Cybersecurity Threat Research âWeeklyâ Recap: A concise survey of ransomware, APT/espionage campaigns, infostealers, supply-chain threats, and defensive tooling trends observed across multiple sectors this week. Key items include GreenBlood ransomware, Handala wipers, INC Ransom, Black Basta, Operation CamelClone and CL-STA-1087 espionage campaigns, PeckBirdy and MuddyWater/Tsundere, Iran MOIS activities and Proofpointâs Iran-Conflict surge, alongside defensive updates from Elastic + Terraform, Copilot Studio logging gaps, and AI-assisted BAS workflows.
#GreenBlood #OperationCamelClone
#GreenBlood #OperationCamelClone
Ransomware & Wipers
- GreenBlood â Go-based ransomware with fast parallel encryption (extensions .tgbg/.gblood); detection/auto-response demo using Sysmon, custom Wazuh rules and YARA Active Response. Detecting GreenBlood (Wazuh)
- Handala â Iranâlinked destructive persona conducting largeâscale wiper operations (Stryker), using phishing, Intune abuse and multi-technique disk/MBR wipers; defenders urged to harden identities, Intune controls and backups. Handala Hack â Modus Operandi
- INC Ransom (affiliate RaaS) â Joint Australia/NZ/Tonga advisory: affiliateâdriven RaaS targeting healthcare and Pacific networks via spearâphishing, credential purchase and livingâoffâtheâland exfiltration. INC Ransom Pacific Advisory
- Black Basta â Alleged leader added to Most Wanted; recent campaign IoCs show phishing + exploitation + doubleâextortion playbook. Black Basta â Postâarrest Analysis
APT & Espionage Campaigns
- Operation CamelClone â Spearâphishing ZIPâLNK delivers JS loader âHOPPINGANTâ that deploys Rclone (l.exe) to exfiltrate docs to MEGA; targets gov/defense/diplomatic/energy across multiple countries. Operation CamelClone
- CLâSTAâ1087 (Chinaânexus) â Longârunning espionage against SE Asian militaries using custom backdoors AppleChris/MemFun, Getpass credential harvester and Pastebin/Dropbox DDRs for resilient C2. Chinaânexus Espionage (Unit42)
- PeckBirdy â JavaScriptâbased C2 framework tied to Chinaâaligned APTs and modular backdoors (HOLODONUT/MKDOOR); extensive DNS IoC mapping and sample release. PeckBirdy DNS Investigation
- MuddyWater + Tsundere â Openâdirectory stager deploys persistence + Tsundere botnet that retrieves C2 from the Ethereum chain (âEtherHidingâ) and uses AES WebSockets; Node.js obfuscation and language checks observed. MuddyWater & Tsundere â EtherHiding C2
- PlugX (Chinaânexus) â Conflictâthemed lure chain (ZIPâLNKâCHMâshellcode) delivering PlugX to Persian Gulf targets; uses reflective DLL injection, CFF/MBA obfuscation and HTTPS/DoH C2. PlugX Campaign â Persian Gulf
- Earth Lusca â Chinaâlinked longâterm espionage actor expanding tooling (Go-based KTLVdoor), ShadowPad/Winnti usage and cloudâhosted rotating C2 to maintain stealth. Earth Lusca APT Profile
- Iran MOIS & cyberâcrime blend â MOISâlinked actors increasingly leverage criminal tooling, shared codeâsigning certs, botnets and infostealers to advance state objectives and complicate attribution. Iran MOIS â Crime Connection
- Proofpoint â Iranâconflict surge â Multiple stateâaligned/opportunistic clusters exploiting conflict lures with LNK loaders, DLL sideloading, Rust backdoors and Cobalt Strike to target Middle East gov/diplomatic orgs. IranâConflict Espionage Surge
Infostealers, Phishing & Credential Theft
- AhnLab Feb Infostealer Trends â SEOâpoisoning drives Windows EXE/DLL sideâloading and macOS bash/osascript droppers; notable ACRStealer activity and Inno Setup downloader surge. Infostealer Trend â Feb 2026
- MicroStealer â Fastâspreading infostealer using NSISâElectronâJava chain to harvest browsers/wallets and exfiltrate via Discord webhooks; low vendor detection noted. MicroStealer Analysis
