TRENDING TOPICS SEPT 25, 2025

Renewed Phishing Campaign Puts Python Package Maintainers at Risk 

A new wave of phishing attacks is circulating across the Python developer community, targeting PyPI maintainers once again. The scheme relies on domain confusion, with attackers registering look-alike websites to lure users into entering their credentials. In this latest round, emails warn maintainers that they must “verify” their accounts or risk suspension. The messages closely mimic legitimate PyPI communications in design and wording, but link to a fraudulent domain, pypi-mirror[.]org, which has no ties to the Python Software Foundation. Once users input their credentials, attackers gain potential access to sensitive package metadata and can even publish compromised versions of widely used libraries. Although the fraudulent domain was quickly taken down, the low cost of registering new look-alike domains means attackers can rapidly pivot, keeping all maintainers at risk. In response, PyPI’s security team is collaborating with registrars and industry partners to disrupt malicious infrastructure more quickly, adding phishing domains to browser blocklists and intelligence feeds, and exploring enhanced account protections. While time-based one-time password apps remain a valuable safeguard, PyPI is urging adoption of hardware-based security keys that resist real-time credential theft. Still, technology alone cannot stop these campaigns without community vigilance. Maintainers are advised to avoid clicking on links in unsolicited messages, rely on password managers to flag mismatched domains, and regularly review their account security history for anomalies. Raising awareness across forums and developer networks is equally important, as collective reporting and rapid information sharing help reduce the impact of these attacks. For those who suspect compromise, immediate password resets and account audits are essential next steps.

New Obscura Ransomware Emerges Through Domain Controller Deployment 

Huntress analysts identified a new ransomware variant called Obscura on August 29, 2025, after finding the malware distributed across a victim’s network. The ransomware was staged on a domain controller within the NETLOGON folder, a directory that automatically replicates across all domain controllers, allowing it to spread rapidly across the environment. Threat actors created scheduled tasks to trigger the executable, including one named "SystemUpdate," which enabled consistent execution across multiple hosts. The binary was written in Go and disguised by taking the domain’s name, making it appear legitimate within the organization’s file structure. Once executed, the ransomware disabled recovery tools by deleting shadow copies, ensured it was running with administrative privileges, and terminated hundreds of processes tied to security tools, databases, and backup software. This preparation cleared the way for encryption, leaving defenders with reduced visibility and limited recovery options. The encryption routine used modern cryptography to lock files, embedding unique keys and identifiers into the output, ensuring that only the attackers could decrypt the data. Files exceeding 1 GB were partially encrypted to expedite operations, while smaller files were fully encrypted, thereby maximizing disruption. The ransomware skipped critical system files to avoid rendering devices unbootable, focusing instead on user data, applications, and backups. A ransom note, embedded within the binary, threatened data leaks if payment was not made, emphasizing that sensitive employee records, financial data, and internal documents had been stolen. Analysts noted Obscura alongside other emerging ransomware families, suggesting an increase in rebranding efforts within the ransomware ecosystem. Organizations are advised to monitor domain controllers for unauthorized file additions or modifications closely, watch for unusual scheduled tasks, and enhance endpoint monitoring to detect early-stage ransomware deployment.

Update: RedNovember Campaign Reveals Expanding Global Espionage Risk 

New intelligence on the group now known as RedNovember reveals that a campaign first exposed in 2024 has evolved into a much broader espionage effort with direct implications for governments and businesses across multiple regions, including the United States. RedNovember focuses on breaking into internet-facing systems, such as firewalls, VPNs, and email servers, which are tools that nearly every modern organization relies on. By compromising these systems, attackers gain a hidden foothold that allows them to steal data, monitor communications, and move deeper into networks. Over the past year, victims have included ministries in Asia, an African state security agency, European aerospace and government organizations, and U.S. defense contractors. The timing of these intrusions often matches moments of political tension, suggesting a deliberate focus on intelligence gathering tied to China’s strategic interests. What makes RedNovember particularly concerning is the way it utilizes widely available tools and exploits, thereby reducing the cost of operations while making it harder for defenders to identify its activity. This approach allows the group to scale its efforts quickly, moving from one target to another with minimal setup. Recent activity has included scans across entire government networks in Panama during sensitive diplomatic visits and targeting of infrastructure linked to Taiwan during regional military exercises. While the majority of confirmed victims are overseas, the same techniques could be directed at U.S. sectors beyond defense, including media, energy, finance, or critical infrastructure. The campaign highlights a broader risk: as long as common remote access systems remain exposed and unpatched, organizations everywhere could face infiltration. Leaders should treat this as a reminder to invest in layered defenses, accelerate patching of internet-facing systems, and demand clear visibility into who is accessing core networks.

💡
Hunter Strategy encourages our readers to look for updates in our daily Trending Topics and on Twitter.