Signals Weekly: Zero-Days, Hijacked Payrolls & a Crypto Kingpin
This Week's Threat Intel Pulse: Oracle EBS zero-day exploited before patches dropped, Storm-1175 abuses GoAnywhere MFT, payroll hijackers hit US universities, ransomware crews weaponize Velociraptor, and a $15B Southeast Asian scam network faces global sanctions.

AlphaHunt Signals Weekly — Signal > Noise
I’m testing a new ~weekly product. It’s not another “link dump.” It’s a signal-ranked brief for operators who are busy and actually have to act.
You won't find this on the main site (yet?), feel free to forward to a friend!
Why this beats aggregators
- Narrative-first, not headline spam. We cluster sources into one clear story.
- Primary-source bias. Vendor advisories + KEV + credible telemetry > hot takes.
- De-dup + downrank. We kill repeats and suppress hype.
How we sort the firehose
-
Current: active, established stories- act now.
-
Emerging: fast-rising, credible early signals—watch and prep.
I want your feedback—what’s missing, what’s extra, what would make this a must-open every week? Hit reply or DM me.
AlphaHunt
Stop doomscrolling, start decisioning. We chewed through the muck so your team doesn’t have to. → Subscribe! • Forward to your on-call lead.
(Have feedback? Did something resonate with you? Did something annoy you? Just hit reply! :))
Current Stories
TL;DR
-
[Threat Actors] CL0P-branded extortion is leveraging an Oracle E‑Business Suite zero‑day (CVE-2025-61882) with pre-patch exploitation, Java in‑memory implants, and broad executive email campaigns; urgent Oracle EBS patching and hunting for malicious templates recommended.
-
[Vulnerabilities] GoAnywhere MFT deserialization flaw (CVE-2025-10035) is under active exploitation by Storm‑1175, with observed RMM tools, web shells, data theft via Rclone, and Medusa ransomware; CISA added it to KEV.
-
[Fraud/Threat Actors] “Payroll pirate” attacks by Storm‑2657 target US universities’ Workday payroll via AiTM phishing, inbox rule abuse, and MFA takeover to divert salaries.
-
[Intrusion Sets] Ransomware actors abused Velociraptor DFIR for persistence and control alongside LockBit/Warlock/Babuk payloads; overlaps with Storm‑2603/“ToolShell” TTPs against SharePoint.
-
[Geopolitics/Cybercrime] US/UK moved against Southeast Asia scam networks: DOJ unsealed an indictment and a $15B bitcoin seizure tied to Cambodia’s Prince Group; Treasury sanctioned 146 entities and cut Huione Group off from the US financial system.
Forecasts
Likely Scenarios
-
[Threat Actors] CL0P-affiliated actors post Oracle EBS victims in waves; more orgs discover pre‑Oct 4 compromises.
-
[Vulnerabilities] Additional GoAnywhere victims surface with Medusa deployments; follow‑on targeting of exposed MFT/edge systems.
-
[Fraud] Copycat payroll-diversion campaigns hit other HR SaaS platforms; universities and public sector remain prime targets.
Overlooked Risks and Unconsidered Scenarios
-
[Intrusion Sets] Broader abuse of DFIR/IT tools (e.g., Velociraptor) becomes standard in multi‑ransom ops, complicating detection.
-
[Attribution] Overlapping “CL0P” branding and shared toolchains drive misattribution; distinct clusters (FIN11 vs. others) remain conflated.
-
[Geopolitics] Sanctions push scam TCOs toward alternate rails (OTC brokers, nested exchanges), obscuring flows and complicating takedowns.
What to do next
-
[Vulnerabilities] Patch Oracle EBS per Oct 4 advisory; hunt XDO_TEMPLATES_B/XDO_LOBS for TMP/DEF XSL payloads and block outbound EBS server traffic.
