Operate more efficiently, reduce complexity, improve EBITDA, and much more with the purpose-built platform for MSPs.
Protect and defend what matters most to your clients and stakeholders with ConnectWise's best-in-class cybersecurity and BCDR solutions.
Leverage generative AI and RPA workflows to simplify and streamline the most time-consuming parts of IT.
Join fellow IT pros at ConnectWise industry & customer events!
Check out our online learning platform, designed to help IT service providers get the most out of ConnectWise products and services.
Search our resource center for the latest MSP ebooks, white papers, infographics, webinars and more!
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
Welcome to the July 2025 edition of the ConnectWise Cyber Research Unit™ (CRU) Monthly Threat Brief. This report provides a comprehensive look at the most significant cybersecurity developments impacting the MSP and SMB landscape. We break down the month’s top stories, critical vulnerabilities, and prevalent malware families to help you stay informed and prepared in an evolving threat environment. Starting this month, we have also begun adding descriptions of all the new detection signatures added to the ConnectWise SIEM™.
Security researcher Oren Yomtov discovered VSXPloit, a critical vulnerability in OpenVSX, which is the open-source extension marketplace for AI development tools such as Cursor, Windsurf, and VSCodium. The flaw exploited automated nightly builds to capture the @open-vsx account’s secret token, enabling attackers to publish malicious updates, overwrite existing extensions, and hijack the entire marketplace with super-admin privileges. Malicious code could be hidden in dependencies and executed during builds, with updates delivered silently through automatic extension updates without user alerts.
This vulnerability represents part of a broader threat landscape targeting AI-powered development environments, particularly through Model Context Protocol (MCP) attacks. Key risks include tool poisoning (malicious instructions embedded in trusted tool descriptions), prompt injection bypassing filters, rogue server impersonation, and supply chain compromise where legitimate MCP servers are later modified maliciously. These attacks exploit the inherent trust AI models place in tool metadata and the rapid adoption of AI development tools that outpace security guardrails.
What this means for MSPs
For MSPs, this represents a significant expansion of supply chain risk requiring immediate attention to client development environments. The convergence of AI capabilities with development tools creates unprecedented attack vectors where every extension becomes a potential backdoor without proper vetting and monitoring.
MSPs must evolve their security practices to include AI development tool governance, implement zero trust approaches for extensions, establish approval processes for development tools, and develop incident response procedures specific to compromised development environments. The rapid adoption of these productivity-enhancing tools demands proactive management, continuous monitoring, and potentially additional network segmentation for development workstations to limit blast radius.
Mass exploitation of the SharePoint vulnerability CVE-2025-53770 has compromised over 75 organizations globally, including US federal agencies, state governments, energy companies, and universities. The “ToolShell” campaign delivers unauthenticated remote code execution against on-premise SharePoint servers. The attack originated from legitimate security research presented at Pwn2Own Berlin in May 2025, which was quickly weaponized after researchers posted proof-of-concept details on social media in mid-July.
The technical attack exploits SharePoint’s deserialization processes by manipulating HTTP headers to bypass authentication at the ToolPane endpoint, then extracting the server’s ValidationKey and DecryptionKey. With these cryptographic keys, attackers forge valid authentication tokens for persistent access. The vulnerability affects 8,000+ SharePoint servers worldwide, with coordinated attack waves hitting specific geographic regions. Even after patching, compromised servers remain vulnerable until machine keys are manually rotated, creating dangerous persistence windows.
What this means for MSPs
This represents the largest SharePoint compromise in recent memory, with critical infrastructure and government victims highlighting the severity. For MSPs, the challenge extends beyond typical patching. Many clients have forgotten on-premise SharePoint deployments that remain internet-accessible and unpatched. The unauthenticated nature bypasses all traditional security controls, such as MFA and network segmentation, while stolen machine keys enable legitimate-looking authentication for months or years post-compromise.
This creates significant liability exposure and requires coordinated emergency response, including both patching and service-impacting key rotation procedures.
Chinese state-sponsored groups, such as Linen Typhoon, Violet Typhoon, and Storm-2603, have been confirmed as the primary actors behind the widespread SharePoint exploitation campaign targeting CVE-2025-53770, with attacks beginning July 7, eleven days before public disclosure. These APT groups focus on long-term intelligence collection rather than immediate monetization, with Linen Typhoon specializing in IP theft from government/defense sectors, Violet Typhoon targeting former government personnel and think tanks, and Storm-2603 conducting machine key theft operations.
CISA expanded its Known Exploited Vulnerabilities catalog to include the original ToolShell vulnerabilities (CVE-2025-49706 and CVE-2025-49704) alongside the bypass variants, mandating federal agency remediation by an emergency deadline.
Public proof-of-concept exploits are now available on GitHub, dramatically lowering the technical barrier for exploitation and enabling less sophisticated actors to leverage advanced techniques developed by APT groups. Cloudflare recorded approximately 300,000 exploitation attempts during a single peak period on July 22, indicating widespread automated scanning despite patch availability. Enhanced detection capabilities have been deployed by the ConnectWise CRU for SIEM and SentinelOne customers, targeting specific indicators including spinstall0.aspx file creation, suspicious w3wp.exe processes, and correlated IIS log patterns showing successful exploitation followed by web shell access.
What this means for MSPs
The state-sponsored attribution fundamentally changes risk calculations for MSPs managing client SharePoint environments, as these actors establish persistent access for months or years before activation rather than seeking immediate monetization. MSPs must assume any internet-accessible SharePoint server was targeted and implement comprehensive remediation, including machine key rotation before and after patching, complete IIS service restarts, and treating automated detections as high-priority incidents. Client communication should emphasize the strategic nature of these attacks, as federal agencies and critical infrastructure are confirmed victims, providing crucial context for security investment decisions and incident response prioritization rather than framing this as routine cybercriminal activity.
CVE-2025-53770 is a critical zero-day vulnerability (CVSS 9.8) affecting on-premises Microsoft SharePoint servers through the deserialization of untrusted data, enabling unauthenticated remote code execution. First exploited in the wild around July 7-18, 2025, this vulnerability is part of the “ToolShell” exploit chain that bypasses authentication via the /layouts/15/ToolPane.aspx endpoint and allows attackers to extract cryptographic machine keys (ValidationKey/DecryptionKey) for persistent access even after patching.
Microsoft confirmed the zero-day on July 19, 2025, and CISA added it to the KEV catalog on July 20. CVE-2025-53770 is a patch bypass for the previously patched CVE-2025-49704 from Pwn2Own Berlin 2025, indicating the original July patches were incomplete. Active exploitation has targeted government, telecommunications, finance, healthcare, education, and energy sectors with over 4,600 compromise attempts observed across 300+ organizations worldwide. Emergency patches are available for SharePoint 2016, 2019, and Subscription Edition, with organizations urged to immediately apply updates and rotate machine keys. Additional details are covered in the articles summarized earlier in this report.
This section leverages the Diamond Model of Intrusion Analysis to structure the examination of recent malware activity, providing a clear analytical framework that links adversary, capabilities, infrastructure, and victimology. By applying the Diamond Model, we can better contextualize malicious behavior, identify patterns across campaigns, and highlight the relationships between threat actors, tools, and targeted entities.
NetSupport RAT is a weaponized version of the legitimate NetSupport Manager remote administration tool (RAT) that has been commercially available since 1989. Originally developed as a genuine application for remote technical support and computer assistance, cybercriminals have hijacked this useful application and misappropriated it to use in their harmful campaigns. The tool provides comprehensive remote access capabilities, including real-time screen monitoring, keyboard and mouse control, file transfers, chat functionality, and desktop management, making it attractive to threat actors who can leverage its legitimate appearance and robust functionality without developing custom malware.
The CRU has been continuously observing NetSupport RAT deployment by SmartApeSG, a threat group that employs drive-by compromise attacks through injected scripts on compromised websites. SmartApeSG has evolved their delivery methods from initial fake browser update lures similar to SocGholish to more recent ClickFix social engineering techniques. The RAT is typically distributed through deceptive websites, fake browser updates, and various phishing campaigns, with SmartApeSG using a combination of compromised domains and .top TLD domains for payload delivery. Their attack progression shows increasing sophistication, transitioning from batch file downloads with curl to more fileless techniques using PowerShell’s Expand-Archive cmdlet, ultimately leading to Stealc malware infections while maintaining persistence through registry Run keys.
Infrastructure
Recent IOCs
| Related File(s) | |
| SHA256 | Filename(s) |
|
2c1946d794fb7a3ef08df70eedf65f2024c0c6d95ddea924bf057ba038254006 |
client32.ini |
|
9921d6fd90d80611ea7c451ef61fc91790dc51d11cb2da37c76ceb604b6de179 |
client32.ini |
|
24a9eab861109280e0fcd5e6bddf4ef69e8de19aa95c2e89d9de9d83aca2d4d5 |
client32.ini |
|
54cd55bccc73929c60ae30374d085143b5700783da8e6c83bcf0e2a17e14a7f4 |
client32.ini |
| Domain Name(s) | |
| videoproduction.demostagingserver[.]com | |
| ifaengineers[.]com | |
| sizzlingcareer[.]com | |
Victimology
Capabilities
MITRE ATT&CK Techniques
| Tactic | Technique ID | Technique Name |
| Execution | T1204.002 | User Execution: Malicious File |
| Execution | T1059.001 | Command and Scripting Interpreter: PowerShell |
| Privilege Escalation | T1055 | Process Injection |
| Defense Evasion | T1027 | Obfuscated File or Information |
| Exfiltration | T1041 | Exfiltration Over C2 Channel |
| Collection | T1074.001 | Data Staged: Local Data Staging |
| Persistence | T1547.001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
| Discovery | T1057 | Process Discovery |
| Command and Control | T1219 | Remote Access Software |
| Execution | T1053.005 | Scheduled Task/Job: Scheduled Task |
Akira ransomware is a sophisticated double-extortion ransomware-as-a-service (RaaS) operation that emerged in March 2023, operated by experienced threat actors with ties to the dissolved Conti group. The ransomware targets both Windows and Linux systems, including VMware ESXi virtual machines, and employs two main variants: the original C++ implementation that appends .akira extensions to encrypted files, and the Rust-based “Megazord” variant introduced in August 2023 that uses .powerranges extensions.
Akira gains initial access primarily through exploiting VPN vulnerabilities (particularly unpatched Cisco devices via CVE-2023-20269 and CVE-2020-3259), credential abuse, and spear phishing, then uses legitimate tools such as FileZilla, WinSCP, and RClone for data exfiltration before deploying encryption payloads.
Akira has demonstrated explosive growth with a 348% increase in activity in Q2 2025 compared to the same period in 2024, maintaining consistent operations by listing approximately 130 organizations on its data-leak site each quarter. Since its inception, the group has impacted over 250 organizations across North America, Europe, and Australia, claiming approximately $42 million in ransomware proceeds through January 2024. The group now ranks as the second most prominent ransomware threat globally after Qilin, with intelligence indicating sustained high-volume operations continuing into Q3 2025.
While researchers released a decryptor in May 2025 for certain variants used between September 2023 and May 2025, updated variants remain uncrackable, and the group’s consistent quarterly targeting of critical infrastructure and healthcare sectors demonstrates no signs of operational decline.
