{"id":14463,"date":"2025-06-25T11:47:26","date_gmt":"2025-06-25T11:47:26","guid":{"rendered":"\/cybersecurity-blog\/?p=14463"},"modified":"2025-06-27T07:42:57","modified_gmt":"2025-06-27T07:42:57","slug":"cyber-attacks-june-2025","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/","title":{"rendered":"Top 3 Cyber Attacks in June 2025: GitHub Abuse, Control Flow Flattening, and More\u00a0"},"content":{"rendered":"\n<p>June 2025 saw several sophisticated and stealthy cyber attacks that relied heavily on obfuscated scripts, abuse of legitimate services, and multi-stage delivery techniques. Among the key threats observed by ANY.RUN\u2019s analysts were malware campaigns using GitHub for payload hosting, JavaScript employing control-flow flattening to drop Remcos, and obfuscated BAT scripts delivering NetSupport RAT. Let\u2019s see how ANY.RUN\u2019s <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyberattacks_june_25&amp;utm_term=250625&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a> and <a href=\"https:\/\/any.run\/threat-intelligence-lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyberattacks_june_25&amp;utm_term=250625&amp;utm_content=linktotilookupanding\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> can help security teams detect, investigate, and understand these threats.\u00a0<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1. Braodo Stealer Abuses GitHub for Payload Staging and Hosting&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/x.com\/anyrun_app\/status\/1935359366036635915\/photo\/1\" target=\"_blank\" rel=\"noreferrer noopener\">Original post on X<\/a> and <a href=\"https:\/\/www.linkedin.com\/posts\/any-run_braodo-malware-github-activity-7341125061149454355-KKBC?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAE8fxWoBjRQuEUnJBJlt9oH6kqphHT7Telw\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>&nbsp;<\/p>\n\n\n\n<p>A new campaign distributing Braodo stealer leverages public GitHub repository, including raw file content, to host payloads. The primary goal of this stealer is data exfiltration, and at the time of analysis, its detection rate was low. The BAT files used in the campaign include misleading comments to complicate analysis.&nbsp;&nbsp;<\/p>\n\n\n\n<p>ANY.RUN\u2019s <a href=\"https:\/\/any.run\/cybersecurity-blog\/script-tracer\/\" target=\"_blank\" rel=\"noreferrer noopener\">Script Tracer<\/a> simplifies the analysis by logging the multi-stage execution flow step by step, without the need for manual deobfuscation. Let\u2019s take a closer look at this threat\u2019s behavior using ANY.RUN Interactive Sandbox, which provides full visibility into process activity and persistence mechanisms. &nbsp;<br>&nbsp;<br><a href=\"https:\/\/app.any.run\/tasks\/75be7fd8-8984-4b54-bd18-c98305cc94a8\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyberattacks_june_25&amp;utm_term=250625&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"497\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagec-6-1024x497.png\" alt=\"\" class=\"wp-image-14469\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagec-6-1024x497.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagec-6-300x146.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagec-6-768x373.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagec-6-1536x746.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagec-6-370x180.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagec-6-270x131.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagec-6-740x359.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagec-6.png 1765w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Braodo stealer detonated in Interactive Sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The first BAT file executes a CMD command that launches <a href=\"https:\/\/any.run\/cybersecurity-blog\/powershell-script-tracer\/\" target=\"_blank\" rel=\"noreferrer noopener\">PowerShell<\/a> in hidden mode to avoid displaying a visible window. It then downloads a second BAT file from github[.]com, disguised as a .PNG file, saves it to the %temp% folder, and executes it.&nbsp;&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image2-7.png\" alt=\"This image has an empty alt attribute; its file name is image2-7.png\"\/><figcaption class=\"wp-element-caption\"><em>Pseudo .png file downloaded from GitHub<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>The second BAT file launches a new PowerShell script file, that removes components from the earlier stages, enforces TLS 1.2, retrieves an additional payload from raw.githubusercontent[.]com, saving it in the Startup folder, and downloads main payload in a ZIP file. This behavior is captured in ANY.RUN\u2019s Script Tracer.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"921\" height=\"719\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image3-7.png\" alt=\"\" class=\"wp-image-14471\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image3-7.png 921w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image3-7-300x234.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image3-7-768x600.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image3-7-370x289.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image3-7-270x211.