ARTICLE
23 October 2025

Ankura CTIX FLASH Update - October 21, 2025

AC
Ankura Consulting Group LLC

Contributor

Ankura Consulting Group, LLC is an independent global expert services and advisory firm that delivers end-to-end solutions to help clients at critical inflection points related to conflict, crisis, performance, risk, strategy, and transformation. Ankura consists of more than 1,800 professionals and has served 3,000+ clients across 55 countries. Collaborative lateral thinking, hard-earned experience, and multidisciplinary capabilities drive results and Ankura is unrivalled in its ability to assist clients to Protect, Create, and Recover Value. For more information, please visit, ankura.com.
Recent cyber threats have evolved to target different digital environments with sophisticated methods. For instance, on macOS, hackers are deploying fake websites mimicking popular platforms like Homebrew...
United States Technology
Ankura Consulting Group LLC’s articles from Ankura Consulting Group LLC are most popular:
  • with readers working within the Property industries
Ankura Consulting Group LLC are most popular:
  • within Insurance, Wealth Management and Tax topic(s)

Malware Activity

Targeting macOS Users and Cryptocurrency Ecosystems

Recent cyber threats have evolved to target different digital environments with sophisticated methods. For instance, on macOS, hackers are deploying fake websites mimicking popular platforms like Homebrew, LogMeIn, and TradingView. The websites trick users into executing malicious commands in Terminal which leads to malware infections such as AMOS and Odyssey. These malicious programs are designed to steal sensitive information, including passwords, cryptocurrency data, and personal files. They are secretly collecting and sending data to remote attackers. Malware gains root access, manipulates system processes, and remains hidden to avoid detection. Meanwhile, a North Korean threat group has adopted a novel tactic called EtherHiding. EtherHiding involves embedding malware within blockchain-based smart contracts. This approach leverages the decentralized and pseudonymous nature of blockchain to evade detection and make takedown efforts difficult. The campaign targets crypto developers through social engineering. The campaigns include fake job offers and malware disguised as legitimate software resulting in multiple cryptocurrency thefts. These developments highlight the increasing sophistication of cybercriminals in exploiting both traditional and emerging technologies to carry out data theft and financial crimes. CTIX analysts will continue to report on the latest malware strains and attack methodologies.

Threat Actor Activity

Europol Disrupts Massive Criminal SIM Farm Network in Operation SIMCARTEL

Europol's coordinated law enforcement operation, dubbed Operation SIMCARTEL, has successfully disrupted a sophisticated cybercrime-as-a-service (CaaS) platform operating a SIM farm. This platform allowed criminals worldwide to use phone numbers registered to others for various cybercrimes, including phishing, smishing, extortion, investment fraud, and fraudulent schemes. The operation resulted in the arrest of seven (7) individuals, including five (5) Latvian nationals, and the seizure of 1,200 SIM box devices containing 40,000 active SIM cards. Authorities from Austria, Estonia, Finland, and Latvia participated in the operation, dismantling five (5) servers and seizing two (2) websites promoting illegal services. The platform enabled the creation of more than 49 million online accounts, facilitating cyber fraud cases causing financial losses of approximately €5 million ($5.8 million) in Austria and Latvia. The SIM cards, bought from nearly eighty (80) countries, were used to create fake social media accounts, obscuring identities for criminal activities. Europol highlighted the network's technical sophistication and its global impact, emphasizing the ongoing investigation to uncover the full extent of the network.

Vulnerabilities

Microsoft Patches Highest-Ever Rated ASP.NET Core Vulnerability

Microsoft has released patches for a critical HTTP request smuggling vulnerability affecting the Kestrel web server in ASP.NET Core, marking the framework's highest-ever CVSS score at 9.9/10. The flaw tracked as CVE-2025-55315, allows attackers to embed a hidden HTTP request within another, potentially bypassing authentication, hijacking user credentials, leaking sensitive data, tampering with files, or triggering denial-of-service (DoS) conditions. The vulnerability's real-world impact depends heavily on how each application is developed and deployed, particularly whether reverse proxies strip smuggled requests and whether proper validation checks exist. Microsoft's security program manager Barry Dorrans emphasized that, while the worst-case scenario involves a full security feature bypass enabling privilege escalation or injection attacks, exploitation is unlikely unless applications contain flawed request-handling logic. The vulnerability affects all supported ASP.NET Core versions, including 2.3, 8.0, 9.0, and the 10.0 pre-release, as well as Visual Studio 2022 (versions 17.10–17.14). CTIX analysts urge immediate patching via .NET updates or by upgrading to Kestrel.Core version 2.3.6, understanding that the vulnerability is not yet known to have been exploited but poses serious risk if left unmitigated.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More