Svoboda Cybersecurity Brief October 19, 2025
Massachusetts Hospitals Hit by Cybersecurity Incident
Heywood Hospital and Athol Hospital in Massachusetts experienced a network outage caused by a cybersecurity incident. Systems were taken offline, and a third-party cybersecurity firm was engaged. Patient care continues, but communications remain disrupted.
Source: DataBreaches.net
Fake macOS Homebrew, LogMeIn, and TradingView Ads Deliver Infostealers
Attackers are using Google Ads to promote fake Homebrew, LogMeIn, and TradingView sites, tricking users into executing malicious Terminal commands. These deliver infostealers like AMOS and Odyssey, which harvest credentials, cryptocurrency wallets, and system data. Over 85 fraudulent domains were identified.
Impact: Data theft, including browser credentials and system information.
Mitigation: Avoid executing unfamiliar Terminal commands and verify download sources.
Source: BleepingComputer
New CAPI Backdoor Targets Russian Auto and E-Commerce Sectors
A phishing campaign distributes a .NET-based backdoor (CAPI Backdoor) via ZIP archives with decoy tax documents. The malware steals browser data, takes screenshots, and establishes persistence via scheduled tasks and Startup folder LNK files. Targets include impersonated domains like carprlce[.]ru.
Impact: Data exfiltration and remote system control.
Mitigation: Disable macros in documents and scrutinize unexpected email attachments.
Source: The Hacker News
Silver Fox Expands Malware Campaigns with Winos 4.0 and HoldingHands RAT
The Silver Fox group now targets Japan and Malaysia with HoldingHands RAT, delivered via phishing emails with malicious PDFs. Campaigns previously focused on China and Taiwan, using fake tax documents. The malware terminates security processes and leverages anti-VM checks.
Impact: System compromise, data theft, and evasion of security tools.
Mitigation: Employee training on phishing and endpoint detection for unusual process terminations.
Source: The Hacker News
Operation Silk Lure Delivers Winos 4.0 to Chinese Fintech Firms
A phishing campaign impersonates job seekers, sending malicious .LNK files disguised as résumés to Chinese fintech and crypto firms. The malware establishes persistence and exfiltrates screenshots, clipboard data, and system metadata.
Impact: Espionage and credential theft.
Mitigation: Sandbox email attachments and monitor for unusual scheduled tasks.
Source: The Hacker News
Share this brief: https://svo.bz/RZoD