{"id":15111,"date":"2025-07-29T11:10:16","date_gmt":"2025-07-29T11:10:16","guid":{"rendered":"\/cybersecurity-blog\/?p=15111"},"modified":"2025-07-29T14:05:18","modified_gmt":"2025-07-29T14:05:18","slug":"cyber-attacks-july-2025","status":"publish","type":"post","link":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/","title":{"rendered":"Major Cyber Attacks in July 2025: Obfuscated .LNK\u2011Delivered DeerStealer, Fake 7\u2011Zip, and More"},"content":{"rendered":"\n<p>While cybercriminals were working overtime this July, so were we at ANY.RUN \u2014 and, dare we say, with better results. As always, we\u2019ve picked the most dangerous and intriguing attacks of the month. But this time, there\u2019s more.&nbsp;<\/p>\n\n\n\n<p>Alongside the monthly top, we are highlighting a key trend that\u2019s been powering campaigns throughout 2025: the top 5 Remote Access Tools most abused by threat actors in the first half of the year.&nbsp;<\/p>\n\n\n\n<p>The threats were investigated with ANY.RUN\u2019s <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a>, where you can trace the full attack chain and see malware behavior in action, and our <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktolookup\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> (available now for free), which helps you turn raw IOCs into actionable intelligence to better protect your organization.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">DeerStealer Delivered via Obfuscated .LNK and LOLBin Abuse&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/x.com\/anyrun_app\/status\/1945836857431834957\" target=\"_blank\" rel=\"noreferrer noopener\">Post On X<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-1-768x1024.jpg\" alt=\"\" class=\"wp-image-15087\" style=\"width:366px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-1-768x1024.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-1-225x300.jpg 225w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-1-1152x1536.jpg 1152w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-1-1536x2048.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-1-370x493.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-1-270x360.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-1-740x987.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-1.jpg 1800w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\"><em>Detailed DeerStealer attack chain<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The recent phishing campaign delivers malware through a fake PDF shortcut (<em>Report.lnk<\/em>) that leverages <em>mshta.exe<\/em> for script execution, which is a known LOLBin technique (<a href=\"https:\/\/attack.mitre.org\/techniques\/T1218\/005\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE T1218.005<\/a>). &nbsp;<\/p>\n\n\n\n<p>ANY.RUN\u2019s <a href=\"https:\/\/any.run\/cybersecurity-blog\/script-tracer\/\" target=\"_blank\" rel=\"noreferrer noopener\">Script Tracer<\/a> reveals the full chain, including wildcard LOLBin execution, encoded payloads, and network exfiltration, without requiring manual deobfuscation.&nbsp; &nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/02dd6096-b621-49a0-a7ef-4758cc957c0f\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View analysis session in the Sandbox<\/a>&nbsp;<\/p>\n\n\n\n<p>The attack begins with a <em>.lnk<\/em> file that covertly invokes <em>mshta.exe<\/em> to drop scripts for the next stages. The execution command is heavily obfuscated using wildcard paths.&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"499\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-14-1024x499.png\" alt=\"\" class=\"wp-image-15084\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-14-1024x499.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-14-300x146.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-14-768x374.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-14-1536x748.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-14-370x180.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-14-270x132.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-14-740x361.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image-14.png 1767w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Fake Report.lnk detonated in the sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>To evade signature-based detection, PowerShell dynamically resolves the full path to <em>mshta.exe<\/em> in the System32 directory. It is launched with flags, followed by obfuscated Base64 strings. Both logging and profiling are disabled to reduce forensic visibility during execution.&nbsp;<\/p>\n\n\n\n<p>Characters are decoded in pairs, converted from hex to ASCII, reassembled into a script, and executed via IEX. This ensures the malicious logic stays hidden until runtime. &nbsp;<\/p>\n\n\n\n<p>The script dynamically resolves URLs and binary content from obfuscated arrays, downloads a fake PDF to distract the user, writes the main executable into <em>AppData<\/em>, and silently runs it. The PDF is opened in Adobe Acrobat to distract the user. &nbsp;<br>&nbsp;<br>You can use Threat Intelligence Lookup to find malware samples using similar techniques with fake <em>.lnk <\/em>files and PowerShell commands to enrich your company&#8217;s detection systems. &nbsp;<br>&nbsp;<br>Search for suspicious shortcut attachments: <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522threatName:%255C%2522susp-lnk%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">threatName:&#8221;susp-lnk&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"391\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-8-1024x391.png\" alt=\"\" class=\"wp-image-15085\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-8-1024x391.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-8-300x114.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-8-768x293.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-8-370x141.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-8-270x103.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-8-740x282.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-8.png 1337w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Sandbox analyses of suspicious .lnk files<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Query TI Lookup for a snippet in PowerShell command: <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup#{%22query%22:%22commandLine:%5C%22|%20IEX%5C%22%22,%22dateRange%22:180}\" target=\"_blank\" rel=\"noreferrer noopener\">commandLine:&#8221;| IEX&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-3-1024x538.png\" alt=\"\" class=\"wp-image-15086\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-3-1024x538.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-3-300x158.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-3-768x403.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-3-370x194.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-3-270x142.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-3-740x389.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-3.png 1323w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>PowerShell command search results<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>IOC for the threat detection and research: &nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>https[:]\/\/tripplefury[.]com\/&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fd5a2f9eed065c5767d5323b8dd928ef8724ea2edeba3e4c83e211edf9ff0160&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>8f49254064d534459b7ec60bf4e21f75284fbabfaea511268c478e15f1ed0db9&nbsp;<\/li>\n<\/ul>\n\n\n\n<!-- Regular Banner START -->\n<div class=\"regular-banner\">\n<!-- Text Content -->\n<p class=\"regular-banner__text\">\nSpeed up triage and incident response<br>with instant access to <span class=\"highlight\">live attack data from 15K SOCs<\/span>&nbsp;   \n<\/p>\n<!-- CTA Link -->\n<a class=\"regular-banner__link\" id=\"article-banner-regular\" href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&#038;utm_medium=article&#038;utm_campaign=major_attacks_july_25&#038;utm_term=290725&#038;utm_content=linktolookup\" target=\"_blank\" rel=\"noopener\">\nTry TI Lookup. It&#8217;s free!\n<\/a>\n<\/div>\n<!-- Regular Banner END -->\n<!-- Regular Banner Styles START -->\n\n<style>\n.regular-banner {\ndisplay: flex;\ntext-align: center;\nflex-direction: column;\nalign-items: center;\ngap: 1.5rem;\nwidth: 100%;\npadding: 2rem;\nmargin: 1.5rem 0;\nborder-radius: 0.5rem;\nfont-family: 'Catamaran Bold';\nmargin-inline: auto;\nbackground: rgba(32, 168, 241, 0.1);\nborder: 1px solid rgba(75, 174, 227, 0.32);\n}\n\n.regular-banner__text {\nfont-size: 1.5rem;\nmargin: 0;\n}\n\n.highlight {\ncolor: #ea2526;\n}\n\n.regular-banner__link {\npadding: 0.5rem 1.5rem;\nfont-weight: 500;\ntext-decoration: none;\nborder-radius: 0.5rem;\ncolor: #FFFFFF;\nbackground-color: #1491D4;\ntext-align: center;\ntransition: all 0.2s ease-in;\n}\n\n.regular-banner__link:hover {\nbackground-color: #68CBFF;\ncolor: white;\n}\n<\/style>\n<!-- Regular Banner Styles END -->\n\n\n\n<p>ANY.RUN\u2019s analysts were one of the first teams to research a DeerStealer distribution campaign when it had just emerged: <a href=\"https:\/\/any.run\/cybersecurity-blog\/deerstealer-campaign-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">read the article in our blog<\/a> and keep an eye on this malware. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Fake 7-Zip Installer Exfiltrates Active Directory Files\u00a0<\/h2>\n\n\n\n<p><a href=\"https:\/\/x.com\/anyrun_app\/status\/1942905210294124892\/photo\/1\" target=\"_blank\" rel=\"noreferrer noopener\">Post on X<\/a>&nbsp;<\/p>\n\n\n\n<p>A malicious installer disguised as 7-Zip steals critical Active Directory files, including <em>ntds.dit<\/em> and the <em>SYSTEM <\/em>hive, by leveraging shadow copies and exfiltrating the data to a remote server.