysis.

Take our 5 minute survey:

URL: https://forms.gle/QhduoWXSd8s4GRtH6

Thank you!

  • ✇Pulsedive Blog
  • Work With Us: Technical Writer Grace Chi
    Update: This role is now closed and no longer accepting applications.⭐PulsedivePart-Time / ContractFully Remote, GlobalHQ in USAThe OpportunityCreate clear, concise, and user-friendly documentation that empowers our community to effectively utilize Pulsedive's platform.Pulsedive is a threat intelligence startup that delivers frictionless threat intelligence solutions for growing teams. We bring together intelligence in our platform and data products (Pro, API, Feed, Enterprise TIP), correlating
     

Work With Us: Technical Writer

19 de Março de 2025, 12:25
Work With Us: Technical Writer

Update: This role is now closed and no longer accepting applications.

Pulsedive
Part-Time / Contract
Fully Remote, Global
HQ in USA

The Opportunity

Create clear, concise, and user-friendly documentation that empowers our community to effectively utilize Pulsedive's platform.

Pulsedive is a threat intelligence startup that delivers frictionless threat intelligence solutions for growing teams. We bring together intelligence in our platform and data products (Pro, API, Feed, Enterprise TIP), correlating indicators of compromise and organizing information to support threat collection, pivoting, research, and analysis. 

Pulsedive is looking for a skilled technical writer on a contracting basis to document use cases, technical specifications, and guides for our platforms, products, and integrations. If you’re energized by making complex technical information accessible and engaging for technical audiences, this is the role for you. You will work closely with product and engineering to research, write, and maintain high-quality documentation that helps our users and clients leverage Pulsedive's solutions to their fullest potential.

Working at Pulsedive

Regardless of your role or expertise, we seek candidates who embrace honesty, enjoy constant learning, and are empowered by ownership of their work. As a product-led company, our users are our primary stakeholders. We believe there are countless ways for talented individuals from all backgrounds to contribute their unique skills, interests, and perspectives as Pulsedive grows—and we can't wait to work with and learn from you.

You’ll Get To

  • Document technical features, integrations, architectures, and APIs 
  • Create clear and accessible guides, walkthroughs, and help articles for a range of technical audiences and uses cases
  • Migrate and improve existing content, creating a streamlined and centralized system for all technical documentation
  • Collaborate with Pulsedive leadership and subject matter experts 
  • Get hands-on learning by using Pulsedive tools and sandboxed environments
  • Help maintain up-to-date information to reflect new features, integrations, and product changes
  • Create maintenance plans and style guides, laying the groundwork for future documenters
  • Communicate information with diagrams, charts, illustrations, animations, and more to effectively convey concepts and architectures  
  • Act on feedback to improve Pulsedive’s documentation and user support content
  • Manage your time and workflow independently in a fully remote environment

What You’ve Got (and We Want)

  • 3+ years experience in technical writing, documentation, or related fields
  • 2+ years in IT, computer science, networking, and/or cybersecurity
  • Proficiency in English with the ability to communicate technical concepts in a clear, concise, and user-friendly manner
  • Proven experience creating documentation for cloud-based SaaS products
  • Ability to research and write documentation for new features and integrations, while closing gaps in existing content
  • Ability to interview subject matter experts to extract and clarify complex technical information with minimal review

Bonus Points For

  • Familiarity researching and deploying tools or platforms for technical documentation
  • Practical experience with customer success and enablement
  • Extensive experience with cybersecurity platforms, particularly in threat intelligence
  • Familiarity with:
    • Cybersecurity (e.g., IOCs, MITRE ATT&CK, OSINT, incident response)
    • Networking protocols (e.g., DNS, HTTP)
    • APIs
    • Threat intelligence feeds
    • Enterprise SaaS platforms

The Structure

This is a part-time, fully remote contract role with potential for a full-time role at Pulsedive. Our working schedule is flexible, with an average 10 hour weekly commitment. You will have high levels of autonomy, working asynchronously with the Pulsedive team. We’ll develop expectations, milestones, and timelines for deliverables together - but give you the space to work in the ways you find the most productive and fulfilling.

Caught Your Eye?

Send us a resume and relevant materials to: talent@pulsedive.com

🔗
Not for you, but you know someone who knows someone?
Help us get the word out by sharing this post!

What Happens Next?

After we receive your application, we'll update you on your status. If we think there's a fit, we'll send you a quick email to verify relevant experience and then set up a time to interview.

❌
❌