Threat Research | Weekly Recap [17 May 2026]

Threat Research | Weekly Recap [17 May 2026]
Cybersecurity Threat Research ‘Weekly’ Recap. The roundup highlights multiple supply-chain and identity attacks, including TeamPCP’s workflow poisoning, malicious npm republishing via node-ipc, and AI-assisted device-code phishing operations tied to BlackFile / UNC6671 and Tycoon 2FA. It also covers credential stealer delivery and evolving ransomware/extortion dynamics (e.g., Qilin and The Gentlemen), alongside state-sponsored espionage/influence campaigns like Kimsuky, Gamaredon, FrostyNeighbor, Fast16, and Doppelgänger.

#TeamPCP #Cemu #UNC6671 #BlackFile #node-ipc #Shai-Hulud #TanStack #Qilin #TheGentlemen #LockBit #Fast16 #FrostyNeighbor #Gamaredon #Kimsuky #Seedworm #Doppelgänger #CobaltStrike #Gamaredon #CVE-2023-36036 #Tycoon2FA #ModeloRAT #KongTuke #AmateraStealer #PureLogs #GremlinStealer #PraisonAI #NATSasC2 #Langflow #DirtyFrag #CopyFail #MeshAgent #TeamViewer #ScreenConnect #AnyDesk #Chaos

Supply Chain, Package, and CI/CD Compromises

Phishing, Smishing, and Identity Takeover

Stealers and Malware Delivery Chains

Ransomware, Extortion, and Access Operations

State-Sponsored Espionage and Influence

AI, Cloud, and Novel Exploitation

Remote Access, RMM, and Living-off-the-Land Abuse

Threat Research | Weekly Recap – hendryadrian.com