PSA and RMM

Solve any challenge with one platform

Operate more efficiently, reduce complexity, improve EBITDA, and much more with the purpose-built platform for MSPs.

Cybersecurity and Data Protection

Ensure security and business continuity, 24/7

Protect and defend what matters most to your clients and stakeholders with ConnectWise's best-in-class cybersecurity and BCDR solutions.

Automation and Integrations

Integrate and automate to unlock cost savings

Leverage generative AI and RPA workflows to simplify and streamline the most time-consuming parts of IT.

University

University Log-In

Check out our online learning platform, designed to help IT service providers get the most out of ConnectWise products and services.

About Us

Experience the ConnectWise Way

Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.

News and Press

Experience the ConnectWise Way

Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.

ConnectWise

10/20/2025 | 15 Minute Read

Monthly Threat Brief: September 2025

Topics:

Contents

    Ready to dive even deeper?

    Check out the 2025 MSP Threat Report for an in-depth analysis of overall trends.

    Welcome to the September 2025 edition of the ConnectWise Cyber Research Unit™ (CRU) Monthly Threat Brief. This report provides a comprehensive look at the most significant cybersecurity developments impacting the IT services and SMB landscape. We break down the month’s top stories, critical vulnerabilities, and prevalent malware families to help you stay informed and prepared in an evolving threat environment. We have also begun adding descriptions of all the new detection signatures added to the ConnectWise SIEM™.

    Top stories for September 2025

    Trojan Horse Software Returns: PDF Editors and AI Apps Steal Credentials

    A new wave of Trojan horse malware is disguising itself as legitimate, fully functional applications, ranging from PDF editors to AI-powered assistants. Unlike crude fake installers, these apps work as promised, making users less likely to suspect anything malicious. Recent examples include AppSuite PDF Editor, which delivered the TamperedChef credential stealer via a hidden updater; ManualFinder, which leveraged Windows scheduled tasks and common binaries such as node.exe to blend in with normal system activity; and JustAskJacky, an AI assistant that quietly maintained persistence through command-and-control communications. These campaigns were backed by heavy investment in Google Ads, signed installers, and realistic branding, indicating a sophisticated and well-funded operation.

    For managed service providers (MSPs), this trend underscores the limitations of traditional defenses, such as signature-based antivirus and basic user training. Because these apps appear professional and even helpful, detection must rely on behavioral analysis, such as monitoring for unexpected Run keys, abnormal access to DPAPI-protected data, or browsers being forcibly closed. Credential theft and cookie hijacking remain the attackers’ primary goals, enabling them to bypass MFA and access sensitive accounts. As adversaries continue to professionalize their malware distribution tactics, proactive threat hunting, advanced monitoring, and up-to-date intelligence will be critical to staying ahead.  

    New Attack Vector FileFix Attacks Abuse Windows File Explorer

    FileFix attacks are an evolution of ClickFix techniques, tricking users into pasting malicious PowerShell commands into Windows File Explorer’s address bar instead of the Run dialog. Recent campaigns have moved far beyond proof-of-concept demos, using fake Facebook security alerts to lure victims into pasting “file paths” that actually execute hidden commands. To disguise the activity, attackers concatenate fake paths inside PowerShell comments, showing only benign-looking text in File Explorer while the malicious code runs in the background. The latest campaign, observed in August 2025, has a global footprint and uses phishing pages translated into multiple languages.

    The operation further increases stealth through steganography, embedding second-stage PowerShell scripts and encrypted executables inside seemingly harmless JPG images hosted on legitimate platforms, such as BitBucket. Once executed, a go-based loader avoids sandbox detection and ultimately deploys StealC v2, an advanced info-stealer that targets cryptocurrency wallets, browsers, messaging apps, and cloud credentials.

    For MSPs, these attacks demonstrate how social engineering is expanding beyond suspicious downloads and email attachments. Security awareness training must now cover unexpected use of trusted system utilities, such as File Explorer, while technical defenses should include monitoring for unusual PowerShell execution paths and image-based payload delivery.

