The Raven File examines how AI chatbots perform in threat intelligence tasks, focusing on logical errors and failure. The goal was to classify common risks across LLMs and show where human validation is still essential. theravenfile.com/2026/02/05/l...
06.02.2026 10:26 β π 1 π 0 π¬ 0 π 0
LevelBlue SpiderLabs continues its LockBit 5.0 series, with Part 3 analysing the Windows build. The analysis covers a targeted kill list that systematically dismantles the services needed for backups, virtualization and critical business databases. www.levelblue.com/blogs/spider...
06.02.2026 10:24 β π 2 π 0 π¬ 0 π 0
Cisco Talos uncovers DKnife, a gateway-monitoring and adversary-in-the-middle framework that manipulates network traffic & can hijack binary downloads or Android app updates to deliver malware. Used since at least 2019, its C2 was still active in Jan 2026. blog.talosintelligence.com/knife-cuttin...
06.02.2026 10:19 β π 1 π 0 π¬ 0 π 0
LevelBlue SpiderLabs continues its LockBit 5.0 series with part two, analysing the Linux x64 variant. The report compares behaviour across samples to show what stays consistent and what changes when the ransomware targets Linux systems. www.levelblue.com/blogs/spider...
05.02.2026 11:19 β π 2 π 1 π¬ 0 π 0
Seqrite Labs tracks an RTO-themed Android malware campaign targeting Indian users via WhatsApp-distributed apps. The operation uses a multi-stage chain with anti-analysis and a structured backend for data collection and remote operations. www.seqrite.com/blog/inside-...
05.02.2026 11:17 β π 0 π 0 π¬ 0 π 0
Huntress details an intrusion in which attackers gained access via compromised SonicWall SSLVPN credentials, then deployed an EDR killer using a revoked EnCase forensic driver to terminate security tools from kernel mode, reinforcing the growing BYOVD trend. www.huntress.com/blog/encase-...
05.02.2026 11:11 β π 2 π 1 π¬ 0 π 0
SophosLabs investigates WantToCry remote ransomware cases in which attackers operated from virtual machines with auto-generated NetBIOS names derived from Windows templates provisioned by ISPsystem. www.sophos.com/en-us/blog/m...
05.02.2026 11:08 β π 0 π 0 π¬ 0 π 0
Acronis TRU tracks Transparent Tribe (APT36) expanding beyond its usual government and defence focus to Indiaβs startup ecosystem. The campaign uses startup-themed decoys and ISO files with malicious LNK shortcuts to deliver Crimson RAT. www.acronis.com/en/tru/posts...
05.02.2026 11:06 β π 2 π 2 π¬ 0 π 0
Recorded Futureβs Insikt Group profiles Rublevka Team, a Russian SOL wallet drainer operation that pushes a promotion or airdrop event and drains wallets after victims connect and sign a transaction. The group automates campaigns via Telegram bots. www.recordedfuture.com/research/rub...
05.02.2026 11:04 β π 2 π 2 π¬ 0 π 0
RedAsgard shows how a Lazarus-linked fake job interview operation tricked developers into opening a repo & running npm install or loading it in VS Code, leading to credential theft. The investigation found 241k+ stolen credentials tied to 857 victims across 90 countries redasgard.com/blog/hunting...
04.02.2026 10:05 β π 0 π 0 π¬ 0 π 0
Robin Dost details how APT28 uses CVE-2026-21509 in practice, relying on crafted RTF files that trigger OLE parsing without macros. The blog post walks through efficient IOC extraction from weaponised documents. blog.synapticsystems.de/apt28-geofen...
04.02.2026 09:55 β π 0 π 0 π¬ 0 π 0
LevelBlue SpiderLabs analyses DragonForceβs evolving playbook, combining advanced RaaS features with a franchise-style affiliate model. The tooling supports full, header and partial encryption across multiple platforms. www.levelblue.com/blogs/spider...
04.02.2026 09:52 β π 0 π 0 π¬ 0 π 0
Fake "Verify You Are Human" CAPTCHA page that can appear when viewing a page from a legitimate but compromised website.
Text from KongTuke's fake CAPTCHA page injected into the viewer's clipboard, and the CAPTCHA page contains instructions to run the text as a command in Window's Run window.
Traffic from the KongTuke activity and resulting infection filtered in Wireshark.
Reposted with correct malware names:
2026-02-02 (Monday) #KongTuke #ClickFix activity leads to #MintsLoader and #GhostWeaver RAT
Today's ClickFix uses the "finger" command, a tactic seen in previous ClickFix activity.
Further details available at www.malware-traffic-analysis.net/2026/02/02/i...
