Cybersecurity Threat Research âWeeklyâ Recap: This overview highlights infostealers, RATs, supply-chain and CI/AI toolchain compromises, vulnerabilities, ransomware activity, and phishing campaigns, featuring notable actors and families such as CharlieKirk, XWorm, SANDWORM_MODE, QakBot, and Lynx. It also emphasizes trends like AI-driven C2 abuse, adaptive phishing via Telegram, firmware and mobile backdoors, and notable incidents involving Dell RecoverPoint, Ivanti EPMM, BeyondTrust, and SolarWinds WHD. #CharlieKirk #ArkanixStealer #MIMICRAT #ClickFix #LunarApplication #XWorm #TrustConnect #DocConnect #Foxveil #GrayCharlie #AtlassianJira #SANDWORM_MODE #Notepad++ #LotusBlossom #Chrysalis #UNC6201 #DellRecoverPoint #BeyondTrust #IvantiEPMM #SolarWindsWHD #IngressNGINX #QakBot #SinobiRansomware #LynxRansomware #Keenadu #Velociraptor #Cloudflared #DaisyCloud #Redline
Infostealers & credential theft
- CharlieKirk â Python Windows infostealer that harvests browser creds, Discord tokens, WiâFi/game artifacts and exfiltrates via GoFile + Telegram/Discord. CharlieKirk Grabber
- Arkanix Stealer â C++ & Python MaaS infostealer (browser wallets/creds) with ChromElevator injector and takedown of panel/payloads. Arkanix Stealer
- Infostealer trend â AhnLab January report: SEO-poisoning, macOS churn, and stealer families moving to ECDH+ChaCha20-Poly1305 C2 crypto. January 2026 Infostealer Trend Report
- MIMICRAT / ClickFix â Multi-stage siteâcompromise chain delivering a native RAT with ETW/AMSI bypass, Lua loader and SOCKS5 tunneling. MIMICRAT / ClickFix
- Fake Windows 11 ads (LunarApplication) â Paid Facebook ads redirected to counterfeit installers (ms-update32.exe) that install an Electron app to harvest passwords and crypto wallets. Fake Windows 11 / LunarApplication
- macOS music-plugin loader â Cracked DMG distribution delivering multistage loaders (Odyssey, MacSyncStealer) via obfuscated shell scripts and affiliate tracking. macOS music-plugin loader
RATs, loaders & initial-access campaigns
- XWorm â New RAT variant delivered via themed phishing/Excel exploits (CVE-2018-0802) and WSH droppers; AES-encrypted C2, plugin architecture for exfiltration, DDoS and ransomware enablement. XWorm campaigns
- TrustConnect / DocConnect â MaaS posing as RMM (EV-signed installers, web dashboard, $300/mo); disrupted C2 but operator pivoted to DocConnect. TrustConnect / DocConnect
- Foxveil loader â Initial-stage loader fetching Donut shellcode from Cloudflare/Netlify/Discord, in-memory injection variants and persistence tricks; blocked by SASE controls. Foxveil loader
- GrayCharlie â WordPress supplyâchain compromises of lawâfirm sites injecting JS redirecting to fake updates/ClickFix lures and NetSupport RATs with followâon Stealc/SectopRAT. GrayCharlie / NetSupport RAT
- Spam via Atlassian Jira â Disposable Jira Cloud instances abused to send localized spam using Jira Automation and trusted atlassian.net reputation to bypass email defenses. Atlassian Jira spam abuse
Supply-chain, developer & CI/AI toolchain compromises
- SANDWORM_MODE â ShaiâHuludâstyle npm worm propagating through typosquat packages and a malicious GitHub Action, harvesting CI/dev secrets and injecting MCP servers to poison AI coding assistants. SANDWORM_MODE npm worm
- Notepad++ / Lotus Blossom & Chrysalis â Longârunning Chinaâattributed APT using updateâchannel and supplyâchain compromises (Chrysalis backdoor); Elastic automation demonstrated rapid incident confirmation for such campaigns. LotusBlossom / Notepad++ supplyâchain
- UNC6201 / Dell RecoverPoint â Supplyâside exploitation of Dell RecoverPoint zeroâday enabling Tomcat WAR deployment, lateral movement and new backdoors (GRIMBOLT/BRICKSTORM/SLAYSTYLE). UNC6201 / Dell RecoverPoint
