Our analysis covers updated #BURNBOOK and #MISTPEN variants, that feature slight changes in their main routines and C2 loop.
UNC2970 relied on compromised infrastructure on SharePoint and WordPress, aligning with previous findings.
@ocd-cert.bsky.social
The CERT Orange Cyberdefense brings together experts on Cyber Threat Intelligence (CTI), Cybercrime Monitoring (MCM), Vulnerability Operation Center (VOC) and digital forensics and incident responders (CSIRT). https://www.orangecyberdefense.com/
Our analysis covers updated #BURNBOOK and #MISTPEN variants, that feature slight changes in their main routines and C2 loop.
UNC2970 relied on compromised infrastructure on SharePoint and WordPress, aligning with previous findings.
๐Our CERT is releasing a new technical report on ๐ฐ๐ตOperation #DreamJob, focusing on recent evolution in its tooling.
Following an IR engagement at a large manufacturing client based in ๐ช๐บ, we investigated artefacts we attribute to #UNC2970.
โก๏ธFull blog: ow.ly/V4mr50Xug1l
๐ฃ๐ง Since early September 2025, the Orange Cyberdefense CSIRT and CyberSOC teams have detected phishing campaigns impersonating Meta, AppSheet and Paypal, leading to malware delivery. Our team tracks this activity under the alias "Metappenzeller".
#CTI #ThreatIntel #Metappenzeller #phishing
๐ง Update on MintsLoader: a thread ๐ฝ
MintsLoader is a JavaScript/PowerShell loader that was first detailed by OCD in 2024.
A new version has been around at least since early-June 2025.
#threatintel #cti #mintsloader
๐IoCs and Yara available on our GitHub: github.com/cert-orangec...
๐ฎWorld Watch advisory released today for our clients.
During our analysis, we noticed a surprising line, likely written by threat actors to prevent AI-powered file scanning
This is actually the first time we observed such an attempt, even though we found it to be unsuccessful with GPT-4o.
V3 features several changes including new mouse movements speed check.
Recent infection chains includes new intermediary stage (Powershell with AMSI bypass feature which loads a .NET stage) in charge of delivering #stealers.
๐New version of #Emmenhtal loader actively distributed worldwide since early March, leading to #Lumma or #Rhadamanthys stealers.
Very low AV detection on VT for now.
Similarly to V2, Emmenhtal V3 masquerades as #mp3 or #mp4 files, including relaxation songs.๐งโโ๏ธ
๐New version of our #ransomware mapping is out on our GitHub!
โก๏ธhttps://github.com/cert-orangecyberdefense/ransomware_map/blob/main/OCD_WorldWatch_Ransomware-ecosystem-map.pdf
V28 (!) includes latest newcomers and recent ecosystem evolutions.๐
As always, feedback is welcome!
#cti #threatintel
๐For more than 8 months, our threat researchers from OCD
have worked on mapping China's civil-militaryโindustrial complex when it comes to #cyberespionage operations.
โฏ Consult our newly published deep-dive report and interactive map here:
research.cert.orangecyberdefense.com/hidden-netwo...