PROBABLYPWNED
Home/Threat Intel

Threat Intel

89 articles

APT28 Uses BEARDSHELL and COVENANT to Spy on Ukraine
Threat Intelligence4 min read

APT28 Uses BEARDSHELL and COVENANT to Spy on Ukraine

Russian GRU-linked APT28 deploys BEARDSHELL and COVENANT implants for long-term surveillance of Ukrainian military personnel. ESET research reveals cloud storage abuse for C2.

Alex KowalskiMar 10, 2026
FBI Investigating Hack of Wiretap Surveillance System
Threat Intelligence4 min read

FBI Investigating Hack of Wiretap Surveillance System

The FBI confirms a sophisticated cyberattack targeted its internal wiretap and FISA warrant management system. Investigation ongoing with CISA and NSA involvement.

Alex KowalskiMar 7, 2026
APT28 Linked to MSHTML Zero-Day Exploited Before Patch
Threat Intelligence4 min read

APT28 Linked to MSHTML Zero-Day Exploited Before Patch

Security researchers tie Russia's APT28 to CVE-2026-21513 exploitation using malicious LNK files. The MSHTML zero-day was weaponized weeks before Microsoft's February patch.

Alex KowalskiMar 3, 2026
UnsolicitedBooker APT Targets Central Asian Telecoms
Threat Intelligence4 min read

UnsolicitedBooker APT Targets Central Asian Telecoms

China-aligned threat group deploys LuciDoor and MarsSnake backdoors against telecom providers in Kyrgyzstan and Tajikistan, expanding from prior Saudi operations.

Alex KowalskiMar 1, 2026
APT37 Ruby Jumper Campaign Targets Air-Gapped Networks
Threat Intelligence4 min read

APT37 Ruby Jumper Campaign Targets Air-Gapped Networks

North Korean APT37 deploys six new malware tools to breach air-gapped systems using USB drives and cloud C2. Zscaler reveals RESTLEAF, THUMBSBD, and FOOTWINE surveillance capabilities.

Alex KowalskiFeb 27, 2026
LAPSUS$ Supergroup Paying Women $1,000 Per Vishing Call
Threat Intelligence4 min read

LAPSUS$ Supergroup Paying Women $1,000 Per Vishing Call

Scattered Lapsus$ Hunters offers $500-$1,000 to recruit women for IT help desk social engineering attacks. The supergroup combines LAPSUS$, Scattered Spider, and ShinyHunters tactics.

Alex KowalskiFeb 26, 2026
MuddyWater Deploys GhostFetch and Telegram-Based Backdoors
Threat Intelligence3 min read

MuddyWater Deploys GhostFetch and Telegram-Based Backdoors

Iranian APT MuddyWater launches Operation Olalampo against MENA organizations, deploying four new malware families including GhostFetch and CHAR, a Rust backdoor controlled via Telegram.

Alex KowalskiFeb 23, 2026
AI-Assisted Attacker Compromises 600+ FortiGate Firewalls
Threat Intelligence4 min read

AI-Assisted Attacker Compromises 600+ FortiGate Firewalls

Amazon threat intelligence exposes Russian-speaking actor using generative AI to breach 600+ FortiGate devices across 55 countries. Attack used ARXON tool with DeepSeek and Claude.

Alex KowalskiFeb 22, 2026
China's UNC3886 Breached All Four Singapore Telcos
Threat Intelligence3 min read

China's UNC3886 Breached All Four Singapore Telcos

Singapore confirms China-linked APT compromised M1, Singtel, StarHub, and SIMBA using zero-day exploits and rootkits. 11-month Operation Cyber Guardian response disclosed.

Alex KowalskiFeb 14, 2026
AI Knowledge Graphs Transform APT Threat Intelligence
Threat Intelligence4 min read

AI Knowledge Graphs Transform APT Threat Intelligence

SANS researchers demonstrate how open-source AI tools extract actionable relationships from unstructured threat reports, mapping GRU and APT28 TTPs in interactive visualizations.

Alex KowalskiFeb 13, 2026
State Hackers Weaponize Gemini AI Across Attack Lifecycle
Threat Intelligence5 min read

State Hackers Weaponize Gemini AI Across Attack Lifecycle

Google's threat intelligence reveals APT groups from China, Iran, North Korea, and Russia using Gemini for recon, malware development, and phishing. Two AI-powered malware families discovered.

Alex KowalskiFeb 12, 2026
North Korea Uses Deepfake Zoom Calls in Crypto Heists
Threat Intelligence4 min read

North Korea Uses Deepfake Zoom Calls in Crypto Heists

Google Mandiant exposes UNC1069's use of AI-generated deepfake video, compromised executive accounts, and ClickFix attacks to deploy macOS malware against cryptocurrency firms.

Alex KowalskiFeb 12, 2026
Germany Warns of Signal Phishing Targeting Officials
Threat Intelligence4 min read

Germany Warns of Signal Phishing Targeting Officials

Germany's BfV and BSI issued a joint advisory warning of state-sponsored phishing campaigns targeting politicians, military officials, and journalists through Signal's device linking feature.

Alex KowalskiFeb 12, 2026
Broken Phishing URLs Are Bypassing Your Filters
Threat Intelligence5 min read

Broken Phishing URLs Are Bypassing Your Filters

SANS ISC handler Xavier Mertens documents phishing campaigns using malformed URL parameters to evade regex detection, URL normalization, and IOC extraction.

Alex KowalskiFeb 5, 2026
APT28 Weaponized Office Zero-Day in Three Days Flat
Threat Intelligence3 min read

APT28 Weaponized Office Zero-Day in Three Days Flat

Operation Neusploit saw Russia's APT28 exploit CVE-2026-21509 against 60+ Ukrainian targets within 72 hours of Microsoft's disclosure, delivering MiniDoor and BEARDSHELL backdoors.

Alex KowalskiFeb 5, 2026
RedKitten Malware Targets Iranian Protest Documenters
Threat Intelligence3 min read

RedKitten Malware Targets Iranian Protest Documenters

French researchers uncover SloppyMIO, an AI-assisted malware campaign using fabricated victim lists to target individuals documenting human rights abuses during Iranian protests.

Alex KowalskiJan 31, 2026
Google Dismantles IPIDEA Proxy Network Used by 550+ APTs
Threat Intelligence4 min read

Google Dismantles IPIDEA Proxy Network Used by 550+ APTs

Google Threat Intelligence Group disrupts one of the world's largest residential proxy networks, cutting off infrastructure used by nation-state actors from China, Russia, Iran, and North Korea.

Alex KowalskiJan 31, 2026
Phishers Hide Behind Google Slides Publish Feature
Threat Intelligence5 min read

Phishers Hide Behind Google Slides Publish Feature

Attackers exploit Google Presentations' publish mode to host phishing pages that bypass Google's own security warnings, targeting Vivaldi Webmail users.

Alex KowalskiJan 30, 2026