At a glance.
- North Korea's Kimsuky APT reportedly sustains breach.
- Threat actors exploit Erlang flaw to target OT networks.
- Data breach at Dutch medical lab affects more than 485,000 patients.
North Korea's Kimsuky APT reportedly sustains breach.
Two hackers, going by "Saber" and "cyb0rg," have leaked 8.9 GB of backend data allegedly stolen from the North Korean state-sponsored APT Kimsuky, BleepingComputer reports. The hackers published their findings in the latest issue of the Phrack e-zine, which was distributed at DEF CON last week. The hackers claim the dump contains "many of Kimsuky's backdoors and their tools as well as the internal documentation." BleepingComputer notes that the data could also "provide insight into unknown campaigns and undocumented compromises."
Threat actors exploit Erlang flaw to target OT networks.
Palo Alto Networks' Unit 42 is tracking exploitation of CVE-2025-32433, a maximum-severity remote code execution flaw affecting Erlang/OTP that was patched in April. Unit 42 detected exploitation beginning on May 1st. Notably, a majority (70%) of the exploit attempts targeted firewalls protecting OT networks, with a disproportionate focus on organizations in the healthcare, agriculture, media and entertainment, and high technology.
Unit 42 notes, "The geographic, industrial, and temporal footprint of CVE-2025-32433 exploit attempts highlights a strategic shift in attacker behavior toward operational environments across diverse sectors and regions. Exploits are not limited to traditionally defined industrial control systems. They appear in healthcare, education, high tech and other verticals — many of which host embedded OT systems not previously treated as high risk."
Data breach at Dutch medical lab affects more than 485,000 patients.
Dutch medical lab Clinical Diagnostics NMDL sustained a breach affecting data belonging to more than 485,000 patients, Infosecurity Magazine reports. The breach primarily affected women who participated in the lab's cervical cancer screening program. According to a press release from the Dutch Population Screening Association (BDO), the hackers stole "names, addresses, dates of birth, citizen service numbers (BSN), possible test results, and the names of participants' healthcare providers"