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image3-7-385x300.png 385w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image3-7-740x578.png 740w\" sizes=\"(max-width: 921px) 100vw, 921px\" \/><figcaption class=\"wp-element-caption\">&nbsp;<em>Script Tracer: TLS 1.2 protocol launched, .zip file downloaded<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The final payload, Braodo Stealer, is extracted from a ZIP file, stored in the Public directory, and executed using python.exe. After execution, it deletes the initial archive to reduce artifacts. The Python file is obfuscated with pyobfuscate and contains non-encrypted, custom Base64-encoded payload strings appended to the script.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image4-\u2014-\u043a\u0440\u0443\u043f\u043d\u044b\u0439-\u0440\u0430\u0437\u043c\u0435\u0440-768x1024.png\" alt=\"\" class=\"wp-image-14472\" style=\"width:436px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image4-\u2014-\u043a\u0440\u0443\u043f\u043d\u044b\u0439-\u0440\u0430\u0437\u043c\u0435\u0440-768x1024.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image4-\u2014-\u043a\u0440\u0443\u043f\u043d\u044b\u0439-\u0440\u0430\u0437\u043c\u0435\u0440-225x300.png 225w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image4-\u2014-\u043a\u0440\u0443\u043f\u043d\u044b\u0439-\u0440\u0430\u0437\u043c\u0435\u0440-370x493.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image4-\u2014-\u043a\u0440\u0443\u043f\u043d\u044b\u0439-\u0440\u0430\u0437\u043c\u0435\u0440-270x360.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image4-\u2014-\u043a\u0440\u0443\u043f\u043d\u044b\u0439-\u0440\u0430\u0437\u043c\u0435\u0440-740x987.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image4-\u2014-\u043a\u0440\u0443\u043f\u043d\u044b\u0439-\u0440\u0430\u0437\u043c\u0435\u0440.png 960w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\"><em>The whole attack chain detailed in the Interactive Sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>ANY.RUN\u2019s Threat Intelligence Lookup allows analysts to discover recent Braodo attacks and fresh samples of this stealer dissected by the users of the Interactive Sandbox. Search by the malware\u2019s name and view analyses: &nbsp;<br>&nbsp;<br><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyberattacks_june_25&amp;utm_term=250625&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522threatName:%255C%2522Sneaky2FA%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">threatName:&#8221;Braodo&#8221;<\/a>&nbsp;<br><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"624\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imaged-3-1024x624.png\" alt=\"\" class=\"wp-image-14473\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imaged-3-1024x624.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imaged-3-300x183.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imaged-3-768x468.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imaged-3-370x226.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imaged-3-270x165.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imaged-3-740x451.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imaged-3.png 1468w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Braodo analyses in the Sandbox found via Threat Intelligence Lookup<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The search results contain a selection of Brado samples recently analyzed by the Sandbox users. Each analysis session can be explored in depth for harvesting IOCs and observing the malware\u2019s behavior. &nbsp;<\/p>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nSpeed up triage and incident response with instant access <br>to threat data on attacks across <span class=\"highlight\">15,000 organizations<\/span>&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/plans\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=cyberattacks_june_25&#038;utm_term=250625&#038;utm_content=linktotiplans\" target=\"_blank\" rel=\"noopener\">\nStart with 50 trial requests\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">2. Control Flow Flattening Obfuscated JavaScript Drops Remcos&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/x.com\/anyrun_app\/status\/1932795064054338008\" target=\"_blank\" rel=\"noreferrer noopener\">Original post on X<\/a> and <a href=\"https:\/\/www.linkedin.com\/posts\/any-run_javascript-remcos-obfuscation-activity-7338560756453367810-2Cc1?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAE8fxWoBjRQuEUnJBJlt9oH6kqphHT7Telw\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>&nbsp;<\/p>\n\n\n\n<p>Another tricky piece of malicious Java script has been observed using a technique called control-flow flattening obfuscation to secretly deliver Remcos malware. The JS contains multiple self-invoking functions that loop arrays of strings and numbers in a while(!![]) loop until a calculated checksum matches a predefined value. This obfuscation technique forces static analyzers to parse through the array&#8217;s content instead of returning the required string directly.&nbsp; &nbsp;<br>&nbsp;<br>ANY.RUN\u2019s Script Tracer enables easy analysis of heavily obfuscated scripts by logging their execution in real time, with no need for manual deobfuscation.