&nbsp;<\/p>\n\n\n\n<p>Upon execution, the malware creates a shadow copy of the system drive to bypass file locks and extract protected files without disrupting system operations.&nbsp;It then copies <em>ntds.dit<\/em>, which contains Active Directory user and group data, and SYSTEM, which holds the corresponding encryption keys.&nbsp;<\/p>\n\n\n\n<p>The malware connects to a remote server via SMB using hardcoded credentials. All output is redirected to NUL to minimize traces.&nbsp;<\/p>\n\n\n\n<p>This technique grants the attacker full access to <em>ntds.dit <\/em>dump, allowing them to extract credentials for Active Directory objects and enables lateral movement techniques such as Pass-the-Hash or Golden Ticket.&nbsp;<br>&nbsp;<br>ANY.RUN\u2019s Sandbox makes it easy to detect these stealthy operations by providing full behavioral visibility, from network exfiltration to credential staging, within a single interactive session.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/7f03cd5b-ad02-4b3a-871f-c31ac0f5dc15\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">View an example of such session<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-1024x1024.jpg\" alt=\"\" class=\"wp-image-15088\" style=\"width:428px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-1024x1024.jpg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-300x300.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-150x150.jpg 150w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-768x768.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-1536x1536.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-70x70.jpg 70w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-370x370.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-270x270.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2-740x740.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image2.jpg 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Malicious processes shaping the attack chain, visible in Sandbox analyses<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>Look the malicious file up by its hash to analyze similar attacks and gather IOCs: &nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522sha256:%255C%252217a5512e09311e10465f432e1a093cd484bbd4b63b3fb25e6fbb1861a2a3520b%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">sha256:&#8221;17a5512e09311e10465f432e1a093cd484bbd4b63b3fb25e6fbb1861a2a3520b&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"341\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-4-1024x341.png\" alt=\"\" class=\"wp-image-15089\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-4-1024x341.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-4-300x100.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-4-768x255.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-4-370x123.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-4-270x90.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-4-740x246.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-4.png 1341w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Samples with the same file in the Sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Control-Flow Flattening Obfuscated JavaScript Drops Snake Keylogger\u00a0<\/h2>\n\n\n\n<p><a href=\"https:\/\/x.com\/anyrun_app\/status\/1948390434323022311\" target=\"_blank\" rel=\"noreferrer noopener\">Post On X<\/a>\u00a0<\/p>\n\n\n\n<p>As our data shows, <a href=\"https:\/\/any.run\/cybersecurity-blog\/salvador-stealer-malware-analysis\/\" target=\"_blank\" rel=\"noreferrer noopener\">banking<\/a> is the most <a href=\"https:\/\/any.run\/cybersecurity-blog\/nitrogen-ransomware-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">affected<\/a> sector among our users, nearly matching all the other industries combined. As part of widespread MaaS phishing campaigns, <a href=\"https:\/\/any.run\/malware-trends\/snakekeylogger\/\" target=\"_blank\" rel=\"noreferrer noopener\">Snake<\/a> targets high-value industries including fintech, healthcare, and energy, making instant threat visibility and behavioral analysis essential.&nbsp;<\/p>\n\n\n\n<p>In this attack, the malware uses layered obfuscation to hide execution logic and evade traditional detection.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/app.any.run\/tasks\/0d53bef9-c623-4c2f-9ce9-f1d3d05d21f3\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">See execution on a live system<\/a> and download actionable report:&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"513\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-5-1024x513.png\" alt=\"\" class=\"wp-image-15090\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-5-1024x513.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-5-300x150.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-5-768x385.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-5-1536x770.png 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-5-370x186.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-5-270x135.