Cybersecurity Brief

Taiwan Intrusions, Brokerage Phishing, and AWS Expansion

Coverage: 15 Aug 2025 – 17 Aug 2025 (UTC)

Incidents

A targeted intrusion against Taiwanese web hosting infrastructure is detailed by Talos, which attributes the activity to UAT-7237, a Chinese‑language threat actor active since at least 2022 and assessed as a subgroup of UAT-5918. The operators exploited unpatched, internet‑facing servers, then moved quickly to fingerprint systems, harvest credentials, and pivot. The campaign mixed customized and open‑source tooling, including a bespoke shellcode loader called SoundBill (derived from VTHello) to decode local payloads and load position‑independent Cobalt Strike beacons over HTTPS. Other tools included JuicyPotato, Mimikatz (also embedded within SoundBill), SharpWMI, WMICmd, FScan, and SMB scanners used to enumerate hosts and dump LSASS memory. Talos observed configuration changes such as disabling UAC and enabling WDigest, and artifacts tied to SoftEther VPN usage with operator preferences set to Simplified Chinese. The result was sustained access to hosting, cloud, and VPN resources with significant credential exposure and lateral movement risk. The report provides indicators, Snort rules, and detection guidance; recommended steps include prioritizing patching of internet‑exposed services, monitoring for SoftEther and unusual RDP/SMB activity, detecting LSASS dumping and Cobalt Strike indicators, and hardening endpoints and networks against the techniques described.

Separately, KrebsOnSecurity documents a “ramp and dump” cashout tactic targeting compromised retail brokerage accounts. Gangs seed purchases of thinly traded or IPO shares across many victim accounts and liquidate in concert to move prices, leaving legitimate investors with losses. The ecosystem includes Chinese‑language Telegram vendors supplying turnkey phishing kits; one prominent seller (“Outsider”) pushes iMessage and RCS lures impersonating major brokers and capturing credentials and OTPs via human‑in‑the‑loop operations. The activity follows earlier mobile‑wallet enrollments that exploited OTP-based onboarding. The write‑up notes varied MFA offerings across brokers and highlights hardware security keys as resistant to OTP phishing, alongside recommendations for stronger, phishing‑resistant MFA, closer monitoring for coordinated trading patterns, and improved user communications and education.

Platforms

Capacity options expanded in Southeast Asia as EC2 R8g launched in the AWS Asia Pacific (Jakarta) Region. These Graviton4‑based instances are aimed at memory‑intensive workloads, with vendor‑reported gains over the prior generation and sizes up to 48xlarge with 1.5 TB RAM. Built on the Nitro System, they offer up to 50 Gbps networking and 40 Gbps to EBS. AWS points to migration aids such as Porting Advisor and the Graviton Fast Start program; organizations should validate compatibility and run representative benchmarks before broad adoption.

Operational visibility for key‑value workloads received two updates. First, DynamoDB now emits more granular throttling exceptions, including specific reasons and the ARN of the throttled table or index, with companion CloudWatch metrics; SDK upgrades are required to receive the expanded payloads in clients. Second, a targeted telemetry mode for Contributor Insights can limit events to throttled keys only, reducing noise and monitoring cost while making hotspots easier to pinpoint. Suggested remediations include capacity adjustments, on‑demand mode, and access‑pattern and key‑design optimization.

Network and access controls were also tightened. ACM now supports PrivateLink, allowing certificate lifecycle operations from within a VPC without traversing the public internet—a fit for segmented and regulated environments across commercial, GovCloud, and China Regions. For multi‑account observability, Amazon Managed Service for Prometheus added resource‑based policies so workspace owners can directly grant external IAM principals permission to ingest metrics or run queries, reducing role‑assumption overhead while emphasizing careful, least‑privilege policy design.

Data and AI workflows gained new options. Athena supports CREATE TABLE AS SELECT for S3 Tables—the Iceberg‑native, managed table format—so teams can convert and partition heterogeneous datasets into optimized managed tables via a single SQL statement. Meanwhile, Amazon Neptune integrates with Cognee to provide a graph‑native memory layer for agentic applications, combining graph reasoning with vector and keyword retrieval for more context‑aware generative AI. Both updates streamline operations but call for governance over metadata, access controls, and persisted agent memory.

Research

A consumer‑focused analysis from Kaspersky reviews how unsolicited deliveries have evolved from benign “brushing” into multi‑step fraud. Tactics include postcards, stickers, and QR‑laden inserts that push victims to pay fake fees, divulge credentials or OTPs, or install malicious apps; some campaigns add call‑center follow‑ups or phone numbers that facilitate social engineering and larger charges. Cash‑on‑delivery variants, law‑enforcement impersonation, and even mailed USB devices aimed at high‑value targets show that physical channels can be part of threat actors’ playbooks. The guidance emphasizes avoiding unknown QR codes and phone numbers on parcels, refusing ad‑hoc delivery or customs payments, verifying tracking via official courier sites, not connecting unknown storage media, enabling two‑factor authentication, monitoring statements, and reporting incidents to couriers and police with preserved packaging evidence.