    SonicWall Cloud Breach Exposes Customer Firewall Configurations

    SonicWall disclosed that attackers brute-forced access to its MySonicWall cloud-backup service, retrieving firewall configuration files for fewer than 5% of devices. While credentials inside the backups were encrypted, the files contained valuable metadata such as VPN endpoints, host mappings, admin usernames, enabled services, and firewall rules—information that can materially shorten an attacker’s path to follow-on compromise. SonicWall emphasized that this was not a ransomware incident or mass leak, but a targeted campaign that could enable phishing, VPN abuse, or exploitation of exposed services. Both SonicWall and national CERTs are urging impacted organizations to assume compromise and immediately rotate all referenced credentials, review configurations, and apply hardening steps.

    For MSPs, this incident highlights how appliance configuration leaks can amplify risk, especially when combined with unpatched vulnerabilities. Even organizations not directly flagged as impacted should confirm whether backups exist, audit their enabled services, and consider staggering credential rotation. Affected clients should be prioritized based on backup flags, exposed services, such as SSL VPN, open management ports, and firmware patch status. SonicWall has provided a remediation playbook and online tool to guide rotation and service reviews. Since attackers may chain this metadata with other exploits, MSPs should treat flagged backups as compromised, accelerate patching, and document all remediation steps while maintaining clear communication with clients.

    Self-Replicating Worm Infiltrates npm Supply Chain, Compromises 187 Package

    A new self-propagating worm, dubbed Shai-Hulud, has infected the npm ecosystem by compromising popular packages, including @ctrl/tinycolor (over 2M weekly downloads). The malware leverages npm’s post-install scripts to execute automatically during package installation, scanning local and CI/CD environments for secrets such as npm tokens, GitHub keys, AWS/GCP metadata credentials, and other service tokens. Harvested credentials are exfiltrated to attacker-controlled GitHub repositories, and when new npm tokens are discovered, the worm autonomously publishes malicious versions of any packages accessible to the compromised account. This creates an exponential spread mechanism rarely seen in supply chain attacks, allowing a single compromised maintainer to cascade the infection across the ecosystem.

    For MSPs and small and midsized business (SMB) clients, the threat goes beyond poisoned dependencies; it represents a direct risk to development and production infrastructure. Compromised build systems can leak cloud credentials, enabling lateral access into customer environments. Mitigation requires both hygiene and visibility: enforce MFA on npm and GitHub accounts, rotate tokens and scope them narrowly, audit developer/CI systems for rogue publishes or workflows, and pin dependencies with lockfiles and integrity checks to prevent silent updates. Since the worm abuses trusted developer workflows, monitoring for anomalous publish activity and unexpected PowerShell or workflow executions is critical. This incident underscores how deeply intertwined supply chain security, credential hygiene, and CI/CD hardening have become.

    Top vulnerabilities in September 2025

    CVE-2023-52271

    CVE-2023-52271 is a flaw in the Topaz Antifraud driver (specifically `wsftprm.sys` version 2.0.0.0) that allows a low-privileged user to invoke a vulnerable IOCTL to kill any process, including Protected Process Light (PPL) processes such as Microsoft Defender. Because this capability bypasses standard process protections, it enables attackers to disable or meddle with security agents at the kernel level.

    In August 2025, the CRU observed threat actors using this vulnerability to deploy the crypto-miner XMRig, notably by deploying the vulnerable driver themselves using a technique known as bring‑your‑own‑vulnerable‑driver (BYOVD) to environments that did not already have it. In that attack, the adversary loaded the driver to gain kernel privileges and then invoked the IOCTL to disrupt security agents, easing ransomware deployment. Organizations should treat any unexpected or user‑mode termination of security services as a high‑fidelity alert, validate that systems do not have wsftprm.sys (or other unknown drivers) loaded, monitor for attempts to invoke IOCTL 0x22201C (and similar suspicious kernel calls), and apply vendor mitigations or blockloading policies to prevent BYOVD abuse.

    CVE-2025-4632

    CVE-2025-4632 is a critical path traversal vulnerability in Samsung MagicINFO 9 Server versions prior to 21.1052. This flaw allows unauthenticated attackers to write arbitrary files to system directories, potentially leading to remote code execution. The vulnerability was actively exploited in the wild following the release of a proof-of-concept exploit in April 2025. Attackers leveraged this flaw to deploy the Mirai botnet, among other malicious activities.

    In September 2025, the CRU observed this vulnerability being exploited to deploy XMRig. Threat actors targeted Samsung MagicINFO 9 Server instances to gain unauthorized access and deploy malicious payloads. Organizations using affected versions are strongly advised to upgrade to version 21.1052 or later to mitigate this risk.

    Top malware in September 2025

    The Diamond Model

    This section leverages the Diamond Model of Intrusion Analysis to structure the examination of recent malware activity, providing a clear analytical framework that links adversary, capabilities, infrastructure, and victimology. By applying the Diamond Model, we can better contextualize malicious behavior, identify patterns across campaigns, and highlight the relationships between threat actors, tools, and targeted entities.

    KongTuke

    KongTuke is a traffic distribution system (TDS) that adversaries abuse to funnel users through a chain of redirects and social engineering lures, ultimately delivering malware. Originally surfacing around 2024, KongTuke campaigns use compromised WordPress sites injected with JavaScript to present deceptive pages, such as fake CAPTCHA checks or browser updates, that entice visitors to run payloads. Over time, the lures have matured, adopting “paste-and-run” tactics, such as ClickFix and FileFix, which instruct users to copy malicious PowerShell commands into Windows utilities (Run dialog or File Explorer) to bypass conventional download protections.

    Recent intelligence shows KongTuke playing a key role in distributing new variants of the Interlock RAT. In mid-2025, campaigns associated with the LandUpdate808 cluster (another alias linked to KongTuke) shifted from ClickFix to FileFix lures and began deploying a PHP-based RAT variant, sometimes followed by a Node.js version. The RAT conducts system reconnaissance, privilege checking, persistence via registry run keys, and communication via obscured C2 channels such as Cloudflare Tunnels.

    Aliases

    • LandUpdate808, TAG-124

    Infrastructure

    Recent IOCs

    Related File(s)
    SHA256 Filename(s)
    44277db2d9fc6582e89424fc897c26c6b4ea1573da7abea9595136e77b5dabef scriptv2.ps1
    Related Domain Name(s)
    porsasystem.com
    joebesser.com
    math1st.com
    webcre8.com
    mtmra.com
    rfwklaw.com
    ffclive.com
    choutek.com
    saewh.com
    louglas.com
    vcsinfo.com
    tmello.com
    Related IP Address(es)
    144.31.221.37

    Victimology

    • Recently targeted business sectors: Manufacturing, construction, education, insurance, transportation

    Capabilities

    MITRE ATT&CK Techniques

    Tactic Technique ID Technique Name
    Initial Access   T1189   Drive-by Compromise
    Execution   T1059.007   Command and Scripting Interpreter: JavaScript
    Execution   T1203   Exploitation for Client Execution
    Execution   T1204.004   User Execution: Malicious Copy and Paste
    Execution   T1106   Native API
    Defense Evasion   T1564.003   Hide Artifacts: Hidden Window
    Defense Evasion   T1202   Indirect Command Execution
    Defense Evasion   T1112   Modify Registry
    Defense Evasion   T1027   Obfuscated Files or Information
    Discovery   T1082   System Information Discovery
    Discovery   T1018   Remote System Discovery
    Discovery   T1518   Software Discovery
    Akira

    Akira is a ransomware-as-a-service (RaaS) group first identified in early 2023 that has become increasingly active in 2025. They combine data extortion with rapid deployment tactics and evolving defense-evasion techniques. Its operations span a range of industries and geographies, often targeting edge infrastructure and using credential-based initial access to reach deeper into networks. Over time, Akira has refined its toolchain, leveraging affiliate networks to scale attacks while integrating tactics such as BYOVD assaults and abuse of legitimate system utilities to sabotage endpoint defenses.

