{
    "file_item": {
        "filepath": "threat-intelligence",
        "filename": "TLP-CLEAR-CB-25-07.pdf"
    },
    "title": "Cyber Brief 25-07 - June 2025",
    "publish_date": "01-07-2025 15:00:00",
    "description": "Cyber Briefs are monthly executive reports that aim to present an overview of the most relevant developments in cyber security, based exclusively on open sources, with a view to inform political leadership and senior management in its constituency. Additional information on any item in this Brief can be provided upon request. Cyber Briefs are TLP:CLEAR.",
    "url_title": "cb25-07",
    "content_markdown": "# Cyber Brief (June 2025)\n\nJuly 1, 2025 - Version: 1\n<p class=\"tlp-type clear\">TLP:CLEAR</p>\n\n# Executive summary\n\n- We analysed 277 open source reports for this Cyber Brief[^1].\n\n- Relating to **cyber policy and law enforcement**, the EU adopted a blueprint to better manage European cyber crises. The US warned of Iranian cyber threats to US critical infrastructure and is preparing to ban federal agencies from using AI tools from \"foreign adversaries.\" BreachForums operators were arrested in France.\n\n- On the **cyberespionage** front, in Europe, a Dutch minister warned of rising Chinese espionage on high-tech sectors ; Paragon's Graphite spyware targeted journalists. Elsewhere, a Canadian telecom provider and satellite company Viasat revealed being hacked by China-linked Salt Typhoon, a Russia-linked threat actor targeted prominent academics, while North Korean-linked Contagious Interview continued targeting developers with supply-chain attacks. Related to Israel/Iran war, Iranian operatives impersonated a journalist to target Israeli officers with spyware.\n\n- Relating to **cybercrime**, several supply-chain attacks aimed at developers using npm packages, while threat actors targeted SonicWall and ConnectWise products, still in supply-chain attacks.\n\n- There were **disruptive** incidents, Iran shut down internet amid Israeli strikes, and a likely Iranian wiper was observed in Albania.\n\n- As regards **data exposure and leaks** incidents, a repackaged leak, drawn from 30 different datasets, exposed billions of old stolen credentials online.\n\n- Relating to **information operations**, a pro-Russia disinformation campaign targeted Moldova using fake Euronews accounts, while Israel warned of fake messages urging Israelis to avoid going into shelters.\n\n- On the **hacktivism** front, NoName057(16) targeted NATO Summit with DDoS attacks and hint at Dutch rail sabotage while Israeli-linked supposed hacktivist claimed to have breached an Iranian cryptocurrency platform.\n\n# Europe\n\n## Cyber policy and law enforcement\n\n**EU adopts a blueprint to better manage European cyber crises and incidents**<br>\nOn June 6, the EU adopted a new blueprint to improve management of large-scale cyber crises. It defines member states\u2019 roles in detection, response, and recovery, strengthens cooperation across technical and political levels, and integrates recent laws like NIS2. The framework also promotes civilian-military cooperation and coordination with NATO to enhance Europe\u2019s cyber resilience.  `policy`  [link](https://www.consilium.europa.eu/en/press/press-releases/2025/06/06/eu-adopts-blueprint-to-better-manage-european-cyber-crises-and-incidents/)\n\n**UK Strategic Defence Review 2025: Enhancing offensive cyber capabilities and NATO integration**<br>\nOn June 2, the UK Ministry of Defence published its Strategic Defence Review, highlighting key shifts such as new cyber investments, the launch of a Cyber and Electromagnetic (CyberEM) Command by end-2025, and deeper cyber integration with NATO. The Defence Secretary emphasised a proactive stance, including offensive cyber operations targeting Russia and China.  `offensive capabilities`  [link](https://assets.publishing.service.gov.uk/media/683d89f181deb72cce2680a5/The_Strategic_Defence_Review_2025_-_Making_Britain_Safer_-_secure_at_home__strong_abroad.pdf)\n\n\n**BreachForums operators arrested in France in major cybercrime raid**<br>\nOn June\u202f25, Le\u202fParisien reported that French police arrested five operators of the BreachForums cyber crime forum. Simultaneous raids in Hauts de Seine, Seine-Maritime and R\u00e9union netted \u201cShinyHunters,\u201d \u201cHollow,\u201d \u201cNoct,\u201d and \u201cDepressed,\u201d while IntelBroker was previously arrested in February\u202f2025. The forum, used to trade stolen data and breach corporate systems\u2014including France\u2019s national unemployment agency affecting 43\u202fmillion people\u2014has since gone offline.  `arrest` [link](https://www.leparisien.fr/high-tech/la-police-interpelle-cinq-hackers-francais-de-haut-vol-derriere-un-celebre-forum-de-vol-de-donnees-25-06-2025-QJTPFTDPQZAP7B25MF24YLHU6E.php)\n\n## Cyberespionage & prepositioning\n\n**Dutch Minister warns of rising Chinese espionage on high-tech sectors**<br>\nOn May 31, the Dutch Defence Minister warned that Chinese cyberespionage targeting Dutch industries, particularly the semiconductor sector, is intensifying, with intellectual property theft as the key motive. He cited intelligence reports identifying China as the Netherlands\u2019 top cyber threat and stressed the need to reduce European dependence on China for critical raw materials, as Beijing increasingly leverages its economic position for geopolitical influence and pressure.  `china`   [link](https://www.reuters.com/business/aerospace-defense/chinese-spying-dutch-industries-intensifying-dutch-defence-minister-2025-05-31/)\n\n**APT28 targeted Ukrainian government agency with Beardshell backdoor and Covenant framework**<br>\nOn June 21, CERT-UA reported on the Russia-linked APT28 compromising a Ukrainian government instance with the Beardshell backdoor. The threat actor sent a Signal message to the target with a `.doc` file containing a macro. When activated, the macro triggered a complex infection chain installing the Covenant framework in memory which was used to launch the backdoor, using the cloud storage services Icedrive and Koofr as control channels.  `public administration`  `russia`   [link](https://cert.gov.ua/article/6284080) \n\n**Ukraine says it breached Russian warplane maker Tupolev, exposing strategic aviation data**<br>\nOn June 4, Ukraine's military intelligence (HUR) claimed it hacked Russian warplane maker Tupolev, stealing 4.4GB of sensitive data including personnel records, internal communications, and design documents. The HUR said the breach, part of broader cyber operations targeting Russia\u2019s defence sector, exposed critical details of Russia\u2019s strategic aviation programs and followed the defacement of Tupolev\u2019s website and earlier cyberattacks on multiple Russian government agencies and military-linked organisations.  `defence`  `russia`   [link](https://www.kyivpost.com/post/53946) \n\n**UNC1151 targets Polish users via Roundcube exploit in credential theft campaign**<br>\nOn June 5, CERT Polska reported that pro-Belarusian group UNC1151 exploited the Roundcube vulnerability CVE-2024-42009 in a spearphishing campaign targeting Polish entities to steal user credentials using JavaScript and malicious Service Workers. Though no exploitation of a newly discovered Roundcube vulnerability (CVE-2025-49113) has been observed, its potential use in future attacks heightens concerns about full server compromise through credential theft and phishing.   [link](https://cert.pl/en/posts/2025/06/unc1151-campaign-roundcube/) \n\n**Possible iPhone spyware campaign detected targeting US and EU high-profile users**<br>\nOn June 5, iVerify reported possible evidence of an iPhone spyware campaign targeting individuals in the US and EU, including government officials, political campaign members, and media personnel, via a now-patched iOS \"Nickname\" bug. While Apple denies any active exploitation, iVerify points to circumstantial signs, such as device crashes and Apple threat alerts, as warranting further investigation into potential high-level targeting linked to past Chinese surveillance activity.   [link](https://www.axios.com/2025/06/05/spyware-iphones-apple-iverify) \n\n**Paragon's Graphite spyware targets journalists via iOS zero-click exploit**<br>\nOn June 12, The Citizen Lab reported forensic confirmation that Italian journalist Ciro Pellegrino and a prominent European journalist were targeted with Paragon\u2019s Graphite spyware via a zero-click iMessage exploit, CVE-2025-43200. Both cases link to the same threat actor. The findings highlight a wider cyberespionage effort against `Fanpage[.]it` and ongoing threats to journalists in Europe.  `psoa`   [link](https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/) \n\n## Cybercrime\n\n## Disruption & destruction\n\n**Swedish public service television SVT targeted with DDoS attacks**<br>\nFrom June 8 to June 11, an unknown threat actor launched DDoS attacks against the Swedish public service television company SVT, causing temporary downtime. This follows previous temporary disruptions in other widely used digital services, such as applications for eID and money transfers. Swedish Prime Minister Kristersson acknowledged continuous cyber threats targeting both state entities and critical firms.   [link](https://swedenherald.com/article/svt-and-swedish-parliament-websites-hit-by-overload-attacks) \n\n**Likely Iranian wiper observed targeting in Albania**<br>\nOn June 20, Symantec reported a wiper attack targeting organisations in Albania by the Iranian Druidfly group. The Iranian cyber group Druidfly is known for its destructive attacks and espionage operations. Druidfly targets countries hostile to Iran, including Albania and Israel. \u200bThe group employs social engineering tactics, custom backdoors and ransomware like DarkBit, often serving as a cover for their devastating attacks.  `iran`   [link](https://x.com/threatintel/status/1936049254432231444) \n\n## Information operations\n\n**Pro-Russian disinformation targets Moldova using fake Euronews accounts**<br>\nOn June 3, Euronews reported a coordinated disinformation campaign by pro-Russian threat actors using AI-generated profiles to impersonate its staff on TikTok and X, spreading fake videos alleging criminality and instability in Moldova. Aimed at the EU, NATO, and Ukrainian audiences, the operation mirrors tactics linked to \u201cOperation Overload,\u201d with content aligned to Russia\u2019s influence objectives and intended to undermine Western alliances. Euronews is actively removing the false material.  `russia`   [link](https://www.euronews.com/my-europe/2025/06/03/euronews-targeted-by-anti-moldova-disinformation-campaign) \n\n**Israel is using YouTube paid ads to justify its actions in Iran**<br>\nOn June 18, an online news outlet reported that YouTube users are constantly seeing Israeli propaganda advertisements justifying its air strikes on Iran. They appear to target European countries, namely Germany, Italy, France, and the United Kingdom. Similar reports had been made since October 2023 in regard to Israel justifying its strikes on Gaza.  `israel`   [link](https://www.fudzilla.com/news/61216-iran-shores-up-cyber-defences) \n\n\n## Hacktivism\n\n**NoName057(16) targets NATO Summit with DDoS attacks and hints at Dutch rail sabotage**<br>\nOn June 23\u201324, pro-Russia hacktivist group NoName057(16) launched DDoS attacks on Dutch and NATO websites, coinciding with NATO\u2019s 2025 summit. On June 24, they hinted at involvement in a Dutch train cable outage, suggesting it could be \u201cblamed\u201d on them and the DDoSia project. The Dutch Justice Ministry reported that the incident\u2014a fire damaging around 30 cables\u2014may be linked to sabotage.  `russia`  \n\n**Killnet claims breach of Ukrainian airspace app following major drone attack**<br>\nOn June 2, Killnet claimed responsibility for breaching a Ukrainian airspace-monitoring app and launched a Telegram channel sharing drone firmware, likely in response to Ukraine\u2019s June 1 \"Operation Spider Web,\" which damaged dozens of Russian military aircraft. Since reemerging in May 2025, Killnet has intensified efforts to regain notoriety by targeting Ukraine\u2019s drone operations, though the actual impact of its claimed hacks remains unclear.  `russia`   [link](https://t.me/WeAreKillnet_Channel/16) \n\n# World\n\n## Cyber policy and law enforcement\n\n**US bill seeks to ban federal agencies from using DeepSeek, AI tools from \"foreign adversaries\"**<br>\nOn June\u202f26, senators Rick\u202fScott and Gary\u202fPeters introduced the bipartisan No Adversarial AI Act, banning federal agencies from using AI tools from \u201cforeign adversaries\u201d\u2014China, Russia, Iran, and North Korea\u2014specifically citing concerns around China\u2019s DeepSeek, which may supply data to military/intelligence sectors. The bill mandates a Federal Acquisition Security Council registry updated every 180\u202fdays and allows limited exemptions for vetted research and testing.  `ban`  `united states`   [link](https://therecord.media/bipartisan-bill-ban-deepseek-federal) \n\n**WhatsApp banned on US House staffers' devices**<br>\nOn June 23, Axios reported that WhatsApp has been banned for use on government devices among House congressional staffers. The ban is in response to cybersecurity concerns for users, due to the lack of transparency in how it protects user data, absence of stored data encryption, and potential security risks involved with its use.  `ban`  `united states`   [link](https://www.axios.com/2025/06/23/whatsapp-house-congress-staffers-messaging-app)  \n\n**US agencies warn of Iranian cyber threats to US critical infrastructure**<br>\nOn June\u202f30, US agencies jointly issued an advisory alerting that Iranian-affiliated hackers and hacktivist groups may conduct malicious cyber activity\u2014despite a declared ceasefire and ongoing negotiations towards a permanent solution. They highlighted risks to critical infrastructure including energy, water, healthcare, transportation, and defence-linked networks, referencing past intrusions such as the 2023 Pennsylvania water facility breach. `united states` `iran` [link](https://www.cisa.gov/sites/default/files/2025-06/joint-fact-sheet-Iranian-cyber-actors-may-target-vulnerable-US-networks-and-entities-of-interest-508c-1.pdf)\n\n**ISACs warn US critical sectors of possible Iranian cyberattacks amid Israel tensions**<br>\nOn June\u202f17, US critical infrastructure providers \u2014 especially in energy, water, transportation, communications, food & agriculture, and IT \u2014 were urged to strengthen cybersecurity amid escalating Iran\u2013Israel tensions. The Food and Ag\u2011ISAC and IT\u2011ISAC issued joint alerts, warning of potential spillover from Iranian cyber operations targeting Israel, while Electricity, Aviation, Financial Services, and Water ISACs also heightened vigilance.  `iran`  `united states`   [link](https://www.politico.com/news/2025/06/17/us-critical-networks-iran-israel-cyber-attack-00411799) \n\n**US offers reward for information on Iran-linked Cyber Av3ngers**<br>\nCyber Av3ngers, a threat actor known for targeting Israeli-made ICS and IoT devices, increased social media activity after recent Israel-Iran kinetic activity. On June 12, the US State Department\u2019s Rewards for Justice offered 10 million US dollars for information on Cyber Av3ngers, Mr Soul, or affiliates. The US government links the group to Iran\u2019s IRGC-CEC and attributes cyberattacks on US critical infrastructure to the threat actor.  `iran`  `united states`   [link](https://x.com/RFJ_USA/status/1933237876470280354) \n\n**China offers bounties for information on Taiwanese military cyber operatives**<br>\nOn June 5, China offered cash rewards for clues leading to the arrest of 20 individuals it claims are Taiwanese military cyber operatives. It accused them of targeting Chinese sectors and collaborating with US intelligence. Taiwan rejected the claims, calling them fabricated and highlighting global concerns about Chinese cyber activities and disinformation.  `china`  `taiwan`   [link](https://www.straitstimes.com/asia/east-asia/chinese-authorities-issue-bounty-for-hackers-said-to-be-linked-to-taiwan) \n\n\n**US charges British individual behind the cybercrime identity IntelBroker**<br>\nOn June 25, the US Department of Justice reported that they charged a British national with operating the IntelBroker online identity. According to the charges, IntelBroker infiltrated victim computer networks, stole data, sold the stolen data and caused millions of US dollars in damages to dozens of victims around the world.  `united states`  `charges` [link](https://www.justice.gov/usao-sdny/pr/serial-hacker-intelbroker-charged-causing-25-million-damages-victims) \n\n**Interpol dismantles infostealer networks across 26 countries**<br>\nOn June 11, Interpol announced the results of Operation Secure, a cybercrime crackdown from January to April 2025. Authorities in 26 countries dismantled infostealer infrastructure, arresting 32 suspects and seizing 41 servers. They took down over 20.000 malicious IPs/domains and notified 216.000 victims. The action, supported by Group-IB, Kaspersky, and Trend Micro, disrupted major cybercrime actors, especially in Vietnam, Sri Lanka, Nauru, and Hong Kong. `takedown`  [link](https://www.interpol.int/News-and-Events/News/2025/20-000-malicious-IPs-and-domains-taken-down-in-INTERPOL-infostealer-crackdown) \n\n**AVCheck takedown disrupts key malware testing service in global cybercrime crackdown**<br>\nOn May 27, international law enforcement seized AVCheck, a major counter-antivirus service used by cybercriminals to test and refine malware evasion, as part of Operation Endgame. The service's official domain at AVCheck now displays a seizure banner featuring the crests of the US Department of Justice, the FBI, the US Secret Service, and Dutch police (Politie), highlighting its role in supporting ransomware groups and aiding stealthy cyberattacks. `takedown`  [link](https://www.justice.gov/usao-sdtx/pr/websites-selling-hacking-tools-cybercriminals-seized) \n\n\n## Cyberespionage & prepositioning\n\n\n**Salt Typhoon exploited a Cisco flaw to hack Canadian telecom**<br>\nOn June\u202f23, Canada\u2019s cybersecurity agency and the FBI revealed that the Chinese group Salt\u202fTyphoon infiltrated a Canadian telecom provider in February by exploiting the unpatched Cisco IOS\u202fXE vulnerability CVE 2023 20198, enabling account creation and network snooping via GRE tunnels. Despite the flaw being disclosed in October\u202f2023, at least one major firm hadn't applied the patch. Authorities warn the espionage campaign will persist and urge urgent patching of edge devices.  `canada`  `china`  `telecommunications`   [link](https://www.ic3.gov/CSA/2025/250620.pdf) \n\n\n**Satellite company Viasat was among China-linked Salt Typhoon\u2019s campaign\u2019s victims**<br>\nOn June 18, Viasat, a satellite company with a presence in Europe, confirmed that it was one of the victims of China-linked Salt Typhoon\u2019s cyberespionage operation targeting several sectors, namely telecommunications, worldwide, uncovered in 2024.  `china`  `space`  `telecommunications`   [link](https://www.satellitetoday.com/cybersecurity/2025/06/18/viasat-confirms-unauthorized-access-after-bloomberg-report-of-salt-typhoon-impact/) \n\n\n**China-linked activity cluster PurpleHaze and ShadowPad target organisations worldwide**<br>\nOn June 9, SentinelOne reported countering China-linked activity clusters PurpleHaze and ShadowPad, which included reconnaissance and intrusion attempts from July 2024 to March 2025. These targeted over 70 organisations, including a South Asian government and a European media outlet. The targeted sectors include manufacturing, media, cybersecurity, public administration and telecommunications. SentinelOne confirmed no compromise of its assets, highlighting the persistent interest of cyberespionage actors in cybersecurity vendors.  `china`  `public administration`  `telecommunications`   [link](https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/) \n\n\n**Washington Post journalists targeted in cyberattack**<br>\nOn June 15, The Wall Street Journal reported that several journalists from the Washington Post\u2019s e-mail accounts were compromised in a cyberattack. The targeted attacks were done towards journalists writing on national security and economic policy, as well as China.  `china`  `united states`   [link](https://www.wsj.com/tech/cybersecurity/cyberattack-on-washington-post-compromises-email-accounts-of-journalists-70bf1300) \n\n\n**China warns of cyberespionage targeting state and research sectors**<br>\nOn\u202fJune\u202f4, China\u2019s Ministry of State Security (MSS) warned of three recent cyberespionage incidents targeting government agencies, research institutes, and critical infrastructure. In one case, a lab employee stored classified files on a personal device and clicked a malicious e-mail attachment, allowing foreign operatives to steal data for three months. In another, a phishing link compromised a government agency. A third attack exploited outdated office software to infiltrate a research institution.  `china`   [link](https://www.globaltimes.cn/page/202506/1335381.shtml) \n\n\n**Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware**<br>\nOn June\u202f6, Seqrite Labs, an India-based cybersecurity company, uncovered Operation\u202fDRAGONCLONE, a sophisticated cyber campaign targeting China Mobile\u202fTietong. It begins with a malicious ZIP exploiting DLL sideloading of Wondershare Repairit, deploying the VELETRIX loader with anti\u2011sandbox and \u201cIPFuscation\u201d techniques to launch VShell in memory. The campaign includes 44 implants, overlapping infrastructure linked to UNC5174 and Earth\u202fLamia, and employs Cobalt\u202fStrike, SuperShell, and the Asset Lighthouse System.  `china`  `telecommunications`   [link](https://www.seqrite.com/blog/operation-dragonclone-chinese-telecom-veletrix-vshell-malware/) \n\n\n**Russia-linked threat actor UNC6293 leverages App-Specific Passwords to access academic e-mail accounts**<br>\nOn June 18, The Citizen Lab and Google reported on Russia-linked threat actor UNC6293 activities targeting prominent academics and critics of Russia from at least April through early June. On May 22, UNC6293 deceived Keir Giles, a Russian information operations expert, into generating App-Specific Passwords (ASPs), bypassing Multifactor Authentication (MFA) and gaining persistent e-mail access. Google later disabled compromised accounts and linked the activity to APT29 with low confidence.  `russia`   [link](https://citizenlab.ca/2025/06/russian-government-linked-social-engineering-targets-app-specific-passwords/) \n\n\n**Israeli government warns citizens of espionage through home security cameras**<br>\nOn June 20, the Israel National Cyber Directorate (INCD) issued a warning to Israeli citizens regarding cyber threats to security cameras, urging users to change their access passwords. The alert emphasised that cameras that are improperly configured could present significant security risks, potentially exploited by Iran and its allies for real-time intelligence gathering. `Israel`  `Iran`  [link](https://www.jpost.com/israel-news/article-858606) \n\n**Iranian operatives impersonated i24NEWS journalist to target Israeli officers with spyware**<br>\nOn June 23, Israeli authorities exposed an Iranian cyber operation in which operatives posed as an i24NEWS journalist to target senior Israeli officers with spyware. The attackers used fake e-mail addresses and attempted to lure recipients into clicking malicious links. The operation was foiled when a targeted officer reported the suspicious message to the IDF\u2019s Information Security Directorate, prompting an investigation and coordinated response.  `iran`  `israel`   [link](https://www.i24news.tv/en/news/israel/defense/artc-iranian-operatives-impersonated-i24news-journalist-to-target-israeli-officers-with-spyware#google_vignette) \n\n**North Korean Contagious Interview campaign drops 35 new malicious npm packages**<br>\nOn June\u202f25, Socket, a US-based cybersecurity company, revealed that North Korean hackers behind the \u201cContagious Interview\u201d campaign published 35 malicious npm packages via 24 accounts, downloaded over 4\u202f000 times. These packages employ a stealth HexEval loader that fingerprints systems, delivers BeaverTail (an infostealer), InvisibleFerret backdoor, and, in one case, a cross-platform keylogger. Targets\u2014job-seeking developers\u2014are lured via fake recruiters on LinkedIn and pressured to run malware outside containers.  `north korea`   [link](https://socket.dev/blog/north-korean-contagious-interview-campaign-drops-35-new-malicious-npm-packages) \n\n**ICC detects and contains second cyber incident in recent years**<br>\nOn June 30, the International Criminal Court reported that it detected and contained a sophisticated cyber security incident, marking the second of its kind in recent years. The Court is conducting an impact analysis and taking mitigation steps, while urging continued support from States Parties to uphold its justice and accountability mission. [Link](https://www.icc-cpi.int/news/icc-detects-and-contains-new-sophisticated-cyber-security-incident)\n\n## Cybercrime\n\n**Adversaries exploit PyPI and npm name confusion to deliver cross-platform malware**<br>\nOn May 28, a security researcher from Checkmarx Zero reported a supply-chain campaign that used typosquatting and cross-ecosystem name confusion to target Python and JavaScript developers. Malicious packages mimicking Colorama and Colorizr were uploaded to PyPI, delivering malware enabling remote access, data exfiltration, and persistence on Windows and Linux systems. The packages have been removed. `supply-chain attack`  [link](https://checkmarx.com/zero-post/python-pypi-supply-chain-attack-colorama/) \n\n**Supply-chain attack targets popular React Native accessibility packages on npm**<br>\nOn June\u202f6, attackers compromised Gluestack\u2019s @react-native-aria npm packages\u2014UI accessibility components for React Native apps\u2014by injecting a remote-access trojan into 17 of 20 modules. The malicious code allowed shell command execution and file transfers. These packages, with over 1.020.000 weekly downloads, were widely used in mobile app development. Gluestack revoked the compromised token and deprecated the affected versions to halt the supply-chain attack.  `supply-chain attack`   [link](https://www.bleepingcomputer.com/news/security/supply-chain-attack-hits-gluestack-npm-packages-with-960k-weekly-downloads/) \n\n**Threat actors target VPN credentials with fake SonicWall NetExtender installer**<br>\nOn June 23, SonicWall and Microsoft reported that threat actors launched a campaign using a trojanised SonicWall NetExtender VPN client to steal credentials. The attackers hosted the fake installer on spoofed websites and signed it with a legitimate-looking certificate. Once installed, the malware exfiltrated VPN usernames, passwords, and domain data via HTTP. `supply-chain attack`  [link](https://www.sonicwall.com/blog/threat-actors-modify-and-re-create-commercial-software-to-steal-users-information) \n\n**Threat actors build signed malware via ConnectWise ScreenConnect abuse**<br>\nOn June 23, researchers at G DATA CyberDefense revealed that since March, threat actors have abused ConnectWise ScreenConnect\u2019s signed installers to build and spread modified software with malicious functions. They exploit authenticode stuffing to embed malicious settings, enabling fake Windows updates and hidden connections. ConnectWise\u2019s signing method lets adversaries alter behaviour without breaking the signature, and this undermines detection by security software. `supply-chain attack`  [link](https://www.gdatasoftware.com/blog/2025/06/38218-connectwise-abuse-malware) \n\n**TeamFiltration A.T.O. campaign hits Microsoft cloud accounts via Teams abuse**<br>\nOn June\u202f11, Proofpoint\u2019s Threat Research Team revealed a global account\u2011takeover campaign dubbed UNK_SneakyStrike, exploiting the pentesting framework TeamFiltration via the Microsoft Teams API and AWS servers. Attackers used automated enumeration and password spraying to hijack Microsoft Entra ID accounts, targeting over 80.000 users across nearly 100 cloud tenants before pausing operations.   [link](https://www.proofpoint.com/us/blog/threat-insight/attackers-unleash-teamfiltration-account-takeover-campaign) \n\n**Cybercrime group Water Curse weaponised GitHub repositories to deliver multistage stealer**<br>\nOn June 16, Trend Micro security researchers reported on a campaign attributed to Water Curse where the threat actor weaponised at least 76 GitHub repositories, embedding malicious payloads into legitimate-looking dev tools. Payloads, hidden in Visual Studio build scripts, conduct multi-stage infection using VBS, PowerShell, and obfuscated binaries to steal credentials, browser/session data, establish persistence, and exfiltrate information. `supply-chain attack`  [link](https://www.trendmicro.com/en_us/research/25/f/water-curse.html) \n\n**FBI warns Play ransomware has hit 900 victims and remains a major threat to critical infrastructure**<br>\nOn June 4, the FBI, in an updated joint advisory with CISA and the Australian Cyber Security Centre, revealed that the Play ransomware group had breached around 900 organisations globally by May 2025, triple the number reported in 2023. The threat actor, active since 2022, has increasingly targeted critical infrastructure using recompiled malware and novel exploits, pressuring victims with stolen data and phone threats to pay ransoms.   [link](https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-352a) \n\n**Millions of off-brand IoT devices infected by BadBox 2.0 botnet**<br>\nOn June 5, the FBI revealed that BadBox 2.0 has compromised millions of China-made IoT devices, gaining access either pre-purchase or via backdoored apps during setup. These devices, used as residential proxies, enable cybercrime activity. Indicators include non-certified Android devices, suspicious app stores, and unusual traffic.   [link](https://www.ic3.gov/PSA/2025/PSA250605) \n\n**Fake AI tool installers spread CyberLock and other malware**<br>\nOn May 29, Cisco Talos revealed that threat actors are using fake AI tool installers to spread malware, including CyberLock ransomware, Lucky_Gh0$t, and the destructive Numero malware, targeting businesses in sales, tech, and marketing. Distributed via SEO poisoning and social platforms, these malicious installers impersonate tools like ChatGPT and InVideo AI, encrypting or damaging files while exploiting trust in widely adopted AI solutions for automation and customer engagement.  `artificial intelligence`   [link](https://blog.talosintelligence.com/fake-ai-tool-installers/) \n\n\n## Data exposure and leaks\n\n**Repackaged leak exposes billions of old stolen credentials online**<br>\nOn June 23, CyberNews revealed that a massive compilation of around 16 billion login credentials \u2014 drawn from 30 different datasets \u2014 was briefly exposed online. These credentials, covering platforms like Google, Apple, Facebook, Telegram, and government services, were harvested not via hacking but through infostealers malware. This isn't a new breach\u2014just a repackaged database of old credentials stolen via infostealers, past breaches, and credential stuffing, now exposed online.   [link](https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/) \n\n## Information operations\n\n**Fake messages urging Israelis to avoid going into shelters**<br>\nOn June 16, the Israeli Cyber Authority warned the population of fake messages being sent in the name of the Home Front, allegedly urging Israelis to avoid going to shelters due to alerts of terror attacks.  `iran`  `israel`   [link](https://www.timesofisrael.com/liveblog_entry/cyber-authority-warns-against-fake-messages-urging-israelis-to-avoid-going-into-shelters/) \n\n**Argentina government investigates network of Russian agents it accuses of promoting disinformation campaigns**<br>\nOn June 18, Argentine intelligence (SIDE) uncovered a network of five Russian-linked residents tied to \u201cLa Compa\u00f1\u00eda\u201d and Project Lakhta\u2014echoing Prigozhin\u2019s Kremlin-backed disinformation operations. Cyber efforts included creating and spreading content on social media, influencing NGOs and focus groups, and collecting political intelligence via digital channels. The goal: orchestrate online campaigns to manipulate public opinion in favor of Russian geopolitical interests.  `argentina`  `russia`   [link](https://www.lanacion.com.ar/politica/el-gobierno-investiga-una-red-de-espias-rusos-a-los-que-acusa-de-impulsar-campanas-de-desinformacion-nid18062025/) \n\n\n## Disruption & destruction\n\n**Cloudflare blocked record 7.3 Tbps DDoS attack with autonomous mitigation**<br>\nOn June\u202f19, Cloudflare revealed it had autonomously blocked the largest DDoS attack ever recorded\u2014an astonishing 7.3\u202fTbps in mid\u2011May\u2014targeted at a hosting provider using Magic Transit. The attack unleashed 37.4\u202fTB in just 45\u202fseconds via over 20.000 UDP ports per second and multiple reflection/amplification techniques. Cloudflare\u2019s eBPF\u2011driven detection rules were applied seamlessly across its global network, requiring no human intervention.   [link](https://blog.cloudflare.com/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos/) \n\n**Iran shuts down internet as Israeli strikes continue**<br>\nOn June 18, a near-total internet blackout in Iran cut connectivity to just 3\u202f%, severely limiting external communication amid ongoing Israeli strikes. The shutdown, likely ordered by Iranian authorities, followed warnings of a planned disconnection. Officials cited concerns over Israeli cyberattacks and covert activity. Since the blackout, phone access has been strained, news updates halted, and vital alerts, such as evacuation notices, maybe unreachable for many residents.  `iran`   [link](https://mastodon.social/@netblocks) \n\n**Iran imposes internet restrictions following Israel's attack on the country**<br>\nOn June 13, internet users in Iran reported network disruptions relating to the internet and communications applications. The Islamic Revolutionary Guard Corps asked the population to refrain from transferring information on foreign messaging apps, namely WhatsApp and Instagram. According to the Ministry of Communication, this is in light of Israel's attack on the same day.  `iran`   [link](https://www.tasnimnews.com/fa/news/1404/03/23/3334504/%D9%88%D8%B2%D8%A7%D8%B1%D8%AA-%D8%A7%D8%B1%D8%AA%D8%A8%D8%A7%D8%B7%D8%A7%D8%AA-%D9%85%D8%AD%D8%AF%D9%88%D8%AF%DB%8C%D8%AA-%D9%87%D8%A7%DB%8C-%D8%A7%DB%8C%D9%86%D8%AA%D8%B1%D9%86%D8%AA-%DA%A9%D8%B4%D9%88%D8%B1-%D9%85%D9%88%D9%82%D8%AA%DB%8C-%D8%A7%D8%B3%D8%AA) \n\n**Solar storms accelerate Starlink satellite reentry, raising operational and security concerns**<br>\nFrom May 31 to June 2, severe solar storms increased atmospheric drag on Starlink satellites, accelerating their reentry and raising concerns over satellite lifespan, debris, and operational reliability. NASA researchers warned this issue, intensified by the ongoing solar maximum and Starlink\u2019s vast LEO constellation, could disrupt telecommunication services globally and complicate future satellite operations, particularly as Starlink expands amid geopolitical scrutiny over its use in tariff-affected nations.  `space`  `telecommunications`   [link](https://www.the-independent.com/space/starlink-satellites-elon-musk-space-b2759288.html) \n\n**Destructive npm packages disguised as health monitoring utilities enable remote system wipe**<br>\nOn\u202fJune\u202f5, Socket uncovered two malicious npm packages\u2014express-api-sync and system-health-sync-api\u2014posing as backend utilities for API syncing and system health monitoring. Instead, they enabled full system wipes via hidden HTTP endpoints. One deleted files with the key \u201cDEFAULT_123,\u201d the other after collecting system info and receiving the \u201cHelloWorld\u201d secret. Both exploited trust in common developer tools to deploy destructive payloads.  `supply-chain attack`   [link](https://socket.dev/blog/destructive-npm-packages-enable-remote-system-wipe) \n\n## Hacktivism\n\n**Israeli-linked supposed hacktivist claims to have breached an Iranian cryptocurrency platform**<br>\nOn June 18, an Israel-linked supposed hacktivist named Predatory Sparrow claimed to have stolen and burned over 90 million US dollars in cryptocurrency from Iran\u2019s largest cryptocurrency exchange platform, Nobitex. They warned they would also release Nobitex\u2019s source code.  `iran`  `israel`   [link](https://www.bleepingcomputer.com/news/security/pro-israel-hackers-hit-irans-nobitex-exchange-burn-90m-in-crypto/) \n\n[^1]: Conclusions or attributions made in this document merely reflect what publicly available sources report. They do not reflect our stance. \n\n",
    "content_html": "<h2 id=\"cyber-brief-june-2025\">Cyber Brief (June 2025)</h2><p>July 1, 2025 - Version: 1</p><p class=\"tlp-type clear\">TLP:CLEAR</p><h2 id=\"executive-summary\">Executive summary</h2><ul><li><p>We analysed 277 open source reports for this Cyber Brief<sup class=\"footnote-ref\" id=\"fnref-1\"><a href=\"#fn-1\">1</a></sup>.</p></li><li><p>Relating to <strong>cyber policy and law enforcement</strong>, the EU adopted a blueprint to better manage European cyber crises. The US warned of Iranian cyber threats to US critical infrastructure and is preparing to ban federal agencies from using AI tools from \"foreign adversaries.\" BreachForums operators were arrested in France.</p></li><li><p>On the <strong>cyberespionage</strong> front, in Europe, a Dutch minister warned of rising Chinese espionage on high-tech sectors ; Paragon's Graphite spyware targeted journalists. Elsewhere, a Canadian telecom provider and satellite company Viasat revealed being hacked by China-linked Salt Typhoon, a Russia-linked threat actor targeted prominent academics, while North Korean-linked Contagious Interview continued targeting developers with supply-chain attacks. Related to Israel/Iran war, Iranian operatives impersonated a journalist to target Israeli officers with spyware.</p></li><li><p>Relating to <strong>cybercrime</strong>, several supply-chain attacks aimed at developers using npm packages, while threat actors targeted SonicWall and ConnectWise products, still in supply-chain attacks.</p></li><li><p>There were <strong>disruptive</strong> incidents, Iran shut down internet amid Israeli strikes, and a likely Iranian wiper was observed in Albania.</p></li><li><p>As regards <strong>data exposure and leaks</strong> incidents, a repackaged leak, drawn from 30 different datasets, exposed billions of old stolen credentials online.</p></li><li><p>Relating to <strong>information operations</strong>, a pro-Russia disinformation campaign targeted Moldova using fake Euronews accounts, while Israel warned of fake messages urging Israelis to avoid going into shelters.