Cybersecurity Threat Research âWeeklyâ Recap highlights a widespread mix of opportunistic campaigns, AI-enabled tradecraft, and nation-state activity across ICS/OT, mobile, and software supply chains, with notable tools and actors such as LOTUSLITE, StealC, Coruna, TaxiSpy, VioletRAT, Agent Tesla and APT41. The roundup also covers phishing, AiTM and OAuth abuse, developer-supply-chain compromises, crypto-theft schemes, rootkits, disinformation infrastructure, and practical hardening guidance to defend identity, backups, OT segmentation, and cloud/mobile environments.
#LOTUSLITE #StealC #RedAlert #TaxiSpy #Coruna #VioletRAT #AgentTesla #VIP_Keylogger #WsgiDAV #DustSpecter #Seedworm #SilverDragon #APT41
Middle East conflict & ICS/OT risk
- Surge of opportunistic campaignsâfake news, donation scams, memeâcoins, LNK/CHM loaders, DLL sideloading and inâmemory shellcode; notable chains include LOTUSLITE and web lures delivering StealC. Zscaler â Middle East opportunistic attacks
- Coordinated strikes triggered widespread hacktivist/APT activity, national internet outages and a wave of phishing/wipers; mitigations: layered defenses, offline backups, IR. Unit42 â Iranârelated escalation brief
- Assessment: AI-assisted reconnaissance and 60+ Iranianâaligned groups have turned exposed ICS/HMI portals and default credentials into massâtargeting opportunities; immediate actions: remove internetâfacing ICS, change defaults, block industrial ports. CloudSEK â ICS/OT risk assessment
Mobile & iOS exploitation
- Targeted SMS (smishing) campaign delivers trojanized Israeli âRed Alertâ app that preserves legit UI while running hidden spyware to harvest SMS, contacts, location and apps; C2 at api[.]ra-backup[.]com. Acronis â RedAlert mobile spyware
- TaxiSpy: sophisticated Android banking RAT with native obfuscation, Firebase C2, realâtime VNC control and extensive SMS/notification/keylog exfiltration targeting Russian banks. CYFIRMA â TaxiSpy RAT
- Coruna iOS exploit kit: commercialâgrade package of five exploit chains (23 exploits) targeting iOS 13â17.2.1 used by multiple operators; extensive C2/dropper infra mapped. GTIG â Coruna iOS exploit kit
AI-enabled tradecraft & agent risks
- North Koreanâlinked groups operationalize generative/agentic AI across the attack lifecycle (recon, persona fabrication, AIâassisted malware); includes artifacts like OtterCookie and GAN domain impersonation. Microsoft â AI as tradecraft
- Webâbased indirect prompt injection (IDPI) observed in the wildâhidden instructions on pages cause LLM/agents to execute attacker prompts (adâreview evasion, data exfiltration); includes IOCs and mitigations. Unit42 â IDPI / AI agent prompt injection
- Supplyâchain risk: OpenVSX versions of the Aqua Trivy VS Code extension launched local AI assistants in permissive modes for reconnaissance and attempted exfiltrationâuninstall affected versions and audit local AI activity. Socket â Trivy OpenVSX AI agent abuse
Phishing, AiTM & OAuth/session abuse
- Tycoon2FA AiTM phishingâasâaâservice enabled largeâscale MFA bypass via session cookie capture; Microsoft/partners disrupted infrastructure and seized hundreds of domainsârecommend phishingâresistant MFA and Defender protections. Microsoft â Inside Tycoon2FA
- OAuth redirection abuse: campaigns exploit OAuth redirect/silent auth (prompt=none/invalid scopes) to route users to attacker landing pages; Microsoft Entra disabled apps but monitoring remains critical. Microsoft â OAuth redirection abuse
Developer supplyâchain & repository attacks
- Multiâstage supplyâchain: weaponized GitHub repo (âShoeVistaâ) delivered obfuscated Node/Python stagers to retrieve DEV#POPPER RAT and OmniStealer via blockchain transactionsâdeveloper creds and wallets targeted. eSentire â DEV#POPPER / OmniStealer
- Malicious Packagist packages disguised as Laravel utilities contained a persistent PHP RAT connecting to helper[.]leuleu[.]net:2096 (AESâCTR) and providing remote shell/screen captureârotate secrets and treat hosts as compromised. Socket â Malicious Packagist packages
- Codeâextension repo compromise: Trivy/VS Code incident (see AI section) and related supplyâchain injection underscore need for extension vetting and credential rotation. Socket â Trivy OpenVSX AI agent abuse
Crypto theft & browser/extension/installer scams
- Malicious Chrome extension impersonating imToken redirects users to phishing pages that capture 12/24âword seed phrases and private keys. Socket â Fake imToken extension
- Fake CleanMyMac site tricks macOS users into running a loader that installs SHub Stealer, backdoors Electron wallet apps and exfiltrates Keychain/browser/wallet data. Malwarebytes â Fake CleanMyMac / SHub
- BoryptGrab stealer: deceptive GitHub pages and staged download chains steal browser wallets, tokens and screenshots and drop backdoors like TunnesshClient/Vidar. Trend Micro â BoryptGrab stealer
