A wave of sophisticated, concurrent cyber attacks targeting global entities across the financial, automotive, healthcare, and technology sectors reveals a strategic splintering of the threat landscape. The recent security incidents involving Invacare, Volkswagen Group, LV=, Versa Networks, and the persistent threats facing institutions like Habibbank and Computer Weekly are not isolated events. They are exemplars of three distinct and parallel threat models that define the new normal:
- The Professionalized RaaS Cartel: Ransomware-as-a-Service (RaaS) has evolved into a fully-fledged illicit industry. Groups like Qilin and Rhysida operate as sophisticated cartels, offering robust platforms, engaging in active recruitment, managing distinct “brands”, and deploying advanced evasion techniques—such as Rust-based payloads—specifically to bypass modern, AI-driven defenses.
- The Nation-State Supply Chain Attack: State-sponsored Advanced Persistent Threats (APTs), such as Volt Typhoon, are focusing on a different objective. By compromising core infrastructure and software-defined networking (SDN) providers like Versa Networks, they seek strategic, long-term access to thousands of downstream customers, prioritizing espionage and credential harvesting over immediate financial gain.
- The Commoditized MaaS Underworld: The barrier to entry for cybercrime has collapsed. Advanced info-stealers like Stealc and Remote Access Trojans (RATs) like SectopRAT are sold via Malware-as-a-Service (MaaS) subscriptions for as little as $100-200 per month. This creates a high-volume, automated “background radiation” of cyber threats capable of stealing credentials, crypto-wallets, and even hijacking live user sessions.
These incidents demonstrate that organizations must simultaneously defend against three fundamentally different adversaries: a “smash-and-grab” extortionist (Rhysida), a “low-and-slow” state-sponsored spy (Volt Typhoon), and a low-level, automated credential thief (Stealc). A defensive posture that focuses on only one of these threats will leave an organization critically exposed to the others.
Ransomware as a Business
The RaaS ecosystem is the dominant model for financially motivated cybercrime. Criminal enterprises develop and maintain sophisticated ransomware payloads, leak sites, and payment infrastructures, which they lease to “affiliates” who conduct the actual intrusions. The attacks on Invacare, Volkswagen, and LV=, along with the looming threat to institutions like Habibbank, illustrate the specialization and strategic divergence within this mature criminal market.
Rhysida’s Attack on Invacare
Victim Profile & Incident: On or around November 4-5, 2025, the Rhysida ransomware group claimed responsibility for a significant cyber attack on Invacare. Based in Elyria, Ohio, Invacare is a prominent international manufacturer of medical equipment for home and long-term care settings. This attack is part of a disturbing trend of Rhysida targeting the Healthcare and Public Health (HPH) sector, one of several industries the group has actively pursued since May 2023.
Threat Actor Profile: Rhysida: The group, named after a genus of centipede, emerged in May 2023 and is suspected to have origins in the Commonwealth of Independent States (CIS). Rhysida has established a reputation for high-impact, disruptive attacks, including the 2023 British Library cyberattack, the data dump from Insomniac Games, and attacks on the Chilean army.
Tactics, Techniques, and Procedures (TTPs):
- Initial Access: Rhysida affiliates typically gain their initial foothold via targeted phishing campaigns.
- Command and Control (C2): Following a breach, the group is known to deploy the Cobalt Strike framework, a common penetration testing tool, to manage its access and move laterally within the victim network.
- Payload & Extortion: The ransomware itself is a 64-bit Windows Portable Executable (PE) compiled with MINGW/GCC. As part of its double extortion tactic, the group drops distinctive PDF-based ransom notes in affected folders and demands payment in Bitcoin.
A critical contradiction defines this threat actor. Despite executing some of the past year’s most devastating and high-profile breaches, Rhysida’s encryption payload is described by researchers as being in its “early stages of development”. Analysis of samples shows the program name “Rhysida-0.1” and a lack of “commodity features such as VSS removal”, a standard function used by most ransomware to delete shadow copies and prevent easy recovery.
This apparent paradox strongly suggests that Rhysida’s encryption payload is not its primary weapon. The group’s success lies in its affiliates’ expertise in initial access (phishing) and lateral movement (Cobalt Strike). The group is highly skilled at infiltrating networks and exfiltrating massive volumes of data for double extortion, with the rudimentary encryptor serving merely as a final, destructive mechanism to force payment. This means that defensive strategies focused solely on detecting the final ransomware binary will fail; the decisive battle is lost much earlier in the kill chain.
Furthermore, Rhysida employs a unique psychological TTP. The group poses as a “cybersecurity team”, cynically framing the extortion as a “service” to help the victim identify and secure its network vulnerabilities. This narrative serves multiple purposes: it attempts to confuse the victim and stall a unified incident response; it provides a bizarre, quasi-plausible “penetration test” cover story; and, in the case of a healthcare provider like Invacare, it adds a layer of surreal mockery to amplify psychological pressure on the victim to pay.
StormouS.X and the Volkswagen Group
Victim Profile & Incident: On May 31, 2025, the threat group “StormouS.X” claimed to have breached the Volkswagen Group. The compromised asset was identified as a subdomain, fal-3a.prd.eu.dp.vwg-connect.com, which is associated with Volkswagen’s “vwg-connect.com” digital services platform for its connected vehicles. The actors claimed to have exfiltrated user account data and authentication tokens.
Threat Actor Profile: StormouS.X: This allegedly Arabic-speaking group has been active since at least 2021. After a period of quiet, it resurfaced with a new data leak site in 2023 and 2025.
- Motivation: The group is explicitly political, having sided with Russia in its conflict with Ukraine and claiming to focus its attacks on “Western countries” and companies.
- Professionalization: The group’s Tor site mimics a professional RaaS operation, featuring a “Shop” to sell stolen data and, notably, a “Job Application” page seeking to recruit individuals with expertise in ransomware programming, phishing, and social engineering.
However, there is a significant discrepancy between the group’s claims and its verified capabilities. Security researchers note that the group’s legitimacy is “questionable”. Some data leaked by StormouS.X has been “proven fabricated”, and the group has been observed recycling breach data from other threat actors.
This behavior suggests StormouS.X may not be a traditional RaaS group, but rather a hybrid of a politically motivated hacktivist collective and a for-profit extortion gang. The “Job Application” page signals an aspiration to build technical capability, but its reliance on “fabricated” claims suggests its primary product is propaganda. For a high-profile, symbolic target like Volkswagen, a major pillar of Western industry, the public claim of a breach—and the resulting brand damage and market uncertainty—may be the primary goal. The extortion is a secondary, opportunistic motive. This represents a model of “Patriotic Extortion,” where a geopolitical alignment is used as a brand to legitimize and amplify criminal activity.
Threats to the Financial Sector (LV= and Habibbank)
The financial sector remains the ultimate target for top-tier RaaS groups. The breach at LV= and the threat profile of Habibbank demonstrate the sophisticated, evolving TTPs used against these high-value, high-security environments.
Case Study 1: The CL0P Breach of LV=
On November 4, 2025, the major UK financial services and insurance firm LV= (Liverpool Victoria) was listed as a victim of the notorious “CL0P” ransomware group.
To understand this incident, two seemingly unrelated facts must be connected. First, LV= was breached by CL0P. Second, LV= has recently been undergoing a “significant business transformation programme” to migrate its core systems from incumbent vendors to a new “cloud-based solution,” a project involving complex “vendor relationships” for hosting and security.
Given the CL0P group’s well-established and infamous TTP of mass zero-day exploitation of secure file-transfer and SaaS vendors, this breach was almost certainly not a direct phishing attack on an LV= employee. It was a supply chain attack. It is highly probable that CL0P breached one of LV=’s new cloud or software vendors and, in doing so, inherited LV= as a victim. This incident is a stark warning: as financial firms like LV= and Habibbank migrate to the cloud, their attack surface expands to include the security posture of every SaaS partner in their supply chain.
Case Study 2 (Proxy Analysis): The Qilin Threat to Habibbank
While no breach is publicly confirmed, a major financial institution like Habibbank is a canonical target for the most sophisticated RaaS groups. The Qilin group represents the apex predator in this ecosystem.
Threat Actor Deep Dive: Qilin
Qilin is a highly professional, Russian-speaking RaaS operation that first appeared under the name “Agenda”. It executes a classic double extortion model—encrypting data and exfiltrating it for leverage—and is noted for avoiding targets within the CIS. Its technical TTPs are designed specifically to bypass the defenses of mature organizations like banks:
- Payload (Rust & Golang): Qilin is actively migrating its ransomware code from Golang to Rust. This is a critical and deliberate strategic decision. Rust-compiled binaries are memory-safe, notoriously difficult for reverse engineers to analyze, and, most importantly, have a low detection rate against traditional antivirus and EDR engines.
- Exfiltration (Living off the Land): Qilin affiliates have been observed using legitimate, open-source file transfer tools like Cyberduck to exfiltrate stolen data. This is a “Living off the Land” (LotL) technique designed to blend in with normal network traffic. For a large bank like Habibbank, where system administrators might use similar tools for cloud management, an attacker’s 2 TB data exfiltration would be effectively camouflaged.
- Destruction: To ensure maximum leverage and prevent recovery, Qilin operators actively target and delete victim backups.
Qilin’s TTPs represent a move toward “enterprise-grade” reliability and stealth. This is not just a tool; it is a platform built for efficiency and detection evasion. The use of Rust is a direct counter to the cybersecurity industry’s advancements in heuristic and AI-based detection, while the use of Cyberduck is a counter to network traffic analysis. This group is purpose-built to successfully breach the most high-value and well-defended targets.
Ransomware Group Comparison
The divergence in RaaS TTPs, motivations, and technical sophistication is clear. Security teams must understand that not all ransomware groups are the same; they represent specialized “offerings” in a criminal market, each requiring a different defensive focus.
Table 1: RaaS Group TTP Comparison
| Threat Actor | Origin / Affiliation | Key TTPs (Initial Access) | Evasion / Payload TTPs | Stated Motive | Key Targets |
| Qilin | Russian-speaking (Non-CIS) | Phishing / N-day Exploits | Rust & Golang payloads, Legitimate tools (Cyberduck) for exfil, Backup deletion | Financial (RaaS) | All (non-CIS) |
| Rhysida | CIS-based (Suspected) | Phishing, Cobalt Strike | “Rhysida-0.1” (immature payload), PDF ransom notes | Financial (RaaS) + “Vigilante” Posture | Healthcare, Education, Govt |
| StormouS.X | Arabic-speaking | Phishing, Social Engineering (Recruiting for) | Unknown / Questionable (Claims fabricated) | Political (Pro-Russian) + Financial | Western Companies |
State-Sponsored Infrastructure Attacks
This threat model moves beyond financial crime and into the realm of nation-state espionage. The objective is not a quick payout but long-term, persistent access to critical infrastructure for intelligence gathering and strategic positioning.
Volt Typhoon’s Attack on Versa Networks
Victim Profile & Vulnerability: The target in this operation is Versa Networks, a major provider of Secure Access Service Edge (SASE) and SD-WAN solutions. Its “Versa Director” platform is a key management component used by Internet Service Providers (ISPs) and Managed Service Providers (MSPs) to control their enterprise customers’ networks.
The Incident: CVE-2024-39717
A critical vulnerability, CVE-2024-39717, was discovered in Versa Director. The flaw is an “Unrestricted Upload of File with Dangerous Type”, which allows a privileged attacker to upload malicious files.
This vulnerability was added to the CISA Known Exploited Vulnerabilities (KEV) catalog on August 23, 2024. However, forensic analysis from Black Lotus Labs identified exploitation of this vulnerability in the wild as early as June 12, 2024. This gap confirms it was used by attackers as a zero-day for over two months before a patch was available.
