April 2025 Cybersecurity Roundup

Related Content

Want to keep learning?

Subscribe to SSL.com’s newsletter, stay informed and secure.

Oracle Cloud “Classic” compromise 

Threat intel firm CloudSEK reported that attackers stole about 6 million LDAP and SSO records from legacy Oracle Cloud Classic and Oracle Health workloads in late March and began selling the trove in April. Oracle confirmed the breach involved only end-of-life environments, but still pushed hundreds of configuration updates and patches. The incident highlights how forgotten cloud assets can become entry points for supply chain attacks affecting thousands of tenants. (cloudsek.com) 
SSL.com Actionable Insights

The Oracle Cloud breach underscores how unpatched legacy systems and exposed identity assets can ripple across thousands of organizations. 

  • Prevent unauthorized access to sensitive directories by requiring digital certificates to authenticate users before allowing login endpoint interaction. 
  • Protect encrypted identity data from misuse by regenerating and securely storing new SSO and LDAP credentials in encrypted keystores with strong access controls. 
  • Block supply chain infiltration by replacing compromised certificates and continuously auditing system logs for abnormal authentication behaviors across tenants. 

SSL.com’s Client Authentication certificates help safeguard active and legacy login surfaces by enforcing identity validation at every endpoint, sealing off exposed authentication vectors and protecting cloud environments from pivot-based attacks. 

Secure All Endpoints, Old and New  

Activate ClientAuth Now

RansomHub RaaS vanishes

On 1 April, the notorious RansomHub ransomwareasaservice (RaaS) operation abruptly took its leak site and chat infrastructure offline. Researchers saw affiliates quickly migrate to rival crews such as Qilin and DragonForce, leading to a measurable dip in ransomware incidents for the rest of the month.   Analysts caution that the retreat is likely a rebrand or regroup rather than a proper shutdown, so defenders should stay alert. (The Hacker News, Dark Reading) 
SSL.com Actionable Insights

Combatting RaaS operations like RansomHub requires proactive and layered cybersecurity defenses. 

  • Prevent unauthorized remote access to internal systems by implementing network access restrictions that validate devices and users before granting access. 
  • Use secure data encryption solutions that encrypt data at rest and in transit, ensuring compromised files are unreadable to unauthorized actors. 
  • Detect lateral movement and abnormal network behavior by deploying tools that continuously analyze network traffic and flag suspicious patterns in real-time. 

SSL.com’s Client Authentication certificates shield high-value systems by ensuring that only verified users and devices can gain access, effectively blocking attackers who rely on stolen credentials or insecure remote access points. They are especially powerful in high-risk environments like healthcare and finance, where password-only access is a major liability.

Enhance Access Control with ClientAuth  

Verify Identity

Yale New Haven Health mega breach

The hospital system disclosed that on 11 April, attackers exfiltrated records on roughly 5.5 million patients, including names, dates of birth, and Social Security numbers. Although clinical systems stayed online, two federal lawsuits were filed within days, alleging negligence in data protection. It is the most significant reported healthcare breach in 2025, underscoring why hospitals remain prime extortion targets. (BleepingComputer) 
SSL.com Actionable Insights

Massive healthcare data breaches like the one at Yale New Haven Health highlight the urgent need to secure access to systems storing sensitive personal data. 

  • Restrict internal system access by requiring devices and users to verify identity through trusted digital credentials, especially when handling patient records or personal identifiers. 
  • Monitor endpoint activity continuously with tools that flag suspicious behavior, such as unauthorized access to patient identity data or sudden data export attempts. 
  • Encrypt all stored patient data using file-level encryption tools, ensuring that exposed files remain unreadable even in the event of a breach.

SAP NetWeaver emergency fix (CVE202531324) 

On 24 April, SAP issued an out-of-band patch for a “missing authentication” bug in NetWeaver’s UDDI service that allowed unauthenticated remote code execution. The exploit code was previously circulating in the wild, prompting CISA to add the CVE to its Known Exploited Vulnerabilities catalog. Because NetWeaver underpins many finance and supply chain workflows, enterprises rushed to deploy the fix over the weekend. (Strobes Security) 
SSL.com Actionable Insights

Unauthenticated access to SAP’s UDDI service, as seen in CVE-2025-31324, threatens the core of enterprise operations through silent manipulation of internal service directories. 

  • Block anonymous interaction with web service endpoints by enforcing digital identity checks before accepting or processing SOAP requests.   
  • Prevent unauthorized changes to service registries by requiring secure, certificate-based authentication from clients interacting with sensitive interfaces. 
  • Limit exposure of internal SAP components by restricting network-level access to only trusted and verified systems, especially for admin-level operations.

Darcula Phishing Kit now supercharged with AI

The Darcula phishing-as-a-service kit now includes generative AI, allowing hackers to create unlimited, multilingual phishing sites. With enhanced smishing via SMS, RCS, and iMessage, even novices can launch tailored attacks, making AI-driven phishing a global threat. (Dark Reading) 
SSL.com Actionable Insights

AI-powered phishing kits like Darcula demand proactive, real-time countermeasures. 

  • Deploy browser isolation solutions that open untrusted websites in secure containers, preventing interaction with malicious pages cloned by phishing kits. 
  • Use endpoint detection and mitigation tools to recognize and block suspicious behavior patterns triggered by smishing payloads across RCS, SMS, and iMessage. 
  • Implement secure DNS services to filter access to phishing domains generated dynamically through AI-powered platforms like Darcula. 

SSL.com’s SSL/TLS certificates help users to instantly verify legitimate websites by displaying a secure HTTPS connection and trusted identity indicators, making it more difficult for spoofed phishing pages to deceive users.

Defend Trust, Stop Impersonation  

Secure Sites Now

SSL.com Announcements

CA/Browser Forum (CABF) Developments & Reminders: 

  • S/MIME Developments: Ballot SMC011 proposes allowing European Unique Identifiers (EUID) for EU/EEA organization validation.

  • Key deadlines approaching: CAA checking (mandatory since March 15), MPIC validation (May 15), and Legacy profile deprecation (July 15).

  • SSL/TLS Validity: The trend toward shorter certificate lifespans continues, reinforcing the importance of automation for certificate management.

Important Update: Changes to TLS Certificates at SSL.com 

  • Starting September 15, 2025, SSL.com will issue TLS server certificates without the Client Authentication EKU. This update aligns with Google Chrome’s Root Program Policy and ensures better compliance and clarity in certificate usage. Check out our guide to learn what actions you may need to take. 

Was this article helpful?

Yes
No
Thanks for your feedback!

We’d love your feedback

Take our survey and let us know your thoughts on your recent purchase.

Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognizing you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

For more information read our Cookie and privacy statement.

3rd Party Cookies

This website uses Google Analytics & Statcounter to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping these cookies enabled helps us to improve our website.

Show details