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/eaef10ea-3567-4284-b87e-a3a0aedc5f83\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyberattacks_june_25&amp;utm_term=250625&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"517\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image6-8-1024x517.png\" alt=\"\" class=\"wp-image-14474\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image6-8-1024x517.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image6-8-300x151.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image6-8-768x388.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image6-8-1536x775.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image6-8-370x187.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image6-8-270x136.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image6-8-740x374.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image6-8.png 1767w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>A Remcos malware sample including the obfuscated JavaScript<\/em><\/figcaption><\/figure><\/div>\n\n\n<p>The script:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Invokes #PowerShell using ActiveXObject(&#8220;http:\/\/WScript.Shell&#8221;) with parameters;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Creates a http:\/\/System.Net.WebClient object;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Specifies the URL to download the binary;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Downloads the binary data and passes it to #MSBuild;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Downloads and executes the Remcos malware module.&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image-1-768x1024.jpg\" alt=\"\" class=\"wp-image-14475\" style=\"width:424px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image-1-768x1024.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image-1-225x300.jpg 225w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image-1-1152x1536.jpg 1152w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image-1-1536x2048.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image-1-370x493.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image-1-270x360.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image-1-740x987.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image-1.jpg 1800w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\"><em>The script\u2019s architecture and behavior exposed in ANY.RUN\u2019s sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>PowerShell-abusing script attacks are becoming more widespread and sophisticated. It is extremely important for threat hunters to be able to investigate and analyze such attacks, see what malware and malefactors are using them, and how.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/cybersecurity-blog\/cyber-threat-hunting-tips\/\" target=\"_blank\" rel=\"noreferrer noopener\">A guest article by Clandestine<\/a>, threat hunter and researcher, has recently been published in our blog highlighting a number of advanced tips for leveraging Threat Intelligence Lookup for malware data gathering and analysis (a guide to main TI Lookup features and their use is included, so we recommend to read and take note).&nbsp;&nbsp;<\/p>\n\n\n\n<p>Clandestine demonstrates how one can find malware samples that use scripting languages to hide malicious code or execute obfuscated commands:&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyberattacks_june_25&amp;utm_term=250625&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522commandLine:%255C%2522powershell%255C%2522%2520and%2520fileExtension:%255C%2522js%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">commandLine:\u201dpowershell\u201d and fileExtension:\u201djs\u201d<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"584\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image7-8-1024x584.png\" alt=\"\" class=\"wp-image-14476\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image7-8-1024x584.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image7-8-300x171.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image7-8-768x438.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image7-8-370x211.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image7-8-270x154.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image7-8-740x422.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image7-8.png 1478w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>JavaScript files executing PowerShell commands<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>This query identifies scripts that run system commands, the pattern commonly observed in multi-stage attacks where script files act as initial droppers that subsequently execute obfuscated PowerShell commands.&nbsp; &nbsp;<br>&nbsp;<br>The combination of file extension parameters (you can search for other script types like Visual Basic Script (.vbs) files) with command-line indicators helps security analysts identify and analyze this obfuscation technique.&nbsp;<\/p>\n\n\n\n<!-- CTA Split START -->\n<div class=\"cta-split\">\n<div class=\"cta__split-left\">\n\n<!-- Image -->\n<img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/mcusercontent.com\/663b94f19348582a8dc323efe\/images\/0d88188b-3e89-2314-5a60-cb87e8077326.png\" alt=\"ANY.RUN cloud interactive sandbox interface\" class=\"cta__split-icon\" \/>\n<\/div>\n\n<div class=\"cta__split-right\">\n<div>\n\n<!-- Heading -->\n<h3 class=\"cta__split-heading\"><br>Learn to Track Emerging Cyber Threats<\/h3>\n\n<!-- Text -->\n<p class=\"cta__split-text\">\nCheck out expert guide to collecting intelligence on emerging threats with <span class=\"highlight\">TI Lookup<\/span>\n<br \/>\n<br \/>\n<\/p>\n<\/div>\n<!-- CTA Link -->\n<a target=\"_blank\" rel=\"noopener\" id=\"article-banner-split\" href=\"https:\/\/any.run\/cybersecurity-blog\/emerging-threats\/\"><div class=\"cta__split-link\">Read full guide<\/div><\/a>\n<\/div>\n<\/div>\n<!-- CTA Split END -->\n<!-- CTA Split Styles START -->\n<style>\n.cta-split {\noverflow: hidden;\nmargin: 3rem 0;\ndisplay: grid;\njustify-items: center;\nborder-radius: 0.5rem;\nwidth: 100%;\nmin-height: 25rem;\ngrid-template-columns: repeat(2, 1fr);\nborder: 1px solid rgba(75, 174, 227, 0.32);\nfont-family: 'Catamaran Bold';\n}\n\n.cta__split-left {\ndisplay: flex;\nalign-items: center;\njustify-content: center;\nheight: 100%;\nwidth: 100%;\nbackground-color: #161c59;\nbackground-position: center center;\nbackground: rgba(32, 168, 241, 0.1);\n}\n\n.cta__split-icon { \nwidth: 100%;\nheight: auto;\nobject-fit: contain;\nmax-width: 100%;\n}\n\n.cta__split-right {\ndisplay: flex;\nflex-direction: column;\njustify-content: space-between;\npadding: 2rem;\n}\n\n.cta__split-heading { font-size: 1.5rem; }\n\n.cta__split-text {\nmargin-top: 1rem;\nfont-family: Lato, Roboto, sans-serif;\n}\n\n.cta__split-link {\npadding: 0.5rem 1rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: white;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\ndisplay: block;\nz-index: 1000;\nposition: relative;\ncursor: pointer !important;\n}\n\n.cta__split-link:hover {\nbackground-color: #68CBFF;\ncolor: white;\ncursor: pointer;\n}\n\n.highlight { color: #ea2526;}\n\n\n\/* Mobile styles START *\/\n@media only screen and (max-width: 768px) {\n\n.cta-split {\ngrid-template-columns: 1fr;\nmin-height: auto;\n}\n\n.cta__split-left {\nheight: auto;\nmin-height: 10rem;\n}\n\n\n.cta__split-left, .cta__split-right {\nheight: auto;\n}\n\n.cta__split-heading { font-size: 1.2rem; }\n\n.cta__split-text { font-size: 1rem; }\n.cta__split-icon {\nmax-height: auto;\nobject-fit: cover;\n}\n\n}\n\/* Mobile styles END *\/\n<\/style>\n<!-- CTA Split Styles END -->\n\n\n\n<h2 class=\"wp-block-heading\">3. Obfuscated BAT file used to deliver NetSupport RAT&nbsp;&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/x.com\/anyrun_app\/status\/1930627317920842137\" target=\"_blank\" rel=\"noreferrer noopener\">Original post on X<\/a> and <a href=\"https:\/\/www.linkedin.com\/posts\/any-run_obfuscated-virustotal-powershell-activity-7336393368698028034-cayg?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAAE8fxWoBjRQuEUnJBJlt9oH6kqphHT7Telw\" target=\"_blank\" rel=\"noreferrer noopener\">LinkedIn<\/a>&nbsp;<\/p>\n\n\n\n<p>Cybercriminals continue to rely on BAT files (batch scripts) to sneak malware into systems and evade detection. ANY.RUN team has studied one such case where an obfuscated BAT file was used to deliver the NetSupport <a href=\"https:\/\/any.run\/malware-trends\/rat\/\" target=\"_blank\" rel=\"noreferrer noopener\">Remote Access Trojan<\/a> (RAT) \u2013 a tool originally designed for remote IT support but now abused by attackers to gain full control over victims\u2019 machines.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/db6fcb53-6f10-464e-9883-72fd7f1db294\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyberattacks_june_25&amp;utm_term=250625&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"512\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image8-10-1024x512.png\" alt=\"\" class=\"wp-image-14477\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image8-10-1024x512.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image8-10-300x150.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image8-10-768x384.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image8-10-1536x768.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image8-10-370x185.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image8-10-270x135.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image8-10-740x370.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image8-10.png 1778w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>NetSupport attack exploiting PowerShell sandbox analysis<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The key execution chain stages are:&nbsp;&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cmd.exe runs an obfuscated BAT file which launches PowerShell scripts.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>PowerShell downloads and executes client32.exe \u2014 the NetSupport client.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>The malware uses a &#8216;client32&#8217; process to run NetSupport RAT and add it to autorun in registry via reg.exe.&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1021\" height=\"770\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image9-8.png\" alt=\"\" class=\"wp-image-14478\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image9-8.png 1021w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image9-8-300x226.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image9-8-768x579.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image9-8-370x279.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image9-8-270x204.