EvilBit Threat Digest - The Long November: Patch Tuesday, Zero-Days, and Attackers’ Creativity

A roundup of November’s critical patches, active exploits, APT campaigns, supply chain attacks, and evolving phishing threats.

Well, it was Patch Tuesday. And like clockwork, the sky opened and rained down a torrential downpour of CVEs, zero-day exploits, and general chaos. Microsoft led the parade with an actively exploited kernel bug, but not to be outdone, we saw attackers abusing antivirus features to get SYSTEM, weaponizing "Find My Phone" features to wipe devices, and a whole new ransomware-as-a-service crew targeting everything from Windows to VMware. It’s a week that reminds you why we can’t have nice things.

My husband, UncleSp1d3r, surveyed the week’s carnage, took a long sip of his soda, and muttered, “Just another Tuesday in paradise.” He then went back to reverse-engineering a malicious NuGet package designed to sabotage industrial control systems, because that’s his idea of a good time. He keeps mumbling, "its elegant in its subtlety." He’s not wrong on either topic, though. The sheer breadth of the week’s events is a testament to the attacker's relentless creativity. Let's get into it.


Patch Now or Weep Later: A Multi-Vendor Patch-a-Palooza

It was a heavy one. If your patch management teams look tired, buy them a beer. They’ve earned it.

Microsoft's Zero-Day Leads the Charge: The main event was, of course, Microsoft’s November Patch Tuesday release, which addressed 68 vulnerabilities. The headliner is CVE-2025-62215, a Windows Kernel Elevation of Privilege (EoP) vulnerability that is confirmed to be exploited in the wild. It’s a classic local privilege escalation bug, the kind attackers love to use after getting a foothold to take over a system entirely.

But the fun didn't stop there. The release also includes multiple critical RCEs, including one in the GDI+ graphics component (CVE-2025-60724) that could be triggered with a malicious file, and another in Microsoft Office (CVE-2025-62199) that uses the Preview Pane as a vector. That’s right, just looking at the wrong email could ruin your day. Patching this month is not optional.

SAP and Adobe Join the Party: Not to be left out, SAP dropped fixes for multiple critical vulnerabilities, led by CVE-2025-42890, a CVSS 10.0 bug in SQL Anywhere Monitor caused by hardcoded credentials. It doesn't get much easier than that for an attacker. Meanwhile, Adobe addressed 29 vulnerabilities across its Creative Cloud applications, many of which could lead to arbitrary code execution.

Actively Exploited & Critical Flaws

Beyond the scheduled patches, several other vulnerabilities are making waves.

Malware, APTs, and Living Off Your Land

The attackers have been busy refining their tools and techniques.

Lazarus Group Targets Aerospace & Defense: The Lazarus Group is at it again, this time with a spearphishing campaign targeting aerospace and defense firms. They're using weaponized Word documents with lures themed around Airbus and others to drop a new variant of their "Comebacker" backdoor. The C2 traffic is AES-encrypted over HTTPS to domains like office-theme[.]com. Block macros, hunt for the IOCs, and be wary of any unsolicited documents.

Gootloader's Evasive Maneuvers: The operators of the Gootloader initial access malware have returned with some clever new tricks. As detailed by Huntress, they're using compromised WordPress sites and SEO poisoning to deliver malformed ZIP files. These archives appear to contain benign files to sandboxes and analysis tools, but present a malicious JavaScript file to the user in Windows Explorer. It's a slick bit of tradecraft to bypass automated defenses. We've talked a bit about this in previous editions, but it just seems to keep coming around and this time there's new details on the indicators and timeline.

KONNI Weaponizes "Find My Device": In a brilliant example of abusing trusted systems, the North Korean APT group KONNI is using compromised Google accounts to access the "Find My Device" feature and remotely wipe their targets' Android phones. It's a perfect anti-forensics and disruption tool that requires no exploit, just stolen credentials. It’s a good time to ensure your critical accounts have phishing-resistant MFA.

The Supply Chain and Other Assorted Horrors

Finally, a few stories to keep you up at night.


It's a lot to take in. The takeaway is that the fundamentals have never been more critical. Patch your systems—all of them. Monitor your logs. Scrutinize your supply chain. And for goodness sake, use multi-factor authentication. The basics won't stop everything, but they’ll give you a fighting chance.

Stay safe out there. You’ll need it.

— KryptoKat & UncleSp1d3r