Security Roundup: March 2025 | Kocho
Skip to content
Funnel overlay image

March Security Roundup

arrow icon arrow icon

From Kocho’s Security Operations Centre (SOC)

Published: 21 March 2025

Discover the threats that our security operations centre team have been monitoring this month, and their advice to keep you safe.

In the news this month: 

  • Russian actor launches phishing attacks targeting UK Microsoft accounts
  • Linux vulnerability allows local users to gain unauthorised system access
  • Lazarus Group infiltrates NPM to steal credentials and crypto data
  • Apple zero-day exploited in targeted attacks against iOS and macOS users
  • Hacktivists disrupt X with large-scale DDoS attack causing service outages

Cozy Bear targets Microsoft accounts in sophisticated phishing campaign

Russian state-sponsored threat actor Cozy Bear (also known as SVR) is behind a newly uncovered spear phishing campaign targeting Microsoft account users. The attackers impersonate officials from trusted entities such as the US State Department, the Ukrainian Ministry of Defence, and the European Parliament to initiate fake Microsoft Teams chats or meeting invites. UK organisations relying heavily on Microsoft 365 for remote or hybrid work are particularly at risk.

Once a user engages, they’re redirected to a malicious Microsoft Device Code authentication page, where any code entered is harvested by the attackers. This grants them long-term account access and the ability to exfiltrate sensitive data.

Risk to UK organisations

  • Long-term unauthorised access to Microsoft 365 accounts
  • Data breaches involving confidential or strategic information
  • Compromised communications within hybrid/remote teams

Recommended mitigation

Ebony and green mobile phone padlock icon on transparent background

Disable device code flow for Microsoft Entra ID.

Ebony fingerprint icon on transparent background

Implement Conditional Access policies that enforce MFA and restrict access to trusted devices and networks.

Ebony and green target crosshairs icon on transparent background

Monitor authentication logs for anomalous sign-ins and usage patterns.

In the event of a suspected compromise, use ‘revokeSignInSessions’ in Microsoft Graph API to invalidate tokens and force reauthentication.

Action point: Ensure all users, especially those with privileged access, are aware of this tactic and validate all Teams invites and authentication prompts carefully.

Linux kernel vulnerability enables local privilege escalation

A critical ‘Use-After-Free’ vulnerability (CVE-2021-3493) has been discovered in the Linux kernel’s netfilter module, which may allow local attackers to gain unauthorised system privileges through memory corruption.

Risk to UK organisations

  • Threat actors with local access can escalate privileges, bypassing standard security controls
  • Could be used in combination with other exploits to take full control of affected systems

Recommended mitigation

Ebony and green tickets on transparent background

Apply latest security patches: Canonical has released patches for Ubuntu 16.04, 18.04, and 20.04 LTS. Admins should verify their systems are up to date.

Audit local access controls to ensure minimal exposure for unauthorised users.

Action point: Review and apply vendor-specific patches across your Linux environments, including servers, containers, and embedded systems.

Keep pace with the latest security threats

Sign up to receive the latest threat intelligence articles and reports from our SecOps team.

Lazarus Group infiltrates NPM ecosystem with malicious packages

Six malicious JavaScript packages have been discovered on NPM, linked to the North Korean Lazarus Group. These packages, designed for credential theft, backdoor access, and cryptocurrency-related data exfiltration, used typosquatting to deceive developers into downloading them.

Lazarus is infamous for employing such tactics to penetrate valuable networks and carry out large-scale attacks. An example of their exploits includes the recent plundering of $1.5 billion in a crypto heist from the Bybit exchange.

Risk to UK organisations

  • Potential for credential theft and malware deployment in development environments
  • Increased risk to crypto and financial services organisations

Recommended mitigation

Green and ebony magnifying glass and line icon on transparent background

Encourage developers to verify package authenticity and check for abnormal behaviours.

Apple WebKit zero-day exploited in targeted attacks (CVE-2025-24201)

Apple has patched a zero-day vulnerability (CVE-2025-24201) in its WebKit browser engine, used across iOS, macOS, and Safari. The flaw allows attackers to perform out-of-bounds writes, enabling them to escape the web content sandbox. This has been exploited in sophisticated attacks targeting specific individuals on iOS versions before 17.2.

Risk to UK organisations

  • Targeted attacks on executives, journalists, or political figures using Apple devices
  • Potential data exfiltration via compromised web content

Recommended mitigation

Ensure all Apple devices are updated to the latest OS versions.

Ebony and green mobile phone padlock icon on transparent background

Consider Mobile Device Management (MDM) solutions for enforcing updates and monitoring device health.

Action point: Encourage users to update Apple devices immediately and apply security configurations that limit the use of third-party or unknown websites.

DDoS attack disrupts X (Twitter) services – Dark Storm claims responsibility

The social media platform X (formerly Twitter) experienced outages on 10 March 2025 due to a DDoS attack by pro-Palestinian hacktivist group Dark Storm. The group overwhelmed X’s servers and boasted of the disruption on their Telegram channel.

Risk to UK organisations

  • Increased DDoS threat landscape for public-facing services and platforms
  • Potential targeting of UK organisations based on political stances or affiliations

Recommended mitigation

Ebony and green tick shield and globe icon on transparent background

Ensure DDoS protection is in place via services like Cloudflare, AWS Shield, or Azure DDoS Protection.

Ebony and green shield tick and motion arrows icon on transparent background

Maintain a business continuity plan to manage potential downtime from cyberattacks.

Ebony and green alert search magnifying glass icon on transparent background

Monitor for threat intelligence related to hacktivist activity targeting UK sectors.

Action point: Assess the resilience of external-facing services and consider geo-blocking or rate-limiting where appropriate to reduce DDoS impact.

tag icon

From our blog

What you need to know about the Cyber Essentials changes

The latest changes to Cyber Essentials and Cyber Essentials Plus take effect from April 2025.

These updates aim to tackle modern threats with stronger requirements for passwordless authentication, remote work security, and vulnerability management.

All of which will align more closely with global standards.

Find out what this means for your organisation and how Kocho can support your certification journey.

Thanks to this month’s contributors from the Kocho SOC team: Joshua Powell, Nicci Smart, and James Monaghan

Stay safe. Stay informed.

tag icon

Let's talk!

30-day free trials and flexible contracts

Book a free Discovery Call and learn more about our AI-powered security operations service, XDR Rapid Protect.

Get more information on:

  • 30-day free trials for new partnerships
  • Flexible, 30-day contracts (no lock-in)
  • Microsoft-funded proof of concepts

Butterfly overlay image

Got a question? Need more information?

Our expert team is here to help.