03.02.2026 03:25 β π 6 π 3 π¬ 1 π 0
Screenshot showing Google search results for a cracked version of ArcGIS where I specify site:drive.google.com. The results shown here all lead to PDF files hosted on Google Drive, and these PDF files contains links that lead to malware.
Here's an example of one of these PDF files hosted on Google Drive with a link that leads to malware.
Here's the page that pushes a password-protected 7-zip archive that contains an inflated EXE padded with null bytes. This EXE is for Lumma Stealer malware.
Lumma Stealer traffic generated by the extracted malware. This is filtered in Wireshark to focus on the Lumma Stealer C2 traffic.
2026-02-01 (Sunday): It's easy enough to find #LummaStealer malware samples.
Just do a Google search for cracked versions of popular software and specify site:drive.google.com.
Details on today's haul at github.com/malware-traf...
02.02.2026 03:46 β π 4 π 2 π¬ 0 π 0
Rapid7 reports on the Lotus Blossom campaign, including a compromise of Notepad++ hosting infrastructure used to deliver the Chrysalis backdoor. The report also details custom loaders, including one using Microsoft Warbird to hide shellcode execution. www.rapid7.com/blog/post/tr...
03.02.2026 13:38 β π 0 π 0 π¬ 0 π 0
Operation Neusploit: APT28 Uses CVE-2026-21509 | ThreatLabz
ThreatLabz uncovers Operation Neusploit targeting Central and Eastern Europe, with APT28 exploiting CVE-2026-21509.
Zscaler ThreatLabz reports on Operation Neusploit, a January 2026 campaign targeting Central and Eastern Europe. Weaponised Microsoft RTF files exploit CVE-2026-21509 to deliver multi-stage backdoors. The campaign is attributed to APT28 with high confidence. www.zscaler.com/blogs/securi...
03.02.2026 13:35 β π 1 π 0 π¬ 0 π 0
Forcepoint X-Labs tracks a multi-stage PDF phishing chain that evades email scanning by leaning on trusted hosting and layered redirects. The PDF is served from legitimate cloud infrastructure and redirects victims to a Dropbox style page to harvest credentials. www.forcepoint.com/blog/x-labs/...
03.02.2026 13:33 β π 1 π 0 π¬ 0 π 0
Cyble CRIL uncovers ShadowHS, a fileless Linux post-exploitation framework where an obfuscated in-memory loader deploys a weaponised hackshell variant. The payload shows latent capability for credential access, privilege escalation, EDR/AV fingerprinting & data theft. cyble.com/blog/shadowh...
02.02.2026 10:04 β π 1 π 0 π¬ 0 π 0
In a three-part series, LevelBlue SpiderLabs analyses LockBit 5.0 across 19 samples, showing how the cross-platform malware operates on Windows, Linux and ESXi. Part 1 focuses on the ESXi variant and highlights shared components plus ESXi-specific behaviours. www.levelblue.com/blogs/spider...
02.02.2026 09:57 β π 1 π 1 π¬ 0 π 0
ESET Research updates its DynoWiper findings, sharing deeper technical details on a wiper used against an energy company in Poland. TTPs overlap with the ZOV wiper case in Ukraine, and the activity is attributed to Sandworm with medium confidence. www.welivesecurity.com/en/eset-rese...
02.02.2026 09:53 β π 2 π 0 π¬ 0 π 0
Digital Security Lab Ukraine warns Ukrainian organisations were targeted on 22 Jan 2026 with National Bank of Ukraine themed phishing. The multi-stage chain led to installation of remote admin malware and established persistent endpoint control. dslua.org/publications...
30.01.2026 09:55 β π 2 π 1 π¬ 0 π 0
Zimperium zLabs identifies Arsink, a cloud-native Android RAT that harvests sensitive data and enables remote device control. The malware leverages Google Apps Script and Drive for file uploads, and alternative builds use Firebase and Telegram for C2 and data theft. zimperium.com/blog/the-ris...
30.01.2026 09:54 β π 0 π 0 π¬ 0 π 0
Point Wild analyses a multistage Windows malware chain, using LOTL tooling & in-memory payload delivery. A hidden BAT persists via a Run registry key, launches PowerShell & injects Donut shellcode into trusted processes before data exfiltration via Discord &Telegram www.pointwild.com/threat-intel...
30.01.2026 09:51 β π 1 π 0 π¬ 0 π 0
Sekoia details IClickFix, a ClickFix campaign rotating multi-stage JavaScript loaders across compromised WordPress sites. The loader serves a fake Cloudflare Turnstile CAPTCHA, then clipboard-driven PowerShell drops NetSupport RAT. blog.sekoia.io/meet-iclickf...
