Weekly Cybersecurity Recap - 24 March 2025
Major Threats, Attacks & Industry Updates
01 / Blog Article
Weekly Cybersecurity Recap - 24 March 2025
Introduction
The cybersecurity landscape continues to shift, bringing new challenges for organizations across all industries. Attackers are using increasingly sophisticated techniques, from malware hidden in fake reCAPTCHA to AI-powered phishing campaigns that are harder to detect than ever before. Meanwhile, ransomware groups are adopting new tactics, leveraging fake browser updates to infiltrate government systems.
At the same time, major industry moves — like Google’s $32 billion acquisition of Wiz — highlight the growing importance of proactive cloud security. As vulnerabilities in widely used technologies like Cisco’s Smart Licensing Utility come under attack, businesses must remain vigilant and adaptable.
This week’s recap breaks down the key threats and developments shaping the cybersecurity world.
Malware & Cyber Threats
ClearFake Infects 9,300 Sites, Uses Fake reCAPTCHA and Turnstile to Spread Info-Stealers
The ClearFake campaign is back, using fake reCAPTCHA and Cloudflare Turnstile verifications as a disguise to push malware like Lumma Stealer and Vidar Stealer. The malware is being spread through compromised WordPress sites, tricking users into downloading trojanized updates. ClearFake also employs EtherHiding, using Binance Smart Chain (BSC) contracts to make its attack chain more resilient. This approach allows attackers to continuously refresh their payload delivery mechanisms, making detection and mitigation more difficult.
Browser Security Under Siege: The Alarming Rise of AI-Powered Phishing
A recent report from Menlo Security reveals a 140% spike in browser-based phishing attacks, with zero-hour phishing attempts increasing by 130%. These attacks are becoming more sophisticated, using AI-driven techniques to bypass traditional security measures. Since browsers are the primary workspace for most employees, organizations must prioritize browser security by adopting real-time threat detection solutions and better phishing awareness training.
Why It's So Hard to Stop Rising Malicious TDS Traffic
Traffic Distribution Systems (TDSs) are commonly used in digital marketing to redirect users based on device, region, or behavior. However, attackers are now exploiting TDS platforms to evade security tools and sandbox environments, making it increasingly difficult to block malicious redirects. TDS abuse is fueling malvertising campaigns, which often lead unsuspecting users to phishing pages or malware downloads.
RansomHub Using FakeUpdates Scheme to Attack Government Sector
The RansomHub ransomware gang has found a new way to distribute malware—partnering with FakeUpdates (SocGholish), a widespread malware-as-a-service operation. FakeUpdates relies on compromised websites and fake browser update prompts to trick users into downloading malware. Since its emergence in early 2024, RansomHub has amassed over 200 victims, with U.S. government agencies now in its crosshairs.
Vulnerabilities & Exploits
Cisco Smart Licensing Utility Flaws Under Attack
The SANS Internet Storm Center has reported that attackers are actively exploiting two critical vulnerabilities in Cisco’s Smart Licensing Utility. The vulnerabilities, first disclosed in September 2024, affect multiple Cisco products but require manual activation to be exploited. Organizations relying on Cisco infrastructure should apply patches immediately and ensure that unused licensing utilities are disabled to mitigate risk.
Major Acquisitions & Industry News
Google to Acquire Cloud Security Giant Wiz for $32 Billion in Cash
In a game-changing deal, Google has announced its $32 billion acquisition of Wiz, a cloud security powerhouse known for scanning enterprise cloud environments to detect and mitigate risks. Wiz will be integrated into Google Cloud, joining Mandiant, which was acquired for $5.4 billion in 2022. The move highlights Google’s aggressive push into cloud security, reinforcing the need for proactive cloud threat management solutions.
Cybersecurity Strategies & Best Practices
How to Protect Your Business from Cyber Threats: Mastering the Shared Responsibility Model
Cloud security isn’t just the provider’s job—it’s a shared responsibility. The Microsoft 365 security model offers a great example of how businesses and cloud providers must work together to protect digital assets. Imagine an apartment complex: the provider secures the building structure, while tenants must lock their own doors. Businesses should adopt best practices, such as multi-factor authentication (MFA), continuous monitoring, and regular security assessments, to ensure comprehensive protection.
From AI-powered phishing threats to cloud security industry shakeups, this week’s developments underscore the rapid evolution of cybersecurity risks. Organizations must stay vigilant, adapt to emerging attack methods, and invest in strong security frameworks. Whether it’s ransomware threats, phishing campaigns, or cloud vulnerabilities, proactive defense is the key to staying ahead.

Protect your business with Paratus
Ready to get started? Fill out the form below and we'll get back to you in no time!

risk decrease