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image9-8-740x558.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/image9-8-80x60.png 80w\" sizes=\"(max-width: 1021px) 100vw, 1021px\" \/><figcaption class=\"wp-element-caption\"><em>ANY.RUN\u2019s Sandbox Process Graph showing NetSupport penetrating network<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>Creates an &#8216;Options&#8217; folder in %APPDATA % if missing.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>NetSupport client downloads a task .zip file, extracts, and runs it from %APPDATA%\\Application.zip.&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1002\" height=\"633\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagee-2.png\" alt=\"\" class=\"wp-image-14479\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagee-2.png 1002w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagee-2-300x190.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagee-2-768x485.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagee-2-370x234.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagee-2-270x171.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imagee-2-740x467.png 740w\" sizes=\"(max-width: 1002px) 100vw, 1002px\" \/><figcaption class=\"wp-element-caption\"><em>Options folder created, .zip archive delivered: Script Tracer in the Sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<ul class=\"wp-block-list\">\n<li>Deletes ZIP files after execution.&nbsp;&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>As attackers develop new ways to penetrate networks and evade detection, threat hunting becomes more challenging and demands to follow trends to keep ahead of possible disasters. &nbsp;<\/p>\n\n\n\n<p>Threat Intelligence Lookup allows you to search for small, seemingly benign artifacts in the network that can be traces of malicious activities, like a folder creation in the system directory AppData\\Roaming by a command line-run script: &nbsp;<br>&nbsp;<br><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyberattacks_june_25&amp;utm_term=250625&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522commandLine:%5C%2522AppData%5C%5C%5C%5CRoaming%5C%5C%5C%5COptions%5C%2522%2522,%2522dateRange%2522:60%7D\" target=\"_blank\" rel=\"noreferrer noopener\">commandLine:&#8221;AppData\\\\Roaming\\\\Options&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"612\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imageb-3-1024x612.png\" alt=\"\" class=\"wp-image-14480\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imageb-3-1024x612.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imageb-3-300x179.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imageb-3-768x459.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imageb-3-370x221.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imageb-3-270x161.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imageb-3-740x442.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/06\/imageb-3.png 1481w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em style=\"white-space: normal;\">A number of NetSupport trojan samples found by their creating a folder on endpoint<\/em><span style=\"font-family: -webkit-standard; white-space: normal;\">&nbsp;<\/span><\/figcaption><\/figure><\/div>\n\n\n<p>With the CommandLine search parameter, you can find malware samples based on any script artifacts found in system logs, for example, registry key changes. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How TI Lookup Benefits SOC&nbsp;<\/h2>\n\n\n\n<p>ANY.RUN\u2019s Threat Intelligence Lookup is a critical ally for security teams facing an ever-growing variety of evasive malware. With attackers increasingly relying on multi-stage scripts, living-off-the-land binaries (LOLBins), and public infrastructure like GitHub, traditional indicators often go unnoticed.&nbsp;&nbsp;<\/p>\n\n\n\n<p>With Threat Intelligence Lookup your team can: &nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Speed up threat investigations<\/strong> by letting analysts quickly pivot from indicators and suspicious behaviors to related malware samples and campaigns.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Shorten response times <\/strong>by providing contextual threat insights essential for fast, informed security decisions.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enhance alert triage<\/strong> by prioritizing detections based on real-world behavior and threat prevalence.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Support proactive threat hunting<\/strong> through flexible search queries that uncover evolving obfuscation and delivery techniques.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Improve detection coverage<\/strong> by uncovering patterns like scripting abuse, LOLBins, and infrastructure used in multi-stage attacks.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>The cyber incidents in June 2025 underscore a clear trend: adversaries are refining their methods with obfuscation, open-source abuse, and layered execution chains. To combat these threats effectively, security teams need both visibility and context. Our Interactive Sandbox and TI Lookup empower analysts to deconstruct complex attacks and proactively hunt emerging threats before they become breaches.