Aliases
Infrastructure
Recent IOCs
| Related File(s) | |
| SHA256 | Filename(s) |
|
dcfa2800754e5722acf94987bb03e814edcb9acebda37df6da1987bf48e5b05e |
Win.exe |
|
d2fd0654710c27dcf37b6c1437880020824e161dd0bf28e3a133ed777242a0ca |
w.exe |
|
0ee1d284ed663073872012c7bde7fac5ca1121403f1a5d2d5411317df282796c |
akira_v2 |
Victimology
Capabilities
MITRE ATT&CK Techniques
| Tactic | Technique ID | Technique Name |
| Initial Access | T1078 | Valid Accounts |
| Initial Access | T1190 | Exploit Public-Facing Application |
| Initial Access | T1133 | External Remote Services |
| Initial Access | T1566.001 | Phishing: Spearphishing Attachment |
| Initial Access | T1566.002 | Phishing: Spearphishing Link |
| Credential Access | T1003 | OS Credential Dumping |
| Credential Access | T1003.001 | OS Credential Dumping: LSASS Memory |
| Discovery | T1016 | System Network Configuration Discovery |
| Discovery | T1082 | System Information Discovery |
| Discovery | T1482 | Domain Trust Discovery |
| Discovery | T1057 | Process Discovery |
| Discovery | T1069.001 | Permission Groups Discovery: Local Groups |
| Discovery | T1069.002 | Permission Groups Discovery: Domain Groups |
| Discovery | T1018 | Remote System Discovery |
| Persistence | T1136.002 | Create Account: Domain Account |
| Defense Evasion | T1562.001 | Impair Defenses: Disable or Modify Tools |
| Command and Control | T1219 | Remote Access Software |
| Command and Control | T1090 | Proxy |
| Collection | T1560.001 | Archive Collected Data: Archive via Utility |
| Exfiltration | T1048 | Exfiltration Over Alternative Protocol |
| Exfiltration | T1537 | Transfer Data to Cloud Account |
| Exfiltration | T1567.002 | Exfiltration Over Web Service: Exfiltration to Cloud Storage |
| Impact | T1486 | Data Encrypted for Impact |
| Impact | T1490 | Inhibit System Recovery |
| Impact | T1657 | Financial Theft |
Lumma Stealer is a highly sophisticated information-stealing malware-as-a-service (MaaS) platform developed in C that emerged in 2022. It targets comprehensive user data, including browser credentials, cookies, cryptocurrency wallets (MetaMask, Electrum, Exodus), 2FA extensions, and can install additional malware through its loader module. The malware operates under a subscription model with multiple tiers, allowing cybercriminals to access a control panel for building binaries and managing stolen data. Microsoft tracks the primary developer and infrastructure operator as Storm-2477, with notable ransomware groups such as Octo Tempest, Storm-1607, Storm-1113, and Storm-1674 using Lumma in their campaigns.
The most significant recent development occurred in May 2025 when Microsoft’s Digital Crimes Unit and international law enforcement executed a major takedown operation, seizing over 2,300 malicious domains and disrupting core infrastructure. However, July 2025 intelligence reveals a concerning resurgence. From June through July, targeted accounts steadily returned to pre-takedown levels, indicating operators quickly reestablished operations. The threat actors have adapted with enhanced evasion tactics, including shifting away from Cloudflare to alternative providers, such as Russian-based Selectel, leveraging more covert distribution channels, and avoiding public underground forums. Current distribution methods include fake software cracks via malvertising, ClickFix techniques on compromised websites, AI-generated GitHub repositories advertising game cheats, and social media campaigns on YouTube and Facebook promoting cracked software.
Infrastructure
Recent IOCs
Recent IOCs
| Related File(s) | |
| SHA256 | Filename(s) |
|
6020ef15813a6eccb99e34ccf53823b9dc04ff6fb8f8206d2e3762c4ca7d9e42 |
core.exe |
|
fe69e8db634319815270aa0e55fe4b9c62ce8e62484609c3a42904fbe5bb2ab3 |
WindowsSecurity.exe |
| Related Domain Name(s) | |
| itumshop[.]com | |
| haciver[.]com | |
| Related IP Address(es) | |
| 208.95.112[.]1 | |
| 178.236.252[.]252 | |
| Tactic | Technique ID | Technique Name |
| Defense Evasion | T1218.005 | System Binary Proxy Execution: Mshta |
| Persistence | T1574 | Hijack Execution Flow |
| Execution | T1059.001 | Command and Scripting Interpreter: PowerShell |
| Defense Evasion | T1027 | Obfuscated Files or Information |
| Defense Evasion | T1202 | Indirect Command Execution |
| Initial Access | T1189 | Drive-by Compromise |
| Defense Evasion | T1140 | Deobfuscate/Decode Files or Information |
| Command and Control | T1573.002 | Encrypted Channel: Asymmetric Cryptography |
| Execution | T1059.010 | Command and Scripting Interpreter: AutoHotKey & AutoIT |
| Credential Access | T1555 | Credentials from Password Stores |
| Credential Access | T1555.003 | Credentials from Password Stores: Credentials from Web Browsers |
| Collection | T1119 | Automated Collection |
| Defense Evasion, Persistence | T1574.001 | Hijack Execution Flow: DLL Search Order Hijacking |
| Defense Evasion | T1218.015 | System Binary Proxy Execution: Electron Applications |
| Defense Evasion | T1027.010 | Obfuscated Files or Information: Command Obfuscation |
| Defense Evasion | T1027.013 | Obfuscated Files or Information: Encrypted/Encoded File |
| Defense Evasion | T1553.002 | Subvert Trust Controls: Code Signing |
| Defense Evasion | T1562.001 | Impair Defenses: Disable or Modify Tools |
| Persistence | T1176.001 | Software Extensions: Browser Extensions |
| Discovery | T1217 | Browser Information Discovery |
Latrodectus is a sophisticated malware loader that has emerged as the successor to IcedID. Believed to be developed by the Lunar Spider threat group, the same actors behind IcedID, Latrodectus operates as a downloader/loader designed to gain initial access to systems and deploy additional malicious payloads. It employs sophisticated techniques such as obfuscation, encryption, and anti-debugging mechanisms to evade detection, with the malware masquerading as legitimate AV components in some DLL files. The malware has evolved rapidly since its November 2023 emergence, with version 1.4 (July 2024) introducing AES256 encryption, new backdoor commands, and improved obfuscation techniques.
