XStore Documentation

June 25, 2025 – Cyber Briefing

👉 What’s trending in cybersecurity today?

FileFix attack exploits Windows Explorer for command execution, OneClik malware targets energy firms via ClickOnce, and Trezor support abused in phishing scam. Columbia University hit by unexplained IT outage, Mainline Health breach exposes 101K records, and Porto Nacional recovers from ransomware with backups. U.S. cybersecurity info-sharing law nears expiration, G7 backs new global cyber defense fund, and researchers deploy new tactics to cripple crypto-mining botnets.

 


🚨 Cyber Alerts

1. FileFix Attack Turns Explorer Into Weapon

A new social engineering technique called “FileFix” has been developed as a dangerous evolution of the “ClickFix” attack method. Discovered by a security researcher, the attack tricks users into running malicious commands through the Windows File Explorer address bar instead of a more suspicious command prompt. The method uses a phishing page and a clever copy-paste trick where a malicious PowerShell command is hidden behind a fake file path. This technique is particularly concerning as it exploits a familiar user interface and can bypass security training focused on traditional attack vectors.

2. OneClik Malware Attacks Energy Sector Firms

A sophisticated malware campaign dubbed “OneClik” is targeting the energy, oil, and gas sectors with advanced, stealthy attacks. Researchers at Trellix discovered the campaign, which abuses Microsoft’s ClickOnce technology and legitimate cloud services like AWS to bypass security controls. The infection chain typically begins with a spearphishing email that tricks victims into installing a backdoor called “RunnerBeacon.” While not definitively attributed, the tactics and techniques used in the campaign share overlaps with known China-linked threat actors.

3. Hackers Abuse Trezor Support For Phishing

Hardware wallet maker Trezor is warning users of a phishing campaign that abuses its own automated support system. Attackers are creating support tickets with alarming titles, which the system then automatically emails to users from an official Trezor email address. These legitimate-looking emails contain malicious links that lead to phishing sites designed to steal a user’s wallet recovery seed phrase. This incident follows several previous security breaches and phishing campaigns that have targeted Trezor users over the past few years.


💥 Cyber Incidents

4. Columbia University Probes Major IT Outage

Columbia University’s online platforms were knocked offline for hours yesterday morning, prompting an investigation with the New York Police Department. The widespread outage blocked student and staff access to essential services like email and the CourseWorks platform that professors use for assignments. While IT teams worked to restore services, a separate mystery unfolded as screens across campus began displaying bizarre images. University officials stated they could not definitively connect the strange images to the system outage and have discredited online posts from a group that had initially claimed responsibility.

5. Mainline Health Breach Hits 101,000 Patients

Arkansas-based Mainline Health Systems has begun notifying over 101,000 people that their personal data was stolen in a breach. The company determined last month that an unauthorized party had acquired sensitive information during a security incident that occurred back in April 2024. The exposed data includes a wide range of personal and protected health information, such as Social Security numbers, medical diagnoses, and financial details. The “Inc Ransom” ransomware group took credit for the attack in May 2024 as part of a broader campaign against the U.S. healthcare sector.

6. Porto Nacional City Hall Hit by Ransomware

The City Hall of Porto Nacional, Brazil, was hit by a ransomware attack that temporarily disrupted its internal systems and internet access. According to city officials, the attackers threatened to disclose personal data but were unable to copy or steal any files. The city’s technical team stated that the large volume of data, approximately 20 terabytes, made theft unfeasible and that no taxpayer or server data was compromised. Thanks to a daily backup system, the city is restoring all its services and will file a police report to investigate the crime.


📢 Cyber News

7. US Cyber Sharing Law Nears Expiration

A crucial U.S. cybersecurity law that underpins information sharing between the public and private sectors is set to expire on September 30th. With very few legislative days left on the calendar, analysts fear Congress may fail to renew the law or rush through a renewal without needed improvements. The Cybersecurity Information Sharing Act of 2015 (CISA 2015) has broad bipartisan support, but experts argue it is outdated and needs to be modernized to address current threats like AI manipulation. If the law lapses, it could severely damage the government’s visibility into threats against critical infrastructure and force many companies to stop sharing vital cyber threat data altogether.

8. G7 Backs New Global Cybersecurity Fund

A new Common Good Cyber Fund has been launched to support non-profit organizations that provide core cybersecurity services for the public. The first-of-its-kind effort aims to strengthen global cybersecurity, particularly for those most at risk, including journalists and human rights defenders. The governments of the United Kingdom and Canada have announced they will be the first to invest in the fund, with all G7 leaders also pledging their support. The fund will be managed by the Internet Society and will support services like securing core digital infrastructure and providing cybersecurity assistance to high-risk groups.

9. New Defensive Methods Stop Crypto Botnets

Cybersecurity researchers at Akamai have developed two new techniques designed to actively disrupt and shut down malicious cryptocurrency mining botnets. The first method, called “bad shares,” gets a botnet’s central mining proxy banned by intentionally submitting invalid work to the mining pool. The second method overwhelms a mining pool with over a thousand simultaneous login requests, forcing the pool to temporarily ban the attacker’s wallet address. These techniques allow defenders to disable malicious campaigns by exploiting the very policies and infrastructure the attackers rely upon.

Get Shield 360

 

💡 Cyber Tip

Stay Alert as Social Engineering Turns File Explorer Into a Malware Trap

A newly discovered social engineering technique called FileFix tricks users into running malicious PowerShell commands through the Windows File Explorer address bar. Disguised as a normal file path, the command is copied from a phishing page and executed when pasted, bypassing traditional security awareness focused on Run Dialog or Command Prompt abuse. This method relies on visual deception and exploits the trust users place in everyday interfaces.

✅ What you should do:

  • Never paste unknown paths or commands into the File Explorer address bar, especially from websites or unsolicited messages.
  • Train employees to recognize copy-paste based phishing tactics and to verify suspicious file-sharing requests.
  • Use endpoint protection tools that monitor command execution from non-standard interfaces like Explorer.
  • Enable security logging to detect unusual PowerShell activity or unexpected browser-child process chains.
  • Update security awareness training to include Explorer-based execution risks like FileFix.

🔒 Why this matters:

FileFix shows that attackers are now turning trusted system features like File Explorer into tools for malware delivery. Because the command appears harmless or invisible to users, even well-trained individuals can be tricked. Awareness of these new attack surfaces is essential to staying protected.

📚 Cyber Book

Cybersecurity Law: Protect Yourself and Your Customers by Shimon Brathwaite

Click to See Events

That concludes today’s briefing. You can check the top headlines here!

Copyright © 2025 CyberMaterial. All Rights Reserved.

Follow CyberMaterial on:

Substack, LinkedIn, Twitter, Reddit, Instagram, Facebook, YouTube, and Medium.

Get Help

Online Scam Prevention & Recovery

Schedule a free consultation

A free 15-min cybersecurity consultation