22nd December – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 22nd December, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES An adult content platform PornHub has disclosed a data breach linked to analytics provider Mixpanel. The breach exposed more than 200 million records related to Premium users, including email addresses, search, watch, […] The post 22nd December – Threat Intelligence Report appeared first on Check Point Research .
AI Analysis
Technical Summary
The December 22, 2025, threat intelligence report from Check Point Research outlines multiple high-impact cyber threats and vulnerabilities affecting diverse sectors globally, with significant implications for European organizations. Key incidents include a massive data breach at PornHub, linked to its analytics provider Mixpanel, exposing over 200 million records containing sensitive user metadata such as email addresses, search and watch histories, and location data, though excluding passwords and payment information. This breach is attributed to the ShinyHunters extortion group. Similarly, SoundCloud experienced a cyberattack compromising approximately 28 million user accounts, impacting email addresses and public profile information, also claimed by ShinyHunters. In the UK, DXS International, a technology supplier to the NHS, suffered unauthorized access to internal servers, raising concerns about potential patient data exposure despite no reported clinical service disruption. The report highlights critical vulnerabilities including CVE-2025-37164 in HPE OneView software, enabling unauthenticated remote code execution across all versions prior to 11.00, threatening centralized IT infrastructure management. Another critical vulnerability, CVE-2025-14733, affects WatchGuard Firebox firewalls, allowing unauthenticated remote code execution via an out-of-bounds write flaw exploitable without user interaction. Fortinet products face authentication bypass vulnerabilities (CVE-2025-59718 and CVE-2025-59719), permitting attackers to log in without credentials and export full device configurations, risking password exposure. The report also details advanced persistent threat activity by the Chinese group Ink Dragon targeting European governments through IIS server compromises and deployment of ShadowPad and FinalDraft backdoors for lateral movement and data exfiltration. Additionally, a Russia-affiliated group Z-Pentest conducted cyberattacks disrupting Denmark’s critical water infrastructure and electoral environment. Other notable incidents include cyberattacks on LKQ (auto parts giant), the University of Sydney, and Venezuela’s PDVSA oil company, illustrating a broad spectrum of targeted sectors. The report underscores the surge in AI-driven phishing and social engineering campaigns during the holiday season, increasing the overall threat landscape complexity. Protection technologies such as Check Point IPS, Threat Emulation, and Harmony Endpoint are recommended to mitigate these threats.
Potential Impact
European organizations face multifaceted risks from these incidents and vulnerabilities. The PornHub and SoundCloud breaches expose vast amounts of personal data, increasing risks of identity theft, phishing, and reputational damage, particularly affecting European users of these platforms. The DXS International breach raises concerns about potential NHS patient data exposure, which could undermine trust in healthcare services and lead to regulatory penalties under GDPR. Critical vulnerabilities in HPE OneView and WatchGuard Firebox products threaten the integrity and availability of centralized IT infrastructure and network security devices widely used in European enterprises, potentially enabling attackers to execute arbitrary code, disrupt operations, or gain persistent access. Fortinet authentication bypass flaws risk full device compromise, threatening network security across sectors. The Ink Dragon APT’s targeting of European governments indicates a strategic threat to national security and sensitive governmental operations, with potential for espionage and disruption. The disruption of Denmark’s water infrastructure by a Russia-affiliated group highlights the risk to critical infrastructure, with potential cascading effects on public safety and essential services. The combination of these threats increases the likelihood of data breaches, operational disruptions, and espionage activities across Europe, necessitating urgent and coordinated defensive measures.
Mitigation Recommendations
European organizations should prioritize immediate patching of critical vulnerabilities, specifically updating HPE OneView software to version 11.00 or later and applying WatchGuard Firebox Fireware OS patches addressing CVE-2025-14733. Fortinet device administrators must apply security updates to remediate authentication bypass vulnerabilities and rotate all device credentials post-patch. Organizations using Mixpanel or similar analytics services should review data sharing practices, enforce strict access controls, and monitor for suspicious activity related to user data. Healthcare suppliers and institutions should conduct thorough forensic investigations of breaches like the DXS International incident, enhance network segmentation, and implement zero-trust principles to limit lateral movement. Government entities must strengthen IIS server security by auditing configurations, deploying advanced endpoint detection and response (EDR) solutions, and monitoring for ShadowPad and FinalDraft backdoor indicators. Critical infrastructure operators, especially in water utilities, should collaborate with national cybersecurity agencies to implement enhanced intrusion detection, incident response plans, and threat intelligence sharing. Across sectors, organizations should increase user awareness training focused on AI-driven phishing scams, deploy multi-factor authentication with protections against SIM swapping, and utilize threat emulation and endpoint protection platforms to detect and block sophisticated malware loaders like GachiLoader. Regular backups, network segmentation, and continuous monitoring are essential to mitigate ransomware and extortion group threats such as ShinyHunters.
Affected Countries
United Kingdom, Denmark, Germany, France, Netherlands, Belgium, Sweden, Norway, Italy, Spain
22nd December – Threat Intelligence Report
Description
For the latest discoveries in cyber research for the week of 22nd December, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES An adult content platform PornHub has disclosed a data breach linked to analytics provider Mixpanel. The breach exposed more than 200 million records related to Premium users, including email addresses, search, watch, […] The post 22nd December – Threat Intelligence Report appeared first on Check Point Research .