</p></li><li><p>On the <strong>hacktivism</strong> front, NoName057(16) targeted NATO Summit with DDoS attacks and hint at Dutch rail sabotage while Israeli-linked supposed hacktivist claimed to have breached an Iranian cryptocurrency platform.</p></li></ul><h2 id=\"europe\">Europe</h2><h3 id=\"cyber-policy-and-law-enforcement\">Cyber policy and law enforcement</h3><p><strong>EU adopts a blueprint to better manage European cyber crises and incidents</strong><br> On June 6, the EU adopted a new blueprint to improve management of large-scale cyber crises. It defines member states\u2019 roles in detection, response, and recovery, strengthens cooperation across technical and political levels, and integrates recent laws like NIS2. The framework also promotes civilian-military cooperation and coordination with NATO to enhance Europe\u2019s cyber resilience. <code>policy</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.consilium.europa.eu/en/press/press-releases/2025/06/06/eu-adopts-blueprint-to-better-manage-european-cyber-crises-and-incidents/\">link</a></p><p><strong>UK Strategic Defence Review 2025: Enhancing offensive cyber capabilities and NATO integration</strong><br> On June 2, the UK Ministry of Defence published its Strategic Defence Review, highlighting key shifts such as new cyber investments, the launch of a Cyber and Electromagnetic (CyberEM) Command by end-2025, and deeper cyber integration with NATO. The Defence Secretary emphasised a proactive stance, including offensive cyber operations targeting Russia and China. <code>offensive capabilities</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://assets.publishing.service.gov.uk/media/683d89f181deb72cce2680a5/The_Strategic_Defence_Review_2025_-_Making_Britain_Safer_-_secure_at_home__strong_abroad.pdf\">link</a></p><p><strong>BreachForums operators arrested in France in major cybercrime raid</strong><br> On June\u202f25, Le\u202fParisien reported that French police arrested five operators of the BreachForums cyber crime forum. Simultaneous raids in Hauts de Seine, Seine-Maritime and R\u00e9union netted \u201cShinyHunters,\u201d \u201cHollow,\u201d \u201cNoct,\u201d and \u201cDepressed,\u201d while IntelBroker was previously arrested in February\u202f2025. The forum, used to trade stolen data and breach corporate systems\u2014including France\u2019s national unemployment agency affecting 43\u202fmillion people\u2014has since gone offline. <code>arrest</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.leparisien.fr/high-tech/la-police-interpelle-cinq-hackers-francais-de-haut-vol-derriere-un-celebre-forum-de-vol-de-donnees-25-06-2025-QJTPFTDPQZAP7B25MF24YLHU6E.php\">link</a></p><h3 id=\"cyberespionage-prepositioning\">Cyberespionage &amp; prepositioning</h3><p><strong>Dutch Minister warns of rising Chinese espionage on high-tech sectors</strong><br> On May 31, the Dutch Defence Minister warned that Chinese cyberespionage targeting Dutch industries, particularly the semiconductor sector, is intensifying, with intellectual property theft as the key motive. He cited intelligence reports identifying China as the Netherlands\u2019 top cyber threat and stressed the need to reduce European dependence on China for critical raw materials, as Beijing increasingly leverages its economic position for geopolitical influence and pressure. <code>china</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.reuters.com/business/aerospace-defense/chinese-spying-dutch-industries-intensifying-dutch-defence-minister-2025-05-31/\">link</a></p><p><strong>APT28 targeted Ukrainian government agency with Beardshell backdoor and Covenant framework</strong><br> On June 21, CERT-UA reported on the Russia-linked APT28 compromising a Ukrainian government instance with the Beardshell backdoor. The threat actor sent a Signal message to the target with a <code>.doc</code> file containing a macro. When activated, the macro triggered a complex infection chain installing the Covenant framework in memory which was used to launch the backdoor, using the cloud storage services Icedrive and Koofr as control channels. <code>public administration</code> <code>russia</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://cert.gov.ua/article/6284080\">link</a> </p><p><strong>Ukraine says it breached Russian warplane maker Tupolev, exposing strategic aviation data</strong><br> On June 4, Ukraine's military intelligence (HUR) claimed it hacked Russian warplane maker Tupolev, stealing 4.4GB of sensitive data including personnel records, internal communications, and design documents. The HUR said the breach, part of broader cyber operations targeting Russia\u2019s defence sector, exposed critical details of Russia\u2019s strategic aviation programs and followed the defacement of Tupolev\u2019s website and earlier cyberattacks on multiple Russian government agencies and military-linked organisations. <code>defence</code> <code>russia</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.kyivpost.com/post/53946\">link</a> </p><p><strong>UNC1151 targets Polish users via Roundcube exploit in credential theft campaign</strong><br> On June 5, CERT Polska reported that pro-Belarusian group UNC1151 exploited the Roundcube vulnerability CVE-2024-42009 in a spearphishing campaign targeting Polish entities to steal user credentials using JavaScript and malicious Service Workers. Though no exploitation of a newly discovered Roundcube vulnerability (CVE-2025-49113) has been observed, its potential use in future attacks heightens concerns about full server compromise through credential theft and phishing. <a rel=\"noopener\" target=\"_blank\" href=\"https://cert.pl/en/posts/2025/06/unc1151-campaign-roundcube/\">link</a> </p><p><strong>Possible iPhone spyware campaign detected targeting US and EU high-profile users</strong><br> On June 5, iVerify reported possible evidence of an iPhone spyware campaign targeting individuals in the US and EU, including government officials, political campaign members, and media personnel, via a now-patched iOS \"Nickname\" bug. While Apple denies any active exploitation, iVerify points to circumstantial signs, such as device crashes and Apple threat alerts, as warranting further investigation into potential high-level targeting linked to past Chinese surveillance activity. <a rel=\"noopener\" target=\"_blank\" href=\"https://www.axios.com/2025/06/05/spyware-iphones-apple-iverify\">link</a> </p><p><strong>Paragon's Graphite spyware targets journalists via iOS zero-click exploit</strong><br> On June 12, The Citizen Lab reported forensic confirmation that Italian journalist Ciro Pellegrino and a prominent European journalist were targeted with Paragon\u2019s Graphite spyware via a zero-click iMessage exploit, CVE-2025-43200. Both cases link to the same threat actor. The findings highlight a wider cyberespionage effort against <code>Fanpage[.]it</code> and ongoing threats to journalists in Europe. <code>psoa</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://citizenlab.ca/2025/06/first-forensic-confirmation-of-paragons-ios-mercenary-spyware-finds-journalists-targeted/\">link</a> </p><h3 id=\"cybercrime\">Cybercrime</h3><h3 id=\"disruption-destruction\">Disruption &amp; destruction</h3><p><strong>Swedish public service television SVT targeted with DDoS attacks</strong><br> From June 8 to June 11, an unknown threat actor launched DDoS attacks against the Swedish public service television company SVT, causing temporary downtime. This follows previous temporary disruptions in other widely used digital services, such as applications for eID and money transfers. Swedish Prime Minister Kristersson acknowledged continuous cyber threats targeting both state entities and critical firms. <a rel=\"noopener\" target=\"_blank\" href=\"https://swedenherald.com/article/svt-and-swedish-parliament-websites-hit-by-overload-attacks\">link</a> </p><p><strong>Likely Iranian wiper observed targeting in Albania</strong><br> On June 20, Symantec reported a wiper attack targeting organisations in Albania by the Iranian Druidfly group. The Iranian cyber group Druidfly is known for its destructive attacks and espionage operations. Druidfly targets countries hostile to Iran, including Albania and Israel. \u200bThe group employs social engineering tactics, custom backdoors and ransomware like DarkBit, often serving as a cover for their devastating attacks. <code>iran</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://x.com/threatintel/status/1936049254432231444\">link</a> </p><h3 id=\"information-operations\">Information operations</h3><p><strong>Pro-Russian disinformation targets Moldova using fake Euronews accounts</strong><br> On June 3, Euronews reported a coordinated disinformation campaign by pro-Russian threat actors using AI-generated profiles to impersonate its staff on TikTok and X, spreading fake videos alleging criminality and instability in Moldova. Aimed at the EU, NATO, and Ukrainian audiences, the operation mirrors tactics linked to \u201cOperation Overload,\u201d with content aligned to Russia\u2019s influence objectives and intended to undermine Western alliances. Euronews is actively removing the false material. <code>russia</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.euronews.com/my-europe/2025/06/03/euronews-targeted-by-anti-moldova-disinformation-campaign\">link</a> </p><p><strong>Israel is using YouTube paid ads to justify its actions in Iran</strong><br> On June 18, an online news outlet reported that YouTube users are constantly seeing Israeli propaganda advertisements justifying its air strikes on Iran. They appear to target European countries, namely Germany, Italy, France, and the United Kingdom. Similar reports had been made since October 2023 in regard to Israel justifying