THREAT INTELLIGENCE FEED  ·  LIVE DATA
--:--:-- UTC sandeep@cybertechnology.in +44 7379 766797
Global Threat Intelligence

Live Threat
Intelligence Feed.

Real-time attack mapping, CVE intelligence, APT actor profiles, and IOC data aggregated and curated by the CT Cyber Defence SOC team. Refreshed continuously from global threat feeds.

0 Attacks/hr (Global)
14 Active CVEs (CVSS 9+)
6 APT Groups Tracked
48 IOCs in Feed
Global Threat Level
HIGH
as of May 2025

Elevated ransomware activity. APT42 and Scattered Spider actively targeting UK/EU financial sector.

Global Attack Map
LIVE
India (Hyderabad)
UK (London)
US (New York)
Japan (Tokyo)
Critical
High
Medium
Low
Live Alert Feed
0 alerts
Vulnerability Intelligence

Critical CVEs You Need to Patch Now.

High-severity CVEs actively exploited in the wild, curated from NVD, CISA KEV, and our own threat hunting telemetry. Last updated May 2025.

CVE-2025-21334
Windows Hyper-V NT Kernel Integration VSP Use-After-Free
Privilege escalation vulnerability in Windows Hyper-V allowing guest-to-host escape. Actively exploited by multiple ransomware groups since January 2025.
9.8
CRITICAL
CVE-2025-0282
Ivanti Connect Secure Stack-Based Buffer Overflow RCE
Unauthenticated remote code execution in Ivanti Connect Secure VPN appliances. CISA KEV listed. Exploited by UNC5337 (China-nexus) since December 2024.
9.0
CRITICAL
CVE-2025-23006
SonicWall SMA 100 Series Pre-Auth OS Command Injection
Unauthenticated OS command injection in SonicWall SMA 100 series appliances. Observed in targeted ransomware pre-deployment reconnaissance campaigns.
9.8
CRITICAL
CVE-2024-55591
FortiOS / FortiProxy Authentication Bypass via jsconsole
Authentication bypass in FortiOS allowing unauthenticated attackers to gain super-admin privileges via crafted WebSocket requests to jsconsole. Patch immediately.
9.6
CRITICAL
CVE-2025-29824
Windows CLFS Driver Privilege Escalation (Zero-Day)
Use-after-free in Windows Common Log File System driver. Exploited in the wild as a privilege escalation zero-day by multiple APT groups before patch availability (April 2025).
7.8
HIGH
CVE-2025-24054
Windows NTLM Hash Disclosure Spoofing (File Explorer)
NTLM credential disclosure vulnerability triggered by minimal user interaction — opening a folder containing a specially crafted .library-ms file. Actively exploited since March 2025.
8.0
HIGH
APT Tracking

Threat Actor Profiles.

Nation-state, cybercriminal, and hacktivist groups actively targeting organisations in our client sectors. Profiles based on current intelligence and MITRE ATT&CK mappings.

APT29 / Cozy Bear
aka: Midnight Blizzard, NOBELIUM
Nation-State
Russian Federation · SVR

Highly sophisticated espionage group targeting government, diplomatic, and technology organisations. Known for long-dwell-time intrusions, supply chain attacks (SolarWinds), and Microsoft 365 credential theft via password spray and OAuth abuse.

T1078 — Valid Accounts T1566.002 — Spearphish Link T1195 — Supply Chain T1550.001 — App Access Token
Active · High confidence targeting UK/EU govt, tech
APT41 / Double Dragon
aka: Winnti, BARIUM, AXIOM
Nation-State
China · MSS

Dual-mission group conducting both state-sponsored espionage and financially motivated cybercrime. Prolific use of zero-day exploits, supply chain compromises, and destructive tools alongside ransomware deployment for financial gain.

T1190 — Exploit Public App T1027 — Obfuscated Files T1074 — Data Staged T1486 — Ransomware
Very Active · Healthcare & tech targeting UK/IN
Scattered Spider
aka: UNC3944, Octo Tempest
Cybercriminal
UK / USA · English-speaking eCrime

English-language cybercriminal group specialising in social engineering for MFA bypass and SIM-swapping. Responsible for high-profile breaches of MGM Resorts, Caesars, and multiple telecom providers. Deploying ALPHV/BlackCat ransomware.