    Recent intelligence highlights several notable trends in Akira’s 2025 campaigns. As of mid-2025, Akira has aggressively targeted SonicWall SSL VPN devices, exploiting a known vulnerability (CVE-2024-40766) in some cases to gain unauthorized access, even where multi-factor authentication was in use. The group has demonstrated extremely short dwell times, moving from access to ransomware deployment in under four hours, and in some cases as quickly as 55 minutes. Akira also employs driver-based evasion tactics, notably using the signed Intel CPU tuning driver `rwdrv.sys` to load a secondary driver `hlpdrv.sys` that disables Microsoft Defender—a BYOVD technique seen repeatedly since July 2025. This combination of rapid deployment, credential abuse, VPN targeting, and low-noise evasion underscores how Akira continues to refine its ransomware model in response to defensive measures.

    Aliases

    • Redbike

    Infrastructure

    Recent IOCs

    Related File(s)
    SHA256 Filename(s)
    d0db094355ac9727a280be3466e5fa113ac88fa9108c4c8ef541e405f6b3ec0a Win.exe
    Related IP Address(es)
    173.44.141.209
    23.82.11.141
    182.18.2.21

    Victimology

    • Recently targeted business sectors: Construction, attorneys, healthcare

    Capabilities

    MITRE ATT&CK Techniques

    Tactic Technique ID Technique Name
    Initial Access   T1078   Valid Accounts
    Initial Access   T1190   Exploit Public-Facing Application
    Initial Access   T1133   External Remote Services
    Initial Access   T1566.001   Phishing: Spearphishing Attachment
    Initial Access   T1566.002   Phishing: Spearphishing Link
    Credential Access   T1003   OS Credential Dumping
    Credential Access   T1003.001   OS Credential Dumping: LSASS Memory
    Discovery   T1016   System Network Configuration Discovery
    Discovery   T1082   System Information Discovery
    Discovery   T1482   Domain Trust Discovery
    Discovery   T1057   Process Discovery
    Discovery   T1069.001   Permission Groups Discovery: Local Groups
    Discovery   T1069.002   Permission Groups Discovery: Domain Groups
    Discovery   T1018   Remote System Discovery
    Persistence   T1136.002   Create Account: Domain Account
    Defense Evasion   T1562.001   Impair Defenses: Disable or Modify Tools
    Command and Control   T1219   Remote Access Software
    Command and Control   T1090   Proxy
    Collection   T1560.001   Archive Collected Data: Archive via Utility
    Exfiltration   T1048   Exfiltration Over Alternative Protocol
    Exfiltration   T1537   Transfer Data to Cloud Account
    Exfiltration   T1567.002   Exfiltration Over Web Service: Exfiltration to Cloud Storage
    Impact   T1486   Data Encrypted for Impact
    Impact   T1490   Inhibit System Recovery
    Impact   T1657   Financial Theft

    New detections

    The following is a list of new detection signatures added to the ConnectWise SIEM in September 2025.

    [CRU][Windows] PowerShell basic parsing URL obfuscation

    Detects the use of basic parsing in a PowerShell web request to obfuscate the URL by splitting it into smaller pieces and relying on the parser to piece that request back together at request time. This kind of behavior is unusual and is never seen in legitimate usage, as it serves no practical purpose other than to obfuscate the URL being requested.

    [EA][CRU][Windows] Suspicious PuTTY activity

    This alert aims to detect re-named PuTTY executables and any network connections to suspicious ports from any PuTTY executable. Any network connections for this process or any surrounding activity for the user should be investigated for signs of data exfiltration or malicious file downloads.

    [EA][Windows] USB mass storage device connected and data transfer detected

    To detect potential data exfiltration via USB mass storage devices on Windows systems, ensure that auditing is enabled for Event ID 6416 (Plug and Play activity) and that Audit Removable Storage is configured under Object Access to capture Event ID 4663 (file access events). This detection monitors USB device connections initiated by the Windows Driver Foundation Host process (WUDFHost.exe), the registration of USB storage devices within the system, and any subsequent file write operations to those devices, which may indicate unauthorized data transfers.