its strikes on Gaza. <code>israel</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.fudzilla.com/news/61216-iran-shores-up-cyber-defences\">link</a> </p><h3 id=\"hacktivism\">Hacktivism</h3><p><strong>NoName057(16) targets NATO Summit with DDoS attacks and hints at Dutch rail sabotage</strong><br> On June 23\u201324, pro-Russia hacktivist group NoName057(16) launched DDoS attacks on Dutch and NATO websites, coinciding with NATO\u2019s 2025 summit. On June 24, they hinted at involvement in a Dutch train cable outage, suggesting it could be \u201cblamed\u201d on them and the DDoSia project. The Dutch Justice Ministry reported that the incident\u2014a fire damaging around 30 cables\u2014may be linked to sabotage. <code>russia</code> </p><p><strong>Killnet claims breach of Ukrainian airspace app following major drone attack</strong><br> On June 2, Killnet claimed responsibility for breaching a Ukrainian airspace-monitoring app and launched a Telegram channel sharing drone firmware, likely in response to Ukraine\u2019s June 1 \"Operation Spider Web,\" which damaged dozens of Russian military aircraft. Since reemerging in May 2025, Killnet has intensified efforts to regain notoriety by targeting Ukraine\u2019s drone operations, though the actual impact of its claimed hacks remains unclear. <code>russia</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://t.me/WeAreKillnet_Channel/16\">link</a> </p><h2 id=\"world\">World</h2><h3 id=\"cyber-policy-and-law-enforcement-2\">Cyber policy and law enforcement</h3><p><strong>US bill seeks to ban federal agencies from using DeepSeek, AI tools from \"foreign adversaries\"</strong><br> On June\u202f26, senators Rick\u202fScott and Gary\u202fPeters introduced the bipartisan No Adversarial AI Act, banning federal agencies from using AI tools from \u201cforeign adversaries\u201d\u2014China, Russia, Iran, and North Korea\u2014specifically citing concerns around China\u2019s DeepSeek, which may supply data to military/intelligence sectors. The bill mandates a Federal Acquisition Security Council registry updated every 180\u202fdays and allows limited exemptions for vetted research and testing. <code>ban</code> <code>united states</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://therecord.media/bipartisan-bill-ban-deepseek-federal\">link</a> </p><p><strong>WhatsApp banned on US House staffers' devices</strong><br> On June 23, Axios reported that WhatsApp has been banned for use on government devices among House congressional staffers. The ban is in response to cybersecurity concerns for users, due to the lack of transparency in how it protects user data, absence of stored data encryption, and potential security risks involved with its use. <code>ban</code> <code>united states</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.axios.com/2025/06/23/whatsapp-house-congress-staffers-messaging-app\">link</a> </p><p><strong>US agencies warn of Iranian cyber threats to US critical infrastructure</strong><br> On June\u202f30, US agencies jointly issued an advisory alerting that Iranian-affiliated hackers and hacktivist groups may conduct malicious cyber activity\u2014despite a declared ceasefire and ongoing negotiations towards a permanent solution. They highlighted risks to critical infrastructure including energy, water, healthcare, transportation, and defence-linked networks, referencing past intrusions such as the 2023 Pennsylvania water facility breach. <code>united states</code> <code>iran</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.cisa.gov/sites/default/files/2025-06/joint-fact-sheet-Iranian-cyber-actors-may-target-vulnerable-US-networks-and-entities-of-interest-508c-1.pdf\">link</a></p><p><strong>ISACs warn US critical sectors of possible Iranian cyberattacks amid Israel tensions</strong><br> On June\u202f17, US critical infrastructure providers \u2014 especially in energy, water, transportation, communications, food &amp; agriculture, and IT \u2014 were urged to strengthen cybersecurity amid escalating Iran\u2013Israel tensions. The Food and Ag\u2011ISAC and IT\u2011ISAC issued joint alerts, warning of potential spillover from Iranian cyber operations targeting Israel, while Electricity, Aviation, Financial Services, and Water ISACs also heightened vigilance. <code>iran</code> <code>united states</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.politico.com/news/2025/06/17/us-critical-networks-iran-israel-cyber-attack-00411799\">link</a> </p><p><strong>US offers reward for information on Iran-linked Cyber Av3ngers</strong><br> Cyber Av3ngers, a threat actor known for targeting Israeli-made ICS and IoT devices, increased social media activity after recent Israel-Iran kinetic activity. On June 12, the US State Department\u2019s Rewards for Justice offered 10 million US dollars for information on Cyber Av3ngers, Mr Soul, or affiliates. The US government links the group to Iran\u2019s IRGC-CEC and attributes cyberattacks on US critical infrastructure to the threat actor. <code>iran</code> <code>united states</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://x.com/RFJ_USA/status/1933237876470280354\">link</a> </p><p><strong>China offers bounties for information on Taiwanese military cyber operatives</strong><br> On June 5, China offered cash rewards for clues leading to the arrest of 20 individuals it claims are Taiwanese military cyber operatives. It accused them of targeting Chinese sectors and collaborating with US intelligence. Taiwan rejected the claims, calling them fabricated and highlighting global concerns about Chinese cyber activities and disinformation. <code>china</code> <code>taiwan</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.straitstimes.com/asia/east-asia/chinese-authorities-issue-bounty-for-hackers-said-to-be-linked-to-taiwan\">link</a> </p><p><strong>US charges British individual behind the cybercrime identity IntelBroker</strong><br> On June 25, the US Department of Justice reported that they charged a British national with operating the IntelBroker online identity. According to the charges, IntelBroker infiltrated victim computer networks, stole data, sold the stolen data and caused millions of US dollars in damages to dozens of victims around the world. <code>united states</code> <code>charges</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.justice.gov/usao-sdny/pr/serial-hacker-intelbroker-charged-causing-25-million-damages-victims\">link</a> </p><p><strong>Interpol dismantles infostealer networks across 26 countries</strong><br> On June 11, Interpol announced the results of Operation Secure, a cybercrime crackdown from January to April 2025. Authorities in 26 countries dismantled infostealer infrastructure, arresting 32 suspects and seizing 41 servers. They took down over 20.000 malicious IPs/domains and notified 216.000 victims. The action, supported by Group-IB, Kaspersky, and Trend Micro, disrupted major cybercrime actors, especially in Vietnam, Sri Lanka, Nauru, and Hong Kong. <code>takedown</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.interpol.int/News-and-Events/News/2025/20-000-malicious-IPs-and-domains-taken-down-in-INTERPOL-infostealer-crackdown\">link</a> </p><p><strong>AVCheck takedown disrupts key malware testing service in global cybercrime crackdown</strong><br> On May 27, international law enforcement seized AVCheck, a major counter-antivirus service used by cybercriminals to test and refine malware evasion, as part of Operation Endgame. The service's official domain at AVCheck now displays a seizure banner featuring the crests of the US Department of Justice, the FBI, the US Secret Service, and Dutch police (Politie), highlighting its role in supporting ransomware groups and aiding stealthy cyberattacks. <code>takedown</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.justice.gov/usao-sdtx/pr/websites-selling-hacking-tools-cybercriminals-seized\">link</a> </p><h3 id=\"cyberespionage-prepositioning-2\">Cyberespionage &amp; prepositioning</h3><p><strong>Salt Typhoon exploited a Cisco flaw to hack Canadian telecom</strong><br> On June\u202f23, Canada\u2019s cybersecurity agency and the FBI revealed that the Chinese group Salt\u202fTyphoon infiltrated a Canadian telecom provider in February by exploiting the unpatched Cisco IOS\u202fXE vulnerability CVE 2023 20198, enabling account creation and network snooping via GRE tunnels. Despite the flaw being disclosed in October\u202f2023, at least one major firm hadn't applied the patch. Authorities warn the espionage campaign will persist and urge urgent patching of edge devices. <code>canada</code> <code>china</code> <code>telecommunications</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.ic3.gov/CSA/2025/250620.pdf\">link</a> </p><p><strong>Satellite company Viasat was among China-linked Salt Typhoon\u2019s campaign\u2019s victims</strong><br> On June 18, Viasat, a satellite company with a presence in Europe, confirmed that it was one of the victims of China-linked Salt Typhoon\u2019s cyberespionage operation targeting several sectors, namely telecommunications, worldwide, uncovered in 2024. <code>china</code> <code>space</code> <code>telecommunications</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.satellitetoday.com/cybersecurity/2025/06/18/viasat-confirms-unauthorized-access-after-bloomberg-report-of-salt-typhoon-impact/\">link</a> </p><p><strong>China-linked activity cluster PurpleHaze and ShadowPad target organisations worldwide</strong><br> On June 9, SentinelOne reported countering China-linked activity clusters PurpleHaze and ShadowPad, which included reconnaissance and intrusion attempts from July 2024 to March 2025. These targeted over 70 organisations, including a South Asian government and a European media outlet. The targeted sectors include