LIVE: Cyber Threat Intelligence Feed

Our Teams are Here to Support You

This feed provides organizations with timely, actionable updates on the evolving cyber threat landscape. It highlights observed threat activity, indicators of compromise (IoCs), active campaigns, targeted sectors, and emerging vulnerabilities, along with recommended actions to help organizations proactively reduce risk. The intelligence is compiled and curated by Help AG’s CTI team using insights from internal monitoring, trusted partner sources, and industry threat and vulnerability feeds.

Threat Intel

Apr 28, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
APT / Financially Motivated Intrusion (Social Engineering + Multi-Stage Malware)
“uu03webzoom[.]us 83[.]136[.]208[.]246 83[.]136[.]209[.]22 104[.]145[.]210[.]107 check02id[.]com thriddata[.]com hxxps://83[.]136[.]209[.]22:8444/download?id=8766ceb975cadedca38aad72091017cdb5d3e4c8f8af0441 hxxps://83[.]136[.]209[.]22:8444/download?id=b1a87ab536188b10f02b3d84d03c0a45ed38f948a338d8f4 ee4807a19e432cf370f860f7b4deb84b04349143f921ac62fb0f6ef9eb3e6123 0fdac2d4f5fe127eec1754ceebfb67131a03e0271d5e128db2084665cac88533 29fb6b49e33d8b6dc967a0b11d1225ec5a9f30faf6bde341bf3545298656fe6b 2acf6335315f7ba1270d7cfaaa7e420794ce0f7c8f5c1ba41be5075ced19e537 bc94f02c97af6761f9dc21d39ea4564a209f087c3441a33872e68742f468a9c5 841444082ae59707aeb47b597282e17d5d9af37c00f146745d88baac308dc8e3 4aa85fabfe717b3c31e0b24afb4a07008305e0a9faedf295d4e74a49e0ec3b40 8a7273889c3fedf81ffe2dcfc1a321771620d71cd0d98125a0a237842d79f35e 96ab701c444d9922802fe20adfc81f3476e014f8c4ba0b951714127ecac58edf d498013b6f27debf027352a5c8b481ade180541443c027afdc1c3634ca7f2a1f f391954378707e8b471c785ee792efacf97e7be80d4200966cbb176d531f0721 345b3497d5c7945c9c2e47663926f0dcdd931be3df12c4f7d10d6356a3b5bc7c a37cb38b178833f15bf13fd5fa622b694c2244230ac0be33e75680c71dc08a08 17158cd6490a2b3c672d087f3d69107643d6a6f7c67345461b10ae18f27e28d1 db446f0e1d18b43805bfefe1af934ae4b0879e376904635cc7e14eae2d7fc682 dd1c72823f933952619cbb86aaeaea43057a259e9a0c9e3b11c82225ec3faaa1 E598EB0078A3C6D887135518EDA1424E59F2B6CBF5A902FFE1063C34E03E3ED8 EDD0301FFB793169B1314C59C0EF3A98D5793C0441DD43A7C484D61DEB4F107F 6030338469819129924C6E01E110145A128CA3D944CD4B696ABC7925A1840001”
Highly targeted Web3/crypto campaign using fake Zoom invites, typo-squatted domains, and multi-stage malware to steal credentials, hijack sessions, and exfiltrate sensitive data
PowerShell-based payloads, browser credential stealers, Telegram session hijacking tools, clipboard-based loaders
United States, Singapore, United Arab Emirates, United Kingdom, Europe, Israel, Canada
BlueNoroff (APT38 / Lazarus subgroup)
Finance, Cryptocurrency
T1566.002, T1204.001, T1059.001, T1055, T1105, T1071.001, T1041, T1555, T1552.001, T1547.001, T1113, T1125, T1082, T1057, T1518
Critical
Enforce MFA across all accounts; implement advanced email and phishing protection; restrict PowerShell execution and monitor anomalies; deploy EDR with behavior-based detection; monitor for suspicious domains and outbound traffic; secure crypto wallets with hardware protection; conduct executive-focused phishing awareness training
Supply Chain Attack – elementary-data compromise
“31ecc5939de6d24cf60c50d4ca26cf7a8c322db82a8ce4bd122ebd89cf634255 igotnofriendsonlineorirl-imgonnakmslmao[.]skyhanni[.]cloud hxxps://litter[.]catbox[.]moe/iqesmbhukgd2c7hq[.]sh”
Global (developers using PyPI & container images)
Credential Stealer (multi-stage via .pth execution)
None
Unknown
None
T1195.002, T1059.004, T1552.001, T1552.006, T1071.001, T1041
High
Implement dependency verification and scanning, audit CI/CD pipelines, enforce MFA, isolate environments, and monitor for unusual outbound traffic
Infostealer Campaign – Vidar resurgence
” 03acfc32bb897deee78c9a103e7921334fc97d9fdac944523ae3e95e5e867676 d586d192b0d5c050a03698753d9754ec0f5ce0b0791e0c2919a46284bf3b3c14 chi[.]botick[.]top gpu[.]orca-trade[.]com my-vidar[.]ru v-new[.]cloud v-tamin[.]lol vidar[.]su vidars[.]su vidmn[.]top wto[.]mir-massage[.]kiev[.]ua hxxps://steamcommunity[.]com/profiles/76561198761022496 hxxps://steamcommunity[.]com/profiles/76561198763098204 hxxps://steamcommunity[.]com/profiles/76561198754004827 hxxps://vidars[.]su/files/instructions/cripto_en[.]pdf 193[.]233[.]198[.]22 65[.]109[.]242[.]143 95[.]216[.]181[.]234″
Global (enterprise & individual users)
Vidar Stealer (v2.0)
None
Multiple / Commodity Threat Actors
None
T1566.001, T1566.002, T1204.002, T1574.002, T1036.005, T1555.003, T1552.001, T1071.001, T1102.002, T1041, T1568.003
High
Strengthen user awareness, enforce MFA, block malicious domains/IPs via threat intel, deploy secure web gateways & DNS filtering, sandbox downloads, and monitor outbound traffic for anomalies
Targeted Spear-Phishing Campaign (Safe Jail Project lure)
“ff892c71475c71eccf3ab3f650d7aea30b61c9dc0c39a89b7f3f434469aa8d8b 49f304eb2772bf194e21c90bf5f1783770020538c80c0ca71afc5f1adcd19e86 763ea284945c83e7649eb87938514ed782c01c03f6482347680485b50a283006 ecfe3c552907e73a4f4b0e27f27be34c hxxps://adobe-pdfreader[.]b-cdn[.]net/code[.]exe hxxps://adobe-pdfreader[.]b-cdn[.]net/Adobe[.]application hxxps://adobe-pdfreader[.]b-cdn[.]net/adobe[.]application agha[.]hassan@psca[.]gop[.]pk”
Targeted (Government entities – PSCA & PPIC3)
Custom malware via VBA macro & ClickOnce delivery
Pakistan
Unknown (custom tooling, targeted intrusion)
Government, Administration
T1566.001, T1204.002, T1059.005, T1105, T1102.002, T1041, T1036.005, T1564.007, T1057
High
Exercise caution with macro-enabled documents and fake update prompts, block untrusted CDN domains, monitor VS Code tunnel usage, detect Discord webhook activity, and strengthen email security, user awareness, and EDR capabilities
Tax-Themed Phishing Campaign (Income Tax impersonation)
” googlevip[.]shop dadasf[.]qpon googleaxc[.]shop zyisykm[.]shop”
Targeted (Multinational organizations with ties to India)
XRed Remote Access Trojan (RAT)
India, United Kingdom, United States
Unknown
Finance
T1566.002, T1204.002, T1059.005, T1547.001, T1105, T1082, T1056.001, T1071.001, T1041
High
Exercise caution with unsolicited tax-related communications, verify authenticity via official channels, implement strong email filtering and user awareness training, keep systems updated, and encourage reporting of suspicious emails
Cyber Espionage Campaign (TrueConf exploitation + phishing)
“ec8e7c3ce38e0ead9acbcb0d9b8eeaedc386e52a1c7341dcf3373b431dcae5ed 77b49d4b8572fba988416fef76b030751951e3388b1a5fc0d173feda1cffaaca d7d6894c2fbce3d91af8de50e7cd649f12627d94a1a9b430f6e583714d48be29 2a1d08d8c86b4e513c8767facb49762085594a788e4a84eb85833aa532f969f1 8fff3933562ea21ec51b4926026522de775e3f45d4c37b18e391c531aa76892d 41f5f2dab504b9464be9bfc3c19ebfc307330d8c2aae6755b34253b0665b4ee1 00a23d49a73ce754b604f720814821a45dbcc153c6d2ce63266653ca8504538c a3508cfa2ae935325aa5d74cf53537b59169890b52b9fab81121263074bb1db6 ad9d248b580a7b46bc083ddf56c164d69236d43388b1a6a40a70d90e6fa6fa9b 97044babdf67eb7ef17fc6578f0811d31a0cd5199e239e305917540f5c18b895 fa1dfc23e3fa8e8174db208bc178910123e79e05d1c0714f2e3e9351f051a409 6ec6007db0e16e4de7a8344c7da2b4222cb452ac3d91d385e70300087c2424da 639bf088bcd9a1ac21afbac3438fe84eb1d686c24fccfc8968ed0f9ede2540cf 42d128ac1171ea28753ca623fe32031da0a6efe466111bd703edc3f1ef17806b C01CDC8D7C506831D3A6911DBC8C782388E3434385BE60149E20423BD570D3DA 15d5e71ce278bb21842ac64b7a654b61832e3703fddb1307a8a2ea9ab1da60c0 93e9f3e656967220642484ade21387c08f682562 9123ddf27ffc8eb1a4e5f9d78a8226d2a148b5d9 5fe6ae13ed4d0b3302a023cd81eed28252b8e166 d37ec845c8b1e9756cb586aa6791b782cc04db3f b11ba850524c608df62b0e1b192d829975811ee9 d74b9bb45936a373f5753f4ad1f945f7b022b15a 9c4c6b7e98e974d3903eaa9df5b8d64af840c84c f04554c5a24dd609478814799dbe18448c33d557 2456adde2e3740609388f92e4d282a688ed9380e 3ff8732f802f049b37a02a5d902026582bdb8d30 518d2bf2afc4d1841ba0d093370d3c3e81fd434b dadefb6493bc374983131923910318c84520c65b f402d5baea487df61a68e4008d2109d7a7e84cbc cbcfd3c45d91c5d0959f140d38f7902646a537aa d91f8fb7ee4ec98bd80bad69d7667842 486faa9e2efbf78d4c03ba5dfe72eb1d 2dc957cf3f0f6c5c5e6fc865f8bbce42 cd915c6d6cb455fb2786cb4e2debdafc b09cdccc08e702b28c0fd45b20660844 7346809cdf85b476b4c170c4d473475f 2bf231028463eca661b0fd78184020fd 1bc7a6056d5b35a938d67e3bf81da5e8 9a0cb8b002a8cae40fabcfe5e1d62c3e 286bd098de67fd675e230878dffa7284 f0afcb3bd7f00356c4f8ada2c27d8c79 ea84158992c0c202b2e5c68013e6decc 741cedd889a4a50ebc8010cf83ca3d60 dce7182b0cd8d23271e2cb806be138c2 01f67bb1d852622476496d991c59d3b4 7672760fdef08bcf7ea44d9896aae15e 148[.]222[.]186[.]65 188[.]127[.]227[.]46 194[.]116[.]214[.]233 194[.]36[.]170[.]104 194[.]36[.]170[.]33 217[.]144[.]185[.]92 217[.]60[.]36[.]79 217[.]60[.]37[.]108 31[.]56[.]227[.]100 31[.]57[.]105[.]56 31[.]57[.]106[.]171 31[.]57[.]109[.]226 31[.]59[.]105[.]51 46[.]8[.]64[.]90 79[.]137[.]194[.]216 87[.]245[.]178[.]172 94[.]183[.]187[.]205 95[.]182[.]115[.]153 1c-dev[.]it[.]com 1cbit-dev[.]com analize-team[.]help analytisec[.]space appcleaner[.]it[.]com brightshield[.]space cloud-home[.]casa cyberposi[.]space defentry[.]online e-marketdrive[.]ru hr-resourse[.]com infonixsecurity[.]online ironshieldsecurity[.]space itbase-soft[.]store itflow-engine[.]com kavfs-update[.]cloud ksc-update[.]com master-cloud[.]team monta-s-s[.]ru obsidianshield[.]space optivault[.]space primeinfosec[.]space safebloom[.]space shibargan[.]ru solution-itspace[.]online telecom-connect[.]cloud trustbeam[.]space xbox-updater[.]online”
Targeted (Government organizations via TrueConf exploitation)
MacTunnelRAT, PhantomSscp, PhantomProxyLite, PhantomPxPigeon, LockBit
Russia
PhantomCore
Government, Administration
T1190, T1566.001, T1059.001, T1505.003, T1021.006, T1021.001, T1003.001, T1003.003, T1078, T1098, T1053.005, T1543.003, T1572
Critical
Immediately patch TrueConf servers, restrict public exposure of conferencing systems, enforce network segmentation, monitor for web shells, review RDP/WinRM usage, deploy WAF protections, and conduct continuous threat hunting for credential dumping and persistence mechanisms
Spear-phishing + Fileless Multi-stage Campaign
” 717da2804144e9759c4e6409f18b7b4b 07aa715f8a6f56a96476aae0ebca17c7 d0d17a50422e3d4a0a50fed0878a47d6 ca002f49f3d5ee36ded21e235e8d04e7 9c0409be11a6c4433896db58e7095464″
Targeted (multi-sector espionage campaign using cloud abuse + steganography)
Fileless C# loader, Excel macro payload, Telegram Bot C2, steganography modules
Middle East, United States, Europe
APT-C-49 (OilRig / APT34 / Helix Kitten)
Government, Finance, Energy, Telecoms, Chemical
T1566.001, T1204.002, T1059.005, T1027.003, T1053.005, T1105, T1102.001, T1102.002, T1041
High
Block macro-enabled attachments, disable Office macros by default, restrict scripting engines (VBA/C# compilation abuse), monitor scheduled tasks, limit cloud service abuse (GitHub/Google Drive/Telegram), deploy EDR for fileless detection, enforce least privilege, and strengthen email security controls
Large-scale phishing + domain impersonation campaign (Operation TrustTrap)
” www[.]mass[.]gov-suc[.]cc www[.]mass[.]gov-ypk[.]cc www[.]mass[.]gov-wkg[.]cc www[.]mass[.]gov-odb[.]cc www[.]mass[.]gov-icw[.]cc www[.]mass[.]gov-hjc[.]cc www[.]mass[.]gov-emz[.]cc www[.]gov-lzk[.]cc www[.]az[.]gov-lzk[.]cc www[.]az[.]gov-huv[.]cc www[.]az[.]gov-ocq[.]cc www[.]az[.]gov-cgt[.]cc www[.]az[.]gov-swy[.]cc www[.]mass[.]gov-raj[.]cc www[.]mass[.]gov-kzc[.]cc www[.]mass[.]gov-bza[.]cc www[.]mass[.]gov-yta[.]cc www[.]mass[.]gov-cen[.]cc www[.]gov-tda[.]cc www[.]mass[.]gov-btx[.]cc www[.]mass[.]gov-ktx[.]cc nh[.]gov-nde[.]cc mass[.]gov-xct[.]cc www[.]mass[.]gov-ufa[.]cc www[.]mass[.]gov-iua[.]cc www[.]mass[.]gov-nha[.]cc www[.]mass[.]gov-uva[.]cc www[.]mass[.]gov-ngx[.]cc www[.]gov-cbv[.]cc www[.]gov-wyx[.]cc www[.]mass[.]gov-bjw[.]cc www[.]mass[.]gov-uce[.]cc www[.]mass[.]gov-hva[.]cc wv[.]gov-hng[.]cc wv[.]gov-hna[.]cc wv[.]gov-hnd[.]cc az[.]gov-nci[.]cc www[.]gov-jyd[.]cc www[.]gov-ckw[.]bond az[.]gov-ncq[.]cc az[.]gov-nco[.]cc www[.]gov-iop[.]cc www[.]gov-hxi[.]cc www[.]gov-ejx[.]bond www[.]mass[.]gov-xct[.]cc mass[.]gov-raj[.]cc www[.]mass[.]gov-kse[.]cc www[.]mass[.]gov-uca[.]cc mass[.]gov-ucq[.]cc mass[.]gov-nka[.]cc wv[.]gov-qwd[.]cc mass[.]gov-wjd[.]cc az[.]gov-sxa[.]cc www[.]mass[.]gov-nka[.]cc www[.]mass[.]gov-wmc[.]cc wv[.]gov-nvk[.]cc az[.]gov-sxs[.]cc www[.]michigan[.]gov-nju[.]cc mass[.]gov-ktx[.]cc mass[.]gov-wmc[.]cc mass[.]gov-cre[.]cc www[.]mass[.]gov-ucq[.]cc ri[.]gov-jhd[.]cc ncdot[.]gov-stmv[.]cc ncdot[.]gov-stmn[.]cc az[.]gov-sxb[.]cc az[.]gov-sxc[.]cc mass[.]gov-kzc[.]cc az[.]gov-sxv[.]cc az[.]gov-ncp[.]cc mass[.]gov-tvz[.]cc www[.]mass[.]gov-wjd[.]cc www[.]mass[.]gov-tvz[.]cc wv[.]gov-nvf[.]cc mass[.]gov-uva[.]cc mass[.]gov-ngx[.]cc mass[.]gov-iua[.]cc mass[.]gov-uce[.]cc az[.]gov-sxz[.]cc az[.]gov-sxm[.]cc www[.]mass[.]gov-cre[.]cc mass[.]gov-hva[.]cc mass[.]gov-bjw[.]cc az[.]gov-ncr[.]cc mass[.]gov-kse[.]cc az[.]gov-sxn[.]cc www[.]gov-yex[.]cc www[.]az[.]gov-txb[.]bond www[.]gov-gva[.]cc www[.]gov-uxs[.]bond www[.]gov-gos[.]cc www[.]gov-tca[.]cc ncdot[.]gov-stwt[.]cc www[.]gov-hxw[.]cc www[.]gov-jdz[.]bond www[.]gov-lnx[.]bond mass[.]gov-btx[.]cc mass[.]gov-uca[.]cc az[.]gov-nct[.]cc mass[.]gov-nha[.]cc mass[.]gov-aun[.]cc michigan[.]gov-nju[.]cc www[.]gov-twh[.]bond mass[.]gov-yta[.]cc mass[.]gov-ufa[.]cc mass[.]gov-bza[.]cc mass[.]gov-cen[.]cc wv[.]gov-tqj[.]cc ncdot[.]gov-kfo[.]cc wv[.]gov-hns[.]cc ncdot[.]gov-kfy[.]cc ncdot[.]gov-uji[.]cc ncdot[.]gov-tgy[.]cc ncdot[.]gov-stwi[.]cc ncdot[.]gov-stms[.]cc ncdot[.]gov-stmf[.]cc ncdot[.]gov-stmd[.]cc ncdot[.]gov-stmb[.]cc ncdot[.]gov-stma[.]cc ncdot[.]gov-olp[.]cc ncdot[.]gov-kfw[.]cc ncdot[.]gov-stmc[.]cc ncdot[.]gov-kfe[.]cc ncdot[.]gov-yhu[.]cc ncdot[.]gov-stmx[.]cc ncdot[.]gov-kft[.]cc ncdot[.]gov-iko[.]cc ncdot[.]gov-dcf[.]cc ncdot[.]gov-rfd[.]cc ncdot[.]gov-kfr[.]cc ncdot[.]gov-saz[.]cc ncdot[.]gov-kfp[.]cc wv[.]gov-hny[.]cc wv[.]gov-hno[.]cc wv[.]gov-hni[.]cc www[.]mass[.]gov-tia[.]cc wv[.]gov-qwg[.]cc www[.]gov-zsr[.]bond wv[.]gov-qwk[.]cc wv[.]gov-qwc[.]cc utah[.]gov-aps[.]cc www[.]gov-icw[.]cc www[.]gov-odb[.]cc www[.]gov-lzp[.]cc www[.]gov-emj[.]cc www[.]gov-enu[.]cc www[.]gov-hjc[.]cc www[.]gov-emz[.]cc www[.]gov-ypk[.]cc www[.]gov-wkg[.]cc www[.]gov-aix[.]cc www[.]gov-suc[.]cc ncdot[.]gov-stda[.]cc ncdot[.]gov-stds[.]cc ncdot[.]gov-vro[.]cc ncdot[.]gov-stdm[.]cc wv[.]gov-hyj[.]cc wv[.]gov-tlo[.]cc wv[.]gov-cmi[.]cc ncdot[.]gov-stdb[.]cc ncdot[.]gov-mip[.]cc ncdot[.]gov-gop[.]cc az[.]gov-hae[.]cc ncdot[.]gov-cqo[.]cc ncdot[.]gov-stnz[.]cc ncdot[.]gov-cqa[.]cc ncdot[.]gov-stdx[.]cc ncdot[.]gov-stdn[.]cc ncdot[.]gov-cqr[.]cc ncdot[.]gov-iop[.]cc ncdot[.]gov-stdz[.]cc ncdot[.]gov-stdc[.]cc ncdot[.]gov-cqw[.]cc co[.]gov-uji[.]cc ncdot[.]gov-stdv[.]cc utah[.]gov-apd[.]cc www[.]mass[.]gov-wtb[.]cc www[.]mass[.]gov-qht[.]cc www[.]mass[.]gov-xmj[.]cc www[.]mass[.]gov-khw[.]cc expresstoll[.]gov-dmre[.]cc ncdot[.]gov-gjk[.]cc www[.]ut[.]gov-eny[.]cc www[.]gov-lrq[.]bond www[.]gov-poy[.]bond www[.]gov-tuo[.]bond ut[.]gov-eny[.]cc mass[.]gov-nve[.]cc www[.]mass[.]gov-bjk[.]cc www[.]gov-nka[.]cc www[.]gov-uca[.]cc www[.]gov-laq[.]bond www[.]gov-lil[.]bond www[.]gov-opr[.]bond www[.]gov-ltv[.]bond www[.]gov-btx[.]cc www[.]gov-lrm[.]bond www[.]gov-imk[.]bond www[.]gov-bjk[.]cc www[.]gov-nha[.]cc”
Mass phishing infrastructure targeting government service impersonation portals
Credential harvesting phishing infrastructure (no specific malware family identified)
United States, India, Vietnam, United Kingdom
APT36 / Transparent Tribe (cluster overlap observed)
Government, Administration, Transport
T1566.002, T1598.003, T1036.005, T1583.001, T1584.001, T1071.001, T1041
High
Enforce MFA, implement DNS filtering and domain intelligence blocking, monitor newly registered domains, train users to verify URLs carefully, deploy advanced email/web filtering, and enforce reporting of phishing attempts
Spear-phishing campaign (Excel + PowerShell-based intrusion)
“5c3bf036ab8aadddb2428d27f3917b86 e9c16aa2e322a65fc2621679ca8e7414ebcf89c0 d4c184f4389d710c8aefe296486d4d3e430da609d86fa6289a8cea9fde4a1166”
Targeted pharmaceutical and life sciences organizations (IP theft focus)
Weaponized Excel documents, PowerShell payloads
North Korea
Kimsuky
Pharmaceutical, Life Sciences
T1566.001, T1204.002, T1059.001, T1027, T1005, T1041
High
Deploy advanced email filtering and phishing detection, enforce application allowlisting, restrict PowerShell usage via policy controls, apply regular patching, implement network segmentation, and monitor for data exfiltration and unusual PowerShell activity
Social engineering + fileless C2 intrusion campaign
” bdb1b9e37f6467b5f98d151a43f280f319bacf18198b22f55722292a832933ab 83AC38FB389A56A6BD5EB39ABF2AD81FAB84A7382DA296A855F62F3CDD9D629D 19c174f74b9de744502cdf47512ff10bba58248aa79a872ad64c23398e19580b 750b29ca6d52a55d0ba8f13e297244ee8d1b96066a9944f4aac88598ae000f41 b81aa37867f0ec772951ac30a5616db4d23ea49f7fd1a07bb1f1f45e304fc625 df0d4ba2e0799f337daac2b0ad7a64d80b7bcd68b7b57d2a26e47b2f520cc260 AD96A3DAB7F201DD7C9938DCF70D6921849F92C1A20A84A28B28D11F40F0FB06 tech-system[.]online protoflint[.]com novelumbsasa[.]art picasosoftai[.]shop dtt[.]alux[.]cc moldostonesupplies[.]pro x6iye[.]site buenohuy[.]live firetrue[.]live lokipoki[.]live veryspec[.]live mautau[.]live muatay[.]live nicepliced[.]live nissi[.]bg express1solutions[.]com doamin[.]cc regonalone[.]com
Finance sector organizations targeted via fake IT support (Microsoft Teams) social engineering leading to post-exploitation control and data theft
AdaptixC2 (open-source C2 framework abused in real attacks), PowerShell loaders, fileless shellcode execution
Global / not specified
Unattributed threat actors using AdaptixC2 (criminal + opportunistic intrusion usage)
Finance
T1566, T1059.001, T1055, T1547.001, T1574.002, T1105, T1041
High
Implement application allowlisting, restrict PowerShell execution and logging, deploy EDR with memory protection, enforce MFA, monitor outbound C2 traffic, block known malicious domains, and strengthen user awareness against Teams-based impersonation scams
Supply chain compromise (PyPI package poisoning – Xinference)
“hxxps://whereisitat[.]lucyatemysuperbox[.]space/ whereisitat[.]lucyatemysuperbox[.]space fe17e2ea4012d07d90ecb7793c1b0593a6138d25a393192263e751660ec3cd0 077d49fa708f498969d7cdffe701eb64675baaa4968ded9bd97a4936dd56c21c e1e007ce4eab7774785617179d1c01a9381ae83abfd431aae8dba6f82d3ac127 c6ce4e25f7fe3e3bb1eea2e9052483bf 484067fd6232f7cdd7b664b33857fc2c e291734d46c313a23d676681499f8846 9b3257e45b27a6bbe4e240e41a3a306f 3ee893ae46530b92e0d26435fb979d82 971670c10eff28339a085ca50a600e35”
IT sector organizations using compromised Xinference Python package versions 2.6.0–2.6.2
Malicious Python package (Xinference trojanized builds), Base64 obfuscated loader, credential stealer
Global / not specified
Unattributed supply chain attacker (PyPI maintainer credential compromise)
IT / Software Development
T1195.001, T1059.006, T1140, T1552.001, T1552.004, T1552.005, T1005, T1041
Critical
Immediately downgrade to safe version (≤2.5.0), rotate all exposed credentials (cloud, SSH, API, DB), block malicious domain at DNS/firewall level, enforce signed/verified package usage, adopt private PyPI registry, enable MFA, and monitor for credential exfiltration behavior

Apr 24, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Exploitation Campaign (Network Device Backdoor Deployment)
CVE-2025-20333; CVE-2025-20362
Targeting Cisco Firepower and ASA devices via exploitation of FXOS vulnerabilities to deploy persistent FIRESTARTER backdoor, enabling remote code execution within the LINA process and long-term unauthorized access
FIRESTARTER
None
UAT-4356
None
T1190; T1055; T1547.014; T1105; T1059
Critical
Upgrade Cisco devices to patched versions, apply fixes for CVEs, monitor for suspicious processes (e.g., lina_cs), check for unauthorized files, reimage compromised devices, restrict management access, monitor WebVPN/API traffic, deploy IDS/IPS signatures, segment networks, and review logs continuously
Social Engineering–Driven Intrusion Campaign
“2fa987b9ed6ec6d09c7451abd994249dfaba1c5a7da1c22b8407c461e62f7e49 c8940de8cb917abe158a826a1d08f1083af517351d01642e6c7f324d0bba1eb8 7f1d71e1e079f3244a69205588d504ed830d4c473747bb1b5c520634cc5a2477 ca390b86793922555c84abc3b34406da2899382c617f9dcf83a74ac09dd18190 6e6dab993f99505646051d2772701e3c4740096ff9be63c92713bcb7fcddf9f7 de200b79ad2bd9db37baeba5e4d183498d450494c71c8929433681e848c3807f”
Multi-stage enterprise intrusion leveraging phishing, Teams impersonation, and fake updates to deploy modular malware, establish persistence, conduct reconnaissance, dump credentials, and access domain controllers for data exfiltration
SNOWBELT; SNOWGLAZE; SNOWBASIN; AutoHotKey
None
UNC6692
None
T1566; T1204; T1059.001; T1059.003; T1053.005; T1547.001; T1056.001; T1003.001; T1021.001; T1041
Critical
Enforce MFA, validate helpdesk interactions, restrict script execution (e.g., AutoHotKey), block unauthorized browser extensions, monitor LS
Supply Chain Attack (Malicious npm Package)
33401580619ae79bf3f87aab16208f169a44a038f18671b1def7836fb2682c9a; b505f1d1ca3dca8cb7e2b2dd99991b5a929ec9387f3de31ad36549823af07dfd; 2fec04f2985510654d9656d57f6817de1ca0d6ae49e7085b1e33abb38f89cc55; 457a3323fe0cfa82d6e102074c6f07a399f55c7e0ce2d3b40643d9cfde0cf220; f2c754a7f7b56e0e2a6dd429f06c42a1860c52c37b25d0a8e91c67d1239fa577; 46b9522ba2dc757ac00a513dbd98b28babb018eae92347f2cbc3c7a5020872b5; 1c83019b52be6da9583d28fe934441a74eacef0cd7dbb9d71017122de6fe7cfc; hxxps://huggingface[.]co/Lordplay/system-releases/resolve/main/MicrosoftSystem64-win[.]exe; hxxps://huggingface[.]co/Lordplay/system-releases/resolve/main/MicrosoftSystem64-darwin-x64; hxxps://huggingface[.]co/Lordplay/system-releases/resolve/main/MicrosoftSystem64-darwin-arm64; hxxps://huggingface[.]co/Lordplay/system-releases/resolve/main/MicrosoftSystem64-linux; hxxps://huggingface[.]co/Lordplay/system-releases/resolve/main/version[.]txt; 195[.]201[.]194[.]107
Malicious npm package (js-logger-pack) delivering a cross-platform implant via postinstall script, downloading disguised binaries, establishing persistence, collecting sensitive data (keystrokes, clipboard, system info), and exfiltrating data via Hugging Face infrastructure while enabling remote command execution
js-logger-pack@1.1.27; Cross-platform implant; Hugging Face infrastructure
None
Unknown
None
T1195.002; T1056.001; T1115; T1041
Critical
Implement software composition analysis (SCA); audit and pin dependencies; monitor for unusual Hugging Face traffic; deploy EDR; restrict execution of postinstall scripts; review builds for unauthorized changes
Supply Chain Attack
33401580619ae79bf3f87aab16208f169a44a038f18671b1def7836fb2682c9a; b505f1d1ca3dca8cb7e2b2dd99991b5a929ec9387f3de31ad36549823af07dfd; 2fec04f2985510654d9656d57f6817de1ca0d6ae49e7085b1e33abb38f89cc55; 457a3323fe0cfa82d6e102074c6f07a399f55c7e0ce2d3b40643d9cfde0cf220; f2c754a7f7b56e0e2a6dd429f06c42a1860c52c37b25d0a8e91c67d1239fa577; 46b9522ba2dc757ac00a513dbd98b28babb018eae92347f2cbc3c7a5020872b5; 1c83019b52be6da9583d28fe934441a74eacef0cd7dbb9d71017122de6fe7cfc; hxxps://huggingface[.]co/Lordplay/system-releases/resolve/main/MicrosoftSystem64-win[.]exe; hxxps://huggingface[.]co/Lordplay/system-releases/resolve/main/MicrosoftSystem64-darwin-x64; hxxps://huggingface[.]co/Lordplay/system-releases/resolve/main/MicrosoftSystem64-darwin-arm64; hxxps://huggingface[.]co/Lordplay/system-releases/resolve/main/MicrosoftSystem64-linux; hxxps://huggingface[.]co/Lordplay/system-releases/resolve/main/version[.]txt; 195[.]201[.]194[.]107
Malicious npm package (js-logger-pack@1.1.27) delivering a cross-platform implant via postinstall script, abusing trusted platforms (Hugging Face) for payload hosting and data exfiltration, enabling persistence, surveillance (keylogging, clipboard capture), and remote command execution across Windows, macOS, and Linux systems
js-logger-pack@1.1.27; Cross-platform implant
None
Unknown
None
T1195.002; T1056.001; T1115; T1041
Critical
Implement software composition analysis (SCA); audit and pin dependencies; monitor for abnormal outbound connections to Hugging Face; deploy EDR solutions; restrict execution of postinstall scripts; continuously review dependencies for compromise
Insider Threat / Social Engineering Campaign (Fraudulent Remote Workforce)
163[.]245[.]219[.]19; 216[.]158[.]225[.]144; luckyguys[.]site
Coordinated DPRK-linked operation leveraging fake remote IT worker identities to infiltrate organizations, gain legitimate access, exfiltrate data, and generate revenue via freelance platforms while evading sanctions using VPNs, proxy infrastructure, and residential IP masking
Astrill VPN; Mullvad VPN; Proton VPN; Workana platform
None
North Korea (DPRK)
Finance; IT
T1583.001; T1583.004; T1090.003; T1585.001; T1078; T1567; T1588.005
High
Audit network logs for IoCs; treat Astrill VPN and similar services as high-risk indicators; validate identities of remote workers and freelancers; implement behavioral monitoring beyond IoC detection; scrutinize residential IP activity and proxy-like behavior; strengthen hiring and access control processes
Fraud / Social Engineering (IRSF – SMS Toll Fraud)
colnsdital[.]com; d[.]herbosfinx[.]com; d[.]zerrotmamil[.]com; d[.]vistertransit[.]com; d[.]marraheltin[.]com; r[.]transitcaxip[.]com; zawsterris[.]com; hotnow[.]sweeffg[.]online
Large-scale IRSF campaign leveraging fake CAPTCHA pages delivered via traffic distribution systems (TDS) to trick users into sending SMS messages to premium international numbers, generating fraudulent telecom revenue through multi-step social engineering and browser manipulation techniques
Traffic Distribution Systems (TDS); Fake CAPTCHA Pages
None
Unknown
Telecoms
T1566; T1204; T1071.001
High
Educate users to avoid interacting with suspicious CAPTCHA prompts or sending SMS messages; implement anti-phishing and web filtering controls; monitor for abnormal SMS traffic patterns; collaborate with telecom providers to detect and block IRSF activity; enforce strong security awareness practices
Supply Chain Attack (Software Dependency Compromise)
hxxps://whereisitat[.]lucyatemysuperbox[.]space/
Malicious versions (2.6.0, 2.6.1, 2.6.2) of the Xinference Python package on PyPI were backdoored with an obfuscated infostealer embedded in __init__.py , executing on import. The malware exfiltrates extensive sensitive data including cloud credentials (AWS, GCP), Kubernetes tokens, SSH keys, API keys, cryptocurrency wallets, database credentials, environment variables, and system metadata to a remote C2 server. The compromise was introduced via a bot account (“XprobeBot”), with attribution claims to “TeamPCP” (denied publicly), and confirmed by the Xinference maintainers.
Xinference (malicious PyPI package versions); Python runtime
None
Suspected: TeamPCP (unconfirmed)
Development; IT
T1195.001; T1059.006; T1552.001; T1552.004; T1082; T1005; T1041; T1027
Critical
Immediately downgrade to version 2.5.0; rotate all exposed secrets (cloud credentials, API keys, SSH keys); enforce 2FA; pin dependencies to verified versions; audit CI/CD pipelines and cloud environments for unauthorized access; implement software composition analysis (SCA) tools for dependency monitoring
Supply Chain / GitHub Repository Poisoning
“2273702dfbcfd96a6ed7bdb42ba130291b653869256ec1325bc7fe30e8d9b70a 2d72abb33b8428a3a73fb64a03e6ac84595c4b1636f190f2936fadec3c8792f6 b04db6cae604d2ab1542e3c0cf1a4a3bb8d76562556f7275efe25bb90fc1da19 d92ac938494c2c74c73f3ca28c5c7148d0a03024b46630192a9348259b7b3665 3299b85734e03cbb767d10f89384f666c35d6863198a7c6c0004ef19fcc76bc3 c324560d4310849fd6b86e126514b20512905eee7ee94a2152f4314bb4055649 2c3c4f1e3401c7baa804c21164b17a2ab50b3462ab09fcdccec35c8faa8e17fb 58b98acb7dc26d8130c20b38ad040e5e7042eac38f12205248595697143c4297 10cbcb3fb25205a53ea9fe4fad46f45a349f7da8de22dd53a1ce16a920059720 bc95563880f17f4c3fc0fd8d3f7abc37b14ffb3daa627f92d5bd0b4f457d54e2 13690a008d375908399e7f0bf8d1b4733498f1145166c7788fb9966c3b551b2f 12a09f9425cd4058956214b237ec82577c7b9ae15f323c28d3b4ad846d0d2f6b b599a00d1226f6e0d433bf9be89958d6d4600a365c8e16bd86b4603e2552bf37 998e14a100d1f541f9fd59f4e58dd86e76fe7a105b02646d3487f18583d46c42 ebe63bd7715e7b2ff0b25c9bb6540a904f7195fb9fb2d405bd0cb5c0c4d34476 3217ae928395e00d873cccdf2adfa7828fe319fc84501453e702af91a0af2596 e12e7d4d7c5ccf825c9c0ba3af32a9d575d1624ad6e3998e7a71c3e0939c0d61 012b49c7f60bbe0501e61fc62c9b7dd69be9bbf15cb36a840a293b3cb066b865 275275b5099a63724b6f525c1e9de082829e710078e8605c0286998b5a02e75d 7e107cc2db66be4c9a90c2ef81f21ae2893962e1040531dff0305d9283f27387 768c28bff5e2ccd991a4a5cbfe3331015e3262cbc007829631483b46aa582cbc 6b518855404b7281246aab93a46288b25f0cb0f09cdeb820e677ef615bf3fda4 572acf0d7a3801b9bc41f626bac781d75ea1f99770b176079ae5f9a347c09b78 4b3231da6ba13aa1e1eb8dd371e287bc18505273bca5bda80065c60b024549b8 1aacc8cb9694293dc152891fc26de64a2061b31a066d297373cdc87da54b6fd8 d142be1fc9a7eec7ec26aeea75e5f7a175c4ab9b2ee36b958280873bc3861b2e a50c4c26597cb4dc3ce340e1de0ec929b4a7ab0954a6ba214a32f158f01d6a8a 9de5dc4192a9dea43d9ff6289bb276bb3f2c244c15821b6d31fab90258b23149 2149a0c948d87f6a80ebb4abddf742c2383f59c7558a313caa0c0fd3bd3cdeef a6fce76371d8b950b22bbea5a94d5688c19368979d06b2ef3c41f18ce6ada4c3 a90898926236de8b574b50ef8c6c0411b193383d6db2214d73ead27c65867fd5 44d5de84ee0c31517d114640ba9b9b307ea9e1ec4e591de42cbb4d07ceb5e6c3 f5bdf3d6c1376476b0d9eb0e74aa5aa8ccc7378068531c8346d76fbef04c6a6e 5b09803d2acbec734d9c88496f9590bb7cbaf5392607ef0f20f79fe177f7fd83 d8469b109bb22ad367c19971e1065074527af144d4c1e7d7a4cfb0f2d6e12767 9f6368bccedd005075fe991719719b0df5af22df697cab76aa6b4392d38394b1 0a4bce0f0461335585550598ff33c40a389465f7d0094212bee40b7f525de123 f6d10e879324c36914002ebd989e1a6fdc50e29257078a95e975f18b42f69836 fad3d429172932b72e50f52af169a80439464e3538d97810509090e2e6cdf32a bff0904456e3151221d29ed1d7c88fc31587efbdfb28817cdcb7ec7f20cade21 bbd438d3d7a59152f1dd5e45bb8d22ee1c07f95cfe42cebbe756aaf4feadc875 d1557bc3f5d8542f9b7f8e80b02283397d2e437386a6662251c4fc7342167cda 167b166e26dd44f580a00f2c879089c5362eff5120ac88e0701b11b1eb320ca9 8b42ca9d05badf0e7327d816a56e5516431ae34627da68e12ae9347f365b2668 d56213d08fb10c880f17e1a262bf1176cf234d1fc591188171e7be9cd856eb12 3595a6b226ce4daa0a28edea152b3a887c01f6323db1d082f6568c995cdefb55 e69873a3ef03b289aba8a0ec7130247dc5f2a3ce8c3b647b44518a899f39f789 f3e34c9e36f3be065d80d456281d31dd1cc85eb4980db7fa8c1b0eb6f29c25d8 09e0f7616dfd2f7eb2876f6ef7331d6dbc78775acd594a94b0397a56717d1fcc 440ceb0dc5911faca54ed9a4dd186dad3d006ae4f52d0bb7d1e4b4edd8c3693a e450152d8dd9f7d2d92dbd53461a38ee8f154b69b2558ed43b5d3f603a43240a 76afe60e675e68906a2de61d45c46aa6502fe7f9c298260c226a4382744f4212 25aff351f5b4195f33e2fb862f71e3668e699f2311e7844e277b8256a6cb47c0 54bbd79ed1ee26d3e7aa079963ba26c36aa683c01cc8b05b6d255da8634df006 830ec7352972fd1eb24fcaf72349ef9a27dd9f26f24552d6b68b87ffeada1212 f9436ccb986760ca379d6cd2f00726e032a1d9c250a9bd261d40d98b914e7ef9 3989cdf958d258244f3a72bac594214112ffe1008d4d81233a5911482dd302ca c7b71a992c6ca1467164b643136d986c0eec28548f30533456a3ea0f442c85a8 59c2115caf3104184de6cbc64c4029886b7302e1fa58acc910a2c567222e8616 8cede35b80b1deaf732c2b178d908f91b3e7a0c114d06dfae9075b8a9bf78b8f d067cacea4ec623dc715c27ff7568d14988af0be1f3db32d332f27744114f9ba a93ac4fb3f9dadc22f7b7f1877bc99b84a77fe3bbe560bdd20bbd7c4b6f9c1d6 3658fc38c10867e30e3c5c98a7a392e452a4ba497c8a674ff26554bc09f032b0 b0f0b6e38f77c518ebfaf691d729636d82cc59dc2a329d7454e11f74a2cb2d3f cd4d2b6dc9c764c3f2b2b003bce035053a8ce81420c7ea886c76611219cae4ae 7e8bd9ba64fcbd1cb753baa2f7bc8d5d7f3e91552bcdc9ec1ec04edd4916ff33 af6f59bd3caee5daa2d6765dd8c1bc167060a9681617ee1e2aff32f1eda3477c a91b3308a7e9aa9fa660c72d27f226d8f50bfac2629f79a828fbecff323c0fe0 c3b56d68c80c4a6a9879c45a7761a538e3546644623af1ee469d3b70130fa0cd ce1e33483d353200a266b3bc383ccf500e5a760c6dcd8218747260f5bbe39509 212C76DAF355EDE116EB04D4F9D08A112D07940A14DC248BC568FF1BA0A64E18 87de3e5a8ef669589c421220cd392ae8027a8f8d3cd97d35ac339f87dcff12c8 144[.]31[.]57[.]67 144[.]31[.]57[.]65 213[.]176[.]73[.]149 hxxps://raw[.]githubusercontent[.]com/deepanshugoel99/long/refs/heads/main/long/long/message1[.]txt hxxps://raw[.]githubusercontent[.]com/deepanshugoel99/long/refs/heads/main/long/long/message2[.]txt hxxps://github[.]com/stcitlab1/PyrsistenceSniper/ hxxps://github[.]com/Shonpersus/founders-kit hxxps://github[.]com/therajeshpatil/home-assistant-global-health-score hxxps://github[.]com/Cherishpolyploid691/One-Player hxxps://github[.]com/eltayep2/india-district-nightlights-viirs hxxps://github[.]com/jayed50/cpp-dumper hxxps://github[.]com/Arlinablind800/qclaw-wechat-client hxxps://github[.]com/amosshadowy76/ai-product-skills hxxps://github[.]com/anubhavsingh-0218/uncodixify-skill hxxps://github[.]com/AlexSilgidzhiyan/agent-commerce hxxps://github[.]com/somya-droid/Pirate-LLM-Server hxxps://github[.]com/ashiskumarnanda/symphony-ts hxxps://github[.]com/rakibul3790/mdexplore hxxps://github[.]com/Cobras1934/task-calendar-dashboard hxxps://github[.]com/mohadesehfllh/whispr hxxps://github[.]com/FILDA007/TokenStream hxxps://github[.]com/halim2023/Ninja-Ripper-2[.]13-Full-Download hxxps://github[.]com/pandu1992/agent-workspace hxxps://github[.]com/freefire2chyko-a11y/openclaw-autotrader hxxps://github[.]com/silent-whisper/Hades-Stealer hxxps://github[.]com/Lyrothanak20/Impacket_Reference hxxps://github[.]com/sabalearning01/OpenClaw-RL hxxps://github[.]com/minullaksen/Amazon_Sales_Product_-_Revenue_Analysis_Excel hxxps://github[.]com/shripadk1999/EVOKORE-MCP hxxps://github[.]com/viktor820/AudioAuditor hxxps://github[.]com/arnautoff1/smart-money-miner hxxps://github[.]com/CobraZero969/EU-Gov-Tracker-Blocklist-by-madnesscc hxxps://github[.]com/hayate001/GliderUI hxxps://github[.]com/wtfhanin/Enhance-Prompt hxxps://github[.]com/jakariyaox-dot/mango-waf hxxps://github[.]com/AdebSamra/Delta-Clopix-Ultra hxxps://github[.]com/shmilymaria/VesperAIApp hxxps://github[.]com/AdebSamra/marketmuse-premium-access-hub hxxps://github[.]com/hayate001/Zygisk-Il2CppDumper hxxps://github[.]com/arnautoff1/pump-fun-dashboard hxxps://github[.]com/sabalearning01/bread-run-simulator-toolkit hxxps://github[.]com/eltayep2/hoshan-vehicles hxxps://github[.]com/mohadesehfllh/gatsby-ecommerce-theme hxxps://github[.]com/Casheu1/perplexity-2api-python hxxps://github[.]com/usernamedoxelghk/WindsurfSwitch hxxps://github[.]com/GamerX3560/Aria-V-7[.]1 hxxps://github[.]com/oliverkanda254/medusa-mobile-react-native hxxps://github[.]com/haren2312/medusa-mobile-react-native hxxps://github[.]com/Jonaskouame/Phone-Number-Tracker hxxps://github[.]com/h4vzz/awesome-ai-agent-skills hxxps://github[.]com/Sriv4/insta-hack-termux hxxps://github[.]com/renny2020/Open-UI hxxps://github[.]com/YahiaGrdh/vibe-agents hxxps://github[.]com/abuferas1262/yandex-speedtest-cli hxxps://github[.]com/CuddlyPaws22/codeclaw hxxps://github[.]com/jessevanwyk1/claude-scholar hxxps://github[.]com/ejfhgo/hacker-Toolkit hxxps://github[.]com/Ksalazar29/deepseek-claw hxxps://github[.]com/Pr-E/openclaw-master-skills hxxps://github[.]com/mreshuu/STForensicMacOS hxxps://github[.]com/phongdshh-debug/Ghost-MSG hxxps://github[.]com/TalangoJames/fractals hxxps://github[.]com/GH8ST007/llms_with_google_cloud hxxps://github[.]com/mohamedfaro7/Chuks-YT-Live_AI hxxps://github[.]com/mrizky214/task-runner-1771921051-1 hxxps://github[.]com/sidiishan/soul[.]py hxxps://github[.]com/Xhtira20/scraped hxxps://github[.]com/Always15dppk/register hxxps://github[.]com/omkargundle/claude-usage-bar hxxps://github[.]com/fajarsm14/epic-games hxxps://github[.]com/JoOdSy/mini-apps hxxps://github[.]com/MPB0828/Greenhouse-Gas-Emissions-Forecasting-with-ARIMA-LSTM hxxps://github[.]com/twinklew9/notes2latex hxxps://github[.]com/Sawyer60/Dataset_HealthHub hxxps://github[.]com/vlsienthusiast00x/Spodrue hxxps://github[.]com/IvannGonzzalez/hve-core hxxps://github[.]com/Aditya923-c/xpoz-agent-skills hxxps://github[.]com/Shavan889/minisforum-ms-s1-max-bios hxxps://github[.]com/DarkSliceYT/ai-infra-index hxxps://github[.]com/Seragatia/DocGenie hxxps://github[.]com/whydixit/cursor-starter hxxps://github[.]com/Tawhidhere/OneRec-Think hxxps://github[.]com/rushikeshjaware/DiffusionDriveV2 hxxps://github[.]com/Abisheak250402/cloakbrowser-human hxxps://github[.]com/Loune3213/Wazuh-Openclaw-Autopilot hxxps://github[.]com/Ragulrajtcestd/LSTM-Optuna hxxps://github[.]com/Tod-weenieroast366/coding-plan-mask hxxps://github[.]com/KemalFasa/discord-adapter-meme hxxps://github[.]com/Bhin4787/AI-Powered-Ticket-Routing-SLA-Breach-Prediction-in-JIRA hxxps://github[.]com/Jacksonsmg/SoftwareTesting-Cunit hxxps://github[.]com/linhkat3057/Valthrun hxxps://github[.]com/DIMANANDEZ/refrag hxxps://github[.]com/MichaelQDLe/CodeHive hxxps://github[.]com/VantageSolutions/ShadowTool hxxps://github[.]com/Pataterustiche/tonconnect hxxps://github[.]com/cristiancctlv/recaptcha-botguard hxxps://github[.]com/marciunyielding712/openage hxxps://github[.]com/Ali-Shady/claude-agent-desktop hxxps://github[.]com/2aryanZ/paper-submission-check hxxps://github[.]com/Hosk9612/venutian-antfarm hxxps://github[.]com/MohamedSamiHdj/realtime-data-pipeline hxxps://github[.]com/alvfpinedo/go-prometheus-exporter hxxps://github[.]com/MrKillerq/Mini-o3 hxxps://github[.]com/vickykumar11062/Replication-package-for-gender-and-regional-differences-in-scientific-mobility-and-immobility hxxps://github[.]com/nonunion-loasa895/codapter hxxps://github[.]com/WILLIAM86-CAPTAIN/gooey-search-tabs hxxps://github[.]com/hama1981/ROBLOX-MACRO-V3[.]0[.]0 hxxps://github[.]com/syedabdullahuddin/n8n-workflow-sdk-mcp hxxps://github[.]com/wanderconnect01/ika-network-skill hxxps://github[.]com/okoid721/chloroDAG hxxps://github[.]com/Valentin6595/WhatDreamsCost-ComfyUI hxxps://github[.]com/virginiadiom2000-ai/osv-ui hxxps://github[.]com/gage6903/son-of-claude hxxps://github[.]com/Milan-sisodia-27/idl-pu3”
Large-scale campaign abusing cloned GitHub repositories to distribute trojanized projects. Malicious ZIPs include a LuaJIT-based loader (SmartLoader) that executes obfuscated Lua payloads, performs system fingerprinting, screenshot capture, and exfiltration. C2 infrastructure is dynamically resolved via Polygon blockchain smart contracts, enabling resilient and rotating communication channels. Persistence achieved via scheduled tasks, with second-stage payloads (StealC) executed in memory for stealthy credential and data theft.
SmartLoader; StealC
None
Unknown
None
T1566.002; T1204.002; T1036; T1059.009; T1105; T1140; T1053.005; T1005; T1113; T1041; T1071.001
Critical
Enforce strict validation of open-source code and repositories before use; block or monitor access to suspicious GitHub repositories; deploy static and dynamic malware analysis tools; monitor for LuaJIT execution and abnormal scheduled task creation; inspect outbound traffic for unusual or blockchain-resolved C2 communication; enforce MFA and least privilege; regularly audit developer environments and GitHub access; educate users on risks of downloading code from unverified sources