Threat Actor Attribution: Volt Typhoon
Black Lotus Labs attributes the zero-day exploitation with “moderate confidence” to the Chinese state-sponsored threat actor Volt Typhoon (also known as Bronze Silhouette).
Tactics, Techniques, and Procedures (TTPs):
- Initial Access: The actors gain initial administrative access by exploiting an exposed Versa management port intended for high-availability pairing.
- Payload & Execution: After exploiting CVE-2024-39717, the actor deploys a custom, modular web shell named “VersaMem”.
- Evasion: The key TTP is that VersaMem is designed to “run exclusively in-memory“. This is a sophisticated counter-forensics technique. A payload running only in RAM will not write files to disk, making it invisible to traditional, file-based antivirus scanners. Furthermore, the payload is purged if the system reboots, destroying the primary evidence of the compromise.
This incident is a classic nation-state supply chain attack. The attackers did not target Versa Networks to ransom its data. The purpose of the “VersaMem” web shell was to “intercept and harvest credentials” to enable access into downstream customers’ networks.
Versa Director is the “god box”—the single point of control for thousands of enterprise networks managed by ISPs and MSPs. By compromising this central hub, Volt Typhoon gains a persistent, trusted foothold from which to harvest credentials and pivot into any of those downstream customers—including high-value government, military, and critical infrastructure organizations—at will.
The in-memory nature of the payload creates a “patch and pray” fallacy. CISA and Versa urged organizations to apply updates, but patching CVE-2024-39717 does not remediate an already-compromised system. The patch prevents new exploitation, but if the VersaMem web shell is already resident in memory, the attacker retains access. This is why CISA’s alert explicitly urged organizations to “hunt for any malicious activity”, not just apply the patch. Remediation requires a full-system memory dump and analysis or a “reboot and monitor” strategy, which is highly disruptive and may not evict a persistent actor. This long-tail, low-and-slow espionage threat is the hallmark of a nation-state campaign.
Table 2: Volt Typhoon TTPs and Defense
| MITRE ATT&CK ID (Est.) | Technique | Actor TTP (Description) | Defensive / Hunting Action |
| T1190 | Exploit Public-Facing Application | Exploitation of exposed Versa management port intended for HA pairing. | Audit and restrict all internet-facing management interfaces to trusted IP ranges. |
| T1505.003 | Web Shell | Deployment of “VersaMem” in-memory web shell post-exploitation. | Hunt for anomalous processes spawned by the Versa Director service. Conduct memory forensic analysis on suspect nodes. |
| T1003 | OS Credential Dumping | VersaMem intercepts and harvests credentials of authenticated users. | Monitor for anomalous credential use from the Versa Director node. Force rotate all credentials for downstream devices. |
| T1071.001 | Web Protocols | C2 communication from the VersaMem web shell. | Monitor for unusual outbound HTTP/S connections from the Versa Director appliance. |
The ‘Malware-as-a-Service’ Economy
This third threat model represents the commoditization of cybercrime. These are not targeted, high-stakes attacks but a high-volume, automated “dragnet” designed to infect as many victims as possible for low-level credential, session, and cryptocurrency theft. A media and technology entity like Computer Weekly, which handles sensitive research, sources, and subscriber data, is a prime target for this model.
The Redline Stealer Threat
Publications like Computer Weekly are not just reporters on cyber threats like Redline Stealer; they are targets. A journalist’s stolen browser credentials could unlock sensitive source communications, pre-embargo research, and access to internal content management systems.
Threat Profile: Redline Stealer
Redline is a prolific info-stealer sold as a standalone binary or a subscription-based MaaS for $100-$150 per month. Its capabilities include:
- Harvesting saved credentials, autocomplete data, and credit card information from browsers.
- Stealing cryptocurrency from local wallet files.
- Collecting system information (username, hardware, installed security software).