30.01.2026 09:46 β π 1 π 0 π¬ 0 π 0
HarfangLab reports RedKitten, a new campaign seen in early January 2026 targeting Iranian interests, including NGOs & people documenting abuses. It uses GitHub and Google Drive for config/modules and Telegram for C2, with signs of LLM-assisted development. harfanglab.io/insidethelab...
30.01.2026 09:45 β π 1 π 0 π¬ 0 π 0
FortiGuard Labs tracks Interlockβs shifting toolkit across recent intrusions. A key addition is a process-killing tool that leverages a zero-day vulnerability in a gaming anti-cheat driver to try to disable EDR and AV. www.fortinet.com/blog/threat-...
30.01.2026 09:43 β π 0 π 0 π¬ 0 π 0
FortiGuard Labs analyses EncystPHP, a weaponized web shell delivering remote command execution, persistence and further web shell deployment. It spreads by exploiting FreePBX vulnerability CVE-2025-64328 and is linked to the INJ3CTOR3 actor. www.fortinet.com/blog/threat-...
29.01.2026 10:34 β π 0 π 0 π¬ 0 π 0
ESET Research uncovered GhostChat, an Android spyware campaign using romance-scam tactics to target individuals in Pakistan. The campaign uses fake profiles (likely operated via WhatsApp), while the spyware exfiltrates victim data. www.welivesecurity.com/en/eset-rese...
29.01.2026 10:33 β π 4 π 1 π¬ 0 π 0
Googleβs Threat Intelligence Group warns WinRAR CVE-2025-8088 is still being exploited for initial access and payload delivery by both state-backed and financially motivated actors. The exploitation method allows files to be dropped into the Windows Startup folder. cloud.google.com/blog/topics/...
28.01.2026 09:55 β π 1 π 0 π¬ 0 π 0
Watch out for AT&T rewards phishing text that wants your personal details
Recently, we uncovered a realistic, multi-layered data theft phishing campaign targeting AT&T customers.
We saw a convincing text posing as AT&T, warning users their reward points were expiring. Only it wasnβt from AT&T.
It's a phishing campaign using realistic branding, social engineering, and data theft
27.01.2026 23:31 β π 5 π 2 π¬ 0 π 0
Director of Cybersecurity @eff.org
Co-founder of @stopstalkerware.bsky.social
These opinions are my own, not my employersβ
I did a TED talk once
Journalist at Bloomberg News in DC. Signal: @howelloneill.01, email: patoneill1@bloomberg.net https://www.bloomberg.com/authors/AXb8dLPHBFc/patrick-howell-oneill
Threat Researcher @ Proofpoint | Views are my own.
Secure Code Trainer - Best-selling author of Alice and Bob Learn Secure Coding & Alice and Bob Learn Application Security. #AppSec she/her
https://shehackspurple.ca π»
Breaking bad UTF-8 implementations since 1991. I secure cybers and run trails. If Iβm posting, Iβm hopefully not on a trail. Views own. He/him
Journalist - cyber/natn'l security. Speaker. Georgetown adjunct prof. Author - COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World's First Digital Weapon
Signal: KimZ.42
https://www.zetter-zeroday.com
Military-grade reverse engineer @ Google, working on Android malware
Got mistaken for a member of Project Zero once.
Everything here is my own opinion
he/him β¨ππ¦
Founder of Granitt, securing journalists and at-risk people around the world.
We're the Electronic Frontier Foundation. We're a nonprofit that fights for your privacy and free speech online. Find all of EFF's social media accounts at eff.org/social.
Cybersecurity Specialist, Public Speaker, Ex-Hacker.
https://marcushutchins.com
Chasing digital badness. Senior Researcher at Citizen Lab, but words here are mine.
Executive Director for Intelligence and Security Research @ SentinelOne.
Distinguished Fellow and Adj Professor @ Hopkins SAIS Alperovitch Institute. Three Buddy Problem Co-Host. LABScon Founder, Cyber Paleontologist, Fourth-Party Collector.
Threat Intel / CTI / OT / ICS / Critical Infra stuff along with other things. I genuinely care, and wish others did too.
Website: pylos.co
Training/Consulting: paralus.co
Fighting malicious use of technology.
Security Geek. We build Thinkst Canary - https://canary.tools
Work: Senior Advisor for Privacy and Cybersecurity, Office of Senator Ron Wyden.
Founder & CEO LutaSecurity @payequitynow MIT&Harvard visiting scholar, @MasonNatSec fellow, 1/2 Chamoru, 1/2 Greek all-American hacker
computer security person. former helpdesk
Gentleman of leisure. Legendary wedding guest. I wrote two of the best books you haven't read. Friend of hackers. https://decipher.sc
Romanian antihacker from another planet. #threatintel #yara #chess #taekwondo black belt
Motto: "One reboot a day keeps the implant away"