- Lookalike FileZilla site distributes trojanized portable FileZilla with malicious version.dll (DLL searchâorder hijack) to steal saved FTP credentials; includes DoH and C2 IOCs. Malwarebytes â Fake FileZilla trojan
- Linux X11 clipboard hijacker ClipXDaemon autonomously swaps crypto addresses (ChaCha20 rules), persists under ~/.local/bin and operates without network C2. Cyble â ClipXDaemon
RATs, stealers & multiâstage campaigns
- VioletRAT variant (Italy): memoryâcarved payload with Pastebin bootstrap, encrypted TCP C2, remote shell, RDP/credential theft and mixed version markers indicating code reuse. CERTâAGID â VioletRAT analysis
- Multiâstage Agent Tesla campaign: spearphishing â obfuscated JScript loader â encrypted PowerShell stages and reflective .NET loading to harvest cookies/credentials. Fortinet â Agent Tesla deep dive
- Email RAR campaign delivering inâmemory VIP_Keylogger via steganography/AES and process hollowing; detailed killâchains and IOCs. K7Labs â MAAS VIP_Keylogger
- WsgiDAV multiâstage phishing chain: .url â WebDAV download â .wsh/.js/.bat loaders â explorer.exe injection; Pastebin C2 config and XWorm links. CERTâAGID â WsgiDAV multiâstage campaign
Nationâstate APT activity
- Silver Dragon (Chinaânexus): targeted government/highâprofile orgs in SEA and Europe using exploited servers, phishing â Cobalt Strike; custom tools include GearDoor (Google Drive C2), BamboLoader and DNS tunneling. Check Point â Silver Dragon
- Seedworm (Iranânexus): active on multiple U.S. networks deploying novel backdoors (Dindoor in Deno, Python Fakeset), signed binaries, Rclone exfiltration to cloud storage. Security.com â Seedworm activity
- Dust Specter: Iranânexus actor targeting Iraqi officials with social engineering and undocumented .NET tools (SPLITDROP, TWINTASK, GHOSTFORM); infra uses randomized C2 URIs and signs of generative AI. Zscaler â Dust Specter
- Longâdwell Chinaâcommunicating cluster CLâUNKâ1068 targeted highâvalue sectors since 2020 using web shells, FRP tunneling, DLL sideâloading and credential theft (GodZilla, AntSword, Xnote). Unit42 â CLâUNKâ1068 investigation
- APT41: dual espionage/financialâcrime nexus leveraging rapid weaponization and livingâoffâtheâland tradecraft; tied to TOUGHPROGRESS and wide exploit usage. Socradar â APT41 profile
Vulnerabilities, exploitation chains & patching
- UseâAfterâFree in dwmcore.dll (DirectComposition) enables RCE in DWM and SYSTEM escalation via a RECTâbuffer heap spray (âGetRECTâ) and CFGâbypass gadget chain; patch discussed. Elastic â Patch diff to SYSTEM (DWM UAF)
- CVEâ2026â25611: MongoDB OP_COMPRESSED flaw allows unauthenticated remote server crash/DoS (3.4+ with compression); patch and network exposure mitigations recommended. Cato CTRL â MongoDB CVEâ2026â25611
- GTIG review: 90 zeroâdays exploited in 2025 (record enterprise targeting); warns AI will accelerate exploit discovery and exploit dev. Google Cloud â 2025 zeroâdays review
- Multiple methods to execute commands on Azure VMs/VMSS via Entra ID credentials (RunCommand, Custom Script Extension, DSC, REST/CLI); includes detection via Azure Activity Log. NetSPI â Azure VM execution techniques
- Patch reality gap: SMB median Microsoft patch time ~7.7 days with long P90 tail; operational fixes (staged rollouts, reboot discipline) most effective to reduce exposure. Acronis â Patch reality gap
- Practical hardening guidance to prepare/detect/recover from destructive attacks (identity, backups, cloud/OT segmentation, BABYWIPER detection rules). Google Cloud â Hardening for destructive attacks
Linux rootkits & persistence
- Rootkit taxonomy and hooking tradecraft: evolution from userland SO hooks â LKMs â eBPF â io_uring techniques; persistence/privilege escalation patterns and detection challenges. Elastic â Hooked on Linux (rootkit taxonomy)
Disinformation & influence infrastructure
- Doppelgänger / RRN ecosystem: cloudânative, professionally managed disinformation infrastructure using brand impersonation, automated domain generation, CDN fronting and resilient registrar/TLD diversification across Europe and the U.S. DomainTools â Doppelgänger / RRN ecosystem
Trends & sector reports
- Top malware DNS deep dive (Q4 2025): CIS highlights top 10 families, network IoCs and clientâIP/global distribution for prioritized detections. CIS â Top 10 malware Q4 2025 (DNS deep dive)
- February 2026 briefing: AIâdriven attacks and supplyâchain compromises accelerated exploit weaponization and token theftâprioritize identity hygiene, token rotation and AI agent governance. Sysdig â February 2026 security briefing
- Attack emulation: LokiLocker ransomware emulation guidance for tabletop and purpleâteam exercises. AttackIQ â Emulating LokiLocker