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyberattacks_june_25&amp;utm_term=250625&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> supports over <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-from-organizations\/\" target=\"_blank\" rel=\"noreferrer noopener\">15,000 organizations<\/a> across industries such as banking, manufacturing, telecommunications, healthcare, retail, and technology, helping them build stronger and more resilient cybersecurity operations.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>With our cloud-based Interactive Sandbox, security teams can safely analyze and understand threats targeting Windows, Linux, and Android environments in less than 40 seconds and without the need for complex on-premise systems. Combined with <a href=\"https:\/\/intelligence.any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyberattacks_june_25&amp;utm_term=250625&amp;utm_content=linktotilookup\" target=\"_blank\" rel=\"noreferrer noopener\">TI Lookup<\/a>, <a href=\"https:\/\/any.run\/cybersecurity-blog\/yara-search-guide\/\" target=\"_blank\" rel=\"noreferrer noopener\">YARA Search<\/a>, and <a href=\"https:\/\/intelligence.any.run\/feeds\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyberattacks_june_25&amp;utm_term=250625&amp;utm_content=linktotifeeds\" target=\"_blank\" rel=\"noreferrer noopener\">TI Feeds<\/a>, we equip businesses to speed up investigations, reduce security risks, and improve team\u2019s efficiency.&nbsp;&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=cyberattacks_june_25&amp;utm_term=250625&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Integrate ANY.RUN\u2019s Threat Intelligence suite in your organization<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>June 2025 saw several sophisticated and stealthy cyber attacks that relied heavily on obfuscated scripts, abuse of legitimate services, and multi-stage delivery techniques. Among the key threats observed by ANY.RUN\u2019s analysts were malware campaigns using GitHub for payload hosting, JavaScript employing control-flow flattening to drop Remcos, and obfuscated BAT scripts delivering NetSupport RAT. Let\u2019s see [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":14467,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,10,34],"class_list":["post-14463","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-cybersecurity","tag-malware-analysis"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>3 Cyber Attacks in June 2025: Remcos, NetSupport RAT, and more<\/title>\n<meta name=\"description\" content=\"Discover detailed breakdown of top cyberattacks in June 2025, from Braodo Stealer abusing GitHub to NetSupportRAT delivered via LOLBins.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Top 3 Cyber Attacks in June 2025: GitHub Abuse, Control Flow Flattening, and More\u00a0\",\"datePublished\":\"2025-06-25T11:47:26+00:00\",\"dateModified\":\"2025-06-27T07:42:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/\"},\"wordCount\":1495,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/\",\"name\":\"3 Cyber Attacks in June 2025: Remcos, NetSupport RAT, and more\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-06-25T11:47:26+00:00\",\"dateModified\":\"2025-06-27T07:42:57+00:00\",\"description\":\"Discover detailed breakdown of top cyberattacks in June 2025, from Braodo Stealer abusing GitHub to NetSupportRAT delivered via LOLBins.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Top 3 Cyber Attacks in June 2025: GitHub Abuse, Control Flow Flattening, and More\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 Cyber Attacks in June 2025: Remcos, NetSupport RAT, and more","description":"Discover detailed breakdown of top cyberattacks in June 2025, from Braodo Stealer abusing GitHub to NetSupportRAT delivered via LOLBins.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Top 3 Cyber Attacks in June 2025: GitHub Abuse, Control Flow Flattening, and More\u00a0","datePublished":"2025-06-25T11:47:26+00:00","dateModified":"2025-06-27T07:42:57+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/"},"wordCount":1495,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/","url":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/","name":"3 Cyber Attacks in June 2025: Remcos, NetSupport RAT, and more","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-06-25T11:47:26+00:00","dateModified":"2025-06-27T07:42:57+00:00","description":"Discover detailed breakdown of top cyberattacks in June 2025, from Braodo Stealer abusing GitHub to NetSupportRAT delivered via LOLBins.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"Top 3 Cyber Attacks in June 2025: GitHub Abuse, Control Flow Flattening, and More\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/14463"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=14463"}],"version-history":[{"count":7,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/14463\/revisions"}],"predecessor-version":[{"id":14495,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/14463\/revisions\/14495"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/14467"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=14463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=14463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=14463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}