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-5-740x371.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image5-5.png 1771w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Snake Keylogger analysis in ANY.RUN\u2019s Sandbox<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>The attack begins with a loader using control-flow flattening (MITRE T1027.010) to obscure its logic behind nested while-loops and string shifts.<\/p>\n\n\n\n<p>The loader uses COM automation via WshShell3, avoiding direct PowerShell or CMD calls and bypassing common detection rules. \u00a0<\/p>\n\n\n\n<p>Obfuscated CMD scripts include non-ASCII (Japanese) characters and environment variables like <em>%\u2026%<\/em>, further complicating static and dynamic analysis.&nbsp;<\/p>\n\n\n\n<p>Two CMD scripts are dropped into ProgramData to prepare the execution environment. This stage involves LOLBAS abuse: legitimate DLLs are copied from <em>SysWOW64 <\/em>into <em>\u201c\/Windows \/\u201d<\/em> and <em>Public <\/em>directories. The operation is performed using <em>extrac32.exe<\/em>, a known LOLBin and JS script functionality. This combination helps bypass detection by imitating trusted system behavior. &nbsp;<\/p>\n\n\n\n<p>Persistence is established by creating a Run registry key pointing to a .url file containing the execution path. Snake is launched after a short delay using a PING, staggering execution.&nbsp;<br>&nbsp;<br>Explore ANY.RUN\u2019s threat database to proactively hunt for similar threats and techniques and improve the precision and efficiency of your organization&#8217;s security response. Here are several examples of Threat Intelligence Lookup search requests that allow to discover malware samples using the above-described TTPs: &nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522commandLine:%255C%2522ping%2520%2520127.0.0.1%2520-n%252010%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">commandLine:&#8221;ping&nbsp; 127.0.0.1 -n 10&#8243;<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522commandLine:%255C%2522%255C%255C%255C%255CWindows%2520%255C%255C%255C%255C%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">commandLine:&#8221;\\\\Windows \\\\&#8221;<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522commandLine:%255C%2522extrac32*.dll*.%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">commandLine:&#8221;extrac32*.dll*.&#8221;<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktotilookup#%7B%2522query%2522:%2522registryKey:%255C%2522%255C%255CRun$%255C%2522%2520AND%2520registryValue:%255C%2522.url$%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">registryKey:&#8221;\\Run$&#8221; AND registryValue:&#8221;.url$&#8221;<\/a>&nbsp;<br>&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"540\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-6-1024x540.png\" alt=\"\" class=\"wp-image-15091\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-6-1024x540.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-6-300x158.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-6-768x405.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-6-370x195.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-6-270x142.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-6-740x390.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image6-6.png 1325w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Lookup by registry modification artifacts<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p><strong>IOCs: <\/strong>&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>54fcf77b7b6ca66ea4a2719b3209f18409edea8e7e7514cf85dc6bcde0745403 &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ae53759b1047c267da1e068d1e14822d158e045c6a81e4bf114bd9981473abbd &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>efd8444c42d4388251d4bc477fb712986676bc1752f30c9ad89ded67462a59a0 &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dbe81bbd0c3f8cb44eb45cd4d3669bd72bf95003804328d8f02417c2df49c481&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>183e98cd972ec4e2ff66b9503559e188a040532464ee4f979f704aa5224f4976&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>reallyfreegeoip[.]org &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>104[.]21[.]96[.]1 &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>https[:]\/\/reallyfreegeoip[.]org\/xml\/78[.]88[.]249[.]143 &nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>registryValue: Iaakcppq.url&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"1024\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-768x1024.jpg\" alt=\"\" class=\"wp-image-15095\" style=\"width:396px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-768x1024.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-225x300.jpg 225w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-1152x1536.jpg 1152w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-1536x2048.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-370x493.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-270x360.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3-740x987.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image3.jpg 1800w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/><figcaption class=\"wp-element-caption\"><em>Snake Keylogger attack chain<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Top 5 Remote Access Tools Exploited by Threat Actors in the First Half of 2025&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/x.com\/anyrun_app\/status\/1940370520941170753\" target=\"_blank\" rel=\"noreferrer noopener\">Post on X<\/a> &nbsp;<\/p>\n\n\n\n<p>While legitimate and widely used by IT teams, Remote Monitoring and Management tools are increasingly used by threat actors to establish persistence, bypass defenses, and exfiltrate data.&nbsp;<br>&nbsp;<br>In the first half of 2025, ANY.RUN observed a significant number of malware samples leveraging known RMM software for malicious access. Here are the 5 most frequently abused tools illustrated with sandbox malware sample analyses:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>ScreenConnect<\/strong> \u2013 3,829 sandbox analyses, <a href=\"https:\/\/app.any.run\/tasks\/3aa42d2e-8b91-4b8c-8bbb-e2b733194294\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">view one<\/a>;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>UltraVNC <\/strong>\u2013 2,117 sandbox analyses, <a href=\"https:\/\/app.any.run\/tasks\/1b7234a0-ab11-4301-a5e7-9e157acfad95\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">view one<\/a>;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/any.run\/malware-trends\/netsupport\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>NetSupport<\/strong><\/a><strong> <\/strong>\u2013 746 sandbox analyses, <a href=\"https:\/\/app.any.run\/tasks\/6740b646-2763-4969-9afe-31104dff0d81\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">view one<\/a>;&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>PDQ Connect<\/strong> \u2013 230 sandbox analyses, <a href=\"https:\/\/app.any.run\/tasks\/05948d1c-3128-4daa-97e5-60dd9991c115\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">view one;<\/a>&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Atera <\/strong>\u2013 171 sandbox analyses, <a href=\"https:\/\/app.any.run\/tasks\/61e01084-e442-4bb7-a725-1667128573ce\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktoservice\" target=\"_blank\" rel=\"noreferrer noopener\">view one<\/a>.&nbsp;<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"709\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-1024x709.jpg\" alt=\"\" class=\"wp-image-15093\" style=\"width:462px;height:auto\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-1024x709.jpg 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-300x208.jpg 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-768x532.jpg 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-1536x1063.jpg 1536w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-370x256.jpg 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-270x187.jpg 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-435x300.jpg 435w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4-740x512.jpg 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image4.jpg 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>RMM H1 2025 by Sandbox sample uploads<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<p>To support faster detection and investigation, we\u2019ve added the rmm-tool tag in Threat Intelligence&nbsp;Lookup, making it easier for threat hunters and incident responders to track RMM-based intrusions. Use the \u201cthreatName\u201d search parameter to sort out sandbox sessions featuring remote access software and malware. &nbsp;<br>&nbsp;<br><a href=\"https:\/\/intelligence.any.run\/analysis\/lookup#%7B%2522query%2522:%2522threatName:%255C%2522rmm-tool%255C%2522%2522,%2522dateRange%2522:180%7D\" target=\"_blank\" rel=\"noreferrer noopener\">threatName:&#8221;rmm-tool&#8221;<\/a>&nbsp;<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"529\" src=\"\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-5-1024x529.png\" alt=\"\" class=\"wp-image-15094\" srcset=\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-5-1024x529.png 1024w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-5-300x155.png 300w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-5-768x397.png 768w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-5-370x191.png 370w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-5-270x140.png 270w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-5-740x383.png 740w, https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2025\/07\/image7-5.png 1329w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Recent RMM abuse cases in the last 180 days<\/em>&nbsp;<\/figcaption><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Actionable Summary: From Visibility to Security&nbsp;<\/h2>\n\n\n\n<p>The attacks we\u2019ve reviewed this month showcase the growing sophistication and stealth of threat actors \u2014 from abusing LOLBins and fake installers to hijacking legitimate RMM tools. Detecting, understanding, and responding to such threats demands more than just static indicators. It requires deep behavioral insight and high-fidelity threat intelligence.&nbsp;<br>&nbsp;<br><a href=\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-june-2025\/\" target=\"_blank\" rel=\"noreferrer noopener\">View June\u2019s top threats analysis to compare trends and scale your threat landscape understanding.<\/a> &nbsp;<\/p>\n\n\n\n<p>ANY.RUN\u2019s <a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">Interactive Sandbox<\/a> empowers malware analysts to dissect the full attack chain, observe real payload execution, and uncover hidden behaviors without getting lost in obfuscation or waiting for post-mortem reports. You don\u2019t just watch malware \u2014 you watch it work.&nbsp;<\/p>\n\n\n\n<p>Meanwhile, <a href=\"https:\/\/intelligence.any.run\/analysis\/lookup\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktolookup\" target=\"_blank\" rel=\"noreferrer noopener\">Threat Intelligence Lookup<\/a> helps you connect the dots across thousands of similar cases: identify recurring tactics, extract IOC patterns, and enrich detection rules with real, contextualized data. Whether you\u2019re tracing fake .lnk campaigns or hunting RMM-based persistence, it gives you a shortcut to actionable answers.&nbsp;<\/p>\n\n\n\n<p>As attackers get bolder, your investigation workflow has to get smarter \u2014 and faster. ANY.RUN is here to support both.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">About ANY.RUN&nbsp;<\/h2>\n\n\n\n<p><a href=\"https:\/\/any.run\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktolanding\" target=\"_blank\" rel=\"noreferrer noopener\">ANY.RUN<\/a> supports over <a href=\"https:\/\/any.run\/cybersecurity-blog\/threat-intelligence-from-organizations\/\" target=\"_blank\" rel=\"noreferrer noopener\">15,000 organizations<\/a> across industries such as banking, manufacturing, telecommunications, healthcare, retail, and technology, helping them build stronger and more resilient cybersecurity operations.&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Designed to accelerate threat detection and improve response times, ANY.RUN equips teams with interactive malware analysis capabilities and real-time threat intelligence.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/any.run\/demo\/?utm_source=anyrunblog&amp;utm_medium=article&amp;utm_campaign=major_attacks_july_25&amp;utm_term=290725&amp;utm_content=linktodemo\" target=\"_blank\" rel=\"noreferrer noopener\">Integrate ANY.RUN\u2019s Threat Intelligence suite in your organization<\/a>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>While cybercriminals were working overtime this July, so were we at ANY.RUN \u2014 and, dare we say, with better results. As always, we\u2019ve picked the most dangerous and intriguing attacks of the month. But this time, there\u2019s more.&nbsp; Alongside the monthly top, we are highlighting a key trend that\u2019s been powering campaigns throughout 2025: the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":15080,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[57,10,34,40],"class_list":["post-15111","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-analysis","tag-anyrun","tag-cybersecurity","tag-malware-analysis","tag-malware-behavior"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Major Cyber Attacks in July 2025 SOCs Cannot Ignore<\/title>\n<meta name=\"description\" content=\"Discover detailed breakdown of top cyberattacks in July 2025, from DeerStealer with LNK and LOLBin abuse to Remote Access Tools exploits.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ANY.RUN\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/\"},\"author\":{\"name\":\"ANY.RUN\",\"@id\":\"https:\/\/any.run\/\"},\"headline\":\"Major Cyber Attacks in July 2025: Obfuscated .LNK\u2011Delivered DeerStealer, Fake 7\u2011Zip, and More\",\"datePublished\":\"2025-07-29T11:10:16+00:00\",\"dateModified\":\"2025-07-29T14:05:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/\"},\"wordCount\":1589,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"keywords\":[\"ANYRUN\",\"cybersecurity\",\"malware analysis\",\"malware behavior\"],\"articleSection\":[\"Malware Analysis\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/\",\"name\":\"Major Cyber Attacks in July 2025 SOCs Cannot Ignore\",\"isPartOf\":{\"@id\":\"https:\/\/any.run\/\"},\"datePublished\":\"2025-07-29T11:10:16+00:00\",\"dateModified\":\"2025-07-29T14:05:18+00:00\",\"description\":\"Discover detailed breakdown of top cyberattacks in July 2025, from DeerStealer with LNK and LOLBin abuse to Remote Access Tools exploits.\",\"breadcrumb\":{\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware Analysis\",\"item\":\"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Major Cyber Attacks in July 2025: Obfuscated .LNK\u2011Delivered DeerStealer, Fake 7\u2011Zip, and More\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN&#039;s Cybersecurity Blog\",\"description\":\"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.\",\"publisher\":{\"@id\":\"https:\/\/any.run\/\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/any.run\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"url\":\"https:\/\/any.run\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"contentUrl\":\"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg\",\"width\":1,\"height\":1,\"caption\":\"ANY.RUN\"},\"image\":{\"@id\":\"https:\/\/any.run\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/www.any.run\/\",\"https:\/\/twitter.com\/anyrun_app\",\"https:\/\/www.linkedin.com\/company\/30692044\",\"https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/any.run\/\",\"name\":\"ANY.RUN\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/any.run\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g\",\"caption\":\"ANY.RUN\"},\"url\":\"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Major Cyber Attacks in July 2025 SOCs Cannot Ignore","description":"Discover detailed breakdown of top cyberattacks in July 2025, from DeerStealer with LNK and LOLBin abuse to Remote Access Tools exploits.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/","twitter_misc":{"Written by":"ANY.RUN","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/#article","isPartOf":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/"},"author":{"name":"ANY.RUN","@id":"https:\/\/any.run\/"},"headline":"Major Cyber Attacks in July 2025: Obfuscated .LNK\u2011Delivered DeerStealer, Fake 7\u2011Zip, and More","datePublished":"2025-07-29T11:10:16+00:00","dateModified":"2025-07-29T14:05:18+00:00","mainEntityOfPage":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/"},"wordCount":1589,"commentCount":0,"publisher":{"@id":"https:\/\/any.run\/"},"keywords":["ANYRUN","cybersecurity","malware analysis","malware behavior"],"articleSection":["Malware Analysis"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/","url":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/","name":"Major Cyber Attacks in July 2025 SOCs Cannot Ignore","isPartOf":{"@id":"https:\/\/any.run\/"},"datePublished":"2025-07-29T11:10:16+00:00","dateModified":"2025-07-29T14:05:18+00:00","description":"Discover detailed breakdown of top cyberattacks in July 2025, from DeerStealer with LNK and LOLBin abuse to Remote Access Tools exploits.","breadcrumb":{"@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/any.run\/cybersecurity-blog\/cyber-attacks-july-2025\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/any.run\/cybersecurity-blog\/"},{"@type":"ListItem","position":2,"name":"Malware Analysis","item":"https:\/\/any.run\/cybersecurity-blog\/category\/malware-analysis\/"},{"@type":"ListItem","position":3,"name":"Major Cyber Attacks in July 2025: Obfuscated .LNK\u2011Delivered DeerStealer, Fake 7\u2011Zip, and More"}]},{"@type":"WebSite","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/","name":"ANY.RUN&#039;s Cybersecurity Blog","description":"Cybersecurity Blog covers topics for experienced professionals as well as for those new to it.","publisher":{"@id":"https:\/\/any.run\/"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/any.run\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/any.run\/","name":"ANY.RUN","url":"https:\/\/any.run\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","contentUrl":"https:\/\/any.run\/cybersecurity-blog\/wp-content\/uploads\/2020\/08\/ANYRUN-Icon.svg","width":1,"height":1,"caption":"ANY.RUN"},"image":{"@id":"https:\/\/any.run\/"},"sameAs":["https:\/\/www.facebook.com\/www.any.run\/","https:\/\/twitter.com\/anyrun_app","https:\/\/www.linkedin.com\/company\/30692044","https:\/\/www.youtube.com\/channel\/UCOgCPho7lzmH7m6fPNlukrQ"]},{"@type":"Person","@id":"https:\/\/any.run\/","name":"ANY.RUN","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/any.run\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4ce3a6c672056b4a8cd6b0110782215?s=96&d=mm&r=g","caption":"ANY.RUN"},"url":"https:\/\/any.run\/cybersecurity-blog\/author\/a-bespalova\/"}]}},"_links":{"self":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/15111"}],"collection":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/comments?post=15111"}],"version-history":[{"count":9,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/15111\/revisions"}],"predecessor-version":[{"id":15136,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/posts\/15111\/revisions\/15136"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media\/15080"}],"wp:attachment":[{"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/media?parent=15111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/categories?post=15111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/any.run\/cybersecurity-blog\/wp-json\/wp\/v2\/tags?post=15111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}