-
[Vulnerabilities] Upgrade/triage GoAnywhere MFT; search for web shells, RMM (SimpleHelp/MeshAgent), Cloudflare tunnels, and Rclone; review CISA KEV due dates.
-
[Threat Actors] Enforce phishing‑resistant MFA for payroll/HR; monitor for inbox rules suppressing Workday alerts; validate bank/payroll changes out‑of‑band.
Suggested Pivots
-
How are CL0P/FIN11‑linked infrastructure and email patterns evolving across Oracle EBS victims?
- Why: Helps separate branding from actor clusters and identify repeat infrastructure and timing patterns.
- What to expect: Host/IP reuse, lure templates, template code/URL overlaps tied to specific clusters and timelines.
-
Which organizations with GoAnywhere MFT exposure show RMM/web shell/Rclone tradecraft overlaps with Storm‑1175?
- Why: Correlates actor tooling and post‑exploitation behaviors for better detection.
- What to expect: Shared hashes/paths/commands, Cloudflare tunnel use, and sectoral victimology.
-
What inbox-rule, MFA device-enrollment, and SSO anomalies predict “payroll pirate” fraud attempts?
- Why: Builds proactive detections before payroll redirection occurs.
- What to expect: Rule-name patterns, Duo/Authenticator enrolls, and SSO access outside geo/behavior baselines.
-
Where are DFIR/IT admin tools (e.g., Velociraptor, Impacket, Smbexec) being repurposed at scale in recent intrusions?
- Why: Maps dual‑use tool abuse to campaigns beyond one case study.
- What to expect: Indicators of config files, service installs, and persistence artifacts across ransomware clusters.
References
-
(2025-10-09) Oracle E-Business Suite Zero-Day Exploited in Widespread Extortion Campaign | Google Cloud Blog
https://cloud.google.com/blog/topics/threat-intelligence/oracle-ebusiness-suite-zero-day-exploitation -
(2025-10-04) Oracle Security Alert Advisory - CVE-2025-61882
https://www.oracle.com/security-alerts/alert-cve-2025-61882.html -
(2025-10-06) Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability | Microsoft Security Blog
https://www.microsoft.com/en-us/security/blog/2025/10/06/investigating-active-exploitation-of-cve-2025-10035-goanywhere-managed-file-transfer-vulnerability/ -
(2025-09-29) Fortra GoAnywhere MFT – CVE-2025-10035 | CISA KEV
https://www.cisa.gov/known-exploited-vulnerabilities-catalog -
(2025-10-09) Velociraptor leveraged in ransomware attacks | Cisco Talos
https://blog.talosintelligence.com/velociraptor-leveraged-in-ransomware-attacks/ -
(2025-10-09) Investigating targeted payroll pirate attacks affecting US universities | Microsoft Security Blog
https://www.microsoft.com/en-us/security/blog/2025/10/09/investigating-targeted-payroll-pirate-attacks-affecting-us-universities/ -
(2025-10-14) Chairman of Prince Group Indicted… | DOJ
https://www.justice.gov/opa/pr/chairman-prince-group-indicted-operating-cambodian-forced-labor-scam-compounds-engaged -
(2025-10-14) U.S. and U.K. Take Largest Action Ever Targeting Cybercriminal Networks in Southeast Asia | Treasury
https://home.treasury.gov/news/press-releases/sb0278
AlphaHunt Intelligence Platform
Ready to level up your intelligence game?
Emerging Stories
TL;DR
-
[Infrastructure] SonicWall confirms an attacker accessed firewall configuration backups for all customers using its cloud backup service; encrypted credentials raise targeted-attack risk; remediation tooling released.
-
[Vulnerabilities] Continued “ToolShell” exploitation of on‑prem SharePoint (RCE + auth bypass) with key theft and persistence; vendor guidance emphasizes rotating MachineKey and automated IR.
-
[Espionage] Expanded DPRK “remote worker” infiltration beyond IT into architecture/design roles, using fabricated identities and freelancer platforms to gain access and revenue.