PROBABLYPWNED
Home/Threat Intel

Threat Intel

114 articles

FBI, CISA Warn Iran Is Attacking US Water and Energy PLCs
Threat Intelligence5 min read

FBI, CISA Warn Iran Is Attacking US Water and Energy PLCs

Joint advisory AA26-097A details Iranian APT targeting Rockwell Allen-Bradley controllers across critical infrastructure. Attacks caused operational disruptions since March 2026.

Alex KowalskiApr 8, 2026
Iran-Linked Hackers Spray 300+ Israeli M365 Tenants
Threat Intelligence4 min read

Iran-Linked Hackers Spray 300+ Israeli M365 Tenants

Check Point tracks an Iran-nexus campaign targeting Microsoft 365 accounts across 300+ Israeli organizations and 25+ UAE entities. Attackers use Tor exit nodes and Israeli VPNs to evade detection.

Alex KowalskiApr 7, 2026
Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Access
Threat Intelligence4 min read

Storm-1175 Deploys Medusa Ransomware Within 24 Hours of Access

Microsoft links China-based Storm-1175 to high-velocity Medusa ransomware attacks exploiting zero-day vulnerabilities. Healthcare, education, and finance sectors hit across Australia, UK, and US.

Alex KowalskiApr 7, 2026
Phantom Taurus Deploys Net-Star Backdoors Across Africa
Threat Intelligence3 min read

Phantom Taurus Deploys Net-Star Backdoors Across Africa

Unit 42 exposes Phantom Taurus, a Chinese APT targeting embassies and foreign ministries with fileless NET-STAR malware. The group resurfaces within hours after discovery.

Alex KowalskiApr 4, 2026
North Korea Uses GitHub as C2 in South Korea Attacks
Threat Intelligence4 min read

North Korea Uses GitHub as C2 in South Korea Attacks

FortiGuard Labs exposes DPRK campaign using LNK files and GitHub repositories for command-and-control against South Korean targets. 22 evasion techniques identified.

Alex KowalskiApr 3, 2026
APT28 Uses BEARDSHELL and COVENANT to Spy on Ukraine
Threat Intelligence4 min read

APT28 Uses BEARDSHELL and COVENANT to Spy on Ukraine

Russian GRU-linked APT28 deploys BEARDSHELL and COVENANT implants for long-term surveillance of Ukrainian military personnel. ESET research reveals cloud storage abuse for C2.

Alex KowalskiMar 10, 2026
FBI Investigating Hack of Wiretap Surveillance System
Threat Intelligence4 min read

FBI Investigating Hack of Wiretap Surveillance System

The FBI confirms a sophisticated cyberattack targeted its internal wiretap and FISA warrant management system. Investigation ongoing with CISA and NSA involvement.

Alex KowalskiMar 7, 2026
APT28 Linked to MSHTML Zero-Day Exploited Before Patch
Threat Intelligence4 min read

APT28 Linked to MSHTML Zero-Day Exploited Before Patch

Security researchers tie Russia's APT28 to CVE-2026-21513 exploitation using malicious LNK files. The MSHTML zero-day was weaponized weeks before Microsoft's February patch.

Alex KowalskiMar 3, 2026
UnsolicitedBooker APT Targets Central Asian Telecoms
Threat Intelligence4 min read

UnsolicitedBooker APT Targets Central Asian Telecoms

China-aligned threat group deploys LuciDoor and MarsSnake backdoors against telecom providers in Kyrgyzstan and Tajikistan, expanding from prior Saudi operations.

Alex KowalskiMar 1, 2026
APT37 Ruby Jumper Campaign Targets Air-Gapped Networks
Threat Intelligence4 min read

APT37 Ruby Jumper Campaign Targets Air-Gapped Networks

North Korean APT37 deploys six new malware tools to breach air-gapped systems using USB drives and cloud C2. Zscaler reveals RESTLEAF, THUMBSBD, and FOOTWINE surveillance capabilities.

Alex KowalskiFeb 27, 2026
LAPSUS$ Supergroup Paying Women $1,000 Per Vishing Call
Threat Intelligence4 min read

LAPSUS$ Supergroup Paying Women $1,000 Per Vishing Call

Scattered Lapsus$ Hunters offers $500-$1,000 to recruit women for IT help desk social engineering attacks. The supergroup combines LAPSUS$, Scattered Spider, and ShinyHunters tactics.

Alex KowalskiFeb 26, 2026
MuddyWater Deploys GhostFetch and Telegram-Based Backdoors
Threat Intelligence3 min read

MuddyWater Deploys GhostFetch and Telegram-Based Backdoors

Iranian APT MuddyWater launches Operation Olalampo against MENA organizations, deploying four new malware families including GhostFetch and CHAR, a Rust backdoor controlled via Telegram.

Alex KowalskiFeb 23, 2026
AI-Assisted Attacker Compromises 600+ FortiGate Firewalls
Threat Intelligence4 min read

AI-Assisted Attacker Compromises 600+ FortiGate Firewalls

Amazon threat intelligence exposes Russian-speaking actor using generative AI to breach 600+ FortiGate devices across 55 countries. Attack used ARXON tool with DeepSeek and Claude.

Alex KowalskiFeb 22, 2026