Apr 23, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Ransomware / Data Exfiltration Campaign
“0ce7badb26174b6129fb13d7e255e582f84d8aaedeabcd02c80d84a609144068 1433aa8210b287b8d463d958fc9ceeb913644f550919cfb2c62370773799e5a5 1588023393eb6b4d9433d539d303ecb56b6c3630e860f94d1a137834bdedf2bd 205818e10c13d2e51b4c0196ca30111276ca1107fc8e25a0992fe67879eab964 207b11f7dc4f17e4e5a9c25dbfb6a785a7456d7c381ecea7c729d8d924be1fb9 274ca13168b38590c230bddc2d606bbe8c26de8a6d79156a6c7d07265efe0fdf 2b214bddaab130c274de6204af6dba5aeec7433da99aa950022fa306421a6d32 35f28a31a47b0bcd92722265473d66ffef6c4bd460c71c36b57df2ac0d02f671 396aa1f8f308010a3c76a53965d0eddd35e41176eacd1194745d9542239ca8dc 48f3d66492a494965e7039079158e2fee552aaab517d1a55352209c9eedcb765 49a7b3cf426d1f35a2138c0a6cec397688d223d7f2bcbbeed53b511a328a97be 4a44d0c6cf5de515dd296f05ff6674d1a340fccf6b4c11612d27be2d3baa82b0 4adbb1906762c757764ffc5fa64af96e091966f4f5a43aae12fcc4f05f1c26b5 598555a7e053c7456ee8a06a892309386e69d473c73284de9bbc0ba73b17e70a 5be325905df8aab7089ab2348d89343f55a2f88dadd75de8f382e8fa026451bd 647b2f12486343fe065dc4abbb11e2338589eb099c72792b5a05e64a5e2937fc 6688fb3039ad6df606d76a897ef1072cdc78b928335c6bfa691d99498caf5c4b 6bac99f56e54d5195783513ae6954a4a8509d7bc397c94f405266b5df9cd96cb 6c31dd44b29b5f87030caececc616cf366badeff5a7e4c9933aa5fa6445a0c7a 6ce228240458563d73c1c3cbbd04ef15cb7c5badacc78ce331848f5431b406cc 72fc3d03065922b9a03774bbd1873e5e7f3a5a2abf5dcf7bfb2e98aceed53a9d 73cd405b5bfc99ec5cf33467d4be7fc7e39ae18337568ee10173c17ba6e8f0d7 771de264c5d7e1e5ac85f00c42e9fe3b439bcbd4f9aa11e4fd7bc0d87fa2344e 7a313840d25adf94c7bf1d17393f5b991ba8baf50b8cacb7ce0420189c177e26 816d7616238958dfe0bb811a063eb3102efd82eff14408f5cab4cb5258bfd019 8a2f4907159a68867b22bc772590ebcafcfa656a23951228ecd89e4f598472b0 99c4775ed813f354c9e53f42797226d82b26f44d19e81036c9e55222d1744189 a18555c1ca53d4826191a30889d82205a304932f997baec755c98ddad4326cb8 b3774ba01a3096348fd76a7072407b9f07bb9589e0f5ba31ca576689bbbe94e4 c41216eee9756a1dcc546df4fe97defc05513eed64ce6ac05f1501b50e6f96cc c64964944b4c1f649ae8f694964b3a212dc1028341ab71836306a456fba0b3f4 c7d994eb2042633172bd8866c9f163be531444ce3126d5f340edd25cbdb473d4 d4339a5b9d15211dbc85424cf7fa8ff825033ea3378506d8ecb19b016db5b4ff d833e8fc97b3c865ebfb96a48da9ec446148cb5ad7e66ca5c47cd693f7923888 df5a574254637d2880633b0582e956b23f66efc6781e825c65e1ccfaa6c58809 e8a3e804a96c716a3e9b69195db6ffb0d33e2433af871e4d4e1eab3097237173 eee885e5dae750848d0903d179cacd81149ceecec83c2ec4ad4545531de3cfdf f27eab3157451e31db71169e71f76d28325193218f9dc8f421136d4a20165feb f5390674f0f49fe8af116396828c3de6729347ebc3c772d87618e55629aec06c 163[.]172[.]105[.]82”
Targeted enterprise networks using invoice/document-focused data theft and post-compromise credential harvesting
uploader_client.exe, Mimikatz, Nirsoft tools, AnyDesk, BYOVD kernel utilities
Not specified
Rhantus Group (Trigona ransomware affiliates)
Finance, Enterprise IT
T1486, T1048, T1560, T1003, T1555, T1562.001, T1543.003, T1068, T1134, T1548, T1219, T1041
High
Block outbound traffic to unknown IPs on port 1080; detect BYOVD tools; restrict AnyDesk; monitor credential dumping tools; deploy kernel tamper protection; enable DLP for invoice/PDF shares
APT / Espionage Campaign
“barrantaya[.]1010@outlook[.]com C72E7540D6F12D74D8E737B02F31568385F575D7 039EB329A173FCE7EFECA18611A8F2C0F7D24609 716554DC580A82CC17A1035ADD302C0766590964 57C2490E4DB194D3503EE85635FB1D6F26E8C534 AD7E264EB08415871617E45F21D03F7D71E4C36F FA9E65E58EB8FA41FDE0A0A870B7D24B298026D9 5A1BBB40C442B12594A913431F8C6757A3A66E8F 926974FACFD0383C65458D6EF1F31FBB7C769E18 43[.]231[.]113[.]50”
Targeted intrusion against Mongolian government entity using multi-stage Go-based modular toolset and SaaS C2 infrastructure (Slack, Discord, Microsoft 365, file.io)
LaxGopher, RatGopher, BoxOfFriends, JabGopher, FriendDelivery, CompactGopher, SSLORDoor
Mongolia
GopherWhisper (China-aligned APT)
Government, Public Administration
T1587.001, T1583.006, T1106, T1129, T1543.003, T1574.002, T1055.002, T1055.012, T1036, T1140, T1083, T1518, T1005, T1119, T1105, T1071.001, T1020, T1041, T1567
High
Monitor abuse of SaaS platforms (Slack, Discord, Microsoft 365, file.io) for C2; detect Go-based malware on endpoints; hunt DLL sideloading (JabGopher); inspect Graph API misuse; monitor encrypted non-standard HTTPS traffic on port 443; audit API token exposure
Infostealer Distribution Campaign (Fake AI Trading Site)
“95dcac62fc15e99d112d812f7687292e34de0e8e0a39e4f12082f726fa1b50ed 0d10a6472facabf7d7a8cfd2492fc990b890754c3d90888ef9fe5b2d2cca41c0 Tradingclaw[.]pro Chrocustumapp[.]com Chrocustomreversal[.]com google-services[.]cc Coretest[.]digital Reisen[.]work 178[.]16[.]55[.]234 37[.]221[.]66[.]27 2[.]56[.]179[.]16 178[.]16[.]54[.]109 37[.]221[.]66[.]27 209[.]17[.]118[.]17”
Fake TradingView AI trading assistant website delivering multi-stage infection chain via ZIP download and DLL side-loading leading to credential theft and crypto wallet exfiltration
Needle Stealer, iviewers.dll (loader), RegAsm.exe (process injection target)
Not specified
Not attributed
Finance, Cryptocurrency Users
T1189, T1204.002, T1574.002, T1055.012, T1555.003, T1113, T1005
High
Restrict software downloads to verified vendors; monitor and remove malicious browser extensions; enforce MFA; deploy EDR with focus on DLL sideloading + process hollowing detection; monitor C2 traffic and suspicious API endpoints; reset credentials and revoke sessions if compromised
APT / Targeted Espionage Campaign (Spearphishing + Multi-stage Loader)
“3238d2f6b9ea9825eb61ae5e80e7365c 2c65433696037f4ce0f8c9a1d78bdd6835c1b94d a4f2131eb497afe5f78d8d6e534df2b8d75c5b9b565c3ec17a323afe5355da26 67fcf5c21474d314aa0b27b0ce8befb2 19e3c4df728e3e657cb9496cd4aaf69648470b63 47c7ce0e3816647b23bb180725c7233e505f61c35e7776d47fd448009e887857 89daa54fada8798c5f4e21738c8ea0b4 bd618c9e1e10891fe666839650fa406833d70afd aeec65bac035789073b567753284b64ce0b95bbae62cf79e1479714238af0eb7 e2dc48ef24da000b8fc1354fa31ca9ae 6c68dc2e33780e07596c3c06aa819ea460b3d125 7a95ce0b5f201d9880a6844a1db69aac7d1a0bf1c88f85989264caf6c82c6001 2d7cc3646c287d6355def362916c6d26 adb47733c224fc8c0f7edc61becb578e560435ab 3936f522f187f8f67dda3dc88abfd170f6ba873af81fc31bbf1fdbcad1b2a7fb 71fa755b6ba012e1713c9101c7329f8d c2051635ccfdc0b48c260e7ceeee3f96bf026fea 6eaea92394e115cd6d5bab9ae1c6d088806229aae320e6c519c2d2210dbc94fe c620b4671a5715eec0e9f3b93e6532ba 343be0f2077901ea5b5b9fb97d97892ac1a907e6 b92a3a1cf5786b6e08643483387b77640cd44f84df1169dd00efde7af46b5714 9a69b717ec4e8a35ae595aa6762d3c27 401cc16d79d94c32da3f66df21d66ffd71603c14 3c29c72a59133dd9eb23953211129fd8275a11b91a3b8dddb3c6e502b6b63edb 158[.]247[.]193[.]100 hxxps://47[.]76[.]236[.]58:4430/Originate/contacts/CX4YJ5JI7RZ hxxps://47[.]76[.]236[.]58:4430/Divide/developement/GIZWQVCLF hxxps://stg[.]lsmartv[.]com:8443/Originate/contacts/CX4YJ5JI7RZ hxxps://stg[.]lsmartv[.]com:8443/Divide/developement/GIZWQVCLF”
Multi-stage intrusion campaign using malicious ZIP attachments and trojanized PDF reader to deploy in-memory C2 beaconing and persistent remote access
TOSHIS loader, AdaptixC2 Beacon, Cobalt Strike Beacon, EntryShell, trojanized SumatraPDF
Taiwan, South Korea, Japan
Tropic Trooper (Earth Centaur / Pirate Panda)
Military, Defense, Government, Public Administration
T1566.001, T1204.002, T1059.001, T1036.005, T1105, T1219, T1071.001
High
Block and monitor malicious attachment-based phishing; detect trojanized PDF readers; monitor PowerShell execution anomalies; restrict unsigned binaries; deploy EDR with in-memory beacon detection; monitor outbound HTTPS tunnels to unknown infrastructure; enforce MFA and least privilege access

Apr 22, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Targeted Spear-Phishing / Cyber Espionage Campaign
” 7beede15ecdc7d3f01db4b699e5fe5f4f2e7c79cd7ef0e918ed0583bf621de7d 9bf2f3b15a621789f898f9bd7710ba857e3f238a4937b64fdc47ef9a92e0b05d 18bc0e0f627d90fb283aa243055b46d0bfb5d85a7240d8f63ec2d1c8a2c15893 6d22d50634c2c2fc853bfd2b564e1837d51087aa684a9c4415634c8c13c44135 editor[.]gleeze[.]com www[.]cosmosmusic[.]com victorcha707@gmail[.]com”
Dual campaign targeting banking sector and policy/diplomatic individuals using themed lures and shared malware infrastructure
LOTUSLITE v1.1, Microsoft_DNX.exe (DLL sideloading), CHM loader (hh.exe abuse)
India, South Korea, United States
Mustang Panda (UNC6384)
Banking, Government, Diplomacy, Finance, High-Value Individuals
T1566.001, T1566.002, T1574.002, T1059.007, T1547.001, T1071.001, T1568.001, T1036.005, T1027, T1082, T1105, T1583.001, T1586.002, T1608.001
High
Monitor for DLL sideloading via signed binaries, restrict CHM execution, detect abnormal hh.exe activity, block suspicious dynamic DNS traffic, monitor registry Run key persistence, enforce EDR and user awareness against spear-phishing and impersonation
Infostealer Campaign (Fileless / macOS-targeted)
” ffb79953b8d822a5433f08e1e3958a0c7e9e856749a6d90c83b9e4ef5813a03a eb66a20468f701f2ec5f018a0fd9b8551aefa25124c6a04517b873da9ca724ff terafolt[.]com res2erch-sl0ut[.]com hxxps://terafolt[.]com/api/bot/heartbeat hxxps://terafolt[.]com/gate”
Multi-stage macOS infostealer campaign leveraging fileless AppleScript execution, targeting credentials, crypto wallets, and browser data with persistence via wallet backdooring
SHub Stealer v2.0
None
Suspected Russian-speaking operators
IT; eCommerce; Digi
T1059.002; T1555.001; T1555.003; T1056.002; T1041; T1547; T1027; T1195; T1033; T1083; T1176
High
Monitor osascript-based execution chains, enforce file integrity checks on wallet apps, detect abnormal credential access and browser data harvesting, monitor large outbound POST traffic, and validate wallet application integrity
Malware Loader Campaign (Masquerading / C2-based)
” 94[.]232[.]46[.]16 94[.]232[.]46[.]202 94[.]232[.]46[.]15″
Multi-stage loader campaign using decoy application (Slack) to deliver second-stage payload and establish C2 communication over non-standard ports
Slack (decoy), BORZ C2 Panel
None
Unknown (possible false-flag / multi-layered attribution)
None
T1204.002, T1036.005, T1105, T1571
High
Implement strong email/messaging security controls, monitor for connections to suspicious C2 infrastructure, enhance EDR detection, analyze geopolitical lures for deception indicators, and maintain updated threat intelligence feeds
Trojanized Software Distribution / Infostealer Campaign
google-antigravity[.]com opus-dsn[.]com”
Malicious distribution of trojanized installer via typosquatted domain delivering staged payloads and credential-stealing malware
.NET Stealer, PowerShell loader, Trojanized Antigravity Installer
None
Unknown
None
T1204.002, T1059.001, T1053.005, T1562.001, T1112, T1027, T1620, T1056.001, T1115, T1555, T1041
High
Scan systems immediately, terminate active sessions and reset credentials, consider full OS reinstallation, enforce MFA, educate users on trusted download sources, and monitor network traffic for suspicious activity
Ransomware Campaign (Multi-Platform / ESXi & Windows)
“6ccacb7567b6c0bd2ca8e68ff59d5ef21e8f47fc1af70d4d88a421f1fc5280fc 45bff0df2c408b3f589aed984cc331b617021ecbea57171dac719b5f545f5e8d 4ed176edb75ae2114cda8cfb3f83ac2ecdc4476fa1ef30ad8c81a54c0a223a29”
Coordinated ransomware deployment targeting both VMware ESXi environments and Windows systems, impacting virtual infrastructure and enterprise endpoints simultaneously
Kyber Ransomware
None
Unknown
None
T1486; T1489; T1070.001; T1021.004; T1562.001
Critical

Apr 21, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Phishing / Social Engineering Campaign (Ransomware Delivery)
“1c715cd40331ba2ca6559d2fdb958e7f44053080f9ffd3d90bd1916978d336cb 5cdec83048aba45a5a635f470c602c0f29fadeef5d3d5e7dc88291b1588b8dcc 755cc133ae0519accbcfdd5f8f0d9fe1aa08cbcb306c3e5f29ebcb6ac12d9323 8445652beedba94a586e23bfc6af49d98d76845d178314212058258e68e51500 8976e76450bfb8af45f3c9ebc24a8f6a3df912d87a10b5625774fa6aace7fc19 ac38fb51937c123a7a52da7243ec2d25c8120158c31dc94bcd94e8935513f7b7 eaa63d074eb82c5d798b944e7e2b6ead1617508c8413845a81ba5ebd08a00b93 02room[.]us 02web-zoom[.]us 05webus[.]meet[.]05uk[.]us 07web[.]zoom[.]uk07[.]pro 07webus[.]zoom[.]us07[.]sbs ccx[.]capital cdsx[.]capital chaincapx[.]com coindeepseax[.]com godlike-visit[.]online gogoschip[.]online lumax[.]capital meet-05[.]sbs meet[.]googleapps[.]eu[.]org meet05[.]sbs megabitcapital[.]com solidbitcapital[.]com teamsupport[.]live uk03[.]web-zoom[.]uk uk07[.]pro us02[.]us us02web[.]zoom[.]us02[.]us us03[.]meet-web[.]us us03[.]zoom[.]meet-web[.]us us05[.]zoom[.]web04[.]us us05web[.]zoom[.]us05[.]us us07[.]web-zoom[.]uk usweb[.]02room[.]us usweb[.]07-web[.]us w3bitcapital[.]com walleyecapital[.]org walleyevc[.]capital walleyeventure[.]xyz web-lives[.]com web05meet[.]us web07us[.]uk07[.]us weventure[.]capital www[.]web05meet[.]us zoom[.]02euweb[.]us zoom[.]05ukweb[.]uk zoom[.]us07-web[.]us zoom[.]web02meet[.]com zoom[.]web05meet[.]us 108[.]174[.]198[.]11 144[.]172[.]114[.]220 144[.]172[.]116[.]9 23[.]254[.]167[.]21 45[.]61[.]129[.]29 45[.]61[.]157[.]248”
Long-running, high-volume opportunistic campaign targeting individuals and SMBs
Adwind, JanaWare Ransomware
Turkey
Unknown
N/A
T1566 (Phishing), T1204 (User Execution), T1027 (Obfuscation), T1071.001 (Web Protocols), T1041 (Exfiltration Over C2)
High
Implement EDR with behavioral analysis; monitor process and network anomalies; update threat intelligence feeds; enforce application control; conduct user awareness training on phishing
Infostealer-as-a-Service campaign leveraging dead-drop C2 via Telegram and code-signed malware
“185[.]56[.]45[.]235 cebolinhaburger[.]com blogdospesados[.]com[.]br”
Multi-affiliate global campaign using dynamic C2 infrastructure and compromised web services
Vidar Stealer (Go-based variants)
None specified
Unknown (multi-affiliate ecosystem)
None specified
T1553.002, T1027, T1102.002, T1071.001, T1041
High
Enforce strict certificate validation, monitor Telegram-based C2 patterns, deploy EDR for Go-based malware detection, block known IoCs, and enhance threat intelligence monitoring for evolving infrastructure
Supply Chain Compromise / Credential Harvesting Campaign
“95c17869073bff8a045083315c97583cb0d4f4c19165e657ed584ef7e16868a1 107[.]189[.]23[.]185 86[.]54[.]25[.]202 86[.]54[.]25[.]204 scan-tron[.]link”
Targeted compromise of macOS stealer infrastructure (Odyssey panels), including backdoored operator panel for credential theft
Odyssey (AMOS) macOS Stealer
None specified
Unknown
None specified
T1556 (Modify Authentication Process), T1056 (Input Capture), T1041 (Exfiltration Over C2 Channel)
High
Enforce supply chain integrity checks, monitor outbound traffic to suspicious domains, deploy EDR to detect browser/API hooking and credential harvesting, audit access controls, and enforce MFA across sensitive systems

Apr 20, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
SEO Poisoning / Malware Distribution Campaign
“193[.]42[.]11[.]108 directdownload[.]icu direct-download[.]gleeze[.]com testdisk[.]dev hxxps://www[.]testdisk[.]dev/download[.]html 1b2555b09ac62164638f47c8272beb6b0f97186e37d3a54cb84c723ff7a2eee5”
Targets users searching for TestDisk via search engines; broad opportunistic distribution
ScreenConnect (trojanized), DLL sideloading payload (autorun.dll)
None
Unknown
None
T1189 (Drive-by Compromise), T1574.002 (DLL Side-Loading), T1218 (System Binary Proxy Execution), T1543.003 (Windows Service), T1556 (Modify Authentication Process), T1133 (External Remote Services), T1071.001 (Web Protocols)
High
Implement EDR with behavioral detection, block malicious domains, restrict unauthorized RMM tools, monitor for DLL sideloading activity, and conduct user awareness on SEO poisoning risks

Apr 17, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Financially motivated intrusion campaign (cargo theft / freight fraud) using RMM abuse
“1f89a432471ec2efe58df788c576007d6782bbdf5b572a5fbf5da40df536c9f5 hxxps://carrier-packets-docs[.]com/FREEDOM_FREIGHT_SERVICES_CARRIERS_ONBOARDING[.]vbs hxxps://qto12q[.]top/pdf[.]ps1 f4977bfeae2a957add1aaf01804d2de2a5a5f9f1338f719db661ac4f53528747 nq251os[.]top d9832d9208b2c4a34cf5220b1ebaf11f0425cf638ac67bf4669b11c80e460f58 7f54cf5e2beb3f1f5d2b3ba1c6a16ce1927ffecd20a9d635329b1e16cb74fb14 officcee404[.]com de30bb1e367d8c9b8b7d5e04e5178f2758157302638f81480ba018331a6f853e b861e3682ca3326d6b29561e4b11f930f4a9f10e9588a3d48b09aa6c36a8ea80 147[.]45[.]218[.]0 82d603c0b387116b7effdee6f361ca982c188de0c208e681e942300a0139c03f 8a3d6a6870b64767ad2cc9ad4db728abf08bae84726b06be6cb97faac6c14ae4 screlay[.]amtechcomputers[.]net 3dcb89430bae8d89b9879da192351506f4fdb7c67e253a27f58b3bf52101cd4c signer[.]bulbcentral[.]com services-sc-files[.]s3[.]us-east-2[.]amazonaws[.]com”
Transportation and logistics organizations; prolonged post-compromise access for fraud and asset theftTransportation and logistics organizations; prolonged post-compromise access for fraud and asset theft
ScreenConnect, Pulseway, SimpleHelp (RMM tools), VBS payloads, PowerShell scripts
Not specified
Financially motivated threat actor
Transport, Logistics
T1566.001, T1059.001, T1219, T1105, T1087, T1083, T1041
High
Apply strong email filtering and attachment controls, restrict unauthorized RMM tools, monitor PowerShell execution, enforce MFA, segment networks, and monitor for abnormal remote access tool behavior and certificate misuse
Large-scale IoT botnet propagation and exploitation campaign targeting EoL TP-Link routers (Mirai variant activity)
“3fbd2a2e82ceb5e91eadbad02cb45ac618324da9b1895d81ebe7de765dca30e7, 4caaa18982cd4056fead54b98d57f9a2a1ddd654cf19a7ba2366dfadbd6033da, 9df711c3aef2bba17b622ddfd955452f8d8eb55899528fbc13d9540c52f13402, 7bbb21fec19512d932b7a92652ed0c8f0fedea89f34b9d6f267cf39de0eb9b20, 534b654531a6a540a144da9545ee343e1046f843d7de4c1091b46c3ee66a508b, 919f292a07a37f163f88527e725406187c8ecc637387ad24853fe49ce4e6ddf4, 56f21f412e898ad9e3ee05d5f44c44d9d7bcb9ecbfbdb9de11b8fa5a637aeef6, bot[.]ddosvps[.]cc, 51[.]38[.]137[.]113, cnc[.]vietdediserver[.]shop3fbd2a2e82ceb5e91eadbad02cb45ac618324da9b1895d81ebe7de765dca30e7 4caaa18982cd4056fead54b98d57f9a2a1ddd654cf19a7ba2366dfadbd6033da 9df711c3aef2bba17b622ddfd955452f8d8eb55899528fbc13d9540c52f13402 7bbb21fec19512d932b7a92652ed0c8f0fedea89f34b9d6f267cf39de0eb9b20 534b654531a6a540a144da9545ee343e1046f843d7de4c1091b46c3ee66a508b 919f292a07a37f163f88527e725406187c8ecc637387ad24853fe49ce4e6ddf4 56f21f412e898ad9e3ee05d5f44c44d9d7bcb9ecbfbdb9de11b8fa5a637aeef6 hxxp://bot[.]ddosvps[.]cc/top1hbt[.]arm hxxp://bot[.]ddosvps[.]cc/top1hbt[.]arm5 hxxp://bot[.]ddosvps[.]cc/top1hbt[.]arm6 hxxp://bot[.]ddosvps[.]cc/top1hbt[.]arm7 hxxp://bot[.]ddosvps[.]cc/top1hbt[.]mips hxxp://bot[.]ddosvps[.]cc/top1hbt[.]mpsl hxxp://bot[.]ddosvps[.]cc/top1hbt[.]x86_64 hxxp://bot[.]ddosvps[.]cc/top1hbt[.]sh4 hxxp://51[.]38[.]137[.]113/arm hxxp://51[.]38[.]137[.]113/arm5 hxxp://51[.]38[.]137[.]113/arm6 hxxp://51[.]38[.]137[.]113/arm7 hxxp://51[.]38[.]137[.]113/x86_64 hxxp://51[.]38[.]137[.]113/mips hxxp://51[.]38[.]137[.]113/sh4 51[.]38[.]137[.]113 cnc[.]vietdediserver[.]shop bot[.]ddosvps[.]cc”
End-of-life TP-Link routers (TL-WR940N, TL-WR740N, TL-WR841N); global internet-exposed devices
Mirai-like botnet malware (Condi variant)
None specified
Opportunistic botnet operators
Telecommunications / Networking devices
T1190, T1059.004, T1078, T1105, T1071.001
High
Patch router firmware immediately, disable remote administration, segment IoT devices, monitor outbound traffic, and deploy IDS/IPS rules to detect command injection attempts and botnet C2 communication
macOS targeted social engineering campaign distributing fake Zoom SDK update leading to multi-stage infostealer deployment
” 2075fd1a1362d188290910a8c55cf30c11ed5955c04af410c481410f538da419 05e1761b535537287e7b72d103a29c4453742725600f59a34a4831eafc0b8e53 5fbbca2d72840feb86b6ef8a1abb4fe2f225d84228a714391673be2719c73ac7 5e581f22f56883ee13358f73fabab00fcf9313a053210eb12ac18e66098346e5 95e893e7cdde19d7d16ff5a5074d0b369abd31c1a30962656133caa8153e8d63 8fd5b8db10458ace7e4ed335eb0c66527e1928ad87a3c688595804f72b205e8c a05400000843fbad6b28d2b76fc201c3d415a72d88d8dc548fafd8bae073c640 uw04webzoom[.]us check02id[.]com 188[.]227[.]196[.]252 83[.]136[.]210[.]180 83[.]136[.]208[.]246 83[.]136[.]209[.]22 104[.]145[.]210[.]107″
macOS users in cryptocurrency and finance-related environments
AppleScript-based malware chain, curl-based downloader, launch daemons persistence
Not specified
Sapphire Sleet (North Korea-linked threat actor)
Finance
T1566, T1204.002, T1059.002, T1105, T1543.004, T1555, T1005, T1041
High
Train users on fake update/social engineering risks, enforce MFA, deploy macOS EDR, restrict script execution (AppleScript), monitor Launch Daemons, and validate software updates via trusted sources only
Rust-based multi-stage RAT deployment campaign using DLL loader, process injection, and WebSocket C2 over Windows living-off-the-land binaries
“45[.]131[.]214[.]132 f0afbbb3c80e5347191452f2f3b147627e9d1ae4d60b61d6da900a60b35eec95”
Enterprise Windows environments (post-compromise persistence and remote control operations)
SpankRAT, SpankLoader
None specified
None attributed
None specified
T1055, T1055.001, T1053.005, T1059.001, T1105, T1071.001
High
Detect DLL injection into explorer.exe, monitor suspicious scheduled tasks, block PowerShell execution policy bypass, inspect WebSocket-based C2 traffic, and enhance EDR behavioral detection for process hollowing and in-memory execution
Adversary abuse of legitimate virtualization software (QEMU) to host covert virtual machines for stealth operations and credential theft
” CVE-2025-26399 CVE-2025-5777 7ae413b76424508055154ee262c7567705dc1ac00607f5ac2e43d032221b34b3 25e4d0eacff44f67a0a9d13970656cf76e5fd78c f7a11aeaa4f0c748961bbebb2f9e12b6 f3194018d60645e43afabac33ceb4e852f95241b410cd726b1c40e3021589937 6c09b0d102361888daa7fa4f191f603a19af47cb b752ebfc1004f2c717609145e28243f3 c6b848c6a61685724fa9e2b3f6e3a118323ee0c165d1aa8c8a574205a4c4be59 66dc383e9e0852523fe50def0851b9268865f779 61c14c01460810f6f5f760daf8edbda82eea908b1a95052f8e0f9c4162c2900c 144[.]208[.]127[.]190 194[.]110[.]172[.]152 vtps[.]us”
Enterprise environments with compromised hosts running hidden virtual machines for persistence and lateral movement
QEMU abuse, reverse SSH tunneling, scheduled task persistence, Active Directory enumeration tools
None specified
STAC4713, STAC3725
IT / Enterprise Infrastructure
T1053.005, T1021.004, T1041, T1003.003, T1087
High
Detect unauthorized virtualization activity, monitor for hypervisor anomalies, enforce strict patching for known exploited vulnerabilities, restrict SSH tunneling, segment networks, and deploy behavioral EDR to identify credential dumping and hidden VM activity
Social engineering-driven ransomware intrusion campaign leveraging spam bombing, phishing, vishing, Microsoft Teams abuse, and Quick Assist for remote access leading to ransomware deployment
“335ad12a950f885073acdfebb250c93fb28ca3f374bbba5189986d9234dcbff4 d68ce82e82801cd487f9cd2d24f7b30e353cafd0704dcdf0bb8f12822d4227c2”
Enterprise users and organizations targeted via remote social engineering and helpdesk impersonation tactics
Payouts King ransomware
None specified
Payouts King (possibly former BlackBasta affiliates)
None specified
T1566, T1566.004, T1053.005, T1486, T1490, T1070.001
High
Enforce MFA, restrict remote assistance tools like Quick Assist, monitor for abnormal Teams activity and helpdesk impersonation attempts, improve phishing/vishing awareness training, deploy EDR with ransomware behavior detection, and ensure immutable/offline backups are in place

Apr 15, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Ransomware-as-a-Service campaign (NightSpire)
CVE-2024-55591 94dd3315fca4c31ef61b7865c3b8983f f5da096e2ae6079c4670ddd6566244618056a22e c5f526cc62688cf34c49d098dab81e24e4294f832ada57433ef505d5ac6da8f3 c75070ecb9a77e07975664675174c84b 289fd2f98bcb6e9d27798c9fea572dfcf10931f5 8f58870a3e5df1d904940c7ef2ad160b90ba739c7e5e21e4c908945e0a6f3f60
Multi-sector global targeting of SMBs across multiple industries
NightSpire ransomware (Go-based)
Global
NightSpire RaaS group (financially motivated)
Manufacturing, IT, Health, Finance, Government, Administration
T1566, T1190, T1003, T1021.002, T1047, T1059.001, T1486
High
Use threat intelligence for TTP mapping, conduct red teaming and attack path testing, enforce phishing resilience, maintain offline backups and recovery plans, continuously update security controls and user awareness training
Phishing campaign (malware delivery → ransomware)
” 4f0444e11633a331eddb0deeec17fd69 fe9cc76ea60473d615b5858d5b511b2c9d22bce5 fb5fe19c28f8f44026b0c46939068480f9f005b252961ea782e1ce59b8f5dc59 b2d5bbf7746c2cb87d5505ced8d6c4c6″
Long-running campaign targeting home users and SMBs with geofencing and Tor-based C2 communication
Adwind (custom variant), JanaWare ransomware
Turkey
Unknown
None
T1566, T1204, T1027, T1071.001, T1041
High
Implement EDR with behavioral detection, monitor abnormal process and network activity, update threat intelligence feeds, enforce application control, and conduct phishing awareness training

Apr 14, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Supply chain attack (trojanized installer)
“5627c24dd7661df4d4c8617a9a68c8bf 7eb1a6495269e8faf6b0faecd5dfcf58 8367920fc34144d57b385276a8b3ecbcc0696475 a6c802b8d2b7351ddcd3dd50b17d5aaa36bc7937a41445cd4797363c0efe95ff”
Compromise of official installer for a cloud phone/virtual mobile service, distributing trojanized software that deploys a multi-stage in-memory loader delivering GGBond RAT across multiple sectors
GGBond RAT, multi-stage loader, in-memory execution techniques
None identified
Unknown
Government, Administration, IT, Education, Finance, Energy
T1195.002 (Supply Chain Compromise) T1574.002 (DLL Side-Loading) T1620 (Reflective Code Loading) T1055 (Process Injection) T1082 (System Information Discovery) T1071.001 (Web Protocols) T1041 (Exfiltration Over C2 Channel)
Critical
Reinstall software from verified sources only Validate installer integrity (hash/signature) Monitor abnormal DLL loading and in-memory execution Block suspicious outbound communications Deploy EDR for behavioral detection Restrict execution from writable directories Segment networks to limit spread Conduct full scans and isolate affected systems
Software supply chain attack (malicious NPM packages)
“d780fe3b635ff099682677f3c93e42d789e572926fd0db076c27e775bb109b06 d70e7e37dfa4cf501cbd0ef6a236c84b 18e8742fb6fb5e70c0c91823d72f5d9074be1d1cba1cbfc0eca75b5427e544da 43f446a86f1fbee74a486185c6dc1d51 646f3904ff03e64229f938ac23fa8bb79ed1658ee5aa0bee4aa8909f38f763cd 823f13d45fe0dd05d2f1ac4344d8ae75”
Large-scale campaign involving 200+ malicious NPM packages impersonating AI tools, brands, and organizations, delivering cross-platform infostealer malware via post-install scripts with widespread distribution via mirrors and CDNs
Stardrop malware (infostealer), malicious NPM packages, JavaScript post-install scripts
None identified
Unknown
None identified
T1195.001 (Supply Chain Compromise – Dependencies) T1059.007 (JavaScript Execution) T1105 (Ingress Tool Transfer) T1552.001 (Credentials in Files) T1552.005 (Cloud Metadata API)
Critical
Enforce strict dependency vetting and management practices Use static and dynamic analysis tools for package inspection Regularly audit and update dependencies Educate developers on supply chain risks Implement SBOM for full visibility of software components
Exploitation of critical vulnerability (WordPress plugin)
CVE-2026-3584 130[.]12[.]182[.]154 157[.]15[.]40[.]74″
Active exploitation of Kali Forms WordPress plugin vulnerability enabling unauthenticated RCE, with over 312,000 attack attempts observed, leading to potential website compromise, admin access, and malicious code deployment
Kali Forms WordPress Plugin (RCE vulnerability exploitation)
None identified
Unknown
None identified
T1190 (Exploit Public-Facing Application) T1059.007 (PHP Execution) T1078 (Valid Accounts) T1505.003 (Web Shell)
Critical
Update Kali Forms to version 2.4.10 or later immediately Monitor logs for suspicious activity and IoCs Deploy WAF to block exploitation attempts Regularly update plugins and themes Strengthen access controls for WordPress environments
Social engineering campaign (malicious plugin abuse)
” 70bbb38b70fd836d66e8166ec27be9aa8535b3876596fc80c45e3de4ce327980 33dacf9f854f636216e5062ca252df8e5bed652efd78b86512f5b868b11ee70f panel[.]fefea22134[.]net 0x666[.]info hxxp://t[.]me/ax03bot hxxps://t[.]me/ax03bot”
Sophisticated cross-platform campaign (REF6598) targeting finance and crypto users by abusing Obsidian plugins to execute hidden commands, delivering PHANTOMPULSE RAT via in-memory loaders with blockchain-based C2 infrastructure
PHANTOMPULSE RAT, PHANTOMPULL loader, Obsidian (legitimate tool abuse), PowerShell, AppleScript
None identified
Unknown
Finance
T1566.003 (Spearphishing via Service) T1204.002 (User Execution – Malicious File) T1059.001 (PowerShell) T1059.002 (AppleScript) T1620 (Reflective Code Loading) T1055 (Process Injection) T1105 (Ingress Tool Transfer)
High
Enforce strict plugin policies for applications like Obsidian Monitor anomalous child process execution Deploy and tune EDR for behavioral detection Educate users on social engineering risks Implement MFA to reduce account compromise risk Continuously review and update security controls
Phishing & Living-off-the-Land attack (MSBuild abuse)
“769687f93869a70511aac1ef7c752455 ad833604d230b241e180950980ea462b3812f82a 46314092c8d00ab93cbbdc824b9fc39dec9303169163b9625bae3b1717d70ebc 7a75e713db41c28378e823322fdea0fd d1a86ed06b18efef5ce724d2129cf1583b779b44 de8ddc2451fb1305d76ab20661725d11c77625aeeaa1447faf3fbf56706c87f1 hxxps://onedown[.]gesecole[.]net/download/a3693kfa836 hxxps://onedown[.]gesecole[.]net/download/a3696kfa836 hxxps://onedown[.]gesecole[.]net/download/a3699kfa836”
Campaign leveraging phishing emails to deliver disguised archives containing malicious MSBuild project files, enabling fileless execution of embedded C# payloads, downloading additional malware, and abusing DLL sideloading for stealthy persistence
MSBuild.exe (LOLBin abuse), C# in-memory payloads, DLL sideloading
None identified
Unknown
None identified
T1218.005 (MSBuild Proxy Execution) T1566.001 (Spearphishing Attachment) T1204.002 (User Execution – Malicious File) T1105 (Ingress Tool Transfer) T1574.002 (DLL Side-Loading)
High
Deploy EDR with behavioral detection capabilities Monitor abnormal use of MSBuild and child processes Enforce application control policies Strengthen phishing defenses and user awareness Apply least privilege principles Continuously update detection rules for LOLBins
DragonForce ransomware intrusion
“38[.]146[.]28[.]93 38[.]135[.]54[.]24 CarryingItAll[.]com 185[.]174[.]101[.]69 104[.]238[.]61[.]144 88[.]119[.]175[.]65 92[.]118[.]112[.]208 173[.]44[.]141[.]226 185[.]174[.]101[.]240 108[.]181[.]115[.]171 162[.]252[.]173[.]12 108[.]181[.]182[.]143 23[.]227[.]193[.]172 88[.]119[.]175[.]70 193[.]203[.]49[.]90 185[.]33[.]86[.]15 37[.]1[.]212[.]18 38[.]180[.]81[.]153 45[.]66[.]248[.]150 158[.]255[.]213[.]22 162[.]248[.]224[.]223 chateaugalicia[.]com 104[.]238[.]60[.]108 185[.]233[.]166[.]124 185[.]72[.]8[.]65 92[.]118[.]112[.]143 45[.]82[.]85[.]50 185[.]72[.]8[.]121 joealdana[.]com 185[.]180[.]198[.]3 185[.]72[.]8[.]137 0212a0e0b6454fec8382268bf888c7f3a9716ba30d4ca34f2babe6e8ceaf2a7c 05c61e9a8a7e8a3548afd765786f45181746c8e846912ca40aa5b7fa62262dc5 097d59852cdb90b68794c6554a89d11244f99375e1fd58ee594e30cd600fe66b 0f0db5079a9fbd760bb24ee979e2e808b2dc089c17033310838474a53a267f04 1633832a753c8537cb099e431bed4e33e65652ffa4bfaa23afdce71b05651b7d 1b7109ba3b20ece0b456fc03614f65548877d4743453dd10f7e810f1d6ac6ceb 1cc59f160255a97f68567369540134d6583ea732af843842c7123a84d317c784 2d8ce4136f47ebded2ea489ea452cdc99b7638c94f56a6096e0c47897652f01a 319939aaefb0c306c5dcbd9104f9d21a1f227dab06f7aa451e6fc9c747874fe9 3207127b0190eaddf9092e9b01a031f64c3bc3af6744d3b8bdd2e5ee048e5478 32e1103fbebc2da104b86665f3d05543ee6bf1c9858bc9010499f051cf1963bf 35cc1e3d3a157fd46799847391d88f80e1d9215b63f2d5ac5322579d932c1412 3ef9f3f8741b00c812d1e33d28d0e86837147ae6eb441b2095a368d338501ebc 3f72ffff5ff4969f3d03def9a886ac900b449fa65f6e98d4610e013e01f43193 4da5c9487bf85133a1fd56c3d793ce4eca2c7a88c72843a88c15bcec1599aa9a 57fe27bde73ac2e5cec527971f7026d11f0db8ebf566db0ffec15b7c4a6f3f83 6277a5119de4163805a07c63bce65772e158ee2164cadadb92a2815fcf8fb571 68a9afcf6be360cbe63b22238ab342f2038738af7571304d5b9e7894a83bd04d 6a4e87bec6da6001a53fef2feb5bc6f81b461370da8abc9a9912721071c24300 6b560ab85dfb47603f67b7978572bb23bcea303d98c9624a7fe51aacddcadaa3 6b784c8731cc964f6029ead93a50769f2dbe4812c19fea88ecec7b4744c340c9 6d5949612708c2a125020731eb82f930b1d70fca58109072c77fdded65b02c6d 74f5309915bbf53ccf3048bdb66d357a7939ffbcc972cc239d5ff49c3e0a2bbe 74f7193876493c068a1b308fa5620ff9f5e0322925f195338cbe0abb4f132fd0 7aa0f3fd45c8b1e8c5ae9c06041f24f4c71cb247587dfea6440b10e67ebb5f30 7cc2aac1a47457c1aa06510de58b539a8b1b6df0817374c8330d928c6daa70f2 7e7841189912f875db543ca9941790782ba4d0d30d85c7ba484a1aa908a64b5f 906f80a485832dbdc663aa4873728d6d3291931031c7a53e2080a6b337c26341 a03752027416bcee647881535a5c055a770d9c25630a2792495d042632ed81c0 af2fb6c99b3c2b2311a619a76dd51cf928ba8e9a7a4c74d79642bef7217e2bcd afd77ee76b93e0377ca4d075409b41a772a66758ca8ed9894d4228028c4367c6 b13ceeb14f707fabc7a689aee41005d7f1ff526223d6a43701dc1ca3513a0895 b7efa6daa471c34e4753f9eb09e70de013077bedf62972449afe9ea0185abe1c baa412223f945dcb24a7f55a90709ddf7a228c8e5726a5b145a2c6220b6837c5 bef0a83fb7c7600984a3dc4ea3276f5031bd029b734988b6fa742b57c48d4e1b ccfa2a85c2ca12cafb6819c9521be8c886d970dcf65a3d19529984676d1eca9c d63b5e4634dde2aa02970501b3fe45fb52953951432232d8167d31cf9a2f7fcc d97d8544dcfd573a88123c4c5ccb76dd1560bbefdba6db473b66cac96f4cbb0d daca113fa439b50c2b91099c47932a16853fe0c8728b6fa00cba3066b0986503 e7bbf40533fd939c0aa64446671209bb70a85e5b7ea4aab1923e37034cb3b996 eb15f77924658bb33300a93ee9a4fc07e874e8324d986452c673928ea85681b7 fb9b46f942d1f06a6176ecd6e4dae0d5b7b692682c978bbc479f7f903851b53a”
Large-scale ransomware intrusion leveraging Python-based persistence and SOCKS5 proxy backdoor
VIPERTUNNEL, ShadowCoil, Pyramid C2, PyOBFUSCATE
None
UNC2165 (affiliated with EvilCorp)
Multiple / Not specified
T1053.005, T1059.006, T1027, T1140, T1090, T1071.001, T1041, T1572
High
Monitor scheduled tasks and Python execution, restrict unauthorized scripts, inspect outbound traffic (port 443), detect SOCKS5 tunneling, deploy EDR for in-memory execution, enforce network segmentation and egress filtering

Apr 13, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Social Engineering / Spearphishing Campaign (Trojanized Software Delivery via Social Media)
“c681fe3f42e82e9240afe97c23971cbc d44a22d2c969988a65c7d927e22364c8 28d0143718153bf04c1919a26bb70c2d 36be2cbb59cd1c3f745d5f80f9aee21c 38[.]32[.]68[.]195”
Targeted (Government, Military, Administration sectors)
RokRAT malware (via trojanized Wondershare PDFelement installer)
Not explicitly specified
APT37
Government, Military, Administration
T1566.002: Spearphishing Link; T1204.002: User Execution; T1055: Process Injection; T1027: Obfuscation; T1140: Deobfuscation; T1105: Ingress Tool Transfer; T1071.001: Web Protocols; T1102.002: Web Services C2; T1567.002: Exfiltration to Cloud Storage; T1113: Screen Capture; T1082: System Discovery
High
AI-assisted cyber espionage
” 165[.]22[.]184[.]26 159[.]65[.]202[.]204 54E16777EF0EAEFC066277B96A40B4673B8694CEA68CF347862C1DBBC2365820 b84450974bd3f1fc5dc09ec0edeec50647df81716e305ef391c9115c751aab17 2c9bddd6a1a4ec66c1078ea97dacb61eb66d1c41aec7b6d21e3c72214ce170f1 91eda7b1e7bf2b2642f7060ccc018e5d4399936c53e714adf2ddf6e104b2df01 44e83f84a5d5219e2f7c3cf1e4f02489cae81361227f46946abe4b8d8245b879 9a8e9d587b570d4074f1c8317b163aa8d0c566efd88f294d9d85bc7776352a28 ea92c50ffa228da28a9de6a56cdfcc0611f12695ab6a05c65865d6b3ed19e634 28b2e77316ff4c3480c68a5a63e4e649c7ae5bc0d74f3a0f3dcfc5c10bf92c8b 465be0967690da93bec5dcc7f36fbdf0ae15f1e943a4374bb2fcb4cbbacc5900 d174b9b182bf09f0e1c91f69e8e50c74e22faa0e1b5e3a7b4b01ec79f53c3b5d 538309d7b74fd481bc1ac95c7c7ff09bfa48a7a58e9b0a3c2e02c37d5e4d2b1f 9b0dbeacaccff663533c2dc5cd570c1d3538dbf8b2eb9fc1f1e07514545744a4 386f15e9dd3d234af02194d9d0b9b87ee8d7bbaec3b479042dbcf12df29fa73c 2a5656426de9ddb7d807464dd6568b8d8bd2332976e8ede93f711aae16c96339 ae8f5ba0fdb8ec27890966e705c4fbc09ab390c6b41b38d4c14665572eaa779a 85706359974fabd8b673ad2ea07ee459a45bd3cc5a24ade7311e427925a10637 ae4ba9d99188d0a386dfc0c84a225dd31d145e4813fdb4a3fa62087dcbf40592 f30bd7a155853b712da7a7c68ed30c4afd0944c0ac7009f0c9331148aff56bce 75e671f01ccc197145e9c74d03416d23a30bb0b89efe5656fe392779ec06f4b3 00c5f829d64723bed0f0fcc48161d014a022ee218af11dbfd324fc8ddec16922 a8e4c0371fc45f05c69f3f70e2775260bd848fbec301b03af6bce2ded4f48b76 1844558373581ab1daa1b482807527b1caf8348572c46e1ddc8d925630b17156 8b93e2661350507e962ef37da57507b6dbeb7900eaea7912ed5efca414ccabf8 0ede4e8200c095a4c13859ac8824edcb7b5363808773fb086077d172ded0213c 03e9e297a6366c711f41a5bdd1d056609172e3ada43b055d1679e097b1a345a3 e8744a07fd5f623f2e477c0f311f749a807982b647c412b034e5bee3482bda17 2a8a35869e2bf7739b7514784c0b07c19d5fda1a7c7579b05fc38d82aa1a13d2 4bd146f48b684ee4c5e81e534e8ac46bfa76f083d5758ac5a0ea0acc5b5496fe bf42b3bcecb01c9d4cbf530896d91815f7d433ed384a7b2c40c92638776c02b4 2c0be4d8fac2ab483a467b30a30a75c54e72d2b4b09d46d91967406c6d61f092 daa36a12d6e86cf5ce3a7ee7d489d698ec8f9980a36c800a8502b82381c1736b f1e15fc72729a41d59e9300711df67501daa314fe583d6795c527dc001305603 2f3845353cdf8d007d6d0a199abeb2c56c96736eb79146b6ee3d43d919863b85 226c2478b5ddfd97a39f29424c03d2bd13b855dd9ab4195e4a1a6227ff2ecadb 22d4c6f8299a61fccac44c06e0b8b4789271548b69443ab554e67bd7a4bcb964 ddebe9d942b9417dcc6fb9b6abf813a0660d70b331b72e8112f809c9acd4bb11 6fcc30696d002992f0b259ffce50ad7c2b4c9caf407e9c44a975cf026b091167 4003dede86877a5654df5dbb242631b4bc120fa43dc864a61349780fa2a751cc 36a2b4a5fb22eb5c118b1f2c7bd5f76ba1e5669b950639e22abb0c1ea8ce3151 11bdcd85c794a5e1452a17e60db0d9ed44efa4ac48281864831b79942ccc337f f338b730adb4b8e12582aad55b544a9fb91802d5e991de6ec20848c215808827 d259419e52b9d602e884ce8313797169807d9bccc16089764e2f314a71818336 7c00b30ca5c2f81cc7b9c36c0d9c103c2292a0826a5601225ed3384d159eb065 aabe9c8fe4352be93deddebafcdb44e6d416f61ad20bd2cad300eb42ab0e4340 e70c4c5c41075c45907327e495d64b7d162f1c0e1f3459b57e2147f33d3e2eeb dc24b55130a9f78d45e18979c03ccd8db938e11459b14d2b6d9e4b42993f04a6 28c528eda62f5767c10ef9dc9e9ab3fe82dbf665ba35f979f45722dab5ce87af 4fb1908492ee45cf9b5ef3577e0c6b28f57763f7d5adbb8b5693554d1cd4ad26 23c2f059da85101d2ba8b2c60c5f74d0b60d0a9b3c1a5d2f7e8b4c6d9e0f1a2b 93e72961c148c0da8d13da8d3d38cb0ff18c6c506d33f75509eb4b7b9f37cd32 a5c00451eb50fbafd0440d629fe153ed3e833d9df10d9932a273628438b8088d 1e4cfc64c82c2257ab6738ef3901282a6b813a6b058a19dd344de524037e2b49 e5b187a158dc8940f7b905c7de78d08132447075d761f90629307b9095451afe 4a4cb95fc70d0ce9a084e52de5bce7079cf35f991c76cf0ee2a563cb6c5da99b 05ac9eafeece2f45bdeb49413bcb41a20edfbe700a1bcd160663d4d131f24d21 ad693bbefe342d787b98e244c15a95dc3c62bc35a04385cacffcf42d93c46021 e8702684bdf221811a99c5af9c00b8cce17256e0afe4a8548ff0b3e78d74085f cc612f33a93143e143b85691ac50eb749b0d85be73123d693ac72e575a63a911 3f44002ac3d6129cda249912c2310b503c23151d948650730d7cce92095ad8ee 8fbbe7af07cbd440a96a872463fe5e3610ead2cafc13857250cb5e800eadd214 0904e809a0cc2e97429ab5275a2122a713dc81e658df58b8a435db58c24dec29 ca600bacdac7a8a24861b6f66747952714a99c870c1510ef57db5a0284b29e85 60079c91b15fb3002e48579f956b3fb6c5f50f5dace53902c96cc8b92ffed883 3fa243ff472f334b4527053100d4549c0d840cf53c5503c5fb1db87695aee3f5 2811c4f8bc2f859a2dc5fdb1473dece4aa5231a02478b8d5b77f0c15b1f526a1 6340a8e1d6aee8d527173acc88540a6b1674cb9193da52d088d89fb865dd734a d281cbcc921e7039647d2991c24a100d6ec8504e15f1d4b02dd6b3d2e8f65d9b 52b0bb7d7748f37f3725422444689ced67afed6d74af3670e512431066f1cbe7 4d108b390bff0641342272dcce486aebeef161fd47e7f33a8e12df3ab9fe5d5b d206b8abbab71d3dcd4b76cd7cfa49714a63825a9f79449163c7c33ea1bcbba7 ab83dbfe73db42aaf18e8166cbcdc2816633a3b4f7b5c86b4a5f0032b74fd4b2 f14d3ba09deafc365627d00aa02d50e5f43f8ab37c38452ffc3af93fec069aad fc91bf7f163e353a4c122739ff49f44722425c8bd63e100c7e35c177b50897f4 a471238f23d450bb662888af8af0060f45c6f07aac58853c34a740443830dabe edc6b272bbbd8bb651433d76c69814bc7a774ebde468d30445e64d8f617b80bd 56efca03c82f55ce7376d72ff694eaf187ddd0ac246fe9fe13e84f490608c39c 8d629aa099cda2d61568a5309abb68dcf7eb825c43e96dfcf98176cec39f25f8 de1e501383bb4baaa2f77e6a2d0164d3be04c0b326fd8e00e50ed90e633db471 7faf27729b85177982ece41a790243de66f9a61001630f1e548db45cfecd43bd 02b041a002380fc4f19249cc18905e879f90b863cc154c878450663662a3507e 386ea9b16cef9734e3f413fd82ed1d14e1aa7922e94c169db275b7933d041bd1 3a394c300371f107a045b734dfea4bf3dabf3cec0963ed4da673a2013b65b3ae b164cde58c696e39c47127f1941070e83e2cbddcf89d316dcad61e5d533b7cd5 1765df3d42ac5c3378d7911816a43d2c31ad05210d64f702ca1e61b82c283983 bd97e34e2d5bfde708cbcff2a4308f8153bae8c39d6a1bd1b3fd7f9a81c141db 630cddc8b849b78803fb3c5b43d4c7f65fe3e537c6f1ae655b7f7114015e763f 52a63fddb9be598535425cbbc01ff4b1aa635eaa115ab0eefa3578ff873c0e56 e64f4fe49580d45115665b3d6fdd39f627345430d8224bf75ab84af2e6afcd63 3c856099dba6d5f6b4018b00215eedba85dd1a943f816088c12d7dbf0fa6f08f c57c97e7ce5a36b749ebe69b72ab6a00a0640b9db70e59e2933eb403d2658063 36ad087fcadb32d4d35b91d49de93f33ff257d95ba115f10c3f94868061bf001 a716d31b15ca63a1bddcdb48d29e21310b90193b68d036a89ded9995fce06eb2 573b6bd3ef425f1d798e38fa7b5c571c873fc2324cabd22b2255303341669f53 0b9f2eeb159bdedbf9d5a596b61daf96ca99e4b0ab3da6afa01cab889e6135ea 63332ccc5f588be0901a1443abb8b4ce9ab988a85d7789a6f64ce6293adabad0 2ad65c1e609efa25ba34267f44dd79f272e5e5fd6b252589c0dc6666c909fa8a cd9441b2503151f28d7f5a231d0b3db95d93da882979f314d5394256d3782cbf 4df561219a3cdf1806557900d20212ce61ae192165532622e57efd327c984030 45aa8c3a22ab17868f8177d520035aff7443edc7dd22952232e0705f89e71ea9 5fed04a7c07fd89572cbbf5a3f3ab652071b077d3539d78220580d5d446b520e 8e3a6e914588bc39fae3c04eab2a1fb34640ee1c9fe875e8df93251904f1b0cb eae7dc42451223c5cf2c6b8d384ded82f1fbeae70439e09d5ecaf42d16f1de95 01a1ae66f9a104d91878638d27e8244ebfb8409576b949e347ff5f5b398769f3 fd3b4937765eeb147352e51f8f3d8b5392ae4177d50e8f111758de830e6d9777 fb49ef9da12f85972913db2a86050ba79d5e71cbf1eb9cf580f28c43417fe66e b69b0779e4de5e05001b629b680023cc030a5d1d603767caa3d176f504baacf3 676aed5533923a443a662a9243c370568ba33a5c0c040cf0dacf354269a148cb 0ad55270a166050f76a02813256ed21a368b9e873894dfb5236c432b195b7692 a2b11c970c285c2df2c1101dc141c1a5ae7ef6e5ef6cd7856756c8863ab2f86d 889c8c29e1bcc83457292fcf27174c726c306177c20943e63251870422e48440 ee95561681807fde086dee4b2200c2c301358c102d0654778876678147b9b5e5 46b3efe9877f9d3e4fc4b9547ec213e75938397fdc30828857155238335973e7 8e2d84abb8b68c9fb6de9b62b12483c1727bddf781808e8fd140c6bf422b026c 825bf8f912b7c9095b2f78510acf3b882e15177dad6ea4231aba6a3c5b84f1ed 0ed4c8a47a2feb3f29dd2cec50eb24c96069be119f01676795027332a0326d84 6b5979709984e5a500f3be45630597214bf77f98b8b1961ee627938a86848e47 c25413774b0a5d9e760cf1189c0b22dfa12942929c24cb6a494ee678ec9fb611 ff262ec65ebde39e8cacf41e47d99397b84c2c6db73226a32351a08de44bc5d6 58fc29379a34310e841038a18460d043837b88be2375806dbf04b3fb124ca26c d440bd329a74fa845a927c2011a6d8f9b119de1a326f725936014cbb7e302c92 70baa964acf6c75d765b4538f37fdc4426358c582acaf8131777117b285e246b c7805997d6bfc44de25af07e87308c05d9fa787575d377dae4faac73cbcb814d 9fbe1a19344a13db061705e747437ffd4acca0f734588e207b04efd6e8fa0b52 7927e98a9a8ca9b2f24c7ef944f7a6c244e992837c95e4d5f66c350a70e812cd a6185fc27b54c0bc86ba9d39613d967caf819f3910507ea52f21d40eceaa93e4 bac90c918bfeebdc4a06c27166d8da7643739eba09a8c661152eeadae5bc8dc5 9f01390b9aab2645a1d08a505f4ec9c5c32e1b6b490537bf9e78b38acd46b072 1900764e9eacedff3bbfa48e9dc1b95bec192e942ff0e4c239d91a2369c1e75c 45553aef63801ece82fe971f31d710f6135a0885afa88f10c61871f280a8ca4d 491e785903f88e03a71973a1e08b1ace97486e86d60e6b062189f2f8ce354a14 a0dce59ca18604c93d84864a31848c74563f287dde71f7a58293514ab29ffa4c 7a69a95f5fefe67897c54290a6cd1a41250aeee77f2ba31a0cb7751757ae2d3d 7404bee858fae8b58cd545dd3a6400726242403802a59d5870fa3afdc5b81c9e 6315de4cc1195508ce910b5be536b98e3297505465c68ab9d2223357606c0ba1 cb21ae8556710999971a006ffd7b59b7a8d1568eb2bfdc0fcbc4fa43b08b33a9 a0c82a28b270a540a9d4caf4e43be45fa7ef5ab930e02393ce6c0e303c1e9439 9e3d1044be273d34bf9c3ab2caed2979fbbf58f5d7b34ee664922a43b3aa12a2 dd5f178278cd347f24df5ec556c25f8e505006ebc86751b7c475e92cb70b0126 3f9cf1a8751db2dd578491bdc670c148f5bc3b9749389a2caff0dd100bbf7072 92e7296bfb77f60db1e01445136246e86fe4daab431f9341307c7826cc49187f 621c1591ff91f66dbc40b5fad16fdb9c8e30bc023f1e55f2458f891336f5c267 9a8ca2ffd8a240044f3febd7657f38f3b0166e26c1aef2113ad99f11f7b2f99c cbe76edeb64031446170857edfa2e34ec53c42fa9c2c4e8d2a026cdcc751d4df 77c6734ce1cbf5a424afa450c6fb5c2b793ec0fefa4030d56607fd2ae29734a8 a68bcf3a4bcfedac4cf381fe2907a7c3420d8f8dcf8e85f8a918015345624781 8a9ee1fec6a6b2c71b7ea2557f89fd23eba2a0cda6aaa458caba667a98a18434 f49f13aff4a88a8d0db8a122510f2cf2bfdc69593336feb3e20b19e17afae570 e5ea1a5a122e4f0a8dd19ffdab580201e26c056e8f8bbead6ff3c2708a1906ec 376877d0ee00c59d7c51e5cab07edc4200839635029134556c4a55f64cebe04c 8cbaa34976cfb9617badf3d0f4a0d0f0f5612dcab478ee9f94ebe04422851531 2a32272d5f829d8d266b2f491fbf6e6c4831aba67eee3e1523825a889ee280ed 6f40ffd5282b2aefaa3df3886af29275a67907a621d6d8177b41fc908c654cc5 9c087fc66b3e23613ff0550ca936b0521847f78656a542d8e3d2aa0c88a0865d 952f5f4ed62e83818513b764d68265a16e8d90348c952e4e5e93302fe95e225b 42dca53c8754ec91ee459ebd6672ab1a12c6dea3765e05276599dc8620b63717 9fa6960053f1511e953cbbf5a3fb0858133d8dcdf4421031862577f42582ff81 8e27ebaa46afb0e03ba435581c2b654797d1beedad530e8c77583c8bba3a297c c851ca08bb9ee438f7c58a84c577268f054402803ceeeb6782ba05b4012af3de 24d5a9066f898f0e71f4c551df62faad81800234e718ad6f80d3e3bc2b09e2e0 abcc58eeff286dcaaf842dc18190780645d192567439074f156f74fb5ba0f6c1 f54e0031edc6270d3dbc2c9b67243981920660f3933575e12ddefddc31d73004 308087670b971ed6a794bbf1bc884c6d59699d68d4450a9928557b7f3dd1538e 9ea805fa8579a7098f4facfac086a4a38a640186b98d33ed0a585bc76c027ded c00b84a01de7905dfe44518219739edbc9431d105a898d1612bde7088adbbde0 08413428cfbf122ee0e5188e8b1e3b94f02e1789bd43c006974fb91b1ad37a49 84e0b90827b6e53b4acd4924537dbdb43b8b8e67dc11529fc67c0ae160d67765 5e5efbe54e60adbc27e5137be286075a90b31e30bb7dd6aaede1878f9d454dd6 ba08e40a745b97ff2c1a9d1997acb5fb5039a9d39974d4a5e5216d086ef5a204 66aaff1b8798d65451d5bfede3bf82e272723b636168ffa65abb837009d83b55 baa3f08b26e422f7ce84823078687d02bd80a7f8d14574d33699300a85ea7eb1 0df97535e7b9f615b9c8f8800e5c888e55d68ab3614512943493397b5b57ccf0 0dc75fc30065417bba3b9966f094dc9ed33a9f859eb70ef096f10a446ff035e0 6fa5666ae90c89c8d6634383daac1d80eb9d0aa91ec3272edc2462a39da4da17 4ccf4b51fffe69b9b8582b960239383391d19a262bf437774856339d4aa46bf5 c3b23c712aafb682debb2fc69ce1f0daf3fc51e9f68a97c00b84c9bda7ecdd89 9ce91435b0464aada43ac379e61d0038394e00d55f804090bb5e8a83d2ade624 42ec7f88c8a2f163c8b8bd9eed22ef9b45cf087f843285dbcf93626e51dba2f2 ec08acadcce37b4221c497609a1026ae0ae85df3096b712d727f3bd98ab291e1 9bf22275cb64758e2607a059cf7cd4085960f25dc2f259da1fd8cce993c8be14 8172f66a82af800479999b573b3d436a91a059dba3ce2c681a4ce91c167513c7 3c7c9d930026366b6ebda78f06fb280d0a4480e10ee38d455d6fe61bebc7ed76 946a02244cbb0ec15ee64a8479e756a9462e8defe3c37a7853a06131bb5debef 4f3fa3a5c7a4d71b1dc04fa2347bb076cf5e8dae3cd4e42a0c41590c212e6957 46eaef5bbe9c75aba0748b44433beef7abfa28af574dd1add35c02442640fe26 f0a2e2cbd03db4573184d5211d77e81cde4458458bea8506de3f56c668883d1a d7863bafc25e9fcda946ab813ad7d2313d60027f796d48b3229d904305c9ba7f 6ae957969a404ee54f31aedffdcd9a7b474006beefc0bdbce5c65e2c4a862abf 2a0406c45c366a5556d63ff81fc282f3c9b8250b187a2ff7ae4fa0a1993b3f03 68d976838cc7a67a6d80aa48f0df0e6318ffa1f6a74bd905feb07a659330b89f 566d9ef0e57aa11cea2585c39340dd6306d9c462457e8db1d02a0bff45aaa83f 37af84ad732df31886439c0411a63a82ebdc7a6b6a4c1298ede6ef28bd48237f 5409aaf8ae24e9148a08b5d70d375d610119b7e82fb28fd9dbbcc134e82d6188 c9dce5d676f7c0ad8ac6dfe9322a0b6fe4f394797b61724120b3dda9109d8e56 8f66e730be2f3b9db4b6bd79a62c1b94cbdd0178bb28556b10a0ae590b40f0e4 7602e35043a875c0bada43a40941a7d61e0a5570c7872dfac13305be5dfd18a9 42acd12eeaf196c8c5cba533c2320faa3a5851feecc4366b28c9826a4653f41c a3b352285e258e103a2adad264c3134404454a323693f189b73e0b5e81e799a6 a263d1ad77791b474c9dae61d836aca39e3f6da4926216dd57476db25573716e 91b90c8176e4a85d7ffd7d873471803e5bb7043f99512f9b2d88599e0dc22798 0d9156b0f271175b01a217f44cfff2d8c20e0561e0b06248bfe73c0695ad702a 39c9b707a0b08b21bf90d5032d10d6254f733a5f675ccfd3626703899ac27a08 6cb7995ce1201e2594d92eb71038603a26df09365f4d541f6a09d1883b55b7f9 8817c43ed346c568148a020bae24d7cfbfc2e88a50a8043cdd98a4790306082a e79f192e2a916792c04996339f0e64f6585d9e6498d2f088c70dade6318fdd18 fe752acb087730afa7bb71cd400e3dd793f3f959b542ee07e5438c1edb05fedd 064b71bebe13a1f9051a5789ea2c83b5b8cc203d9664a79c1260c76d2adc6d39 92f0150c2e39dc4f9740be8f166979ad741a9b4d07d6f10629453d5064b891b3 23a40453ca9502fffd95de93a197961cbca47260579ace0bb69b7a3415828248 5d744e7bd47f80730569b5344c3675baf064f04b16badc54318635901e1c502d 7e6bd9cb6458db236b6989b6b93a2157270e0c7d74135218a342cf0a7be293b4 a714be6965f6d90df2be5e6e897eb7262830a5ba8fdc314605341a55c6667f52 4b345131769f66c28192799682a5ae053fa4c887a85d95fa2568f4b0238ca842 870ee164b7441102488886fd23655f35600bdbf69d619371a785f5b1c6428c37 97f09c69101a78f69fad863da7197539ab2b6594084f98657226bdcb0830cdef c061e00d8f0300368e431cf964d57a6e623f42d888e32864076b65b76171b516 358af3fd58d5a8e85c90795ffb5bc5a974d5faff161253063f4576489ed5fc53 90526be3bdad7cc461e800ce9f9c83c5ac1c64ccaa955b14c2fcd7e893025968 902915e60435a0f8409d73e41fbb79404f56bb44800f1a62e09205e664a9a8ae 3ff77a17dd8cd9b07f9527f2c42d3fadbc3ef746e76e9f811c881a34c4b0920e 62f699cb302bb8881660a5c858869b80100a2cd58e64314ec72785a75a03c448 e6895f6820059809811003d4dd71aab1c201061377b8fd6d449303dc5d7d8052 ac4292c0d60861fb9848615bb964533b35a48f6a881340db136a84ed2d0aab07 70d96e00e91294b980b3cbea0be92f2300a527b35ca860d79a47b1f25f35b0c5 af6c54d9552b05678ee3ec5e1bd1bd341040e6b2b2f220b3373cfcc2c26b3da1 90775cd213e2e502729bfc3c04d19c08fb06f5230f173546fce737b2b1744d0d 2fa132aa46f8ac5daa8ab98d933bccc191ff66446b33a3cc18e9e4b49983552e e998afe8e2ea8c4311e3ce3b2730ee7f8c683761888d4b9b8b6eaf5c85ac7218 58092fda89eafecd33ae5f23f3e2a2b4eb6db6f554d39cf27ea9549628da78d8 7da3176f348a5cf79c4884cba63f1d792dde5734b7156c91e62833d2c2fb84e8 6354cdaeb8386a1d76fac38b0dbfd9db205a244a6c57e052ea604215e5e78922 ac573f63f15d4322732d5e18bfbd9161bf07d823002afc147030d358c172de5b 4800648954ba959fae92961858a9437aac2f17aa7f55c1a4156a75020d80960c 6d39d897be24c72bd59f163edf22f7a649c33a3bac3b85eaf048a68e12520ce8 0bdeb1afccdcc6997a1aa7a37b3602c24ef44ebbe1fede1ce9b8878138116f01 a09f9622a2a8f59f1d24f96a902124314adde7c1014e7a372ddf40d006126b95 aaf46444c080b042e15957b86f2629312a7bacaa9bd68243310493b5b2efded5 27fef7ebdd018cb284b768e1e640f3fc3160a5121073dee9cce939ec76c91c64 0cac9fe1bf3719f71117c41adb9f2bde2fd846ebf86608aa5c7079826627a8b5 d5f52028962f0916b3654665eae807bce9aa5495c2701f6c5a0de466ec8a2382 a54f287e649c41512d581a81f9b41eb774642ac875face5c54b019ba6b802bdc 73ce11d88bf97bc6d18f15f65f12d73e878a89e492edfa53842cd66037a9d30a c052f8964c30d4fac0d831f72b57192db36ecc50eccc2c32c9d65dbdb4cd4246 79c6f60255099ed4356a476895ff4decb4314e7a051ff9e2604ae6c3f707dfc3 ea4a27a7702d67666e4ba4327a1e9bd688bf02e908374749d2ac0268f5f2b8e6 2f64dac0a2b0affa43f2b4d609d2fcc67b486c0989b4bd61766eee478b4668fc 707335d194c70b55cb53d28f24415059be3684187c7e566731db3d1e3011055e c906ef286a8c2db62fc2b2f509f56b17899f5fd62b978f1d82ae5a716803ae0b d283ba770f371a1fd5fb6fc75b43b7479588b38b7ee0769c1c483c126d2d92b0 c3bca149a276b989b7f4717d46ba09154bc3d7cfa669ccb9340ca682299bfddc e2a5ce5152494c46cf92c00e3a5a0d7143a1009e644b19f501288239af252529 2b39be0c9406d6ea3e5041442184341925365e7d22246698244c47490e15e4cd 51e6b5af37417185b9b082a84d7b92b1d0bafc90ca6c81b656d27fd607c51fcd 39b6c945fcdd2a6515a31c716ea4e12d37213523bdee3f004610f88447004ffb b462b40b89ae89e24b64e4361bcf61327d0da5055f5f6e958e99df1c3da7c51a 4262272daa3e4ee8afe3a12204ccf851dc8e48005bb19afc97ab34210be7e2cc 3e33e307438a45c8dd118060aa76f08f9f3596821621598cd1923a300d0f3c43 9e5f362ce718d1f6feab3e7b19f83eaa576e0fcd3a3e4c2c02e8c47050829ab5 b04f615745abffc2175a3eb321582e76af4162e00e99ce87a51f48a745464697 1d1bd97b4b78865980a7f7de6a864adfe570cc20bc5b9b1148e31aeee0cb6991 71d1325aaf4bf95ef4ef3dec9b55f4b71067a36fcecaf18534c09703bca39f9c 9b42e0ad64ef19741879e944ca6d2599636ea8668c7842d5f24a11afc036af6b 2e0b0c8b35a0018c9825dd2b6cb65a4bb7ce9c19f32fef74b66b78e18c512f35 f942d075bbc657798880ad7fd86707aaae3a5778451c246fbf10bedea3fe06cc 8e9a9461ffe7586852d9d25a14b990ecbd30d128a460f28f77aec4b81e7f9e6c eaf589fe6693c5ac4a6ab66fbabb7e21728330e8f47cffd5a82627e8d8a3eefa 48ed2ea6b50cb638923c0b5fd06ef0c7696d0f109e86ef98c8c7985f789431e5 ac8ad1efb3b74259a30434f4bb553adab086e4ce13165710c5726053eec07a8a 8ece74a64ecc5b07fcd0bb0cd6ae48d6a67b094e5a88b16bc627de0822493788 93076cb62cfe29d9a91ab918d8a05660b30593ec093551cf1aea283d0c0dd619 8cdc68ff6f7ac4b960535d6efe7b2ab5eb814fdd4aa0de08bfdc4d4eb1722e5f d3ba916a47597950f7f1cbdca7ecc4afe3126a5365f49c3f8acd283bfca66219 f12d0e729da16e6b98a00a3f7bc7e87acb6af00d3343f0d8c560c3645bc03267 e1c1409daeedf85ff7b663143269cea71d9bea07beefc60b0fb67a4f6bad3ce2 52cb917bd09c7465ebe0308dcb35be4c5c353493f343731d64e3b754cb93b155 52c7547c0091ada68eb08f00c1bdda841c6668672e089d6801038d3628170e08 76913d76a0020cfdad6e4b4334c0f8ee82b2597a09d4022dbbde4194b4a6c0e8 c6f8eecfffa294f9a7d9a1cf4fbb9f23fc31ce34e8371414a6cde681988e950d 5b6fd55cfcb350c2fea690fbe3137773d7c017996d57c6d9c6da5ce63da76272 b1ae104759ef393e646ced41530881e70dfbdb8df0dcf949b90b3e6ba4338683 631319466c4981e4b0ea4f0e7da47deb9f44ea172ec759e375198ec1edeeb6b7 8dcb2c662760f345aac80191fec06a768a45d068aba5bbf005dfab56649c8c3a 74493e08d1f2987519eef1af0b2cd75a1f76c9637e2c682367c94ff8c2741d1c 00ff43bb39964a2c08256b4f96fa42d92895ca303d1341ef5d17e543b4753089 55fd0e1b003f66fc33c0ddfab81446e1c7d097b417dce8271a1a0a939dcad82e c09eb982efc539be71e9c9e194c060a484c436aa964e29a888faaf5b0bdf5ca1 424af728e0e78d0ebbb9370808f47940508c34b3af95a0281227b91e3d1ce9f3 a7b453b9d6439cf902b68e24edd753b964a51d9efcd8a0c53522ed913887c5cc 80c3180e13ebcca47bb5af595c52997814ace74fea5f7d71a9df83cbbe3eb9b8 29878003c75c917134ac89651f39cd1ecd5dce4193de1b0fa219907fd3941962″
Large-scale compromise of government systems leveraging AI for reconnaissance, exploitation, lateral movement, and data exfiltration
AI tools (e.g., GPT-4.1, Claude Code), custom scripts/APIs
Mexico
Unknown
Government, Administration
T1190 (Exploit Public-Facing Application) T1059 (Command and Scripting Interpreter) T1078 (Valid Accounts) T1552 (Unsecured Credentials) T1021 (Remote Services) T1041 (Exfiltration Over C2 Channel)
High
Implement MFA and strong access controls Enable continuous monitoring and anomaly detection Conduct user awareness training Update security policies for AI-driven threats Deploy DLP solutions
Crypto pump-and-dump manipulation via bot farm
195[.]123[.]240[.]41 198[.]44[.]140[.]78″
Large-scale Twitter/X bot farm leveraging 100+ fake accounts, automated content, and proxy infrastructure to manipulate cryptocurrency market sentiment
FastAPI panel, BT-Panel, bot automation scripts, rotating proxies
None identified
Suspected Chinese-speaking operators
Finance
T1585.001 (Establish Accounts – Social Media Accounts) T1090.003 (Proxy – Multi-hop Proxy)
Medium
Monitor for coordinated social media activity and abnormal account growth Implement API traffic monitoring for anomalies Track and disrupt financial flows linked to manipulation schemes Educate users on risks of unsolicited crypto investment advice
Fake AI software distribution (Fake Claude website)
” d5590802bf0926ac30d8e31c0911439c35aead82bf17771cfd1f9a785a7bf143 8ac88aeecd19d842729f000c6ab732261cb11dd15cdcbb2dd137dc768b2f12bc”
Malicious campaign distributing trojanized installer via fake Claude website, deploying PlugX malware using DLL sideloading, VBScript dropper, and persistence via Startup folder while maintaining legitimate-looking functionality
PlugX malware, VBScript dropper, DLL sideloading via signed G DATA executable
None identified
Unknown
None identified
T1204.002 (User Execution – Malicious File) T1574.002 (Hijack Execution Flow – DLL Side-Loading) T1547.001 (Boot or Logon Autostart Execution – Startup Folder) T1071.001 (Application Layer Protocol – Web Protocols)
High
Download software only from official sources Avoid unofficial or modified versions Verify installer file names and paths for anomalies Monitor Startup folders for suspicious files Detect DLL sideloading and VBScript execution Monitor suspicious process execution from temp directories Perform full endpoint security scans
Banking fraud campaign (ClickFix-based social engineering)
” test1[.]amanur[.]com xpie348[.]online protocolovirtual[.]org 144[.]126[.]140[.]33 b68eefb10e2c304681532bc0c812c7905888e6b8e47448f1e4bc1edfe7ac193d hxxp://xpie348[.]online/instalador/update[.]xml hxxp://test1[.]amanur[.]com hxxp://protocolovirtual[.]org hxxp://xpie348[.]online/instalador/update[.]xml hxxp://xpie348[.]online/instalador/get_token[.]ps1 hxxp://144[.]126[.]140[.]33:3000/admin hxxp://144[.]126[.]140[.]33:3000/api/users hxxp://144[.]126[.]140[.]33:3000/openapi[.]json hxxp://144[.]126[.]140[.]33:5000″
Large-scale banking fraud operation targeting financial institutions in Brazil using ClickFix social engineering, PowerShell payload execution, and malicious Chrome extension deployment via enterprise policy abuse
PowerShell payload, malicious Chrome extension (browser session stealer), C2 web panel infrastructure
Brazil
Unknown
Finance, Banking
T1204.001 (User Execution – Malicious Link) T1059.001 (PowerShell) T1176 (Browser Extensions) T1185 (Browser Session Hijacking) T1539 (Steal Web Session Cookie) T1056.001 (Keylogging) T1113 (Screen Capture) T1071.001 (Web Protocols)
High
Block malicious domains and IPs across perimeter Prevent unauthorized PowerShell execution Restrict Chrome extension installations via policy Remove malicious browser extensions and revoke cloud enrollment Monitor for session hijacking and abnormal browser activity Reset affected user credentials and investigate persistence mechanisms

Apr 10, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
MaaS-enabled APT Campaign (ChainShell)
” 23[.]94[.]145[.]120 157[.]20[.]182[.]49 172[.]86[.]123[.]222 ttrdomennew[.]com serialmenot[.]com sharecodepro[.]com mazafakaerindahouse[.]info”
Global (targeted intrusion operations)
ChainShell
None
MuddyWater
None
T1598: Phishing; T1105: Ingress Tool Transfer; T1078: Valid Accounts; T1059: Command and Scripting Interpreter
High
Monitor IoCs linked to MuddyWater and ChainShell; implement network segmentation; enforce EDR monitoring; apply timely patching; conduct phishing awareness training
Remote Access Trojan Campaign
“147[.]45[.]178[.]61 799b29f409578c79639c37ea4c676475fd88f55251af28eb49f8199b904a51f3 95[.]216[.]51[.]236 yu7sbzk2tgm4vv56qgvsq44wnwgct6sven4akbb2n3onp46f42fcstid[.]onion a57683ae49dd24256dab0dd21ca83c4a08892fda92e83206447380a2b6c80221 0e9c8e5ce94641e0b07607647a55c162adb18048f9c1e1e3dbe859cd08b2a797 77eea991e5c11da46e10c208fb8920a08a9bbdd8ffd72d0d6548fd8e45aa4647 52862b538459c8faaf89cf2b5d79c2f0030f79f80a68f93d65ec91f046f05be6 da65c30f4dee13d3c85c6a31386018d101d635e28eeb65ac73699787fecc20e0 abd003ab1172cda83731dbe76d20a43c35a452d683d628a4e59eac8aadc68ffa ca3bd6f8f4c8170c60896493b0bbfc4629bf94a3d0c5bd3f32397e869e98fb3d b59ac3088a58ebafdcdf00a5597c0de156de667d498bb8eccdaad5c8ba380e99 2b0d8c8e86dd372b44b99f8be4e4a7cbbfe5ce78bc10b714fc0735c15b7ddb32 3511e2bb89f64555acdef3b486717fd517f500c8c630e02e9c6fa0ac5bed8950 a1ac7046e99181fe46edd62c00ca53602e7cd4430365307d0b3a47ddd1e9e670 2d2073ee0404dba0de7e248dc50f60258ca85e493be9021657e325a9bbd7cb01 f04b0c3a53e3af7699c30ab9adb4d60a71a7da6945cf0ae287a9f67675433a67 d122d6c2ccc69594bbfbca82315aa0803b3b93972a6ab83699797812b35d9679 f431ff7bc59df48c137ef63839a5a2af520e0d3b28429468398e3b291f30d1e6 3455ec49b8dc3743398a20c271194682eba40a67ee3b10549d3e6f837f7499ca 64adf1715483f63fc47283393f89857f0545a45d9e7382417189b5084d19c37b f74d052337110c6282f4d9738263b89056d0c89d131b329d5d4e3189b67206ae 0a60ccf29f89019b1eebbbb8ad9bf0302dba399a26a62449078dda919bbd247b c4a5223bcf57b32e036c33c4d0e41aa44ff3eb4632c2fb4ed9c9bd593a04c3ee 17fb97a117cb684c82d522e65c0958c4c1267401317cda53c77035189546ebba f81e14ac7309019208529599a848c2287789f0ccbcd2f7609e9f239f52376763 66a155f6672fbbb041cb754c143db91b30084f98e9102c280ba95ffda156123b 8c812fa14a4c5ac63dd1dce47232b45bea95f93dcc5cac40bb12fa6f1961e1bc 5168eae0ee183575b9a2d2c0c21a23400125502fb78f41b20db27a0bea58324d 3763b9e6eeb9a18875c45ba7d1a4f9fbfd6e80d1aea434e88ad99ee5b1bbd790 a2d703265d61b78837e86527aa2e31994a934c72b6c073db0c4d9c0c59a4e401 b3f21d0843fa7106b466c590c97b1b8b201a79ae82ed46b46d2422dd252d7836 84c2f3b13f5251cf87d1a2c95ac7ca111238f61d56358b2c4228c84ef9ed1ae7 da65c30f4dee13d3c85c6a31386018d101d635e28eeb65ac73699787fecc20e0 ac97a49e17bf2a315205a30cf39a68c264b1dc4395b88e3997ec506c778159b0 5c37b35929dac5c640d1d14e6dc74009c5072536d7fbe0c58822bf2387a8a22d ca3bd6f8f4c8170c60896493b0bbfc4629bf94a3d0c5bd3f32397e869e98fb3d aab1f1bdba7083a25d7c841cd2dc3588cc0f3e28e29260bea5c2fd5b033697fb af7a76820a42c4cadfc7ff5fd372c99e9c5fd96ee9d14e07bde0902fec1881ab 8b28c0568baa7da10200a012a70ff735ccec557678a40d1b3fb16f5c0a31f6b7 d32455fc430ffc13e8a89db9198f17184fd27001fc11a7e9531d6055932853db 9eeef204645391b9c9e3d5b54f3541b8e52440d2a288873749398741182ce7de b7d64d6a9c641855f400949c8c000e1b53b9355fbe3663e41f01e4b80f8eab60 58460f8009df7ca5d2a9b2e9346d940388472cd4cd808ac6c797942824bde299”
Global (financial sector targeting)
STX RAT
None
Unknown
Finance
T1059: Command and Scripting Interpreter; T1059.005: PowerShell; T1055: Process Injection; T1105: Ingress Tool Transfer; T1027: Obfuscated Files; T1497: Sandbox Evasion; T1555: Credentials from Password Stores; T1112: Modify Registry; T1071.001: Web Protocols; T1573: Encrypted Channel; T1564: Hide Artifacts; T1219: Remote Access Software
Critical
Block script execution (.js/.vbs/.hta/.wsf); restrict PowerShell; deploy EDR; monitor C2 traffic incl. Tor; enforce MFA; restrict privileges; enable logging and registry monitoring
Phishing Campaign (FakeMeeting / ClickFix)
“googlomeeting[.]com googlomeetings[.]com googlemeet-meetings[.]us googlemeetmenow[.]us googlemeetinterview[.]help google-meetingsnow[.]click googlemeeting[.]click ggooggllemeetmeetingggn[.]com ggoooglemeettinggninvit[.]click googgleemeetinginterviiew[.]live goggllemmeettiingnc[.]com 9goooglemeetts[.]live cloud04meet[.]com fritchat[.]xyz meeting-live[.]site qkltt28zm3bxw[.]live sec3viewing[.]live zoom-meetingnow[.]us hxxps://googlomeeting[.]com/meeting/invite[.]php hxxps://fritchat[.]xyz/googlemeet/invite[.]php hxxps://fritchat[.]xyz/googlemeet/microsoft-store[.]php hxxps://googlemeet-meetings[.]us/update/GoogleMeetInstaller[.]zip hxxps://sec3viewing[.]live/install-guide[.]php hxxps://sec3viewing[.]live/microsoft-store[.]php johnseamus89@gmail[.]com”
Global
Teramind RAT
None
Unknown
None
T1566.002: Phishing Link; T1204.002: User Execution; T1036: Masquerading; T1105: Ingress Tool Transfer; T1071.001: Web Protocols
High
Enable email filtering; user awareness training; monitor network traffic; enforce MFA; leverage threat intelligence feeds
Trojanized Software Supply Chain (Proxifier)
“hxxps://pastebin[.]com/raw/FmpsDAtQ hxxps://snippet[.]host/aaxniv/raw hxxps://chiaselinks[.]com/raw/nkkywvmhux hxxps://rlim[.]com/55Dfq32kaR/raw hxxps://paste[.]kealper[.]com/raw/k3K5aPJQ hxxps://git[.]parat[.]swiss/rogers7/dev-api/raw/master/cpzn hxxps://pinhole[.]rootcode[.]ru/rogers7/dev-api/raw/master/cpzn 34a0f70ab100c47caaba7a5c85448e3d 7528bf597fd7764fcb7ec06512e073e0”
Global (crypto users)
ClipBanker
India, Vietnam
Unknown
None
T1204.002: User Execution; T1059.001: PowerShell; T1055: Process Injection; T1053.005: Scheduled Task; T1112: Registry Modification; T1105: Ingress Tool Transfer; T1027: Obfuscation; T1115: Clipboard Data
High
Block unofficial software sources; enforce application control; monitor clipboard activity; deploy EDR; restrict PowerShell; monitor C2 traffic; maintain updated OS and software
Supply Chain Attack (WordPress/Joomla Plugin)
wpjs1[.]com kiziltxt2@gmail[.]com”
Global (CMS websites)
Smart Slider 3 Pro backdoored version
None
Unknown
None
None
High
Update Smart Slider 3 Pro to latest clean version or rollback to known safe version; enable file integrity monitoring; deploy WAF; restrict admin access; regularly scan for malware and vulnerabilities
WordPress Supply Chain / TDS Attack (ErrTraffic)
“microloh[.]bond mygoodblog[.]bond mygoodblog[.]cfd cloudflare-check[.]cfd microblogver[.]bond productionmaza[.]sbs productionmaza[.]bond productionmaza[.]cyou productionmaza[.]cfd myverifhouse[.]sbs sitepromclop[.]click d14066075079d3bed64a548bca1dfc50944eed99c8d0d14e737c2ff0e24b402a 90252f369724fc90be3e55f5c1fdf6e39c0693c0061af8c3cf69b77d4f8ac2a7 bc83a4e4b8d579cfca1258d52c1023958bf1f49052544fb25140ffbcfa0781c1 webanalytics-cdn[.]sbs b5335e7e28f8c8533ad1c199151a3a37aaba56a79cd343945c1c9eeb13fcfeab 5b15dde0557c4c53c7d827c56992304514b4371cebd391741445415866e4b413 webanalytics-cdn[.]cyou webanalytics-cdn[.]icu webanalytics-cdn[.]cfd suspendvector[.]in[.]net dysenteryphysics[.]in[.]net skyhub[.]digital 2be8ce644fd8e4d3da7f63c190ffb4e312801fb1da2fd8711bOdab20f37f0e26”
Global (WordPress sites)
ErrTraffic PHP Backdoor / ClickFix TDS
None
Unknown
None
None
High
Deploy WAF and IDS/IPS; scan and harden WordPress installs; enforce MFA for admins; monitor redirects and traffic anomalies; remove malicious MU-plugins; maintain continuous patching and security plugin usage
Phishing Campaign (Fake Windows Update / Infostealer)
“13c97012b0df84e6491c1d8c4c5dc85f35ab110d067c05ea503a75488d63be60 c94de13f548ce39911a1c55a5e0f43cddd681deb5a5a9c4de8a0dfe5b082f650 microsoft-update[.]support datawebsync-lvmv[.]onrender[.]com sync-service[.]system-telemetry[.]workers[.]dev”
Global (French-speaking users)
Python-based Infostealer (Electron + VBS + Python 3.10 chain)
France
Unknown
None
None
High
Avoid downloading updates from unsolicited sources; verify software authenticity; enforce MFA; deploy anti-malware; restrict application execution; monitor network traffic; educate users on phishing; keep systems patched
AiTM Phishing Campaign (Payroll Pirate / Microsoft 365 impersonation)
bluegraintours.com
Global (Canada-focused users)
AiTM phishing infrastructure (Microsoft 365 fake sign-in, OAuth/session token theft)
Canada
Storm-2755
Finance
T1566: Phishing; T1557: Adversary-in-the-Middle; T1539: Steal Web Session Cookie; T1078: Valid Accounts; T1114: Email Collection
High
Implement phishing-resistant MFA; enforce Conditional Access policies; block legacy authentication; monitor anomalous user-agents (e.g., Axios); enable CAE; detect suspicious inbox rules; secure payroll/HR systems; conduct phishing simulations
Ransomware Campaign (Pay2Key re-emergence / Geopolitical targeting)
1c70d4280835f18654422cec1b209eec856f90344b8f02afca82716555346a55, 27a46c36224bb23d5efd9de51a0545fa634d0661ae7dbfa17ae4fecaa53d2585, 30f166d91cec5a2858d93c77fe1599c8fce9938706d8ce99030faaeaf3a18b06, 3ac68f46c3dcb95d942c4022dc136208fae8daa594c82743d29ef6a178f9c57a, 4aaed616518f6680b37464e6cde4edc98fb1b2033540eb938b9288162a52a322, 4ba297022edd35683783d291ac7c32e087db5a6fc72e7256c2f158cd009191da, 68a95a0a5d0868eb3868426287feb38450a690aca60169828d7bc00166e4f014, a8bfa1389c49836264cfa31fc4410b88897a78d9c2152729d28eca8c12171b9e, e09912faa93808ca7de4cb858102d7647a0a6feb43dbcef7f9dd0b1948902f54, e245db1b683a111fd2315eb29e68f77e3efa8c335862ce44e225a7fceaf4ce5a, 243797257450ffce3137de7b542547083c4e040c, 9b5fbf95622bb90cb35e06479f9405290a4d2361, d154bd39ca3069491b6e31e54cf95e4dd2db27ab, d2500ea6564c1b297d8d3f724a7f925fc2d58194
Targeted (United States, Israel)
Pay2Key Ransomware + Mimikatz, LaZagne, ExtPassword
United States, Israel
Pay2Key
Health
T1078: Valid Accounts; T1133: External Remote Services; T1003: Credential Dumping; T1018: Remote Discovery; T1562.001: Defense Evasion; T1490: Inhibit Recovery; T1486: Data Encryption; T1070.001: Log Clearing
Critical
Enforce MFA on admin accounts; restrict remote access tools; apply least privilege; monitor lateral movement; segment networks; maintain offline immutable backups; enable EDR; monitor ransomware behavior and backup deletion attempts; restrict PowerShell execution

Apr 09, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Claude Code lure malware distribution campaign
“52e83c718ca96a12b98c5b31af177204145837f4208b0ee0c8e9c2b454795a64 7d5e84dd59165422f31a5a0e53aabba657a6fbccc304e8649f72d49e468ae91a 17145a933525ca8a6f29a818cf0fd94c37f20836090791bec349ae6e705670d4 80920e8843ead75c58d56f55d351dbff01ccf9f28090e401479f21d651190b41 f96d80f7702cb1d5a340ab774e759e3357790c131cfac14a018716813dbc54dd b73bd2e4cb16e9036aa7125587c5b3289e17e62f8831de1f9709896797435b82 44d40a9e59f08252a22939f76c92362c15a1ffab0dd3a4e3414bf4a5adc5d7c4 96db6133e7ca04264ffdf18928c394376323c283a82e8106feec2ac28ee21eeb 18467faa4fa10ea30fef2012fbd2c36f31407d0466b4e880dd1b6e1e37c9aff6 789835888a76eca8cc9e8625004607be99a90ec9f7a4db06c568a69ccb76bd60 36c4bb55b7e4c072e0cbc344d85b3530aca8f0237cc4669aecdd4dd8f67ab43a 30be8190db0627a363927be8b8c8f38f31891fb8958b3691944b69533f6770b3 537243230e14fb0f82bee8f51cac2e1d7ae955bb497c78b109972df51690edcf 0b6ed577b993fd81e14f9abbef710e881629b8521580f3a127b2184685af7e05 518ff5fbfa4296abf38dfc342107f70e1491a7460978da6315a75175fb70e2b3 0f69513905b9aeca9ad2659ae16f4363ac03a359abeac9ac05cab70a50f17b65 87133e737b2892cebee006068b341012e2c07db1526c08d0a13d0e0cf11d25d1 249058ce8dc6e74cff9fb84d4d32c82e371265b40d02bb70b7955dceea008139 cce96b39831ce36b9fd1262a7cf4024218dbb3e2c7f1829c261cf79e5c9b50a8 8090c3ecad7e4559ead21be02c564d20329e21fe3f449bcd9dbd8734f041aebd 385d00d5dcefa918858e1d2d6623e7d1155f972b694f48944f98fcceb2624211 2a4a8f58ad259bde54e9d37cc4a86563797c99a5dc31a0ae39a92f7807b846b9 0a6b9410fd80f731699de51ecc4819555ef5051cf4cdf794d479deec08129873 f03e38e1c39ac52179e43107cf7511b9407edf83c008562250f5f340523b4b51 40fc240febf2441d58a7e2554e4590e172bfefd289a5d9fa6781de38e266b378 d5dffba463beae207aee339f88a18cfcd2ea2cd3e36e98d27297d819a1809846 a22ddb3083b62dae7f2c8e1e86548fc71b63b7652b556e50704b5c8908740ed5 e13d9304f7ebdab13f6cb6fae3dff3a007c87fed59b0e06ebad3ecfebf18b9fd b4554c85f50c56d550d6c572a864deb0442404ddefe05ff27facb3cbfb90b4d6 3d85ed30ec30155a8812ddf0fa9a57fc8e239215c6f30c989a28018548827e41 623c2e578d3323a07268dafa6d2da21abb1356fa6e28acb6bbeca28420ffd392 5a4033aa864e8c6e3cf8c973b426aff8128a3397feb65fc5de4e3a9fb41ebb6e c3eede99459a16ca90f7cc62cdae861967413dc1cb5d6393e86f146beaef734f fd67063ffb0bcde44dca5fea09cc0913150161d7cb13cffc2a001a0894f12690 923f9794f6e1539a1f46babb10675063b00dced03f6502b8000c90f11e1620ac bbdfa2ddefb09f82e5c69f48d274228ef77ad84f61ae78b500ba71d525afaaff 62c3d4f915d6ad5a01931e11af9ebdd95ca81477eaa57d4e3fcb45662f606008 c1507974fc395aad7e9c5fdd09787f3a892d900d7dceaf530c2d4f9b3450f2df 8b874a8526dbcb34091bfd5465f1445ae3c197119f9b531dcaf41817b42c2b92 b17dcbf03d2e8900b5f2c0c2cb87964a503d348d742e4d8758d515d37ccd4eda e747aff851ff6a22ad6e89babc6546b9a5e3fbf427624fb2d5df3052f5e01bae 5024896b56a330f58408df1b403ddaf82532f4a93bd8d7596aa135d489e55309 76634b6da10e3a2208fb892b4b3e0997647429d0c535f3f1b5efd92c95f706bd 517a61670a01418a3cc1210cab0e7d16801d2dbd31084f1a55a9d7829de028f8 6abeeadef5fbed1bc90690029973dc9302a5a809594f468fe3905c61ad0c4cb2 2bb52f410261e4e710f25f8a891ae9f50692d83f99b000da4bb08b5e238ed995 cd66ea6beacf831741c4bbdc34b73ca2b6bda318c0037f2075aaaa71505bff3a df91075f0544dc68ac67efcac55ccc59f818c9c404f8baf1fa5b1dfb840b7189 2e93982a0591ffc5cf5d44a509c70593ac4d8ce0f09ec5c5777b265b5adc6e15 a73f9f5c1a25b9308c2f4771f3b83342137d56dfe846fc5c9b51b462e9c4fdc4 8ad9a81150a2554a028bf7b291adaa347c7b512a151f00984229dfb124c4a73a 8dae77a6107f0c2523fc0b348855ae59f92543582921eedd841182641cfac63a 7e0faef3a44beda4d281dea185647393b0bd1be9d64be2d27be57193e3e48ec4 130b3ca8f09bdb8275702b589b2c83e37865ddbd976509f289096a1ff8f8ac60 fc68b5f82116711d864ccf82710ff772a53a5666a519584d3b61af63feff43a5 13fd41551e7913c2fd9c111705ed566f106cba12d7d63fc7374aa5f0199626c0 7ab14d43b40c96f4e5d0f09aa982a5fb9f703315804b634f972f37591fc82b31 d82c1f704e91f7fa66e3abc97a7ba67b8b4ad1d321260d3cbfa16427d537f7d0 0d48454eb8c4c12b61ec75d6dadb9e7e680337e4635e30dd810dd79da66d1ff6 dd36c854da1ce3cd218a217d54af91b944be5cf4c05f9772c8828f15ed682716 d3c4359892798c67b4ad7d694d9c787eb24b2237972c2f7ca88bffc19522504d d9b5acb8f429093166448437236a58c409b81565c8da0bd4556ade71bc508cbd 8acfc35ce2d1e0ae44a9a322eccb42f82e8ffa0152ac19695442dca800367844 53cca55872e96ccf0b623c0c235b9431e53aafcb8f4a0d35f8c53bc22069328f a779b50e608e90b5c81495ed16089dfff7455319d3df71345659442f45ed390c 2fc550769875f9f368f9e9a91f53945d9a9fd6c35eb48e3990902dd994e74bb3 6635a51c7ec5e0caf9331c2c83bfc8b2096a4bb7234eb946cc4f5119b30d5b34 e5885fbeb2f34906230c584c1ebbc7fb9cc44eb130b5b86f604557ec7a644417 fdbc1df49ed7db75ff6b597d533bb307bcf78adcea48798eddc836116857477b ae951519179b5f3e44b17d098a583c8562c7b2d638756aba5f178e0e22526117 47f7d06750f2e3119a6d5797dbc2aaa6005d49c73d89cdb7d1df4764ac368b78 753b303973168c299f18023a946dd0771efddebc484f4c0f91cf0351ec5d23dd dba75edd71698a6b223d7ff6eed0a8bdd1324dc26e0383f25e576cecdc662f59 2d499700e1319d9203e322cb1e8a8cfec4aa997f86d1fcf76156cfaa0a72054c 81430ab4717bfcdb07219f6a7669f836302467fa9f648a873db551713c59ed20 0c9d2af6352826aa2381f5c4912f9b3fb421246ddfa457a4568f72eda5f4294d a3a9b4b7b501210bdadc7db6dec6b596abfcd57e824ee09bb4c1ce5160ce0695 9fc2d2a42b6a06a018c8d503e7830964caefbad1fc57ce6db18530a9849249fb 4c60fced6025136e8bf448c294999837da5eb42005ecb2faa1d66c3518fd2b51 e6b639ba11eb665d2351789f1965e2faa19af9cbec6c9b54f14061df49055871 8539f83c96a0aee219a8277444a3a50c1137772aea2db845447e33009b36d88f 46a9b249a70d194437c8f2d655003fe582aa4c108861448b34b6f9fdb8a80614 d71b41928d37a1e1b8ae65878a99b37e590ad2a6274696cdbe9f8219b80ac4c0 b3953cde0e9990ba2ba72c21a5d524a88e2f88fd4b9168bd47b301cf38683f23 b5ace0a4ab7869372841875d9f592422c2f70f106fef3d2f594c4a686e3cfc7a 0b12a1e35c4d8464ba592c140726330cded2375cc975cd536e439edefdf9727b 984e415b8002eab2bc3a75f8f5fa6c1107f547a6644ead3703cecf7426a19c70 b3bd9f32d03f233304e1789495503f4a813bf8b91c806c77796d488ff56eb3fa eb5d04a14e0bbf650f8be0370436ec4765272cd02dac634c9ccc23a36eb3a372 13c1b45a3724375d519909b32e08cc3e016d1c3ed9d48f649cdbee44e90e2089 06f63fe3eba5a2d1e2177d49f25721c2bdd90f3c46f19e29740899fa908453bf afa34c71a45f21d599c0bd90ac9026f68727aab0019c3b378956401475180c9c a91db63f47be1a86e7b67eb9245ec673bd916c136614d1bbe3ad224fd2e56e81 a181785b9f4e5b7186bf70aa23c8cabd5cc853d023c9a16225de882a7a1a737d a803e68ba6c00cd435d2f8c13087d778552f13ebc3354dc91b4638efdf1d03b0 839ec43959d298599c05bb20003487a76ceefed9fb0bdfae780f14009d5cd47d 802355ad0d78f9a33ac7cee8f3b2bd09a0c0258bddfab502ed284e4a1b0b97ea bebfe4ad683680d4fc433fa8d418e9bbd8e5c3468e5c4a6827a7eaab81f19a5f c9486f3249f9fd37073142bea47debb9aa11a4de5cfeb12078a59749a5a12407 4c1577d5fb6e36ad863ac0168a82bb40db707d5427a16bc5510ce7d8f17a54b0 81abcdbad6597af9edd4c1b5de6af94f288609a4238033e8c7d703ca4fe5118e 6c446cd445e76874c2606b5cb355e033a61514f8ea0fe94f0c0c31ee702ea8f2 905f5697b42d00081c7f564631506f891fea3babc639655df9a3979c983abe00 8595715812ca39aefe2eba284aee8036463c35b594e528f9372386c1db7ad813 54d69b135e557bebf9bb6c837544d057194d53b695aa9c73013196501894df3b 879430b25ffdc2ff52e083bace983e6915c2c74e0825c6e52d2c7436ab8d64a9 9644f44d3f7d25bc91c74d52c76ef48e2a74e5e0c07d78892f708266129e7dcc 1fe8a6df98ac1984daaba257504ba00b2932021ba264a49ff70e797d1a8b83e6 4adb51eb159b99cba7dc3749325348836827f43cedc45672df16c408d864f28c 192f893bad1b188f6a95b59ce92170dd037bf8a0b9b271557f8add0bea09b1e4 7b072c13bae667ee4a077b48e3572468672b8593fb9b7adcf93230daf2c69e87 9b8ce5fb1572d76340886e04d0e8d3318ef01ffe55d6efa5e8fb5c4ae4980b3c 03a0a9948a220b635ba3dbf71e64a5dfcc0a4a4efcce76ff9f3d664faef68a3e bef345a58bead10b9b556a64788a4ee948e86403af142223659f7add09ec6779 e29ad19eb8558def511aeb450287b80bbf92a2ff5d92401df200863ce25631db aa5823a9338dddc56ed8512605e5c25b2b1c030f8fcc27594604e3c3611412c5 96384813d1fa06eb4cf98b0ae4c91817d540014dc7b2be645c6c43acec0f8e53 80d6b8d37d86543ff72614f63a6dab5828e4dd54a1af5836c157bde764f5a865 65953a2916844c386fea0b3399618e1b1d5ee8d0cc7d5a1de0ac7e35ea02b90d 92ea932a9fde49bffe94442c956df51d5e24b790dce0987413dcfd2bd6533006 4183fa32ceee134369924cf1124e7db0fda8d748511b6d3b327ae35e990f54e9 b285d84ac95b277fd9518a25793536f17a053f18ec4bf4b7bd0143c0eec6c1b4 41da828ea46eb6623a39a7fa8ac737fd2b4c3266b1dca1665c9ba4cd311f3948 889d24c726ea28e38e8c5428ad24d58270e775bc3c32385f97396f490a8b3335 b0f6fd80a4005e8109a606c9064771d9c6287136c7a09e7f98e456b6eae85f1b 8d4415559f51d63b11f3fb562c9b4ad6cbd728481d0127662d0dd9a5f85ca24d bcdc3100e9792c5f928523d0851c5b5c211d66d667a00060891dc44651bcf69b 9f09c239f9f5b89e985e88a5fbe6ebebcc5567a8d9cecca439a2f9f44aa50fd7 4301e099d379d4d8b1e10e851f22fcdce41aad0d7f1712293b03359c4a6242db 9a4abc6a44e4cfaef36af81ae674d57331a13ac909d3dbcde37cd60eb12e8bd2 7c393cbd41af3f9ad788ca26ccbb17ff286916b62dca9a6c23a0f34b3820f3b1 b8c78d6cbcdba2db20e87e5751184ec183d2cb976c532daddb1abd574ed34c7c b41b85a062b69f077879ee38bce1fd69c4ddac217c86f60f816ccba1279cace9 fbc483ac9098751faf2c5627804283dffce8ec05bf97652aca00a4ed6c1c2427 b3668936adf5134b8329e1ae06f45b55ff5253fd45a6e7ae35662b6179a6c6c9 c904775ad1df8c593f504d7760a7af022ec4da8dba726e81e691013c55a1e01d c8d38a6665940916fb2dba67a22689623e728ab012184fadc34b34bf012040a1 d9c92a9af18e125993963d88b6a9dd9524b03369b09bc9e26f8d7ae1fdf2343f 014c7f79e92406ba2a3d57c5d76b1b79844c4ec66504ced8376a9ba21dbadcae b6eb8d7724fdf1233c8c2ebae72b25d58191e0239566c942f244e41ac3c61e77 dcbc56179bad314654eea69b7700f108f16c338502d48fa2e78ccd946eb1c21e 8abb3b803c254255642bb0d1cee169e739f977bf93d14f565a4e070755d451f6 8300ecd19c11ca23ed4b6cc16185d1093098d7784ede3db05c94bfeeaa2cf712 110bd392d2522a5e44ca9b38bd123a0b808da47e11341f9ecce165690f464ffd 75e25f11a5490aa3223c366ab0b4a0d8eff05aa725420c6b4fb02e444b62d4bc 8c916aa01d6644a1e909bf28e0aa87571d47e4a25a46b3f331e7ac951e5f8ac0 795156987ee21dffc5ff9d3f6bdc3ae97636e5a4e9833ae06284be2a05d4f8f6 063069d839487e61f468d659fe7c1ca9c99aa596d12a36889738844da88ac9b4 6be243d8d40854b038ef82a46b8b5aa89b2cb9e02e5c471a8a85fd96f131b794 b3e9fe7c0c85fa3ba19ad484ea201b7045c8d9016ac76c37ca3902c368b73ff6 e4a990e858271178d1f16e17b827ceddadb677a873e69a203a89298e13e0aeca 557887b1b153b5a2f6255340315eb5e44ecb6028eb3cc328d7f2cb179cce8d8f 98e9d3d48732c08bdae41cb73da04e9ebdbf648f43b87c2d06378f4ec96c1f90 dcd1c591016c6e56f3185abeba50b56a3425aac89fba0beec6ee86e2dc704dbb 82e5fe24d9572a73baf344371813d903ce6047ff74706f1868a05690d7c59803 e21f6f9a36cf764f1cda851b90b74d455307c12b58af0d20dc0a0fdfaae16145 b82f2a80018aa567f29be96cadb9d42465edb279ba1dc9f1b63f8350bbcf2739 5fae328ead381b5e6903e6655d6c0c9cfab75c017d1aaf457e0f45a5ddb8b28e 66ba90526e257d507dd235e7b0664035cdeea530adc7e90c4ef2319e9ba1b48e 8c11a761cd1766c4f9ec8a27a514627bcbae07be278a29d50784692f83694017 324c4dc689907e117ea3be41c651b480ac7c81c4870c4154b1403be5ff3ecc37 ee42c4591a16a6c1f5b96494e585037bc1e4b21d3484103805716738cd1b85ef d9bd6b9ce6cacaa51367cc1b882b87d345ae3210291bbc463218f159ae13a5ee bd13b3d7b061026ba43156d5afee5fabc875aef2103e88af04414e79b952bfe2 0f1a302c81bf7eac45ef0b6f808628ff0df07a002b9a6360056a0a7c0ed393f8 7dc4090b8b1efc4cfd2ee281122329f4585def443aa32013213d9981034660dc 33b5c9371ea6a2dcb9416836d2bc8d1200473ff8763fbe8580c56dfd8a2b71e0 46c6f9ee0ea20a3be34a52f82ec38569bb1ed0b9204e4872444326c96110540c 4d6ab5bc3e29fdf84efccaa43a787eab4b13343fc685fccfa7e1ca70d877b2fd 6c44b5ff2d402fb3d15d5c3916fa9029ddc3cb29f7f143b4b4bf15b9f3ef3da5 4ac245d09844befa4e69f274216c26fa53a30fea5785941cbe5d5204ab516f52 2ae7585898faa546f46a4e05b9e4436f93c1603d7fbe5c20c6f7d7be5f240ac9 3c28fdcd29cedcc6e393991e477f7f0a9abe58b052dc73295df88cdfb8b4ccfc df01ec79aab4b851cc5f4144a36396d639db776fb3491c243e1ea1f92a6bd79a bd3ff737405986ed62f826cba1935fe49c164ee2e8a9a41ffa434126468fe94b 2910882bfcedc7dc610699a1718fe0dbe624b43700603ded52ba5d6750b86d42 00ec51f61161cf00e9e8e617234f8e170a92f0f2159fda61201f40ec4d45d186 c4452f7ccc0a2f5abebdd6d735fcb8faa0cec00eda76e903e4bcd9e4fb021d11 3787096d9b571e041013088804d79cf24b3fc8c2d6a1f4b45072bedd14c140b7 ebcecbcec3f1ad8c81877b93aa864038ff448a419d47b2db9ec218202b9731ec 409a8da9a1bb01e5d119e70aa6af7cfb041435f4ee821331ddaee51126415888 68d61f1728b7dfbbf796e2a4bb2b02191b5f2f2ad162e9b6f71734aa0d7d2936 3ff7e18f8e34e0563e392dbad3dbc1f19a7b0156997dc2df6ed2615baf0539fe 65b9761fb1c894fd867b81c663cb041235faadab06739c3a7abae38a0eefc1be 25ae81f20fca96991cdeac986c21a601a738c6950b77d03e6d6199e77f76f573 fa03dd9e3f355b283c638544e5b606371eaffc323cf23818632ea9ee30a3bb5a f3bb5494a29087d1802f3d97832772040238613c3d4c691af8f702dce7bac3a3 hxxps://rti[.]cargomanbd[.]com hxxps://steamcommunity[.]com/profiles/76561198721263282 hxxps://telegram[.]me/g1n3sss serverconect[.]cc steamhostserver[.]cc hxxps://snippet[.]host/ hxxps://telegram[.]me/dikkh0k hxxps://steamcommunity[.]com/profiles/76561198742377525 hxxps://socifiapp[.]com/api/reports/upload hxxps://snippet[.]host/efguhk/raw 45[.]55[.]35[.]48 147[.]45[.]197[.]92:443 94[.]228[.]161[.]88:443 185[.]196[.]9[.]98 121[.]127[.]33[.]212 144[.]31[.]123[.]157 144[.]31[.]139[.]201 144[.]31[.]139[.]203 144[.]31[.]204[.]136 144[.]31[.]204[.]145 147[.]45[.]197[.]92 172[.]245[.]112[.]202 193[.]143[.]1[.]155 193[.]143[.]1[.]160 193[.]23[.]211[.]29 194[.]28[.]225[.]230 206[.]245[.]157[.]177 64[.]188[.]70[.]194 77[.]239[.]120[.]249 77[.]239[.]121[.]3 84[.]201[.]4[.]120 87[.]251[.]87[.]137 93[.]185[.]159[.]90 94[.]228[.]161[.]88 hxxps://github[.]com/leaked-claude-code/leaked-claude-code hxxps://github[.]com/my3jie/leaked-claude-code hxxps://github[.]com/idbzoomh1”
Global (opportunistic via social engineering)
Vidar, GhostSocks, PureLog Stealer
None
Unknown
None
T1204.002: User Execution – Malicious File; T1105: Ingress Tool Transfer; T1041: Exfiltration Over C2 Channel
High
Review dependencies for suspicious packages; implement dependency scanning tools; enforce strict version control; secure software supply chain; educate developers on supply chain risks
Credential Harvesting Campaign (FrostArmada)
79[.]141[.]173[.]211 185[.]237[.]166[.]55″
Global (network edge device compromise)
Authentic Antics
None
Forest Blizzard (APT28 / Fancy Bear)
Government, Administration, IT
T1557: Adversary-in-the-Middle; T1071.004: Application Layer Protocol – DNS; T1041: Exfiltration Over C2 Channel
High
Update MikroTik and TP-Link routers to latest firmware; enable MFA; implement network monitoring; audit configurations; educate users; apply network segmentation
Supply Chain Attack (Contagious Interview)
“hxxp://server-check-genimi[.]vercel[.]app/defy/v3 hxxps://server-check-genimi[.]vercel[.]app/defy/v3 216[.]126[.]237[.]71 d26da2d0f14d8a160f2f937a6081dae0c4b31bb4e5539187a56d658372f33b22”
Global (developer-focused npm ecosystem)
OtterCookie
None
Suspected DPRK-linked actors
None
T1195.001: Compromise Software Dependencies; T1059.007: JavaScript Execution; T1105: Ingress Tool Transfer; T1071.001: Web Protocols; T1041: Exfiltration
High
Verify npm packages before use; monitor outbound connections; secure AI tool directories; report suspicious packages; implement supply chain security controls
ClickFix Variant (macOS Social Engineering)
“dryvecar[.]com hxxps://dryvecar[.]com/curl/04566d1d3f9717b2e7e6b643775d9ca72cef942f6df9ce075cf8c73a1bd2565a hxxps://storage-fixes[.]squarespace[.]com/?gad_source=1 hxxps://cleanupmac[.]mssg[.]me/?gad_source=1&gad_campaignid=23708793071&gbraid=0AAAABBS8jKrbkIiVdpqodGRoYiYNaByHP&gclid=EAIaIQobChMI2uaJ-_TJkwMVpqJQBh1N6yRoEAAYBCAAEgLXrfD_BwE 3d3c91ee762668c85b74859e4d09a2adfd34841694493b82659fda77fe0c2c44”
Global (macOS users)
Atomic Stealer
None
Unknown
None
T1204.002: User Execution; T1059.002: AppleScript; T1059.004: Unix Shell; T1105: Ingress Tool Transfer; T1027: Obfuscation; T1140: Deobfuscation; T1071.001: Web Protocols
High
Implement email filtering; educate users; restrict applescript:// usage; deploy EDR; update macOS; monitor processes and network activity

Apr 08, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Phishing / RMM Abuse Campaign
“mastorpasstop[.]top evitereview[.]de evitesecured[.]top aceheritagehouse[.]top hxxps://relay[.]aceheritagehouse[.]top:8041 hxxp://relay[.]aceheritagehouse[.]top:8041”
Users receive invitation-themed emails that trick them into installing legitimate remote management tools (LogMeIn Resolve, ScreenConnect), giving attackers unattended remote access; some incidents include additional payloads (infostealer, RAT)
Infostealer, Remote Access Tools
United States
Unknown
Multiple
T1566.002 – Phishing: Spearphishing Link; T1204.002 – User Execution: Malicious File; T1219 – Remote Access Software; T1555.003 – Credentials from Web Browsers; T1082 – System Information Discovery; T1119 – Automated Collection
Medium-High
Enable MFA for RMM access; audit RMM usage; educate users on phishing; monitor RMM-related network activity; enforce least privilege for RMM accounts; patch/update RMM software
Supply Chain / Multi-Ecosystem Malware
“9a541dffb7fc18dc71dbc8523ec6c3a71c224ffeb518ae3a8d7d16377aebee58 bb2a89001410fa5a11dea6477d4f5573130261badc67fe952cfad1174c2f0edd 7c5adef4b5aee7a4aa6e795a86f8b7d601618c3bc003f1326ca57d03ec7d6524 hxxps://github[.]com/golangorg hxxps://github[.]com/aokisasakidev hxxps://github[.]com/maxcointech1010 hxxps://github[.]com/maxcointech0000 hxxps://github[.]com/golangorg/formstash hxxps://github[.]com/aokisasakidev/mit-license-pkg 66[.]45[.]225[.]94 aokisasaki1122@gmail[.]com shiningup1996@gmail[.]com”
Hundreds of malicious packages across npm, PyPI, Go, Rust, and PHP ecosystems; act as loaders to deploy RATs and infostealers; obfuscated functions to evade detection
Remote Access Trojans (RATs), Infostealers
None
North Korea
None
T1195.001 – Compromise Software Dependencies T1036.005 – Masquerading T1105 – Ingress Tool Transfer T1027.013 – Obfuscated Files T1140 – Deobfuscate/Decode Files T1555.003 – Credentials from Web Browsers T1555.005 – Credentials from Password Managers T1041 – Exfiltration Over C2
High
Pin dependencies; review low-download/new packages; sandbox suspicious packages; monitor child processes; use threat intelligence feeds; segment networks; audit systems for compromise; educate developers on supply chain security
APT / OT Targeting
” 135[.]136[.]1[.]133 185[.]82[.]73[.]162 185[.]82[.]73[.]164 185[.]82[.]73[.]165 185[.]82[.]73[.]167 185[.]82[.]73[.]168 185[.]82[.]73[.]170 185[.]82[.]73[.]171″
Internet-exposed PLCs (Allen-Bradley), HMI, SCADA across multiple critical infrastructure sectors in the U.S.
Unauthorized access, project file manipulation, data tampering
United States
Iranian-affiliated APT
Government, Administration, Energy
T0883 – Internet Accessible Device T0885 – Commonly Used Port T1219 – Remote Access Tools T1565 – Data Manipulation
High
Remove PLCs from direct internet exposure; monitor OT network traffic; review logs for suspicious connections; enforce MFA and VPN access; disable unused services; apply vendor patches; enforce strict access control; maintain secure offline backups
Ransomware
“1de1ccc61334d6d17a8525f9ce3daac3 0734316d5623824edfdb02b17fd46369a3c5459a d0c78ca7251fd3cba4387d1e3af8837ea55115be8dbb4ce0efc74a75372f5749”
Global / Unspecified
TorBrowserTor
None
Unknown
None
T1486: Data Encrypted for Impact, T1204: User Execution
High
Implement robust EDR solutions; back up critical data offline; educate users on phishing/malicious attachments; employ application whitelisting; maintain updated antivirus and OS patches; monitor network traffic

