Cyber Intelligence Briefing: 04 July 2025
Powered by S-RM, the Cyber Threat Intelligence Briefing is a weekly round-up of the latest cybersecurity news, trends, and indicators, curated by intelligence specialists.
Ransomware gang target German food aid charity
A ransomware gang recently attacked Deutsche Welthungerhilfe (WHH), a German charity providing food and aid to impoverished regions. The attackers are demanding 20 bitcoin (approximately USD 2.1 million) for stolen data, but WHH has refused to pay and has taken steps to secure their systems while involving authorities.
[Researcher: Nor Liana Kamaruzzaman, S-RM]
Assured’s CISO reacts:
Charities are often a target due to the sensitive data of vulnerable individuals and continual priority conversations to divert funds from frontline services to cyber protections. The attack group behind Deutsche Welthungerhilfe (WHH) are significantly more active in 2025, with 15 more victims compared to this stage in 2024. As a ransomware as a service, they employ known and repeatable tools, techniques and procedures, so we’ve looked into a set of tailored protections which would help:
1. M1032) Multi-Factor Authentication (MFA) for Remote Access:
2. M1026) Privileged Account Management:
3. M1042) Disable or Restrict PowerShell:
3. M1047) Audit Credential Dumping Tools:
- Threat Addressed: Rhysida employs tools like
taskmgr.exe
and procdump
to dump credentials from LSASS. fortinet.com
-
Enable LSASS Protection:
- Set registry key:
HKLM\SYSTEM\CurrentControlSet\Control\Lsa\RunAsPPL
to 1
Configure Audit Policies:
-
powershell
CopyEdit
- Navigate to:
Computer Configuration > Windows Settings > Security Settings > Advanced Audit Policy Configuration > System Audit Policies > Detailed Tracking
- Enable ‘Audit Process Creation’ and ‘Audit Process Termination’.picussecurity.com
4. M1053) Disable Unnecessary Scheduled Tasks:
5. M1018) Disable Unnecessary Scheduled Tasks:
6. T1021.001) Remote Desktop Protocol (RDP):
7. T1486.001) Data Encrypted for Impact (Ransomware):
Rogue IT worker handed seven month sentence following act of sabotage
A British IT worker has been sentenced to seven months in prison having been found guilty of causing significant IT disruption following his suspension by his employer in July 2022. The former employee had changed credentials and altered multi-factor authentication settings, halting business operations and causing approximately GBP 200,000 in business and reputational damages.
[Researcher: Lawrence Copson, S-RM]
Assured’s CISO reacts:
Privileged access should be a privilege and treated by the company as the highest level of risk. Whether its a disgruntled employee, account compromise or error, admin privileges should be authorised just-enough, just-in-time.
1. M1018) User Account Management:
2. M1026) Privileged Account Management:
3. M1042) Disable or Remove Feature or Program:
4. M1047) Audit: