Join me tomorrow for a live briefing on the conflict between Israel and Iran.
Weβll address specific geopolitical risks, cybercriminal and hacktivist groups, state-sponsored cyber threats, influence operations, and more.
Registration: recordedfuture.registration.goldcast.io/webinar/4b72...
17.06.2025 18:29 β π 1 π 1 π¬ 0 π 0
Thank you to everyone who attended my session at our inaugural Insikt After Dark conference in New York City!
I spoke on our recent efforts to disrupt traffer teams, infostealer operators, and global scam infrastructure.
Itβs always an honor to represent Recorded Future!
13.06.2025 19:03 β π 0 π 0 π¬ 0 π 0
Outstanding work from @julianferdinand.bsky.social, @lawrencesec.bsky.social, and our Malicious Infrastructure Discovery (MID) team.
GrayAlpha shows how financially motivated actors operate with APT-level tradecraft.
Time to retire old threat models. Think in terms of ecosystems, not just malware.
13.06.2025 15:27 β π 6 π 4 π¬ 0 π 0
Predator isnβt dead β itβs mutating.
New reporting from @julianferdinand.bsky.social just dropped. It confirms that Predator C2 is very much alive and attracting new clients.
Targets? The same. Activists, politicians, journalists, executives. The spyware economy isnβt slowing β itβs adapting.
12.06.2025 17:35 β π 4 π 2 π¬ 0 π 0
Read more! This report includes an extensive list of capabilities and indicators linked to TAG-110 and its recent campaigns targeting Central Asia.
PDF: go.recordedfuture.com/hubfs/report...
22.05.2025 14:52 β π 1 π 0 π¬ 0 π 0
π: βTAG-110βs recent use of macro-enabled Word templates (.dotm), placed in the Microsoft Word STARTUP folder for automatic execution, highlights a tactical evolution prioritizing persistence.β
22.05.2025 14:52 β π 0 π 0 π¬ 1 π 0
π: βTAG-110βs persistent targeting of Tajik government, educational, and research institutions supports Russiaβs strategy to maintain influence in Central Asia. These cyber-espionage operations likely aim to gather intelligence for influencing regional politics or securityβ¦β
22.05.2025 14:52 β π 0 π 0 π¬ 1 π 0
π: βThis campaign has been attributed to TAG-110 based on its reuse of VBA code found in lures from previous campaigns, overlap in C2 infrastructure, and use of suspected legitimate government documents for lure material.β
22.05.2025 14:52 β π 0 π 0 π¬ 1 π 0
π£: βTAG-110 has changed its spearphishing tactics in recent campaigns against Tajikistan, as they now rely on macro-enabled Word templates (.dotm files).β
22.05.2025 14:52 β π 0 π 0 π¬ 1 π 0
TAG-110 Targets Tajikistan: New Macro Word Documents Phishing Tactics
Russia-aligned TAG-110 shifts to .dotm phishing lures in a 2025 campaign against Tajikistanβs public sector, advancing cyber-espionage in Central Asia.
New report! Check it out.
π·πΊ πΉπ― This research examines a campaign targeting Tajikistan attributed to Russia-aligned TAG-110 β linked to BlueDelta (APT28). This campaign is likely targeting government, educational, and research institutions.
Link: www.recordedfuture.com/research/rus...
22.05.2025 14:52 β π 2 π 2 π¬ 1 π 0
Read more! This report includes extensive research and analysis that canβt be fully captured in a single thread.
PDF: go.recordedfuture.com/hubfs/report...
08.05.2025 14:47 β π 0 π 0 π¬ 0 π 0
πΊπΈ: βAlthough the current US presidential administration has signalled that maintaining the USβs leading positionβ¦ a priority, early actions to decrease public funding for science and target international students over alleged visa infractions likely risk undermining this goal.β
08.05.2025 14:47 β π 0 π 0 π¬ 1 π 0
π: βChinaβs semiconductor industry likely still faces a bottleneck in producing sub-7 nanometer chips, and it is almost certainly attempting to develop its own extreme ultraviolet lithography tools using alternative techniques to advance domestic AI accelerator production.β
08.05.2025 14:47 β π 0 π 0 π¬ 1 π 0
π: βUS export controls have also almost certainly prompted the Chinese government to accelerate funding for its AI hardware and semiconductor industries and high-performance computing infrastructure for training and hosting AI models.β
08.05.2025 14:47 β π 0 π 0 π¬ 1 π 0
π: βAdopting open source is more prevalent among Chinese AI companies and likely enables China to diffuse its models more broadly than US proprietary models.β
08.05.2025 14:47 β π 0 π 0 π¬ 1 π 0
π§βπ«: βAccess to high-quality training data and IP is an increasingly contested domain where the US likely retains a competitive advantage; companies in both countries are likely leveraging user-generated content to train generative AI models.β
08.05.2025 14:47 β π 0 π 0 π¬ 1 π 0
βοΈ: βClosing the performance gap while being cost-competitive is very likely to pay off for China by driving the adoption of Chinese generative AI models domestically and abroad.β
08.05.2025 14:47 β π 0 π 0 π¬ 1 π 0
