Today the NCSC has issued a warning highlighting Pro-Russian Hacktivist groups are targeting sectors across the UK.
All organisations are urged to act now by reviewing and implementing our free guidance to protect against DoS attacks.
@calwarez.bsky.social
Director for Malicious Infrastructure Discovery @ Recorded Future | Views my own
Today the NCSC has issued a warning highlighting Pro-Russian Hacktivist groups are targeting sectors across the UK.
All organisations are urged to act now by reviewing and implementing our free guidance to protect against DoS attacks.
Predator spyware demonstrates troubleshooting, research-dodging capabilities cyberscoop.com/predator-spy...
14.01.2026 20:04 โ ๐ 10 ๐ 7 ๐ฌ 0 ๐ 0NoName057(16) and DDoSia Project Analysis: Russiaโs Most Persistent Hacktivist Operation
socradar.io/blog/noname0...
New SOCRadar Whitepaper Reveals the Inner Workings of DDoSia and Pro-Russian Cyber Aggression
Recorded Futureโs Insikt Group identified multiple credential-harvesting campaigns conducted by BlueDelta, a Russian state-sponsored threat group associated with the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU).
www.recordedfuture.com/research/gru...
Today, we released new @RecordedFuture research detailing BlueDeltaโs expanded credential-harvesting activity observed between February and September 2025. #BlueDelta #APT28 #FANCYBEAR #ForestBlizzard #FROZENLAKE #ITG05 #PawnStorm #Sednit #Sofacy #TA422 (1/5) www.recordedfuture.com/research/gru...
07.01.2026 15:39 โ ๐ 7 ๐ 5 ๐ฌ 1 ๐ 0Recorded Futureโs Insikt Group identified a sustained credential-harvesting campaign targeting users of UKR.NET. The activity is attributed to the Russian state-sponsored threat group | www.recordedfuture.com/research/blu...
18.12.2025 12:09 โ ๐ 7 ๐ 4 ๐ฌ 0 ๐ 0In their latest for Binding Hook, @nca-uk.bsky.socialโs William Lyne and @rusi.bsky.social's @jamiemaccoll.bsky.social look at the challenges facing UK law enforcement as cybercriminals become more diverse at home and abroad: bindinghook.com/local-hacker...
10.12.2025 10:02 โ ๐ 5 ๐ 5 ๐ฌ 0 ๐ 0Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups (U.S. Department of Justice): www.justice.gov/opa/pr/justi...
10.12.2025 11:28 โ ๐ 3 ๐ 2 ๐ฌ 0 ๐ 01/ @whoisnt.bsky.social, Marius, and I just published a report on #GrayBravo (formerly TAG-150), a highly adaptive, sophisticated threat actor that we first identified in Sept 2025. It uses a multi-layered infrastructure and responds quickly to exposure: www.recordedfuture.com/research/gra...
09.12.2025 08:24 โ ๐ 10 ๐ 6 ๐ฌ 1 ๐ 1Recorded Futureโs Insikt Group uncovered four GrayBravo activity clusters. TAG-160 impersonates logistics firms, while TAG-161 impersonates Booking.com, employing ClickFix to deliver CastleLoader and Matanbuchus. www.recordedfuture.com/research/gra...
09.12.2025 11:25 โ ๐ 6 ๐ 5 ๐ฌ 0 ๐ 0"There is a lack of consensus regarding the current state of AI malware maturity."
So we put together #AIM3 to help #malware researchers describe the maturity level of an #AI_Malware Threat.
www.recordedfuture.com/blog/ai-malw...
โ ๏ธ New victims of Predator #spyware identified, with malicious TikTok links revealing new targets, and evidence showing ๐ช๐ฌEgypt & ๐ธ๐ฆSaudi clients still active.
โก๏ธ Ad-based infections confirmed.
โก๏ธ Leaked files & investigation expose post-sanctions Intellexa operations.
www.haaretz.com/israel-news/...
And check out the companion blog post by @amnestyuk.bsky.social tech with a detailed peek into Intellexa's setup based on leaked materials ๐
Giveaway: Intellexa can observe all of what their gov clients are doing with their hacking tech and more securitylab.amnesty.org/latest/2025/...
1/ Today we release a new report exposing previously undisclosed entities connected to the wider #Intellexa ecosystem as well as newly identified activity clusters in Iraq and indications of activity in Pakistan: www.recordedfuture.com/research/int...
