Security Roundup: May 2025 | Kocho
Skip to content
Funnel overlay image

May Security Roundup

arrow icon arrow icon

From Kocho’s Security Operations Centre (SOC)

Published: 29 May 2025

Discover the threats our security operations team have been monitoring this month, and their advice to keep you safe.

This month:

  • Babuk ransomware slips past SentinelOne protections
  • Russian hacktivists strike UK council websites
  • DragonForce attacks hit UK retailers hard
  • VoLTE vulnerability puts O2 customers on the map
  • Stealthy Chrome extensions steal credentials and control

Novel EDR bypass exposes SentinelOne-protected systems to Babuk ransomware

A new attack strategy, termed Bring Your Own Installer, is being used to bypass protections in SentinelOne’s Endpoint Detection and Response (EDR) solution.

The technique takes advantage of misconfigured installations, manipulating the upgrade and downgrade process to disable anti-tamper safeguards.

The attack began when threat actors exploited a known CVE in a publicly accessible server, gaining local admin access. From there, they deployed Babuk ransomware by crafting multiple legitimate SentinelOne installer versions and manipulating product version changes.

These actions left behind numerous event logs and forensic indicators of tampering.

What’s the risk?

  • Bypasses core endpoint protections, allowing malware to run unchecked
  • Enables full deployment of ransomware such as Babuk
  • Forensic traces may be missed in environments without deep monitoring
  • Misconfiguration leaves organisations unknowingly exposed

Recommended mitigation

Ebony and green hand and padlock icon on transparent background

Enable Local Agent Passphrase to prevent unauthorised upgrades or uninstalls

Green and ebony thumbs up icon on transparent background

Enable Online Upgrade Authorisation to control upgrade attempts via the console

Action point

Review your SentinelOne configuration. If not already active, enable Online Upgrade Authorisation – now a default for new installs – to ensure protection against this exploit.

Pro-Russian DDoS attacks target UK councils

On 8 May, the pro-Russian hacker group NoName057(16) launched a campaign of distributed denial-of-service (DDoS) attacks on UK government-affiliated websites.

Their targets included multiple local councils and the Association for Police and Crime Commissioners.

Portsmouth, Salford, Bury, and Trafford councils reported brief disruptions, while others reported no impact. The group cited political motivations, blaming the UK’s role in the Ukraine conflict.

What’s the risk?

  • Disruption of public-facing digital services
  • Reduced public trust in government IT resilience
  • Exposure of inadequately defended infrastructure
  • Increased likelihood of future, more sophisticated attacks

Recommended mitigation

Green and ebony tools on transparent background

Use DDoS mitigation tools and services.

Ebony and green spinning cog icon on transparent background

Distribute traffic via content delivery networks (CDNs).

Configure firewalls and intrusion prevention systems.

Ebony and green shields icon on transparent background

Work with ISPs that offer DDoS protection.

Action point

Audit your organisation’s DDoS readiness. Ensure protections are in place and test your response plan to reduce recovery time.

Ransomware chaos at major UK retailers

A wave of coordinated ransomware attacks in late April and early May disrupted operations at major high street retailers including M&S, Co-op, and Harrods.

The attackers gained access through identity compromise and social engineering, exfiltrating sensitive files (such as NTDS.dit files containing domain user password hashes), and deploying DragonForce ransomware across IT estates.

The result was a significant breakdown in operational continuity: internal systems were taken offline, online order platforms became unavailable, and stock availability in physical stores was heavily affected. Customers and staff alike experienced visible service disruption, while organisations were forced into full-scale incident response mode.

What’s the risk?

  • Total loss of access to core systems and services
  • Large-scale data compromise
  • Operational paralysis across customer-facing channels
  • Financial loss from ransom demands and business disruption

Recommended mitigation

Ebony fingerprint icon on transparent background

Implement strong identity and access controls with MFA.

Regularly audit and rotate privileged credentials.

Ebony and green tick person in brackets icon on transparent background

Train staff to recognise phishing and impersonation tactics.

Ebony and green bell icon on transparent background

Conduct cyber incident drills.

Action point

Run a full Active Directory hygiene check. Reassess your backup, recovery, and incident response strategies to reflect the growing threat of human-led ransomware campaigns.

Watch 3-minute Security Posture Assessment Demo

See for yourself how a Security Posture Assessment helps you:

  • Improve visibility of security threats
  • Prioritise threats based on risk and effort
  • Track improvements and measure ROI
  • Stop wasting money with smarter investments

O2 VoLTE flaw exposes user locations

A vulnerability in O2’s Voice over LTE (VoLTE) implementation exposed sensitive metadata to any caller.

This included the recipient’s IMSI, IMEI, cell tower ID, and location area code, making it possible to determine their real-time location either domestically or abroad.

Security researcher Daniel Williams demonstrated this by successfully tracking a user in Copenhagen. The issue affected only O2’s network and has since been resolved.

What’s the risk?

  • Real-time user location tracking by malicious actors
  • Potential targeting of high-risk individuals or organisations
  • Increased privacy concerns for roaming users
  • Exploitation of mobile infrastructure flaws for surveillance

Recommended mitigation

Ebony and green tickbox 'done,' icon on transparent background

Ensure SIP responses are stripped of sensitive metadata.

Green and ebony magnifying glass and line icon on transparent background

Perform protocol-level security reviews for VoIP services.

Monitor for any unusual call patterns or signalling activity.

Action point

Request a configuration audit from your mobile or VoIP provider. If you operate custom SIP infrastructure, review exposure of metadata in SIP headers immediately.

100+ fake Chrome extensions uncovered

More than 100 malicious Chrome extensions were discovered in May posing as helpful tools, such as VPNs and AI assistants, but were in fact part of a large-scale phishing and credential theft campaign.

Available via the Chrome Web Store, these extensions harvested sensitive data, injected ads, and in some cases enabled remote access.

The incident exposed how easily threat actors can weaponise trusted platforms to reach unsuspecting users.

What’s the risk?

  • Credential theft and account compromise
  • Unauthorised system access via browser hijacking
  • Sensitive data exfiltration (e.g. banking or corporate access)
  • Long-term malware persistence on endpoints

Recommended mitigation

Ebony and green PC monitor document icon on transparent background

Audit browser extensions across your organisation.

Green and ebony tools on transparent background

Use browser management tools via Intune or GPO.

Ebony and green person presenting icon on transparent background

Educate users on extension permissions and red flags.

Ebony and green target crosshairs icon on transparent background

Maintain endpoint protection with real-time scanning.

Action point

Implement a company-wide browser extension policy. Block unverified extensions and limit installation rights to reduce exposure.

tag icon

From our blog

Session cookie theft: The hidden risk to cloud identity security

The recent session cookie hijacking method, aka Cookie-Bite, offers yet another reminder that malicious actors are always on the hunt for ways to bypass even robust security controls like multifactor authentication (MFA).

For enterprises heavily invested in Microsoft 365 and Entra ID, it’s a wake-up call to take a fresh look at session security, endpoint hygiene, and browser-based risks in identity-first environments.

tag icon

Let's talk!

30-day free trials and flexible contracts

Book a free Discovery Call and learn more about our AI-powered security operations service, XDR Rapid Protect.

Get more information on:

  • 30-day free trials for new partnerships
  • Flexible, 30-day contracts (no lock-in)
  • Microsoft-funded proof of concepts

Butterfly overlay image

Got a question? Need more information?

Our expert team is here to help.