Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

8th December – Threat Intelligence Report

0
Medium
Exploit
Published: Mon Dec 08 2025 (12/08/2025, 13:07:25 UTC)
Source: Check Point Research

Description

For the latest discoveries in cyber research for the week of 8th December, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The University of Pennsylvania and the University of Phoenix were hit by data breaches after attackers exploited zero-day vulnerabilities in Oracle E-Business Suite servers. At least 1,488 people at UPenn and numerous […] The post 8th December – Threat Intelligence Report appeared first on Check Point Research .

AI-Powered Analysis

AILast updated: 01/05/2026, 16:18:47 UTC

Technical Analysis

The December 8th, 2025 Threat Intelligence Report from Check Point Research details multiple high-impact cyber threats and vulnerabilities discovered during the week. Foremost among these is the exploitation of zero-day vulnerabilities in Oracle E-Business Suite servers, which led to data breaches at the University of Pennsylvania and the University of Phoenix, affecting thousands of individuals including students, staff, and suppliers. The Cl0p ransomware gang is suspected to be behind these attacks, which form part of a broader campaign targeting Oracle products. Concurrently, the Akira ransomware group exploited vulnerabilities in SonicWall firewalls to breach over 74 US banks and credit unions, exposing sensitive customer data. Additional ransomware attacks by Qilin and TridentLocker targeted pharmaceutical and postal services, respectively, resulting in significant data leaks. The report also highlights critical vulnerabilities such as React2Shell (CVE-2025-55182), which allows unauthenticated remote code execution in React 19.x and Next.js 15.x/16.x frameworks, posing a severe risk to web applications. Another notable vulnerability was found in OpenAI Codex CLI, enabling remote code execution via malicious local configuration files, patched in version 0.23.0. The report further discusses sophisticated cyber-espionage campaigns like Salt Typhoon and BRICKSTORM, which leverage complex attack chains to infiltrate telecom providers and government networks. Additionally, the emergence of Albiriox, an Android banking trojan distributed as Malware-as-a-Service, demonstrates evolving threats targeting financial and crypto applications through social engineering and technical evasion techniques. Protection against these threats is available through Check Point's IPS, Threat Emulation, and Harmony Endpoint products, which provide detection and mitigation capabilities for the identified ransomware families and vulnerabilities. The report underscores the importance of timely patching, threat intelligence sharing, and layered security controls to defend against these multifaceted threats.

Potential Impact

European organizations face substantial risks from these threats due to widespread use of Oracle E-Business Suite in enterprise resource planning and financial operations, as well as the growing adoption of React-based web applications across industries. Data breaches involving personal, financial, and operational information can lead to regulatory penalties under GDPR, reputational damage, and operational disruptions. The ransomware campaigns threaten availability by encrypting critical data and demanding ransom payments, potentially crippling essential services such as healthcare, education, and logistics. The React2Shell vulnerability enables attackers to execute arbitrary code remotely without authentication, increasing the risk of full system compromise and lateral movement within networks. Supply chain attacks, such as the compromise of developer signing keys in the SmartTube incident, highlight risks to software integrity and trust. The presence of advanced persistent threat campaigns targeting telecom and government sectors indicates a heightened espionage risk, which could impact national security and critical infrastructure in Europe. Financial institutions are particularly vulnerable to banking trojans like Albiriox, which use sophisticated evasion and fraud techniques to steal credentials and funds. Overall, these threats can disrupt business continuity, expose sensitive data, and undermine trust in digital services across European markets.

Mitigation Recommendations

European organizations should prioritize immediate patching of Oracle E-Business Suite servers and React framework components to remediate zero-day vulnerabilities such as those exploited in the reported attacks. Deploy advanced intrusion prevention systems (IPS) and endpoint detection and response (EDR) solutions like Check Point Threat Emulation and Harmony Endpoint to detect and block ransomware payloads and exploit attempts. Implement strict network segmentation to limit lateral movement in case of compromise, especially isolating critical financial and operational systems. Enhance monitoring of firewall and VPN logs to detect anomalous access patterns indicative of exploitation attempts, particularly for SonicWall and similar devices. Conduct regular threat hunting exercises focused on indicators of compromise related to Cl0p, Akira, Qilin, and TridentLocker ransomware groups. Strengthen supply chain security by validating software signing keys and monitoring for unauthorized updates or code changes. Educate employees on phishing and smishing tactics used to distribute banking trojans like Albiriox, and enforce multi-factor authentication (MFA) on all critical systems. Collaborate with national cybersecurity agencies and share threat intelligence to stay informed about emerging campaigns such as Salt Typhoon and BRICKSTORM. Finally, perform comprehensive backups with offline storage to ensure data recovery capabilities in ransomware scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://research.checkpoint.com/2025/8th-december-threat-intelligence-report/","fetched":true,"fetchedAt":"2025-12-08T13:11:44.619Z","wordCount":990}

Threat ID: 6936ce90e64c706dbb1c6278

Added to database: 12/8/2025, 1:11:44 PM

Last enriched: 1/5/2026, 4:18:47 PM

Last updated: 2/7/2026, 3:30:15 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats