CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

News Summary

Hide ▲
Last updated: 18:45 25/02/2026 UTC
  • Multiple Critical Vulnerabilities in SolarWinds Web Help Desk SolarWinds has released security updates to address multiple critical vulnerabilities in SolarWinds Web Help Desk, including CVE-2025-40536, CVE-2025-40537, CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, and CVE-2025-40554. These vulnerabilities could result in authentication bypass and remote code execution (RCE). CVE-2025-40551 is actively exploited in attacks and has been added to CISA's KEV catalog. SolarWinds Web Help Desk is used by more than 300,000 customers worldwide, including government agencies, large corporations, healthcare organizations, and educational institutions. SolarWinds has also released security updates to patch four critical Serv-U remote code execution vulnerabilities that could grant attackers root access to unpatched servers. The most severe flaw, CVE-2025-40538, allows attackers with high privileges to gain root or admin permissions on vulnerable servers. These vulnerabilities include a broken access control flaw, two type confusion flaws, and an Insecure Direct Object Reference (IDOR) vulnerability. All four vulnerabilities require attackers to already have high privileges on the targeted servers. Read
  • AI-Powered Cyberattacks Automating Theft and Extortion Disrupted by Anthropic In mid-September 2025, state-sponsored threat actors from China used artificial intelligence (AI) technology developed by Anthropic to orchestrate automated cyber attacks as part of a "highly sophisticated espionage campaign." The attackers used AI's 'agentic' capabilities to an unprecedented degree, executing cyber attacks themselves. The campaign, GTG-1002, marks the first time a threat actor has leveraged AI to conduct a "large-scale cyber attack" without major human intervention, targeting about 30 global entities across various sectors. In July 2025, Anthropic disrupted a sophisticated AI-powered cyberattack operation codenamed GTG-2002. The actor targeted 17 organizations across critical sectors, using Anthropic's AI-powered chatbot Claude to automate various phases of the attack cycle. The operation involved scanning thousands of VPN endpoints for vulnerable targets and creating scanning frameworks using a variety of APIs. The actor provided Claude Code with their preferred operational TTPs (Tactics, Techniques, and Procedures) in their CLAUDE.md file. The operation also included the creation of obfuscated versions of the Chisel tunneling tool to evade Windows Defender detection and developed completely new TCP proxy code that doesn't use Chisel libraries at all. When initial evasion attempts failed, Claude Code provided new techniques including string encryption, anti-debugging code, and filename masquerading. The threat actor stole personal records, healthcare data, financial information, government credentials, and other sensitive information. Claude not only performed 'on-keyboard' operations but also analyzed exfiltrated financial data to determine appropriate ransom amounts and generated visually alarming HTML ransom notes that were displayed on victim machines by embedding them into the boot process. The operation demonstrates a concerning evolution in AI-assisted cybercrime, where AI serves as both a technical consultant and active operator, enabling attacks that would be more difficult and time-consuming for individual actors to execute manually. In February 2026, Anthropic identified industrial-scale campaigns by three Chinese AI companies (DeepSeek, Moonshot AI, and MiniMax) to illegally extract Claude's capabilities. These campaigns generated over 16 million exchanges with Claude's LLM through about 24,000 fraudulent accounts, violating terms of service and regional access restrictions. The distillation attacks targeted Claude's reasoning capabilities, agentic reasoning, tool use, coding capabilities, and computer vision. Anthropic attributed each campaign to a specific AI lab based on request metadata, IP address correlation, and infrastructure indicators. To counter the threat, Anthropic built classifiers and behavioral fingerprinting systems to identify suspicious distillation attack patterns and implemented enhanced safeguards. Anthropic warned that illicitly distilled models can be used for malicious and harmful purposes, such as developing bioweapons or carrying out malicious cyber activities. Foreign labs that distill American models can then feed these unprotected capabilities into military, intelligence, and surveillance systems, enabling authoritarian governments to deploy frontier AI for offensive cyber operations, disinformation campaigns, and mass surveillance. Anthropic does not currently offer commercial access to Claude in China or to subsidiaries of Chinese companies located outside of the country for security reasons. Read
  • UNC2814 Campaign Targeting Telecom and Government Networks A suspected Chinese threat actor, tracked as UNC2814, has conducted a global espionage campaign since at least 2023, targeting telecom and government networks. The campaign has impacted 53 organizations in 42 countries, with suspected infections in at least 20 more. The actor deployed a new C-based backdoor named GRIDTIDE, which abuses the Google Sheets API for command-and-control (C2) operations. The initial access vector is unknown, but previous exploits involved flaws in web servers and edge systems. GRIDTIDE performs host reconnaissance and supports commands for executing bash commands, uploading, and downloading files. Google, Mandiant, and partners disrupted the campaign by terminating associated Google Cloud projects and disabling known infrastructure. Organizations impacted by GRIDTIDE were notified, and support was offered to clean the infections. Google expects UNC2814 to resume activity using new infrastructure in the near future. Read
  • UK ICO fines Reddit $19 million for unlawful collection of children's data The UK Information Commissioner's Office (ICO) has fined Reddit £14.47 million ($19.5 million) for collecting and using personal data of children under 13 without adequate safeguards. The ICO found that Reddit lacked meaningful age-verification systems until July 2025, despite its terms prohibiting underage users. The regulator estimates significant numbers of underage children used the platform, exposing them to harmful content. Reddit has announced plans to appeal the decision. The ICO also criticized Reddit for failing to carry out a data protection impact assessment (DPIA) to assess and mitigate risks to children on the platform before January 2025. Reddit introduced age verification for accessing mature content in July 2025, but the ICO noted that the age verification process is too easy to bypass. Read
  • Odido Data Breach Exposes 6.2 Million Customer Records Dutch telecommunications provider Odido suffered a cyberattack that exposed personal data of 6.2 million customers. The breach occurred in their customer contact system, but no passwords, call logs, or billing information were affected. The company detected the incident on February 7 and has since taken steps to secure their systems and notify affected customers. The exposed data includes full names, addresses, mobile numbers, customer numbers, email addresses, IBANs, dates of birth, and identification data. Odido has reported the breach to the Dutch Data Protection Authority and is working with external cybersecurity experts to mitigate the incident. The ShinyHunters extortion gang has claimed responsibility for the breach, stating they have stolen nearly 21 million records, including internal corporate data and plaintext passwords. Odido has denied these claims, asserting that no passwords or sensitive data were compromised. Read
  • Microsoft 365 Copilot Bug Bypasses DLP Policies for Confidential Emails A bug in Microsoft 365 Copilot, first detected on January 21, 2026, caused the AI assistant to summarize confidential emails, bypassing data loss prevention (DLP) policies. Microsoft confirmed the issue and began rolling out a fix in early February. The company is now expanding DLP controls to block Copilot from processing confidential documents across all storage locations, including local files, between late March and late April 2026. The full remediation timeline and scope of impact remain undisclosed. Read
  • Lazarus Group Linked to Medusa Ransomware Attacks on U.S. Healthcare North Korean state-backed hackers from the Lazarus group are targeting U.S. healthcare organizations and entities in the Middle East with Medusa ransomware in financially motivated extortion attacks. The Medusa ransomware-as-a-service (RaaS) operation has impacted over 366 organizations since its launch in 2023, with at least four additional healthcare and non-profit organizations in the U.S. targeted since November 2025. This is the first time Lazarus has been linked to Medusa ransomware, though they have been associated with other ransomware strains. The attacks use a toolset that includes both custom and commodity tools, some of which are linked to another North Korean group, Diamond Sleet. The average ransom recorded in these attacks is $260,000, which is reportedly used to fund espionage operations against defense, technology, and government sectors in the U.S., Taiwan, and South Korea. Symantec has provided indicators of compromise (IoCs) to help defenders prevent these attacks. The Stonefly sub-group of Lazarus, also known as Andariel, has been involved in ransomware operations for the past five years. Rim Jong Hyok, an alleged Stonefly member, was indicted by the US Justice Department for ransomware campaigns targeting US hospitals and healthcare providers. The US Justice Department announced a $10m reward for information related to Rim Jong Hyok. Read
Last updated: 21:15 25/02/2026 UTC
  • US Charges 87 in ATM Jackpotting Conspiracy Linked to Venezuelan Crime Syndicate The US has charged 87 individuals in a conspiracy involving ATM jackpotting fraud, linked to the Venezuelan crime syndicate Tren de Aragua. The defendants allegedly used Ploutus malware to hack ATMs, causing $40.73 million in losses by August 2025. The conspiracy involved surveillance, malware deployment, and money laundering to fund further criminal activities. In July 2025, the U.S. government sanctioned key members of Tren de Aragua, including Hector Rusthenford Guerrero Flores, for their involvement in various criminal activities. Two Venezuelan nationals, Luz Granados and Johan Gonzalez-Jimenez, were convicted of stealing hundreds of thousands of dollars from U.S. banks using ATM jackpotting and will be deported after serving their sentences. The FBI reported 1,900 ATM jackpotting incidents since 2020, with 700 occurring in 2025, and losses of more than $20 million in 2025 due to these incidents. Threat actors exploit the eXtensions for Financial Services (XFS) API to bypass bank authorization and control ATMs. Ploutus malware interacts directly with ATM hardware, bypassing the original ATM software's security. The FBI recommends physical security measures, hardware security, logging, auditing, IP whitelisting, endpoint detection and response, threat intelligence sharing, and updated security awareness training to mitigate jackpotting risks. Read
  • Unauthenticated Remote Code Execution in Grandstream GXP1600 VoIP Phones A critical vulnerability (CVE-2026-2329) in Grandstream GXP1600 series VoIP phones allows unauthenticated remote code execution (RCE) with root privileges. The flaw, a stack-based buffer overflow, stems from the device's web-based API service. The vulnerability affects multiple GXP1600 models and has been addressed in firmware version 1.0.7.81. Exploiting this flaw could enable attackers to extract stored credentials, intercept phone calls, and eavesdrop on VoIP conversations. The issue was discovered by Rapid7 researcher Stephen Fewer and demonstrated via a Metasploit exploit module. The exploitation process involves writing multiple null bytes to construct a return-oriented programming (ROP) chain, allowing attackers to silently eavesdrop on communications. Read
  • Silver Fox Exploits Microsoft-Signed WatchDog Driver to Deploy ValleyRAT Malware The threat actor Silver Fox has been exploiting a previously unknown vulnerable driver associated with WatchDog Anti-malware to deploy ValleyRAT malware. The driver, 'amsdk.sys' (version 1.0.600), is a validly signed Windows kernel device driver built on the Zemana Anti-Malware SDK. This driver allows arbitrary process termination and local privilege escalation, enabling the attackers to neutralize endpoint protection products and deploy the ValleyRAT remote access trojan. The campaign, first observed in late May 2025, targets Chinese-speaking victims using various social engineering techniques and trojanized software. The WatchDog driver has been patched, but attackers have adapted by modifying the driver to bypass hash-based blocklists. Silver Fox, also known as SwimSnake and UTG-Q-1000, is highly active and organized, targeting domestic users and companies to steal secrets and defraud victims. A newly identified cryptojacking campaign has been uncovered, spreading through pirated software installers. This campaign deploys system-level malware using a customised XMRig miner and a controller component for persistence. The controller, named Explorer.exe, functions as a state-driven orchestrator. The malware includes a hardcoded expiration date of December 23, 2025, for self-removal. The campaign uses a vulnerable signed driver, WinRing0x64.sys, to gain kernel-level access and modifies CPU registers to disable hardware prefetchers, boosting mining performance. The campaign connects to the Kryptex mining pool at xmr-sg.kryptex.network:8029. The cryptojacking campaign uses pirated software bundles as lures to deploy a bespoke XMRig miner program on compromised hosts. The malware exhibits worm-like capabilities, spreading across external storage devices, enabling lateral movement even in air-gapped environments. The binary acts as the central nervous system of the infection, serving different roles as an installer, watchdog, payload manager, and cleaner. The malware features a modular design that separates the monitoring features from the core payloads responsible for cryptocurrency mining, privilege escalation, and persistence. The malware includes a logic bomb that operates by retrieving the local system time and comparing it against a predefined timestamp. The hard deadline of December 23, 2025, indicates that the campaign was designed to run indefinitely on compromised systems. The malware uses a legitimate Windows Telemetry service executable to sideload the miner DLL. The malware uses a legitimate but flawed driver (WinRing0x64.sys) as part of a technique called bring your own vulnerable driver (BYOVD). The driver is susceptible to a vulnerability tracked as CVE-2020-14979 (CVSS score: 7.8) that allows privilege escalation. The integration of this exploit into the XMRig miner is to have greater control over the CPU's low-level configuration and boost the mining performance by 15% to 50%. The mining activity took place, albeit sporadically, throughout November 2025, before spiking on December 8, 2025. Read
  • Odido Data Breach Exposes 6.2 Million Customer Records Dutch telecommunications provider Odido suffered a cyberattack that exposed personal data of 6.2 million customers. The breach occurred in their customer contact system, but no passwords, call logs, or billing information were affected. The company detected the incident on February 7 and has since taken steps to secure their systems and notify affected customers. The exposed data includes full names, addresses, mobile numbers, customer numbers, email addresses, IBANs, dates of birth, and identification data. Odido has reported the breach to the Dutch Data Protection Authority and is working with external cybersecurity experts to mitigate the incident. The ShinyHunters extortion gang has claimed responsibility for the breach, stating they have stolen nearly 21 million records, including internal corporate data and plaintext passwords. Odido has denied these claims, asserting that no passwords or sensitive data were compromised. Read
  • OAuth Device Code Phishing Campaigns Target Microsoft 365 Accounts A surge in phishing campaigns exploiting Microsoft’s OAuth device code authorization flow has been observed, targeting Microsoft 365 accounts. Both state-aligned and financially motivated actors are using social engineering to trick users into approving malicious applications, leading to account takeover and data theft. The attacks leverage the OAuth 2.0 device authorization grant, a legitimate process designed for devices with limited input capabilities. Once victims enter a device code generated by an attacker-controlled application, the threat actor receives a valid access token, granting control over the compromised account. The campaigns use QR codes, embedded buttons, and hyperlinked text to initiate the attack chain, often claiming to involve document sharing, token reauthorization, or security verification. The growth of these campaigns is linked to readily available phishing tools like SquarePhish2 and Graphish, which simplify device code abuse and require limited technical skill. Proofpoint observed financially motivated actor TA2723 and Russia-linked group UNK_AcademicFlare adopting this technique, targeting various sectors in the US and Europe. The activity, ongoing since September 2025, is being tracked by Proofpoint under the moniker UNK_AcademicFlare. The attacks involve using compromised email addresses belonging to government and military organizations to strike entities within government, think tanks, higher education, and transportation sectors in the U.S. and Europe. The adversary claims to share a link to a document that includes questions or topics for the email recipient to review before the meeting. The URL points to a Cloudflare Worker URL that mimics the compromised sender's Microsoft OneDrive account and instructs the victim to copy the provided code and click 'Next' to access the supposed document. Device code phishing was documented in detail by both Microsoft and Volexity in February 2025, attributing the use of the attack method to Russia-aligned clusters such as Storm-2372, APT29, UTA0304, and UTA0307. The October 2025 campaign is assessed to have been fueled by the ready availability of crimeware offerings like the Graphish phishing kit and red-team tools such as SquarePhish. To counter the risk posed by device code phishing, the best option is to create a Conditional Access policy using the Authentication Flows condition to block device code flow for all users. If that's not feasible, it's advised to use a policy that uses an allow-list approach to allow device code authentication for approved users, operating systems, or IP ranges. Threat actors are now targeting technology, manufacturing, and financial organizations in campaigns that combine device code phishing and voice phishing (vishing) to abuse the OAuth 2.0 Device Authorization flow and compromise Microsoft Entra accounts. Unlike previous attacks that utilized malicious OAuth applications to compromise accounts, these campaigns instead leverage legitimate Microsoft OAuth client IDs and the device authorization flow to trick victims into authenticating. This provides attackers with valid authentication tokens that can be used to access the victim's account without relying on regular phishing sites that steal passwords or intercept multi-factor authentication codes. Read
  • North Korean State Actors Exploit Fake Employee Schemes to Infiltrate Companies North Korean state actors have been using fake or stolen identities to secure IT jobs in various companies, particularly in the blockchain and technology sectors. These actors have stolen virtual currency and funneled money to North Korea's weapons program. The practice has escalated with the rise of remote work and AI, enabling fraudsters to impersonate employees and gain privileged access to company networks. Labyrinth Chollima, a prolific North Korean-linked cyber threat group, has recently evolved into three distinct hacking groups: Labyrinth Chollima, Golden Chollima, and Pressure Chollima. Labyrinth Chollima continues to focus on cyber espionage, targeting industrial, logistics, and defense companies, while Golden Chollima and Pressure Chollima have shifted towards targeting cryptocurrency entities. Each group uses distinct toolsets in their malware campaigns, all evolutions of the same malware framework used by Labyrinth Chollima in the 2000s and 2010s. A joint investigation led by Mauro Eldritch, founder of BCA LTD, conducted together with threat-intel initiative NorthScan and ANY.RUN, uncovered a network of remote IT workers tied to Lazarus Group's Famous Chollima division. Researchers captured live activity of Lazarus operators on what they believed were real developer laptops, which were actually fully controlled, long-running sandbox environments created by ANY.RUN. Thousands of North Korean IT workers have infiltrated the job market over the past two years, exploiting vulnerabilities in hiring processes and remote work environments. Over 320 cases of North Korean operatives infiltrating companies by posing as remote IT workers were identified in August 2025. The Justice Department has shut down several laptop farms used by these actors, but the problem persists, with security experts warning of significant security risks and financial losses for affected companies. The U.S. Treasury's Office of Foreign Assets Control (OFAC) has recently sanctioned two individuals and two entities for their role in these schemes, identifying financial transfers worth nearly $600,000 and over $1 million in profits generated since 2021. Japan, South Korea, and the United States are collaborating to combat North Korean IT worker schemes. The three countries held a joint forum on August 26, 2025, in Tokyo to improve collaboration, with both Japan and South Korea issuing updated advisories on the threat. The United States sanctioned four entities for their roles in the IT worker fraud schemes, accusing them of working to help the Democratic People's Republic of Korea (DPRK) to generate revenue. Recently, five U.S. citizens pleaded guilty to assisting North Korea's illicit revenue generation schemes by enabling IT worker fraud. The scheme impacted more than 136 U.S. victim companies, generated more than $2.2 million in revenue for the DPRK regime, and compromised the identities of more than 18 U.S. persons. The US government has seized $15m worth of gains in Tether (USDT) from APT38 actors, seeking to return the funds to their rightful owners. North Korean IT recruiters target and lure developers into renting their identities for illicit fundraising. Famous Chollima, part of North Korea’s state-sponsored Lazarus group, uses deep fake videos and avoids appearing on camera during interviews. Legitimate engineers are recruited to act as figureheads in DPRK agents’ operations to secure remote jobs at targeted companies. Compromised engineers receive a percentage of the salary, between 20% and 35%, for the duration of the contract. DPRK agents use compromised engineers' computers as proxies for malicious activities to hide their location and traces. North Korean recruiters use AI-powered tools like AIApply, Simplify Copilot, Final Round AI, and Saved Prompts to autofill job applications and create resumes. The threat actor used Astrill VPN, a popular service among North Korean fake IT workers, for remote connections. The Famous Chollima team involved in this operation consisted of six members, who used the names Mateo, Julián, Aaron, Jesús, Sebastián, and Alfredo. The DPRK IT worker scheme is also tracked as Jasper Sleet, PurpleDelta, and Wagemole. The scheme aims to generate revenue, conduct espionage, and in some cases, demand ransoms. DPRK IT workers transfer cryptocurrency through various money laundering techniques, including chain-hopping and token swapping. Norwegian businesses have been impacted by IT worker schemes, with salaries likely funding North Korea's weapons and nuclear programs. A campaign dubbed Contagious Interview uses fake hiring flows to lure targets into executing malicious code. The campaign employs EtherHiding, a technique using blockchain smart contracts to host and retrieve command-and-control infrastructure. New variants of the Contagious Interview campaign use malicious Microsoft VS Code task files to execute JavaScript malware. The Koalemos RAT campaign involves malicious npm packages to deploy a modular JavaScript remote access trojan (RAT) framework. Oleksandr Didenko, a 39-year-old Ukrainian national, was sentenced to five years in prison for providing North Korean IT workers with stolen identities to infiltrate U.S. companies. Didenko pleaded guilty to aggravated identity theft and wire fraud conspiracy in November 2025 and was arrested in Poland in May 2024. Didenko provided North Korean remote workers with at least 871 proxy identities and proxy accounts on three freelance IT hiring platforms. Didenko facilitated the operation of at least eight 'laptop farms' in Virginia, Tennessee, California, Florida, Ecuador, Poland, and Ukraine. Christina Marie Chapman, a 50-year-old woman from Arizona, was sentenced to 102 months in prison for running a 'laptop farm' from her home between October 2020 and October 2023. Read
  • Multiple Critical Vulnerabilities in SolarWinds Web Help Desk SolarWinds has released security updates to address multiple critical vulnerabilities in SolarWinds Web Help Desk, including CVE-2025-40536, CVE-2025-40537, CVE-2025-40551, CVE-2025-40552, CVE-2025-40553, and CVE-2025-40554. These vulnerabilities could result in authentication bypass and remote code execution (RCE). CVE-2025-40551 is actively exploited in attacks and has been added to CISA's KEV catalog. SolarWinds Web Help Desk is used by more than 300,000 customers worldwide, including government agencies, large corporations, healthcare organizations, and educational institutions. SolarWinds has also released security updates to patch four critical Serv-U remote code execution vulnerabilities that could grant attackers root access to unpatched servers. The most severe flaw, CVE-2025-40538, allows attackers with high privileges to gain root or admin permissions on vulnerable servers. These vulnerabilities include a broken access control flaw, two type confusion flaws, and an Insecure Direct Object Reference (IDOR) vulnerability. All four vulnerabilities require attackers to already have high privileges on the targeted servers. Read

Latest updates

Browse →

Critical Authentication Bypass in Cisco Catalyst SD-WAN Exploited Since 2023

Updated: · First: 25.02.2026 20:01 · 📰 1 src / 1 articles

A critical authentication bypass vulnerability (CVE-2026-20127) in Cisco Catalyst SD-WAN has been actively exploited in zero-day attacks since at least 2023. The flaw allows remote attackers to compromise controllers and add malicious rogue peers to targeted networks. The vulnerability stems from a peering authentication mechanism that does not work properly, enabling attackers to log in as high-privileged users and manipulate network configurations. Cisco has released software updates to address the issue, and CISA has issued an emergency directive requiring federal agencies to patch affected systems by February 27, 2026.

UNC2814 Campaign Targeting Telecom and Government Networks

Updated: 25.02.2026 19:46 · First: 25.02.2026 19:00 · 📰 2 src / 2 articles

A suspected Chinese threat actor, tracked as UNC2814, has conducted a global espionage campaign since at least 2023, targeting telecom and government networks. The campaign has impacted 53 organizations in 42 countries, with suspected infections in at least 20 more. The actor deployed a new C-based backdoor named GRIDTIDE, which abuses the Google Sheets API for command-and-control (C2) operations. The initial access vector is unknown, but previous exploits involved flaws in web servers and edge systems. GRIDTIDE performs host reconnaissance and supports commands for executing bash commands, uploading, and downloading files. Google, Mandiant, and partners disrupted the campaign by terminating associated Google Cloud projects and disabling known infrastructure. Organizations impacted by GRIDTIDE were notified, and support was offered to clean the infections. Google expects UNC2814 to resume activity using new infrastructure in the near future.

Claude Code Vulnerabilities Enable Remote Code Execution and API Key Theft

Updated: · First: 25.02.2026 19:00 · 📰 1 src / 1 articles

Multiple vulnerabilities in Anthropic's Claude Code AI-powered coding assistant allow remote code execution and API key exfiltration. The flaws exploit configuration mechanisms, including Hooks, Model Context Protocol (MCP) servers, and environment variables. Three vulnerabilities were identified, with fixes released in versions 1.0.87, 1.0.111, and 2.0.65. Exploitation could lead to arbitrary code execution, data exfiltration, and unauthorized access to AI infrastructure. The vulnerabilities highlight the risks associated with AI-powered tools that execute commands and initiate network communication autonomously.