- A primary distribution vector involves infected USB devices, a simple but effective social engineering method for bypassing network perimeter security (e.g., a “dropped” USB at a tech conference or in an office lobby).
A key development illustrates the resilience of the MaaS model. On October 28, 2024, a major law enforcement action dubbed “Operation Magnus” successfully disrupted and took down Redline’s centralized infrastructure, seizing servers and domains. While this was a significant victory, the threat was not eliminated. Redline is confirmed to be “still in use”. This is because “old, cracked copies of the malware… might still work”.
This creates a “zombie malware” problem. Law enforcement can seize centralized infrastructure, but they cannot seize every copy of the malware binary that was sold. The takedown merely decentralized the threat, empowering smaller criminals to run their own C2 servers using the cracked copies. For a CISO, this means the threat is now more fragmented, less predictable, and harder to track, as it no longer relies on a single, known C2 infrastructure.
New Malware: Stealc v2 and SectopRAT
The disruption of Redline created a market vacuum that new MaaS operators quickly filled, offering enhanced features and stealth.
Threat Profile: Stealc
Stealc is a C++ info-stealer that gained traction in early 2023, marketed as a competitor to Redline for around $200 per month. It is highly effective, targeting over 22 browsers and more than 70 web plugins and crypto-wallets.
In March 2025, the developer released “Stealc v2,” a major upgrade designed to capture Redline’s displaced customers. This new version introduced significant stealth TTPs:
- C2 Obfuscation: Stealc v2 uses RC4 encryption and a new JSON-based command-and-control protocol to hide its communications from network inspection tools.
- Stealthy Exfiltration: Unlike older stealers that bundle all stolen data into a single, large, and suspicious.zip archive, Stealc v2 exfiltrates data file by file. Each stolen cookie, password, or wallet file is sent to the C2 server in a separate HTTP POST request. This “death by a thousand cuts” exfiltration is designed to blend in with legitimate API and AJAX web traffic, making it incredibly difficult to detect.
Threat Profile: SectopRAT (aka ArechClient)
SectopRAT is a.NET Remote Access Trojan (RAT) that represents a far more dangerous class of commodity malware.
- Distribution TTP: Its primary vector is malvertising. The group leverages Google Ads to create malicious advertisements that masquerade as legitimate software installers, such as Google Chrome or Waterfox.
- Evasion TTP: To evade EDR and antivirus detection, the final payload is injected into a legitimate, signed Microsoft process,
MSBuild.exe.
SectopRAT’s most dangerous capability, however, is the creation of a “hidden secondary desktop”. Info-stealers like Redline and Stealc perform passive theft—they steal credentials for the attacker to use later. SectopRAT performs active session hijacking. The attacker can use this hidden desktop to remotely control the user’s live browser session without the user’s knowledge.
This TTP completely bypasses Multi-Factor Authentication (MFA). If an employee is already logged into their corporate VPN, O365, or financial portals, the attacker doesn’t need to steal the password or phish for an MFA token. They can simply use the existing, already-authenticated session from the hidden desktop to transfer funds, exfiltrate data, or pivot into the corporate network. This represents a significant escalation in the capabilities of “commodity” malware.
Malware-as-a-Service Comparison
The MaaS underworld is in a constant arms race, evolving from simple theft to advanced, stealthy session hijacking.
Table 3: MaaS Infostealer & RAT TTP Comparison
| Malware | Type | MaaS Price | Key Distribution TTP | Evasion & Payload TTP | Core “Selling Point” |
| Redline | Info-stealer | $100-$150 | Infected USB Devices | Harvests browsers, crypto-wallets | Bulk credential/crypto theft |
| Stealc v2 | Info-stealer | ~$200/month | Malicious files | RC4 encryption, File-by-file exfil (HTTP POST) | Stealthier credential/crypto theft |
| SectopRAT | RAT | Unknown | Google Ads Malvertising | MSBuild.exe injection, Hidden Desktop | Active session hijacking (MFA Bypass) |



