Cybersecurity Threat Research âWeeklyâ Recap: A sweeping roundup covers ransomware, Android threats, fileless tools, nation-state campaigns, cloud abuse, browser extension hijacks, supply-chain incidents, AI governance risks, and defensive improvements. It highlights actor-tool pairs and campaigns such as LockBit5.0, BravoX, Amnesia RAT, Arsink RAT, PlayCloak, PureRAT, PyRAT, GOGITTER, GITSHELLPAD, SheetCreep, VSCode tunnel, DarkSpectre, PayTool, SquarePhish2 and Graphish among others.
#LockBit5_0 #BravoX #AmnesiaRAT #ArsinkRAT #PlayCloak #PureRAT #PyRAT #GOGITTER #GITSHELLPAD #SheetCreep #VSCodeTunnel #DarkSpectre #PayTool #SquarePhish2 #Graphish
#LockBit5_0 #BravoX #AmnesiaRAT #ArsinkRAT #PlayCloak #PureRAT #PyRAT #GOGITTER #GITSHELLPAD #SheetCreep #VSCodeTunnel #DarkSpectre #PayTool #SquarePhish2 #Graphish
Ransomware & extortion
- Crossâplatform, stealthy ransomware using ChaCha20, inâmemory execution and antiâanalysis targeting Windows, Linux and ESXi. LockBit 5.0 report
- New RaaS operation surfaced with Tor leak site and initial U.S. victims; affiliate model advertised to scale attacks. BravoX profile
- Multiâstage Windows campaign: staged loaders â Defender tampering â Amnesia RAT data theft â WinLocker/Hakuna Matata ransomware; uses GitHub/Dropbox and Telegram for modular hosting/C2. Multiâstage Windows campaign
Mobile Android threats & malicious apps
- Cloudânative Android RAT abusing Firebase, Google Apps Script/Drive and Telegram for C2 and exfiltration across 1,216 APKs. Arsink RAT analysis
- Android dropper using Hugging Face hosting to stage polymorphic RATs; abuses Accessibility and overlay permissions. TrustBastion / Hugging Face campaign
- Playâstore app that morphs into coercive loan platform on Indian devicesâruntime obfuscation, contact harvesting, remote WebView control. PlayCloak / Hicas report
- Vietnamese-linked phishing using AIâassisted code to build and distribute PureRAT and HVNC via archives, cloud hosts and DLL sideloading. PureRAT AIâassisted campaign
- Crossâplatform Python RAT packaged as ELF with HTTP C2, file transfer, screenshots, and persistence (XDG autostart / Run key). PyRAT internals
Fileless tools, web shells & postâexploitation
- Fileless Linux postâexploit framework reconstructs an encrypted hackshell in memory for stealthy lateral movement, credential theft and covert rsync exfiltration. ShadowHS analysis
- Base64âencoded PHP web shell deployed via a FreePBX flaw (CVEâ2025â64328) enabling RCE, SSH backdoor creation and cron persistence. EncystPHP web shell
- Espionage actor upgraded toolkit: CoolClient backdoor, browser stealers, USB worms, PlugX and multiple exfil channels targeting SE Asia/EU. HoneyMyte toolset update
Nationâstate / APT campaigns & toolkits
- TA584 increased tempo and diversified initial access (ClickFix lure, layered redirects), using new payloads (Tsundere Bot, XWorm) and WebSocket/Ethereum C2 retrieval. TA584 activity
- JScript LOLBins framework abused by Chinaâaligned groups to deliver modular backdoors (HOLODONUT, MKDOOR) across multiple execution vectors. PeckBirdy framework
- Pakistanâlinked campaigns targeting Indian government entities: Golang toolchain (GOGITTER/GITSHELLPAD/GOSHELL) leading to Cobalt Strike. Gopher Strike (Part 1)
- Followâon Indian targeting abusing Google Sheets/Firebase/Microsoft Graph for C2 with backdoors SHEETCREEP, FIREPOWER and MAILCREEP; generative AI signs noted. Sheet Attack (Part 2)
- DPRKâaligned campaign delivered a JSE script to deploy a VS Code tunnel for persistent remote access and exfiltration of tunnel tokens. VS Code tunnel campaign
- Campaign targeting Iranian protests using weaponized XLSM to deploy C# implant SloppyMIO, stego GitHub configs, Google Drive modules, and Telegram C2; possible AIâassistance. RedKitten campaign
- Tracking of multiâcampaign cluster (Zoom Stealer, ShadyPanda, GhostPoster) uncovered aged domain reuse, Chinaâhosted infrastructure and prioritized IoCs tied to DarkSpectre. DarkSpectre DNS analysis
Cloud abuse, phishing & account takeover
- Threat actors host phishing pages and send obfuscated emails via AWS services (S3, SES, Amplify) to scale credential theft while evading takedown/forensics. AWS abuse for phishing
- Attackers hijack real email threads (compromised contractor mailbox) to deliver layered redirects and Cloudflare Turnstile to an EvilProxy AiTM Microsoft credentialâtheft page. Enterprise thread phishing (EvilProxy)
- Legitimate, signed emails abused by embedding scam text in fields (meeting names, document titles) to get messages redirected/resent and bypass SPF/DKIM/DMARC and many gateways. Signed-butâmalicious email abuse
- Compromised Public Administration accounts used to send Figma links that redirect to fake Microsoft 365 login pages for credential theft. Figma â Microsoft 365 phishing
- INPSâthemed smishing campaign asks for identity docs, CUD and employment data to build rich profiles for higherâvalue fraud. INPS smishing (Italy)
- Interconnected Canadian fraud/phishing ecosystem (PayTool) impersonates government and major brands via SMS, typosquats and fake payment gateways; kits sold on underground forums. PayTool / Canada fraud
- OAuth bypass/ATO clusters using SquarePhish2 and Graphish to steal Microsoft 365 access; 46 IoCs collated for hunting. SquarePhish2 / Graphish analysis
Browser extensions, website and marketplace abuse
- WordPressâinjected JavaScript framework (>3,800 sites) shows fake Cloudflare Turnstile (âClickFixâ) to deliver NetSupport RAT via PowerShell dropper. IClickFix / ClickFix framework
- Multiple deceptive Chrome extensions (100k+ users) performing clipboard access, cookie exfiltration, C2 communications, search hijacking and ad injection; immediate removal advised. Malicious Chrome extensions report
- Chrome extension silently replacing Amazon affiliate tags with developerâs tag (10xprofitâ20), violating store policies and performing nonâconsensual affiliate hijacking. Amazon Ads Blocker affiliate hijack
Supplyâchain, software vulnerabilities & patch guidance
- Supplyâchain compromise of eScan update server delivered Reload.exe, modified HOSTS, established persistence (scheduled tasks) and staged additional payloads; vendor containment followed. eScan supplyâchain incident
- Widespread exploitation of critical WinRAR CVEâ2025â8088 (ADS + path traversal) to drop startup persistence; urgent patching and hunting recommended. WinRAR CVEâ2025â8088 exploitation
- OpenSSL security update: multiple issues including CVEâ2025â15467 (CMS AuthEnvelopedData stack overflow) and PKCS#12 PBKDF2 overflowâupgrade affected builds and monitor CMS/PKCS#12 parsing. OpenSSL Jan 2026 update
- SmarterMail account takeover â privilege escalation and RCE (CVEâ2026â23760); mass automated exploitation observedâupdate to Build 9511. SmarterMail RCE advisory
- Serialization injection in langchainâcore (CVEâ2025â68664 âLangGrinchâ) enables secret exfiltration and unintended class instantiationâupgrade to patched versions and apply Defender/XDR hunting. LangGrinch / LangChain guidance
- Reversed cracking/cheat tools can carry malware or localâprivilege exploits (example: macOS AutoHackGUI XPC root execution), highlighting risks of cracked software. Dangers of cracking tools
AI, models, toolâchains & governance risks
- Agentic tool chain attacks manipulate tool manifests/schemas and context to cause data leaks or unauthorized actions without code changes; defenses need reasoningâlayer controls (signed manifests, pinning, parameter validation). Agentic tool chain threats
- Large unmanaged Ollama deployment ecosystem (~175k hosts; ~23k core) exposes toolâcalling and multimodal capabilities, creating governance gaps and a brittle monoculture (Q4_K_M quantized models). Silent Brothers (Ollama) study
- Check Point synthesis: AI embedded across the attack lifecycleârecon, social engineering, malware devâand risks from ungoverned AI and Model Context Protocol weaknesses. Cyber Security Report 2026
Detection, defensive tooling & operational improvements
- IDEâSHEPHERD extension intercepts dangerous IDE APIs (child_process, http(s)) to block malicious extension/workspace actions and harden developer environments. IDEâSHEPHERD release
- Validin adds JA4+ fingerprints to detect anomalous X.509 structures and hunt C2 infra linked to BianLian and QuasarRAT. Validin JA4+ support
- Elastic Defend event filtering and policy tuning cut endpoint event volume ~75% and lowered storage costsâexample for noisy process/host filtering and event aggregation. Elastic Defend optimization
- Huntress added an Incident Report Timeline to Managed ITDR to show attacker actions vs remediation steps, improving visibility and MSP communication. Huntress ITDR timeline
- Outlook addâins can be weaponized for zeroâtrace email exfiltrationâreview addâin security posture and monitor addâin activity. Outlook addâin exfiltration
Infrastructure takedowns & marketplace abuse
- Disruption of the IPIDEA residential proxy network: takedown of C2/marketing domains, Play Protect removals and SDK intelligence sharing to curb millions of enrolled consumer devices. IPIDEA residential proxy disruption