- Stormâ2561 â SEOâpoisoning redirects to signed MSI installers that sideâload malicious DLLs (Hyrax variant) to steal VPN credentials and connection data. Stormâ2561 â Fake VPNs
- AiTM AWS Console phishing â Reverseâproxy kit and typosquatted domains harvest validated AWS Console creds/OTPs; rapid infra rotation and Mullvad egress observed. Behind the Console â AWS AiTM
- OAuth Device Code phishing â Attackers trick users into approving device authorizations, receiving OAuth tokens via legitimate Microsoft pages and evading traditional detection. OAuth Device Code Phishing
- Telegram Bot exfil â Threat actors abuse Telegram Bot API to exfiltrate credentials/files from phishing pages and malware (Agent Tesla, Pure Logs, WSH RAT); blocking api.telegram.org recommended. Weaponizing Telegram Bots
- Phishing link obfuscation â âFree toothbrushâ emails using IPv6âmapped IPv4 URLs and other redirect domains to hide scam landing pages that harvest PII/payment data. IPv6 Trick in Scam Emails
- Quiz sites / browser push abuse â Deceptive quiz/extension sites trick users into enabling persistent web push notifications used for ads/affiliate scams. Quiz Sites â Push Notification Abuse
- Contagious Interview â Fake developer interview workflows deliver backdoors (InvisibleFerret/FlexibleFerret) via malicious NPM/VS Code tasks to harvest API/cloud credentials and signing keys. Contagious Interview â Dev SupplyâChain
SupplyâChain & Malicious Packages
- Packagist (Composer) trojan themes â Six malicious ophimcms packages shipped trojanized jQuery to exfiltrate URLs, inject ads and redirect mobile users to gambling/ad sites using FUNNULL infrastructure. Malicious Packagist Themes
- Malicious Rust crates â Five crates posed as time utilities to exfiltrate .env secrets; most were yanked after disclosure. Malicious Rust Crates
ClickFix / LureâBased RATs & PUAs
- Fake $TEMU airdrop (ClickFix) â Polished airdrop page tricks victims to paste commands, deploying a windowless Python backdoor (pythonw.exe) that streams/executes Python in memory with minimal file artifacts. Fake TEMU Airdrop â ClickFix Trap
- KongTuke / ClickFix â Compromised WordPress + fake CAPTCHA/CrashFix lures deliver Python modeloRAT for reconnaissance, remote exec and persistence. KongTuke â ClickFix Abuse
- REMCOS in PUAs â REMCOS RAT campaigns trojanize legitimate portable apps (eg. Shotcut ZIPs) by replacing DLLs; uses inâmemory loaders and APIâstyle shellcode callbacks. REMCOS in PUAs
Mobile Banking & Payment Trojans
- PixRevolution â Android trojan streams victimsâ screens and enables operatorâassisted realâtime hijacking of Brazil PIX transfers via Accessibility/MediaProjection abuse. PixRevolution â PIX Hijack
- BeatBanker â Dualâmode Android campaign (miner + banking module/BTMOB RAT) targeting Brazil; uses inaudible audio loop, overlays and Firebase for C2. BeatBanker â Miner & Banker
Defensive Tooling, Observability & Research Methods
- Elastic + Terraform â Terraform provider now supports managing detection rules and exception lists as code (ES|QL â Terraform resources) for IaCâdriven detections. Managing Elastic Rules with Terraform
- Copilot Studio logging gaps â Datadog disclosed missing Copilot Studio adminâaction logs (AugâSep 2025); MSRC remediations and regressions tracked. Copilot Studio â Logging Gaps
- Generative AI in BAS â Picus proposes agentic BAS architecture to compress attackerâtoâremediation timelines using cooperating AI agents for research, simulation and vendorâspecific fixes. Generative AI for BAS
- LLMâKnowledge Graph for CTI â Workflow and experiments for transforming CTI narratives into structured JSON and knowledge graphs using LLMs; discusses accuracy, abstention and ensemble tradeoffs. LLMâDriven CTI â Knowledge Graph