04.12.2025 04:17 โ ๐ 26 ๐ 18 ๐ฌ 2 ๐ 4Cyber Monday Dealย โจGet 6 months of Modat Magnify Pro for just โฌ5 total (save โฌ355).ย
Use code: MODAT2025CYBERMONDAYย
ย โจTry the platform. Run advanced queries. Find what others miss.ย โจ
magnify.modat.io
โจ#CyberMonday #Cybersecurity #OSINT
1/ United States, Australia, and United Kingdom sanction Russian threat activity enabler Media Land (Yalishanda) and follow up on recent designations targeting Aeza. ofac.treasury.gov/recent-actio...
19.11.2025 17:17 โ ๐ 3 ๐ 3 ๐ฌ 1 ๐ 0Great read from @lawrencesec.bsky.social & @whoisnt.bsky.social !
06.11.2025 11:53 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0Recorded Future just published Dark Covenant 3.0, revealing how global crackdowns and shifting Russian enforcement are reshaping the cybercriminal underground, exposing ties to state actors and turning cybercrime into a geopolitical tool: www.recordedfuture.com/research/dar...
22.10.2025 14:26 โ ๐ 7 ๐ 7 ๐ฌ 0 ๐ 0Great work by my colleague, @lawrencesec.bsky.social ! He dives deep into the systemic flaw where "neutral" internet governance lets sanctioned ISPs evade restrictions and continue supporting #cyberattacks and #disinformation. A must-read on the infrastructure gap. ๐
21.10.2025 08:45 โ ๐ 5 ๐ 1 ๐ฌ 0 ๐ 0Recorded Future just published a report diving into the Beijing Institute of Electronics Technology and Application (BIETA), which is almost certainly a front for Chinaโs MSS, developing technologies to support intelligence and military missions. Full report: www.recordedfuture.com/research/bie...
07.10.2025 20:04 โ ๐ 18 ๐ 14 ๐ฌ 0 ๐ 2๐ Don't miss the first Colloquium session tomorrow!
๐ Mythical Beasts and Where to Find Them: Diving into the Depths of the Global Spyware Market
๐ก Jen Roberts (@cyberstatecraft.bsky.social) & @julianferdinand.bsky.social (Recorded Future)
๐๏ธ October 2, 2025
๐ 16:00 โ 17:00 CET
Recorded Future's Insikt Group reports CopyCop, also tracked as Storm 1516, expanding in 2025, adding at least 200 new fictional media websites targeting the United States, France and Canada and using self-hosted LLMs. www.recordedfuture.com/research/cop...
18.09.2025 09:09 โ ๐ 2 ๐ 2 ๐ฌ 0 ๐ 0I'm excited to speak at #VB2025 later this week! I'll be diving into TAG-124, a group whose services are leveraged by a wide range of actors, from cybercriminals to state-sponsored groups. Hit me up if you are in town!
www.virusbulletin.com/conference/v...
The UK has sanctioned Aeza International, citing its involvement in destabilising Ukraine by providing internet services to Russian disinformation campaigns. This follows OFAC sanctions in July. www.gov.uk/government/n...
22.09.2025 15:48 โ ๐ 2 ๐ 1 ๐ฌ 0 ๐ 0Really excited to present at #LABScon25 on ChamelGangโs most recent campaign targeting the Taliban, a collaborative research project with @milenkowski.bsky.social (SentinelLABS) and @azaka.fun (TeamT5)! www.labscon.io/speakers/jul...
16.09.2025 13:49 โ ๐ 5 ๐ 3 ๐ฌ 0 ๐ 0Great blog post from @briankrebs.infosec.exchange.ap.brid.gy on #StarkIndustries. Makes a great point by highlighting it's links to MIRHosting. Where there are Dutch prefixes under these providers, there is usually always MIRHosting upstream.
11.09.2025 18:32 โ ๐ 4 ๐ 3 ๐ฌ 1 ๐ 0Insikt Group identifies a new threat actor, TAG-150, active since at least March 2025. Its multi-layered infrastructure is used to deploy likely self-developed malware families, including CastleLoader, CastleBot, and the newly documented CastleRAT. www.recordedfuture.com/research/fro...
08.09.2025 08:33 โ ๐ 4 ๐ 3 ๐ฌ 0 ๐ 0Recorded Future has spotted two influence operations around the recent India-Pakistan military conflict from May.
The networks are tracked as networks as Hidden Charkha (pro-India) and Khyber Defender (pro-Pakistan).
www.recordedfuture.com/research/inf...
Should be all fixed now :-)
05.09.2025 18:31 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0