Security researchers identified a statically linked 64-bit Linux backdoor named netd (contained in out_linux.tar) with an encrypted configuration file (netd.lck), RC4-encrypted C2 communications, an interactive PTY-backed shell, and remote file-transfer capabilities. The implant uses dynamic DNS domains and a custom RC4 challenge–response over TCP/443 (mefng.giize[.]com, chopaw.camdvr[.]org, drawpin.accesscam[.]org); a Mach-O variant observed on VirusTotal is labeled ChromeUpdates. #netd #mefng_giize

Read More
72 Malicious Open VSX Extensions Linked to GlassWorm Campaign Now Using Transitive Dependencies

GlassWorm has evolved to abuse Open VSX manifest relationships (extensionPack and extensionDependencies) to convert benign-appearing extensions into transitive delivery vehicles that pull GlassWorm-linked packages in later updates. The campaign also upgraded its loader and infrastructure—using staged JavaScript, Russian locale/timezone gating, Solana transaction memos as dead drops, heavier RC4/base64 obfuscation, rotated Solana wallets and C2 IPs—making single-release reviews insufficient. #GlassWorm #OpenVSX

Read More
Detecting and responding to GreenBlood ransomware with Wazuh | Wazuh

GreenBlood is a Go-based ransomware family that targets Windows systems with fast, parallel encryption, appending .tgbg or .gblood extensions and dropping ransom notes such as READ_ME_TO_RECOVER_FILES.txt. The blog demonstrates detection and response using Sysmon, custom Wazuh rules, and YARA-based Active Response to automatically identify and remove GreenBlood artifacts. #GreenBlood #Wazuh…

Read More
February 2026 Security Issues Related to the Korean & Global Financial Sector

The report reviews cyber threats targeting financial institutions, covering malware distribution, phishing, database leaks, credential sales on forums, and ransomware incidents affecting banks and related companies. It highlights specific cases including firewall admin credential sales by an IAB on BreachForums, a claimed mortgage data breach by FulcrumSec, and ransomware victim disclosures…

Read More
Dark Web Profile: Handala Hack

Handala presents itself as a grassroots pro-Palestinian hacktivist collective but is assessed with high confidence by multiple vendors to be a destructive cyber persona operated by Iran’s Ministry of Intelligence and Security (MOIS). Its campaigns since December 2023 have used custom wipers and multi-stage phishing and loader chains to cause large-scale disruption, most notably the March 2026 wipe at Stryker Corporation. #Handala #Stryker

Read More
Operation CamelClone: Multi-Region Espionage Campaign Targets Government and Defense Entities Amidst Regional Tensions

Seqrite Labs tracked Operation CamelClone, a coordinated campaign that uses spear-phishing ZIP attachments containing malicious LNK files to download a JavaScript loader dubbed HOPPINGANT from filebulldogs[.]com, which ultimately deploys Rclone (l.exe) to exfiltrate documents to MEGA. Targets span government, defense, diplomatic, and energy sectors in Algeria, Mongolia, Ukraine, and Kuwait, with decoys impersonating entities such as the Algerian Ministry of Housing, MonAtom LLC, and the Kuwaiti Armed Forces. #HOPPINGANT #filebulldogs #Rclone #MEGA #MonAtom

Read More
Probing the DNS Depths of PeckBirdy

Trend Micro’s report exposes PeckBirdy, a JavaScript-based C2 framework used by China-aligned APTs since 2023 and linked to modular backdoors (HOLODONUT, MKDOOR), stolen code-signing certificates, Cobalt Strike payloads, and exploits including CVE-2020-16040. Researchers analyzed 56 IoCs (domains, subdomains, IPs, WHOIS emails), confirmed many as illegitimate or previously weaponized, and published sample artifacts and full findings for download. #PeckBirdy #HOLODONUT

Read More
February 2026 Infostealer Trend Report

AhnLab ASEC’s February 2026 report analyzes Infostealer distribution trends, highlighting heavy use of SEO-poisoned posts that deliver Windows EXE or DLL side-loading samples and macOS Bash/osascript-based droppers. The report notes significant activity from ACRStealer and a surge in Inno Setup downloader campaigns that use PowerShell to fetch additional payloads. #ACRStealer #InnoSetupDownloader…

Read More
Suspected China-Based Espionage Operation Against Military Targets in Southeast Asia

Palo Alto Networks’ Unit 42 tracked a China-nexus espionage cluster designated CL-STA-1087 that targeted Southeast Asian military organizations from at least 2020, maintaining long-lived dormant access and performing highly selective intelligence collection. The actors deployed custom backdoors AppleChris and MemFun, a Mimikatz-derived credential harvester Getpass, and used Dead Drop Resolvers via…

Read More
MuddyWater APT + Tsundere Botnet: EtherHiding the C2

eSentire’s TRU investigated an open-directory attributable to MuddyWater and found a PowerShell stager that deploys a persistence module and the Tsundere botnet, which retrieves C2 addresses from the Ethereum blockchain using an “EtherHiding” technique and communicates via AES-encrypted WebSockets. Analysis shows Tsundere uses Node.js obfuscation (likely Obfuscator.io), includes CIS/Ukraine language checks that terminate execution, and relies on Run-key persistence and MaaS-style tradecraft. #MuddyWater #Tsundere

Read More
China-nexus Threat Actor Targets Persian Gulf Region With PlugX

ThreatLabz observed a multi-stage campaign on March 1, 2026, that weaponized Middle East conflict themes to deliver a PlugX backdoor via ZIP→LNK→CHM→shellcode loaders targeting countries in the Persian Gulf. The campaign used advanced obfuscation (CFF, MBA), reflective DLL injection, and supported HTTPS and DOH C2 channels, and ThreatLabz attributes the activity to a China-nexus actor with possible links to Mustang Panda. #PlugX #MustangPanda

Read More
Managing Elastic Security Detection Rules with Terraform

Elastic’s Terraform provider now supports managing detection rules and exception lists as code, enabling teams to define, deploy, and track security detections alongside other infrastructure in HCL and to translate ES|QL queries into Terraform resources. The article compares the Terraform provider with the detection-rules repository, demonstrates an ES|QL example for detecting interactive service-account logons, and highlights Elastic AI Agent assistance for generating Terraform configurations. #Elastic #Terraform

Read More