manufacturing, media, cybersecurity, public administration and telecommunications. SentinelOne confirmed no compromise of its assets, highlighting the persistent interest of cyberespionage actors in cybersecurity vendors. <code>china</code> <code>public administration</code> <code>telecommunications</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.sentinelone.com/labs/follow-the-smoke-china-nexus-threat-actors-hammer-at-the-doors-of-top-tier-targets/\">link</a> </p><p><strong>Washington Post journalists targeted in cyberattack</strong><br> On June 15, The Wall Street Journal reported that several journalists from the Washington Post\u2019s e-mail accounts were compromised in a cyberattack. The targeted attacks were done towards journalists writing on national security and economic policy, as well as China. <code>china</code> <code>united states</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.wsj.com/tech/cybersecurity/cyberattack-on-washington-post-compromises-email-accounts-of-journalists-70bf1300\">link</a> </p><p><strong>China warns of cyberespionage targeting state and research sectors</strong><br> On\u202fJune\u202f4, China\u2019s Ministry of State Security (MSS) warned of three recent cyberespionage incidents targeting government agencies, research institutes, and critical infrastructure. In one case, a lab employee stored classified files on a personal device and clicked a malicious e-mail attachment, allowing foreign operatives to steal data for three months. In another, a phishing link compromised a government agency. A third attack exploited outdated office software to infiltrate a research institution. <code>china</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.globaltimes.cn/page/202506/1335381.shtml\">link</a> </p><p><strong>Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX &amp; VShell malware</strong><br> On June\u202f6, Seqrite Labs, an India-based cybersecurity company, uncovered Operation\u202fDRAGONCLONE, a sophisticated cyber campaign targeting China Mobile\u202fTietong. It begins with a malicious ZIP exploiting DLL sideloading of Wondershare Repairit, deploying the VELETRIX loader with anti\u2011sandbox and \u201cIPFuscation\u201d techniques to launch VShell in memory. The campaign includes 44 implants, overlapping infrastructure linked to UNC5174 and Earth\u202fLamia, and employs Cobalt\u202fStrike, SuperShell, and the Asset Lighthouse System. <code>china</code> <code>telecommunications</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.seqrite.com/blog/operation-dragonclone-chinese-telecom-veletrix-vshell-malware/\">link</a> </p><p><strong>Russia-linked threat actor UNC6293 leverages App-Specific Passwords to access academic e-mail accounts</strong><br> On June 18, The Citizen Lab and Google reported on Russia-linked threat actor UNC6293 activities targeting prominent academics and critics of Russia from at least April through early June. On May 22, UNC6293 deceived Keir Giles, a Russian information operations expert, into generating App-Specific Passwords (ASPs), bypassing Multifactor Authentication (MFA) and gaining persistent e-mail access. Google later disabled compromised accounts and linked the activity to APT29 with low confidence. <code>russia</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://citizenlab.ca/2025/06/russian-government-linked-social-engineering-targets-app-specific-passwords/\">link</a> </p><p><strong>Israeli government warns citizens of espionage through home security cameras</strong><br> On June 20, the Israel National Cyber Directorate (INCD) issued a warning to Israeli citizens regarding cyber threats to security cameras, urging users to change their access passwords. The alert emphasised that cameras that are improperly configured could present significant security risks, potentially exploited by Iran and its allies for real-time intelligence gathering. <code>Israel</code> <code>Iran</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.jpost.com/israel-news/article-858606\">link</a> </p><p><strong>Iranian operatives impersonated i24NEWS journalist to target Israeli officers with spyware</strong><br> On June 23, Israeli authorities exposed an Iranian cyber operation in which operatives posed as an i24NEWS journalist to target senior Israeli officers with spyware. The attackers used fake e-mail addresses and attempted to lure recipients into clicking malicious links. The operation was foiled when a targeted officer reported the suspicious message to the IDF\u2019s Information Security Directorate, prompting an investigation and coordinated response. <code>iran</code> <code>israel</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.i24news.tv/en/news/israel/defense/artc-iranian-operatives-impersonated-i24news-journalist-to-target-israeli-officers-with-spyware#google_vignette\">link</a> </p><p><strong>North Korean Contagious Interview campaign drops 35 new malicious npm packages</strong><br> On June\u202f25, Socket, a US-based cybersecurity company, revealed that North Korean hackers behind the \u201cContagious Interview\u201d campaign published 35 malicious npm packages via 24 accounts, downloaded over 4\u202f000 times. These packages employ a stealth HexEval loader that fingerprints systems, delivers BeaverTail (an infostealer), InvisibleFerret backdoor, and, in one case, a cross-platform keylogger. Targets\u2014job-seeking developers\u2014are lured via fake recruiters on LinkedIn and pressured to run malware outside containers. <code>north korea</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://socket.dev/blog/north-korean-contagious-interview-campaign-drops-35-new-malicious-npm-packages\">link</a> </p><p><strong>ICC detects and contains second cyber incident in recent years</strong><br> On June 30, the International Criminal Court reported that it detected and contained a sophisticated cyber security incident, marking the second of its kind in recent years. The Court is conducting an impact analysis and taking mitigation steps, while urging continued support from States Parties to uphold its justice and accountability mission. <a rel=\"noopener\" target=\"_blank\" href=\"https://www.icc-cpi.int/news/icc-detects-and-contains-new-sophisticated-cyber-security-incident\">Link</a></p><h3 id=\"cybercrime-2\">Cybercrime</h3><p><strong>Adversaries exploit PyPI and npm name confusion to deliver cross-platform malware</strong><br> On May 28, a security researcher from Checkmarx Zero reported a supply-chain campaign that used typosquatting and cross-ecosystem name confusion to target Python and JavaScript developers. Malicious packages mimicking Colorama and Colorizr were uploaded to PyPI, delivering malware enabling remote access, data exfiltration, and persistence on Windows and Linux systems. The packages have been removed. <code>supply-chain attack</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://checkmarx.com/zero-post/python-pypi-supply-chain-attack-colorama/\">link</a> </p><p><strong>Supply-chain attack targets popular React Native accessibility packages on npm</strong><br> On June\u202f6, attackers compromised Gluestack\u2019s @react-native-aria npm packages\u2014UI accessibility components for React Native apps\u2014by injecting a remote-access trojan into 17 of 20 modules. The malicious code allowed shell command execution and file transfers. These packages, with over 1.020.000 weekly downloads, were widely used in mobile app development. Gluestack revoked the compromised token and deprecated the affected versions to halt the supply-chain attack. <code>supply-chain attack</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.bleepingcomputer.com/news/security/supply-chain-attack-hits-gluestack-npm-packages-with-960k-weekly-downloads/\">link</a> </p><p><strong>Threat actors target VPN credentials with fake SonicWall NetExtender installer</strong><br> On June 23, SonicWall and Microsoft reported that threat actors launched a campaign using a trojanised SonicWall NetExtender VPN client to steal credentials. The attackers hosted the fake installer on spoofed websites and signed it with a legitimate-looking certificate. Once installed, the malware exfiltrated VPN usernames, passwords, and domain data via HTTP. <code>supply-chain attack</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.sonicwall.com/blog/threat-actors-modify-and-re-create-commercial-software-to-steal-users-information\">link</a> </p><p><strong>Threat actors build signed malware via ConnectWise ScreenConnect abuse</strong><br> On June 23, researchers at G DATA CyberDefense revealed that since March, threat actors have abused ConnectWise ScreenConnect\u2019s signed installers to build and spread modified software with malicious functions. They exploit authenticode stuffing to embed malicious settings, enabling fake Windows updates and hidden connections. ConnectWise\u2019s signing method lets adversaries alter behaviour without breaking the signature, and this undermines detection by security software. <code>supply-chain attack</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.gdatasoftware.com/blog/2025/06/38218-connectwise-abuse-malware\">link</a> </p><p><strong>TeamFiltration A.T.O. campaign hits Microsoft cloud accounts via Teams abuse</strong><br> On June\u202f11, Proofpoint\u2019s Threat Research Team revealed a global account\u2011takeover campaign dubbed UNK_SneakyStrike, exploiting the pentesting framework TeamFiltration via the Microsoft Teams API and AWS servers. Attackers used automated enumeration and password spraying to hijack Microsoft Entra ID accounts, targeting over 80.000 users across nearly 100 cloud tenants before pausing operations. <a rel=\"noopener\" target=\"_blank\" href=\"https://www.proofpoint.com/us/blog/threat-insight/attackers-unleash-teamfiltration-account-takeover-campaign\">link</a> </p><p><strong>Cybercrime group Water Curse weaponised GitHub repositories to deliver multistage stealer</strong><br> On June 16, Trend Micro security researchers reported on a campaign attributed to Water Curse where the threat actor weaponised at least 76 GitHub repositories, embedding malicious payloads into legitimate-looking dev tools. Payloads, hidden in Visual Studio build scripts, conduct multi-stage infection using VBS, PowerShell, and obfuscated binaries to steal credentials, browser/session data, establish persistence, and exfiltrate information. <code>supply-chain attack</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.trendmicro.com/en_us/research/25/f/water-curse.html\">link</a> </p><p><strong>FBI warns Play ransomware has hit 900 victims and remains a major threat to critical infrastructure</strong><br> On June 4, the FBI, in an updated joint advisory with CISA and the Australian Cyber Security Centre, revealed that the Play ransomware group had breached around 900 organisations globally by May 2025, triple the number reported in 2023. The threat actor, active since 2022, has increasingly targeted critical infrastructure using recompiled malware and novel exploits, pressuring victims with stolen data and phone threats to pay ransoms. <a rel=\"noopener\" target=\"_blank\" href=\"https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-352a\">link</a> </p><p><strong>Millions of off-brand IoT devices infected by BadBox 2.0 botnet</strong><br> On June 5, the FBI revealed that BadBox 2.0 has compromised millions of China-made IoT devices, gaining access either pre-purchase or via backdoored apps during setup. These devices, used as residential proxies, enable cybercrime activity. Indicators include non-certified Android devices, suspicious app stores, and unusual traffic. <a rel=\"noopener\" target=\"_blank\" href=\"https://www.ic3.gov/PSA/2025/PSA250605\">link</a> </p><p><strong>Fake AI tool installers spread CyberLock and other malware</strong><br> On May 29, Cisco Talos revealed that threat actors are using fake AI tool installers to spread malware, including CyberLock ransomware, Lucky_Gh0$t, and the destructive Numero malware, targeting businesses in sales, tech, and marketing. Distributed via SEO poisoning and social platforms, these malicious installers impersonate tools like ChatGPT and InVideo AI, encrypting or damaging files while exploiting trust in widely adopted AI solutions for automation and customer engagement. <code>artificial intelligence</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://blog.talosintelligence.com/fake-ai-tool-installers/\">link</a> </p><h3 id=\"data-exposure-and-leaks\">Data exposure and leaks</h3><p><strong>Repackaged leak exposes billions of old stolen credentials online</strong><br> On June 23, CyberNews revealed that a massive compilation of around 16 billion login credentials \u2014 drawn from 30 different datasets \u2014 was briefly exposed online. These credentials, covering platforms like Google, Apple, Facebook, Telegram, and government services, were harvested not via hacking but through infostealers malware. This isn't a new breach\u2014just a repackaged database of old credentials stolen via infostealers, past breaches, and credential stuffing, now exposed online. <a rel=\"noopener\" target=\"_blank\" href=\"https://cybernews.com/security/billions-credentials-exposed-infostealers-data-leak/\">link</a> </p><h3 id=\"information-operations-2\">Information operations</h3><p><strong>Fake messages urging Israelis to avoid going into shelters</strong><br> On June 16, the Israeli Cyber Authority warned the population of fake messages being sent in the name of the Home Front, allegedly urging Israelis to avoid going to shelters due to alerts of terror attacks. <code>iran</code> <code>israel</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.timesofisrael.com/liveblog_entry/cyber-authority-warns-against-fake-messages-urging-israelis-to-avoid-going-into-shelters/\">link</a> </p><p><strong>Argentina government investigates network of Russian agents it accuses of promoting disinformation campaigns</strong><br> On June 18, Argentine intelligence (SIDE) uncovered a network of five Russian-linked residents tied to \u201cLa Compa\u00f1\u00eda\u201d and Project Lakhta\u2014echoing Prigozhin\u2019s Kremlin-backed disinformation operations. Cyber efforts included creating and spreading content on social media, influencing NGOs and focus groups, and collecting political intelligence via digital channels. The goal: orchestrate online campaigns to manipulate public opinion in favor of Russian geopolitical interests. <code>argentina</code> <code>russia</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.lanacion.com.ar/politica/el-gobierno-investiga-una-red-de-espias-rusos-a-los-que-acusa-de-impulsar-campanas-de-desinformacion-nid18062025/\">link</a> </p><h3 id=\"disruption-destruction-2\">Disruption &amp; destruction</h3><p><strong>Cloudflare blocked record 7.3 Tbps DDoS attack with autonomous mitigation</strong><br> On June\u202f19, Cloudflare revealed it had autonomously blocked the largest DDoS attack ever recorded\u2014an astonishing 7.3\u202fTbps in mid\u2011May\u2014targeted at a hosting provider using Magic Transit. The attack unleashed 37.4\u202fTB in just 45\u202fseconds via over 20.000 UDP ports per second and multiple reflection/amplification techniques. Cloudflare\u2019s eBPF\u2011driven detection rules were applied seamlessly across its global network, requiring no human intervention. <a rel=\"noopener\" target=\"_blank\" href=\"https://blog.cloudflare.com/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos/\">link</a> </p><p><strong>Iran shuts down internet as Israeli strikes continue</strong><br> On June 18, a near-total internet blackout in Iran cut connectivity to just 3\u202f%, severely limiting external communication amid ongoing Israeli strikes. The shutdown, likely ordered by Iranian authorities, followed warnings of a planned disconnection. Officials cited concerns over Israeli cyberattacks and covert activity. Since the blackout, phone access has been strained, news updates halted, and vital alerts, such as evacuation notices, maybe unreachable for many residents. <code>iran</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://mastodon.social/@netblocks\">link</a> </p><p><strong>Iran imposes internet restrictions following Israel's attack on the country</strong><br> On June 13, internet users in Iran reported network disruptions relating to the internet and communications applications. The Islamic Revolutionary Guard Corps asked the population to refrain from transferring information on foreign messaging apps, namely WhatsApp and Instagram. According to the Ministry of Communication, this is in light of Israel's attack on the same day. <code>iran</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.tasnimnews.com/fa/news/1404/03/23/3334504/%D9%88%D8%B2%D8%A7%D8%B1%D8%AA-%D8%A7%D8%B1%D8%AA%D8%A8%D8%A7%D8%B7%D8%A7%D8%AA-%D9%85%D8%AD%D8%AF%D9%88%D8%AF%DB%8C%D8%AA-%D9%87%D8%A7%DB%8C-%D8%A7%DB%8C%D9%86%D8%AA%D8%B1%D9%86%D8%AA-%DA%A9%D8%B4%D9%88%D8%B1-%D9%85%D9%88%D9%82%D8%AA%DB%8C-%D8%A7%D8%B3%D8%AA\">link</a> </p><p><strong>Solar storms accelerate Starlink satellite reentry, raising operational and security concerns</strong><br> From May 31 to June 2, severe solar storms increased atmospheric drag on Starlink satellites, accelerating their reentry and raising concerns over satellite lifespan, debris, and operational reliability. NASA researchers warned this issue, intensified by the ongoing solar maximum and Starlink\u2019s vast LEO constellation, could disrupt telecommunication services globally and complicate future satellite operations, particularly as Starlink expands amid geopolitical scrutiny over its use in tariff-affected nations. <code>space</code> <code>telecommunications</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.the-independent.com/space/starlink-satellites-elon-musk-space-b2759288.html\">link</a> </p><p><strong>Destructive npm packages disguised as health monitoring utilities enable remote system wipe</strong><br> On\u202fJune\u202f5, Socket uncovered two malicious npm packages\u2014express-api-sync and system-health-sync-api\u2014posing as backend utilities for API syncing and system health monitoring. Instead, they enabled full system wipes via hidden HTTP endpoints. One deleted files with the key \u201cDEFAULT_123,\u201d the other after collecting system info and receiving the \u201cHelloWorld\u201d secret. Both exploited trust in common developer tools to deploy destructive payloads. <code>supply-chain attack</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://socket.dev/blog/destructive-npm-packages-enable-remote-system-wipe\">link</a> </p><h3 id=\"hacktivism-2\">Hacktivism</h3><p><strong>Israeli-linked supposed hacktivist claims to have breached an Iranian cryptocurrency platform</strong><br> On June 18, an Israel-linked supposed hacktivist named Predatory Sparrow claimed to have stolen and burned over 90 million US dollars in cryptocurrency from Iran\u2019s largest cryptocurrency exchange platform, Nobitex. They warned they would also release Nobitex\u2019s source code. <code>iran</code> <code>israel</code> <a rel=\"noopener\" target=\"_blank\" href=\"https://www.bleepingcomputer.com/news/security/pro-israel-hackers-hit-irans-nobitex-exchange-burn-90m-in-crypto/\">link</a> </p><div class=\"footnotes\"><hr><ol><li id=\"fn-1\"><p>Conclusions or attributions made in this document merely reflect what publicly available sources report. They do not reflect our stance.&#160;<a href=\"#fnref-1\" class=\"footnoteBackLink\" title=\"Jump back to footnote 1 in the text.\">&#8617;</a></p></li></ol></div>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}