    [O365] Possible vishing attack via Teams chat from foreign tenant user

    Detects possible Microsoft Teams vishing attempts. This rule triggers on the possible first stage of a social engineering attack on a victim, where the attacker prompts the user to install a remote access tool subsequent to creating a “OneOnOne” Teams chat. The attacker account will show as the “UserId”, and typically with a display name indicating a help desk or admin role. This account is seen along with the victim account in the “Members.DisplayName” field. False positives may occur for legitimate help desk or admin assistance Teams chats.

    [Windows] Recursive execution chain

    This detection identifies a suspicious recursive execution pattern where cmd.exe spawns another cmd.exe multiple times using the /c flag. This behavior is often associated with obfuscation techniques used by adversaries to evade detection, delay execution, or complicate process trees during forensic analysis. While legitimate use is rare, this pattern is commonly seen in malware or script-based attacks.

    [pfSense] Multiple failed authentication attempts via web or SSH

    This detection identifies multiple failed authentication attempts on pfSense devices via either the web interface or SSH. Repeated login failures may indicate a brute-force attack or unauthorized access attempts.

    [pfSense] Configuration change

    This detection identifies configuration changes made to a pfSense firewall device. Such changes may indicate administrative activity, but they can also be a sign of unauthorized or suspicious modifications to firewall rules, or system settings.

    [pfSense] New user account created

    This detection identifies the creation of a new user account on a pfSense firewall device. Unauthorized user creation on network infrastructure devices such as firewalls can indicate malicious activity, including an attacker establishing persistence or a misconfigured automation process.

    [pfSense] New user account deleted

    This detection highlights the deletion of a user account on a pfSense firewall device. Unauthorized removal of user accounts can indicate malicious activity, such as an attacker attempting to cover their tracks or disrupt administrative access.

    [Windows] PowerShell execution via IIS worker process—potential ToolShell exploit

    This detection identifies instances where the IIS worker process(w3wp.exe) spawns cmd.exe, which in turn executes PowerShell. This behavior is highly suspicious. False positives may include legitimate administrative scripts triggered via IIS (e.g., scheduled tasks or maintenance scripts).

    [IIS] Possible SharePoint ToolShell attempt—CVE-2025-53770 and CVE-2025-53771

    Detects potential exploitation of SharePoint via ToolPane.aspx tied to CVE-2025-53770/53771. These flaws may let attackers run commands or load tools through crafted HTTP requests. Confirm if the endpoint is on-prem SharePoint. If so, ensure it’s fully patched, up to date, and machine keys are rotated. See the official CISA advisory for more details.

    [EA][O365] Suspicious HTTP client user agent followed by security alert (possible AiTM)

    Detects a possible account take over (ATO) via credential theft, subsequently followed by a Microsoft security alert from a Microsoft 365 tenant. Observed user agents are weaponized HTTP client tools used to bypass Microsoft 365 MFA controls. This alert is a frequent true positive, so we recommend investigating this activity. The “UserId” account should match the “userStates.userPrincipalName” account. Due to Microsoft licensing limits, the “userStates.userPrincipalName” may not populate, but both rules are correlated by the User Key, an alternative ID for the user.

    [EA][O365] Suspicious HTTP client user agent followed by risk detection (possible AiTM)

    Detects a possible ATO via credential theft, subsequently followed by a Microsoft risk detection. Observed user agents are weaponized HTTP client tools used to bypass Microsoft 365 MFA controls. This alert is a frequent true positive, so we recommend investigating this activity. The “UserId” account should match the “userPrincipalName” account.

    [Azure] Possible credential leak—successful sign-in blocked by conditional access

    Detects a user sign-in using a valid password which is subsequently blocked by a conditional access policy. This can indicate possible usage of valid credentials by an attacker. If the sign-in is blocked by a GeoBlocks policy, an attacker may be able to use a VPN or otherwise spoof locations or other parameters of the policy to bypass the CAP block. We recommend investigating this activity.  

    Related Articles