T1621 — MFA Request Gen. T1534 — Internal Spearphish T1539 — Session Cookie Theft T1486 — Ransomware
Very Active · Finance & hospitality sector UK
LockBit 3.0 Group
aka: LockBit Black, GOLD MYSTIC
RaaS Group
Russia-adjacent · RaaS affiliate model

Prolific ransomware-as-a-service group. Despite law enforcement takedown attempts in 2024, remains active with reconstituted infrastructure. Uses intermittent encryption for speed, exfiltrates data before encryption for double extortion.

T1486 — Encryption T1489 — Service Stop T1562 — Disable Defences T1041 — Exfil C2
Active · SME targeting UK, India, EU
APT42 / Mint Sandstorm
aka: Charming Kitten, PHOSPHORUS
Nation-State
Iran · IRGC Intelligence

Iranian state intelligence group conducting credential harvesting, surveillance, and destructive attacks against journalists, human rights organisations, government, and critical infrastructure. Active spear phishing campaigns targeting UK targets in 2025.

T1566.002 — Spearphish T1114 — Email Collection T1056 — Keylogging T1485 — Data Destruction
Active · Govt, media, NGO targeting UK
KillNet / NoName057
aka: KillMilk, Infinity Forum
Hacktivist
Russia-aligned · Hacktivist collective

Pro-Russian hacktivist group conducting DDoS campaigns against NATO member state government, banking, and critical infrastructure. Uses Telegram to recruit DDoS participants and announce targets. Primarily availability-focused, limited intrusion capability.

T1498 — Network DoS T1499 — Endpoint DoS T1491 — Web Defacement
Moderate · UK gov/finance DDoS risk
Indicators of Compromise

Active IOC Feed.

Curated IOCs from our SOC telemetry and public threat feeds. Import to your SIEM or block list. Updated continuously.

Showing 12 of 48 IOCs Request Full Feed
Type Indicator Threat Actor Description Confidence Tags
IP 185.220.101.47 Scattered Spider Tor exit node used in MFA bypass campaign HIGH
RaaSTor
Domain update-checker[.]net APT29 C2 domain masquerading as software update service HIGH
C2Espionage
Hash a3f8b2c1...e4d9 LockBit 3.0 LockBit Black ransomware payload (SHA256 truncated) HIGH
RansomwareSHA256
IP 45.155.205.233 APT41 Cobalt Strike C2 beacon infrastructure (VPS-hosted) HIGH
Cobalt StrikeC2
Domain microsoftonline-auth[.]com APT42 Credential phishing page impersonating Microsoft 365 login HIGH
PhishingM365
URL hxxps://cdn[.]hacker-svr[.]ru/p.exe Unknown (RU-nexus) Malware delivery URL — Lumma stealer dropper MED
StealerDropper
IP 194.165.16.11 LockBit 3.0 LockBit exfiltration staging server (confirmed 2025-04) HIGH
ExfilRansomware
Hash 7d9f4e3a...b2c8 APT41 PlugX remote access tool variant (SHA256 truncated) MED
RATPlugX
Domain secure-docusign[.]io Unknown TA DocuSign impersonation phishing domain — credential harvest HIGH
PhishingImpersonation
IP 91.92.251.103 APT42 Iranian APT42 phishing kit C2 / credential receiver MED
IranPhishing
Domain vpn-client-update[.]org APT29 Malware delivery disguised as VPN client update package HIGH
DeliveryMasquerade
Hash f1e2d3c4...a9b0 Scattered Spider BYOVD driver used to terminate EDR processes before encryption HIGH
BYOVDEDR Kill
Get Protected

These Threats Are Targeting Your Sector.

Our SOC team monitors all of the above actors and IOCs 24/7 — and actively hunts for their TTPs across client environments. Find out if you're already exposed.

Request Threat Briefing Read Threat Research Blog