Vulnerabilities & active exploitation
- BeyondTrust CVEâ2026â1731 â Critical preâauth RCE in Remote Support exploited to deploy web shells, SparkRAT/VShell and create persistence across sectors; CISA KEV listing and detection guidance available. BeyondTrust CVEâ2026â1731 exploitation
- Ivanti EPMM CVEs â CVEâ2026â1281 & CVEâ2026â1340 actively exploited for unauthenticated enterprise MDM takeover, mass scanning and Nezha agent/backdoor installs; urgent patching recommended. Ivanti EPMM critical exploits
- SolarWinds Web Help Desk â Internetâfacing WHD exploitation chain observed since Dec 2025 using MSI installs and legitimate tooling (Velociraptor, Cloudflared) for persistence and tunneling. SolarWinds WHD exploitation
- Ingress NGINX retirement â Kubernetes Ingress NGINX to be retired after Mar 2026 (no more security fixes); migrate to Gateway APIâconformant controllers to avoid exposure (past CVE-2025-1974 example). Ingress NGINX retirement warning
Ransomware, access brokers & darkâweb marketplaces
- QakBot â Comprehensive IoC analysis names QakBot a top 2026 malware threat: prolific phishing distribution, credential harvest, persistent access and ransomware enablement; downloadable IoC dataset provided. QakBot IoC analysis
- Sinobi RaaS â New midâ2025 RaaS rebrand with Lynx/INC code overlap, closed affiliate model and doubleâextortion using Rclone exfil and Curveâ25519/AES encryption. Sinobi ransomware profile
- Lynx â Postâaccess RDP intrusion leading to rapid discovery, lateral movement, temp.sh exfiltration and ransomware deployment tied to Railnet LLC infrastructure. Lynx ransomware (DFIR)
- Access economy â Overview of underground commoditization of logins, cookies, infostealer logs and backdoors (e.g., Redline, DAISY CLOUD) fueling targeted ransomware and breaches. How cybercriminals buy access
AIâdriven threats & runtime risks
- AI-in-the-middle C2 â Webâenabled AI assistants (Grok, Copilot) can be abused as covert C2 relays fetching attacker URLs and returning commands, enabling dynamic AIâdriven malware. AIâinâtheâmiddle C2
- OpenClaw runtime risk â Selfâhosted agent runtimes that download/execute untrusted âskillsâ expand the execution boundary and risk host credential/data exposure; isolate and sandbox if evaluated. OpenClaw identity/isolation guidance
- AIâdriven scams (pig butchering) â Automated malvertising + messaging app chatbots exploit lookalike domains to socially engineer victims in Asia, leveraging RDGAâgenerated domains at scale. AIâdriven pigâbutchering scams
Mobile, firmware & platform threats
- Keenadu â Firmwareâlevel Android backdoor injected into libandroid_runtime.so / system apps, persists in Zygote, delivers modular encrypted payloads and links to BADBOX/Triada botnets. Keenadu Android backdoor
Phishing, fraud & social engineering
- Calendar phishing â Spoofed Microsoft/Google Calendar invites with embedded malicious links redirect victims to fake login pages to harvest credentials. Calendar phishing rise
- Adaptive phishing â Telegram exfil â HTML active attachments emulate login pages and exfiltrate creds + host metadata to attacker Telegram bots via the Bot API. Adaptive phishing / Telegram exfil
Research, exploit demonstrations & mitigations
- False File Immutability (Redux) â Elastic Security Labs PoC shows FFI exploit via Cloud Files driver to modify inâuse executables and achieve kernel code exec; mitigations and detection rules published. FFI (Redux) exploit & mitigations
- Elastic automation for APTs â Attack Discovery + Workflows + Agent Builder collapsed alerts and automated containment for a Chrysalis/Notepad++ update compromise, demonstrating subâ4âminute triage. Automated APT detection & response