Defending against cyber threats amid Israel-Iran geopolitical tensions. Learn More
Access immediate incident response support, available 24/7
Access immediate incident response support, available 24/7
Defending against cyber threats amid Israel-Iran geopolitical tensions. Learn More
June 2025
The LevelBlue SpiderLabs update gives you the latest threat news, including recent updates to USM Anywhere detections and new threat intelligence published in the LevelBlue SpiderLabs Open Threat Exchange (OTX), one of the largest open threat intelligence sharing communities in the world.
Scattered Spider Targets Fashion Retail
Scattered Spider, an English-speaking crime gang, have been targeting fashion retailers out of the UK, France, and the US. Most recently, retailers Marks and Spencer and Harrods out of the U.K. show signs that indicate Scattered Spider breaches. At the end of May, Victoria’s Secret had to take down their website for over 12 hours after they confirmed a breach.
Silent Push published a threat report on the group at the end of April detailing their tactics, delivery methodologies, and tooling. In their most recent campaigns, Scattered Spider has been deploying DragonForce ransomware once full compromise is achieved. Their intrusion methods involve heavy social engineering and vishing of senior individuals, and spoofing identities to recover credentials through support desks.
Chinese state-sponsored Advanced Persistent Threat (APT) groups are exploiting a vulnerability in SAP NetWeaver Visual Composer to target critical infrastructure networks worldwide. The actors leveraged CVE-2025-31324, an unauthenticated file upload vulnerability, to perform remote code execution.
Analysis from EclecticIQ links the intrusions to Chinese cyber-espionage units including UNC5221, UNC5174, and CL-STA-0048. The campaign focuses on compromising essential services and government entities across multiple countries, including the UK, US, and Saudi Arabia. The threat actors deployed malware including KrustyLoader, SNOWLIGHT, VShell RAT, and GOREVERSE to maintain persistent access and conduct espionage activities.
Reports indicate that the nation state actors had exploited the vulnerability weeks before the public announcement. The exploitation of widely used enterprise applications like SAP NetWeaver represents a strategic move to gain high-privilege access to internal networks and critical systems.
LevelBlue SpiderLabs has created or updated the following Adversary Trackers to automatically identify and detect malicious infrastructure:
ClickFix
NetSupport RAT
The team has identified the following malware/threat actors as the most active during the month of May.
Lumma: Lumma activity continues to trend higher as more campaigns leverage the malware-as-a-service infostealer due to its modularity and ease-of-use. As popular IAB campaigns SocGholish and Clickfix continue to offer malicious actors convenient access to high value targets, Lumma’s will remain dominant for financially motivated threat actors looking to steal banking creds.

The LevelBlue trackers have identified over 2200 new IOCs for the different families it tracks. The busiest trackers during the month of May have been:

In May, LevelBlue SpiderLabs added or updated 65 USM Anywhere detections. Here are a few examples of improvements and new elements LevelBlue SpiderLabs developed:
6 new FortiAnalyzer detections.
4 Akamai detections including SQL injection activity, command injection, and IPS detections.
Please visit the LevelBlue Success Center for a full list of improvements, new elements, issues found, and tasks created.
LevelBlue SpiderLabs Open Threat Exchange (OTX) is among the world’s largest open threat intelligence sharing communities, made up of 450,000 threat researchers from 140 countries globally who publish threat information to the platform daily.
LevelBlue SpiderLabs validates, analyzes, and enriches this threat intelligence. Members of OTX benefit from the collective research, can contribute to the community, analyze threats, create public and private threat intelligence sharing groups, and more.
Learn more about OTX, its benefits, and how you can join.
The LevelBlue SpiderLabs team is continuously publishing new pulses in OTX based on their research and discoveries. Pulses are interactive and researchable repositories of information about threats, threat actors, campaigns, and more. This includes indicators of compromise, IoCs, that are useful to members.
In May, 118 new Pulses were created by the SpiderLabs team, providing coverage for the latest threats and campaigns. Here are a few examples of the most relevant new Pulses:
LevelBlue is a globally recognized cybersecurity leader that reduces cyber risk and fortifies organizations against disruptive and damaging cyber threats. Our comprehensive offensive and defensive cybersecurity portfolio detects what others cannot, responds with greater speed and effectiveness, optimizes client investment, and improves security resilience. Learn more about us.