Weekly Threat Digest: JUNE 9 to 15 2025
For a detailed threat digest, download the PDF file here

Summary
HiveForce Labs has observed a significant surge in cybersecurity threats, underscoring the growing complexity and frequency of cyber incidents. Over the past week, fourteen major attacks were detected, four critical vulnerabilities were actively exploited, and three threat actor groups were closely monitored, reflecting an alarming escalation in malicious activities.
Among the notable incidents, Blitz is a Windows-based malware distributed via fake Standoff 2 game cheats on Telegram. Separately, Stealth Falcon, a long-running cyber-espionage group, exploited a zero-day vulnerability in Windows (CVE-2025-33053) to breach a Turkish defense contractor.
North Korea-linked APT37 launched Operation ToyBox Story, a spear-phishing campaign using fileless malware and sophisticated social engineering to compromise strategic targets within South Korea. Meanwhile, cybercriminals have been hijacking expired or deleted Discord invite links, redirecting users to fake servers where disguised “verification” prompts install malware. These escalating threats highlight the increasing sophistication of cyber adversaries and reinforce the urgent need for proactive, resilient cybersecurity measures to combat the rapidly evolving global threat landscape.
Click here to Subscribe to receive our weekly threat digests and alerts directly in your inbox.