PROBABLYPWNED
Home/Threat Intel

Threat Intel

76 articles

LAPSUS$ Supergroup Paying Women $1,000 Per Vishing Call
Threat Intelligence4 min read

LAPSUS$ Supergroup Paying Women $1,000 Per Vishing Call

Scattered Lapsus$ Hunters offers $500-$1,000 to recruit women for IT help desk social engineering attacks. The supergroup combines LAPSUS$, Scattered Spider, and ShinyHunters tactics.

Alex KowalskiFeb 26, 2026
MuddyWater Deploys GhostFetch and Telegram-Based Backdoors
Threat Intelligence3 min read

MuddyWater Deploys GhostFetch and Telegram-Based Backdoors

Iranian APT MuddyWater launches Operation Olalampo against MENA organizations, deploying four new malware families including GhostFetch and CHAR, a Rust backdoor controlled via Telegram.

Alex KowalskiFeb 23, 2026
AI-Assisted Attacker Compromises 600+ FortiGate Firewalls
Threat Intelligence4 min read

AI-Assisted Attacker Compromises 600+ FortiGate Firewalls

Amazon threat intelligence exposes Russian-speaking actor using generative AI to breach 600+ FortiGate devices across 55 countries. Attack used ARXON tool with DeepSeek and Claude.

Alex KowalskiFeb 22, 2026
China's UNC3886 Breached All Four Singapore Telcos
Threat Intelligence3 min read

China's UNC3886 Breached All Four Singapore Telcos

Singapore confirms China-linked APT compromised M1, Singtel, StarHub, and SIMBA using zero-day exploits and rootkits. 11-month Operation Cyber Guardian response disclosed.

Alex KowalskiFeb 14, 2026
AI Knowledge Graphs Transform APT Threat Intelligence
Threat Intelligence4 min read

AI Knowledge Graphs Transform APT Threat Intelligence

SANS researchers demonstrate how open-source AI tools extract actionable relationships from unstructured threat reports, mapping GRU and APT28 TTPs in interactive visualizations.

Alex KowalskiFeb 13, 2026
State Hackers Weaponize Gemini AI Across Attack Lifecycle
Threat Intelligence5 min read

State Hackers Weaponize Gemini AI Across Attack Lifecycle

Google's threat intelligence reveals APT groups from China, Iran, North Korea, and Russia using Gemini for recon, malware development, and phishing. Two AI-powered malware families discovered.

Alex KowalskiFeb 12, 2026
North Korea Uses Deepfake Zoom Calls in Crypto Heists
Threat Intelligence4 min read

North Korea Uses Deepfake Zoom Calls in Crypto Heists

Google Mandiant exposes UNC1069's use of AI-generated deepfake video, compromised executive accounts, and ClickFix attacks to deploy macOS malware against cryptocurrency firms.

Alex KowalskiFeb 12, 2026
Germany Warns of Signal Phishing Targeting Officials
Threat Intelligence4 min read

Germany Warns of Signal Phishing Targeting Officials

Germany's BfV and BSI issued a joint advisory warning of state-sponsored phishing campaigns targeting politicians, military officials, and journalists through Signal's device linking feature.

Alex KowalskiFeb 12, 2026
Broken Phishing URLs Are Bypassing Your Filters
Threat Intelligence5 min read

Broken Phishing URLs Are Bypassing Your Filters

SANS ISC handler Xavier Mertens documents phishing campaigns using malformed URL parameters to evade regex detection, URL normalization, and IOC extraction.

Alex KowalskiFeb 5, 2026
APT28 Weaponized Office Zero-Day in Three Days Flat
Threat Intelligence3 min read

APT28 Weaponized Office Zero-Day in Three Days Flat

Operation Neusploit saw Russia's APT28 exploit CVE-2026-21509 against 60+ Ukrainian targets within 72 hours of Microsoft's disclosure, delivering MiniDoor and BEARDSHELL backdoors.

Alex KowalskiFeb 5, 2026
RedKitten Malware Targets Iranian Protest Documenters
Threat Intelligence3 min read

RedKitten Malware Targets Iranian Protest Documenters

French researchers uncover SloppyMIO, an AI-assisted malware campaign using fabricated victim lists to target individuals documenting human rights abuses during Iranian protests.

Alex KowalskiJan 31, 2026
Google Dismantles IPIDEA Proxy Network Used by 550+ APTs
Threat Intelligence4 min read

Google Dismantles IPIDEA Proxy Network Used by 550+ APTs

Google Threat Intelligence Group disrupts one of the world's largest residential proxy networks, cutting off infrastructure used by nation-state actors from China, Russia, Iran, and North Korea.

Alex KowalskiJan 31, 2026
Phishers Hide Behind Google Slides Publish Feature
Threat Intelligence5 min read

Phishers Hide Behind Google Slides Publish Feature

Attackers exploit Google Presentations' publish mode to host phishing pages that bypass Google's own security warnings, targeting Vivaldi Webmail users.

Alex KowalskiJan 30, 2026
Chinese APT Used VMware ESXi Zero-Days to Escape VMs
Threat Intelligence4 min read

Chinese APT Used VMware ESXi Zero-Days to Escape VMs

Huntress researchers discover 'MAESTRO' toolkit exploiting three VMware vulnerabilities. Attackers chained SonicWall VPN access with hypervisor escape to deploy persistent backdoors.

Alex KowalskiJan 13, 2026