Recent intelligence from mid-2025 shows Latrodectus made its debut in the top 10 threat list during April 2025, coinciding with the US tax season, with activity increasing until the end of April. Current campaigns target financial, automotive, and healthcare sectors through phishing emails containing PDF or HTML attachments that impersonate DocuSign documents or display fake error messages. The malware has been distributed via fake CAPTCHA lures and continues to be delivered by initial access brokers TA577 and TA578, with recent samples reportedly delivering LummaC2 infostealer. Despite being targeted in Operation Endgame in May 2024, Latrodectus operators quickly rebuilt their infrastructure and resumed operations by late June 2024, often using Brute Ratel C4 as a delivery mechanism.
Aliases
Infrastructure
Recent IOCs
| Related File(s) | |
| SHA256 | Filename(s) |
|
c5357886504980d768f4a5b04e0c2c97b3df77087ae3be6bae82d75381331013 |
open.msi |
|
3e48db8ec93ac99c36d6d618df69863fdb8eb751d40b7266b0d38b87896f5472 |
wtsapi32.dll |
| Related Domain Name(s) | |
| wlisd[.]com | |
| Related IP Address(es) | |
| 50.10.11[.]52 | |
| Tactic | Technique ID | Technique Name |
| Defense Evasion | T1027.001 | Obfuscated Files or Information: Binary Padding |
| Resource Development | T1588.003 | Obtain Capabilities: Code Signing Certificates |
| Defense Evasion | T1027.010 | Obfuscated Files or Information: Command Obfuscation |
| Execution | T1559.001 | Inter-Process Communication: Component Object Model |
| Collection | T1005 | Data from Local System |
| Defense Evasion | T1622 | Debugger Evasion |
| Defense Evasion | T1140 | Deobfuscate/Decode Files or Information |
| Defense Evasion | T1562.002 | Impair Defenses: Disable Windows Event Logging |
| Discovery | T1087.002 | Account Discovery: Domain Account |
| Discovery | T1069.002 | Permission Groups Discovery: Domain Groups |
| Discovery | T1482 | Domain Trust Discovery |
| Initial Access | T1189 | Drive-by Compromise |
| Defense Evasion | T1027.007 | Obfuscated Files or Information: Dynamic API Resolution |
| Defense Evasion | T1055.001 | Process Injection: Dynamic-link Library Injection |
| Defense Evasion | T1027.009 | Obfuscated Files or Information: Embedded Payloads |
The following is a list of new detection signatures added to the ConnectWise SIEM in July 2025.
[CRU][Windows] PowerShell basic parsing URL obfuscation
Detects the use of BasicParsing in a PowerShell web request to obfuscate the URL by splitting it into smaller pieces and relying on the parser to piece that request back together at request time. This kind of behavior is unusual and is never seen in legitimate usage, as it serves no practical purpose other than to obfuscate the URL being requested.
[EA][CRU][Windows] Suspicious PuTTY activity
This alert aims to detect re-named PuTTY executables and any network connections to suspicious ports from any PuTTY executable. Any network connections for this process or any surrounding activity for the user should be investigated for signs of data exfiltration or malicious file downloads.
[EA][Windows] USB mass storage device connected and data transfer detected
To detect potential data exfiltration via USB mass storage devices on Windows systems, ensure that auditing is enabled for Event ID 6416 (Plug and Play activity) and that Audit Removable Storage is configured under Object Access to capture Event ID 4663 (file access events). This detection monitors USB device connections initiated by the Windows Driver Foundation Host process (WUDFHost.exe), the registration of USB storage devices within the system, and any subsequent file write operations to those devices, which may indicate unauthorized data transfers.
[O365] Possible vishing attack via Teams chat from foreign tenant user
Detects possible Teams vishing attempts. This rule triggers on the possible first stage of a social engineering attack on a victim, where the attacker prompts the user to install a remote access tool subsequent to creating a “OneOnOne” Teams chat. The attacker account will show as the “UserId,” and typically with a display name indicating a help desk or Admin role. This account is seen along with the victim account in the “Members.DisplayName” field. False positives may occur for legitimate help desk or admin assistance Teams chats.
[Windows] Recursive execution chain
This detection identifies a suspicious recursive execution pattern where cmd.exe spawns another cmd.exe multiple times using the /c flag. This behavior is often associated with obfuscation techniques used by adversaries to evade detection, delay execution, or complicate process trees during forensic analysis. While legitimate use is rare, this pattern is commonly seen in malware or script-based attacks.
[pfSense] Multiple failed authentication attempts via web or SSH
This detection identifies multiple failed authentication attempts on pfSense devices via the web interface or SSH. Repeated login failures may indicate a brute-force attack or unauthorized access attempts.
[pfSense] Configuration change
This detection identifies configuration changes made to a pfSense firewall device. Such changes may indicate administrative activity, but they can also be a sign of unauthorized or suspicious modifications to firewall rules or system settings.
[pfSense] New user account created
This detection identifies the creation of a new user account on a pfSense firewall device. Unauthorized user creation on network infrastructure devices such as firewalls can indicate malicious activity, such as an attacker establishing persistence or a misconfigured automation process.
[pfSense] New user account deleted
This detection highlights the deletion of a user account on a pfSense firewall device. Unauthorized removal of user accounts can indicate malicious activity, such as an attacker attempting to cover their tracks or disrupt administrative access.
[Windows] PowerShell execution via IIS worker process: Potential ToolShell exploit
This detection identifies instances where the IIS worker process (w3wp.exe) spawns cmd.exe, which in turn executes PowerShell. This behavior is highly suspicious. False positives may include legitimate administrative scripts triggered via IIS (e.g., scheduled tasks or maintenance scripts).
[IIS] Possible SharePoint ToolShell attempt - CVE-2025-53770 and CVE-2025-53771
Detects potential exploitation of SharePoint via ToolPane.aspx tied to CVE-2025-53770/53771. These flaws may let attackers run commands or load tools through crafted HTTP requests. Confirm if the endpoint is on-prem SharePoint. If so, ensure it’s fully patched, up to date, and machine keys are rotated. See the official CISA advisory for more details.
[EA][O365] Suspicious HTTP client user agent followed by security alert (possible AiTM)
Detects a possible account take over (ATO) via credential theft, subsequently followed by a Microsoft security alert from a Microsoft 365 tenant. Observed user agents are weaponized HTTP client tools used to bypass Microsoft 365 MFA controls. This alert is a frequent true positive; we recommend investigating this activity. The “UserId” account should match the “userStates. userPrincipalName” account. Due to Microsoft licensing limits, the “userStates.userPrincipalName” may not populate, but both rules are correlated by the user key, an alternative ID for the user.
[EA][O365] Suspicious HTTP client user agent followed by risk detection (possible AiTM)
Detects a possible account take over (ATO) via credential theft, subsequently followed by a Microsoft risk detection. Observed user agents are weaponized HTTP client tools used to bypass Microsoft 365 MFA controls. This alert is a frequent true positive; we recommend investigating this activity. The “UserId” account should match the “userPrincipalName” account.
[Azure] Possible credential leak: Successful sign-in blocked by conditional access
Detects a user sign-in using a valid password which is subsequently blocked by a conditional access policy. This can indicate possible usage of valid credentials by an attacker. If the sign-in is blocked by a GeoBlocks policy, an attacker may be able to use a VPN or otherwise spoof locations or other parameters of the policy to bypass the CAP block. We recommend investigating this activity.