Apr 07, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Hacktivism / Cyber Espionage Campaign
” 132404F2B1C1F5A4D76BD38D1402BDFA D1C927C3668C16DB3C8D716F9B935790 B201A94E80F8CC1AD7CC2448AE5B9259 D77A015F022D8A0CBF00204AC3AE496D 46AC6CDA371B83CE910C404A08059B25 CA5B677820C0CD1B65697DF3A6843593 61D8073566892D3E010E3F745B0237DF DDFA9440FCCCBA572FB800C8D14400D1 F9AF6743D3BD7E084810C70F8D9B10F6 CCFED1DC8D319A0EB55082D91243A332 64942A8EC9B2796C8F9522D6E7F2C248 8DE3B8AC5FA4CC80FBA51AA1DCA9F953 150618981088B0B6BEBA03B459B34940 90261F729F296A8A65488286F9C52DF1 142EE417E051FF1205FB11E4CC94DEA4 93[.]185[.]167[.]95 45[.]59[.]104[.]152″
Targeted campaigns against government and critical sectors; phishing and drive-by compromise used to deploy worm; data theft and public leaks; lateral movement and persistent access with evolving evasion techniques
CMoon worm, WhiteSnake, DarkBuilder
Russia
RGB-Team (Pro-Ukraine hacktivist group)
Government, Administration, Chemical, Energy
T1566.001 – Spearphishing Attachment; T1189 – Drive-by Compromise; T1204.002 – User Execution; T1027 – Obfuscated Files; T1055 – Process Injection; T1547.001 – Startup Persistence; T1041 – Exfiltration Over C2
High
Implement strong email security and phishing protection; deploy EDR solutions; monitor network traffic for anomalies; conduct security awareness training; patch systems regularly; enforce application control; adopt layered security approach
Ransomware Campaign / Exploitation Activity
“0cefeb6210b7103fd32b996beff518c9b6e1691a97bb1cda7f5fb57905c4be96 e57ba1a4e323094ca9d747bfb3304bd12f3ea3be5e2ee785a3e656c3ab1e8086 5ba7de7d5115789b952d9b1c6cff440c9128f438de933ff9044a68fff8496d19 185[.]135[.]86[.]149 134[.]195[.]91[.]224 85[.]155[.]186[.]121”
Rapid exploitation of internet-facing vulnerabilities (including zero-day/N-day); fast progression from initial access to ransomware deployment; credential theft, lateral movement, defense evasion, and data exfiltration for double extortion
Medusa ransomware
United Kingdom, United States, Australia
Storm-1175
Healthcare, Education, Finance
T1190 – Exploit Public-Facing Application; T1078 – Valid Accounts; T1003.001 – LSASS Credential Dumping; T1021.001 – RDP; T1562.001 – Disable Security Tools; T1041 – Exfiltration Over C2; T1486 – Data Encrypted for Impact
Critical
Patch internet-facing systems immediately;
Supply Chain Attack / CI/CD Compromise
” testedbefore@proton[.]me testedbefore+89@proton[.]me testedbefore+55@proton[.]me testedbefore+99@proton[.]me elzotebo@proton[.]me elzotebo+88@proton[.]me”
Large-scale automated campaign abusing GitHub pull_request_target workflows; injection of malicious CI code to access secrets; token harvesting, cloud metadata probing, and exfiltration via logs/comments; compromise of downstream npm packages
Malicious CI/CD payloads (AI-assisted scripts)
None
Unknown
None
T1195.002 – Software Supply Chain Compromise; T1552.001 – Credentials in Files; T1530 – Data from Cloud Storage; T1041 – Exfiltration Over C2
Critical
Enforce
Phishing Campaign / SMS (Smishing)
ny[.]gov-skd[.]org ny[.]ofkhv[.]life”
Large-scale phishing campaign using fake traffic violation SMS messages; QR-code-based redirection to CAPTCHA-protected phishing pages impersonating government agencies; collection of personal and financial data via fake payment portals
Phishing infrastructure (QR-based smishing)
United States
Unknown
None
T1566.002 – Spearphishing Link; T1204 – User Execution; T1036 – Masquerading; T1056 – Input Capture
High
Educate users on SMS phishing risks; avoid scanning unknown QR codes; verify government communications via official channels; enable MFA; encourage reporting of suspicious messages
Malware Distribution / Social Engineering Campaign
“ghatreh[.]co techadapt[.]io qwayglobalventures[.]com 9867207751793bcf7ebcba467b16b61cd79bbb8cd90c6f33e55141770c967a43 af547cdc1b7a9dfa507257ee416a9f2b20b85444b5d6f2f080019250426e4394 61191267f2d8625268cd7e488a16ab5c7b67765fb2b9bc76e4d2d97def83395a 217[.]119[.]139[.]117 135[.]181[.]233[.]224”
Large-scale campaign leveraging Reddit to distribute malware disguised as cracked TradingView Premium; uses hijacked/new accounts, fake engagement, and compromised websites to deliver password-protected archives; payloads deploy infostealers targeting credentials, crypto wallets, and system data
Vidar (Windows), AMOS (macOS)
None
Unknown
Retail
T1204 – User Execution; T1036 – Masquerading; T1027 – Obfuscated Files; T1105 – Ingress Tool Transfer; T1555 – Credentials from Password Stores; T1041 – Exfiltration Over C2
High
Avoid downloading pirated software; block malicious domains;

Apr 06, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Supply Chain Attack / Malicious npm Packages
” 144[.]31[.]107[.]231 hxxp://144[.]31[.]107[.]231:9999/ hxxp://144[.]31[.]107[.]231:4444/ hxxp://144[.]31[.]107[.]231:8888/”
Highly targeted supply chain attack against Strapi CMS environments; credential harvesting, reverse shells, Docker/K8s escape, PostgreSQL exploitation, persistent implants via cron and fileless execution
Malicious npm packages (strapi-plugin-* variants)
None
Unknown (targeted at Guardarian)
Development, Digital Services, eCommerce, Finance
T1195.001 – Supply Chain Compromise; T1059.004 – Unix Shell; T1059.006 – Python; T1059.007 – JavaScript; T1053.003 – Cron; T1105 – Ingress Tool Transfer; T1041 – Exfiltration Over C2; T1552.001 – Credentials in Files; T1552.007 – Container API; T1611 – Escape to Host; T1543 – Modify System Process; T1571 – Non-Standard Port; T1082 – System Info Discovery; T1083 – File Discovery; T1046 – Network Service Discovery; T1005 – Data from Local System; T1049 – Network Connections Discovery; T1078 – Valid Accounts; T1505.003 – Web Shell; T1565.001 – Data Manipulation
Critical
Immediately audit and remove malicious npm packages; treat affected systems as compromised; rotate all credentials and secrets; revoke/reissue keys and tokens; remove persistence mechanisms; block outbound traffic to malicious IPs; enforce npm security policies and lockfile integrity; deploy SCA tooling; restrict container/network access; audit Docker/Kubernetes and database permissions
Credential Harvesting / Exploitation Campaign
” CVE-2025-55182 144[.]172[.]102[.]88 172[.]86[.]127[.]128 144[.]172[.]112[.]136 144[.]172[.]117[.]112″
Large-scale automated exploitation of Next.js vulnerability enabling pre-auth RCE; multi-stage scripts harvest credentials, cloud metadata, SSH keys, API tokens; data exfiltrated via “NEXUS Listener”; 766+ hosts compromised globally
NEXUS Listener
None
UAT-10608
None
T1059.004 – Unix Shell; T1552.001 – Credentials in Files; T1552.005 – Cloud Metadata API; T1082 – System Info Discovery; T1087 – Account Discovery; T1005 – Data from Local System; T1119 – Automated Collection; T1071.001 – Web Protocols; T1041 – Exfiltration Over C2; T1021.004 – SSH
Critical
Audit Next.js applications (especially getServerSideProps / getStaticProps); rotate all credentials; enforce IMDSv2; implement cloud secret scanning; segment SSH keys and enforce least privilege; deploy RASP/WAF protections; monitor for abnormal processes and network activity
Phishing / Social Engineering Campaign
onlivemeet[.]com”
Fake Microsoft Teams meeting lures delivering RAT/info-stealer; multi-channel social engineering via Telegram, LinkedIn, Slack; abuse of Calendly; credential harvesting, session hijacking, and potential lateral movement
Remote Access Trojan (RAT), Info-stealer
None
UNC1069 (DPRK-aligned)
None
T1566.002 – Spearphishing Link; T1204.002 – User Execution; T1036.005 – Masquerading; T1071.001 – Web Protocols; T1105 – Ingress Tool Transfer; T1555 – Credentials from Password Stores; T1539 – Steal Web Session Cookie; T1078 – Valid Accounts; T1021 – Remote Services; T1219 – Remote Access Software; T1583.001 – Acquire Infrastructure
High
Block malicious domain; monitor DNS and proxy logs; enforce URL inspection; implement messaging/email filtering; educate users on fake Teams updates; enforce MFA; verify meeting links; audit Calendly and third-party integrations
Advanced Persistent Threat (APT) / Backdoor
” f1403192ad7a762c235d670e13b703c3 f4d2c26f24eec22e439507103cb019dc6c7d6b15 0fca9dae54a7a55f0805a864e9d2911d727a6e274f4ddc9b5673078130e0f9e1 ai[.]aliyuncs[.]help ai[.]qianxing[.]co qianxing[.]co aliyuncs[.]help 43[.]99[.]48[.]196″
Sophisticated Linux backdoor targeting cloud environments; metadata harvesting across AWS, GCP, Azure, Alibaba Cloud; lateral movement via stolen credentials; stealth C2 via SMTP; long-term undetected infrastructure
Custom Linux backdoor (Winnti lineage: PWNLNX, RedXOR, AzazelFork, etc.)
None
APT41 / Winnti (Wicked Panda / BARIUM / Double Dragon)
None
T1027 – Obfuscated Files; T1041 – Exfiltration over C2 (SMTP); T1005 – Data from Local System; T1018 – Remote System Discovery; T1071 – Application Layer Protocol (SMTP); T1133 – External Remote Services
Critical
Monitor DNS queries and outbound traffic to identified domains/IP; deploy YARA rules for detection; audit cloud metadata access; enforce least privilege IAM roles; monitor UDP broadcasts (port 6006); inspect SMTP traffic via DLP; patch Linux systems; enable MFA and review cloud security logs regularly

Apr 03, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Ransomware Campaign
“7787da25451f5538766240f4a8a2846d0a589c59391e15f188aa077e8b888497 16f83f056177c4ec24c7e99d01ca9d9d6713bd0497eeedb777a3ffefa99c97f0 bd1f381e5a3db22e88776b7873d4d2835e9a1ec620571d2b1da0c58f81c84a56 12fcde06ddadf1b48a61b12596e6286316fd33e850687fe4153dfd9383f0a4a0”
Increasing ransomware activity with expanding operations and delayed execution tactics
Qilin Ransomware
Japan
Qilin
Manufacturing, IT, Automotive, Education, Health
T1078 – Valid AccountsT1562.001 – Impair Defenses: Disable or Modify ToolsT1486 – Data Encrypted for ImpactT1059 – Command and Scripting Interpreter
High
Organizations should prioritize early detection by correlating events and monitoring anomalous account activity.Implement Sigma rules and leverage threat intelligence platforms for updated IoCs.Strengthen credential security and deploy EDR solutions.Regularly review security controls and apply geo-fencing where applicable.
Malware / Botnet Campaign
” 007fe05132e429ff57393163354f4c90 06d491b70f369b2672fce5a7b59a5c93 0a4e197044ad59116f0a1c2776125065 126b1c224e8635d9571f9d769d7b55e2 1c8c17ef978bd4f03db672c0b2d51d00 1f970f5eb9cbef8dba11e2aed72373ba 22c5849855878f331d7bbf07e7ec7e41 232fdd85e07f74ea232cadafdb095d31 2a646682ee7f0f853605c78bb9126ed5 327c1ca93321705027e0bf47658b5f53 32f1f238da09f1ebc1385317d50e94b4 37c78c8a8f1d4b260dfff9aa11a429e779927222fed922c0cb071768ba15d346 3bfc273e5592825443ded9c28f50cd5d 3d43f5b3b2c9142ca0c5cdc4a82f9088e090d077ef61c2297c51b4ccd3085d78 3f83790a150a6bf71b908289fd230014 444138b1d805808a06c4b908c7b73d96 4651d6a90d24cf57c83a76ab160abf85 48374bfb610280c48086817cfb2bb310 48cc6040c15e556bb5827417dcaab74f6059b62ff2ba4800ee2f9c261d2fd993 48ef5c2a62d1ae95ea37d165e8a1be26 4943e8c2a29ad616ec12cd7a507c612c 4a884070ea340d89756be6575676ce85 4d63235fdd3e0ace207d8fdbe19d63e0 53437d28fdf92c09821f56140c67aaca 53f02fdf9c375c1837a31edf68694380 5aed40bccde5a7646c6fea17f7dd2083 5f6f52fd4ece5918ee7979036a49bca3 6501a2d2ed60b85b1080ac9edaf39b70 667ae41f4a6201071b8cc3f88e3e02c7 6a389a89a6da7433210d9a52fc72589c 6a6619b4b9a53233ca0a56606c484f9a 6e9540f68507580a3f495e9ff58dbd4e 6ec7063f03f95499b6c1821f90bda7e6 70c2317f40de5b28f42d640488910140 74e5514cdd3ef6f703483700f04b5812 7d4c60c77a7d74cc3d9af4dabbecdbb8 7fe57eca60841291cdd8ef1bb5c27de9 8a978017496adb02eb368f3b28bc4ccd 8ad3f40fd8fcf2c7ee04d1219017cfe3 920534d235204ced7ad2c76c1af7b3f8 963354b60552af16408cf4d82a827832 9752ac893640a027bea5a6df48ceb396 9dfba3b92850a74135925e524e7b4748 9f2df912212f67adcb64dbae8bfa2ca9 a3e31f70b7a6abf3de15ca6646d16bfe b1a32a442cdb34901f1f7ffbe47749f0 b5ad7f7e10f5d0401a2ad6b737724ff6 bb5e9faa666e6d96eb95e358524213b6 bd24f43084b33f13a835f661bf48b5e2 bd4a12d4de4e42c4d9246aa92ddb86b8 bf0183b2d18341c47576ba8e0d36fdff c32ac3f6cba0772de7737da60f9170c0 c53397dc47ddc38a8c6daa3a02116518 cfd3d123595fba37ec414b90cfa834753ad9ab2149651d48948e04875aecac98 d5d63db439bb1dba080ab27555b03a2a db3a48697e0dc96054a64e689f45f99a9f21e946c2c5e155b1efd292aecee3e2 de86b12800919ce8b213b51354d28ab8 ef7f3f7cb4f3f1a90a2028d44c4fe702 efb8b73d59a805e1fd9ebf0d3540b0e8 f0d1852065c498c3bdaec3de8e6cd626 f143b44d3b8d835c09bf2c346d90ec22 f18ddb10b3f9044fa2f9d1bb5152e388d4f68c2209165b117135fb2490243d2b f3cf4a369e5fb451db250c31776ba84e f74c8bd1701746cce8b4bad819cdd148 f774fcbf889a8a629004f31e8b962b63 fb9d610a2b535dde194c05c099f0b307 ffaa0890eb9a38307477157c02f63583 advstat[.]cc atable[.]cc backdump[.]cc cleandone[.]cc critlan[.]cc dzero[.]cc fpride[.]cc lups[.]cc meterstrack[.]cc netjunk[.]cc plxz[.]cc regul[.]cc startsun[.]cc utcp[.]cc vdem[.]cc zeroback[.]cc zeroback2[.]cc zeroback3[.]cc zeroback4[.]cc zerophone[.]cc zorc[.]cc 175[.]110[.]114[.]65 176[.]120[.]22[.]67 185[.]162[.]128[.]133 185[.]163[.]204[.]198 188[.]116[.]22[.]153 188[.]138[.]125[.]163 212[.]118[.]38[.]30 213[.]202[.]230[.]95 37[.]77[.]150[.]19 37[.]77[.]150[.]77 38[.]180[.]91[.]47 45[.]137[.]213[.]88 5[.]149[.]250[.]171 5[.]149[.]250[.]54 5[.]149[.]254[.]109 62[.]138[.]0[.]10 62[.]138[.]0[.]211 62[.]138[.]14[.]209 77[.]246[.]106[.]198 79[.]141[.]160[.]92 85[.]25[.]100[.]30 91[.]215[.]85[.]178 91[.]245[.]255[.]112″
Large-scale targeting of routers & IoT devices exploiting unpatched vulnerabilities
AVrecon
United States
Unknown
Not specified
T1190 – Exploit Public-Facing ApplicationT1210 – Exploitation of Remote ServicesT1105 – Ingress Tool TransferT1071.001 – Application Layer Protocol (Web Protocols)T1090 – Proxy
High
Apply firmware updates and replace EOL devices.Disable remote access & change default credentials.Monitor traffic to known C2 infrastructure.Implement IDS and network segmentation.
Ransomware Campaign
“3bad8c0cab145cea190697f9a168a1a9 f9afeff0369dad36f5db6e1613b847376c1b2584 0e61914162fd1f7ea2bd553c8e6cebc05d6913be1fb81eeb1a8d2b649ab7a5c6”
Likely distributed via phishing, malicious attachments, and compromised software targeting general users and organizations
BASANAI (MedusaLocker family)
Not specified
Unknown
Not specified
T1486 – Data Encrypted for ImpactT1566.001 – Phishing: Spearphishing AttachmentT1204.002 – User Execution: Malicious File
High
Implement EDR solutions.Maintain regular offline backups and test recovery.Educate users on phishing risks.Keep systems and antivirus updated.Apply application whitelisting controls.
Web Skimming / Magecart Campaign
” bundle-feedback[.]com doubleclickcache[.]com analyticsgctm[.]com hotjarcdn[.]com firefoxcaptcha[.]com solutionjquery[.]com jquerybootstrap[.]com assetsbundle[.]com bundle-referrer[.]com categorywishlist[.]com cachesecure[.]com securedata-ns[.]com newassetspro[.]com explorerpros[.]com redsysgate[.]com”
Large-scale, multi-year campaign targeting e-commerce platforms and financial ecosystems
Magecart (Web Skimming Scripts)
Spain, United Kingdom, United States, France, Denmark
Magecart Group
Retail, Banking, eCommerce, Finance
T1056.003 – Input Capture (Web Portal Capture); T1189 – Drive-by Compromise; T1190 – Exploit Public-Facing Application; T1071.001 – Application Layer Protocol (Web Protocols); T1041 – Exfiltration Over C2 Channel; T1027 – Obfuscated Files or Information
High
Implement monitoring for outbound WebSocket traffic; enforce CSP and script integrity controls; conduct third-party script audits; enhance fraud detection for card-not-present transactions; continuously update security measures
Phishing / Fileless RAT
“75b7ed9f524cdb1c6f044864c4d3353c a739d0c4821d2bc1b8a226a5d8846c28 a5c70d896526146238a15a93dfdb2f97 hxxps://almacensantangel[.]com/ENCRYPT[.]Ps1 d79dbfab8af7a6f19b6abf934a90c1b7 957b2710fef66141707064c76f1dd1a9 508c092eaf1c1a178195aadfa1b7ecae 192[.]3[.]27[.]141 0a9728de22d85c6a2b375924bfb643dc”
Multi-stage phishing attack with fileless execution and RAT deployment
Remcos RAT
None specified
Unknown
None
T1566.001 – Phishing (Spearphishing Attachment); T1059.007 – Command and Scripting Interpreter (JavaScript); T1059.001 – Command and Scripting Interpreter (PowerShell); T1105 – Ingress Tool Transfer; T1027 – Obfuscated Files or Information; T1620 – Reflective Code Loading; T1218 – System Binary Proxy Execution
High
Implement email filtering and security awareness training; deploy EDR solutions for fileless malware detection; patch systems and update security software; restrict untrusted script/binary execution; monitor suspicious processes and network activity
Botnet / Multifunctional Malware
“0104e0b13130dfa08e3b021b85ed80399ce15afbcbcf00d672750b3fe5465795 b855c274bf842d39949c3512bfb20a488def51042992e7c53565328083a8f9e8 c3d3d4f456e13d5c3090c91541673adc7a936e24e65ade6e452d944cbca84653 e59a409261efe2d5cacd0a58ca1f92cae85bbf45d6c7b63c123e6c2c069a139c fa27981befc05c8ff74d9b796b30525c6cb048b0a91bcd134941c50db7c56ddb 2e893562114e5fafa195fb09e0db323f4c41f6a327196f98fccdfeb18e887e6c 02816012e5b60a4dd35390137f9bceb33752abd5a4cd5ec5794bdd3ffb7899c5 d2ba9777e8d8415b5b9361571c7fa3b6f12303c3f81738a23b66ce258cf025bb 70f9597fe726f00a69383919f1d86c30001195d0c655640f94cba9729e20c0ab 54b55b164fef227508f635391c37d23daaf6af7c599a83b3ee17c74263f9d4db a0f9d89853963fa2ead2a079952d1d321a60058a3e1198f445162489fa656615 54cfdf2acd14277aa6841d227580ff8e4ea5b733a27c80eb5d74cdc828595192 6d9f17932c1736527b80db9f3bb6ccc693ef22695a349fbc1d96e845ae5930c6 68666eec45ae5f29e414dbcca1a99d2a767c45f934c7490d3464f0ce7e8cd833 71744a88ccca712ad9b74087ba046be05625b4ac83e1c65a1fd5259584aa109d 1589fc5bd6b430feec62c625914d94f73e261e45655f98f8553fdda708d12800 67acb73457262a41508e41e7777113937594ce158e6a8e73eef2c5a2b16ce384 3ab171a4fe9b095f4bc79b88b6425a88e6962cbba0d763117a01918829fe59fb 80d42d9d8d97f4245bf6a279a8f83668385812337d39e0282068c8e344dc755d 0ff637682614ed66cdc76643efc709b6af08351dd701f92604a406ccbb3bf045 2212b78bedb274dd6be7bbebdeeffe9406197cb065fedb370b302b720573fb25 8fb06ea350e49fa9ef38c56e731adf6713a47c8de714fe55aee6519cfd6b4da3 b6ffdb84f61503fa0b8cead54a5479af317d3adec7fd375f3df2337575981b6f 8540b955e851488606b3508211167daf280af7b6fc11caea4aa7f4cccda8e307 83313da4c33e6c413933e577f94e86c575b54a4a2480cba90c3407c99c27113f e3a3d9e668fa8c144c48299206d7eff67a7dbbf3410ddc2aefc440b6e072bf6f 0f14a05d458d8645c63e666c96ff0314fe2461daf81a19feae74ef748378f60e 4be3266e0c7427823adb0b3b5136bb89d9f59bc1eff9e89456cb9517f585e52a 2322908792f3bd634a139411d42474c93951599c5356195b6f1f7f09bd455023 c2e8cdd98f0d5c1882920816ff19adaaf0961462d117ca47ea0cd00545dd3ad9 99ac02e76e50e0a053e19611e97965105796f0da7fa1959e59d7b5327869e19d 46bb3df9a85c89c546cf5a01f5b8d7e9ae0d6bf4d92372c82d0764bb89dd5421 267df6cfd790b8c9dfd48f518f5cad435df3158344f7f5adb8b6ab1e0a6aa251 56dab61397e1cbea1d8dfe7cf728ca9d61c0040881780b5f45cfe68fcd47ed6d 48975e8570cc778b5b94e51237d1c67f923047d0c90e5f9a0eb8b8da04fe04bc 857a902aeaa351e72676fb764543e2e8fc5c332b5881ea8dfe407ff257f913e7 3bb10edb151f0b54ea11de5b216a0f7e4c6b899bcae54da97b3ec87b5b862359 b67e5f6e9fb2273ac8ae5dd3b49c7695bc680686cf93a729bbdef2669f18d429 7ba1caff23d3a218037c59ac9ec7228af4a8db03577292404b1cfea6bb79023c 55cc603248b4c0858d18c029c500c2663394102b6b63b06cb147eab2168448ae 6e549de24c05fcf0c5c66111e9ab8686bb9ec02677fcdc219d994cd6857f5891 a28e55a948927ae556de391674d88cde33a4ad9700f7e5e21a94d8d3755ebe70 7744909ba1357e348376c7dcd1bc097d63d6d018e6da04287ebb763f073d60f1 da9b344bd9920b1d403a0d62f94881acf5d65b6fea495b04855aba40188e6e36 68863b0942c76880c9e9abb4c93ea235501974af3d04fa82228068878d0f4bae 5a3e61eab1551f1459ec1a0303f5b37b981161c21bf7d1818893415711e52cc1 023280288a154681b1652c24289acc49e44beb65e1f12948aee25dad981b3e0e db176add8daa4f1b68ad74b7ed6a123003a7705badcd119086f4f5d9f4083469 6c0127433f689c0861355352460f7dc6b6ae3d86aa7db0747e60b3b9a18c4a87 41fb6be80f588c9e7823f862baf7b43dff49206a1c45f8a03e3dbd5f15678e14 1d218f810f262659fc2b6fa8a42b2fe217580666546ff802840a1350624766f0 08aeadb7453ab5762b51609871c7b15782af7025a349516a4b4f905d6c7be871 21f13ddfa4edaf7ae54a076e6f9fff2e9d8233581b610960934d35235b52071a cc57c7cfed94cb9e9a894e236cab91920c80a3d91631e87803aebf71538e7cd4 18b0a373fee639afec0052399177599f32f4b70bcfecc5ae0a34d82e400310a1 6b7c767694aa1cdf7429f364c0c104b32f738203c8c60b5f25a6e2f6a66a71fa 74fcf1e27180d840b8de78ec4cfbb48e5b7a43f13c579c9afbef17fc2b47ac02 37b08b5131a17565009d980f1b3c2a6879383040528d73d34e149f8078282ab9 359c1e71740dd3ee3556e1c392a72b943960c4f46cf003cd4671775e71788287 766f430544751677d52fb8602a6eb27a8fea7513826aa99319017209c1970029 3be21ac37d8c817b71ea520d2f4354f0c606fca4cc6a48742b2de87f358af79c 5d414a6cb575b89d11cf5cf37c554c29189130e3d8841e9f60ae5b5c08a2d5e7 d6283822fc330342132cf753d3ff0dda6bf30946af6251259e6f98141a1eec0d 5b872f26adfff2b63bd91ca50847e3fd19a6c612ee089a6953bdad00214f8df2 c62850ec00e38c48999b2cf8fdd1f256d71dfb24c103bfdfb32e045b7f693990 62715d8a00ed60ebf4736d825628a2c0c6faaa3f9b567b393343f79caff1c965 8ae4a61d7dff97b03be346edad80a6f9dbf91d00a505e100fe5a27070c809ab7 1582320a0c27d70bde7a97cbe53682dab83efc95124f5e2449bd066960c7e5b9 8d49e40a0d85cb05aeaa152977bcd5e34e9219e3cf4b1a25e1e968888616aadb 40dbcc2249f5c32ff8aaa62dfa0b9e6df34c2bdd0fbc1348fca4a0f014995756 a950a8fdd0d8f7f6e86bd475c3f71381ef4536539e7c50e2aeb6304ae56570e7 a0d8032ea8d64e4a7bb6ff292b236955d8239c5826fdcc76b32dbf96cb824acc dace0ace114449ffb03a07902681e2502a507b2968d0d72436fd50f1fbdad9cb 553972250e6766defd1125152eef38c0b8024e9ba2d65c5ca83ef1d04a1685eb b9b52cc15fa1c03663a49c10af56e8f7aaa786d7688a75176d6fbfb779e8faca 26b441b6ac06968d8029babb90fba7927e1d21c9cb84b0492c4890bca5dd2660 a030ac4b770f87ded6b1c7c051171f02708c2d63680a9ee01afab2f2fa8c2b3e 90e6104462a969029a7c5b023ce811ef0c3ff93eb6bc72b0a0bf9e1baa722795 99ed96d48e99828077d807f342cf13244af232c190088f12f548199a8ece8d97 c6def8e8fb6eaa582f7c5dc88a85723d4a868b04c4ea8f8584bb828417a4ab86 b1a0fd0c9c72e68f74b654988423acb2a953427e83990c26c91e5e908ec66387 770df171362179564bb433aa4c82502926c420482b7e6b8441a857c5934377ac 38b9825abef45b2fb9e0efbfae7124499af85b9f328d4619ac8a37af274e7b4e 823da032a4b7f64d6f3706f207d0f2a0cd44cd45b602193c4580403c2d4e8342 23437efc7bf2f691678472e0080f4b22fa8e327d41781f95912ff6722a62f5fb 4013d5545b490d4bdea2fbfc31cad82cd73e9d617ef5946ae9b9df19d6eada48 8baadd5caf6014222b98656e875382126e719f53342591a47c29c408e10fbd60 e7ba958cac186815f76fbc5809e479000a5a569034fd0425bf0fb512ac523639 5b0684dde84168b41eb1d7022f490f0036a90ea3d00a37e35d69323887826628 17c40dc8cfe53fc24d01df2ff4aad1d4914dd592b00d053762f12daec16c7035 a858bbbfe1332816b23c8d46443b63f318958e6748c54e4b4040fd908d175d62 43a000847d155da05e5c080587b4eb97cbeed61bf6b5d6a4062e5f459f387888 4fc29cee350f69681728c009449f12682d90db8541459c505a2830a278be809b 26c4a28e9bdd3f85433ced68c48d60ac89e44ff0bde47326d3d19bddc9399a83 8ebb428ad35eceea596ffffc9bbf23b7ef3f09e4493eb894dade07eadb9f9652 70cc64fb4dc5e32b9a8973be10e7e2d4378479f3521b5ab9bb044f76d1e2379b f6f7a37b49310287a253dbdf81e22f0593f44111215ca9308e46d2c68516196f 55f3a2d89485bb40ea45e5fa1f24828f71a81ef4ccc541b6657fc7a861ef3add 3a2dcd6c86a8b789c5f07eec531fd9a3d9268288d8cf47e9f324dacd55bb6cfc 6fbd1d2192865099bd3772f6b77f269ab44be19a44ae41475486dbaf52ecba72 75e5535a7b6aa384097fcb990c3ea85f8cbd1db87593dbf4f3d7fe7a619ba3ca e3648ed09ab275376cd8a111f3a8c32e254ee9739263d4f2ae3344037bdcca10 04537e704df71330b1e7f1a3147796a5d0277fbe6922a2a304a9a526cdbfe059 3bfe06669545cf2b91a149149cc23073d631e237f5aaac237dbe7da67b227477 724e7d651f8d44249798db1a58ef9535ac956ac5e882c367475199c724a07c57 ec05957677d0f2ab66da08278729b1849b8f926a9f3f8c9c33222b63d20afb7c 51455bce4f49061e859cb4cc830f9d4b3478f9c7082b7b9f55febc68234a06f7 bd9f942b1082ef254f72b9b82a04c196a6029c9cf900c034b4657719b191e4a8 c77304e40bc3afc5e5b5b1f94395b4b64fc17b8fcd255970bdcf0c7cc0a507b2 7436220538e6cded0c499167424975a2aacf93217dca40c683f0610b4f3eb3b7 c44375c99dd2886d0438f3c088439072604168cb53b90216f9a6f1b8d18db2fb 805db6f001167b526485cfb9bd6fac5dbe7737af6a46100cc69348c9145bee4a fe345c884a521223ec9482d7dc7e3583c080fb6c2fafd8c761fc4963240a9b2b 7f7ff6e97841e9cb49976b93e493ad04bf51cc3138f7b756e1d41ce3faf2b6dc ebd465cbb6b7718f33aac20528ffa75ae4ac433d8ab7c5c7a734c472f1c16a87 c525acd224ed52353591c0924e60e84c051c10970ddbe6c87ae15ec15da97ec2 85bf5ff6c1f1fcfbe5cd999dd4ca71c0c26f40b624c810fab29788aa275c09cb 926e7a5fc2df14280ddb9fad2a6a3a8101c4024cbce128f9feacb0f0c1e2070e e1c102d81d89d3d406917553c421c6b23cbd3333953a050d650f5394bfd6a73f 8ac7bf6ead6c0068502f6473f7377239cdc44c6af728d5952500b8d5ae0ff157 586a29bab56e5d7be8b7a783256b0458a4eca167c7d519fdbc8467ba2331e7e8 hxxp://91[.]92[.]243[.]29/3 hxxp://91[.]92[.]243[.]29/1 hxxp://91[.]92[.]243[.]29/2 hxxp://91[.]92[.]243[.]29/bnoda hxxp://178[.]16[.]54[.]109/grolo hxxp://195[.]178[.]136[.]19/4 hxxp://195[.]178[.]136[.]19/2 hxxp://195[.]178[.]136[.]19/1 hxxp://195[.]178[.]136[.]19/3 hxxp://195[.]178[.]136[.]19/40[.]exe hxxp://195[.]178[.]136[.]19/39[.]exe hxxp://195[.]178[.]136[.]19/38[.]exe hxxp://195[.]178[.]136[.]19/37[.]exe hxxp://195[.]178[.]136[.]19/36[.]exe hxxp://195[.]178[.]136[.]19/35[.]exe hxxp://195[.]178[.]136[.]19/34[.]exe hxxp://195[.]178[.]136[.]19/33[.]exe hxxp://195[.]178[.]136[.]19/31[.]exe hxxp://195[.]178[.]136[.]19/30[.]exe hxxp://195[.]178[.]136[.]19/29[.]exe hxxp://195[.]178[.]136[.]19/28[.]exe hxxp://195[.]178[.]136[.]19/27[.]exe hxxp://195[.]178[.]136[.]19/26[.]exe hxxp://195[.]178[.]136[.]19/25[.]exe hxxp://195[.]178[.]136[.]19/24[.]exe hxxp://195[.]178[.]136[.]19/23[.]exe hxxp://195[.]178[.]136[.]19/22[.]exe hxxp://195[.]178[.]136[.]19/21[.]exe hxxp://195[.]178[.]136[.]19/20[.]exe hxxp://195[.]178[.]136[.]19/19[.]exe hxxp://195[.]178[.]136[.]19/18[.]exe hxxp://195[.]178[.]136[.]19/17[.]exe hxxp://195[.]178[.]136[.]19/16[.]exe hxxp://195[.]178[.]136[.]19/15[.]exe hxxp://195[.]178[.]136[.]19/14[.]exe hxxp://195[.]178[.]136[.]19/13[.]exe hxxp://195[.]178[.]136[.]19/12[.]exe hxxp://195[.]178[.]136[.]19/11[.]exe hxxp://195[.]178[.]136[.]19/10[.]exe hxxp://195[.]178[.]136[.]19/9[.]exe hxxp://195[.]178[.]136[.]19/8[.]exe hxxp://195[.]178[.]136[.]19/7[.]exe hxxp://195[.]178[.]136[.]19/6[.]exe hxxp://195[.]178[.]136[.]19/5[.]exe hxxp://195[.]178[.]136[.]19/4[.]exe hxxp://195[.]178[.]136[.]19/3[.]exe hxxp://195[.]178[.]136[.]19/2[.]exe hxxp://195[.]178[.]136[.]19/1[.]exe hxxp://195[.]178[.]136[.]19/forg hxxp://178[.]16[.]54[.]109/l15[.]exe hxxp://178[.]16[.]54[.]109/l14[.]exe hxxp://178[.]16[.]54[.]109/l13[.]exe hxxp://178[.]16[.]54[.]109/l11[.]exe hxxp://178[.]16[.]54[.]109/l10[.]exe hxxp://178[.]16[.]54[.]109/l9[.]exe hxxp://178[.]16[.]54[.]109/l8[.]exe hxxp://178[.]16[.]54[.]109/l7[.]exe hxxp://178[.]16[.]54[.]109/l6[.]exe hxxp://178[.]16[.]54[.]109/l5[.]exe hxxp://178[.]16[.]54[.]109/l4[.]exe hxxp://178[.]16[.]54[.]109/l3[.]exe hxxp://178[.]16[.]54[.]109/l2[.]exe hxxp://178[.]16[.]54[.]109/l1[.]exe hxxp://195[.]178[.]136[.]19/5 hxxp://178[.]16[.]54[.]109/lfucky[.]exe hxxp://178[.]16[.]54[.]109/v[.]exe hxxp://178[.]16[.]54[.]109/l12[.]exe hxxp://178[.]16[.]54[.]109/lfuck[.]exe hxxp://195[.]178[.]136[.]19/gnul hxxp://194[.]38[.]20[.]95/3 hxxp://194[.]38[.]20[.]95/1 hxxp://194[.]38[.]20[.]95/mono hxxp://176[.]46[.]158[.]64/1 hxxp://176[.]46[.]158[.]64/plop hxxp://178[.]16[.]54[.]109/molop hxxp://178[.]16[.]54[.]109/5 hxxp://178[.]16[.]54[.]109/lk[.]exe hxxp://178[.]16[.]54[.]109/4 hxxp://178[.]16[.]54[.]109/stata hxxp://178[.]16[.]54[.]109/newtpp[.]exe hxxp://178[.]16[.]54[.]109/2 hxxp://178[.]16[.]54[.]109/1 hxxp://178[.]16[.]54[.]109/32[.]exe”
Highly persistent botnet leveraging HTTP + P2P for clipboard hijacking, ransomware distribution, sextortion campaigns, and credential theft
Phorpiex/Trik, LockBit Black, Global ransomware
Iran, China, Uzbekistan, Luxembourg, Switzerland, Norway, Qatar, Singapore, UAE, UK, US, Canada, France, Denmark, Germany, Austria, Finland, Italy, Spain
Unknown / Multiple
None
T1566.001 – Spearphishing Attachment; T1059.001 – PowerShell; T1105 – Ingress Tool Transfer; T1091 – Replication Through Removable Media; T1112 – Modify Registry; T1547.001 – Boot/Logon Autostart Execution; T1071.001 – Web Protocols; T1496 – Resource Hijacking
High
Implement endpoint security with botnet detection and P2P traffic monitoring; educate users on phishing; enforce application control and removable media restrictions; monitor registry changes and suspicious process activity; strengthen network segmentation and monitoring for crypto hijacking or ransomware behaviors
Node.js backdoor / Remote Access Trojan
” jariosos[.]com hayesmed[.]com regancontrols[.]com salinasrent[.]com justtalken[.]com mebeliotmasiv[.]com euclidrent[.]com o-parana[.]com palshona[.]com aurineuroth[.]com 185[.]218[.]19[.]162 294c597c89023093e1e175949f5104f887b89cd8e1cf1d3192ee9032739f259e 5623f4f8942872b2b7cb6d2674c126a42bdf6ed5d1f37c1afc348529e4697d73 03c4e54cc775ab819752dc5d420ab2fed03bd445c3ce398d021031100b334fb4 7dd1bf7a58774a081062f5c8f183d24f95c433805e0bf73280c0adba1c71390d 83b1f11c6a0bd267e415136440559131d2d4ace9a65dc221ea3b144fe0e7199b www-flow-submission-management[.]shepherdsestates[.]uk”
Retail environment; remote command execution, system reconnaissance, credential & cryptocurrency theft; persistent via registry keys; C2 dynamically retrieved from Ethereum smart contracts
EtherRAT, Tsundere
None specified
North Korean-aligned activity
Retail
T1218.005 – Mshta execution; T1202 – Indirect Command Execution; T1059.007 – JS interpreter; T1059.005 – VBScript interpreter; T1547.001 – Registry Run Keys; T1105 – Ingress Tool Transfer; T1071.001 – Web Protocols; T1573 – Encrypted Channel; T1082 – System Info Discovery; T1614.001 – System Language Discovery
High
Disable mshta.exe and pcalua.exe via AppLocker / WDAC; restrict Run prompt via Group Policy; employee training on IT support scams / ClickFix; block crypto RPC endpoints; deploy NGAV/EDR; monitor systems for suspicious activity

Apr 02, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Malware-as-a-Service (RAT Campaign)
“webcrystal[.]lol webcrystal[.]sbs crystalxrat[.]top 47ACCB0ECFE8CCD466752DDE1864F3B0 2DBE6DE177241C144D06355C381B868C 49C74B302BFA32E45B7C1C5780DD0976 88C60DF2A1414CBF24430A74AE9836E0 E540E9797E3B814BFE0A82155DFE135D 1A68AE614FB2D8875CB0573E6A721B46”
MaaS campaign distributing CrystalX RAT via Telegram, enabling full system compromise including credential theft, surveillance, and crypto targeting
CrystalX RAT / Webcrystal RAT / WebRAT (Salat Stealer)
Russia
Unknown
None
T1059.003, T1105, T1041, T1071.001, T1056.001, T1115, T1555.003, T1185, T1027, T1497, T1219
High
Monitor Telegram for MaaS activity; deploy EDR solutions; educate users on risks of untrusted downloads; keep systems updated; implement network segmentation
Supply Chain Attack / Zero-Day Exploitation
“CVE-2026-3502 22e32bcf113326e366ac480b077067cf 9b435ad985b733b64a6d5f39080f4ae0 248a4d7d4c48478dcbeade8f7dba80b3 43[.]134[.]90[.]60 43[.]134[.]52[.]221 47[.]237[.]15[.]197”
“Operation TrueChaos” campaign exploiting a TrueConf zero-day to deliver malicious updates and deploy Havoc C2 framework across government entities
Havoc C2 Framework
Southeast Asia
Unknown
Government, Administration
T1195, T1574.002, T1105, T1548.002, T1547.001
High
Update TrueConf to version 8.5.3 or later; monitor file execution in TrueConf directories; review logs for suspicious activity; implement application control; strengthen endpoint security; verify authenticity of software updates
Multi-Stage Malware Campaign (Social Engineering via WhatsApp)
” a773bf0d400986f9bcd001c84f2e1a0b614c14d9088f3ba23ddc0c75539dc9e0  22b82421363026940a565d4ffbb7ce4e7798cdc5f53dda9d3229eb8ef3e0289a  91ec2ede66c7b4e6d4c8a25ffad4670d5fd7ff1a2d266528548950df2a8a927a  1735fcb8989c99bc8b9741f2a7dbf9ab42b7855e8e9a395c21f11450c35ebb0c    07c6234b02017ffee2a1740c66e84d1ad2d37f214825169c30c50a0bc2904321 630dfd5ab55b9f897b54c289941303eb9b0e07f58ca5e925a0fa40f12e752653 07c6234b02017ffee2a1740c66e84d1ad2d37f214825169c30c50a0bc2904321 df0136f1d64e61082e247ddb29585d709ac87e06136f848a5c5c84aa23e664a0 1f726b67223067f6cdc9ff5f14f32c3853e7472cebe954a53134a7bae91329f0 57bf1c25b7a12d28174e871574d78b4724d575952c48ca094573c19bdcbb935f 5eaaf281883f01fb2062c5c102e8ff037db7111ba9585b27b3d285f416794548 613ebc1e89409c909b2ff6ae21635bdfea6d4e118d67216f2c570ba537b216bd c9e3fdd90e1661c9f90735dc14679f85985df4a7d0933c53ac3c46ec170fdcfd dc3b2db1608239387a36f6e19bba6816a39c93b6aa7329340343a2ab42ccd32d a2b9e0887751c3d775adc547f6c76fea3b4a554793059c00082c1c38956badc8  15a730d22f25f87a081bb2723393e6695d2aab38c0eafe9d7058e36f4f589220 hxxps://bafauac[.]s3[.]ap-southeast-1[.]amazonaws[.]com  hxxps://yifubafu[.]s3[.]ap-southeast-1[.]amazonaws[.]com  hxxps://9ding[.]s3[.]ap-southeast-1[.]amazonaws[.]com  hxxps://f005[.]backblazeb2[.]com/file/bsbbmks  Neescil[.]top  velthora[.]top”
WhatsApp-delivered VBS malware campaign leveraging cloud platforms and LOLBins for multi-stage infection, persistence, and remote access
VBS Malware, LOLBins, MSI Payloads
None
Unknown
None
T1566.002, T1204.002, T1059.005, T1218, T1036, T1105, T1548.002
High
Strengthen endpoint controls and restrict script execution; monitor cloud traffic; track registry/UAC changes; deploy EDR and ASR rules; enable network protection; conduct user awareness training
Malvertising / Traffic Distribution System (TDS) Abuse
“tds11111[.]com subiz[.]tds11111[.]com scyphoserippleepidosite[.]com apiexplorerzone[.]com blessedwirrow[.]org rednosehorse[.]com digdonger[.]org fetchapiutility[.]com rapiddevapi[.]com ryptosell[.]shop tonamlchecks[.]com juxysij[.]hkjhsuies[.]com[.]es sunpetalra[.]com 185[.]184[.]123[.]58 62[.]60[.]246[.]29”
Large-scale abuse of Keitaro Tracker for traffic redirection, cloaking, phishing, scam delivery, and malvertising campaigns using dynamic filtering and domain rotation
Keitaro Tracker, SocGholish
None
TA2726
None
T1566.002, T1189, T1071.001, T1102, T1027
High
Monitor Keitaro instances and detect unauthorized/cracked usage; implement strong security controls including MFA; conduct regular audits; collaborate with threat intelligence communities; track domain rotation and suspicious traffic patterns
Financially Motivated Operation (REF1695)
“hxxps://tommysbakescodes[.]cv/CNB/gate[.]php hxxps://tabbysbakescodes[.]ws/CNB/gate[.]php hxxps://tinyurl[.]com/cmvt944y hxxps://unlockcontent[.]net/cl/i/me9mn2 hxxps://softwaredlfast[.]top/files/n71fGbs2b7XceW3op71aQsrx41Rkeydl/ win64autoupdates[.]top unlockcontent[.]net tommysbakescodes[.]cv tabbysbakescodes[.]ws softappsbase[.]top rapidfilesbaze[.]top autoupdatewinsystem[.]top c32bdee0ec38c7821d026ecb4332082d3cfba71650424d853635828ed5a50fce 6d1b2527b1739a3fb62120722ed9c9111574b4077da43b892ba0940f8d028336 03d85c4472b08db3da18423284a72e6a315172d72dd1c6ba872fc0e78b4b6135 6b60813635717e89b5c122b1607d45c8730ddfae86c4dbff7f625328082c8ea8 0aab0d10bf0592fbe2c7bd7867fac31d44228a8321bddf00d9e67031f2db162d 406bd174b4f6773c496a8b8bb8dd65428bacc5db0f84654360c319e97c1e7d57 86d89c68b57ffff141d8bca41efcac59188c9b70d314a1bb81272eb96e932262 27db41f654b53e41a4e1621a83f2478fa46b1bbffc1923e5070440a7d410b8d3 fbc0e4ee9167fa137e0e4a43eb903066e299007d26d3e6869be1ffaee6451f6b 460203070b5a928390b126fcd52c15ed3a668b77536faa6f0a0282cf1c157162 e19fe80b68b0fa2c39ec9282641294e4fbc3db2dfa5befa792131416dbb9f410 9231e59452c8297ff346a2a6280fde4937c6fd33d333c3151414169f8bfe0177 7576a22aada711e4a6bb71be740e31a2b303fbae1882af1be2fe2a5e4582e0d7 9977b9185472c7d4be22c20f93bc401dd74bb47223957015a3261994d54c59fc b8b7aecce2a4d00f209b1e4d30128ba6ef0f83bbdc05127f6f8ba97e7d6df291 9fa23382820b1e781f3e05e9452176a72529395643f09080777fab7b9c6b1f5c 78619458a4cc2bd00c4a58745d262d7c3fd89f0e4126e97bf24d428ab9944cf2 664248d9fea57ef0114ec3465ffd3e76a8d75d78ed0eec336e0f588cd13e7bd9 8cd1cf28115cc9fd33d759737b171baaf5cb562922c242fe361cbc4283f8fb26 e051fd042368a3dbdda8ba75ff1730eb828577b0295e82e90c19ca2a1f44051c e4cd18efdf6cf4bb745064ba90b01b2c40921b0c1ebd623a07352f26ed5f2aa1 a613798fdc7273f0988567ef87661d425f45e677f54f8e7c82bf4f1722566a91 4ec12a8139c5996df385817bfc42b438ae44879fc37287d56eeb2abe12c54cee 5d42601a51e3c123115dc22561ebcea6759a5761ecdb449ee990e73aeabe3910 82c03866670b70047209c39153615512f7253f125a252fe3dcd828c6598fdf86 8cc33b236283ad46365f32d58943e78224dc29f26e6403837e9631e0e47d626e 542d2267b40c160b693646bc852df34cc508281c4f6ed2693b98147dae293678 a96bf1e54f3076a7acc5b8084fc38cfb1cc2e1546b7ed0b95502c4b1e932c2df 882702f617ae2a2a4de604f41f8508e028d5fcc40ecc3e40b40f123f9b9199af c3f669143e43bc2d22fbe35d064590c1dbb7e91e34ccaa5b0c0891b0795fade5 1794b59096b7bf0ddc87a53f5f5969e5bf8e54119a84c43f39715b8dd941caaa 9409f9c398645ddac096e3331d2782705b62e388a8ecb1c4e9d527616f0c6a9e 7d2c24fada44767f8fbb667620dbfdbcd00b1c5b14eae8b506d4d08b092dbb25 4ee5cb58d6348606f30066a12f4775cf23fa64ef48566b2994e8c429c7d0fc1f 805287780c0e7712b403518b0a7efdda9c6f05a467aad85fced565aae8de6462 bbc6cb417e0b3cb47117dba21e14c2ab2ed7b4eb92da24e91de37c7170223e02 f2086735fff00e1af668aa5db904f934af341d594f5a20cd76f5a4e823e75d75 738fa612d316861b80795d0102b4f36ae4c5e1459d422e395c8101659fe44f06 36c62638b9e1bdaa57e6c452a164d09fece81e7c0b5e943280305d38488652a7 43d5c766949ac52a728006b6e535946bd6b5d4a6b4653fd61601dfa0979c2d03 6b38fad2d7e178c88a7de742fa6088aaed9dfc2a8b066ff87be3d6d92d6036e2 0868721110361293acd1520dbf28417175e022c18e93f1d074d709006f56fc4c dd683616fcaed94ce8c5b756558d258ccdcafabea9d091130503d24eca46379a 6d4a910d7bac52431e010b08f3ff69af09f7cc71d28dfe3483ea1c360679b83c e3c19a3289dbf844801be1fe1c361248b06b33210ef1f8aec98743190aacee19 0d83301aae4af98108f42ccbc7d9b4e3abcd65c91162fc0bfa8d4e3c86733560 e0794663cee379c725f990335ae53c954ee904d18ab87671dd1a5aed5d7bb7e0 8785ec5d8eb7b77009f4ba0d116b00ab7abf88e05b6746a46dd4d91a5eb27fc6 8d901cc81b791b2c4da68e6983343abc06b8610570ee1f878a30661b3bd64208 4b79eb8c08484a07dc70133202778972c90b78d1a19f94477dc46c5c2e3ed5bf 7674763dc6f3ac9ccc2d2669e703681bfda908d626931dc5925c1f574c9e57ce 468441d32f62520020d57ff1f24bb08af1bc10e9b4d4da1b937450f44e80a9be 1f7441d72eff2e9403be1d9ce0bb07792793b2cb963f2601ecfdf8c91cd9af73 ce90cb3a9bfb8a276cb50462be932e063ed408af8c5591dd2c50f1c6d18c394c 4e6b8fdd819293ca3fe8f8add6937bf6531a936955d9ac974a6b231823c7330e cb74c88d57e9ada9e108bc54cf9830ab1df3247b2865b42025da6a849855c80f cc7c0661040afb7c115defbd24e4d35a7f484139a89a959d34abbff95d21b1db 6492e50e79b979254314988228a513d5acbdaa950346414955dc052ae77d2988 81514760ffc68f7eca2bdf88f0b02561c86a14c2c322d1593c9dd7551dadc96d 3b5bca472122acc85d5b8eb999609e162adfa1a855bbfa953365d3282b95a736 41444279183b21fcae701c4f80fb5051afd34a44bc9ea24782def1fe3e67f0f6 77c430fa1cbd4962aed0c15ee9cc1bde40dc38a33c7fbb68cd22987fed9e6e42 8ff504b7178a64fe07d147a903993668ddaf8ed2207f75633652417004aa2ccf 595890db0d6f653a0060fdabbaa07d365a3e7879a8910ed24c73d7362663af69 42591b9e2b41636c7d1b1e0b686fc7bb74c9b1f672793b77b8de238962c11137 a10431e4f4bd7db38916b4199ec5edc89aee72b67e866410d5e96622c476e355 6f94fd8a8d4e58c4e5bed084048be5c6aab1b6e66a2f394c1014a8230c6e833f 0b748328aeac96bc1959640520108cae7c411abdf7f907d016098287871c73e2 a10c0efe8ef1633ca9ec42d5de61249453f40503417ff64ee1f4e14ce557ea1d fcabe65ae4af6a1a9d5d16596fd590d18ef398b09d7746a3b8d55eb62d84a7ac b66eda54c8d7e54fb30c634897018ff55809c2eff3828cef766288fd8998ec60 e5157decb8d0400cd0231d0279731f59340ed6c06fc7ba6c2cde340b0747befe 907a427fea015c5e23e86c746e8194e912de3471482a6b341ba3e1ef7f1c1678 6e4ad17678e923eb1d5a660f9a3baa5e65660e9bf781dcb01fef653233dac02c c952577ddfffa6c898acf23517751854ad7174c0cec4d6240f407adc3dbf7718 bf4271252226be312d158c924141e887d26228c47d5759a7260f15047dfc3f0e aac61dc6455e1fe0ae7c4051b4ac813cd39718de6a517d1f23378a73e204ad28 f86c0decc324137abd9773d0277c91c55b47327acf930d8d7030e62f30531495 39393740cb0d32b830958dd5bf27d6e028965fd54b63f0bee9cbeaa9b58405bb 44855c130e3f72207f2728aeb48455befff28d0f44a03f6a584861c247e88c22 32d8d74892b98a5da32262fc7cb6305dfe33ca1ec9f6003a83e1a81b7630da84 703ffe450d328187b86162675d07eb6655529e0d24e644341032e613896c8bc6 09ced8c78d7e10314f8cc46227a7f583af3a28f0446883fee15dd3d416c8721d a78037b357f48676c3bdef0bc88bb8ed8bbeaabb1eb7e27469ccb04f8e6cc5f7 901c6655e6297900362e8383e59a3da748cd30d0f38a794842b615f44cd891e9 9340d19a39e699e358c7ea1fe4bea30eb4dcb22074b910127d8c362ead280c51 ea90fbe1334bc1f7c0afd31a1b0a2905aaf64547a666b29a4be3746672526ace c4221f209388564911861f4feedbacccb0c241aceb02eb15d39c49e794189887 dd84de0f59e7ba9b2065df6824ab2f1f3a9e4e6babec546f9f299814e5362f48 aad9cb4486db41c4341099ee45be64b6ca7c5d34ea8bdee81e65dceee6376d29 d4775210002d69a60bde8e68b7eb00acb2a4ec8d0be7eb3b07fd4806d7f5b93c 5f3dd533ffcbf03d9cd1fac55727686428040beeb47721376994609185827f77 d80bf295b8e8a4e3520255f03b94d5736b1e3e5c341ae590ef48ccdca1e69c12 f7f64ee42f34b6539fbf1b96489ef17280038e7b4cb8e0935077fe9b6891af67 1a19023b02b0bf18b0190ee7052476ca5ebe0d32656ce9ed06ab5cbabe3cfd7b 88373582c6abcde2ddbe7bd31ff8aaaf710e5968760642078b946a661bd3cf29 809d78464136fde906ee337dcd9cc32a78b7a6d6f4a9a2d3121fa15139249aee 8c3e9deafe560badb18037b3ac1b26a964b231a13ee286d541c4b2b781e15572 6b3214ade492f1c1009a56638c162346fecfdc5400f676a40e022b48ce6508af f5f2f0420cd167ce21dd7a7209abc39fab3675de485ac8c6766bf4a7955abdf0 6f62224f2ba969a0acb27550ec5728430f95d0d6d720187147f7e4ee7366c2a4 06b664ceb49ed3de45ac6b32b047e99047ae17d1cf4db0d6da42dcc6e4da8068 e07eed7b546ae6d5f9d6d0c07ee1857fc34c46a7c3bfb0ae25e4e8fa9b2d2c03 ae390332db30a28eb21b597547eb618e612ff165e33cfde9910828b4fe134d9b a231af9cc406139d2d0bda4f51713c35eebb2e4930a4fc0eae49d6d7cf6cf34f 73037145070d6075329d053d8b8bd6722d804b96db8b49c6f424e6ac5f372368 4781ee8023ed81256809e14ed0377f2fb99c0671b44978d1206b7de6d4aaf99b 8410b02a36687e861409e20f0dae797d012988d1bc4f95a644bb7c8f2a5ce443 215fd445bb85ac88f52a7e6ab82792a70256cfa3a475f217bbad5b6c8fb2730b 06d7f49007ab204703772361ecaf410cec34d179942874c8c0d29e80627f9275 33cf64e328deb763c23d4b7365337af405c0a0d79a9af35d8992fd876544f23d a692937a97b723e160ca4b9da749a6250e8303d38bb4dbd72cc887d6e18c9cc5 17ff50c567bec22413aac79f6bdd455ca4c4ace33997d0326325433a6831c231 9e04687b16aaa86ad48080e91a0840679584d9cf4a532b3437b2b2bc88f71fc9 b35455cad92986d46a0122a606d621c856af5cfe16a755163c38ab24a62938a2 463af62143bf75a01cb56f889935634f4907dc552fc474b93c99add370aa5dc7 6eaa2f1b9e49f42c90ab87ad1ff292458a59b14d23d9b213b63289809a51dcfa 5869800f1b89f51a4473df2c9f4958c1d2949624f0034a79954b9820b30ec8a5 4a9b422f7fe36d929a32cc0143b1279b47c66aafecde77c3d31292060aededb8 f853f30444d1cad2d3f58aed61f9bae209567cac2a5239fa194b78752d6f53be 7ccd2819be2614e8b5691b711494a7f999196dfdef3812cd24c86b4dcf8c25e1 57fd172b02578a4d7cdc70806f5c01496fb7e9c1e80934dce2f5bffcfea681c1 5c5f02d909569ed4ee9113b38891dddcbbe32a8533314a9fef422f6b29a2976e e2ed435e84573f29752e10064598c74fac2ec9ef5650cb2d5c4659df6ebc25ad 4c7e015df53977d856f292ee12372d09645204b071d5f85c7aa5c344f20c9b4d e56de1264f2dac8144190de39a8e38e3bf2c706a9c423995b38d570df226611f c67862f51bf594c54b106afd5c61495f01321c6e172c05d17d797e71fc70c55e fe617a4a3a289267733f391bffc66961e21f36f9fe799f75aba1f092af9f5f14 6d488634c2b997f5ecaad73f5b968c277b90a73c206725547e0ad78830f538f9 e596be6b652562b0dabb83c96b9b3f2fe2d75635cb83eadfa249dffb62198ac5 4c5e9b4dd6cdb849cd8eaa87992aa7d9f00c8a385b6ca1b946193a091c138050 b2403c26bc686ce092cacd6fbb6b820b9ec227e906067ef68c40125f50e915cf 00ea4f21d597885b57039fba6143f6587ce4651f3e1e8285597405e070f1b977 5fe433ab4e7817610000a81b88e32683c391c9cc4296eae3d54a3b3cbb25bafd 1c4c62d52d18d8d23b1d618965aa55858137c2c9a6eb2061d83b3e77a6993ada 37eb5bcbd88dc6bc232db9e3b40784237dcecde9e6e1402d19944e3a2de4c76e 79f5cdc62944eb3d0d5f88ff3fa0781ea9378b2dde4744c8d9c71a44814e9359 d5278f0081336031a3bc76d2b6c021f06cc0279be4c3d886f69b955517de1495 60cf405c219adc1190819cf7508e53a5ab10dd9b5b6117fc38a7ccd562e85346 e87b87cfe377366971630a8a4a985eabdd7198bbe87fd72131e678249fa3b09f fe8bffc7e038a9c54345366b278ce342eac9288dd17c57b3b68ce608a2711710 dd595194b3904bd16c42c38ef4805c950cdfc96a58b0f436a86127b93f45130c 493923e197b6d33d3f5450d17361aa283ff5bb82ca19914f8fa67590e44626e4 013ef2beb2dc7ca378d82f077866e204fa974bb6f2610296bc58ffeaba1f26ca ec4faee436165b190806bb6f072ec7dfcbcf05a5b38caf07ee3be537c2017780 9df133674e413fa98663011abf27d56f2fa5271bc097b0d51b72f6145a8d9859 f200685dbb70841820e86ecde3cbf600fd5676a88b8de74163e93916797e2780 1511fc85aacb507756a189bcf0d000f1e9330709dc8fce2dab021bc9bf880fd4 f1655dcf1837e72bdeaae8e9390fce5759360acc818181cd6196895f834789e5 7649ac9d2ec827869bba6cb1b641b5c0d199fb04a1d7c33b21fc254daf83b094 7c81459ad55bbbb3f3932b04b213c3bbfa113cb3fb68637c942bf9e5eb62460e 08be9bc40fd28b3d495d9db2bdd99c97bb8f8d594631ce1879e2422556bb17ed 22b50031557ab01188549890fd08176ee08b12e2aeea882c92cd98153805a7d9 a612a59048cb090b7a89eff6ca596c8d2b52e5d1ee92e5d1e1ff3bc994bc12a5 0261cc298b79e78d3347cc1ce9974f349f4611fddaab067e27c447a211cd06d7 4eb64d7445c3e4f1577b81bf624c2f6846d3514363fbe75d9746d12aa0e657a1 fc012c6b31061a31794aec018280f6c952ac787e22ceae6d210b0287c3af1891 b0c14c049d671189d0c86feeb6fc6044bc6d447acd41b6d68c30fd7dcff3c258 c557ab32542646ba392c447916c724d9135ad3d533dc3ae2aa69bae642242ae6 6eee36f7d13ce9945f6fea167caf65cdf0fee366813547023cd5a64c9847cc9d c6df10c1b8e3538efb1a786b71e569cf5920a59bc131beb5bbe0edd8df67a6b8 eba32a07adf4a424f44d99b8dc4abf9cb1c7f4c771c6312e07d3fb92fc4b4c84 4d2da94e32806070b5b613d347bbdd0eba514163b0125d5a42823c305c82e00b 988a73c36d469c08efacac7e414d096480f783e1b8fc975e9e7b91ed1755231e bc3201cd2d98bc1bf0793bf6337e6b3f7e3afe1b06d0c7ebd5a7846b744e40f1 70899b5db2a29ddb727436c93de60bae06839a517fc69c1e31bafb6039a7df50 a8e6afc848ee28230477d0762c73c9c87afedf2cc3f9375a53825b002113a9f8 2db280ee71162e140b33fd8d3f5c78932fbb3077b241acb4010e9c36e88328fe 20f9f78cd790f4ab03cea9e4782e1d594d3789cf138f6ce56edf87e1607d9e3e ad9fde9f450310042c7cd3e0d89a4d56873e7f0beda83e1d4eb2292179be71e7 37b4c624be16904e9e6a866fe87e597b0daa1085d835451427af4ffe12e6583c ca984a5fc4464a6171549f78ca1e7bd94c305a3f73759baa579ad8d0ffba96cd 3de21aa5d95ab5ac6f5a1edaac8198a081c8cf70acd775361c741a4e400b3b2b 9e1276ec34170e5b81c10f20312a628d0ccd2d7f6351111e9ee4a3e8e009288d 7b26711424f7d537f76f7b1aea20071b1e17178a024210dabe17e91a3bf6d5cb 84a9925e69ad0fd4a3c16e0f371ac1dffaee09ac88b9f199a6fbc3de4cf77449 3c68f729bc7c13959be46abbc0e3263c53e5e5b7a2aa1a010110bd88941357bd d5be0de92c5660b629787fd9b1eda5fb119366315a94bd527065f82ac123de64 a5479a10332e61a8c80e4f8a495aa8b0a35370b66a2adaa181d799d3e35efc47 0a6d8187d726b604c0b8b1d62d248fdbc38eafdd7a40cddacf2c9aefb895cff9 0c95671d130e1a6aade551b1b0bd2e18e099dd750eaf9dc7d1de33d195e2e0a2 d911aea099d171c20ec4e29f6c47330d16f01c34d9b9c71d70ff913d7fef1a9d 929768a1e0b02f4cb4625c3fa4bba44dc599eabbc0e8f5c4b0ff1fd6639df642 08d90a151deaeb0bc892cf3c2734767540e736afdc40fadc7e208b9cf53014ad 80b53aac281dd3dde41bffde4b5bea721cade8223f0c6d4868bb57ab4a0d54bc 1d65b17172998ec1dbbdea7947f3fff2ef103d769e66f5c6d0b35af81a0c98ec f9a6fa310bd121a3c0764b15c0fd14c10eaef637a440d92c8078490e24d45cac 65a950601d22b7afae7c41f34b03f6032125b399f4586edd0552e851c256d7c6 8775ac6a9fe8c2ba80d674178efbefb7ed6361a345d62fcd5ab4b8df39cf7e36 68bd8d15528b50b356ed0635e7b9475da01534ee578f5b2bf87e0685d5e3cbf6 f85861b702639fe7e2f5cb7a4f367cc7e8c04f3a9a3792f616c14917e243461f fd037d7be38488b37150eeb45c5d2c04e1ddbcd0676ce698d425ee72b44c6a3a 6314ccc20bb119f6e9a6e785a445fd4132719651cc793205f14afa7ef2e81841 f4a9651380d433fc2d3371274561b62b198bdc62d487a53541ad1c6406989655 a2db4ebd2810ca00d1d9c1ceb112267e3271fbd59b0f5a3b1699d7ad96a6dbe6 45995e015ff32fcf33a793304d1cf1df12287377a7ed7411545947680bb432de 165ba5677606b69fd732f4cdf36c056c36da53a4427f769730b6fb6ec4a8ea15 a0c1492bf04c4625ef21c589004242970e409afebfc844ab63dde071de701ebd 0157eb0ad4a5fc98303b9f9f9060e06722cbe5d6409e49c399b6b462223f22ae ec6420640cc085f476902aa4497185ec7551a1a824320eda52e3e71d51d34118 27b564df5fdf0bb661c74b69887c31b1e542a51537bf5cb1b4fad46cd43be45a a49f906b3fb779bc43ea3c42fa27fe9d95563383d3b0ab1e17f82424890f96e2 245aa111a0e6425e63e6505cb1d49fb6916540638ce0c3a5392c006d92a5b3c1 b0f10632aba09a09434e61704b8e771ca6b3141e73a0bfc007dd23a30090d07a 334aabf42fe7ce880e8d68fcfae8d1c74055e487c2160da27e093327d3983343 1ec25ff53ed00bc6d9bdbe33e9a5af6631e47855910ac6afdb22410dfdfa4783 51511f87c14318be762f850e4e997e6680697e8667b49219637018fa78e80c07 8e24eee3d1262aee120c23e8d7d2eb5b6792e1f0efe41b629d1ef073e10cb999 5881e40155292f60a6c53ddd40dee76f2c4fc8c0c2c96d04f08d5b0ea84c93d6 42421a9da8b72a3d1c07cf3154c7a1133f5778733d49d0cd7941879efe3fe8c5 951bf002b63ba10261781fdd19f483bcd7bb93a2b1c203a74e4eb1ae55601ac1 de18b986a43e2e32f160db020b3247212335c981b06019e430c14e10077dd867 7ff44967c4459f0a7b836a4aa650e199b9076abe16ca53ad22e7fc7dfcad7252 07de86de57f2d53185ac620dce26cb3c6827696261d5aad3b2ea2279e66f52d2 313e87df007efe0cceacd042d2267946e93b0a00f9ee4e1b5e6b1457706927a7 f5f977688fe5ab1c569958d0ccb27d8c35ffde7d03b6b175bf47990eae18c747 27ef79910b2e1a356bc5aaed0a6fe1db4a94a039089eb1266a99195f9a7e60f1 f0710070f4f4dafd69df92daced560d6540428bea7c2d49e0e8cc0292ec7d97d 145ea7bd2fcd8b5eba09afe9beec2cbf96100a0efc437c7a0cf82c7f5f40e2e0 23211cc5c51e8a3d1c0c8a99e5d726e232dd54f8dac7ca28ff11abaca76e864c 08fab81476bf7a011da377ada5609521c48dd2d9f42cf4f0e6f78fb3b3d5c364 5df273cba8ed15b81b400eb73097332f780525036bc5c6fa6a48782d29632362 e84bbb15a73d86153a38c03fc446c1c7410fee250b2f18936a2f98f2f0b0f776 f26df89b194371e2d7ef65ab8069adf57ad284e234330f996a70afb4d5a08403 0400f1d1e955bf333db84f262445171940fa67fb44bb75e2a18abbd08793724c 16f4093005588054cf83619869f799f5fcd55ee87d723bdad8d11a8db30eaa30 6df2c73d74ec7b30be945d228f26d502df41d73865f7523b1129a87c4902a9ae fd0f8b789f7375c7101319463fb290a43f34240fb9f05d8fde2845c3ec547d10 885e224fb1485b2bb4610fb44bf9f288018f69e66627bddad7f6a30210dbd7df 0de127d3493d3484d2c818d8f5bf2db0845fa3d47c10688b7eb75c145e24f0cc feb9d5e9402bd4b4108a5cb53196d5b5511509cf4dbf68c9a1194d63475c4633 b7ef3125f373effaa52b34082b357770d02d054a25a7987b5a92903b9b21c7aa c7951246f2ad336848b61462fd82dd59770b6e8ac3e808e5a2348a5040b27b88 dca5c4d2ec291884459285a30af90052b01ab9af2a97ad144014d5e47f4a7464 6b45b08514460836157e73016ef06df897f6bd24b3798992aef085c9d2b41043 807c7e6552a3b156f16c7250f608ae4a5c30f3dc326be9bc37c5eb44d499f94f 38a3631d3d4858d80cbbf18752618ac2c19776a4e69850f2bb5efd5192753b22 5dc2ead649115c2f4b36517afaca8f61bc3cfdb260e9d72d13fd59f211fbe9d1 2104ade0ab5b69ce8349db22ca1f5feb9889f366cce587c6d1a8ec1af286d631 f6f17bed5d7cc4bb369994b8c4b7c180a4af00c4d38bb4f17af62ca5808ae0cb 5fe127918bc8402b14cf958d8cecc193525f71f6f29e5bd6c1d575330444d948 4caf960d038c2eb6bcc30e54dab7b1475b3597ef86ec2379500a4a10394cd63e 03ef68258ad1a529d24df4c0d3c1bbef63705055997fbd080ccd2f843f4f8f9c 8210230c8cdd62c7e3939b9559be035772cf9e2241fda875fbe066b7bb5555c9 5c438357a6fdbead83e04e710909b0a74d8632f4077ec870cdf7e7c1deaee7fb 27dd30525e0be342fc3b931194c0edb06a9f3eff6e03aba8582d4d30432db386 15677075b789688ce1e275059ffa60558113512418585628dd4f2af3414e8896 f7b105f0b07b4ee27f33cbe478e1f114118f8ff5c6cca9a33d65ca1a7e523746 ab6e4de0d2e1e90b3a9ad4ac709266d6bda979b059d8f53daee0ce545480f1db 42b7598f20176e630bbad8ecce58beb84d892c35c85e6781eaef638d9ea16aef 294f1af51f6fc74b23f052c7ddabf9bad27d536930090c5ee37e1e7704991c76 784f6cba2945539395fe8e7711e2a19bad9f58c87efafa68c25c3e46555f974e 6014e6a5f81c9fb8e7847ada16ea3518930be5f27363e938218a164983054270 3b682eb5bb341b04183ea7345d8a6911879fc987e5dde5859b8ea3e164d45c71 fa87b94d71d89388b3182709a0f7daa9791a7b8282d9cb5aee182dd96a73ee0b 0cdab098fb3d8a465623746bb584d8451854ebe69515fec7e77728d583960517 786c7c3bb619c92f02552d0ac0673ed1538d98e3ce5418109eb21778d544462e 2dc339a62149d82f86bfd8d8928d34aaa965839739542c182f553959c046d93b 1078029a07d60a93729720c2cea6f128ed3ae10811b21851c3ca87739477a70a e56748a675a4408e9b9bf337e5faaf172356c2400026b84fff84f2c7dbdfbd7f f796c2de2a598ac5438fc4e6334d65acc90b672654c131878b0fe96e040a439f ec0340c6a988fa791ac8ab7fa1a5aef67853f688913759cc2631e44de2ebbbd7 29695cbf114e57f662e553096f7a3777d4af2415abe035759a58ade569cafe7d 0769bc2606709ae776d7a821a3783c576884f0f2919bce4ed7f5464611d65572 8726f5a635adbcabe6d095f1ba7b0a905075f2e91b1ea0db6ae0fa763dab2cc8 bec4b88152d730e032be39a3acceedba1b11d08e7304ad33f50f3a558a33694e dcea609cb69bd1bccfc36388551fbdc7958106d247f583f13f282a8df9a20b9b 0aae6e97aba569faf358ed616ae8c02f0311b67a40ec4035f6158b2853d47dfd df8ed77ab36d29a0c76f4dd66a036cbfa407f9a291ef3eb68be636399d7778c7 0296d9897035399e5a56b74b39caeff0f97aa726bac82d98d46ffd1074b285c5 b46cf246d46ebae6f68609a7616af2567d7547c74b723b5aeee06fe600194107 0176ffaf278b9281aa207c59b858c8c0b6e38fdb13141f7ed391c9f8b2dc7630 1526708fd54e0b0518919be65b61539b7e4eb247aceeb7906f910fb9766e0de9 59df77cbccda2a0c631b6e7a9cf5c724e91adc058d88bd26af5e0009b5b8672f bbb3596cc5a02bfc76aa4fb0bf6f9572a4729e697b8010aa976a6a7b239e13c9 4b313e6f648ce8befcaa4c5ecf0eb8a7d5a28285f4050c41bc8d5e957568031f db0d2c1fc72609236ee0a4ede6437c7367352eb491174acedc05c24b75af04ef 7bb0e91558244bcc79b6d7a4fe9d9882f11d3a99b70e1527aac979e27165f1d7 ee3c8d2e25ee9d472f8e3d6edd171a9293243a4fc8022b9a560ab3502fd708dc d47b60b80ea7f57df1469e4bf8ef6e41d333fe03c3a96156399dd80a420011e9 9ca5992b418105db6b82d9133b036d7a1cb95c6f73f0d0027c7bbf3106362510 a12b41c72c1750a0fdbd7d0b20cda104df190fd48cb2361f51a33d7d7138551b 1a6af0334b88007940c2ae95d53f290bed28f92afe7e3b14d43f37f385fb51f9 89a58f1306481d92473b6e341923120184d027a3225515508575867add689a9d 6327b2bea4a0bb0f47b1634ff7bb5544f09aab3fd3c14d0c9012f7d09592a210 e92e48d23c9a4b9b777b483eca903115ddffde879d3d9563227947112e36c55c 4cb48cea48035090aed61958a56dabdb021985bca6fa24f100bed98d619eb220 7f63c99f2e4f2c940b4d3efb978722e9a3387b6f8b96aeb391f2927cfef8ea51 a3f84aa1d15fd33506157c61368fd602d0b81f69aff6c69249bf833d217308bb 60adfc6c5de06cc0771dd6afdfaa41da17f3136194012028e1f810d8b3c7e4c6 169cd1b77143c07c81455e58bb67a6ae75404e5cc8a39afaaf3e0e32dd5d415a 64f646ce14ec3ad95cbbd5ba0e63e0793fc8819fd7fde6ee7bf3fa05f185c71a 01b4d2a7089129cf8346c66108b51be612fa005407a5fc5dd04ee98cca27dd70 fa9753b026b7b6a9447e3b4460107d045d2042650831ee345f8027e20dad6912 0ab37041821e7040ad1f5a79d57373cf10d2f966377a0b00192b6c368a3f91d7 efe5890303a4def301b37034377cfcd7da63c992bdded574e91388dbcd6c8130 02c382657ee7a21d0b3a149bc56ca0d3b3f4dd9b39677a7f110d50d5fe257694 d08adb863dda5113e68b1b27844959b84210c06f7bbfc1419e3cd072d4308a0f 408906cdb3ffa68d975a99ed32e1beb79d22ad8ddeabba9ac25946fe0848751b a82d3b7ea74249ae793ddd397c52492540fbb2858e87ea7a8bea6af313b92bbe 05cd552f37d96f4a9d27d456d5226f079b69106ff369299f320192110129aa76 c82b37d36f7a555c7294787b815df61f14c7abb4d7e67110d45436d6a5b220d2 7b180e232ac075fad7ebe3754801ac2b591b795fbb0f842912b978ee391a114b 32da4b6ca91967ba76a0896ce840df9141d75bbebda1b171a052f3999501049a 84afbffcf78eb94daadf5f7b98f56f7843234ed3eb5fac1273f53b48a190223c 648d0236bfaa89ef4eec24b9d1cbef2d53d7d5d9a9cadf789946d55fc3d50e3f 5e6edd1c21f6dcc912e5bd99d8bbe3fa7462b544a55554ca900e9afbd5955d8c 10cf11079471461505072f01069592cfea3a0169d51597fe12bcd882c1c689b8 ee142d6cbd14b64da305cce0d9e8333d2fd02ff225b05725e7ae9b94063899c8 1febd6d6062675f9400c55de95dd62215bea8391dfe48257337c5f7ab50a1eea 26cc77e484e350a756b02171f15fc18890f1451035231cf0128ecd3d99eb1310 b35a8c9c7ad78b622fdbb9bc0e5b8b9ba830e55a277e14126ac03f3892097048 15581e8775ded16409d6f5e8ae90ac1c38d0aa9dfc04195015758e6288b2eb81 f7a448e819af9fa4ac58ff828352d7cbefc55383c26d7c24b3e1241650932b4c 54e19843358cf7c92eb34d40bf072933e590c04b64dc4172b03a6de9342a5a69 3ce5eca406064efcb738f9af4ea1ad2a3e4d8f7dc66db3d47aef7965449edac7 bfe491debe9527d607324bbecd6bb9b454843ec0bf30fe69f5649bdaf942f6a2 3319ad2f4df539ef5c7914f71c0fa141592a5ba549b0e0dd3278e8ae844c3c82 b5ba16d2cc8a912ed00c91a0b988d4aca973cf6481f89cc3a87ae28b35a5ba9c aad7d6925577c727f5833ffdf42c7486ac360f6470ed5caab6e5870ee7e296f7 d35c58eea54a16c8b4470d0d5777956e585ea7ae2ee21f0277b0b5ee09a09a39 4ee92c47731a544d850dd3fdaa4952a70c07c3a42c6b2fbe71c498b93e36e2f5 806f40a3fd9e7a91cbcdbad4a59fac06af368ab7739a08e11d042380befe020a 1f34c9bd6005bb4b98334325b81456acc113467e0d893abc615b3422165acf04 081855a70f59a560b4b78ab17eb2d704dbf66acc1d829efc1a96ccd7092b0c68 5c5b27e839d3a005fe1ac44cb3911b3bea4305ca94ba26aed8be2079f84d67b3 0d6d72a1725455e6a2cb88b18f1382de798d9d443cc245829fd9eea81b603c34 a76722b36aa7eaf02e844d1bf1cb8ff40a9e5bad269ae25a706b3fc0a69c7ed7 05d80ae171ff74d9f4bd83fa1cafee73395b5b0618054aba79bddf9fc8cdf973 bb8004c647073b6850eeddb791aca821ec6a818a0f11bb7bec39978c5e43ad43 4a53076b923402a7e167d5cffc8688bab7c38999457c4bd0eff974a48f7ad6d7 a111021ae9ad6079db6028cbcaead30788de3175a7f5bbeb4deab7a79aa78edf 8e5c46378b48972e6c39eacb17d1b1f68d51654a429dd96920f6cbfd6bd52083 d3ae94c08c33098e99b3b1f699636565a35d570a13c3db42f101458e77248695 536efc627a763e760b20f7b0393a8ba2b7b2c367338c54437110545139cbef86 cf25452f82732cea143773f2a941ff80f54fc268bc1dbdf6f1e7926b17390965 e1a807763568bc003cc4691ef9f891c637b367bac61879f31ddf1b52d081b3cb fa17f7d9cb1a5370e359e74e6fe027b3ff69789293b8d0a0d5f5fc07d2995326 a4a3813b0805ef1a6796051809c8070bb977d7eefe30e410d196c5099439e999 07e67e1cd53b7a35f2b3d62beb86d1446e14e347a8f67da90cf68dfc7b3258ac 4f678f5e46ade79efe0af3e294ef2dd4f6148902317c9c90989770a886a503ad fca74f78029be76a64d23ec9902588c23e3618ccc3e4630ef6d311fd20aec5e9 60c828eca73b5e3ce12f3cb6e2fbc0169dbbe3cbd198b0ab2cbbdac976cb8ea1 98dc5becde61c7c14e76559efa0e8d6077920144ce1095cf107ca3e32d5b02aa 9cdf9d91ab097b99980551cf99a11d697d40898befdf033935aa816e242058b5 2e695cadf6da3215a926d99eb3c6b9e9de63d9c4b30d6ffeef52b01a91bb69af 69cfc3aaceccd9d381aad7e6c9366feb06c8e32cbb831b0b69cd22f201c0967d 15f2e5e3a580db699e63cc8f3a738a2cd00eda1c8b5510ceb2c57a8cf9261443 63738bbc9a53eba02f0c7b1cf802431b2937829214147c1cb6b178704dd6dcca b611169798e9fcd66d22f6eb904ba71e75d35d43a2602213dbbbbcc3be253906 3bb0823d2b851023800974fc5a09f6b2cccf7f551cbca1c037a3683172350aa0 44edf60f6bfba97630d4dc15bdbd173cde7fe70115fc4a7b46e616e7ec2399fe 67414664dce202ee2fac6de24195f2233116a4df6fa5488b8b99182228dd93c5 40db75285f8bce5ed6eae2b1e55b3a7231beb1ff530aa15942c4ed017774b3ed 2a5ae7fd6ec38885d8b627e3e6d43445c2c90cf3c4ec4a31cb9fdad16400182d e9a87486cbdcd670b7c7cd057df77815231996b5aab1fb3cf61b59e7ab4ce2b9 20f1646a1587e0b608cc6aae969e15f04bc3efe960fc95befad0d387faefa45a 4a6473c7bb614fcc43a61ca9ccbbf7a18a170e80d474b74ba203927fb6d441d7 64531f68ccd6411914d6870cb6c79f975bb54306fe692c3ae5bae901d90cb3c6 d96f60e2b97cafd7f271107b25bd1a44349265e55c2a971fe8d4162d64bb3047 d2118324ad36c8887208abef0f353b25b74d18c8fd79fc705bfc56d92922d763 71feb64af3aa8fe4da079d1370cd7c4e152e1ef700cc8755045f4d138c4f5da1 b718af6e8c3d18bc4c11949b299780bf7052946a75f8fb5ecaad39a67446bf15 c0f21f6f26b67d2654f1542c89127fad6343e019c040e743e2332dc13e40e719 01fa3f0905fa062bdae3c030579f7f614706ac1a2cd60161294f49f3ea22a073 39ca9b0b82c0ece0bdd5cf03306496b755e0d6decdecf2372a170fc7c38f13b7 d426ded1de84fce1fd639e53da66775369e14afa82bba4d8ef18370056eee5b3 b4bbd384d5739204e5f1423adf6b75cb175331678ece842db8f02458e8b8fe75 c6c3791fc7f47159202e6f1ff819283e0ec1078b227993dd08427fb9050b81b7 7eddae4ed70fec20b44428c09b622488b813df95e94af52f5e410cefc5449a87 3ff6298924e78bac38a761815ca73ff063ee169b5576c8d5820fbcbd37abc768 527953f49e451777b763719a45d4498a1ce5b1f9bdc30e45d1b7c6f6bb201580 fc169683d7e70154c24b733f6e7b2b4fe01b92de4047026d09e623f5050191aa a9837ed0ad9e29206cad7a9f85eac63c20bc4ccbd15ce3f89075cae507aefbf6 e377c86196db088780c34073f582972cdb236fc22d39a0b3085b83cd38c70939 50300750786bebdead0bb17dde4efc78bade3c1d6cf7a4505a414d7f6babec4e 1af723e1e327563c0772ae99aacb6d84a425fc11dc8543f3ba2f5c15772f3c66 10dab927bc99ab5cf04d1764e1c943ee85b53e1101b0ed2083d827b81dd23f22 0ba7f0237ba46090911f37d556b7c3aaf27ef50edcaa46532993a25bb48b3a4e 58f4c1cdb3b09c0b0558d821df70db25483d6469679fabf06803450fb2dae149 f2b503b50c8e51a7391f8eaa2dcef6adda77bb9e90bdbd588aabd774c60a1737 de68e1218ba3b96d9c171bad4b18d8c0c5c96a00c064bfa9431a35b64b012242 b10ca7e1d658444af17eadd532bab683e0dff7cb2b1dc35ed12675dd216d1b72 67298def67eb8b13b8944fdf64ae73b479f6b5c3a59a8b1000c9e850007fc924 155713f28c8ddb04005519f13b11059f6155e3b5052a47d06cc9ac322a83ef9a b1d84c653cadcd0ddb07b7aa8d891772da750d9578ac5c2449420341d708f360 8cc2ea802a1849ca52fd1580f3a1b4932dbae9e888257014d3226c8eb05a1984 e1e87d11079d33ec1a1c25629cbb747e56fe17071bde5fd8c982461b5baa80a4 257df0dd33f9d337e75fa3a18d743b5ab0497cf41f4e195a1dc4b02a23dfee18 3c90b27ce547cb267420baeb2d9c5f21f02366f08d55a841a66eb2607b49e4a0 9f21327a1cd3a6eee504b49797d854bdccd39c0274f59777868bc482a216d4f3 e82fa23fef0cf4d945edf0c6fb2385f059d67112a0e839188089b819282a8108 e509ff6ea4510c0996df4692c5cefcd98df664c489735750b1155b200ba83f3c 20c82ae0b76c27f953358c68724b41880d87fb61eaf0d9df045a5f5a09bd4266 bb8ae191bdafd5e59be740e4f9271453007dd866cf4e9537a93a5b2f0989ea8c f23ecfc012cb6d26f7041f160a288015ed09d6e418def109389a04a59d5def1c d37c114f73bdac845ce4da3f1c45570a351d8ee4f7f36970cf0a07750dd65cbd ac21b4977773240b84f0780da82e032f4f93f9ed78f14520c471bdcddd9f3f78 2c5aad038b97b23e2f80133229bbfa2006128cabf4029926a571e8c3df70be3e 6a01cc61f367d3bae34439f94ff3599fcccb66d05a8e000760626abb9886beac 985aa54895240ec554ae1d6d1eca550a24c550379f6a73c6777dc121e7663bf8 a3567d09a745924df70c7635d2be5208d47e9a01a53ded00b241a1edfd1dd306 97cfdbb506ebff637ec2793c2e082549785978b974531cc12fda4aab16eaa9d9 cdc813b640e85f6c4a1f34924e89aee6432b943f0b35eb68c9bdc9da5ceff4c1 f16d71fbacaeeb0f2ca388efc71d9f1008c4f6b916c3043e8eacb98ea794e4e7 04dc7b93a6682b22fa73e68ade83c249bb4cb88c8bf0a5c7c64e499d21fcddff 3e5da0a75e68671aa0739f1713ec0df1ce616ce5e6468d195c0bbcbc7bd9e291 80720920d0e5c939ca7aa47ce2c312b3cc7d133905686a91ac960068022d9a8f 72a71502fb0b5df1cbf95ff69743e0f5218d3cdb1e61f75f74071f83598979f6 3c1c3d1382dd679fd7e5fb400e0ddeb2c1b8c7b96ea2793df2db6c6a83844ee5 91c5fa9ea0462f8c149fc8a4413f58846d4c65390c624b1663c1199e6b8d120d 520b2e3ecc06f4624a2699c71f1a3b656cf4bff4ee1db6198993aa1ddd3c89c1 325bb4391ee2b970d86f10906a877e3d9dcc9fbe6bfa8d839f44c842e5e393a7 c9cb2659867924b48c2943be4640b31a72a335aa1568405ca49ee080913e13fd 92c4c36f7c0f7203fe17b8806186bf125b5f2bba2b696c21d5e61ec8c5ce993b fc2bd857ff20fe0d0c96a310b6c47b0970c350ec19943e633039a41f334d41f8 30f9b61ba8dccf834caf0f9e3d11b8ea688f674196ce675b3d7d1b3b4fa5f3ac e4e55a40dbfec3a86fe1c5927585723641cca441fb72eeee5c9e3a304e5b797f 7a8532d76493ce4072b5f29e9d4a2dd482968c0edd472e06b4988271e68f7927 5f2dd009bdd7ec95ecf6692e9b49af38ef86a06d6dea1f5fc9e3b3972a435e9c c96b21aa1298617a3be584c0e5b0b1157b83746195795a393b62aebb637c8df4 db3ccef8c62241c5531c39fabb6351b358132c39ce4df674907bc67a260f5af9 a8d67355f155e58f1aae277b7c72c4e77d76529c9cb7e25c6f70b601953ac971 a4db5b62ef4df75187182fbe4fff341d7372f45c37fe71b073f68f8234a670cf ccbebe42fbf3e4226fdc3bed338986f8753afe95833f10732f29e76cb8e33915 8b5076a466d507d24cde4884d9f696d46bb167b6d88baa891fa7fa9c7d0a3ccd 9fe24fe587110ea3a19b75456f16d160b8e57f89dd9b57e0f29951b0c915da79 d9062e9f1361f284ed2171d79a88624f224886e2eb2328e1bfd72ddcf01babbf d58f7307d528aa78d04a1ffb5bb4d9e0d4fe154fdafaa8fa6b597661873796cd ed377cd10e637af7c0f079d3b2b0c6a474d56d89f165403fcb90e3557055a03e 2af97adb11fec6ed6b6e1079cd5531d1bad4b8cad8fe49c6e1f28bf501ba667d 4dcccde5e5a2280cd0e151e7e8d5c99864690c2454cce02c97d35754f4048ea6 1d03a953a0aad8dcdb8782b55c499b93c6233833b32d62ee987b5cdf565ee244 4d605b3f85215af207942e66b5a69c51300b95a34e441799464ec0d228b42f97 47aa26cfd1bb707f47acfd776ec70185bec00c26bec1c4546e36945f039ced7e 7a76b65b41537daf8c73cd1b46f9293a51067a28f8aea061ec903e42a4232294 ed1a6858cc27c06ccecd5ff2f793e8889bc0036c2d758382c4b4751ebc2ab2e8 21fee68347cb480a1f2f69b1cc9c9321320274ca3db5081984c01e833c26bb01 aaa76b057da2a86d139d86a8c23a3afdefd0e9daba1b6b3ffdcb13d241a41df8 5023d1743e96bf5a0f57b9a67fd4868b1e263e763569581d228565bd2ae16d79 104d08a04a78fcb958fd7ae05445214c1ea4e3763b437fe532dbbc948847c507 7c305c48fedd4f1377e1fa989911bcc752eeb85f5cd47faf7e17e4c08b5b1c3f 261bc614e365790a5ec8730be061dc5d7256031cb333a3d864ce34b9c2fc3595 926d76334dcb041818c5886e656d742929639e1c2cd84c056ab24b9f3be1d48d b9c84e04ee67698f106876a3abd4882bce3045239f59f049d1d3c6e24e7db2a9 2d5650be1511554032d551636c1bddd3c66d3e2e5631e53eedf2a30848ea52be 6c549ca812beb5aeee8fa0c6120865f00113d2c26581e74d9cf7315ffeb77111 9fd24ed37487732939cad59db0cf44c46b1cad06724a9dcb28c5c33fcfc56709 6161588cd971b37d704d0d0d1fa4a7811c55f2270b04e5a481d3920536226d9d 8cafc8bef991aa21060b9e9ded1d0de9dca0fa835daf53a28f2e3d94ccfe95fd 60f91711822a2fe2babd5edda502bc250e7571e23147dab119cf9e860b1b7a5d 45d591ff1f81651c387aed90ed9c5c410a298c30b9f8942b958823dc875ec202 ec404e9f2fcbe073601a463f5f2e0365e0fddbe6cf41bcf1548d8ea57e3deefe 1ba0669ea82d7bf1d58351099e92764a8062e673906f3d7df893bdf9b24ac3b8 8b4d07fe12c44445d93b3876ea0f2e1451748319add6e05ed2013358b771af54 346037394c9aa25e783ccf397cfb6ffede88e0d5630d26eeae5722a0e6ca9834 d0978435d5f992301075e496e5e3ffda365f14d1f0ade6fb0d7aa687ca121b80 f3c20762993d21ddcf0bd3d03e6c77739fb2636427dbeb591a651f1614a81922 b8fe7c89ec429e7c4b300435691498427941d77fcf9d32bf11c83c318f145bbf b091138df1950dd6504ae610fb63780344cb5df60ca0ddaf959ecfc8448c98e9 9ab44a25c808bf6f585d895edd0b74b2a5d971a26945a59cbc19eac1269792ba b28511b01f591abc45120cb71539c85684fa0d06d0f4c9a71450573c4f4dc1ca e23da146770e8fbe4a0a7e2949d33c52196e3581d2d697bf994e2e84a2d0207d e4bfe430f5ffb32f2bdd484b33f736e98fe9d3f00aa5c24b3b0b61b3923450b6 9bd12c080aea6e9682f770a5cd5997b8134b40d062225a5c1bc7eb32cad03e1e ba81d6a3a1b71ff8290fa007c781958979b6638d1f6164ce2e70d443895f5317 0bb8f8d2a23b8911c8d5ff43353c3f5c8b293ad12903471d01cf6e2559f4da4b c0a559af5e24c1da644fef71626a37913a2f5c0e8a17feb06f41be8714299680 caf5eb87ac7339cf4e32d4f0b6ab350a148b48664bcb60a5dba46256d807d658 b591eeb3c05b0f6cda724f2b72e0e7d09410ce8dd8f60835bcdb1769a1fc99b1 aa4770bb8e6c726e45312467a13d7511f8833615b7f55d68679d6348e6fcd160 f499ff6f78bfa3b5f1feafb6c6e8455c1aa005dce6b30ee2b82a8773d6bbfef3 208fb5dfb1b81d23d9499cec4c26e0fb4a1eb68c6310c03a2f06bb270d610d90 5e6c3453404a64535c601b70448b150010f0a0505f27f9183fa63606e0711cd6 e7e6dc5108412dc0842b5bac103b83b683900917dedf5a2fee2350f89c7c8c2b 5fe049f88a4b3348af6b8d6327d6d0fa47a5f512c0e5dbc5ad4da87cc89e36a7 939556c8c2e6c25bb139562e882c2de7af712cd0ff32233fced983ebd94c40f7 a9f70ead69e738244d9f12eb117fa94a025df126fa7991a7114bfbf2e96b64b3 430faa3079eaeb1aed0239b87160275ca5e695e1155b17ca8958b50271e7bef7 4dab81d9ba0f55efae13ed98ccc1b8f26ea72bef19f2f6213c4f90e37fd1cf67 6bd1048941261267d57fa46451fc596a9a1598c28d25aee4c3561d203cb8bf5a 75207dd4aae34bc23d43ce6e05ee9c9284e1672c0b88a8dbcefb960e48a74298 f90465d2314ce86e0c814d10d9fbb678054ff85a566540b124b0996f53a347bc f78e8b2f05c248d3e808b5fa373cb31f9e1334a0ece019e1e051b0d10e2ab1c6 d277cfa236924fe4001877a8a59fa1a9e781fce2da02b069c7015b8cd714f48e 7217b7bf0d170bf64c9cad9129896180cbd8cecae988c71c6ac0c02f669cecfe 5ea6f20728c3abc2c7b36e15e2167eeaae7e40e6a5af3f8285cce4aa27c0b24f d453f99b2996b9d6d5497d2c1638c5d546a9eb03b655321076492a443376176f 77054ca66239fb8c6644e5d939c04605a4d4cee3e1e04a624a492c1e36daea31 4adb815d163a68c8be53808d40ac8381fa0f64d87abc5d63cd5f9f6ab72586d7 91045150d046f4b063212381ed9a1d2b0b5361e2e5c22dd8148deec8a4244250 076c3c5cb76f6715c363a4ba713e9a66b7a19f08b29cec98bd3c00361c2fa291 f59d4e8fee70b9cb54beb553f3a84d01b48a05b4ff37cba05f52eb33f073f7e8 31635a4acc731421415b0dc8393860870cc73f1dbc0febef4e7417eea22031bc 796e14a400aa2d514c7ef7e230477f96b4c01c6996fa6b6f1855ae242483ebab 910c8df1094f166227ff01a911453b00a612d4927e219f77bff10ef2a306dee8 bfbb8e03435261cd515dbcf066e2d0baca0f019d437b0e415d29a33cecf80ddf bb48a52bae2ee8b98ee1888b3e7d05539c85b24548dd4c6acc08fbe5f0d7631a 738bc5dd4540e3”
Global / Multi-sector
CNB Bot, Custom Loaders, RATs, XMRig-based Cryptominer
Multiple (Global)
Unknown / financially motivated
Multi-sector (Corporate, Finance, Tech)
Execution: T1059.001 (PowerShell), T1106 (Execution through API); Persistence: T1547 (Boot or Logon Autostart Execution), T1053 (Scheduled Task/Job); Defense Evasion: T1027 (Obfuscated Files/Information), T1140 (Deobfuscate/Decode Files/Information); Credential Access: T1081 (Credentials in Files); Command & Control: T1071.001 (Web Protocols), T1090 (Proxy); Impact / Resource Abuse: T1496 (Resource Hijacking), T1132 (Data Encoding)
High
• Block identified IoCs on network perimeter.• Monitor abnormal Monero mining activity.• Apply endpoint detection with behavioral analytics for obfuscation techniques.• Conduct password audits and credential hygiene.• Educate users on fraudulent installer packages.• Segment and isolate affected endpoints.• Review scheduled tasks and persistence mechanisms.

Apr 01, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Phishing / Infostealer Campaign
“scxzswx[.]lovestoblog[.]com exczx[.]com 108[.]171[.]108[.]248 216[.]131[.]75[.]250 195[.]177[.]94[.]6 213[.]209[.]157[.]187 185[.]147[.]214[.]250 216[.]131[.]77[.]250 216[.]131[.]112[.]239 104[.]36[.]180[.]119”
Coordinated campaign targeting organizations
Phantom Stealer
Europe
Unknown
Logistic, Manufacturing, IT
T1566.001, T1204.002, T1555, T1041
High
Implement strong email security controls, conduct user awareness training, enforce MFA, and regularly review email security policies
ClickFix / Social Engineering Campaign
“a2569c5739bee6c4a18789e2ca42d66e4686b52d1c9d82fc3a543cbc316ccbef 68b9ebbdad21e0b94c958fc1cc1d23dcc43429ea254087c3fb30ad9901d65915 178[.]16[.]53[.]137     141[.]98[.]234[.]27 46[.]149[.]73[.]60 hxxp://91[.]219[.]23[.]145/skimokeep hxxp://darkboll[.]in[.]net/”
Multi-stage infection via social engineering (ClickFix)
SkimokKeep
None
Unknown
None
T1204.002, T1566.002, T1218.011, T1105, T1059.001
High
Conduct user awareness training, monitor rundll32.exe activity (especially WebDAV usage), restrict outbound WebDAV traffic, block malicious IoCs, enhance EDR for in-memory detection, and implement application control
Supply Chain Attack
“142[.]11[.]206[.]73 sfrclak[.]com hxxp://sfrclak[.]com:8000 hxxp://sfrclak[.]com:8000/6202033 23[.]254[.]167[.]216 fcb81618bb15edfdedfb638b4c08a2af9cac9ecfa551af135a8402bf980375cf 92ff08773995ebc8d55ec4b8e1a225d0d1e51efa4ef88b8849d0071230c9645a 617b67a8e1210e4fc87c92d1d1da45a2f311c08d26e89b12307cf583c900d101 ed8560c1ac7ceb6983ba995124d5917dc1a00288912387a6389296637d5f815c e10b1fa84f1d6481625f741b69892780140d4e0e7769e7491e5f4d894c2e0e09 f7d335205b8d7b20208fb3ef93ee6dc817905dc3ae0c10a0b164f4e7d07121cd 58401c195fe0a6204b42f5f90995ece5fab74ce7c69c67a24c61a057325af668”
Widespread risk due to popular dependency usage
WAVESHAPER.V2, SILKBELL
None
UNC1069
None
T1195.002, T1059.007, T1105, T1071.001
Critical
Avoid affected axios versions, audit dependencies for malicious packages, rotate credentials, block IoCs, clear package caches, enforce version pinning, monitor Node.js activity, and secure developer accounts with MFA
Ransomware / Exposed Infrastructure
176[.]120[.]22[.]127
Exposure of ransomware toolkit infrastructure linked to Proton66, enabling full attack lifecycle including credential harvesting, persistence, and pre-encryption activities
Mimikatz, Ransomware Toolkit
None
TheGentlemen Ransomware Group
None
T1003.001, T1562.001, T1134, T1021.001, T1219, T1490, T1489, T1070.001, T1059.003
High
Secure exposed servers and audit public-facing assets; implement MFA and IDS; monitor for IoCs; strengthen incident response capabilities
Phishing Campaign (Credential Harvesting)
“hxxps://notifcation[.]inedin[.]digital/?xgsrdh=12602024008489914930&provider=__cmppbWVuZXpAaWJlcmRyb2xhLmNvbQ==__xvpji__lkkd hxxps://singletoncop[.]info/webxr[.]php”
LinkedIn-themed phishing campaign using spoofed emails and fake login pages to harvest user credentials via lookalike domains
Phishing Kit
None
Unknown
None
T1566.002, T1204.001, T1036
Medium
Implement email security controls and phishing detection; conduct user awarenes

Mar 31, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Remote Access Toolkit
194[.]33[.]61[.]36 109[.]107[.]168[.]18 146[.]19[.]213[.]155 hui228[.]ru 5d009f6f46979fbc170ede90fca15f945d6dae5286221cca77fa26223a5fe931″
Targeted, limited scope, private operator
CTRL RAT
None
Russian-speaking operator
None
T1566.001, T1204.002, T1059.001, T1056.001, T1021.001, T1053.005, T1112, T1548.002
High
Implement EDR, user education on untrusted files, application control, monitor network for reverse tunnels, enforce MFA
Spearphishing / Exploit Kit Campaign
5fa967dbef026679212f1a6ffa68d575 motorbeylimited[.]com”
Targeted campaign with expanding scope
DarkSword
None
TA446
None
T1566.002, T1189, T1203, T1090.003
High
Avoid clicking links in unsolicited emails, keep iOS devices updated, monitor network traffic, block malicious domains, and implement strong email filtering and awareness training

Mar 30, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Malware Campaign / Remote Access Trojan (RAT)
” 7d09d90d62933d39fed10886140559fea3bfc5720375d6053245da24c9d713e9 7a1d6c969e34ea61b2ea7a714a56d143 hxxps://api[.]telegram[.]org/bot8679995457:AAHiI3UDWmJaj4etgI4fAZK_wo4KJfhXLWc/getUpdates?offset=1 hxxps://api[.]telegram[.]org/bot8679995457:AAHiI3UDWmJaj4etgI4fAZK_wo4KJfhXLWc/sendMessage?chat_id=8558596408&text=??%20RESOKER%20activated%20(hidden%20mode)&parse_mode=HTML hxxps://api[.]telegram[.]org/bot8679995457:AAHiI3UDWmJaj4etgI4fAZK_wo4KJfhXLWc/sendMessage?chat_id=8558596408″
Telegram-based C2 RAT enabling remote command execution, persistence, privilege escalation, keylogging, and stealth data exfiltration on Windows systems
ResokerRAT
None
Unknown
Finance
T1059.001 – PowerShell, T1547.001 – Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder, T1134 – Access Token Manipulation, T1202 – Indirect Command Execution, T1562.001 – Impair Defenses: Disable or Modify Tools, T1564.003 – Hide Artifacts: Hidden Window, T1057 – Process Discovery, T1056.001 – Input Capture: Keylogging, T1071 – Application Layer Protocol, T1573 – Encrypted Channel, T1112 – Modify Registry, T1105 – Ingress Tool Transfer
Critical
Block Telegram API abuse at network level where not required; monitor registry changes and persistence mechanisms; deploy EDR to detect RAT behavior and keylogging; restrict PowerShell execution; monitor abnormal process termination and privilege escalation attempts; implement least privilege and application control policies.
Malware Campaign / RAT (MaaS)
72c08e044dd427964bc14339f95838e3d45f51f6a586330c683fbb59ea374b1d, 7B57628329827948FD8BE903B028B4E619E59ABE03DD1AB2DAD0939BE9707A10, BDEA1D91191344FF48FD20DDD8ECFE21, hxxp://43[.]228[.]157[.]123/, hxxp://46[.]151[.]182[.]216:8443/, 43[.]228[.]157[.]123, 46[.]151[.]182[.]216
Multi-stage PowerShell infection chain delivering PureHVNC RAT with credential theft, crypto wallet harvesting, VPN data theft, and resilient C2 via DGA fallback
PureHVNC
None
PureCoder
Finance
T1566 – Phishing, T1027 – Obfuscated Files or Information, T1059.001 – PowerShell, T1059.003 – Windows Command Shell, T1059.010 – AutoHotKey/AutoIT, T1140 – Decode/Deobfuscate, T1071.001 – Web Protocols, T1573 – Encrypted Channel, T1041 – Exfiltration Over C2, T1005 – Data from Local System, T1539 – Steal Web Session Cookie, T1555.003 – Credentials from Browsers, T1083 – File Discovery, T1057 – Process Discovery, T1012 – Query Registry, T1112 – Modify Registry, T1543 – Modify System Process, T1036.007 – Masquerading, T1219 – Remote Access Software, T1568 – Dynamic Resolution, T1102 – Web Service
Critical
Block identified IPs at firewall and endpoint level; implement EDR/SIEM detection for suspicious PowerShell, RegAsm.exe, AutoIt3.exe activity and registry tampering; monitor DNS for DGA patterns; enable TLS inspection where feasible; rotate browser credentials and audit crypto/VPN data upon compromise; raise user awareness on suspicious file execution.
Phishing / Info Stealer
“8de1c5a66deab8bd4f59b2801a66f503f087345ccb0598c5ca8185f1edb2092b d30a4d0249b5417af02a4e7ffb5b456efd8cd5eb8da6532329ae071f643e5079 10955134b4e8dc41b2a116ab41d17b0ef0985bea99bdc5f0e5a11a07728905ec 100a7674ece92dae0dc0bfde15dfb524939a8dd0c295ff2e232895a07e21342f e1f6c80aae41feed9acfc62f1e1d83077ce6fda4bed56ffb448fe132a1c97afe 2255735d78b9ca0a20cbd2834876f4d1 7d68cfe4d7a83608490e6c3c8291ec9b 79471f93e15e04e6b7879a09de79d35b 0a5b50ca9beb5b740fdae5d783d5616d 61a163ae3cac1255c852a37c675edd5d 696c710f62e3a7f7c618c4733d67cc13 47b4c3dd3bc58037de31f3ee218d4ea1 6b6ee7e492e4c573381393dedbfec94d 386981b3cd77df33b60cd9b9d93a7812 edee9e57699eea7371234acd40a34cac a534676c0dcf8d63eb1f7cbcd0bd5f35 0f1939d88e38cc825dfe5c50926344d6 6f5a040c83d490e30ea9b242c962d179 57ee3e3e7b106727b77ce98bf80c0e1b 3324c1c827428a212e2c9898d082037e 4b14ef9a1a69b3d39a8dda04e1d119bf 5991a68b994e76d48212b098ac599560 fd50bc23272f3704762218ba43ce068b 00d68afd8a75ce8c194ab3bb4c64c152 d240282856829133ec8f5ddd712fb49c 88528f1c4df15e1d4c92d71fe1223761 5d7d338c4cdd706a01de1ec32a08c5f4 690dcef7d7e265096010b276649fb529 fd5fd153bded23ffac1a4dd2bbb38c78 d85b44735555d96c6c763c4d466e074f 151[.]243[.]109[.]125 hxxps://downloadtheproject[.]xyz/Pumaproject[.]zip hxxps://downloadtheproject[.]xyz/Puma-job[.]zip hxxps://downloadtheproject[.]xyz/Marketing-Puma![.]zip”
Targeting financial institutions via phishing emails and malicious ZIP downloads
PXA Stealer
None
None
Finance
T1566.002 – Spearphishing Link, T1204.002 – User Execution: Malicious File, T1105 – Ingress Tool Transfer, T1059.006 – Python, T1140 – Deobfuscate/Decode Files, T1027 – Obfuscated Files, T1055 – Process Injection, T1547.001 – Boot/Logon Autostart: Registry, T1041 – Exfiltration Over C2
High
Block/filter phishing emails with suspicious links; train users to avoid unknown ZIP/executables; restrict execution from temp/download directories; monitor certutil and renamed binaries; detect process injection; monitor registry for persistence; inspect outbound traffic to Telegram/unknown domains; use EDR/XDR for infostealer detection; update threat feeds/rules; regularly scan systems for IoCs.
Contagious Interview – Multi-stage Supply Chain Attack
5a2c042b086a475dca4c7dcec62693c1 699cd6c292b8a5933dabee63c74a9a3069ed6432c3433ab945ab46fe816d9e2c 153e2f27e035252d5f7ace69948e80b2 1c8c1a693209c310e9089eb2d5713dc00e8d19f335bde34c68f6e30bccfbe781 95[.]216[.]37[.]186 95[.]164[.]17[.]24″
Malicious npm package (tailwindcss-forms-kit) delivering multi-stage payloads including InvisibleFerret backdoor
InvisibleFerret
None
Lazarus Group
Development
T1566.002, T1195.002, T1059.007, T1105, T1555, T1552.001, T1056.001, T1547.001, T1041
High
Verify integrity of downloaded packages; educate developers on social engineering; employ static/dynamic analysis of packages; monitor network traffic for suspicious C2 activity; keep security tools/software up to date
Tax-themed phishing campaigns
“Aubrey162243her@hotmail[.]com Baerg536714qrr@hotmail[.]com Belinda319932ywa@hotmail[.]com Brenda26111993bbs@hotmail[.]com Brett77124cnd@hotmail[.]com Clint15032004ye@hotmail[.]com Dan0600ups@hotmail[.]com Darryl658773qfs@hotmail[.]com Elmer445637xqd@hotmail[.]com Genet868615mfd@hotmail[.]com Gilana406avh@hotmail[.]com Gilbert6704ysw@hotmail[.]com Glenn0045bnk@hotmail[.]com Greg2505880dbq@hotmail[.]com Hilda2441790ajg@hotmail[.]com Kaitlyn135452qyw@hotmail[.]com Kayla383537cau@hotmail[.]com Kelly5906byn@hotmail[.]com Mattie9227fdx@hotmail[.]com Quirita42462vpp@hotmail[.]com Rafael0746881jxk@hotmail[.]com Sabah30035vrj@hotmail[.]com Tanisha535486nyg@hotmail[.]com Violet82113vbv@hotmail[.]com Violet900048ege@hotmail[.]com Yvette20071993pgc@hotmail[.]com Yvonne8544809axa@hotmail[.]com YObutler[.]jonasd8nC29@yahoo[.]com hxxps://www[.]upsystems[.]one/Alex[.]exe d338a7f85737cac1a7b4b5a1cca94e33d0aa8260548667c6733225d4c20cb848 121[.]127[.]232[.]253 Bella1987Jenny8927@outlook[.]com Cedric1985Mattie70601@outlook[.]com Chappel1994Sunkel79549@outlook[.]com Chris1987Juanita79531@hotmail[.]com Elisa1966Tamara82159@hotmail[.]com Ellis1986Akihito92@hotmail[.]com Garrett2003Jaime3246@outlook[.]com GhaemmaghamiBorg2909@outlook[.]com Iris2003Francis43001@hotmail[.]com Jo1990Nelson506@hotmail[.]com Kamiisa1962Eunice52@outlook[.]com KatsaounisSetlak6267@outlook[.]com Lathrop1966Alice63@hotmail[.]com Lucia1968Sheryl4254@outlook[.]com LucinaMcnear6104@outlook[.]com Morris1965Cruz7189@hotmail[.]com Nabila2004Eunice770@hotmail[.]com NicholWollan4783@outlook[.]com Peony1982Jamila936@outlook[.]com Quirita1980Laraine303@hotmail[.]com SablanLoretz4374@outlook[.]com Sheryl1993Sabah3812@outlook[.]com SteadfastSeefried8443@outlook[.]com Terrell1980Dawn020@hotmail[.]com Vanessa1991Gretel73372@outlook[.]com WaffleMehta9842@outlook[.]com Wendell1988Lovice46@hotmail[.]com 844202972ff19afa760447fc87963de0fbbc0ebc69d50164f03ecf5d4e67952f bksgcefzqyb[.]com whghfpytehu[.]com gyglowcq[.]com iuzndfqr[.]com nirbsff[.]com”
Global / Multiple regions
Winos4.0/ValleyRAT
United States, Japan, Canada, Australia, Switzerland, India, Taiwan, Indonesia, Malaysia, Italy
TA4922, TA2730
Finance
T1566.002, T1566.001, T1204.001, T1204.002, T1219, T1041
High
Prioritize user education on phishing; implement robust email filtering; enforce MFA; update security software; allow-list trusted RMM tools and monitor for unauthorized access; verify authenticity of tax communications; review incident response plans

Mar 29, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Phishing / RAT Deployment
“panel[.]creepy[.]ltdhiddify[.]creepy[.]ltd creepy[.]ltd cert-ua[.]tech 54[.]36[.]237[.]92 hxxps://files[.]fm/u/7nxvfbmf46 hxxps://files[.]fm/u/cmr9kspbs5 2f8f3e2860f76a630f514f435049764c d42df7073f59c52b4450338c868c6cf58bc4c5bde1230dbcc046f4d80a36c43c 4d210550b3073cff2a7fc2979a64277c 5f16463f5c463f5f2f69f31c6ce7d3040d07876156a265b5521737f1c7a2a9b3 afbabb90e761451bb66a753ffd1ca92d 0d7147a08c70cf15428f4b3ed2f16587ec6f57b0d0be9e3197968ac44d43cfe4 e4fa3e55f77419c8d718d11e663a614c 468e0919ffb6c12444b77570e5cb68b1fe1e7d7a1aea2193b1760085323fec91 37631c6c5fce72ce0f75bf70c6f521b9 98f8ffdb5abc0b0bf11de72d7d904bacbc1834d3290d92f8f7cd9aaae723e938 0e86fe5ea183a582e4cb8ffa39d3f14b 342cf215d7599a65b23398038f943f516b0bd649926e21427d8e028fffec93d7 incidents@cert-ua[.]tech”
Targeted Ukrainian organizations across multiple sectors including government, education, health, finance, IT, and defense
AGEWHEEZE RAT
Ukraine
UAC-0255
Education, Government, Administration, Health, Finance, IT, Defense
T1566.001, T1566.002, T1036.005, T1204.002, T1059.003, T1547.001, T1053.005, T1548.002, T1021.001, T1113, T1115, T1057, T1007, T1083, T1105, T1071.001, T1573, T1070.004, T1078, T1608.006
High
Block IoCs at perimeter, DNS, email security; enforce application whitelisting; warn users against unsolicited downloads; hunt for persistence artifacts (SvcHelper/CoreService, %APPDATA%); monitor outbound WebSocket connections; ensure EDR visibility; prioritize hunting in critical sectors; block new suspicious domains; communicate safe practices regarding software distribution from file-sharing platforms.
Infostealer / Phishing & Malware Distribution
” 268d12a71b7680e97a4223183a98b565cc73bbe2ab99dfe2140960cc6be0fc87 ac36b970704881c7656e8fdd7e8c532e22896b97a47acef5ca624d7701bf991″
Global IT, Finance, and Gaming users targeted via phishing, cracked software, Discord archives, fake GitHub repos
BlankGrabber / XWorm
None
Unknown
IT, Finance, Gaming
T1027, T1497.001, T1589, T1082, T1047, T1125, T1217, T1115, T1113, T1070.004, T1016.002, T1562.006, T1629.003, T1548.002, T1547.001, T1012, T1005, T1560.001, T1048
High
Block certutil.exe from decoding content in untrusted directories; alert on WinRAR/rar.exe execution from non-standard paths; monitor DNS queries to api.telegram.org from non-Telegram processes; block/alert on file-sharing platforms (gofile.io, pastebin.com, anonfiles.com); detect PowerShell disabling Defender; alert on non-standard hosts file access; monitor registry queries to SoftwareProtectionPlatform; restrict WMIC execution; educate users on risks of cracked software and unknown repos; monitor %TEMP% for SFX archive drops and suspicious binaries.
APT / Spear-Phishing / iOS Exploit
” escofiringbijou[.]com siekeltd[.]com”
Targeted spear-phishing of high-value individuals, government, finance, education, legal, and civil society sectors; iOS devices
GHOSTBLADE, MAYBEROBOT, DarkSword
None
TA446 / Callisto / COLDRIVER / Star Blizzard
Political party, Diplomacy, Executive & High-Value Individuals, Government, Administration, Finance, Education, Legal, Civil society
T1566.001, T1566.002, T1027, T1036, T1071, T1189, T1203, T1555, T1119, T1041, T1497, T1588.005
High
Enforce iOS/iPadOS updates; block/monitor escofiringbijou[.]com; implement email gateway rules to detect/quarantine spear-phishing emails; scan/quarantine password-protected ZIP attachments; update TI platforms and EDR/MTD with GHOSTBLADE/MAYBEROBOT indicators; enforce MDM compliance for device versions; review and harden iCloud security for high-value individuals.

