United Kingdom Online News
SEE OTHER BRANDS

Your daily news update on the United Kingdom

Octoberโ€™s Top Cyber Attacks Target Companies Worldwide: Google Careers Phishing, Figma Abuse, LockBit 5.0, and TyKit

DUBAI, DUBAI, UNITED ARAB EMIRATES, October 29, 2025 /EINPresswire.com/ -- Cyberattacks are accelerating in complexity, and this October was no exception. ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, reports that organizations worldwide faced an escalation of sophisticated phishing and ransomware campaigns exploiting trusted cloud infrastructure.

The October 2025 Threat Analysis highlights how threat actors are misusing legitimate platforms like Google, ClickUp, and Figma, while ransomware groups like LockBit continue expanding into new environments.

๐๐ก๐ข๐ฌ๐ก๐ข๐ง๐  ๐“๐ก๐ซ๐จ๐ฎ๐ ๐ก ๐“๐ซ๐ฎ๐ฌ๐ญ๐ž๐ ๐๐ฅ๐š๐ญ๐Ÿ๐จ๐ซ๐ฆ๐ฌ

Attackers are increasingly abusing Google Careers, ClickUp, and Figma to host phishing flows that look legitimate. These campaigns use Salesforce redirects, Cloudflare CAPTCHAs, and public prototypes to mimic Microsoft 365 or job application portals and steal credentials. By chaining multiple trusted domains, they bypass filters and reputation systems, leaving SOCs blind without behavioral analysis.

๐‹๐จ๐œ๐ค๐๐ข๐ญ ๐Ÿ“.๐ŸŽ ๐‘๐š๐ง๐ฌ๐จ๐ฆ๐ฐ๐š๐ซ๐ž

On its sixth anniversary, LockBit released a new version targeting Linux and VMware ESXi, marking a strategic move toward critical infrastructure. The variant can disable multiple virtual machines simultaneously, causing widespread outages across data centers and enterprise environments.

๐“๐ฒ๐Š๐ข๐ญ ๐๐ก๐ข๐ฌ๐ก๐ข๐ง๐  ๐Š๐ข๐ญ

ANY.RUN researchers uncovered TyKit, a reusable phishing kit hiding JavaScript inside SVG files to execute redirects and steal Microsoft 365 credentials. Active across finance, government, telecom, and education, it demonstrates how simple obfuscation can outsmart legacy detection.

For full technical details, live analyses, IOCs, and guidance on faster detection, visit the ANY.RUN blog.

๐€๐›๐จ๐ฎ๐ญ ๐€๐๐˜.๐‘๐”๐

ANY.RUN helps more than 15,000 organizations worldwide, including leaders in finance, healthcare, telecom, retail, and technology, strengthen cybersecurity operations with real-time malware analysis and live threat intelligence.

The suite combines interactive sandboxing with dynamic intelligence, enabling faster investigations, deeper visibility, and proactive threat prevention.

The ANY.RUN team
ANYRUN FZCO
+1 657-366-5050
email us here
Visit us on social media:
LinkedIn
YouTube
X

Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.

Share us

on your social networks:
AGPs

Get the latest news on this topic.

SIGN UP FOR FREE TODAY

No Thanks

By signing to this email alert, you
agree to our Terms & Conditions