These and other news items from the day:

Fri, August 15, 2025

UAT-7237 Targets Taiwanese Web Hosting Infrastructure

🔍 Cisco Talos describes UAT-7237, a Chinese‑speaking APT active since 2022 that compromised a Taiwanese web hosting provider to establish long‑term persistence. The actor relies largely on open‑source tooling, customized utilities and a tailored shellcode loader tracked as SoundBill, which can decode and execute Cobalt Strike beacons. UAT-7237 favors SoftEther VPN and RDP for access rather than mass web‑shell deployment. Talos provides IOCs and mitigation guidance for detection and blocking.

read more →

Fri, August 15, 2025

Mobile Phishers Target Brokerage Accounts in Ramp-and-Dump

📈 Cybercriminals selling advanced mobile phishing kits have shifted from converting stolen cards into mobile wallets to hijacking brokerage accounts for a coordinated ramp and dump scheme that inflates and then collapses foreign and penny stock prices. Vendors such as Outsider (aka Chenlun) offer templates that spoof brokers via iMessage and RCS to harvest logins and SMS one-time codes. Operators use banks of phones and human handlers to preposition, trade, and liquidate positions, leaving victims with worthless shares while brokers and regulators contend with the fallout.

read more →

Fri, August 15, 2025

Amazon EC2 R8g Instances Now in AWS Asia Pacific (Jakarta)

🚀 Amazon EC2 R8g instances powered by AWS Graviton4 are now available in the AWS Asia Pacific (Jakarta) region. R8g delivers up to 30% better performance versus Graviton3, offers larger sizes—up to 48xlarge and 1.5 TB memory across 12 sizes including two bare-metal options—and targets memory‑intensive workloads. Built on the AWS Nitro System, these instances provide up to 50 Gbps networking and up to 40 Gbps to EBS for databases, in‑memory caches, and real‑time analytics.

read more →

Fri, August 15, 2025

Amazon Athena Adds CTAS Support for S3 Tables and Iceberg

🆕 Amazon Athena now supports CREATE TABLE AS SELECT (CTAS) statements targeting S3 Tables, enabling creation and population of a managed S3 Table from a single SQL query. The capability supports source data in Parquet, CSV, JSON and lake formats such as Apache Iceberg, Hudi, and Delta Lake. CTAS lets you partition data on the fly and the resulting tables can be queried, JOINed, and updated in Athena. This feature is available in AWS Regions where both Athena and S3 Tables are supported.

read more →

Fri, August 15, 2025

DynamoDB: Emit Only Throttled Key Events to CloudWatch

📈 DynamoDB now supports selectively emitting events for throttled keys to CloudWatch Contributor Insights, enabling you to monitor only throttled items rather than all accessed keys. By emitting exclusively throttled-key events, you reduce monitoring costs and noise while maintaining visibility into throttling and usage hotspots. This mode is available in all commercial AWS Regions, GovCloud (US), and China Regions.

read more →

Fri, August 15, 2025

Amazon DynamoDB Adds Granular Throttle Error Exceptions

🔔 Amazon DynamoDB now emits more granular throttling exceptions together with matching Amazon CloudWatch metrics. The enhanced exception payloads include a list of reasons for the throttle event and the Amazon Resource Name (ARN) of the table or index affected, helping teams pinpoint what was throttled. CloudWatch metrics are available immediately; to receive the richer exception details you must upgrade to the latest SDK. This capability is available in commercial, GovCloud (US), and China Regions.

read more →

Fri, August 15, 2025

AWS Certificate Manager Adds PrivateLink Access for ACM

🔒 AWS Certificate Manager (ACM) now supports AWS PrivateLink, enabling access to ACM APIs from within an Amazon VPC without traversing the public internet. You can create interface endpoints to connect your VPC to ACM using the AWS Management Console, AWS CLI, or AWS CloudFormation. This private connectivity is available in all Regions where ACM and PrivateLink are supported, including AWS GovCloud (US) and China Regions, and helps meet compliance requirements by keeping API traffic inside the AWS network.

read more →

Fri, August 15, 2025

Amazon Managed Service for Prometheus Adds Resource Policies

🔒 Amazon Managed Service for Prometheus now supports resource-based policies on workspaces, allowing owners to specify which IAM principals can ingest metrics or run PromQL queries from other accounts. This removes the previous need to assume an IAM role in the workspace owner account for cross-account access. Workspace owners can attach policies to allow-list non-owner principals for Prometheus-compatible API actions, and the capability is available in all regions where the service is generally available.

read more →

Fri, August 15, 2025

Amazon Neptune integrates with Cognee for GenAI memory

🧠 Amazon Neptune now integrates with Cognee to provide graph-native memory for agentic generative AI applications. The integration enables developers to use Amazon Neptune Analytics as the persistent graph and vector store behind Cognee’s memory layer, supporting large-scale memory graphs, long-term memory, and multi-hop reasoning. Hybrid retrieval across graph, vector, and keyword modalities helps agents deliver more personalized, cost-efficient, and context-aware experiences; documentation and a sample notebook are available to accelerate adoption.

read more →

Fri, August 15, 2025

Unexpected parcel scams: brushing, quishing, and more

📦 Delivery scams now include evolved brushing and QR-based "quishing" campaigns that use unsolicited packages or printed postcards to trick recipients into visiting malicious sites, paying fake fees, or installing malware. Scammers may include QR codes, phone numbers, or counterfeit tracking cards to extract payment data, one-time codes, or to prompt app installs. Never scan printed QR codes or call numbers on unexpected parcels; verify shipments via official courier channels and avoid connecting unknown USB devices. Enable two-factor authentication and report suspicious packages to the courier and police.

read more →