Mar 27, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Cyberespionage / Multi-Stage Infection
“05995284b59ad0066350f43517382228f7eee63cd297e787b2a271f69ecf2dfc 07bd506d2a8db98c2478ac11bb6c46d84f1aa84f4a9af643804ed857ad7399c3 11c7728697d5ea11c592fee213063c6369340051157f71ddc7ca891f5f367720 1aa37a477c539edf25656a300002a28d4246ec83344422dd705b42d3443a2623 21fe238c462b2f22a7e97f1f06e4f12e8c6e5f3a6fffe671b671909b501fa537 2616dfadf8aa222303269eb7202c75e2a8fc5b05b6b63ae2cb7576b9a27733f9 29d4cc64c7c9b7ecd16d96e9c6dcde1fe22a4c2d202074aadf41cbcef494bc19 34bf325492614dd4d842ec24f22a402ab73908cb91a74846945eae4775290ff2 4b29b74798a4e6538f2ba245c57be82953383dc91fe0a91b984b903d12043e92 4e26aa1bb28874f0897ab9a08e61d4b99caaa395fe63cbe4398f7297371e388c 58ed0463d4cb393cd09198a6409591b39cae06bb0ba5f5d760186de88410f6b8 6745422717f0ccdf2ae3330d133945268d4cd21215adcf982400d82b38ebeeca 6caa78943939bd7518f5e7eaa44fa778d0db8b822e260d7fe281cf45513f82d9 6f4f76c7a2638087a0da6002cd2c76d1673305b1e850a1f4068f14755f59d45b 74e7093615da36b28effb3aa6eef5a31e7ea59627bd619b488f087091e8d65e9 835795aa494021752f21fbef63c81227c1b934437a02aa1f2a258c9f60b0b7a3 83f06fa37f1136f765f799851812f11060ab34df3b34bc61777acc59a30b4c6e 84e37e42312b9a502c40cf1f3fc181e3ebd4f3e35c58bbf182740dfe38d3b6b9 851d57a2bf514202f54dafa1eb83a862653be7512b6e9535914b8d1d719d495f c47d55ad95a6c6ffac45c2b205e03bddadf5e36f55988599053b1fd0e49448a5 d4d753c6ea5c86a44c9a65cd0d4eaeabb072b19e0ef68ef7da3a879f689772c9 e1672dab0daf1c84f14f7bb827851c27753da067490e10cd6144fe7873892fec e61a1f4269e934481f6cb19576b3dbc434952b01445fd4e1ebc6906a1b449ef8 e9b52577091c8e25e91c485216de34d5a26ab707a10b1e5cd31ed7aa055939d3 f07b2af21e3fab6af5166a44ca77ed0ebc7c9a3e623202a63d4c4492abce8d65 f62223c9750fb2edfd979a8cae204cb9ce5e0950b52a47b62f195cd05dd3e2fb 103[.]15[.]29[.]17 103[.]131[.]95[.]107 103[.]122[.]164[.]106 109[.]248[.]24[.]177 120[.]89[.]46[.]135 distrilyy[.]net fikksvex[.]com laichingte[.]net popnike-share[.]com shepinspect[.]com theuklg[.]com webmail[.]homesmountain[.]com webmail[.]rpcthai[.]com”
Targeted spear-phishing and USB-propagated malware to achieve persistent access, credential theft, and data exfiltration
USBFect, HIUPAN, PUBLOAD, EggStremeFuel, Masol, Gorem, TrackBak, FluffyGh0st, Hypnosis
Asia
Stately Taurus (similar to Crimson Palace, Earth Estries)
Government, Administration
T1566, T1059.001, T1105, T1078, T1027
High
Disable AutoRun for removable storage; enforce strict USB access policies; monitor for unusual DLL loading and in-memory shellcode execution; maintain updated endpoint telemetry; regularly review and update security protocols.
Spearphishing / Seasonal Phishing
“149[.]104[.]24[.]24 103[.]115[.]56[.]156 47[.]238[.]232[.]44 8[.]210[.]242[.]115 43[.]160[.]214[.]122 43[.]160[.]220[.]53 47[.]76[.]86[.]151 103[.]210[.]238[.]29 103[.]236[.]63[.]138 154[.]36[.]152[.]151 206[.]206[.]77[.]224 1a38c444240870c5641cc45b510c08dd52f35483c74690db6f0e767ec1b7cb9b 53bd1add0d364ef57993eaad0a84adefac9bb44d5047e17018468a069420913e 354fcbc4a16a8b47424bed435da1c040218b13ed9fa5392a5917a411b6947f4f a23640778b836420eecb5461938a98ad3588d2044359daf6b4b25ecaf35c996e 71698b56c0c4d0cab0913a33a1683261f00a97d2b31553f840eb2e22608e07c2 1ee51eb5fc850655dd25f92ef43bb619684b266a7b5782aeac7759e289615d01 167d317883b647fd7d91c8e4a2ac09f821049037b1998b3d67c6852aff2284af a4f09289b1b9a7a698a7880a2d306de19a60ede45c2abb3cebe84fabda989a74 7a3fb43f828f046c64c94c86533c324f2c2f4e16da2adee90e2e363b8771f990 a13fa1073ad96cf8a9d4a09ea1730ca7927df4e8b03ee3dd080be46d342efb6a 4ac19c722ebaf1fd8ec091bc288d2c587a71bbc3c8801a071a9aa4057c69ec8c 46d7cc620fd3650ad70b0ba964e3837d38a2f48fcef8d3e177bfb89f5d547b29 ad05eeb70dc7ab34926e31da2be97d3503ce4ef96084df74db9e9c102923d3ff 244a2f4dc256f6d1c3710a2d27656a6bc21ffadca8f3236d63b327ff2f0b33db 647ee8eeb990daab642a2179583217b95fc80ee57e03c699555605704f2e1769 283971ee133699d518e88bf633b8164579e31ea5c00251eeebd9a39e0292ea35 c9418a82ac4f63ed7b1e9ffb9e43e0d5b58535fe6b21bd4b2ea09020093caef0 29295a9e79f39157af74c74c63f8a0156f94721ec7a29a51330b9ea2c9dee820 5adb91edb8a2c4a9a948a2dba85f787a179ec98b6432682df196c6356d50b23d 55b99f0d438800cad8288d81d2808728ce1bec8c22c5346a38a513dc6728b4ba 6bd4cce1b7e4d305d4667850f1d071ee1f2785ecf52e1bc1032087a35dd4791b a21e0b5ebc1cd7c5443aa01a155895cc2ce95e48fc3bb1f78d19c3e7406c4515 cb427b629d9046737bb940664122fbb76ed5586032101be61ac856ef2554178d 49afd1ff926b1ea8ff1d7316ea9aba50c4e4e771030f03fbfcb465b78efaee48 3f0a6ff46a68260250ccc9cb811855939ab56519c54cc0873640b1565d384052 8c4386cecc89f5f2dee323f2a1e0d9f42a28905be812de14173ca7ee9fc64e72 690213bf93e06e34a00a58006eb677e42583f6e5c0fcc88571bb82eae0f78710 45b0bc5a2fa319b9d3013ef22c002b1d359d45f943f0a93d05836652acb286c1 acca258713692d82ea4b9bdf72dfa6dadc65083b1d37828bac0d2e6af6ba1712 35b9acf7f217534c178f2b2afbe6d9ae9cfc431829aa11157aecb2d084ca83cb 9d7f8e321082b46dcf625d7b24dcb9c72710e87a1a66cccd265cdbe926e78813 6a66f0540fc7717e48bbec0235dd4128794b0cfee9d58e5907e9f39e65023c17 677e42b1d3d7bfc87e5dddd1c7aad2c7142afb26e7ac0ace53f2996c3005ff90 02b9ce681a92c9f64ebe30f6dc3637a90fd4d1d1a182c0be3708525939fb75e7 b1398d15d45d439a2abd5f7341b870de0818df357ebc78e7410465b74409dfa5 521b4fd2a98630b782b897793da025845029d80696b871620f731eeaf4ff950a f5b4cb8dbec6da40f54025b8cdb298110af2c9f118862db968a9e1e58f7af2d3 a83eca305b9b682f2f3eb7d130b8c8e68743cf5eaa8704ff136fb3659a086822 f8a32e98f1f7be4b2b301ad0e0fa7eef819aa1916d33480c61964ee1ca8cf9a2 90f7e2a7779a30598dc22bfbfcf40fe0d3b77387d5b239c2a0bbdf716d823e36 7c186e7e55b9eee9bc5a0b68310dadd1e06681983cb0efa27542a3a22964f5bf ca11ac11dc9dd8d2c6b95bc422a4c2f3d986f8dd5e508fb8d6e2b8aa7b4d5a31 012a7d8b63e6dec27ab39e6296584f03457e7a2997cecca69211124dfc06e55d 31557fdfc5a091fae4e366cb826f33927f671b0fedef71bb4b381d33a111586d 516dd5f495d697b199a9e7cc71f686c992b65d14b57c55d91068c0909bcc7b00 78a7fb189e0d4cb91ff0bada8a92f14bede6dd80eccc1403bee13ea0c19b20d5 b3abf2663b48daadfbf959e1edd337026e6a59df4592fbf76e7d034c3de82c19 incometax[.]biz[.]id lolpartyanimals[.]com escaperoomhub[.]com tyjmbeexa[.]cn sjxcrojzkn[.]com government1[.]icu govbrk[.]shop govbr[.]icu ywdtwss[.]icu frehf[.]oss-cn-hongkong[.]aliyuncs[.]com”
Targeted spearphishing timed with tax and corporate restructuring communications to exploit high-volume financial/HR emails
N/A (no malware specified)
Japan
Silver Fox
Finance, Manufacturing
N/A
Medium
Reinforce phishing awareness training; implement MFA for critical accounts; update email security filters; encourage prompt reporting of suspicious emails.
Phishing / AiTM Campaign
” welcome[.]careerscrews[.]com welcome[.]careersengage[.]com welcome[.]careersgrower[.]com welcome[.]careersstaffgrid[.]com welcome[.]careersupskill[.]com welcome[.]careersworkflow[.]com”
Targeting TikTok for Business accounts using reverse proxy phishing and adversary-in-the-middle techniques
N/A
None
N/A
Marketing
T1566.002, T1556.002, T1539, T1185, T1078
Medium
Enforce MFA on all accounts; educate users on phishing; use URL reputation & sandboxing; monitor for suspicious account activity; review security policies regularly.
Supply Chain Attack
” models[.]litellm[.]cloud checkmarx[.]zone 85ED77A21B88CAE721F369FA6B7BBBA3 2E3A4412A7A487B32C5715167C755D08 0FCCC8E3A03896F45726203074AE225D F5560871F6002982A6A2CC0B3EE739F7 CDE4951BEE7E28AC8A29D33D34A41AE5 05BACBE163EF0393C2416CBD05E45E74″
Trojanized Python package LiteLLM
LiteLLM
Russia, China, Brazil, United Arab Emirates
N/A
N/A
T1195.001, T1552.001, T1552.004, T1059.006, T1041, T1071.001, T1105, T1036
High
Implement supply chain security monitoring; scan systems for malicious files; rotate credentials; enforce access controls; use EDR/XDR; proactive threat hunting and continuous monitoring.
Cyber Espionage / APT
“CVE-2026-21509 CVE-2026-21513 5a88a15a1d764e635462f78a0cd958b17e6d22c716740febc114a408eef66705 cbea5c7d71a5a6cb9153b00d2d27e6a3579004c27f5e817f317eeebdce7f805f c87be2f30cc974d0859526b9dd104e015f0e5d04bc43198305537f276705691e 57357655a62e3a8b1f4b78e1d3ed7e0f6d59a9bac213087294f91bb7847b2a8f 92a56faf6eccfad8281213393fad584cbd7b9e04db875dfb8fc01e1dbf4cbdd1 de2b24d08e795ad9cdd1b74882a3626febefadafaf8ff0ae76cba16dcaa0f8bc 71ef7438d785f3102735ed9d9233ac366507c82fc4fac4de88f687a105c84df6 dbf33417e40f0fe8078a11d81f7d323bfed1912f5cb62d765c1be72561474659 ffca9d56feb5ec8844b42f513cecd67a554a2ddb3408dbc6942e2fd60453aee1 36f5e04213d446c4208864f32a6af18d5184bbbb628808ef0a876ea6c31ea0b3 e3f9519a21a16ff2c8f989034e47fbc91a2d019e09a1d7d17ff751e52a09d15b 8f4bca3c62268fff0458322d111a511e0bcfba255d5ab78c45973bd293379901 970e68e8b68e0c5f3f18cd55e0c82304e81547f8ebf349390db1c8a0681699fa 92697d518e72a30800e96b63cf875573bd536c9b993d22014238f6a9f0e19e0f 144bddb48890fa680dfd226e36c0ef2c6d6f98a365aea48399edd0d0388711a1 9aa8b46d62eb426842b8ff0fc28e64719494f0f64d516253caa71a6fd86e9ad3 0bb0d54033767f081cae775e3cf9ede7ae6bea75f35fbfb748ccba9325e28e5e 2822c72a59b58c00fc088aa551cdeeb92ca10fd23e23745610ff207f53118db9 3f446d316efe2514efd70c975d0c87e12357db9fca54a25834d60b28192c6a69 40c2e559992a7f595c593b419930a3f216516c3042ad86fb985348d53b6e01b9 52b6fb40e7efb09c2bebe8550178e7e30009600bdedd1acae085d753761b7598 5c2a2c49e200a2d048f477440da75ff4a99c676943f6f7cac1ce70190520f998 7ccf7e8050c66eed69f35159042d8043032f8afe48ae1f51fce75ce2c51395f2 8c1dc9732884c6078b23953b78314a8d0d8b8d9fe42e5f97a7cd09b8ace943a9 968756e62052f9af80934b599994addbab29f8dc2615c47cda512bae48771019 9f4672c1374034ac4556264f0d4bf96ee242c0b5a9edaa4715b5e61fe8d55cc8 a876f648991711e44a8dcf888a271880c6c930e5138f284cd6ca6128eca56ba1 b7342b03d7642c894ebad639b9b53fd851d7958298f454283c18748051946585 baad1153e58c86aa1dc9346cdd06be53b5dd2a6cf76202536d6721c934008f8e c4389cc34b672c4f885547f413bf38575e6ee2b23a0ddfdd306a69c1775db6fc d213b5079462e737eb940ac46c59e386eb6ca7f8decc95a594b3d8f3b6940010 e792adf4dff54faca5b9f5b32c1a2df3a6a955e722f1be8df2451c03ed940e41 ff310202cbff28b47f03b4b0129a5b925a4b7b065af002072a3796920720c34e aefd15e3c395edd16ede7685c6e97ca0350a702ee7c8585274b457166e86b1fa a1b86c8957f460b78d906e1bdede829c4f3b5500d6449e8eba3ae5c302be2b86 64f2d135603220b47dd430be5e059dcedd80ad2bc3c17500816ec5d07e39d3d1 8d09eb897f2bc98035ef88152e2b5d571a7b61878dd12b451e0437089487a417 0148c79cdfb21d87731f8e45d38c27242863ec4ea9621c59e537f59ed501c119 0366b9bc02b00fda8ea28929b7159a038a43da0aa0299b8279bffc2d7e73892a 0ab301b3e43ac2394ec25c5d1caf79aa0785a2eaca801b0b1b6d4621f5e8c736 948f109756cba0b01f11fd3db9c47a76125c4b1d9467ff1bd9c5013d214c933f 0db5bd9cb832618c60e0f3c0dfad719403473b85a82253dc0f6a8391800c0d0b ce2c475461d57f222a6aa22f49420f804a43c2eb29abf8553457a7d30f7cb024 a95ee15e8ccf84521df2c80b1525fd89e205fc0280c3f6cbc24751080ea29206 003cd35535ab9350a407a7dcd016c305fb8dbac03d41d5b7d3917c804b66dd2a ba01a2355414dfedda9ac5ce0d7a2d8edfb89ec3ae3e68fc81db035caa741854 ea4679d1c05bef0c38b4d910a87f79070ca2e661779a255f523d57ef1921a1c7 1565934e529b5a9b6af7e60800a91f7ac3a6ec2e24b4f6df0f808d253b45cf42 3b411e9f282ba97feb56cb5a8bf3e9a1d1e9a5f8406e72213dfb140166a54012 eb187ff574ab25dffa12dd05ff5f9716f4fc489e2de457c4a50aa0d3cb0f1479 9dad95985eea3b299c387e663a6edfbbf057cc634f2ca99c410238480bcd4e17 eec4122a1262579806888d8a6a215b333d5e4eec600b5caba91e187b7b468e22 8858ee314c4db60a3f097ede38cbe64ce4e4b1e67041bad1e0580953011dfec1 15b99e8b30ce0b57fe030243aa795b74b0d7dcd773f28f677f629f132bce1ff8 8438a4cd675c81cefd6a8d96b9e48b2730cc9086b4c531883f966a8818cccbef 1d27a5ca6703f6e757d30adc8d4d703c2e99316d1eaaaf5c68635c47e8e0396e d6b75d496e28692dd02c6336ac5c5a42ac88da7ad315d3e508963cf8d46926b3 84464879c2ced71ff6a30277252af70a20e18c563b8e45f4a92e004f41fe3e01 be859b4f4576ec09b69a2ef2d119939f7eb31de121aa01d38e1f0b2290f5a15e 969d2776df0674a1cca0f74c2fccbc43802b4f2b62ecccecc26ed538e9565eae f7bda19543074c788c321aed42d955b4d50b7b0a2c3ca83b7f45b5e8b9a10491 18f9c08e60bb88891f5bb5dd133ae804703c0797bebdde397c01513a67b86a1e 5f397327aeb20718e364bef61e8bad507772708a7d1bf55d8b845170c69f3de0 3cb09154a839a5de6e8ef4a04a933b7362afb56cdc4e91368b237e9bcb1cd7b9 1ed863a32372160b3a25549aad25d48d5352d9b4f58d4339408c4eea69807f50 d944abab1481457eacf9f1d08f835980c2146ec91513e2eb94714c6abaec5f34 5a17cfaea0cc3a82242fdd11b53140c0b56256d769b07c33757d61e0a0a6ec02 b2ba51b4491da8604ff9410d6e004971e3cd9a321390d0258e294ac42010b546 c91183175ce77360006f964841eb4048cf37cb82103f2573e262927be4c7607f fd3f13db41cd5b442fa26ba8bc0e9703ed243b3516374e3ef89be71cbf07436b e8889528e2114a700438f73da09449cfdde655a29da6794d0449b5e8aa4dbf2a f0d443055143cbd6bce8ef96b52d430e2db321b37b8b93a2a9d0354651702790 14acfaca5fc59d5ee9592399e51636ec47fbea36623555635a1361fcd2f50dfa bbfd93dbf43236b7f64017ad20f72dd611de1acb4b15e02569e42887467b34d4 dubravka[.]jovanovic2024@proton[.]me a[.]matti444@proton[.]me TeoAbarquero@tutamail[.]com UffeTroelsen@atomicmail[.]io dbca10b5-63e0-42ec-ad10-de13be96dc42[.]dnshook[.]site freefoodaid[.]com longsauce[.]com wellnesscaremed[.]com wellnessmedcare[.]org hxxps://ingest[.]filen-6[.]net/ 193[.]187[.]148[.]169 23[.]227[.]202[.]14 72[.]62[.]185[.]31”
Modular malware targeting defense supply chain and supporting infrastructure
PRISMEX (PrismexDrop, PrismexLoader, PrismexStager, PrismexSheet), Covenant
Ukraine, Romania, Turkey
Pawn Storm / APT28 / Fancy Bear / Forest Blizzard / UAC-0001
Defense, Military, Government, Administration, Logistic
T1566.001, T1059.001, T1059.005, T1204.001, T1546.015, T1053.005, T1574.002, T1027.003, T1562.001, T1055, T1553.005, T1114.001, T1071.001, T1102, T1048.003
Critical
Implement advanced email security; enhance EDR/XDR; scan and remediate cloud vulnerabilities; phishing awareness training; monitor network traffic; enforce strict access control and least privilege.

Mar 26, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Social Engineering / Malware Delivery
“urotypos[.]com fresicrto[.]top 212d8007a7ce374d38949cf54d80133bd69338131670282008940f1995d7a720 6e26ff49387088178319e116700b123d27216d98ba3ae1ce492544cb9acd38f0 a6a748c0606fb9600fdf04763523b7da20b382b054b875fdd1ef1c36fc16079a a7b9be1211c6de76bab31dbcd3a1c99861cf18e3230ea9f634e07d22c179d1ca c90435370728d48cba1c00d92cc3bf99e85f01aa52ecd6c6df2e8137db964796 89[.]46[.]38[.]100 195[.]85[.]115[.]11 95[.]142[.]45[.]231 185[.]163[.]47[.]220”
Malicious scripts injected into compromised websites redirect users to fake CAPTCHA pages
Remcos RAT, NetSupport RAT, StealC, Sectop RAT
None
SmartApeSG / ZPHP / HANEYMANEY
None
None
Medium
Block malicious domains/IPs; employee phishing & HTA execution awareness training; monitor DLL side-loading & unusual HTA execution; update EDR; implement endpoint monitoring.
ClickFix Social Engineering / Malware Delivery
“45[.]144[.]233[.]192 mac-os-helper[.]com stormac[.]it[.]com macos-storageperf[.]com apple[.]assistance-tools[.]com apple[.]diagnostic[.]wiki macintosh-hub[.]com”
Impersonation of legitimate brands (Intuit QuickBooks, Booking.com) to trick users into executing commands via Windows Run or macOS Terminal
Not specified (malware deployed via command execution)
Not Specified
Unknown
None
T1566, T1566.002, T1059, T1059.001, T1059.004, T1204, T1204.001, T1204.002, T1027, T1027.002, T1027.010, T1140, T1218, T1547, T1547.001, T1547.009, T1071, T1071.001, T1105, T1082
Medium
Exercise caution with unexpected prompts/links; restrict execution of unknown software; enforce MFA; educate users on phishing/social engineering; monitor command-line activity.
Ghost npm Supply Chain Attack
“1ac0d6fac272903eb83a885a40c6ce5b2656b6f3 1b4916fd65934f2f9efa7125335a85c104e1e17c 1d92c73a859096cf107d11c4acd089f7b4e61a5b 22ada4f5a95fd9b5edb76426b7dddb168145fda7 2a8c625660ad6bb7d7c953a147c84c0fcc75794b 32d6b0b70ba825456471fab82119980de01e57d0 34ba816adda6ab74d0f4bbb04fdb8ed49b1137bb 43a361eec666edab60f0e95740cf9e51c06106bc 4439720f0722d3c92615114f1099471efd280feb 46e034baab242c110355eba0937d9e505232e8dc 56b78d2027cbf7b40dcbd10f17462cd029d13dda 5928e3121f12f3c5d690bc7968b28b2f67835ef5 59ca6306e77eb7f93528016dca14964968556310 60c88674128680b7e474607ba0fb8020c141ac71 6169a0bc69c94f3a5c13d899ac612d2fabe98611 63783f6e59d20e2c664123b349f22dd53d1293d4 6c17eccf82c7d85a883dfa7feac0be835f827fe3 6d115186018b396ea62afce46d6616957bf3d7c0 729fbce89101f8f79a57189e89a7e63ee7d61388 7562690617de6eafe29c3f1d83c029ee73b9f50b 84aab614cf6ad92b5498398e914a8f22056722d8 870636bcf3d2c0b9c4c12809a19af153ef154260 874919fbd4e23da4f959447acf394a619cc23f72 963b79f59fb2c070a06b9a2af9db2b5512c1ed74 a1cff6b52b7bfc61d08360af364ff7a4b4b2c504 a5d4a4dbf036e4d7a5453db191f6e4320f604446 b70a40b199d9a3cbbebfb0c1148b110acf3ec4eb b75fc27053819cd2e7f5cfe193a91844c199c285 bc3c787cf2b768f0a021fc3ca4fde65658a3f9e5 bdffc2f98ff422db9f9ddc190401cfcb686e3c32 be10e30cf25d57385c31281219daf87dc7921da6 befa10ca40c2923390db04eb34391c32aa29e611 c02624f8cefe790b6dee529c7a0e97f4241d79ed c486f9be10e6db40b8c30c8053dd44a6b2ac867e cb9208d756dc4d4674801611d8d5f5ba79e76366 cbe7c87293de7ab5853e2aef3f638d54c45f5c9f d1a1f76cce48be58e5d72f31ba54e4e2372848ea d22eb34facf13b5c1e820d9e6358eb4cd3797eaa d5ade32ac52140e6c25f50780dc4ff4d466faddb dc8ee405dd4402addae67ba6546f4f3781d7bdec e6cfaef4b50d2a4ddd8453bf5a91e81a092d6e09 e91baf3d270a21948833c50da1f0345d20ee1ec7 f579b2d0b65a3a3cb52be535a591bc8d0f1077b7 f9400843b42f0187e826e4c7a9786b0f09ab8992 fb147ad540ae975228f8fe7d7fb557ff0670f69f fe6ee1104c4b02be39819822ed959039ea313e67”
Malicious npm packages with fake installation logs to phish sudo passwords and deploy RATs retrieving payloads from Telegram or Web3 contracts
Ghost RAT
None
North Korea
IT, Development, Digital Services, Finance
T1059.003, T1204.002, T1555.003, T1105, T1056.001
High
Block npm installs from unverified authors; enforce strict sudo policies; use automated package scanning; monitor network connections to Telegram/Web3 endpoints; educate developers on dev tool phishing; review installed dependencies and lockfile integrity regularly

Mar 25, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Social Engineering / Fraudulent App Distribution
” ihavefriendseverywhere[.]xyz valor[.]bet wikis[.]lifestyle”
Large-scale “FriendlyDealer” campaign leveraging thousands of domains to impersonate legitimate app stores (e.g. Google Play, Apple App Store). Users are tricked into installing Progressive Web Apps (PWAs) that mimic real applications and redirect to gambling platforms via affiliate links. Activity includes data collection and behavioural telemetry.
Progressive Web Apps (PWA), Browser-based techniques
Not Specified
Unknown
Cross-sector (consumer-focused)
T1566 (Phishing); T1656 (Impersonation); T1204 (User Execution)
Medium
Exercise caution when installing applications from unofficial sources. Validate app authenticity via trusted platforms. Monitor for suspicious domains and anomalous activity. Implement web filtering and user awareness training. Maintain up-to-date security controls.
Malware Distribution / SEO Poisoning Campaign
“vlc-media[.]com studio-obs[.]net kms-tools[.]com crosshairx[.]pro obs-studio[.]site vlc-media[.]net vlc-player[.]net km-player[.]pro crosshairx[.]site fileget[.]loseyourip[.]com direct-download[.]giize[.]com cutt[.]ly/AtvY9HpI R[.]servermanagemen[.]xyz 45[.]145[.]41[.]205 r[.]manage-server[.]xyz manageserver[.]xyz ehostservers[.]xyz hone32[.]work[.]gd mora1987[.]work[.]gd 67[.]210[.]97[.]27 45[.]133[.]180[.]162 37[.]72[.]172[.]58 172[.]111[.]233[.]102 164[.]68[.]120[.]30 91[.]92[.]241[.]103 91[.]92[.]241[.]142 172[.]111[.]151[.]97 191[.]93[.]118[.]254 85[.]239[.]237[.]148 158[.]94[.]208[.]111 172[.]94[.]18[.]103 165[.]232[.]45[.]1 136[.]0[.]213[.]192 104[.]243[.]248[.]63 155[.]94[.]163[.]103 94[.]154[.]35[.]73 154[.]53[.]50[.]197 144[.]126[.]149[.]104 f9110e7efce392bd4c4fbc9b8b2fb0f225f50fcdeeaa8528075c03146245b4fd e38773bcf571e6990aca317c9d0140726fde741d5deb7f82e57659ffff54468a 9d4c0655ea8d75440415f221ab0cc115ad51674a29b8a17cad21e688740d951a 9cda5edf3b9565edb38da39b88c7c27d322b9fab2eb3a792bd047a311a3a93cd 8311e7365be53fd8a75ca313046e65ffe54d98a209d382b8f110e39ca706900c 2bb85af314d77c45704b350cd475dff8286c571a32d71b9f62cacd316a53576c”
Ongoing multi-stage campaign leveraging SEO poisoning to redirect users searching for popular software to impersonation websites. Victims download trojanised installers that deploy legitimate remote management software (ScreenConnect) for initial access, followed by AsyncRAT via DLL sideloading, scripting, and in-memory execution. Activity enables persistent access, credential and clipboard monitoring, and cryptocurrency theft, supported by evolving infrastructure using tokenised delivery links to evade detection.
AsyncRAT, ScreenConnect, DLL sideloading, PowerShell, VB scripts
Not Specified
Unknown
Cross-sector (user-driven compromise)
T1608.006 (SEO Poisoning); T1204.002 (User Execution); T1574.001 (DLL Side-Loading); T1059.001 (PowerShell); T1059.005 (VB Script); T1055 (Process Injection); T1105 (Ingress Tool Transfer); T1053.005 (Scheduled Task); T1547 (Autostart Execution); T1056.001 (Keylogging); T1115 (Clipboard Data); T1071.001 (Web Protocols)
High
Exercise caution when downloading software from search results or unofficial websites. Validate sources before installation. Monitor for unauthorised remote access tools and abnormal script execution. Restrict scripting environments and apply application controls. Implement endpoint detection capable of identifying RAT behaviour and persistence mechanisms. Maintain updated systems and security tooling.
Software Supply Chain Compromise / Malicious Package
“models[.]litellm[.]cloud checkmarx[.]zone”
Two malicious versions of the widely used Python package litellm (1.82.7, 1.82.8) were briefly published to PyPI, introducing a multi-stage payload. The package enables credential harvesting across cloud, DevOps, and development environments, followed by encrypted exfiltration and persistence via a system service. The activity includes active credential validation against cloud services and evasion techniques to avoid sandbox detection.
Malicious Python package (litellm), Python scripts, system service persistence
Not specifically targeted (Global)
Suspected (TeamPCP, under investigation)
IT, Development, Financial Services, Digital Services, eCommerce, Managed Services
T1195.002 (Supply Chain Compromise); T1059.006 (Python Execution); T1027 (Obfuscation); T1140 (Deobfuscation); T1552.001 (Credentials in Files); T1005 (Local Data Collection); T1041 (Exfiltration); T1573 (Encrypted Channel); T1543.003 (System Service); T1071.001 (Web Protocols); T1497 (Sandbox Evasion); T1078 (Valid Accounts)
Critical
Immediately remove affected package versions and treat impacted systems as compromised. Rotate all exposed credentials across cloud, DevOps, and application environments. Audit network logs for suspicious outbound connections. Remove persistence mechanisms and rebuild affected systems from trusted baselines where possible. Validate dependencies against trusted sources and implement controls to prevent malicious package ingestion.
Malvertising / Initial Access Campaign
” anukitax[.]com bringetax[.]com fioclouder[.]com friugrime[.]com hxxps://grinvan[.]com/vims/browser/ hxxp://grinvan[.]com/vims/browser/ gripsmonga[.]sbs jcibj[.]com bjtrck[.]com rpc[.]adspect[.]net 8a4033425d36cd99fe23e6faef9764fbf555f362ebdb5b72379342fbbe4c5531 7509365935fc1bfadba20656698d3a29051031635419043bc2bc45116106e026 2b409a265f571dccde6ef4860831c1b03d5418d1951f97925315dc5b0891da04 0821661e715fe64bb39f4fece277737a48fd6839edd40ec8a4a39bf04cea8524 033f42102362a8d8d4bdba870599eb5e0c893d8fd8dd4bc2a4b446cbbeb59b99 28278b8c85c832417f9860fe8ea3ddbb9ff1d5860317db4813227a3a52b7c7cc”
Large-scale malvertising campaign leveraging sponsored search results to impersonate legitimate tax-related resources. Users are redirected through cloaked infrastructure to download rogue ScreenConnect installers, enabling initial access. The attack chain incorporates multiple evasion layers and BYOVD techniques to disable security controls at the kernel level, followed by credential dumping, lateral movement, and broader network access — consistent with pre-ransomware or access brokerage activity.
ScreenConnect (RMM), AsyncRAT, HwAudKiller, FatMalloc, FleetDeck, BYOVD techniques
United States (primarily)
Unknown
Finance
T1566.002 (Spearphishing Link); T1583.006 (Web Services); T1204.002 (User Execution); T1219 (Remote Access Sof
Malware Distribution / Supply Chain (GitHub-based)
” c655c2d410e6b36d9ef1359aef67183bf76c193c609697492e41d30622f7ebd4 b54ea465f77f1eb726d3244aa52d13c103ad9c4fc5a15061b7067347896b433c 357cd0a1601d24bbb7949637b352b0ace1f30f51f788a03cafa98316068938e0 30694a0101abfeea642cb9de7fb7eb66789eea74d8d7257b39822d7dab59445d 11c06aab7aa3f1857cc9add05b392ba6bd62a7fd2d168e41d9ba5557a96c78f0 b1d3e7e81016561faddf7b0a6cb9a3bd0174064b3b309c6948f5f1e6688a1381 b1f9c4d82eb5f73b9081c3d414b3c053c1550e46fa21d30079134be3c0040ddb 8e322af81744217427abef3cab949aee1de70f1506f40e4e2d672af9e1f6ef0b c58720dcb30e5c887ff5bfd41bb46a611f2655128f1ef1a771e1745f24349dfe b1d3e7e81016561faddf7b0a6cb9a3bd0174064b3b309c6948f5f1e6688a1381 3fc5816afde3e58bf9fcaa1b3873f2d4bc8629ee7a8341a4a4979d2729cad5e6 39d39e6726408e778c8ad3d85010e1db0a686ebec1f8807f96cf80be59dfdd59 5343326fb0b4f79c32276f08ffcc36bd88cde23aa19962bd1e8d8b80f5d33953 398ea394f9a4242ebe9fd67a5ca62445fc4a34b1731d4f99b8eea5e65a98ddcb 357cd0a1601d24bbb7949637b352b0ace1f30f51f788a03cafa98316068938e0 30694a0101abfeea642cb9de7fb7eb66789eea74d8d7257b39822d7dab59445d b6e81d95c0c336e8b8bde3889f4df4ee17639f6ff055c631de19cab3c7efb63b 39d39e6726408e778c8ad3d85010e1db0a686ebec1f8807f96cf80be59dfdd59 b5c571363632a6887c6e9471435ab0fdcbf16bae6dbdf28d0fc755a9d467e859 c7a657af5455812fb215a8888b7e3fd8fa1ba27672a3ed9021eb6004eff271ac 5343326fb0b4f79c32276f08ffcc36bd88cde23aa19962bd1e8d8b80f5d33953 28d09366dc7842fe42f44a27cb54c6e1ba6769f42a27b99f5d455efb1e6de454 c7a657af5455812fb215a8888b7e3fd8fa1ba27672a3ed9021eb6004eff271ac 5343326fb0b4f79c32276f08ffcc36bd88cde23aa19962bd1e8d8b80f5d33953 66ee4143e50c42b26f1059a33860d49513194c6b049245c9a68a45dbefa40ec1 b54ea465f77f1eb726d3244aa52d13c103ad9c4fc5a15061b7067347896b433c 357cd0a1601d24bbb7949637b352b0ace1f30f51f788a03cafa98316068938e0 30694a0101abfeea642cb9de7fb7eb66789eea74d8d7257b39822d7dab59445d 213[.]176[.]73[.]159 217[.]119[.]129[.]122 217[.]119[.]129[.]76 89[.]169[.]12[.]241 217[.]119[.]129[.]121″
Large-scale campaign leveraging hundreds of GitHub repositories to distribute trojanised packages disguised as developer tools, gaming cheats, and crypto utilities. The operation uses a LuaJIT-based loader with anti-analysis techniques and staged execution to evade detection. Once executed, malware captures screenshots, performs geolocation, disables proxy detection, and communicates with a centralised C2 infrastructure, consistent with credential theft and data exfiltration activity.
LuaJIT-based loader, RedLine Stealer, Lumma Stealer
Not specifically targeted (Global)
TroyDen (suspected)
Development, Gaming, Civil Society
T1204.002 (User Execution); T1189 (Drive-by Compromise); T1059.006 (Python); T1027 (Obfuscation); T1497 (Sandbox Evasion); T1622 (Debugger Evasion); T1113 (Screen Capture); T1041 (Exfiltration); T1555 (Credential Access)
High
Exercise caution when downloading code or tools from untrusted repositories. Validate sources before execution. Monitor for abnormal scripting activity and outbound connections. Implement application controls and network segmentation. Leverage threat intelligence feeds and behavioural detection to identify malicious activity. Maintain updated security controls.

Mar 23, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Mobile Exploitation Campaign / Zero-Day Exploit Chain
2e5a56beb63f21d9347310412ae6efb29fd3db2d3a3fc0798865a29a3c578d35 snapshare[.]chat 62[.]72[.]21[.]10 72[.]60[.]98[.]48 sahibndn[.]io e5[.]malaymoil[.]com static[.]cdncounter[.]net sqwas[.]shapelie[.]com”
A highly advanced iOS exploit chain, DarkSword, leverages multiple zero-day vulnerabilities to compromise devices running iOS 18.4 to 18.7. Delivered via web-based techniques such as watering hole sites and themed decoy pages, the campaign enables remote code execution, sandbox escape, and full kernel-level access. Post-exploitation, malware is deployed to collect sensitive data including messages, credentials, and device information while maintaining stealth through obfuscation and log removal.
GHOSTKNIFE, GHOSTSABER, GHOSTBLADE, Coruna iOS exploit kit
Saudi Arabia, Turkey, Malaysia, Ukraine
UNC6748, UNC6353
N/A
T1189; T1203; T1068; T1041
Critical
Update all iOS devices immediately to the latest patched version. Enable Lockdown Mode on high-risk or sensitive devices. Avoid visiting unknown or suspicious links and websites. Use mobile threat detection solutions where possible. Monitor devices for unusual behaviour such as battery drain or unknown processes. Restrict access to sensitive data on mobile devices when not required. Keep browsers and apps fully updated. Educate users about watering hole and targeted web-based attacks. Use network-level protections to block known malicious domains. Regularly review and enforce mobile device security policies.

Mar 22, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Mobile Exploitation Campaign / Zero-Day Exploit Chain
2e5a56beb63f21d9347310412ae6efb29fd3db2d3a3fc0798865a29a3c578d35 snapshare[.]chat 62[.]72[.]21[.]10 72[.]60[.]98[.]48 sahibndn[.]io e5[.]malaymoil[.]com static[.]cdncounter[.]net sqwas[.]shapelie[.]com”
A highly advanced iOS exploit chain, DarkSword, leverages multiple zero-day vulnerabilities to compromise devices running iOS 18.4 to 18.7. Delivered via web-based techniques such as watering hole sites and themed decoy pages, the campaign enables remote code execution, sandbox escape, and full kernel-level access. Post-exploitation, malware is deployed to collect sensitive data including messages, credentials, and device information while maintaining stealth through obfuscation and log removal.
GHOSTKNIFE, GHOSTSABER, GHOSTBLADE, Coruna iOS exploit kit
Saudi Arabia, Turkey, Malaysia, Ukraine
UNC6748, UNC6353
N/A
T1189; T1203; T1068; T1041
Critical
Update all iOS devices immediately to the latest patched version. Enable Lockdown Mode on high-risk or sensitive devices. Avoid visiting unknown or suspicious links and websites. Use mobile threat detection solutions where possible. Monitor devices for unusual behaviour such as battery drain or unknown processes. Restrict access to sensitive data on mobile devices when not required. Keep browsers and apps fully updated. Educate users about watering hole and targeted web-based attacks. Use network-level protections to block known malicious domains. Regularly review and enforce mobile device security policies.

Mar 18, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Phishing Campaign / Smishing (Fake Shipment Tracking)
posties[.]icu estafmox[.]help nrcsnap[.]com pkgov[.]shop
A large-scale phishing campaign uses fake shipment tracking SMS messages to exploit the widespread use of e-commerce and courier services. Attackers use spoofed sender identities or local-looking numbers to create urgency and lure victims into clicking malicious links leading to phishing pages designed to steal personal and financial data, including card details and one-time passwords. The campaign leverages real-time WebSocket connections for immediate data exfiltration and appears coordinated, using shared infrastructure, phishing templates, and phishing-as-a-service platforms to target multiple sectors across the MEA region.
Darcula Phishing Kit
Middle East, Africa
Unknown
Finance, Telecoms, eCommerce, Transport
T1566.002; T1204; T1056; T1041
High
Individuals should avoid clicking tracking links in SMS messages and instead visit official courier websites directly. Businesses should publish alerts about phishing campaigns, implement email authentication protocols (DMARC, DKIM, SPF), and partner with mobile carriers to filter fraudulent SMS messages. Regularly educate users about phishing tactics and promote a culture of security awareness. Implement multi-factor authentication wherever possible to add an extra layer of security.
Ransomware Campaign / Double Extortion
1ca67af90400ee6cbbd42175293274a0f5dc05315096cb2e214e4bfe12ffb71f e0fd8ff6d39e4c11bdaf860c35fd8dc0 51da4b9aa541a6fc636a97d44ee265b4 bed8d1752a12e5681412efbb8283910857f7c5c431c2d73f9bbc5b379047a316 f91cbdd91e2daab31b715ce3501f5ea0 payloadynyvabjacbun4uwhmxc7yvdzorycslzmnleguxjn7glahsvqd[.]onion payloadrz5yw227brtbvdqpnlhq3rdcdekdnn3rgucbcdeawq2v6vuyd[.]onion
The Payload ransomware group is targeting organizations across multiple sectors using a Babuk-derived ransomware with enhanced capabilities. The malware operates without command-and-control communication, encrypting files using Curve25519 and ChaCha20 while employing double extortion via Tor-based portals. It includes Windows and Linux/ESXi variants, enabling attacks on virtualized environments. The campaign leverages anti-forensic techniques such as disabling security services, deleting shadow copies, wiping logs, patching ETW, and self-deletion to evade detection and hinder recovery.
Payload Ransomware (Babuk-derived)
Bahrain
Payload Ransomware Group
Energy, Health, Telecoms, Agriculture
T1486; T1490; T1562.001; T1070.001; T1070.004; T1489; T1057; T1083; T1027; T1106
High
Organizations should prioritize robust backup and recovery solutions, implement multi-factor authentication, regularly patch systems, and monitor for unusual network activity. Focus on endpoint detection and response (EDR) solutions capable of detecting and blocking ransomware behavior. Employee security awareness training is crucial to prevent initial infection vectors like phishing.

Mar 14, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Operation CamelClone – Cyber Espionage / Spear-Phishing Campaign
” 31f1a97c72f596162f0946df74838d3bef89289ce630adba8791c0f3220980ee 51af876b0f7fde362c69219f7dec39f7fb667fb53dc5fe2cbdf841d6c5951460 27d7a398a58c12093bc49f7144dac2f079232768096d0558c226ea5c53782e29 4a0e2649f89e11121ffe55546ee081ac07472db650d094314414ebf26fcb7a8e 92962bfa6df48ec0f13713c437af021f4138dc5a419bc92bc8a376d625a6519a 1d0ea66d347325902e20a12e1f2f084be45d3d6045264e513dcc420b9928013c 2671e1f43b2e5911310c5b3f124c076055eec5dee4e596854332ffcf791fd740 2902cdee050a60c3129b4bb84e74ddda7b129c3473556f689d83609d9a5981a7 630ac67d8db777ae0b93e066bd13b21908e79f23a41a64448f0a4ea38c063a44 230a22a1f1800f11718b43a7ce9390d2ef0fa9dc212d954c8fafbfbe997bbbef 62c477c0827752ffeb8ea243497eef1c666fc41025d287909d021bceb5b8e699 2dcaaedfad798dad87f27aef39885d2879825c4c8bed1dcd9e863aba0d463103 hxxps://filebulldogs[.]com/uploads/AVQB61TVOX/f[.]js hxxps://filebulldogs[.]com/uploads/OKW5RN48ZJ/f[.]js hxxps://filebulldogs[.]com/uploads/F1OQY9GU84/f[.]js hxxps://filebulldogs[.]com/uploads/82WX5GP8CI/f[.]js hxxps://filebulldogs[.]com/uploads/AVQB61TVOX/document[.]pdf hxxps://filebulldogs[.]com/uploads/OKW5RN48ZJ/document[.]pdf hxxps://filebulldogs[.]com/uploads/F1OQY9GU84/document[.]pdf hxxps://filebulldogs[.]com/uploads/82WX5GP8CI/document[.]pdf hxxps://filebulldogs[.]com/uploads/AVQB61TVOX/a[.]zip hxxps://filebulldogs[.]com/uploads/OKW5RN48ZJ/a[.]zip hxxps://filebulldogs[.]com/uploads/F1OQY9GU84/a[.]zip hxxps://filebulldogs[.]com/uploads/82WX5GP8CI/a[.]zip oliwiagibbons@onionmail[.]org theresaunderwood@onionmail[.]org keatonwalls@onionmail[.]org coreyroberson@onionmail[.]org”
Spear-phishing emails deliver ZIP archives containing malicious LNK files impersonating official institutions. Executing the shortcut triggers PowerShell to download the HOPPINGANT JavaScript loader from file-sharing platforms. The loader retrieves additional payloads including decoy documents and archives containing Rclone, which connects to attacker-controlled MEGA cloud storage to exfiltrate sensitive files such as documents and Telegram session data. The campaign uses public file-sharing services instead of traditional C2 infrastructure to evade detection and conduct intelligence collection.
HOPPINGANT, Rclone
Algeria, Ukraine, Kuwait
Unknown (suspected intelligence-focused actors)
T1566.001; T1204.002; T1059.001; T1059.007; T1027; T1218; T1071.001; T1105; T1005; T1213; T1567.002
High
Implement robust email security and phishing detection; conduct user awareness training; regularly patch systems; deploy EDR solutions; enforce MFA; segment networks to limit lateral movement; monitor outbound connections and investigate anomalies.

Mar 13, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Handala Hack – Destructive Malware / Wiper Campaign
5986ab04dd6b3d259935249741d3eff2 3cb9dea916432ffb8784ac36d1f2d3cd 82[.]25[.]35[.]25 31[.]57[.]35[.]223 107[.]189[.]19[.]52 146[.]185[.]219[.]235
Ongoing destructive intrusion campaign conducted by the Handala persona associated with the Void Manticore threat cluster. Operations rely on compromised VPN credentials and trusted service provider access to infiltrate victim environments, followed by reconnaissance, credential harvesting, and privilege escalation to Domain Administrator level. Lateral movement is conducted via RDP and tunneling tools, after which coordinated destructive actions are executed through custom wipers, PowerShell-based deletion scripts, encryption tools, and manual file destruction to maximize operational disruption and psychological impact through hack-and-leak propaganda.
Handala Wiper, NetBird, VeraCrypt
N/A
Void Manticore (aka Red Sandstorm / Banished Kitten) – persona: Handala
Government, Telecommunications, Technology, Critical Infrastructure
T1133 – VPN Access; T1078.002 – Stolen Credentials; T1199 – Trusted Vendor Access; T1110 – Password Brute Force; T1003.001 – LSASS Credential Dumping; T1003.002 – SAM Credential Extraction; T1087.002 – Domain Account Discovery; T1021.001 – RDP Lateral Movement; T1572 – Network Tunneling; T1105 – Tool Downloading; T1047 – WMI Command Execution; T1484.001 – Group Policy Abuse; T1037.003 – Logon Script Execution; T1053.005 – Scheduled Task Execution; T1059.001 – PowerShell Execution; T1561.002 – Disk Wiping; T1485 – Data Destruction; T1486 – Disk Encryption Attack
Critical
Enforce MFA for VPN and privileged accounts; monitor authentication logs for anomalous access; restrict RDP exposure; detect LSASS credential dumping attempts; monitor tunneling tools such as NetBird; restrict unauthorized encryption utilities; deploy strong endpoint detection; maintain secure offline backups and tested recovery procedures; conduct threat hunting for abnormal administrative activity and destructive file operations.

Mar 12, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Conflict-Themed Phishing Campaign – Cyber Espionage / Credential Harvesting
uzbembish@elcat[.]kg fed6ebb87f7388adf527076b07e81dfa432bac4e899b0d7af17b85cc0205ffad a9de383c6a1b00c9bd5a09ef87440d72ec7fc4bcd781207b3cace2f246788d4d dfaaaf75147afbd57844382c953ec7ef36f68a9c17c66a47a847279a6b1109c9 4b9661092051839496c04169ccb52b659c0f65cefd14a990e23565a0c0e8eeaf d518262dd687a48f273966853f3ed4eb7404eb918b165bb71ff83f75962c0104 b58ec14b0119182aef12d153280962ad76c30e3cd67533177d55481704eba705 7b6d69a249fe2adf43eefc31cdeca62cf48ab428fcbf199322feeb99d24fb001 a8acb9864e6f64323ed75e69038ca9bfe76f7b1b0d24ec7df8ac07b6dbd641a3 14efa1194cc4c6aa5585d63c032268794364123d41a01121cbd5e56f7c313399 support[.]almersalstore[.]com almersalstore[.]com ban[.]ali@mofa[.]gov[.]iq nqandeel04@gmail[.]com iwsmailserver[.]com maria[.]tomasik@denika[.]se unityprogressall[.]org war[.]analyse[.]ltd@outlook[.]com ali[.]mo@med[.]gov[.]sy hxxps://iran[.]dashboard[.]1drvms[.]store/errors/sessionerrors/expire?client= jscop[.]mea[.]gov[.]in@outlook[.]com hxxps://defenceprodindia[.]site/server[.]php?file=Reader_en_install defenceprodindia[.]site 9477d9cd1435dc465b4047745e9c71103a114d65ed0d5f02ac3c97ac3f1dbf47 a9f4f4bc12896d0f0d2eeff02dd3e3e1c1406d8a6d22d59aa85f151d806ba390 ea1d98a41ad9343d017fa72f4baeeca0daa688bec6e0508e266c5e37e9d330de McManus[.]Michael@hotmail[.]com hxxps://1drv[.]ms/b/c/cbec61ab8028f986/IQDa9igU3D3BRqiyNtth76AzAbOM6jUpa8apnuRl-zKXKow?e=E8bIfd 16db04b632668dae081359fc07c97e5a9b79dad61713642e48b494aa6b7828be transfergocompany[.]com
Multiple threat groups launched coordinated phishing campaigns targeting government and diplomatic organizations during heightened geopolitical tensions. The campaigns leveraged conflict-themed lures, compromised or spoofed government email accounts, and credential harvesting pages impersonating services such as Microsoft Outlook Web App and OneDrive. Malicious attachments containing LNK loaders triggered DLL sideloading to deploy Cobalt Strike beacons and .NET loaders delivering Rust-based backdoors. In several cases, attackers used geofencing, tracking pixels, and compromised infrastructure to improve targeting and campaign effectiveness.
Cobalt Strike, Rust Backdoor
United States, India, Middle East, Europe
TA453 (APT42 / Charming Kitten / Mint Sandstorm), TA402 (Frankenstein / Cruel Jackal), TA473 (Winter Vivern), UNK_InnerAmbush, UNK_RobotDreams, UNK_NightOwl
Government, Administration, Diplomacy
T1566.002 – Phishing Link; T1566.001 – Phishing Attachment; T1566.003 – Phishing via Service; T1059.001 – PowerShell Execution; T1574.002 – DLL Side-Loading; T1105 – Payload Download; T1071.001 – Web C2 Communication; T1036 – Masquerading
High
Implement robust email filtering and phishing detection controls; enforce MFA for all remote access and email services; conduct user awareness training to identify phishing attempts; monitor network traffic and authentication logs for suspicious activity; enforce strong password policies; regularly update systems and security software; review and test incident response plans; leverage threat intelligence feeds to track emerging indicators.

Mar 11, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Social Media Influence Operation – Information Manipulation / Psychological Influence
No technical IoCs reported. The activity involved coordinated fake Instagram personas and social media accounts used to establish contact with targets.
Coordinated influence operation using fake personas on Instagram to build relationships with users before introducing politically themed messaging. The operation relied on long-term social engineering tactics to gain trust and gradually influence public opinion. The campaign was identified and disrupted by Meta, which removed the associated accounts and content linked to the activity.
N/A
United States
Unknown state-linked influence operators
Political / Public Discourse
T1562.001 – Identity Impersonation; T1598 – Social Engineering for Information; T1606.001 – Relationship-Based Phishing
Medium
Exercise caution with unsolicited messages or connection requests on social media platforms; verify the authenticity of accounts before engaging; cross-check information shared online with trusted sources; enable multi-factor authentication for social media accounts; platforms should continue monitoring and removing coordinated inauthentic behavior and influence campaigns.
Conflict-Driven Espionage Campaign – Cyber Espionage / Phishing Operations
No specific IoCs publicly disclosed in this advisory. Indicators referenced include phishing email infrastructure, malicious URLs, and file hashes associated with malware delivery observed across multiple campaigns.
Multiple threat actors increased cyber espionage activity targeting government and diplomatic entities during the regional conflict. Campaigns leveraged conflict-themed phishing emails, compromised accounts, and deceptive URLs to deliver malicious payloads and harvest credentials. Activity involved malicious attachments, compromised infrastructure, and impersonation of trusted services such as Microsoft Outlook Web App and OneDrive to gain initial access and collect intelligence from targeted networks.
Reader_en_install Loader, Malicious VLCMediaPlayer (masquerading payload)
India, Iran, Syria, Iraq, Europe, Middle East
TA453 (Charming Kitten), TA402 (Frankenstein), TA473 (Winter Vivern), UNK_InnerAmbush, UNK_RobotDreams, UNK_NightOwl
Government, Diplomacy
T1566 – Phishing Emails; T1189 – Malicious Websites; T1078 – Compromised Accounts; T1190 – Web Application Exploitation; T1059 – Script Execution; T1204 – User Execution; T1555 – Credential Harvesting; T1105 – Payload Download; T1071 – Web-Based C2 Communication
High
Deploy advanced email filtering and phishing detection controls; enforce MFA across remote access and email services; conduct user awareness training to identify conflict-themed phishing lures; monitor authentication logs and network traffic for anomalies; maintain strong password policies; regularly update security software; review and test incident response plans; leverage threat intelligence feeds to track emerging indicators and campaigns.
Operation Rising Lion – Psychological Cyber Warfare / Social Engineering Campaign
No technical IoCs publicly reported. Activity involves spoofed phone calls impersonating the Israel Defense Forces Home Front Command number and fraudulent SMS messages mimicking the official OREFAlert emergency alert system.
Psychological influence campaign using spoofed emergency alerts and social engineering to create panic and erode trust in official warning systems. Attackers distributed fake emergency calls and SMS alerts warning of missile attacks or fuel shortages to manipulate civilian responses during conflict conditions. The activity forms part of broader hybrid operations combining cyber activity with psychological influence and targeted phishing attempts against key individuals and institutions.
N/A
Israel
State-linked influence operators
Government, Civilian
T1566 – Targeted Phishing; T1598 – Social Engineering for Information; T1195 – Supply Chain Trust Abuse; T1270 – Psychological Operations
High
Verify emergency alerts and communications through official government channels or verified applications; avoid acting on unsolicited emergency messages; organizations should implement verification procedures for critical communications; conduct awareness training on social engineering tactics; monitor for suspicious messaging campaigns during crisis situations.
State-Linked Cybercrime Integration – Ransomware & Infostealer Operations
077ab28d66abdafad9f5411e18d26e87fe43da1410ee8fe846bd721ab0cb52de ddceade244c636435f2444cd4c4d3dc161981f3af1f622c03442747ecef50888 2b7d8a519f44d3105e9fde2770c75efb933994c658855dca7d48c8b4897f81e6 64cf334716f15da1db7981fad6c81a640d94aa1d65391ef879f4b7b6edf6e7f1 74db1f653da6de134bdc526412a517a30b6856de9c3e5d0c742cb5fe9959ad0d 94f05495eb1b2ebe592481e01d3900615040aa02bd1807b705a50e45d7c53444 4aef998e3b3f6ca21c78ed71732c9d2bdcc8a4e0284f51d7462c79d446fbc7be a4bd1371fe644d7e6898045cc8e7b5e1562bdfd0e4871d46034e29a22dec6377 64263640a6fdeb2388bca2e9094a17065308cf8dcb0032454c0a71d9b78327eb a8c380b57cb7c381ca6ba845bd7af7333f52ee4dc4e935e98b48bb81facad72b 24857fe82f454719cd18bcbe19b0cfa5387bee1022008b7f5f3a8be9f05e4d14 a92d28f1d32e3a9ab7c3691f8bfca8f7586bb0666adbba47eab3e1a8faf7ecc0 2a09bbb3d1ddb729ea7591f197b5955453aa3769c6fb98a5ef60c6e4b7df23a5 aae017e7a36e016655c91bd01b4f3c46309bbe540733f82cce29392e72e9bd1f
Threat actors associated with state-linked cyber operations increasingly leveraging the cybercrime ecosystem to support intelligence collection and disruptive campaigns. Groups such as Void Manticore (Handala) and MuddyWater have been observed using commercially available malware, botnets, loaders, and ransomware infrastructure typically associated with financially motivated cybercrime. The activity demonstrates a convergence between state-sponsored operations and criminal tooling, enabling actors to improve operational effectiveness, obscure attribution, and conduct targeted attacks aligned with strategic objectives.
Rhadamanthys Infostealer, Tsundere / DinDoor Botnet, CastleLoader, FakeSet, StageComp, Qilin Ransomware
Israel
Void Manticore (Handala), MuddyWater
Health, Defense, Energy, IT, Telecommunications, Government
T1566.001 – Phishing Attachment; T1566.002 – Phishing Link; T1588.001 – Malware Acquisition; T1588.002 – Tool Acquisition; T1071 – Web-based Communication; T1486 – Ransomware Encryption
High
Conduct proactive threat hunting for known indicators; deploy strong endpoint detection and response (EDR); implement network segmentation and MFA; monitor network traffic and authentication logs for suspicious activity; restrict execution of unauthorized software through application control; enhance user awareness training for phishing threats; regularly review security policies and incident response procedures.
APT Intrusion Campaign – Critical Infrastructure Targeting
No specific IoCs publicly reported in this advisory.
Reported cyber intrusions targeting critical infrastructure organizations including a U.S. airport, a financial institution, and a software company. The activity is attributed to an advanced persistent threat (APT) group conducting operations aimed at operational disruption and intelligence collection. While technical details regarding malware or intrusion techniques remain limited, the targeting pattern indicates sustained pressure on high-value organizations during heightened geopolitical tensions.
N/A
United States
State-linked APT group (not publicly identified)
Finance, IT, Transportation
T1190 – External Service Exploitation; T1078 – Stolen Account Access; T1133 – Remote Access Abuse
High
Implement strong network segmentation to limit lateral movement; enforce multi-factor authentication for all remote access and privileged accounts; conduct regular vulnerability assessments and penetration testing; monitor network and authentication logs for anomalous activity; perform proactive threat hunting; ensure incident response plans are updated and regularly tested.

Mar 10, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
State-Linked Cybercrime Integration – Ransomware & Infostealer Operations
No specific IoCs publicly reported in this advisory.
Security researchers report increased collaboration between state-linked cyber actors and cybercriminal ecosystems. The activity involves leveraging ransomware-as-a-service (RaaS), infostealers, and malware-as-a-service (MaaS) platforms to support intelligence collection, disruptive operations, and attribution evasion. Rather than using cybercrime purely as a cover, the actors are integrating criminal infrastructure, tools, and affiliate networks into state-aligned cyber operations to expand capabilities and operational reach.
Ransomware variants, Infostealers, Malware-as-a-Service platforms
N/A
State-linked cyber actors
Multi-sector (potentially government, enterprise, and infrastructure targets)
T1566.001 – Phishing Attachment; T1078.004 – Compromised Account Access; T1486 – Ransomware Encryption
High
Strengthen threat detection and monitoring capabilities to identify activity associated with criminal tooling; enforce multi-factor authentication and strong credential policies; apply regular patching and system updates; conduct security awareness training focused on phishing and social engineering; implement network segmentation and least privilege access controls; share threat intelligence to improve collective defense.
State-Linked Cybercrime Integration – Use of Criminal Infrastructure
No specific IoCs publicly reported in this advisory. Indicators referenced include shared malware infrastructure, code-signing certificates, and tools used across multiple campaigns.
Threat actors associated with state-linked operations increasingly leveraging cybercrime ecosystems to support state-directed cyber operations. Groups such as Void Manticore (Handala) and MuddyWater have been observed using commercially available malware, botnets, loaders, and ransomware infrastructure typically associated with financially motivated cybercrime. The integration of criminal services such as ransomware-as-a-service and infostealers allows these actors to enhance operational capability, obscure attribution, and conduct targeted operations against strategic organizations, including healthcare and government institutions.
Rhadamanthys Infostealer, Tsundere / DinDoor Botnet, CastleLoader, FakeSet, StageComp, Qilin Ransomware
Israel, Albania
Void Manticore (Handala), MuddyWater
Healthcare, Government, Defense
T1566 – Phishing Emails; T1078 – Stolen Account Access; T1105 – Malware Download; T1059 – Script Execution; T1204 – User Execution; T1547 – Persistence Mechanism; T1027 – Obfuscated Malware; T1133 – Remote Access Abuse; T1555 – Credential Theft
High
Conduct proactive threat hunting for indicators related to known malware families; deploy strong endpoint detection and response (EDR); enforce multi-factor authentication and network segmentation; monitor network traffic and authentication logs for anomalies; restrict execution of unauthorized software through application control; strengthen user awareness training against phishing; maintain updated security policies and incident response procedures.
Telegram Hacktivist Activity Timeline – Coordinated Hacktivism / Multi-Vector Cyber Activity
No specific IoCs publicly reported in this advisory. Activity primarily coordinated through Telegram channels used by hacktivist groups to claim attacks and share operational updates.
Coordinated hacktivist activity emerging during the Iran–Israel–US conflict beginning March 2026. Multiple groups formed alliances and claimed attacks targeting government portals, financial services, energy infrastructure, aviation services, healthcare institutions, and educational organizations. Operations included DDoS attacks, attempted data breaches, ransomware activity, website exploitation, and alleged operational technology (OT) intrusions. The campaign expanded geographically across the Middle East, Europe, and allied regions, demonstrating an increase in politically motivated cyber operations and hacktivist coordination through messaging platforms.
DDoS tools, ransomware variants (unspecified)
Israel, United States, Kuwait, Jordan, Saudi Arabia, UAE, Cyprus, UK
Cyber Islamic Resistance, 313 Team, Keymous Plus, NoName057(16), DieNet, Nation of Saviors, Team Fearless, Cyb3rDrag0nz, Moroccan Black Cyber Army
Finance, Government, Energy, Aviation, Healthcare, Education, Defense
T1499 – DDoS Service Disruption; T1566 – Phishing Initial Access; T1190 – Web Application Exploitation; T1486 – Ransomware Encryption; T1560 – Data Exfiltration Archives; T1189 – Drive-by Compromise
High
Implement strong DDoS mitigation strategies and web application protections; monitor critical infrastructure systems for suspicious activity; patch exposed public-facing services; deploy strong access controls and continuous monitoring; conduct proactive threat hunting and vulnerability management; monitor for potential data exfiltration and misinformation campaigns; participate in threat intelligence sharing initiatives to track evolving hacktivist activity.
State Cyber Strategy – Offensive Cyber Planning
No technical IoCs reported.
Strategic policy shift outlining expanded offensive cyber capabilities and defensive resilience measures in response to escalating geopolitical tensions. The strategy focuses on disrupting adversarial networks before breaches occur, strengthening critical infrastructure protection, implementing zero trust architecture across federal systems, enhancing encryption standards, and increasing collaboration with private sector cybersecurity providers. It also emphasizes investments in emerging technologies such as AI and post-quantum cryptography while preparing cyber operations to play a central role in modern geopolitical conflict.
N/A
United States, Israel, Iran
(External) Government-led cyber strategy
Energy, Finance, IT, Healthcare, Utilities
T1562.001 – Defense Evasion / Security Hardening Context
Medium
Implement zero trust architecture across critical systems; strengthen encryption and identity security controls; improve public-private cyber defense collaboration; enhance continuous monitoring and threat intelligence sharing; invest in workforce development and incident response capabilities to strengthen organizational cyber resilience.
BoryptGrab Campaign – Multi-Stage Infostealer / Credential Theft
Malware campaign distributing the BoryptGrab information stealer through fake GitHub repositories and deceptive download portals offering free software tools, cheats, or utilities. Victims are redirected to malicious pages that deliver ZIP archives containing the payload. Execution triggers a multi-stage infection chain using VBS downloaders, DLL side-loading, and encrypted launcher payloads to deploy BoryptGrab and additional malware. The stealer collects browser credentials, cryptocurrency wallet data, system information, files, screenshots, Telegram data, and Discord tokens. In some cases, TunnesshClient establishes a reverse SSH tunnel for persistence and proxy access, while additional loaders may deploy Vidar variants and other components.
BoryptGrab, Vidar, TunnesshClient, HeaconLoad
N/A
Unknown
Multi-sector / Consumer endpoints
T1189 – Drive-by Download; T1566.002 – Phishing Link; T1574.002 – DLL Side-Loading; T1059.005 – VBS Script Execution; T1059.001 – PowerShell Execution; T1053.005 – Scheduled Task Persistence; T1547.001 – Startup Persistence; T1027 – Obfuscated Malware; T1105 – Payload Download; T1041 – Data Exfiltration
High
Avoid downloading tools from unknown or unofficial repositories; verify the authenticity of developers before downloading files; monitor and block suspicious ZIP downloads; restrict DLL side-loading through application control; monitor scheduled task creation and persistence activity; inspect outbound traffic for suspicious downloads or exfiltration; deploy endpoint protection capable of detecting infostealers; keep systems and browsers updated; educate users about risks of cracked software and unofficial tools.
Dindoor Backdoor Deployment – State-Linked Network Intrusion / Persistence
No specific IoCs publicly reported in this advisory.
Threat actors associated with the MuddyWater (Seedworm) group have been observed establishing persistent access within enterprise networks across multiple sectors. The campaign involves long-term network infiltration intended to maintain covert access for potential future disruption, intelligence collection, or data exfiltration. The activity represents a shift from traditional espionage operations toward maintaining embedded access within critical infrastructure environments, allowing attackers to blend with legitimate network activity and launch operations at a later stage.
Dindoor Backdoor
United States, Israel
MuddyWater (Seedworm)
Finance, IT, Government, Transportation
T1547.001 – Persistence via Startup Mechanisms; T1078 – Valid Account Abuse; T1133 – External Remote Access; T1059.001 – PowerShell Execution
High
Implement strong network segmentation to limit lateral movement; deploy intrusion detection and prevention systems; audit privileged accounts and access permissions regularly; enable enhanced logging and monitoring to detect anomalous activity; conduct proactive threat hunting for persistence mechanisms; implement zero trust architectures to continuously verify user and device access.
Strategic Cyber Conflict Analysis – Cyber Warfare Escalation
No technical IoCs reported.
Analysis discussing the growing prominence of cyber operations as a central component of modern geopolitical conflict. The report highlights how cyber capabilities are increasingly being used as primary instruments of state conflict, shifting from covert intelligence operations toward overt cyber warfare activities. The discussion reflects the evolving role of cyber operations in strategic military engagements and their potential to replace or complement traditional warfare methods.
N/A
Iran
N/A
Government, IT
N/A
Medium
Strengthen cyber resilience through proactive threat intelligence monitoring, vulnerability management, and incident response preparedness; implement continuous monitoring and threat hunting to detect emerging cyber threats; promote information sharing and cooperation to address evolving cyber warfare risks.
Camaro Dragon Campaign – Cyber Espionage / Malware Delivery
4d8027424b5bcd167ab70c8320ce3c5df72a9ecca01246b095e4af498f77725d fff7864019b651bea2448228d6557d995edc929276bb9d8cb34c3c280a42684e fa3a1153018ac1e1a35a65e445a2bad33eac582c225cf6c38d0886802481cd43 a7c56033f2264c71b0485da693e3f627b2b5ccfe3399a53cc558be77f95d9c13 c78eb1cecef5f865b6d150adcf67fa5712c5a16b94f1618c32191e61fbe69590 1ddbed0328a60bb4f725b4ef798d5d14f29c04f7ffe9a7a6940cacb557119a1c 26d10996fd2880441445539cd8a6e7fe0777f6ca3352dae6ef84d1d747aabb0c a9de383c6a1b00c9bd5a09ef87440d72ec7fc4bcd781207b3cace2f246788d4d b58ec14b0119182aef12d153280962ad76c30e3cd67533177d55481704eba705 a8acb9864e6f64323ed75e69038ca9bfe76f7b1b0d24ec7df8ac07b6dbd641a3 almersalstore[.]com
Cyber espionage campaign targeting organizations in the Middle East using conflict-themed phishing lures referencing missile strikes and attacks on Gulf oil and gas facilities. Malicious archives containing LNK files initiate a multi-stage infection chain leading to deployment of the PlugX backdoor and Cobalt Strike. Attackers leveraged DLL side-loading and widely available offensive tooling to establish access and conduct reconnaissance, demonstrating rapid adaptation to geopolitical developments to increase lure credibility.
PlugX Backdoor, Cobalt Strike
Qatar
Camaro Dragon (Earth Preta / Mustang Panda)
N/A
T1566.001 – Phishing Attachment; T1204.002 – Malicious File Execution; T1574.002 – DLL Side-Loading; T1105 – Payload Download; T1059 – Command Execution; T1071 – Web C2 Communication
High
Enhance threat monitoring and incident response readiness; deploy advanced email security and phishing detection; implement robust endpoint protection; educate employees on current-event themed phishing lures; conduct proactive threat hunting related to geopolitical events.
IP Camera Reconnaissance Campaign – Cyber Espionage / Surveillance Infrastructure Targeting
Vulnerabilities exploited: CVE-2017-7921, CVE-2021-36260, CVE-2023-6895, CVE-2025-34067, CVE-2021-33044 affecting internet-exposed IP camera systems and management platforms.
Threat actors conducted reconnaissance operations by exploiting vulnerabilities in internet-connected IP cameras, primarily Hikvision and Dahua devices. The activity aims to gather intelligence and perform battle damage assessment by accessing live video feeds and surveillance infrastructure. Compromised cameras were reportedly used to observe sensitive locations and monitor the impact of military operations. The campaign reflects the increasing use of IoT surveillance devices as intelligence collection tools during geopolitical conflicts.
N/A
Israel, UAE, Qatar, Bahrain, Kuwait, Lebanon, Cyprus
State-linked cyber actors
Government, Science, Military
T1190 – Remote Service Exploitation
High
Remove internet exposure of IP cameras and place devices behind VPN or zero-trust access gateways; change default credentials and enforce strong authentication; regularly update firmware and patch known vulnerabilities; isolate surveillance devices on segmented networks; monitor authentication logs and outbound traffic for suspicious activity; prioritize remediation of vulnerabilities listed in the KEV catalog.

Mar 9, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Seedworm Campaign – Cyber Espionage / Infrastructure Targeting
Indicators referenced include certificates signed to “Amy Cherne” and “Donald Gay” used in attacker tooling and infrastructure. No additional technical IoCs publicly disclosed in this advisory.
Ongoing cyber espionage and intrusion activity attributed to the Seedworm (MuddyWater) threat group targeting critical infrastructure and enterprise organizations. The campaign involves establishing persistent access to victim environments using custom backdoors and legitimate tools for data exfiltration and command execution. Targets include financial institutions, aviation organizations, software companies, and NGOs across North America and allied regions. The activity reflects expanded operational scope during geopolitical escalation and includes additional disruption attempts by aligned groups using DDoS techniques.
Dindoor Backdoor, Fakeset, Darkcomp, Rclone
United States, Canada, Israel
Seedworm (MuddyWater / Temp Zagros / Static Kitten), Handala, DieNet
Finance, IT, Government, Energy, Healthcare, Transportation
T1566 – Phishing Initial Access; T1190 – Web Application Exploitation; T1078 – Valid Account Abuse; T1027 – Obfuscated Malware; T1560 – Data Collection & Archiving; T1041 – Data Exfiltration over C2
Critical
Enforce multi-factor authentication across all remote access and privileged accounts; monitor outbound network traffic for abnormal data transfers; deploy web application firewalls and updated detection rules; restrict unauthorized external cloud storage access; maintain immutable offline backups; implement network segmentation and least-privilege access controls; conduct proactive threat hunting and continuous monitoring for indicators of compromise.
Hacktivist Mobilization – Coordinated Cyber Activity / Disruption Campaigns
No specific IoCs publicly reported. Activity primarily coordinated through online communities and messaging platforms used by hacktivist groups to organize operations and publicize attacks.
Following recent geopolitical escalation, more than 60 hacktivist groups rapidly mobilized and began conducting cyber operations aligned with broader political objectives. These groups reportedly leveraged AI tools to enhance operational planning, target discovery, and messaging amplification. The surge in activity increases the complexity of the threat landscape by combining hacktivist operations with broader nation-state cyber activity, potentially leading to disruption campaigns, influence operations, and opportunistic attacks against organizations linked to geopolitical actors.
N/A
United States, Israel, Iran
Multiple hacktivist groups (various)
Multi-sector
T1499 – Service Disruption (DDoS); T1585 – Online Persona Creation; T1598 – Social Engineering / Influence
High
Heighten monitoring and incident response readiness; deploy strong intrusion detection and network monitoring; enforce multi-factor authentication and strong access controls; maintain up-to-date systems and security tools; conduct proactive threat hunting; prepare contingency plans for potential service disruptions or cyber incidents linked to geopolitical developments.
Information Control Event – Internet Connectivity Disruption
No technical IoCs reported.
Ongoing nationwide internet disruption affecting connectivity and digital communications. The shutdown has restricted access to online services and information for several days, impacting civilian communication, media access, and digital services. While not a cyberattack, prolonged internet outages during geopolitical tensions can influence information flow, incident reporting, and the broader cyber threat landscape.
N/A
Iran
N/A
Telecommunications / Internet Infrastructure
N/A
Medium
Maintain awareness of regional connectivity disruptions and potential information flow limitations; monitor geopolitical developments that may correlate with cyber activity; ensure alternative communication channels and contingency plans are in place for operational continuity during large-scale connectivity disruptions.
Cyber Espionage / Critical Infrastructure Targeting
No confirmed IoCs publicly disclosed.
Ongoing intrusion activity targeting critical infrastructure and high-value organizations during the current geopolitical escalation. Activity linked to the Seedworm threat cluster involves establishing persistent access within victim networks and deploying backdoors for potential intelligence collection or future disruption. Campaigns have targeted sectors such as telecommunications, defense, and infrastructure operators.
Backdoors (unspecified)
United States
Seedworm / MuddyWater / Temp Zagros / Static Kitten
Critical Infrastructure
T1598 – Phishing / Initial Contact; T1190 – Public-Facing Exploitation; T1078 – Valid Accounts / Credential Abuse
High
Strengthen network defenses across critical infrastructure environments; enforce multi-factor authentication and strong credential policies; monitor networks for unusual access patterns or backdoor activity; conduct proactive threat hunting and incident response exercises; share threat intelligence with trusted industry partners.
Cyber Espionage / Backdoor Deployment – MuddyWater Dindoor Campaign
gitempire[.]s3[.]us-east-005[.]backblazeb2[.]com elvenforest[.]s3[.]us-east-005[.]backblazeb2[.]com uppdatefile[.]com serialmenot[.]com moonzonet[.]com
A cyber espionage campaign observed since early 2026 targeting organizations in strategic sectors including aviation, financial services, banking, and software companies connected to defense and aerospace supply chains. The attackers maintained persistence within victim networks for extended periods and attempted to exfiltrate sensitive data to cloud infrastructure using legitimate tools, indicating intelligence-gathering objectives aligned with ongoing geopolitical tensions.
Dindoor backdoor; Fakeset backdoor; Rclone; Deno runtime
United States; Canada; Israel
MuddyWater / Seedworm
Finance; IT; Defense; Aerospace; Banking
T1071.001 – Web Communication; T1105 – Tool Transfer; T1059 – Command Execution; T1547 – Persistence; T1005 – Data Collection; T1041 – Data Exfiltration; T1567.002 – Cloud Exfiltration; T1219 – Remote Access
High
Monitor for abnormal execution of Deno runtime processes and unexpected Rclone activity; implement behavioral detection for persistence mechanisms and remote access tools; conduct threat hunting for MuddyWater indicators; strengthen logging and monitoring of outbound traffic to cloud storage; ensure security tooling and threat intelligence feeds are regularly updated.
RedAlert Mobile Espionage Campaign / Mobile Spyware Distribution
hxxps://www[.]shirideitch[.]com/wp-content/uploads/2022/06/RedAlert[.]apk hxxp://bit[.]ly/3Ozydsn hxxps://api[.]ra-backup[.]com/analytics/submit[.]php
A mobile espionage campaign distributing a trojanized version of the legitimate Red Alert rocket warning application via SMS phishing messages. Victims are directed to sideload a malicious APK that mimics the official emergency alert application. Once installed, the malware collects sensitive data including SMS messages, contact lists, device information, and GPS location data while maintaining the appearance of a functional alert application. The campaign primarily targets civilians during the ongoing conflict and focuses on intelligence collection through mobile device compromise.
Android spyware (trojanized RedAlert APK)
Israel
Not attributed
Government; Defense; Military; Civilian Users
T1566.002 – Phishing Link; T1476 – Malicious App Delivery; T1409 – Sensitive Data Access; T1416 – SMS Collection; T1430 – Location Tracking; T1421 – System Discovery; T1404 – Data Exfiltration; T1027 – Obfuscation
High
Only download applications from official app stores and verify the developer before installation; avoid installing APK files from SMS or unknown links; review application permissions carefully; deploy mobile threat defense solutions where possible; educate users on mobile phishing risks, especially during periods of heightened geopolitical tension.
Cyber Espionage / Infrastructure Targeting – State-Aligned Activity
37[.]1[.]213[.]152 184[.]75[.]210[.]206 162[.]0[.]230[.]185
Increased cyber activity linked to multiple state-aligned threat actors conducting reconnaissance, credential abuse, and network probing against organizations globally amid heightened geopolitical tensions. The activity appears focused on early-stage intrusion and access establishment that could enable espionage or future disruptive operations. Targeted sectors include manufacturing, transportation, telecommunications, energy, government, finance, and defense-related organizations.
Not specified
Middle East; Europe; United States
MuddyWater / APT34 / OilRig / Seedworm; APT33 / Elfin / Refined Kitten; UNC1549 / CURIUM / Tortoise Shell / Crimson Sandstorm
Telecoms; Energy; Government; Transport; Manufacturing; Finance; Defense; Aerospace
T1566.001 – Phishing Attachment; T1110 – Brute Force; T1110.003 – Password Spraying; T1078 – Valid Accounts; T1190 – Public-Facing Exploit; T1059.001 – PowerShell Execution; T1046 – Network Scanning; T1087 – Account Discovery; T1083 – File Discovery; T1021 – Remote Services
High
Implement multi-factor authentication and strong credential policies; patch public-facing systems and monitor for exploitation attempts; enhance network monitoring for scanning or credential abuse; conduct proactive threat hunting for indicators linked to Iranian APT groups; review incident response plans and strengthen threat intelligence sharing.
Mobile Exploitation Campaign / Watering-Hole Attack – Coruna iOS Exploit Kit
TO ADVISE
A mobile exploitation campaign leveraging the Coruna iOS exploit kit targeting iPhones running iOS 13–17.2.1. The campaign has been observed in watering-hole attacks on compromised Ukrainian websites and in cryptocurrency-related scam pages. The exploit kit uses malicious web pages and hidden iframe mechanisms to deliver exploit chains and connect infected devices to attacker-controlled infrastructure for surveillance or further exploitation. Infrastructure includes domains disguised as gambling, gaming, cryptocurrency, and promotional sites.
Coruna iOS Exploit Kit
Ukraine
Not attributed
Not specified
T1189 – Drive-by Compromise; T1059 – Command Execution; T1071 – Web Communication; T1090 – Proxy Use; T1573 – Encrypted Channel; T1568 – Dynamic Resolution; T1583.001 – Domain Infrastructure; T1608.001 – Malware Staging; T1204 – User Interaction
High
Ensure iOS devices are updated with the latest security patches; deploy mobile device management (MDM) or mobile threat defense solutions where possible; restrict access to suspicious or untrusted websites; educate users about watering-hole and scam-related phishing pages; monitor network traffic for connections to suspicious domains or exploit delivery infrastructure.

Mar 8, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Cyber Reconnaissance / IoT Surveillance Exploitation
CVE-2017-7921; CVE-2021-36260; CVE-2023-6895; CVE-2025-34067; CVE-2021-33044
Iran-linked cyber actors conducted large-scale scanning and exploitation attempts against internet-exposed surveillance cameras across the Middle East. The campaign targeted Hikvision and Dahua IP cameras to gain unauthorized access and potentially obtain real-time video intelligence. Compromised devices could enable reconnaissance, monitoring of strategic locations, and battle damage assessment during regional military operations. Activity correlates with heightened geopolitical tensions and demonstrates the use of compromised IoT infrastructure to support physical military intelligence operations.
Hikvision IP Cameras; Dahua Surveillance Systems
Israel; Kuwait; Qatar; UAE; Bahrain; Lebanon
Iran-linked threat actors
Military; Government; Administration
T1595 – Active Scanning; T1590 – Reconnaissance; T1190 – Public-Facing Exploit; T1046 – Service Discovery; T1021 – Remote Access; T1071 – Web Communication
High
Remove direct internet exposure of surveillance devices; place cameras behind VPN or zero-trust access gateways; apply latest firmware patches; replace unsupported devices; enforce strong unique credentials; segment surveillance devices into isolated network zones; monitor logs for suspicious login attempts and abnormal outbound connections.
Opportunistic Cybercrime / Phishing & Malware Distribution – Conflict-Themed Campaigns
hxxp://www[.]e-kflower[.]com/_prozn/_skin_mbl/home/KApp[.]rar hxxps://www[.]360printsol[.]com/2026/alfadhalah/thumbnail?img=index[.]png hxxp://www[.]e-kflower[.]com/_prozn/_skin_mbl/home/KAppl[.]rar 172[.]81[.]60[.]97 017[.]65c[.]mytemp[.]website arch[.]megadatahost1[.]lol arch2[.]maxdatahost1[.]cyou arch2[.]megadatahost1[.]lol cfgomma[.]com flourishingscreencousin[.]com goldman-iran-krieg[.]pages[.]dev irandonation[.]org khameneisol[.]xyz lettucecircumvent[.]com media[.]hyperfilevault2[.]mom media[.]maxdatahost1[.]cyou media[.]megadatahost1[.]lol media[.]megafilehost2[.]sbs nowarwithiran[.]store
Multiple malware and phishing campaigns exploiting geopolitical tensions in the Middle East. Threat actors distribute malware through conflict-themed lures, fake news blogs, fraudulent donation portals, and impersonation websites targeting victims across government, finance, and digital services sectors. Attack techniques include DLL sideloading using legitimate binaries, malicious LNK execution, CHM exploitation, shellcode loading, and remote management tool hijacking to establish persistence and exfiltrate data.
LOTUSLITE; StealC
Middle East; Bahrain; Israel
Mustang Panda (suspected activity)
Government; Military; Finance; Banking; Digital Services; IT/ISP; High-Value Individuals
T1204 – User Execution; T1566 – Phishing; T1218 – Signed Binary Proxy Execution; T1071 – Web Communication; T1547 – Persistence; T1059 – Command Execution; T1105 – Tool Transfer; T1053 – Scheduled Task; T1090 – Proxy; T1083 – File Discovery; T1027 – Obfuscation
High
Minimize exposure of internet-facing applications and VPN services; inspect network traffic for malware delivery and exploit activity; enforce least-privilege access controls and strong MFA; monitor for suspicious persistence mechanisms or proxy usage; conduct security awareness training to mitigate phishing and fraud risks; perform regular threat hunting and security assessments.

Mar 6, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Opportunistic Cybercrime / Phishing & Malware Distribution
Large number of newly registered domains (>8,000) using conflict-related keywords and malicious infrastructure distributing malware (full IoC list extensive).
Surge in opportunistic cyber activity exploiting geopolitical tensions in the Middle East. Observed campaigns include phishing attacks using conflict-themed lures, fake news blogs distributing malware, fraudulent websites impersonating legitimate services, donation scams, and cryptocurrency-related fraud campaigns. Some operations delivered malware via DLL sideloading while leveraging compromised or newly registered domains to host payloads and phishing infrastructure.
StealC; LOTUSLITE backdoor
Bahrain; Iran; Israel; Iraq; United States
Mustang Panda (associated activity observed)
Finance; Government; IT
T1566.001 – Phishing Attachment; T1189 – Drive-by Compromise; T1059.001 – Command Execution; T1555.003 – Credential Theft; T1195.001 – Compromised Infrastructure; T1078.004 – Valid Accounts
High
Reduce attack surface through strong access controls and least-privilege policies; enforce multi-factor authentication; inspect network traffic to detect malicious domains and payload delivery; implement threat hunting for conflict-themed phishing campaigns and malware indicators; conduct regular security awareness training and risk assessments to mitigate social-engineering threats.
Hacktivism / DDoS & Website Defacement Campaign
No specific IoCs reported.
Ongoing hacktivist cyber operations attributed to the Fatimion Cyber Team, involving Distributed Denial of Service (DDoS) attacks, website defacements, and database data exfiltration. The group has conducted sustained activity across the Middle East since 2023 and continues operations into 2026, combining disruptive cyber activity with coordinated information operations aimed at amplifying psychological and political impact.
Not specified
Not specified
Fatimion Cyber Team
Not specified
T1499 – Service Disruption (DDoS); T1491 – Website Defacement; T1041 – Data Exfiltration; T1596 – Information Operations
Medium
Implement DDoS mitigation and web application protection mechanisms; monitor web assets for defacement attempts; strengthen database access controls and logging; deploy intrusion detection and monitoring for data exfiltration; monitor online channels for coordinated influence or disinformation activity related to hacktivist campaigns.
Cyber Espionage / Backdoor Deployment – MuddyWater Dindoor Campaign
No specific IoCs reported in the advisory.
A cyber espionage campaign attributed to the MuddyWater APT group targeting banks, airports, nonprofits, and a software supplier connected to the defense and aerospace sector. The campaign deploys newly identified backdoors to establish persistent access in victim networks, enabling long-term surveillance and potential data exfiltration. Attackers leveraged legitimate tools for data transfer to cloud storage and may use the foothold for future disruptive or destructive operations amid ongoing geopolitical tensions.
Dindoor; Fakeset; Rclone; Deno runtime
United States; Israel; Saudi Arabia; Iraq; UAE; Georgia; India; Pakistan; Turkey
MuddyWater / Seedworm / TEMP.Zagros / Mango Sandstorm / TA450 / Static Kitten
Finance; IT; Energy; Government; Aerospace; Defense
T1566 – Phishing; T1105 – Tool Transfer; T1078 – Valid Accounts; T1190 – Public-Facing Exploit
High
Strengthen phishing defenses and user awareness; monitor networks for unusual use of tools such as Rclone or abnormal cloud storage access; enforce multi-factor authentication and strong credential management; patch public-facing systems; implement network segmentation and threat hunting for MuddyWater indicators.
Cyber Espionage / Spear-Phishing Malware Campaign
No public IoCs disclosed in the advisory.
A targeted phishing campaign against Iraqi government officials using lures impersonating Iraq’s Ministry of Foreign Affairs. The operation delivers previously unseen malware families designed to establish persistence and conduct espionage activities. The attack chain uses phishing emails and fake Cisco Webex meeting pages to trigger PowerShell execution and deploy multi-stage malware capable of in-memory execution and evasion.
SPLITDROP; TWINTASK; TWINTALK; GHOSTFORM
Iraq
Dust Specter (Iran-linked)
Government
T1566 – Phishing; T1204 – User Execution; T1059 – PowerShell Execution; T1105 – Tool Transfer; T1027 – Obfuscation; T1547 – Persistence
High
Strengthen email security controls and phishing detection; conduct user awareness training to identify impersonation attempts; deploy EDR solutions to detect suspicious PowerShell and in-memory execution; apply application control to block unauthorized binaries; monitor network traffic for anomalous activity and emerging indicators linked to Dust Specter campaigns.

Mar 5, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Mobile Exploitation Campaign / iOS Exploit Kit Activity
Multiple exploit delivery domains, configuration servers, and C2 infrastructure associated with the Coruna exploit kit (extensive IoC set reported).
A mobile exploitation campaign leveraging the Coruna iOS exploit kit targeting Apple iPhone devices. The campaign uses malicious web infrastructure to deliver exploits through exploit chains designed to compromise vulnerable iOS devices. The exploit kit includes delivery infrastructure, implant servers, and command-and-control channels used for post-exploitation control and potential surveillance or data collection from compromised devices.
Coruna iOS Exploit Kit
Not specified
Not attributed
Not specified
T1189 – Drive-by Compromise; T1071 – Web Communication; T1059 – Command Execution
High
Ensure iOS devices are updated to the latest security patches; deploy mobile device management (MDM) or mobile threat defense solutions where possible; restrict access to suspicious websites or links; monitor mobile device behavior for abnormal network connections or exploit activity; educate users about risks of malicious links and exploit delivery pages.
Cyber Reconnaissance / IoT Surveillance Exploitation
No specific IoCs reported.
Large-scale scanning and exploitation attempts targeting internet-connected surveillance cameras across Israel and other Middle Eastern countries following recent missile strikes. Attackers search for exposed devices with weak or default credentials and attempt to exploit known vulnerabilities to gain access. Compromised cameras could provide reconnaissance capabilities, enabling monitoring of locations, infrastructure, or individuals during periods of geopolitical tension.
Internet-connected surveillance cameras (IoT devices)
Israel; Middle East
State linked threat actors (suspected)
Not specified
T1190 – Public-Facing Exploit; T1110 – Brute Force; T1046 – Network Scanning
High
Update firmware on all internet-exposed surveillance cameras; enforce strong and unique credentials and disable default passwords; segment IoT devices from core networks; monitor network traffic for unusual connections from camera systems; deploy intrusion detection or prevention mechanisms and prioritize patching of disclosed vulnerabilities.
Data Breach / Financial Data Leak
No IoCs reported.
A data leak involving the Ariomex cryptocurrency exchange exposed a database containing information on over 11,800 users, including identities, emails, IP addresses, and cryptocurrency transaction records between 2022–2025. The data reportedly surfaced on dark web forums and may enable tracking of financial activity associated with Iranian users and entities. Initial analysis suggests the breach may have originated from a compromised customer support system, potentially exposing transaction patterns and incomplete or altered KYC information.
Not specified
Global users of the platform
Not attributed
Finance / Cryptocurrency
T1078 – Valid Accounts (account access abuse); T1190 – Exploit Public-Facing Application (system compromise); T1567 – Exfiltration Over Web Services (data leak)
Medium
Implement strong access controls and MFA across all financial platforms; enhance monitoring and logging to detect anomalous access to customer databases; conduct regular security assessments of customer support systems and external-facing services; deploy data loss prevention (DLP) controls to protect sensitive financial information; monitor dark web sources for potential exposure of organizational data.
Cyber Espionage / Network Intrusion
No IoCs reported.
A sustained intrusion campaign attributed to an Iranian state-linked threat actor targeted several U.S. organizations across finance, transportation, and software sectors. The attackers reportedly established persistent access within victim networks, embedding a custom implant that allows remote control and long-term intelligence collection. The activity began in early 2026 and intensified following geopolitical tensions, suggesting pre-positioning within networks for potential data exfiltration or future disruptive activity.
Custom backdoor implant
United States
MuddyWater
Finance, IT, Transportation
T1598 – Phishing; T1190 – Exploit Public-Facing Application; T1078 – Valid Accounts; T1059 – Command & Scripting
High
Enhance monitoring for unusual outbound traffic and lateral movement; enforce multi-factor authentication across all privileged accounts; regularly patch external-facing systems and services; deploy endpoint detection and response (EDR) to identify persistence mechanisms; conduct security awareness training to reduce phishing risks; implement intrusion detection/prevention systems (IDS/IPS) and proactive threat hunting for indicators linked to MuddyWater activity.
Cyber Espionage / IoT Surveillance Intrusion
No IoCs reported.
Reports indicate a cyber-enabled intelligence operation in which traffic camera infrastructure in Iran was compromised to enable surveillance and tracking of high-value individuals. The operation allegedly leveraged access to internet-connected cameras to monitor movement patterns and gather real-time situational intelligence. The activity highlights how IoT and surveillance infrastructure can be exploited for reconnaissance and intelligence collection supporting broader geopolitical or military objectives.
Compromised traffic camera systems (IoT devices)
Iran
State-linked actor
Government, Critical Infrastructure
T1190 – Exploit Public-Facing Application; T1078 – Valid Accounts; T1189 – Drive-by Compromise
Medium
Secure internet-connected cameras and IoT devices by disabling direct internet exposure; enforce strong authentication and device-level encryption; apply firmware updates and patch known vulnerabilities; segment surveillance infrastructure from enterprise networks; monitor access logs and network traffic for anomalous device activity; conduct regular security assessments of IoT deployments in critical environments.
Cyber Espionage / IoT Surveillance Intrusion
No IoCs reported.
Reports indicate a cyber-enabled intelligence operation in which traffic camera infrastructure in Iran was compromised to enable surveillance and tracking of high-value individuals. The operation allegedly leveraged access to internet-connected cameras to monitor movement patterns and gather real-time situational intelligence. The activity highlights how IoT and surveillance infrastructure can be exploited for reconnaissance and intelligence collection supporting broader geopolitical or military objectives.
Compromised traffic camera systems (IoT devices)
Iran
State-linked actor
Government, Critical Infrastructure
T1190 – Exploit Public-Facing Application; T1078 – Valid Accounts; T1189 – Drive-by Compromise
Medium
Secure internet-connected cameras and IoT devices by disabling direct internet exposure; enforce strong authentication and device-level encryption; apply firmware updates and patch known vulnerabilities; segment surveillance infrastructure from enterprise networks; monitor access logs and network traffic for anomalous device activity; conduct regular security assessments of IoT deployments in critical environments.
Operation CandleStone – Cyber Espionage / Spear-Phishing Campaign
health-beauty-skin-care[.]com abudhabspacedebate[.]com abudhbispacedebate[.]com huammings[.]com
An active cyber-espionage campaign attributed to a state-linked threat actor targeting organizations in the UAE’s aerospace, defense, government, and energy sectors. The operation uses spear-phishing emails themed around the Abu Dhabi Space Debate to deliver malicious archives containing VHD files designed to bypass Windows Mark-of-the-Web protections. Once executed, the attack chain leverages DLL sideloading to deploy the CandleStone backdoor and supporting malware, enabling reconnaissance, credential theft from Chromium-based browsers, and encrypted command-and-control communications. Analysts assess the activity may represent early-stage intelligence collection potentially preceding more disruptive operation
Phoenix v4 RAT; Chromium credential stealer; FakeUpdate loader
United Arab Emirates
APT33 (Peach Sandstorm / Elfin / Magnallium / Refined Kitten)
Government, Aerospace, Defense, Energy
T1566.001 – Spear-phishing attachment; T1553.005 – Mark-of-the-Web bypass; T1574.002 – DLL sideloading; T1071.001 – Web-based C2
High
Block identified campaign domains; restrict mounting of VHD/ISO disk images through Group Policy; monitor for abnormal execution of mounted disk content and LNK files; hunt for dxgi.dll loaded by ApplicationFrameworkHost.exe; deploy EDR detection for DLL sideloading behavior and suspicious outbound connections; strengthen phishing detection and user awareness controls.
RedAlert – Mobile Espionage / Trojanized Application Campaign
No IoCs reported.
A mobile espionage campaign exploiting the conflict by distributing a trojanized version of the legitimate Rocket Alert application used for missile warning notifications. The malicious application targets civilians by masquerading as the official alert app while covertly collecting sensitive personal data, device information, and geolocation data. The campaign leverages heightened public reliance on emergency warning systems during conflict to trick users into installing the malicious application, enabling surveillance and intelligence collection.
Trojanized Rocket Alert Android application (mobile spyware)
Israel, Iran
Not attributed
Government, Civilian
T1588.002 – Malicious Tool Acquisition; T1189 – Drive-by / Malicious App Distribution; T1057 – Mobile Device Monitoring
High
Only install mobile applications from official app stores and verify developer authenticity; review and restrict excessive application permissions; deploy Mobile Threat Defense (MTD) solutions to detect malicious apps; educate users about risks of installing apps from external sources; verify emergency alerts and applications through official government channels.
Ransomware Activity / Data Leak Operations
No IoCs reported
Threat monitoring in early March 2026 observed continued ransomware activity and dark web–related operations. The Morpheus ransomware group reportedly targeted a manufacturing organization, while another ransomware actor resumed activity by re-publishing previously stolen victim data on leak sites to increase extortion pressure. Additionally, multiple hacktivist-style cyber activities were observed targeting organizations in regions affected by the ongoing conflict. These activities indicate a combination of financially motivated ransomware operations and politically themed cyber disruptions.
Morpheus ransomware
South Korea; Middle East region
Not attributed
Manufacturing
T1486 – Data Encrypted for Impact; T1567 – Data Exfiltration; T1499 – Service Disruption
Medium
Maintain secure and regularly tested offline backups; enforce multi-factor authentication across critical systems; apply timely patching to reduce ransomware exposure; monitor networks for indicators of data exfiltration and unusual traffic patterns; strengthen logging, intrusion detection, and threat hunting capabilities; monitor dark web sources for potential exposure of organizational data.
Cyber Espionage Campaign / Spear-Phishing Intrusion
b8254efd859f5420f1ce4060e4796c08 8621be9e1aa730d1ac8eb06fa8f66d9da70ff293 903f7869a94d88d43b9140bb656f7bb86ef725efc78ef2ff9d12fd7c7c2aca74 78275f3fc7e209b85bff6a6f99acc68a Fc08f8403849c6233978a363f4cdc58cd7041823 6bb0d45799076b3f2d7f602b978a0779868fc72a1188374f6919fbbfba23efce d5ddf40ba2506c57d3087d032d733e08 682c043443cb81b6c2fde8c5df43333f5d1fec53 797325b3c8a9356dcace75d93cb5cfb7847d2049c66772d4cc2cee821618cb96 8f44262afaa171b78fc9be20a0fb0071 1debc4c512ded889464e386739d5d2f61b87ff13 293ee1fe8d36aa79cf1f64f5ddef402bc6939d229c6fca955c7b796119564779 19ab3fd2800f62a47bf13a4cc4e4c124 c79c261457def606c3393dde77c82832a5c0ded3 ad26cd72a83b884a8bc5aaa87309683953e151ebb3fde42eda7bf9a4406e530d 63702bd6422ec2d5678d4487146ea434 c7dff3a0675f330feb9a7c469f8340369451d122 f3f2dc31f70a105db161a5e7b463b2215d3cbd64ac0146fd68e39da1c279f7ef aa887d32eb9467abba263920e55d6abe ad97e1bba1d040a237727afdb2787d6867d72b74 6af71297ce7681e64d9a4c5449a7326f17f3f107cb7940ec5e0840390c457a47 b19add5ccaa17a1308993e6f3f786b06 51a746c85bd486f223130173b7e674379a51b694 69294ad90aeb7f05e501e7191c95beb14e23da5587dd75557c867e2944a57fdc 7f17fa22feaced1a16d4d39c545cdb16 369b56a89b2fce2cbdc36f5a23bdec6067242911 fa51aff99d86a9f1f65aa0ebbf6ca40411d343cea59370851ab328b97e2164bb 70a9b537b9b7e1b410576d798e6c5043 cb1760c90fb6c399e0125c7aa793efe37c4ce533 a27d53608ab05b5c7cb86bcf4a273435238beeb7e7efd7845375b2aa765f51e2 a7561eb023bb2c4025defcfe758d8ac2 df04e36c106691f9fe88e5798e4ae86438bd4f1d eb5b7275c41de8e98d72696eeac9cba3719f334f8e7974e6b8760ece820b1d0c 809139c237c4062baecab43570060d67 8735ee29c409b8d101eb3170f011455be41b7a91 3a66ae5942f6feb79cf81ee70451f761253e0e0bde95f0840abdd42a804fad39 lecturegenieltd[.]pro meetingapp[.]site afterworld[.]store girlsbags[.]shop onlinepettools[.]shop web14[.]info web27[.]info
A cyber-espionage campaign targeting government officials through social-engineering lures such as fake government documents and meeting invitations. The intrusion delivers previously undocumented .NET-based malware families enabling command execution, file transfer, and remote system control through command-and-control infrastructure. Observed techniques include DLL sideloading, PowerShell execution, registry modification, delayed execution, and obfuscated network communication. The activity indicates a targeted intelligence-gathering operation using compromised infrastructure and advanced evasion methods.
SPLITDROP; TWINTASK; TWINTALK; GHOSTFORM
Iraq
Dust Specter (suspected state-linked)
Government, Administration
T1583.001 – Infrastructure Acquisition; T1587.001 – Malware Development; T1204.004 – User Execution; T1112 – Registry Modification; T1574.002 – DLL Sideloading; T1071.001 – Web-based C2
High
Implement application allow-listing to prevent unauthorized DLL sideloading; block password-protected archives from unverified senders; enable PowerShell script block logging and monitor registry Run keys for persistence; inspect outbound HTTPS traffic for anomalous URI patterns or unusual authentication headers; regularly patch systems and maintain updated endpoint protection; conduct user awareness training to identify phishing attempts.
Cyber Threat Escalation / Early Warning
No IoCs reported.
Threat intelligence reporting indicates a heightened risk of destructive cyber activity following ongoing geopolitical tensions. Analysts assess that cyber operations may focus on critical infrastructure sectors, including energy, transportation, communications, government, finance, water, and healthcare. The anticipated activity may prioritize disruptive or destructive actions rather than intelligence collection, potentially accompanied by information manipulation campaigns. While large-scale systemic disruption is considered less likely, organizations with exposed or poorly protected infrastructure may face increased targeting risk.
Not specified
Multiple regions
State-linked actors (not specified)
Energy, Finance, IT, Government, Healthcare, Transportation, Water
T1485 – Data Destruction; T1490 – Inhibit System Recovery; T1562.001 – Impair Defenses; T1562.003 – Disable Security Tools
Medium
Strengthen defenses across critical infrastructure environments; review and update incident response and business continuity plans; ensure strong network segmentation and secure backups; enhance monitoring for abnormal system behavior; conduct vulnerability management and patching for internet-exposed systems; maintain executive awareness and ongoing threat intelligence monitoring.

Mar 4, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
AI-Enabled Cyber Operations / Emerging Threat Landscape
No specific IoCs reported.
Threat intelligence reporting highlights the increasing use of AI to automate cyber operations, enabling rapid exploit development, network reconnaissance, phishing campaigns, and deepfake-enabled social engineering. Nation-state actors and cybercriminal groups are leveraging AI and Living-off-the-Land (LotL) techniques to conceal malicious activity within trusted cloud services and accelerate attack timelines. The report also notes a rise in token theft campaigns and large-scale DDoS attacks reaching record traffic volumes.
LummaC2; Aisuru; Cloud service abuse (Google Drive, Microsoft Teams, Amazon S3)
Not specified
Salt Typhoon; Linen Typhoon; FrumpyToad; PunyToad; NastyShrew; PatheticSlug; CrustyKrill
IT; Government; Telecommunications; Finance
T1598 – Phishing; T1078 – Valid Accounts; T1190 – Public-Facing Exploit; T1027 – Obfuscation; T1059.001 – Command Execution; T1071.001 – Web Communication
High
Deploy autonomous and AI-assisted defense capabilities; enforce strong email authentication controls (DMARC, DKIM, SPF); implement Zero Trust access policies across SaaS platforms; continuously audit third-party API integrations; strengthen monitoring for token theft and suspicious cloud service activity; conduct proactive threat hunting and maintain robust incident response procedures.
Operation Epic Fury / Cyber Conflict Escalation Advisory
N/A
Following the launch of Operation Epic Fury on February 28, 2026, involving coordinated military and cyber operations, analysts assess an increased likelihood of retaliatory cyber activity and disruptive operations linked to the geopolitical escalation. While no specific malware or threat actors have been confirmed, the conflict raises the probability of cyber espionage, disruption, and destructive attacks targeting government systems, energy infrastructure, and military-related organizations.
N/A
Iran; United States; Israel; Middle East
Not attributed
Government; Military; Energy
Potential tactics may include Phishing (T1566), Public-Facing Exploitation (T1190), and Valid Account Abuse (T1078)
High
Review and test incident response plans for nation-state attack scenarios; enforce multi-factor authentication and strong access controls; strengthen network segmentation and monitoring; patch critical vulnerabilities promptly; conduct proactive threat hunting and share threat intelligence with trusted partners to detect potential retaliatory cyber operations.
Cyber Espionage / AI-Assisted Malware Campaign
No specific IoCs reported.
Targeted campaign against Iraqi government officials leveraging phishing and social engineering to deliver AI-assisted custom .NET malware. The attack chains combine DLL sideloading, in-memory PowerShell execution, and ClickFix-style lures impersonating Iraq’s Ministry of Foreign Affairs. Attackers also leveraged compromised government infrastructure to increase credibility and deliver payloads, suggesting a coordinated espionage effort designed to evade detection and maintain persistence.
Custom .NET malware; PowerShell; DLL sideloading
Iraq
Dust Specter (Iran-linked)
Government
T1566.001 – Phishing; T1059.001 – PowerShell Execution; T1574.002 – DLL Sideloading; T1105 – Tool Transfer
High
Deploy advanced email filtering and phishing detection; use EDR solutions to detect DLL sideloading and in-memory execution; regularly patch systems and applications; strengthen network segmentation; conduct targeted security awareness training for government personnel; monitor networks for suspicious behavior and anomalous PowerShell activity.
Cyber Activity Surge / Conflict-Related Threat Landscape
No IoCs reported.
Increased cyber activity has been observed following recent geopolitical tensions, including hacktivist-style activity, psychological operations, opportunistic phishing campaigns, and exploitation of public-facing systems. Some incidents include application defacement, broadcast intrusions, and temporary internet connectivity disruptions, while other threat actors appear to be leveraging the broader conflict as a theme for phishing and malware distribution. Analysts highlight a potential delayed activation pattern, where initial access may be established in advance and used later for disruptive or destructive operations.
Not specified
Middle East region
Not attributed
Finance, Energy, IT, Government
T1566 – Phishing; T1190 – Exploit Public-Facing Application; T1562 – Impair Defenses; T1485 – Data Destruction; T1486 – Data Encrypted for Impact; T1133 – External Remote Services
Medium
Strengthen cyber hygiene through timely patching and vulnerability management; enforce multi-factor authentication (MFA) across remote access services; reduce exposure of internet-facing systems; maintain regular security awareness training; implement strong backup and recovery procedures; leverage security monitoring tools such as SIEM, NDR, and deception technologies; enhance threat intelligence sharing and continuous exposure monitoring.
Hacktivism / Distributed Denial-of-Service (DDoS) Campaign
No IoCs reported.
A surge in hacktivist cyber activity has been observed following escalating regional tensions, with 149 DDoS attacks impacting approximately 110 organizations across 16 countries within a short time frame. The activity appears coordinated and primarily focused on service disruption rather than long-term compromise. Analysts note that a small number of hacktivist groups were responsible for a significant portion of the attacks, indicating organized campaigns leveraging DDoS techniques to disrupt online services and increase visibility during the broader conflict environment.
DDoS attack infrastructure
Multiple regions
Keymous+; DieNet
Multiple sectors
T1499 – Endpoint/Service Disruption (DDoS); T1190 – Exploit Public-Facing Application; T1566 – Phishing (potential initial access)
Medium
Deploy DDoS mitigation services and traffic filtering; monitor network traffic for abnormal spikes and volumetric attacks; maintain updated incident response procedures for service disruption scenarios; regularly patch internet-facing systems; strengthen security awareness programs to reduce phishing risks; implement centralized logging and monitoring to quickly detect coordinated attack activity.
Cyber Espionage Campaign / Spear-Phishing Intrusion
No IoCs reported
A targeted cyber-espionage campaign against government officials using social-engineering lures such as password-protected archives disguised as official documents and fake online forms to deliver newly observed malware families. The intrusion chain uses DLL sideloading through legitimate applications, PowerShell execution, registry persistence, and encrypted command-and-control communications. The malware supports remote command execution, file transfer, and system control. Analysts also noted indicators suggesting automated or AI-assisted malware development techniques within the tooling used in the campaign.
SPLITDROP; TWINTASK; TWINTALK; GHOSTFORM
Iraq
Dust Specter (suspected state-linked)
Government
T1566 – Phishing; T1204 – User Execution; T1059.001 – PowerShell Execution; T1574 – DLL Sideloading; T1105 – Ingress Tool Transfer; T1071 – Web Protocol C2; T1027 – Obfuscation
High
Implement application allow-listing to prevent unauthorized DLL sideloading; block password-protected archives from untrusted senders; enable PowerShell script block logging and monitor registry persistence locations; inspect outbound HTTPS traffic for anomalous URI patterns or unusual authentication headers; maintain regular patching and endpoint monitoring; conduct user awareness training to reduce phishing risk.
Cyber Espionage & Infrastructure Targeting / Reconnaissance Activity
No IoCs reported
Threat intelligence reporting indicates an increase in cyber activity targeting critical infrastructure sectors, including manufacturing and transportation. The activity appears to focus on early-stage reconnaissance and network positioning, with attackers attempting to identify vulnerable systems and establish initial access that could later support espionage, disruption, or destructive operations. Observed techniques include default credential abuse, valid account exploitation, brute-force attempts, and network scanning to map target environments and identify exploitable services.
Not specified
Middle East region; Global organizations with regional exposure
MuddyWater; OilRig (APT34); APT33; UNC1549
Manufacturing, Transportation, Energy, Government, Finance, Aerospace, Aviation, Telecommunications
T1110 – Brute Force; T1078 – Valid Accounts; T1046 – Network Service Discovery; T1595 – Active Scanning
High
Reduce external attack surface by eliminating default credentials and restricting remote access services; enforce multi-factor authentication for privileged accounts; apply network segmentation and monitor lateral movement; prioritize patching of exposed vulnerabilities and monitor systems that cannot be patched; deploy continuous monitoring and anomaly detection for industrial and enterprise networks; leverage threat intelligence to detect reconnaissance and pre-positioning activity early.
Cyber Espionage / IoT Surveillance Targeting
CVE-2017-7921; CVE-2021-36260; CVE-2023-6895; CVE-2025-34067; CVE-2021-33044
Security researchers observed targeting of internet-exposed IP cameras across several Middle East countries, likely to support reconnaissance and situational monitoring during a period of heightened regional tensions. The activity involves attempts to exploit known vulnerabilities in surveillance devices manufactured by Hikvision and Dahua, potentially enabling unauthorized access to video feeds. Such access may provide attackers with visual intelligence and operational awareness, demonstrating how compromised IoT devices can be leveraged to support broader cyber or operational objectives.
Compromised IP cameras (Hikvision, Dahua)
Middle East region (including UAE, Qatar, Bahrain, Kuwait, Cyprus, Lebanon, Israel)
Not attributed
Government, Infrastructure, Surveillance systems
T1595 – Active Scanning; T1190 – Exploit Public-Facing Application; T1046 – Network Service Discovery; T1071 – Application Layer Protocol
High
Remove direct internet exposure for surveillance cameras; place devices behind VPN or zero-trust gateways; enforce strong unique credentials and disable default passwords; apply firmware updates and security patches; segment camera networks from corporate and operational systems; monitor logs for repeated authentication failures or abnormal outbound connections; replace unsupported or end-of-life devices.

Mar 3, 2026

Campaign
IoC
Campaign Scope
Malware/ Tools
Targeted Country
Threat Actor
Sector
MITRE ATT&CK Techniques
Threat Severity
Recommendation
Hacktivism / Coordinated Cyber Activity
No IoCs reported.
Increased hacktivist activity has been observed amid ongoing geopolitical tensions, with multiple groups conducting cyber operations such as website defacements, distributed denial-of-service (DDoS) attacks, and limited data disclosures. Organizations perceived as linked to the wider conflict have been targeted. While the immediate operational impact has remained limited, the growing frequency of these incidents suggests potential for further escalation.
Not specified
Middle East region
Not attributed
Multiple sectors
T1499 – Endpoint/Service Disruption (DDoS); T1491 – Defacement; T1190 – Exploit Public-Facing Application; T1566 – Phishing
Medium
Increase monitoring of public-facing applications and services; deploy DDoS mitigation and web application firewall (WAF) protections; regularly patch externally exposed systems and applications; enforce strong authentication and access controls; monitor website integrity for unauthorized changes; maintain updated incident response procedures and conduct user awareness training against phishing and social engineering.
Hybrid Conflict-Related Cyber Activity / Multi-Actor Operations
No IoCs reported.
Ongoing geopolitical tensions have led to an increase in hybrid cyber activity combining cyber intrusions, information manipulation, and opportunistic cybercrime. Observed activity includes phishing campaigns, credential theft, DDoS attacks, website defacements, and data theft operations carried out by a mix of state-linked actors, hacktivist groups, and financially motivated cybercriminals. Analysts note that the broader conflict environment is being leveraged by multiple actors to conduct disruptive cyber operations and opportunistic attacks across digital infrastructure.
RedAlert APK (mobile spyware referenced in related activity)
Middle East region
Multiple threat actors
Government, Military, Finance, IT
T1566 – Phishing; T1486 – Data Theft/Impact; T1490 – Inhibit System Recovery; T1562 – Impair Defenses; T1190 – Exploit Public-Facing Application
Medium
Strengthen monitoring for credential theft and phishing activity; implement robust DDoS mitigation and web application protections; enforce multi-factor authentication across critical systems; apply network segmentation to reduce lateral movement; conduct regular security audits and vulnerability management; enhance incident response preparedness and threat intelligence sharing to detect emerging hybrid cyber threats.
Critical Infrastructure Disruption / Physical–Digital Impact
No IoCs reported
Reports indicate physical attacks targeting data center infrastructure in the Gulf region, leading to temporary disruption of cloud services relied upon by organizations across multiple sectors. The incident highlights the interdependency between physical infrastructure and digital services, where disruptions to data center facilities can impact availability of cloud platforms, enterprise applications, and online services. The situation demonstrates how kinetic events can have downstream digital and operational effects on cloud-dependent organizations.
Not specified
Gulf region (UAE, Bahrain)
Not attributed
IT, Cloud Services
T1499 – Endpoint/Service Disruption; T1485 – Data Destruction (service disruption impact); T1490 – Inhibit System Recovery
High
Review business continuity and disaster recovery plans for cloud service outages; implement geographically distributed infrastructure and failover mechanisms; enhance monitoring and alerting for service disruptions; maintain redundancy for critical workloads; conduct risk assessments covering both cyber and physical infrastructure dependencies; ensure incident response procedures address large-scale service availability incidents.
Cyber Risk Advisory / Heightened Threat Environment
No IoCs reported
Security researchers issued a “Shields Up” advisory highlighting increased cyber risk associated with an ongoing geopolitical conflict. The advisory emphasizes that organizations should anticipate potential disruptive cyber activity linked to the evolving situation. While no specific malware, campaigns, or threat actors were identified, the warning reflects a heightened threat environment where cyber operations may accompany broader geopolitical developments. Organizations are advised to increase vigilance, strengthen monitoring, and proactively prepare for potential cyber incidents.
Not specified
Not specified
Not specified
Cross-sector
N/A
Medium
Review and strengthen cybersecurity posture by enforcing multi-factor authentication, prioritizing patching of critical vulnerabilities, and increasing logging and monitoring across networks and endpoints. Validate incident response and disaster recovery plans, ensure reliable offline backups, reduce external attack surface, and maintain awareness of emerging threats through threat intelligence monitoring.
Cyber Threat Escalation / Multi-Actor Cyber Operations
No IoCs reported
Intelligence reporting highlights increased cyber activity associated with ongoing regional instability, including disruptive cyber operations targeting digital and physical infrastructure. Observed activity includes DDoS attacks, data exfiltration attempts, phishing campaigns, and potential destructive operations affecting cloud infrastructure and critical services. Multiple threat clusters appear to be operating concurrently, using varied techniques to disrupt services and gather intelligence during a period of heightened geopolitical tension. The evolving situation indicates a sustained risk of cyber disruption across infrastructure and enterprise networks globally.
Not specified
Global / Multiple regions
Multiple threat clusters
Energy, Finance, Government, Critical Infrastructure
T1566 – Phishing; T1567 – Data Exfiltration; T1190 – Exploit Public-Facing Application; T1499 – Service Disruption (DDoS); T1485 – Data Destruction
High
Strengthen cyber resilience by reviewing incident response and business continuity plans; enforce multi-factor authentication and strict access controls; apply network segmentation to protect critical systems; maintain secure offline backups; enhance monitoring and anomaly detection across cloud and enterprise environments; prioritize patching of exposed vulnerabilities and leverage threat intelligence feeds to detect emerging threats.
State Cyber Operations / Strategic Cyber Warfare Activity
Public statements indicate that cyber operations are increasingly integrated with broader military strategies, highlighting the role of offensive cyber capabilities alongside traditional military actions. While specific technical details or targets were not disclosed, the development reflects the growing role of cyber operations as a strategic component of modern conflict, potentially involving disruption of systems, intelligence gathering, or defense impairment activities. The announcement signals a shift toward greater transparency regarding the operational importance of cyber capabilities in national security contexts.
Not specified
Not specified
State-linked actors
Government, Military
T1562.001 – Impair Defenses; T1005 – Data from Local System
Medium
Strengthen cyber resilience across critical systems through network segmentation and endpoint protection; deploy intrusion detection and prevention systems (IDS/IPS); enhance continuous monitoring and threat intelligence sharing; conduct regular security assessments and threat hunting exercises; integrate physical and cyber security planning to address hybrid threat scenarios.
Conflict-Related Cyber Activity Monitoring
No IoCs reported
Security researchers are monitoring cyber activity associated with an ongoing regional conflict. While large-scale cyber impacts have not yet been observed, minor incidents such as website defacements and small-scale distributed denial-of-service (DDoS) attacks have occurred. Analysts expect continued cyber espionage, disruptive operations, and potential hack-and-leak campaigns as the situation evolves. Opportunistic actors are also exploiting the situation for phishing and social-engineering campaigns. The activity currently appears regionally focused but may affect organizations indirectly through supply chains, partners, or exposed public-facing systems.
Not specified
Middle East (regional impact)
MuddyWater (suspected activity referenced)
Cross-sector
T1566 – Phishing; T1190 – Exploit Public-Facing Application
Medium
Strengthen security hygiene by enforcing multi-factor authentication and applying timely security patches. Increase monitoring for abnormal activity and protect public-facing assets with web application firewalls and DDoS mitigation. Conduct third-party risk assessments, particularly for suppliers or partners operating in affected regions. Provide employee awareness training on phishing and social-engineering attempts that may reference ongoing geopolitical events.
Threat Landscape Advisory / Increased Cyber Activity
No IoCs reported
Security researchers report an escalation in cyber activity associated with actors linked to Iran, including phishing campaigns, hacktivist operations, and financially motivated cybercrime. The activity reflects a broadening operational scope targeting multiple sectors and organizations globally. While specific tools, malware, or technical indicators were not detailed, analysts warn of a potential increase in disruptive or destructive cyber operations as geopolitical tensions continue. The advisory highlights the need for heightened vigilance and proactive defensive measures across enterprise environments.
Not specified
Not specified
Not specified
Cross Sector
T1566 – Phishing
Medium
Strengthen phishing defenses through email filtering, user awareness training, and multi-factor authentication. Increase monitoring for suspicious network behavior and unauthorized access attempts. Ensure timely patching of vulnerabilities, implement network segmentation to limit lateral movement, and maintain robust logging and alerting to support rapid incident detection and response. Organizations should review and test incident response procedures to ensure readiness for potential cyber incidents.
Conflict-Driven Cyber Operations / Hacktivist Activity
No IoCs reported
A coordinated military campaign triggered a significant escalation in cyber activity across multiple regions. The situation involved a combination of state-aligned actors, hacktivist collectives, and cybercriminal groups conducting disruptive cyber operations. Observed activity includes phishing campaigns distributing a malicious mobile application masquerading as a legitimate alert app, distributed denial-of-service (DDoS) attacks, infrastructure compromises, and threats targeting organizations and individuals. Analysts also observed coordination among hacktivist groups through centralized channels, highlighting a broader mobilization of cyber actors responding to geopolitical events.
RedAlert (malicious mobile application)
Iran, Israel, Jordan, UAE, Saudi Arabia, Bahrain, Canada, United States
Handala Hack, Cyber Islamic Resistance, NoName057(16), Russian Legion, Tarnished Scorpius
Energy, Finance, Government, Defense, Payment, Industrial
T1566 – Phishing; T1598 – Phishing to Deliver Malware; T1190 – Exploit Public-Facing Application; T1041 – Exfiltration Over C2 Channel
High
Strengthen defenses against phishing and mobile malware by educating users to avoid installing applications from untrusted sources and verifying official app publishers. Maintain fully patched and hardened internet-facing systems and deploy web application firewalls and DDoS protection. Implement strong monitoring for anomalous network activity and potential data exfiltration. Maintain reliable offline backups and review incident response and business continuity plans to ensure resilience against coordinated cyber disruptions.
Physical Attack Impacting Cloud Infrastructure / Cyber-Physical Risk Event
No IoCs reported
Physical attacks targeting cloud infrastructure resulted in damage to data center facilities in the UAE and Bahrain, leading to service disruptions affecting multiple cloud services across the Middle East. The incident highlights how physical attacks on critical digital infrastructure can cause cascading effects on organizations relying on cloud services, including application outages, degraded performance, and operational disruption. The event underscores the growing convergence of physical and digital threats affecting critical technology infrastructure.
Not specified
UAE, Bahrain
Not specified
IT, Cloud Services
T1485 – Data Destruction; T1490 – Inhibit System Recovery
High
Organizations relying on cloud services should review disaster recovery and business continuity plans to ensure rapid failover to alternative regions or providers. Implement monitoring and alerting for service disruptions, maintain redundant infrastructure where possible, and ensure backups are securely stored across geographically distributed locations. Data center operators should strengthen physical security controls, including perimeter monitoring, surveillance, and access management, while regularly assessing resilience against cyber-physical threat scenarios.
Conflict-Driven Cyber Activity / Retaliatory Cyber Campaign
No IoCs reported
Following coordinated military operations on February 28, 2026, analysts reported the emergence of a retaliatory cyber campaign associated with the broader conflict. The activity is described as multi-vector and rapidly expanding, indicating a potential escalation of cyber operations alongside physical hostilities. While specific technical details, malware, or intrusion methods were not disclosed, the situation reflects the increasing integration of cyber operations into modern conflict scenarios and highlights the potential for disruption targeting organizations and infrastructure connected to the affected regions.
Not specified
United States, Israel
Not specified
Cross-sector
N/A
Medium
Organizations should review and strengthen incident response and business continuity plans to prepare for potential disruptions to services and infrastructure. Implement network segmentation, enforce multi-factor authentication, and maintain continuous monitoring of network activity. Prioritize patching of critical systems, enhance threat intelligence monitoring, and collaborate with industry and government partners to remain informed of emerging risks associated with ongoing geopolitical developments.
Potential Cyber Counteroffensive / Conflict-Driven Threat Activity
No IoCs reported
Security researchers warn of potential cyber counteroffensive operations following a major military campaign. Multiple Iran-linked threat actors are believed to be preparing disruptive cyber activity targeting critical infrastructure and opportunistic organizations. Observed behavior includes reconnaissance, vulnerability exploitation of internet-facing systems, and staging activity that could precede destructive attacks such as wiper malware or ransomware. Analysts also report the potential for increased botnet-driven disruption and distributed denial-of-service (DDoS) activity as part of broader retaliation campaigns aligned with geopolitical tensions.
Not specified
United States, Israel, Global
Altoufan Team, HANDALA, Banished Kitten, CyberAv3ngers, APT34, MuddyWater, APT42, Cotton Sandstorm, APT35, Agrius, Imperial Kitten
Energy, Telecommunications, Government, Critical Infrastructure, Transportation, Logistics
T1566 – Phishing; T1190 – Exploit Public-Facing Application; T1486 – Data Encrypted for Impact; T1490 – Inhibit System Recovery
High
Prioritize patching of vulnerabilities in internet-facing systems and strengthen monitoring for abnormal network activity. Implement strong multi-factor authentication and reduce external attack surface where possible. Prepare for potential DDoS activity by deploying mitigation services and traffic filtering. Conduct proactive threat hunting for indicators linked to known threat actor tactics, ensure reliable offline backups are maintained, and regularly review incident response and business continuity plans to maintain operational resilience.
Distributed Denial-of-Service (DDoS) Attack Claim
No technical IoCs reported
A threat actor known as 313 Team claimed responsibility for cyberattacks targeting the official websites of the Kuwait Ports Authority and the Ministry of Electricity and Water. According to the claim, the attacks resulted in temporary disruption of the Kuwait Ports Authority website for approximately one hour and a complete shutdown of the Ministry of Electricity and Water website during the attack window. The activity appears to involve disruptive operations against public-facing government services, likely intended to cause service outages and signal operational capability.
Not specified
Kuwait
313 Team / The Islamic Cyber Resistance
Government, Public Services
T1498 – Network Denial of Service
Medium
Implement or reinforce DDoS mitigation services to protect public-facing infrastructure. Monitor network traffic for abnormal spikes and volumetric anomalies indicative of denial-of-service activity. Enable rate limiting and deploy Web Application Firewall (WAF) protections to filter malicious traffic. Establish and regularly test incident response procedures specifically designed for DDoS scenarios to ensure rapid service restoration.
Potential Cyber Counteroffensive / Threat Activity Advisory
No IoCs reported
Analysts warn of potential cyber counteroffensive operations following a major geopolitical escalation. Multiple Iran-linked threat actors are expected to increase cyber operations targeting critical infrastructure and opportunistic organizations globally. Historical behavior indicates these groups may shift from espionage to disruptive or destructive attacks, including wiper malware, ransomware-style operations, vulnerability exploitation, and botnet-driven DDoS campaigns. Recent reporting indicates reconnaissance, probing, and staging activities that may precede broader cyber operations.
Not specified
United States, Israel, Global
Altoufan Team, HANDALA, Banished Kitten, CyberAv3ngers, APT34, MuddyWater, APT42, APT35, Agrius
Energy, Telecommunications, Government, Defense, Transportation, Logistics, Water
T1566 – Phishing; T1190 – Exploit Public-Facing Application; T1486 – Data Encrypted for Impact; T1133 – External Remote Services; T1562 – Impair Defenses
High
Prioritize patching vulnerabilities in internet-facing systems and reduce external attack surface. Strengthen monitoring for reconnaissance and anomalous network activity. Implement multi-factor authentication and intrusion detection systems to prevent unauthorized access. Prepare for potential DDoS activity by deploying mitigation services and traffic filtering. Conduct proactive threat hunting and regularly review incident response plans to maintain resilience against disruptive cyber operations.
Hacktivist Cyber Campaign / Conflict-Driven Cyber Activity
hxxps:www[.]shirideitch[.]com/wp-content/uploads/2022/06/RedAlert[.]apk hxxps://api[.]ra-backup[.]com/analytics/submit[.]php hxxps://bit[.]ly/4tWJhQh
Analysts report a surge in cyber activity linked to multiple hacktivist groups aligned with regional geopolitical narratives. Despite domestic internet disruption affecting coordination of some operations, affiliated groups and external proxies continue launching disruptive campaigns including DDoS attacks, phishing campaigns, ransomware incidents, hack-and-leak operations, and claims of infrastructure compromise. Targets reportedly include government institutions, financial services, defense systems, and critical infrastructure across the Middle East and partner nations. The activity remains dynamic, with continued disruptive and opportunistic cyber operations expected.
RedAlert (malicious APK)
Jordan, Kuwait, Saudi Arabia, United Arab Emirates, Bahrain, Turkey, United States, Canada
Handala Hack; Cyber Islamic Resistance; RipperSec; Cyb3rDrag0nzz; Dark Storm Team (DarkStorm/MRHELL112); FAD Team (Fatimiyoun Cyber Team); Evil Markhors; Sylhet Gang (SG); 313 Team (Islamic Cyber Resistance in Iraq); DieNet
Government, Administration, Defense, Finance, Military, Banking, Energy, Health, Industrial
T1566.002 – Spearphishing Link; T1498 – Network Denial of Service; T1486 – Data Encrypted for Impact; T1485 – Data Destruction; T1041 – Exfiltration Over C2 Channel
High
Strengthen monitoring of internet-facing infrastructure and enable real-time alerting for abnormal activity. Immediately patch and harden exposed systems and enforce multi-factor authentication across privileged accounts. Deploy robust DDoS protection and traffic filtering mechanisms to mitigate volumetric attacks. Conduct regular phishing awareness training to reduce social-engineering risk. Maintain secure offline backups of critical data and test restoration procedures regularly. Continuously monitor for unauthorized access, data-leak claims, or suspicious network behavior and ensure incident response and business continuity plans are ready to address potential disruptions.

Vulnerability Watchlist

Apr 28, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-41636
Apache Thrift (Node.js bindings)
High
Fixed in version 0.23.0; versions prior to 0.23.0 are vulnerable to uncontrolled recursion leading to potential denial of service
Upgrade Apache Thrift to v0.23.0 or later; implement input validation to prevent malicious recursive payloads; monitor applications for abnormal CPU/memory spikes; enforce dependency management and regular patching
CVE-2026-42208
LiteLLM (BerriAI)
Critical
Fixed in version 1.83.7; versions ≥1.81.16 and <1.83.7 are vulnerable to pre-auth SQL injection in Bearer token verification logic
Immediately upgrade to v1.83.7 or later; rotate all API keys, master keys, and provider credentials; restrict external exposure of LiteLLM proxy; deploy WAF/reverse proxy rules to block SQL injection patterns in Authorization headers; monitor logs for suspicious Bearer tokens and unusual API usage; audit billing and API activity for potential abuse
CVE-2026-40966
Spring AI (VMware)
Medium
Fix released by VMware; users should update to the latest patched version addressing conversation isolation bypass
Recommends patching immediately
CVE-2026-33725
Metabase Enterprise
Critical
Affects multiple Metabase Enterprise versions prior to patched releases; enables RCE and arbitrary file read via H2 JDBC INIT injection during serialization import; PoC publicly available
Immediately upgrade Metabase Enterprise to the latest patched version; enforce strict vulnerability management and regular patch cycles; monitor for unusual serialization/import activity and unauthorized file access attempts; strengthen access controls and logging for BI/analytics platforms
CVE-2026-41409
Apache MINA
Critical
Affects Apache MINA 2.0.0–2.0.27, 2.1.0–2.1.10, 2.2.0–2.2.5; vulnerability in AbstractIoBuffer.getObject() deserialization due to late-applied classname allowlist, allowing unsafe object deserialization leading to potential code execution; fixed in 2.0.28, 2.1.11, 2.2.6
Immediately upgrade Apache MINA to patched versions (2.0.28 / 2.1.11 / 2.2.6 or later); review all applications using IoBuffer.getObject(); enforce strict deserialization controls and dependency hygiene; monitor for anomalous object deserialization activity and unexpected class loading

Apr 24, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-4922; CVE-2026-5816; CVE-2026-5262; CVE-2025-0186; CVE-2026-1660; CVE-2025-6016; CVE-2025-3922; CVE-2026-6515; CVE-2026-5377; CVE-2026-3254; CVE-2025-9957
GitLab Community Edition, GitLab Enterprise Edition
High (Multiple vulnerabilities including CSRF, XSS, and path traversal)
Fixed in versions 18.11.1, 18.10.4, and 18.9.6; GitLab.com already patched; GitLab Dedicated not affected
Upgrade immediately to patched versions; prioritize internet-facing instances; monitor GraphQL/API activity; enforce input validation, access controls, and session management; implement rate limiting; review logs for anomalies; apply least privilege and keep systems updated
CVE-2026-33626
LMDeploy (Open-source LLM Inference Toolkit)
Critical
Patched in version 0.12.3; earlier versions (≤0.12.2) are vulnerable. Exploitation observed within ~12 hours of public disclosure, indicating active threat activity
Upgrade to v0.12.3 or later immediately; if not possible, disable or restrict image_url handling via reverse proxy or disable vision endpoints; enforce IMDSv2 (httpTokens=required, hop limit=1); restrict outbound egress to approved destinations; rotate IAM credentials; ensure internal services (Redis, MySQL) are not publicly exposed and require authentication; monitor for abnormal outbound requests to link-local, RFC1918, and loopback ranges; conduct full inventory and security review of AI/LLM infrastructure
CVE-2026-33819 CVE-2026-24303 CVE-2026-35431 CVE-2026-26150 CVE-2026-33102 CVE-2026-32210 CVE-2026-32172
Microsoft Bing Microsoft Partner Center Microsoft Entra ID Entitlement Management Microsoft Purview eDiscovery Microsoft 365 Copilot Microsoft Dynamics 365 (Online) Microsoft Power Apps
Critical, High
Fixed in latest Microsoft security updates
Apply patches immediately; monitor for abnormal network-based code execution attempts; restrict untrusted data deserialization pathways. Apply patches; review access controls and permissions; enforce least privilege and monitor for privilege escalation attempts. Patch immediately; restrict outbound requests; monitor for SSRF attempts targeting internal resources
CVE-2026-28950
Apple iOS & iPadOS
Medium
Fixed in iOS 18.7.8, iPadOS 18.7.8, iOS 26.4.2, and iPadOS 26.4.2
Update all affected devices immediately; ensure sensitive notifications are properly managed; review device data handling policies and enforce regular OS updates

Apr 22, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-5752
Cohere Terrarium (Python sandbox using Pyodide in Docker)
Critical (CVSS 9.3)
No official patch available; project is no longer actively maintained
Disable untrusted code execution, enforce network segmentation, deploy WAF, monitor container behavior, restrict access, keep dependencies updated, and consider additional isolation layers (e.g., VM-based sandboxing)
CVE-2026-40050
CrowdStrike LogScale (Self-Hosted)
Critical (CVSS 9.8)
Fixed. Affected versions: 1.224.0–1.234.0 (GA), 1.228.0–1.228.1 (LTS). Patched in versions 1.235.1+, 1.234.1+, 1.233.1+, and 1.228.2+ (LTS). SaaS instances mitigated on April 7, 2026; no exploitation observed.
Immediately upgrade to patched versions, ensure cluster API endpoints are not publicly exposed, and monitor for signs of unauthorized access or file exfiltration
CVE-2026-40451
DeepL Chrome Browser Extension
Medium
Affects versions v1.22.0 to v1.23.0. Fixed in latest available version (post v1.23.0). Users should update to the latest extension release.
Update the DeepL Chrome extension to the latest version immediately and ensure browser extensions are regularly reviewed and kept up to date
CVE-2026-5754
Radware Alteon vADC Load Balancer (v34.5.4.0)
Medium
Patch status should be verified with the vendor; update to the latest available version addressing the issue
Implement input validation and output encoding, update to patched versions, educate users on phishing risks, and deploy WAF to detect and block XSS attempts

Apr 21, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-33825
FortiGate SSL VPN (and related VPN access components)
High
Patch status should be verified with the vendor; apply latest available updates immediately
Apply security patches, enforce MFA on VPN access, review VPN logs for suspicious activity, monitor for unauthorized access, and restrict exposure of VPN services
CVE-2026-33829
Microsoft Snipping Tool (ms-screensketch protocol)
High
Fixed in Microsoft Patch Tuesday release (April 14, 2026)
Apply April 2026 security updates immediately, monitor for abnormal outbound SMB (port 445) traffic, block external SMB where possible, and strengthen user awareness against malicious links exploiting deep link URIs

Apr 17, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-6364, CVE-2026-6362
Google Chrome (Skia component), Google Chrome (Codecs component)
Medium
Fixed in Chrome 147.0.7727.101
Update Google Chrome to version 147.0.7727.101 or later
CVE-2026-35469
Docker (spdystream Go library used in SPDY/HTTP multiplexing)
High
Fixed in spdystream version 0.5.1 (versions 0.5.0 and below affected)
Upgrade spdystream to version 0.5.1 or later, ensure all Docker components and dependencies using spdystream are updated, and monitor services exposed to untrusted network traffic for abnormal memory consumption or crash conditions

Apr 14, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-5194
wolfSSL SSL/TLS library
Critical
Fixed in wolfSSL version 5.9.1 and later. Users are strongly advised to upgrade immediately. Impact may persist in embedded/IoT devices until vendor firmware updates are applied.
Upgrade wolfSSL to version 5.9.1 or later immediately Identify and update all affected systems and applications Apply firmware/vendor patches for embedded devices Enforce strict certificate validation policies Monitor for abnormal certificate validation behavior
CVE-2026-6231
MongoDB C Driver (prior to 1.30.5, 2.0.0, 2.0.1)
Medium
Fixed in MongoDB C Driver version 1.30.5 and later
Keep all impacted systems patched and up to date

Apr 13, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-0233
Palo Alto Networks Autonomous Digital Experience Manager (Windows)
Low
Affects version 5.10.0 through 5.10.14; fixed in 5.10.14 or later; requires Content Update 2120+ for full remediation
Upgrade to version 5.10.14 or later; ensure Content Update 2120+ is applied; maintain regular patching and monitor certificate validation processes
CVE-2026-0232
Palo Alto Networks Cortex XDR Agent (Windows)
Medium
Protection mechanism issue allowing agent disablement; mitigated via Content Update 2120; additional hardening in Cortex XDR versions 9.1.0+, 9.0.1+, 8.9.1+, 8.7.101-CE+; 8.3-CE and 7.9-CE protected via content update
Apply Content Update 2120+ immediately; upgrade Cortex XDR agent to latest recommended versions; restrict admin privileges; monitor for agent tampering or disablement attempts
CVE-2026-39987
Marimo (≤ 0.20.4)
Critical
Affects Marimo versions up to 0.20.4; fixed in version 0.23.0 and later
Upgrade to version 0.23.0 or later immediately; restrict or disable access to /terminal/ws
CVE-2026-34621
Adobe Acrobat DC, Adobe Acrobat Reader DC, Adobe Acrobat 2024
Critical (CVSS 8.6)
Affects Acrobat DC & Reader DC (Continuous) ≤ 26.001.21367 and Acrobat 2024 ≤ 24.001.30356 (Windows & macOS); patched versions released by Adobe; actively exploited in the wild
Update to latest versions immediately; enable automatic updates; deploy patches via centralized tools (SCCM, GPO, Apple Remote Desktop); prioritize remediation due to active exploitation; monitor systems for suspicious activity related to PDF handling

Apr 10, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-4112 CVE-2026-4113 CVE-2026-4114 CVE-2026-4116
SonicWall SMA1000 Series
High
Fixed in 12.4.3-03387 and 12.5.0-02624 or later
Upgrade immediately; enforce admin access restrictions; monitor for SQL injection attempts. Monitor authentication logs; detect credential enumeration; enforce MFA and account hygiene. Ensure MFA integrity; upgrade immediately; audit admin accounts and VPN access. Patch urgently; review VPN logs; enforce MFA and segmentation of VPN/management interfaces.
CVE-2026-22750
Spring Cloud Gateway (VMware)
High
Fixed in Spring Cloud Gateway 4.2.x (after 4.2.0), 5.0.2, 5.1.1 and later
Upgrade immediately to supported versions (5.0.2 or 5.1.1 recommended); ensure SSL bundle configuration is correctly applied and systems remain fully patched
CVE-2026-0234
Palo Alto Networks Cortex XSOAR / Cortex XSIAM (Microsoft Teams Integration)
High
Fixed in Microsoft Teams integration version 1.5.52 and later (affects 1.5.0–1.5.51)
Upgrade immediately to 1.5.52 or later; restrict/disable integration if patching delayed; review logs for unauthorized access; validate data integrity; enforce strict access controls and continuous monitoring
CVE-2026-5173, CVE-2026-1092, CVE-2025-12664, CVE-2026-1403, CVE-2026-1101, CVE-2026-1516, CVE-2026-4332, CVE-2026-2619, CVE-2025-9484, CVE-2026-1752, CVE-2026-2104, CVE-2026-4916
GitLab Community Edition (CE) / GitLab Enterprise Edition (EE)
High
Fixed in GitLab 18.10.3, 18.9.5, and 18.8.9 for CE and EE; multiple vulnerabilities addressed including access control issues, DoS in Terraform/GraphQL APIs, code injection, XSS, and information disclosure
Immediately upgrade self-managed GitLab instances to the latest patched versions (18.10.3 / 18.9.5 / 18.8.9 or later); continuously monitor GitLab security advisories; enforce regular patch management and vulnerability scanning

Apr 09, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-5858, CVE-2026-5859, CVE-2026-5860 – CVE-2026-5873, CVE-2026-5874 – CVE-2026-5895, CVE-2026-5896 – CVE-2026-5919
Google Chrome
Critical, High, Medium, Low
Fixed in Chrome 147.0.7727.55/56 (Windows/Mac/Linux)
Immediately update Chrome to version 147; prioritize emergency patching across all endpoints. Ensure all systems are updated and verify patch deployment via endpoint management tools. Enable automatic updates and monitor systems for unusual browser activity. Maintain regular patching cycles and enforce browser security policies.
CVE-2026-31790
OpenSSL
Medium
Fixed in OpenSSL 3.0.20, 3.3.7, 3.4.5, 3.5.6, 3.6.2
Upgrade OpenSSL to latest versions; prioritize systems using RSA KEM; validate RSA keys and ensure proper error handling
CVE-2026-28386 – CVE-2026-28390, CVE-2026-31789
OpenSSL
Low
Fixed in OpenSSL 3.x versions and 1.1.1zg (where applicable)
Apply patches; enforce input validation; avoid processing untrusted inputs; follow secure coding practices and monitor for crashes
CVE-2025-30650
Junos OS
Medium
Fixed in 22.4R3-S8, 23.2R2-S6, 23.4R2-S6, 24.2R2-S3, 24.4R2, 25.2R2 and later releases
Upgrade all affected Junos OS systems to the latest patched versions and ensure all impacted line cards are updated

Apr 08, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-0740
Ninja Forms – File Upload
Critical
Partially fixed in version 3.3.25, fully patched in version 3.3.27
Immediately update to the latest version; implement robust server-side file type validation; regularly scan WordPress sites; employ WAF to block malicious uploads; monitor system logs for suspicious activity
CVE-2026-27578
n8n
High
Fixed in versions 2.10.1, 2.9.3, 1.123.22
Upgrade to patched versions; implement strict allowlists for content types; avoid relying on denylist-based CSP; regularly review and update security configurations
CVE-2026-27314
Apache Cassandra
High
Fixed in version 5.0.7+
Keep all impacted systems patched and up to date
CVE-2026-5731
Firefox, Firefox ESR, Thunderbird ESR
Critical
Fixed in Firefox ≥149.0.2, Firefox ESR ≥115.34.1 / ESR ≥140.9.1
Keep all impacted systems patched and up to date
CVE-2026-5732
Firefox, Firefox ESR
High
Fixed in Firefox ≥149.0.2, Firefox ESR ≥140.9.1
Keep all impacted systems patched and up to date
CVE-2026-5733
Firefox
High
Fixed in Firefox ≥149.0.2
Keep all impacted systems patched and up to date

Apr 07, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2025-59528
Flowise
Critical
Fixed in Flowise version 3.0.6; prior versions vulnerable due to insecure evaluation of user input in CustomMCP node
Immediately update Flowise to latest patched version; implement strict input validation and sanitization; conduct regular code audits; deploy WAF to filter malicious requests; enforce least privilege; monitor logs for suspicious activity

Apr 04, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-35616
Fortinet FortiClientEMS
Critical
Patch pending – upgrade to FortiClientEMS 7.4.7 or 7.2.11 or above once available
Apply updates immediately once released; restrict access to EMS interfaces; monitor for suspicious requests and unauthorized access attempts; follow Fortinet hardening best practices
CVE-2026-32186
Microsoft Bing
Medium
Patch available from Microsoft
Apply the latest security updates; monitor for unusual privilege escalation activity; enforce least privilege access controls and review system permissions regularly

Apr 03, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-32211
Azure Web Apps
Critical
Patch released by Microsoft
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2026-33105
Azure Kubernetes Service
Critical
Patch released by Microsoft
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2026-32213
Azure AI Foundry
Critical
Patch released by Microsoft
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2026-33107
Azure Databricks
Critical
Patch released by Microsoft
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2026-32173
Azure SRE Agent Gateway – SignalR Hub
High
Patch released by Microsoft
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2026-26135
Azure Custom Locations Resource Provider
Critical
Patch released by Microsoft
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2025-43219
macOS
High
Fixed in macOS Sequoia 15.6
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2025-43257
macOS
High
Fixed in macOS Sequoia 15.6
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2025-43238
macOS
Medium
Fixed in macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2024-44303 CVE-2024-44286 CVE-2024-40858 CVE-2025-43264 CVE-2025-43236 CVE-2025-43210 CVE-2024-44219 CVE-2024-40849
macOS, IPadOs, iOS
High, Low, Medium
Fixed in macOS Sequoia 15.1, Fixed in iOS 18.6, iPadOS 18.6 & 17.7.9, macOS Sequoia 15.6, macOS Sonoma 14.7.7, macOS Ventura 13.7.7, tvOS 18.6, visionOS 2.6, watchOS 11.6
Keep all impacted systems patched and up to date

Apr 02, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-34982
Vim
High
Fixed in version 9.2.0276; prior versions vulnerable to arbitrary command execution via malicious modelines
Update to version 9.2.0276 or later; disable modeline feature (“set nomodeline”) if patching is not possible; avoid opening untrusted files; implement endpoint protection; enforce least privilege principles
CVE-2026-20160 CVE-2026-20093 CVE-2026-20155 CVE-2026-20094 CVE-2026-20151 CVE-2026-20042 CVE-2026-20095 CVE-2026-20096 CVE-2026-20085 CVE-2026-20097 CVE-2026-20088 CVE-2026-20089 CVE-2026-20174 CVE-2026-20090 CVE-2026-20087 CVE-2026-20041
Cisco Smart Software Manager On-Prem, Cisco IMC (UCS / NFV Infrastructure / UCSE), Cisco EPNM, Cisco UCS / UCSE, Cisco Nexus Dashboard, Cisco UCS / NFV / UCSE, Cisco UCS, Cisco Nexus Dashboard Insights
Critical, High, Medium, Medium, (High SIR)
Patch available from Cisco
Apply patches immediately and restrict access to exposed services. Restrict file uploads and validate metadata. Patch and monitor for XSS attempts.
CVE-2026-5282
Google Chrome
High
Patch available in version 146.0.7680.178
Update all affected Chrome instances immediately to mitigate out-of-bounds memory read risk
CVE-2026-5287 CVE-2026-5273 CVE-2026-5291 CVE-2026-5277 CVE-2026-5290 CVE-2026-5286 CVE-2026-5278 CVE-2026-5284 CVE-2026-5275 CVE-2026-5276 CVE-2026-5289 CVE-2026-5280 CVE-2026-5285 CVE-2026-5279 CVE-2026-5288 CVE-2026-5272 CVE-2026-5281 CVE-2026-5274 CVE-2026-5283 CVE-2026-5292
Chrome
High, Medium, Critical
Patched in 146.0.7680.178
Update Chrome; monitor WebUSB policy enforcement.

Apr 01, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2021-44228, CVE-2020-1472, CVE-2026-1731, CVE-2026-1281, CVE-2026-1340, CVE-2026-20131, CVE-2026-20127, CVE-2025-5777, CVE-2020-0688, CVE-2025-61882, CVE-2025-61757, CVE-2025-55182, CVE-2025-52691, CVE-2025-24016, CVE-2025-59287, CVE-2023-36899, CVE-2023-29552, CVE-2021-45046, CVE-2021-26085, CVE-2021-26086, CVE-2017-7921, CVE-2021-36260, CVE-2025-13223)
Microsoft, Oracle, Apache, Ivanti, Atlassian, Hikvision
Critical
Actively exploited in ongoing campaigns; patches available for most vulnerabilities but unpatched systems remain at risk
Immediately patch all internet-facing systems, prioritize critical CVEs (e.g., Log4j, Netlogon), enforce MFA, implement network segmentation, monitor logs and SIEM alerts, secure edge/IoT devices, and conduct continuous vulnerability scanning.
CVE-2026-2275, CVE-2026-2286, CVE-2026-2287, CVE-2026-2285
CrewAI
High
Patches/mitigations recommended; vendor updates pending/rolling
Disable or restrict Code Interpreter Tool, avoid enabling allow_code_execution=True unless necessary, sanitize inputs to prevent prompt injection, limit exposure to untrusted inputs, monitor Docker behavior, and apply vendor updates when available.

Mar 31, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-34054
vcpkg (Microsoft)
High
Patched in vcpkg version 3.6.1#3
Update all systems to vcpkg 3.6.1#3 or later. Review builds for hardcoded paths and maintain regular patching for package managers and dependencies.
CVE-2026-33990
Docker Model Runner / Docker Desktop
Medium
Patched in Docker Model Runner 1.1.25 and Docker Desktop 4.67.0+
Update Docker Model Runner to 1.1.25 or later and Docker Desktop to 4.67.0 or newer. Verify registry interactions are secured and monitor for abnormal internal requests.
CVE-2026-1166
Hitachi Ops Center Administrator
Medium
Patched in latest vendor release
Upgrade to the latest patched version, restrict access to management interfaces, and monitor for suspicious redirections.
CVE-2026-2072
Hitachi Infrastructure Analytics Advisor / Hitachi Ops Center Analyzer
High
Patched in latest vendor release
Upgrade to the latest patched version, validate and sanitize user input, implement WAF rules, enforce least privilege, and monitor for injected scripts.
CVE-2026-33660
n8n
High
Patched in latest n8n version
Update n8n to the latest version immediately; if patching is delayed, limit workflow editing permissions and exclude the vulnerable Merge node via NODES_EXCLUDE; enforce least privilege; monitor for suspicious activity.

Mar 30, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-3608
Kea DHCP
High
A high-severity vulnerability causing stack overflow leading to denial-of-service; impacts multiple versions across 2.x and 3.x releases; no active exploitation reported; patched versions available
Upgrade Kea to patched versions immediately. Restrict access to API sockets and HA listeners. Enable TLS with mutual authentication. Require client certificates for all connections. Monitor services for unexpected crashes or restarts. Limit network exposure of Kea services. Apply firewall rules to block unauthorized access. Regularly review and update configurations. Monitor logs for malformed or suspicious requests. Implement network segmentation to reduce impact
CVE-2026-33634
Trivy
High
A vulnerability with active exploitation involving embedded malicious code affecting Aqua Security’s Trivy tool
Update Trivy to the latest secure version immediately. Remove or isolate compromised versions from all systems. Review CI/CD pipelines for unauthorized changes. Rotate all credentials used in affected environments. Scan systems for indicators of compromise. Restrict access to sensitive repositories and tools. Implement strict version pinning for dependencies. Monitor network traffic for suspicious activity. Enable logging and alerting for abnormal behavior. Apply timely patches
CVE-2026-27876, CVE-2026-27880
Grafana
Critical, High
Patched versions available – immediate update recommended
Upgrade to patched Grafana versions; Restrict public access; Enforce strong authentication; Use VPN/Zero Trust; Treat observability tools as critical attack surface

Mar 28, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-32187
Microsoft Edge (Chromium-based)
Medium
Microsoft released a security update addressing this vulnerability
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2026-28892
macOS
Medium
Fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2026-20670
macOS
Medium
Fixed in macOS Sonoma 14.8.4, macOS Tahoe 26.3
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2026-20692
iOS, iPadOS, macOS
Medium
Fixed in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2026-28831
macOS
Medium
Fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2026-28870
iOS, iPadOS, macOS, tvOS, visionOS, watchOS
Medium
Fixed in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4
Help AG highly recommends keeping all impacted systems patched and up to dateHelp AG highly recommends keeping all impacted systems patched and up to date
CVE-2026-28867
iOS, iPadOS, macOS, tvOS, visionOS, watchOS
Medium
Fixed in iOS 18.7.7 & 26.4, iPadOS 18.7.7 & 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2026-28893
macOS
Low
Fixed in macOS Tahoe 26.4
Help AG highly recommends keeping all impacted systems patched and up to date
CVE-2026-28871
Safari, iOS, iPadOS, macOS
Medium
Fixed in Safari 26.4, iOS 18.7.7 & 26.4, iPadOS 18.7.7 & 26.4, macOS Tahoe 26.4
Help AG highly recommends keeping all impacted systems patched and up to date

Mar 27, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-4710
Firefox, Firefox ESR, Thunderbird
Critical
Update released; affected versions: Firefox <149, Firefox ESR <140.9, Thunderbird <149, Thunderbird <140.9
Keep all impacted systems patched and up to date
CVE-2026-33017
Langflow / Langflow AI
Critical
Update to version 1.9.0 or later
Immediately update Langflow to version 1.9.0 or later; implement robust input validation and sanitization; monitor network traffic and system logs; prioritize patching critical vulnerabilities

Mar 26, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-20131
Cisco Secure Firewall Management Center (FMC); Cisco Security Cloud Control (SCC) Firewall Management
Critical
A vulnerability in the web-based management interface allows unauthenticated remote attackers to execute arbitrary Java code via insecure deserialization of user-supplied input.
Full device compromise with root-level access; attackers can gain complete control of affected systems.
CVE-2026-20607
macOS
Medium
Fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4
Keep all impacted systems patched and up to date
CVE-2026-28882
iOS, iPadOS, macOS, tvOS, visionOS, watchOS
Medium
Fixed in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, watchOS 26.4
Keep all impacted systems patched and up to date
CVE-2026-20695
macOS
Medium
Fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4
Keep all impacted systems patched and up to date
CVE-2026-28827
macOS
Critical
Fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4
Keep all impacted systems patched and up to date
CVE-2026-20657
iOS, iPadOS, macOS
Medium
Fixed in iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5
Keep all impacted systems patched and up to date
CVE-2026-28861
Safari, iOS, iPadOS, macOS, visionOS
Medium
Fixed in Safari 26.4, iOS 18.7.7 & 26.4, iPadOS 18.7.7 & 26.4, macOS Tahoe 26.4, visionOS 26.4
Keep all impacted systems patched and up to date
CVE-2026-20688
iOS, iPadOS, macOS, visionOS
Critical
Fixed in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, visionOS 26.4
Keep all impacted systems patched and up to date
CVE-2026-28857
Safari, iOS, iPadOS, macOS, visionOS
Medium
Fixed in Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, visionOS 26.4
Keep all impacted systems patched and up to date
CVE-2026-28816
macOS
Medium
Fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4
Keep all impacted systems patched and up to date
CVE-2026-28816
macOS
Medium
Fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4
Keep all impacted systems patched and up to date
CVE-2026-4701
Firefox, Firefox ESR, Thunderbird
Critical
Fixed in Firefox ≥149, Firefox ESR ≥140.9, Thunderbird ≥149
Keep all impacted systems patched and up to date

Mar 25, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2025-62843, CVE-2025-62844, CVE-2025-62845, CVE-2025-62846
QNAP QuRouter (QHora)
Critical (4)
QNAP has released firmware updates addressing multiple critical vulnerabilities in QuRouter 2.6.x, including weaknesses in authentication, improper input handling, SQL injection, and communication restrictions that could allow privilege escalation, unauthorised access, or command execution under certain conditions.
Update to firmware version 2.6.3.009 or later and restrict access to affected devices.
CVE-2026-3055, CVE-2026-4368
Citrix NetScaler ADC & Gateway
Critical (1), High (1)
Citrix has released security updates addressing multiple vulnerabilities in NetScaler ADC and Gateway, including insufficient input validation leading to memory overread and a race condition that may result in user session mix-up under specific configurations.
Keep all impacted systems patched and up to date.

Mar 24, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-4680, CVE-2026-4673, CVE-2026-4679, CVE-2026-4674, CVE-2026-4675, CVE-2026-4678, CVE-2026-4676, CVE-2026-4677
Google Chrome
High (8)
Google has released security updates addressing multiple high-severity vulnerabilities including use-after-free, heap buffer overflows, integer overflows, and out-of-bounds memory issues that could allow remote attackers to execute code or perform memory corruption via crafted HTML pages.
Keep all impacted systems patched and up to date

Mar 23, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-21992
Oracle Identity Manager, Oracle Web Services Manager (Oracle Fusion Middleware)
Critical (CVSSv3 9.8)
Oracle has released out-of-cycle security updates addressing a remote code execution vulnerability that allows unauthenticated attackers to compromise affected systems via HTTP access. Exploitation is considered straightforward, though no active exploitation has been confirmed by the vendor.
Keep all impacted systems patched and up to date
CVE-2026-4368
NetScaler ADC, NetScaler Gateway
High
Citrix has released a security update addressing a race condition vulnerability that can lead to user session mix-up when configured as Gateway or AAA virtual server.
Keep all impacted systems patched and up to date
CVE-2026-3055
NetScaler ADC, NetScaler Gateway
Critical
Citrix has released a security update addressing an insufficient input validation vulnerability that can lead to memory overread when configured as a SAML IDP.
Keep all impacted systems patched and up to date

Mar 20, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-22557
Ubiquiti UniFi Network Application
Critical (CVSSv3 10.0)
Ubiquiti has released a fix in version 10.1.89 addressing an unauthenticated path traversal vulnerability that could allow attackers to access system files and take control of accounts. The issue affects versions 10.1.85 and earlier.
Keep all impacted systems patched and up to date
N/A (PolyShell)
Magento Open Source, Adobe Commerce
Critical
A vulnerability affecting Magento Open Source and Adobe Commerce allows remote code execution or account takeover via the REST API without authentication. The issue involves file upload abuse using polyglot files. A patch is currently only available in alpha version 2.4.9, leaving production versions exposed.
Keep all impacted systems patched and up to date
CVE-2026-4453
Google Chrome
Medium (1)
Google has released a security update addressing an integer overflow vulnerability that could allow cross-origin data leakage via crafted HTML content.
Keep all impacted systems patched and up to date
CVE-2026-4442, CVE-2026-4460, CVE-2026-4456, CVE-2026-4441, CVE-2026-4452, CVE-2026-4450, CVE-2026-4439, CVE-2026-4443, CVE-2026-4463, CVE-2026-4462, CVE-2026-4458, CVE-2026-4461, CVE-2026-4444, CVE-2026-4446, CVE-2026-4440, CVE-2026-4449, CVE-2026-4448, CVE-2026-4455, CVE-2026-4459, CVE-2026-4464, CVE-2026-4454, CVE-2026-4445, CVE-2026-4457, CVE-2026-4451, CVE-2026-4447
Google Chrome
High (25)
Google has released security updates addressing multiple high severity vulnerabilities including memory corruption, use-after-free, buffer overflows, and sandbox escape issues that could allow remote attackers to execute arbitrary code via crafted HTML content.
Keep all impacted systems patched and up to date

Mar 19, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2025-66376
Zimbra ZCS Classic UI
High (CVSSv3 7.2)
CISA has confirmed active exploitation of a stored XSS vulnerability in Zimbra ZCS Classic UI and has mandated patching by 1 April 2026. The vulnerability allows JavaScript execution in HTML emails and potential session hijacking within the Zimbra environment.
Keep all impacted systems patched and up to date
CVE-2026-3564
ConnectWise ScreenConnect
Critical (CVSSv3 9.0)
ConnectWise has released a fix addressing a vulnerability that allows extraction of ASP.NET machine keys, enabling unauthorised authentication and execution of actions with elevated privileges. The issue affects versions prior to 26.1, with cloud instances automatically updated and on-premises installations requiring manual upgrade.
Keep all impacted systems patched and up to date
CVE-2026-26136, CVE-2026-24299, CVE-2026-26120
Microsoft Copilot, Microsoft 365 Copilot, Microsoft Bing
Medium (3)
Microsoft has released security updates addressing medium severity vulnerabilities including command injection and SSRF that could allow information disclosure and tampering over a network.
Keep all impacted systems patched and up to date
CVE-2026-26139, CVE-2026-23658, CVE-2026-26137, CVE-2026-23659, CVE-2026-26138
Microsoft Purview, Azure DevOps, Microsoft 365 Copilot Business Chat, Azure Data Factory
High (5)
Microsoft has released security updates addressing high severity vulnerabilities including SSRF, credential exposure, and information disclosure that could lead to privilege escalation and unauthorized access.
Keep all impacted systems patched and up to date
CVE-2026-32191, CVE-2026-32169
Microsoft Bing Images, Azure Cloud Shell
Critical (2)
Microsoft has released security updates addressing critical vulnerabilities including command injection and server-side request forgery (SSRF) that could allow remote code execution and privilege escalation.
Keep all impacted systems patched and up to date
CVE-2026-32194
Microsoft Bing Images
Critical (1)
Microsoft has released a security update addressing a command injection vulnerability that could allow an unauthorized attacker to execute code over a network.
Keep all impacted systems patched and up to date

Mar 18, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-32746
GNU Inetutils telnetd
Critical (CVSSv3 9.8)
A critical vulnerability in GNU Inetutils telnetd allows an unauthenticated remote attacker to achieve remote code execution via a buffer overflow during Telnet protocol negotiation. The issue affects all versions up to 2.7 and can be exploited without authentication or user interaction. No patch has been confirmed at this time.
Keep all impacted systems patched and up to date
CVE-2026-0231
Cortex XDR Broker VM
Medium (5.7)
Affects Cortex XDR Broker VM versions below 30.0.49. Upgrade available to version 30.0.49 or later.
Upgrade Cortex XDR Broker VM to version 30.0.49 or later; Enable automatic updates to ensure timely security patching; Restrict access to the Broker VM to authorized users only; Limit high-privilege account usage and enforce least privilege; Monitor and audit administrative activities and terminal sessions; Apply network access controls to reduce exposure to internal threats

Mar 17, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
Not specified
AWS Bedrock AgentCore Code Interpreter (Sandbox mode)
Not specified
AWS reproduced the finding, deployed and withdrew an initial fix, and ultimately decided not to address it. Documentation updated to state that complete isolation is only achieved using VPC mode.
Migrate sensitive workloads to VPC; Restrict privileges; Explicitly control DNS resolution

Mar 16, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
Not specified
AppArmor (Linux kernel)
Not specified
Affects AppArmor since Linux kernel version 4.11 (2017), impacting distributions including Ubuntu, Debian, and SUSE. No CVE identifiers or public proof-of-concepts available.
CVE-2026-25172, CVE-2026-25173, CVE-2026-26111
Windows 11 (Routing and Remote Access Service – RRAS)
High (CVSSv3 8.0)
Addressed via out-of-cycle hotfix KB5084597. Previously fixed in Patch Tuesday update (10 March), but required reboot. Hotpatch applies fix in memory without requiring reboot. Applicable to Windows 11 24H2, 25H2, and Enterprise LTSC 2024 enrolled in hotpatch programme and managed by Windows Autopatch.
OpenClaw AI Agents
Not specified
No CVE assigned. Vulnerability allows indirect prompt injection leading to data exfiltration via crafted URLs and automatic link previews.
Not specified
CVE-2026-3932
Google Chrome (Android)
Medium
Affects Google Chrome on Android prior to version 146.0.7680.71. Update released addressing insufficient policy enforcement in PDF.
Keep all impacted systems patched and up to date
CVE-2026-3934
Google Chrome (ChromeDriver)
Medium
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing insufficient policy enforcement in ChromeDriver.
Keep all impacted systems patched and up to date
CVE-2026-3939
Google Chrome
Medium
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing insufficient policy enforcement in PDF.
Keep all impacted systems patched and up to date
CVE-2026-3930
Google Chrome (iOS)
Medium
Affects Google Chrome on iOS prior to version 146.0.7680.71. Update released addressing unsafe navigation in Navigation.
Keep all impacted systems patched and up to date
CVE-2026-3940
Google Chrome
Medium
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing insufficient policy enforcement in DevTools.
Keep all impacted systems patched and up to date

Mar 13, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-3927
Google Chrome
Medium
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing incorrect security UI in PictureInPicture.
Keep all impacted systems patched and up to date
CVE-2026-3920
Google Chrome
High
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing out of bounds memory access in WebML.
Keep all impacted systems patched and up to date
CVE-2026-3916
Google Chrome
Critical
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing out of bounds read in Web Speech.
Keep all impacted systems patched and up to date
CVE-2026-3914
Google Chrome
High
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing integer overflow in WebML.
Keep all impacted systems patched and up to date
CVE-2026-3941
Google Chrome
Medium
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing insufficient policy enforcement in DevTools.
Keep all impacted systems patched and up to date
CVE-2026-3915
Google Chrome
High
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing heap buffer overflow in WebML.
Keep all impacted systems patched and up to date
CVE-2026-3926
Google Chrome
High
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing out of bounds read in V8.
Keep all impacted systems patched and up to date
CVE-2026-3931
Google Chrome
High
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing heap buffer overflow in Skia.
Keep all impacted systems patched and up to date
CVE-2026-3919
Google Chrome
High
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing use after free in Extensions.
Keep all impacted systems patched and up to date
CVE-2026-3922
Google Chrome
High
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing use after free in MediaStream.
Keep all impacted systems patched and up to date
CVE-2026-3921
Google Chrome
High
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing use after free in TextEncoding.
Keep all impacted systems patched and up to date
CVE-2026-3918
Google Chrome
High
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing use after free in WebMCP.
Keep all impacted systems patched and up to date
CVE-2026-3942
Google Chrome
Medium
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing incorrect security UI in PictureInPicture.
Keep all impacted systems patched and up to date
CVE-2026-3913
Google Chrome
High
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing heap buffer overflow in WebML.
Keep all impacted systems patched and up to date
CVE-2026-3924
Google Chrome
High
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing use after free in WindowDialog.
Keep all impacted systems patched and up to date
CVE-2026-3917
Google Chrome
High
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing use after free in Agents.
Keep all impacted systems patched and up to date
CVE-2026-3929
Google Chrome
Low
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing side-channel information leakage in ResourceTiming.
Keep all impacted systems patched and up to date
CVE-2026-3923
Google Chrome
High
Affects Google Chrome prior to version 146.0.7680.71. Update released addressing use after free in WebMIDI.
Keep all impacted systems patched and up to date
CVE-2026-21666, CVE-2026-21667, CVE-2026-21708
Veeam Backup & Replication
Critical (CVSSv3 9.9)
Affects Veeam Backup & Replication 12.3.2.4165 and all previous versions of the 12 branch. Veeam has released security updates to address these vulnerabilities.
Immediate updating is recommended
CVE-2026-3909
Google Chrome (Stable Desktop Channel)
High
Fixed in Google Chrome version 146.0.7680.75 (Windows, Linux) and 146.0.7680.76 (macOS). Security updates released addressing out-of-bounds write vulnerability in Skia.
CVE-2026-3910
Google Chrome (Stable Desktop Channel)
High
Fixed in Google Chrome version 146.0.7680.75 (Windows, Linux) and 146.0.7680.76 (macOS). Security updates released addressing inappropriate implementation vulnerability in V8.

Mar 12, 2026

CVE
Product
Severity
Patch Status & Updates
Recommendation
CVE-2026-23813
Aruba Networking AOS-CX (CX-series switches)
Critical (CVSSv3 9.8)
HPE has released patches addressing this vulnerability in the AOS-CX operating system. No evidence of active exploitation or public exploit code.
Isolate management interfaces on dedicated VLANs or segments; Restrict access through network policies and control plane ACLs; Disable HTTP(S) on unnecessary interfaces; Enable access monitoring and logging
CVE-2026-3913
Google Chrome
Critical (no CVSS assigned)
Fixed in Chrome version 146.0.7680.71 for Linux and 146.0.7680.71/72 for Windows and Mac. Patch addresses heap buffer overflow in WebML.
Immediately update to Chrome 146.0.7680.71

Schedule a Consultation

Speak to our cybersecurity experts to safeguard
your infrastructure.

Download the Content

I’m interested in the solutions & services from?

(Choose all that apply)

Schedule a Consultation