PROBABLYPWNED
AK

Alex Kowalski

Threat Intelligence Reporter

Covers nation-state threat actors, APT campaigns, and geopolitical cyber operations for ProbablyPwned. Alex spent five years as an intelligence analyst in the defense sector before moving to cybersecurity journalism, specializing in Russian, Chinese, Iranian, and North Korean cyber activity. His reporting focuses on adversary TTPs, campaign attribution, and the intersection of geopolitics and cyber conflict. Alex holds a GIAC Cyber Threat Intelligence (GCTI) certification and has contributed threat intelligence research to multiple ISAC communities.

APT trackingnation-state attributionthreat actor TTPsgeopolitical cyber operationsintelligence analysis

Articles by Alex(113)

FBI, CISA Warn Iran Is Attacking US Water and Energy PLCs
Threat Intelligence5 min read

FBI, CISA Warn Iran Is Attacking US Water and Energy PLCs

Joint advisory AA26-097A details Iranian APT targeting Rockwell Allen-Bradley controllers across critical infrastructure. Attacks caused operational disruptions since March 2026.

Alex KowalskiApr 8, 2026
Iran-Linked Hackers Spray 300+ Israeli M365 Tenants
Threat Intelligence4 min read

Iran-Linked Hackers Spray 300+ Israeli M365 Tenants

Check Point tracks an Iran-nexus campaign targeting Microsoft 365 accounts across 300+ Israeli organizations and 25+ UAE entities. Attackers use Tor exit nodes and Israeli VPNs to evade detection.

Alex KowalskiApr 7, 2026
Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Access
Threat Intelligence4 min read

Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Access

Microsoft links China-based Storm-1175 to high-velocity Medusa ransomware attacks exploiting zero-day vulnerabilities. Healthcare, education, and finance sectors hit across Australia, UK, and US.

Alex KowalskiApr 7, 2026
Phantom Taurus Deploys Net-Star Backdoors Across Africa
Threat Intelligence3 min read

Phantom Taurus Deploys Net-Star Backdoors Across Africa

Unit 42 exposes Phantom Taurus, a Chinese APT targeting embassies and foreign ministries with fileless NET-STAR malware. The group resurfaces within hours after discovery.

Alex KowalskiApr 4, 2026
North Korea Uses GitHub as C2 in South Korea Attacks
Threat Intelligence4 min read

North Korea Uses GitHub as C2 in South Korea Attacks

FortiGuard Labs exposes DPRK campaign using LNK files and GitHub repositories for command-and-control against South Korean targets. 22 evasion techniques identified.

Alex KowalskiApr 3, 2026
APT28 Uses BEARDSHELL and COVENANT to Spy on Ukraine
Threat Intelligence4 min read

APT28 Uses BEARDSHELL and COVENANT to Spy on Ukraine

Russian GRU-linked APT28 deploys BEARDSHELL and COVENANT implants for long-term surveillance of Ukrainian military personnel. ESET research reveals cloud storage abuse for C2.

Alex KowalskiMar 10, 2026
FBI Investigating Hack of Wiretap Surveillance System
Threat Intelligence4 min read

FBI Investigating Hack of Wiretap Surveillance System

The FBI confirms a sophisticated cyberattack targeted its internal wiretap and FISA warrant management system. Investigation ongoing with CISA and NSA involvement.

Alex KowalskiMar 7, 2026
APT28 Linked to MSHTML Zero-Day Exploited Before Patch
Threat Intelligence4 min read

APT28 Linked to MSHTML Zero-Day Exploited Before Patch

Security researchers tie Russia's APT28 to CVE-2026-21513 exploitation using malicious LNK files. The MSHTML zero-day was weaponized weeks before Microsoft's February patch.

Alex KowalskiMar 3, 2026
UnsolicitedBooker APT Targets Central Asian Telecoms
Threat Intelligence4 min read

UnsolicitedBooker APT Targets Central Asian Telecoms

China-aligned threat group deploys LuciDoor and MarsSnake backdoors against telecom providers in Kyrgyzstan and Tajikistan, expanding from prior Saudi operations.

Alex KowalskiMar 1, 2026
APT37 Ruby Jumper Campaign Targets Air-Gapped Networks
Threat Intelligence4 min read

APT37 Ruby Jumper Campaign Targets Air-Gapped Networks

North Korean APT37 deploys six new malware tools to breach air-gapped systems using USB drives and cloud C2. Zscaler reveals RESTLEAF, THUMBSBD, and FOOTWINE surveillance capabilities.

Alex KowalskiFeb 27, 2026
LAPSUS$ Supergroup Paying Women $1,000 Per Vishing Call
Threat Intelligence4 min read

LAPSUS$ Supergroup Paying Women $1,000 Per Vishing Call

Scattered Lapsus$ Hunters offers $500-$1,000 to recruit women for IT help desk social engineering attacks. The supergroup combines LAPSUS$, Scattered Spider, and ShinyHunters tactics.

Alex KowalskiFeb 26, 2026
MuddyWater Deploys GhostFetch and Telegram-Based Backdoors
Threat Intelligence3 min read

MuddyWater Deploys GhostFetch and Telegram-Based Backdoors

Iranian APT MuddyWater launches Operation Olalampo against MENA organizations, deploying four new malware families including GhostFetch and CHAR, a Rust backdoor controlled via Telegram.

