APT

Found this article interesting? Follow us on  X (Twitter) , Facebook, Blue sky and LinkedIn to read more exclusive content we post.

APT28 Deploys BEARDSHELL and COVENANT Malware in Espionage Campaign Against Ukrainian Military

The Russia linked threat group APT28 has been observed deploying two malware implants, BEARDSHELL and COVENANT, in cyber espionage operations targeting Ukrainian military personnel. According to a new investigation by ESET, the malware tools have been actively used since April 2024 to maintain persistent access and conduct long term surveillance. APT28, also widely known by aliases such as Fancy Bear, Sednit, Pawn Storm, and TA422, […]

APT28 Deploys BEARDSHELL and COVENANT Malware in Espionage Campaign Against Ukrainian Military Read More »

UNC4899 Breached

UNC4899 Breaches Crypto Firm After Trojanized File Is AirDropped to Developer Work Device

A sophisticated cyberattack attributed to the North Korean threat group UNC4899 has reportedly compromised a cryptocurrency organization in 2025, resulting in the theft of millions of dollars worth of digital assets. The attack demonstrates how modern cyber operations combine social engineering, cloud exploitation, and supply chain style infiltration. Security researchers have linked the activity with moderate confidence

UNC4899 Breaches Crypto Firm After Trojanized File Is AirDropped to Developer Work Device Read More »

Transparent Tribe Leverages AI to Mass Produce Malware Implants in Campaign Targeting India

The Pakistan-linked threat actor Transparent Tribe has adopted AI-powered coding tools to mass-produce malware implants aimed at Indian targets, including government entities and embassies abroad. According to Bitdefender, the campaign emphasizes quantity over sophistication, generating large volumes of disposable implants using niche programming languages like Nim, Zig, and Crystal while exploiting trusted services such as Slack, Discord, Supabase, and Google Sheets to

Transparent Tribe Leverages AI to Mass Produce Malware Implants in Campaign Targeting India Read More »

Iran Linked MuddyWater Hackers Target U.S. Networks with New Dindoor Backdoor

New research from Broadcom’s Symantec and Carbon Black Threat Hunter Team reveals that an Iranian state-sponsored hacking group has infiltrated multiple U.S. organizations, including banks, airports, a non-profit, and the Israeli division of a software company. The group, known as MuddyWater (also Seedworm), operates under the Iranian Ministry of Intelligence and Security (MOIS). Analysts believe

Iran Linked MuddyWater Hackers Target U.S. Networks with New Dindoor Backdoor Read More »

Word

China Linked Hackers Deploy TernDoor, PeerTime, and BruteEntry in Attacks on South American Telecom Networks

A cyber espionage campaign linked to China has been targeting telecommunications infrastructure across South America since 2024. The attackers are focusing on Windows servers, Linux systems, and network edge devices, deploying multiple sophisticated malware implants to maintain long term access. Security researchers from Cisco Talos are monitoring this activity under the name UAT-9244, a threat cluster

China Linked Hackers Deploy TernDoor, PeerTime, and BruteEntry in Attacks on South American Telecom Networks Read More »

GHOSTFORM-Malware

Dust Specter Targets Iraqi Officials Using New SPLITDROP and GHOSTFORM Malware

Cybersecurity researchers have disclosed a campaign attributed to a suspected Iran-linked threat actor targeting Iraqi government officials. The attackers impersonated Iraq’s Ministry of Foreign Affairs to deliver previously unknown malware families, including SPLITDROP, TWINTASK, TWINTALK, and GHOSTFORM. Observed by Zscaler ThreatLabz in January 2026, the campaign employs two distinct infection chains that ultimately deploy these malicious tools. A

Dust Specter Targets Iraqi Officials Using New SPLITDROP and GHOSTFORM Malware Read More »

Ukraine-attack

APT28 Associated Campaign Uses BadPaw Loader and MeowMeow Backdoor Against Ukraine

Cybersecurity researchers have revealed a new Russian cyber campaign targeting Ukrainian organizations using two previously unknown malware families, BadPaw and MeowMeow. According to a report by ClearSky, the attack begins with a phishing email containing a link to a ZIP archive. Once extracted, an HTA file opens a decoy document in Ukrainian concerning border crossing appeals, designed to

APT28 Associated Campaign Uses BadPaw Loader and MeowMeow Backdoor Against Ukraine Read More »

APT41 Connected Silver Dragon Targets Governments with Cobalt Strike and Google Drive C2

Cybersecurity researchers have uncovered fresh details about an advanced persistent threat group known as Silver Dragon, which has been targeting government entities across Europe and Southeast Asia since at least mid 2024. According to a technical analysis published by Check Point, the group employs a mix of server exploitation and phishing attacks to gain initial access,

APT41 Connected Silver Dragon Targets Governments with Cobalt Strike and Google Drive C2 Read More »

SloppyLemming Targets Government Entities in Pakistan and Bangladesh with Dual Malware Chains

The cyber threat cluster identified as SloppyLemming has been linked to a new wave of targeted attacks against government institutions and critical infrastructure organizations in Pakistan and Bangladesh, according to fresh research from Arctic Wolf. The activity reportedly occurred between January 2025 and January 2026 and involved two separate malware delivery chains. These attack paths

SloppyLemming Targets Government Entities in Pakistan and Bangladesh with Dual Malware Chains Read More »

APT28 Linked to CVE-2026-21513 MSHTML Zero Day Exploited Ahead of Feb 2026 Patch Tuesday

A high severity Microsoft vulnerability patched during February 2026 Patch Tuesday may have been actively exploited by the Russia linked threat group APT28, according to new research from Akamai. The flaw, tracked as CVE-2026-21513 with a CVSS score of 8.8, affects the MSHTML Framework and enables attackers to bypass key Windows security protections. Microsoft described

APT28 Linked to CVE-2026-21513 MSHTML Zero Day Exploited Ahead of Feb 2026 Patch Tuesday Read More »