ποΈ: βAccording to Insikt Group's analysis of model benchmarks, Elo scores, and industry expert assessments, Chinese generative AI models likely now have a three to six-month performance gap behind US rivals, though this time lag is shortening.β
08.05.2025 14:47 β π 0 π 0 π¬ 1 π 0
π‘: βAI diffusion rather than innovation will very likely determine the βwinnerβ in the competitionβ¦ but whether the US or China has greater levels of diffusion is unclear, with one metric (patents) nevertheless showing China has a lead in many industries.β
08.05.2025 14:47 β π 0 π 0 π¬ 1 π 0
π§βπ: βThe international AI talent pool likely continues to favor the US due to a continuing β though declining β immigration advantage and the quality of elite educational institutions, but the practical implications of this lead for AI competition are likely eroding.β
08.05.2025 14:47 β π 0 π 0 π¬ 1 π 0
π§ββοΈ: βChinaβs regulatory scheme likely hampers Chinese AI capabilities and extends development and deployment timelines β but only among developers aiming for public-facing products, meaning frontier advancements are unlikely to be impeded.β
08.05.2025 14:47 β π 0 π 0 π¬ 1 π 0
π°: βChinaβs overall government-led funding likely exceeds investment by US federal and state governmentsβ¦ however, total private-sector investment in AI companies in the US vastly outmatches private-sector investment in China.β
08.05.2025 14:47 β π 0 π 0 π¬ 1 π 0
π€: βChinaβs rapidly maturing AI ecosystem is very likely increasingly fostering collaboration between government, industry, and academia, and is supported by steady advances in semiconductor manufacturing.β
08.05.2025 14:47 β π 0 π 0 π¬ 1 π 0
Recorded Futureβs Alexander Leslie on the βMarkoPoloβ traffer team
Safe Mode Podcast Β· Episode
I had a great time talking with @gregotto.bsky.social from @cyberscoop.bsky.social at RSAC 2025. Always fun!
Check out our conversation about my work on cryptoscam gangs, infostealer βtrafferβ teams, and the βMarko Poloβ cybercriminal group.
Link: open.spotify.com/episode/70AY...
02.05.2025 20:08 β π 2 π 2 π¬ 0 π 0
π: βInsikt Group observed ten distinct TerraStealerV2 distribution samples between January and March 2025 that employed varied delivery methods, including MSI, DLL, and LNK files.β
02.05.2025 17:06 β π 0 π 0 π¬ 0 π 0
π οΈ: βTerraStealerV2 lacks support for decrypting Chrome ABE-protected credentials, indicating the tool is likely outdated or still under development.β
02.05.2025 17:06 β π 0 π 0 π¬ 1 π 0
π¬π§ Threat Research @ Recorded Future.
I Like Tracking ASNs and ISPs for some reason...
professional despondent masshole βΎππ
VIBEINT SME.
reluctant cyber poster. π¦
π‘οΈ
my therapist is probably sick of my refusal to accept reality.
Advanced Practices π¦
@Google Threat Intelligence Group
Threat Attribution, Frontline Intelligence, Malware Analysis, Threat Hunting, Incident Response
#attributionmatters
I study Russian foreign policy, cyber security, arms control
Threat intelligence analyst. He/him
China-Focused Consultant @SentinelOne | Nonresident Fellow @ACGlobalChina | Adjunct @Georgetown | Unprofessional Cook | β€οΈππ
https://linktr.ee/dakotaindc
Infosec enthusiast, threat hunter, malware analyst, #GSE #OSCP #GCIH #GPEN, #GREM, #GCTI, #GXPN, #GCIA, #GDAT, #GWAPT, #SLAE, #CISSP (He/Him)
Butlerian jihadist. Cyber stuff sometimes. Writing stuff always. He/him.
ICS Cybersecurity Engineer @ MITRE, Critical Infrastructure, Electrical Engineer, Father, Muslim, Geek & Tech Junky, Adjunct Prof @ GMU, #ISA_IEC62443 #NIST
oh great, now Iβm on bluesky
GCIH, GCFE | DFIR, Threat Hunting, Detection Engineering | @CuratedIntel DFIR Member
SecurityAura.com
http://infosec.exchange/@SecurityAura
Threat Intelligence Researcher. Co-founder of Natto Thoughts.
https://nattothoughts.substack.com
Cyber Threat Intelligence Analyst
@EclecticIQ | Threat Hunter | Malware Analyst |. (All opinions expressed here are mine only). πΉπ·π³π±
#cybersecurity
Award-winning journalist at Futurism covering AI and its impacts on media, information, and people. Send tips by email to: maggie@futurism.com or Signal: mhd.39
Reporter on the investigations team at the NYT. I always have a China-focused story in the works. Co-author of bestselling βWhen McKinsey Comes to Townβ. Navy veteran. Send tips to Michael.forsythe@nytimes.com. DM for Signal.
IT & security expert generalist, PCI expert.
fr, en, es, ~pr
πMontreal, Canada
software dev/mgmt, teaching offsec/re, csirt @DIVDnl, re/vx hobbyist, CTF stuff.
twitter.com/barredijkstra
infosec.exchange/@salp
he/him
Geopolitical Disinformation Researcher | Old | Fan of Historical Accountability | Dedicated to Sparkle Motion | Aspiring Cryptid | π§π¦ π«π· πΊπ¦
Threat Research at SnapAttack now part of Splunk now part of Cisco / Detection Engineering / Dad | #DetectionEngineering #ThreatHunting #PurpleTeam | Header art from http://art.vx-underground.org.