Alex KowalskiFeb 23, 2026
AI-Assisted Attacker Compromises 600+ FortiGate Firewalls
Threat Intelligence4 min read

AI-Assisted Attacker Compromises 600+ FortiGate Firewalls

Amazon threat intelligence exposes Russian-speaking actor using generative AI to breach 600+ FortiGate devices across 55 countries. Attack used ARXON tool with DeepSeek and Claude.

Alex KowalskiFeb 22, 2026
China's UNC3886 Breached All Four Singapore Telcos
Threat Intelligence3 min read

China's UNC3886 Breached All Four Singapore Telcos

Singapore confirms China-linked APT compromised M1, Singtel, StarHub, and SIMBA using zero-day exploits and rootkits. 11-month Operation Cyber Guardian response disclosed.

Alex KowalskiFeb 14, 2026
AI Knowledge Graphs Transform APT Threat Intelligence
Threat Intelligence4 min read

AI Knowledge Graphs Transform APT Threat Intelligence

SANS researchers demonstrate how open-source AI tools extract actionable relationships from unstructured threat reports, mapping GRU and APT28 TTPs in interactive visualizations.

Alex KowalskiFeb 13, 2026
State Hackers Weaponize Gemini AI Across Attack Lifecycle
Threat Intelligence5 min read

State Hackers Weaponize Gemini AI Across Attack Lifecycle

Google's threat intelligence reveals APT groups from China, Iran, North Korea, and Russia using Gemini for recon, malware development, and phishing. Two AI-powered malware families discovered.

Alex KowalskiFeb 12, 2026
North Korea Uses Deepfake Zoom Calls in Crypto Heists
Threat Intelligence4 min read

North Korea Uses Deepfake Zoom Calls in Crypto Heists

Google Mandiant exposes UNC1069's use of AI-generated deepfake video, compromised executive accounts, and ClickFix attacks to deploy macOS malware against cryptocurrency firms.

Alex KowalskiFeb 12, 2026
Germany Warns of Signal Phishing Targeting Officials
Threat Intelligence4 min read

Germany Warns of Signal Phishing Targeting Officials

Germany's BfV and BSI issued a joint advisory warning of state-sponsored phishing campaigns targeting politicians, military officials, and journalists through Signal's device linking feature.

Alex KowalskiFeb 12, 2026
Broken Phishing URLs Are Bypassing Your Filters
Threat Intelligence5 min read

Broken Phishing URLs Are Bypassing Your Filters

SANS ISC handler Xavier Mertens documents phishing campaigns using malformed URL parameters to evade regex detection, URL normalization, and IOC extraction.

Alex KowalskiFeb 5, 2026
APT28 Weaponized Office Zero-Day in Three Days Flat
Threat Intelligence3 min read

APT28 Weaponized Office Zero-Day in Three Days Flat

Operation Neusploit saw Russia's APT28 exploit CVE-2026-21509 against 60+ Ukrainian targets within 72 hours of Microsoft's disclosure, delivering MiniDoor and BEARDSHELL backdoors.

Alex KowalskiFeb 5, 2026
RedKitten Malware Targets Iranian Protest Documenters
Threat Intelligence3 min read

RedKitten Malware Targets Iranian Protest Documenters

French researchers uncover SloppyMIO, an AI-assisted malware campaign using fabricated victim lists to target individuals documenting human rights abuses during Iranian protests.

Alex KowalskiJan 31, 2026
Google Dismantles IPIDEA Proxy Network Used by 550+ APTs
Threat Intelligence4 min read

Google Dismantles IPIDEA Proxy Network Used by 550+ APTs

Google Threat Intelligence Group disrupts one of the world's largest residential proxy networks, cutting off infrastructure used by nation-state actors from China, Russia, Iran, and North Korea.

Alex KowalskiJan 31, 2026
Phishers Hide Behind Google Slides Publish Feature
Threat Intelligence5 min read

Phishers Hide Behind Google Slides Publish Feature

Attackers exploit Google Presentations' publish mode to host phishing pages that bypass Google's own security warnings, targeting Vivaldi Webmail users.

Alex KowalskiJan 30, 2026
Chinese APT Used VMware ESXi Zero-Days to Escape VMs
Threat Intelligence4 min read

Chinese APT Used VMware ESXi Zero-Days to Escape VMs

Huntress researchers discover 'MAESTRO' toolkit exploiting three VMware vulnerabilities. Attackers chained SonicWall VPN access with hypervisor escape to deploy persistent backdoors.

Alex KowalskiJan 13, 2026
CISA Closes 10 Emergency Directives in Historic Shift
Threat Intelligence4 min read

CISA Closes 10 Emergency Directives in Historic Shift

The agency retired directives spanning SolarWinds to Microsoft Exchange in the largest bulk closure ever. KEV catalog now handles most vulnerability mandates.

Alex KowalskiJan 11, 2026
Ransomware Groups to Watch in 2025-2026
Threat Intelligence5 min read

Ransomware Groups to Watch in 2025-2026

Qilin has hit 1,000+ victims. Everest targets critical infrastructure. Here's what security teams need to know about today's most active ransomware operations.

Alex KowalskiJan 10, 2026
North Korea's Cyber Army: A Lazarus Group Profile
Threat Intelligence5 min read

North Korea's Cyber Army: A Lazarus Group Profile

DPRK hackers stole $2B in cryptocurrency in 2025 alone. Understanding Lazarus Group's operations helps defend against state-sponsored financial theft.

Alex KowalskiJan 10, 2026