πΉ Incident 1: NightSpire Ransomware Attack on Tohpe Corporation
π
Date/Time (EST): March 20, 2025, at 12:00 a.m.
π Summary:
- Japanese chemical manufacturer Tohpe Corporation hit by NightSpire ransomware.
- 159 GB of confidential corporate data (paints & high-performance materials) compromised.
- Attribution: NightSpire RaaS, active since early 2025.
- Status: No public mitigation efforts; disclosed via underground forums.
π Source: Cyberfirma Weekly Intelligence Report, March 21, 2025 β www.cyfirma.com/news/weekly-intelligence-report-21-mar-2025
πΉ Incident 2: RansomHub Ransomware Compromises HexoSys Group
π
Date/Time (EST): March 20, 2025, at 12:00 a.m.
π Summary:
- Malaysian tech firm HexoSys Group breached via RansomHub ransomware.
- 336 GB exfiltrated (FPGA designs, source code, employee contracts, competitor research).
- Attackers: Selling data on darknet forums.
- Status: HexoSys has not publicly acknowledged the breach.
π Source: Cyberfirma Weekly Intelligence Report, March 21, 2025 β www.cyfirma.com/news/weekly-intelligence-report-21-mar-2025
πΉ Incident 3: SpyX Data Leak Exposes Surveillance Software Users
π
Date/Time (EST): March 20, 2025, at 8:00 a.m.
π Summary:
- Spyzie, Spyic, Cocospy surveillance apps breached.
- 519K+ user emails & device data leaked (call logs, messages, photos).
- Exploited shared app architecture vulnerability; no vendor mitigation disclosed.
- Data added to Have I Been Pwned (HIBP) on Feb 27, 2025; public disclosure today.
π Source: CyberPress β www.cyberpress.org/spyx-data-leak
πΉ Incident 4: Microsoft 365 Phishing Campaign Exploits Tenant Misconfigurations
π
Date/Time (EST): March 19, 2025, at 3:00 p.m.
π Summary:
- Phishing campaign abuses Microsoft 365 tenants to send fraudulent billing notifications.
- Attackers create admin accounts in compromised tenants to send credential-stealing emails.
- Targets: Enterprises using Microsoft services (no specific sector).
- Guardz researchers confirmed exploitation; no vendor mitigation details disclosed.
π Source: Security Magazine β www.securitymagazine.com/articles/101483-phishing-campaign-leverages-microsoft-365-infrastructure-for-attacks
πΉ Incident 5: Fortinet Vulnerability Exploited in SuperBlack Ransomware Campaign
π
Date/Time (EST): March 19, 2025, at 10:00 a.m.
π Summary:
- CISA confirms active exploitation of Fortinetβs CVE-2025-24472 (CVSS 8.1).
- Mora_00 group (linked to LockBit) deployed SuperBlack ransomware.
- Affected products: FortiOS 7.0.0β7.0.16, FortiProxy 7.2.0β7.2.12.
- Mitigation: Update to versions 7.0.17, 7.2.13, or 7.0.20 ASAP.
π Source: Infosecurity Magazine β www.infosecurity-magazine.com/news/fortinet-vulnerability-ransomware
π Geopolitical Context
- Hospitality sector remains high-risk due to Storm-1865’s ongoing ClickFix phishing campaigns (since March 13, 2025).
- Ransomware groups targeting APAC critical manufacturing & tech sectors.