AI-Powered Analysis
Technical Analysis
The December 22, 2025, threat intelligence report from Check Point Research outlines multiple high-impact cyber threats and vulnerabilities affecting diverse sectors globally, with significant implications for European organizations. Key incidents include a massive data breach at PornHub, linked to its analytics provider Mixpanel, exposing over 200 million records containing sensitive user metadata such as email addresses, search and watch histories, and location data, though excluding passwords and payment information. This breach is attributed to the ShinyHunters extortion group. Similarly, SoundCloud experienced a cyberattack compromising approximately 28 million user accounts, impacting email addresses and public profile information, also claimed by ShinyHunters. In the UK, DXS International, a technology supplier to the NHS, suffered unauthorized access to internal servers, raising concerns about potential patient data exposure despite no reported clinical service disruption. The report highlights critical vulnerabilities including CVE-2025-37164 in HPE OneView software, enabling unauthenticated remote code execution across all versions prior to 11.00, threatening centralized IT infrastructure management. Another critical vulnerability, CVE-2025-14733, affects WatchGuard Firebox firewalls, allowing unauthenticated remote code execution via an out-of-bounds write flaw exploitable without user interaction. Fortinet products face authentication bypass vulnerabilities (CVE-2025-59718 and CVE-2025-59719), permitting attackers to log in without credentials and export full device configurations, risking password exposure. The report also details advanced persistent threat activity by the Chinese group Ink Dragon targeting European governments through IIS server compromises and deployment of ShadowPad and FinalDraft backdoors for lateral movement and data exfiltration. Additionally, a Russia-affiliated group Z-Pentest conducted cyberattacks disrupting Denmark’s critical water infrastructure and electoral environment. Other notable incidents include cyberattacks on LKQ (auto parts giant), the University of Sydney, and Venezuela’s PDVSA oil company, illustrating a broad spectrum of targeted sectors. The report underscores the surge in AI-driven phishing and social engineering campaigns during the holiday season, increasing the overall threat landscape complexity. Protection technologies such as Check Point IPS, Threat Emulation, and Harmony Endpoint are recommended to mitigate these threats.
Potential Impact
European organizations face multifaceted risks from these incidents and vulnerabilities. The PornHub and SoundCloud breaches expose vast amounts of personal data, increasing risks of identity theft, phishing, and reputational damage, particularly affecting European users of these platforms. The DXS International breach raises concerns about potential NHS patient data exposure, which could undermine trust in healthcare services and lead to regulatory penalties under GDPR. Critical vulnerabilities in HPE OneView and WatchGuard Firebox products threaten the integrity and availability of centralized IT infrastructure and network security devices widely used in European enterprises, potentially enabling attackers to execute arbitrary code, disrupt operations, or gain persistent access. Fortinet authentication bypass flaws risk full device compromise, threatening network security across sectors. The Ink Dragon APT’s targeting of European governments indicates a strategic threat to national security and sensitive governmental operations, with potential for espionage and disruption. The disruption of Denmark’s water infrastructure by a Russia-affiliated group highlights the risk to critical infrastructure, with potential cascading effects on public safety and essential services. The combination of these threats increases the likelihood of data breaches, operational disruptions, and espionage activities across Europe, necessitating urgent and coordinated defensive measures.
Mitigation Recommendations
European organizations should prioritize immediate patching of critical vulnerabilities, specifically updating HPE OneView software to version 11.00 or later and applying WatchGuard Firebox Fireware OS patches addressing CVE-2025-14733. Fortinet device administrators must apply security updates to remediate authentication bypass vulnerabilities and rotate all device credentials post-patch. Organizations using Mixpanel or similar analytics services should review data sharing practices, enforce strict access controls, and monitor for suspicious activity related to user data. Healthcare suppliers and institutions should conduct thorough forensic investigations of breaches like the DXS International incident, enhance network segmentation, and implement zero-trust principles to limit lateral movement. Government entities must strengthen IIS server security by auditing configurations, deploying advanced endpoint detection and response (EDR) solutions, and monitoring for ShadowPad and FinalDraft backdoor indicators. Critical infrastructure operators, especially in water utilities, should collaborate with national cybersecurity agencies to implement enhanced intrusion detection, incident response plans, and threat intelligence sharing. Across sectors, organizations should increase user awareness training focused on AI-driven phishing scams, deploy multi-factor authentication with protections against SIM swapping, and utilize threat emulation and endpoint protection platforms to detect and block sophisticated malware loaders like GachiLoader. Regular backups, network segmentation, and continuous monitoring are essential to mitigate ransomware and extortion group threats such as ShinyHunters.
Technical Details
- Article Source
- {"url":"https://research.checkpoint.com/2025/22nd-december-threat-intelligence-report/","fetched":true,"fetchedAt":"2025-12-22T12:48:16.726Z","wordCount":1006}
Threat ID: 69493e10120b5bbb4ee25d27
Added to database: 12/22/2025, 12:48:16 PM
Last enriched: 1/5/2026, 4:17:35 PM
Last updated: 2/5/2026, 11:12:08 AM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1654: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pkthree Peter’s Date Countdown
MediumCVE-2026-1271: CWE-639 Authorization Bypass Through User-Controlled Key in metagauss ProfileGrid – User Profiles, Groups and Communities
MediumCVE-2025-14079: CWE-862 Missing Authorization in elextensions ELEX WordPress HelpDesk & Customer Ticketing System
MediumCVE-2026-1319: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themeisle Robin Image Optimizer – Unlimited Image Optimization & WebP Converter
MediumCVE-2025-13416: CWE-862 Missing Authorization in metagauss ProfileGrid – User Profiles, Groups and Communities
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.