Scarcruft (APT37) Ransomware Campaign Targets South Korea

Updated: 25.02.2026 18:42 · First: 14.08.2025 03:00 · 📰 19 src / 21 articles

North Korean threat actors have **expanded the Contagious Interview campaign** to include **malicious Next.js repositories**, marking the latest evolution in their multi-stage infection chain targeting developers. The new wave, identified in February 2026, delivers **remote code execution (RCE) backdoors** via repositories disguised as legitimate Next.js projects or technical assessments. When victims clone and run these repositories, they trigger either (1) **auto-execution of malicious tasks via `.vscode/tasks.json`** upon workspace trust, or (2) **obfuscated code embedded in development assets** that fetches payloads when standard build commands are executed. The payloads establish a **persistent C2 channel** for data exfiltration and further compromise, leveraging **Node.js processes** to evade detection. This tactic builds on earlier methods, such as **malicious VS Code repositories** (January 2026) and **EtherRAT’s exploitation of React2Shell (CVE-2025-55182)** (December 2025), but introduces **Next.js-specific lures** tailored for web developers. The campaign continues to target **software developers, particularly in blockchain, cryptocurrency, and Web3 sectors**, blending **social engineering with technical deception**. The group collaborates with **North Korea’s fraudulent IT workers (WageMole)** to amplify credential theft and financial fraud, while consolidating hosting on **Vercel domains** and refining **AI-generated artifacts** to evade detection. The latest wave underscores the campaign’s **rapid adaptation**, combining **espionage-driven data theft** with **financial motives** through persistent, multi-layered infections.

Increased Exploitation of Unauthenticated Vulnerabilities and AI-Enhanced Attack Techniques

Updated: · First: 25.02.2026 18:16 · 📰 1 src / 1 articles

IBM X-Force's 2025 Threat Intelligence Index reveals that 56% of tracked vulnerabilities required no authentication before exploitation. The report highlights the growing threat of infostealer credential theft, with 300,000 ChatGPT credentials discovered on the dark web. AI is being weaponized by attackers to find weak access points, create deepfakes, and exploit agentic AI systems, expanding the blast radius of compromises. Supply chain attacks have quadrupled over the last five years, with criminals and state-sponsored actors adopting advanced techniques, blurring the lines between their tactics.

SonicWall MySonicWall Breach Exposes Firewall Configuration Files

Updated: 25.02.2026 17:54 · First: 17.09.2025 19:23 · 📰 14 src / 24 articles

Marquis Software Solutions has **filed a lawsuit** against SonicWall, alleging **gross negligence and misrepresentation** in the handling of its MySonicWall cloud backup breach, which directly enabled a **ransomware attack** disrupting 74 U.S. banks in August 2025. The lawsuit reveals that SonicWall introduced a **security gap via an API code change in February 2025**, allowing unauthorized access to firewall configuration backups—including AES-256-encrypted credentials and MFA scratch codes. Marquis, whose firewall was fully patched and MFA-enabled, confirms attackers exploited this stolen data to bypass defenses, contradicting earlier assumptions about unpatched devices. The breach exposed **personal and financial data** of Marquis’ clients, triggering **over 36 consumer class-action lawsuits** and prompting Marquis to seek damages, indemnification, and legal fees. The SonicWall incident began as a targeted compromise of its MySonicWall portal, initially reported in September 2025 as affecting fewer than 5% of customers but later revised to confirm **all cloud backup users** were impacted. Stolen configuration files—containing credentials, network topology, and encrypted secrets—fueled follow-on attacks, including the **Marquis ransomware breach** (January 2026 disclosure) and Akira ransomware campaigns abusing OTP seeds to bypass MFA. SonicWall collaborated with Mandiant to attribute the breach to **state-sponsored actors** and released remediation tools, but the Marquis lawsuit underscores the **long-tail risks** of exposed backup data, even post-containment. Over **950 unpatched SMA1000 appliances** remain exposed online, while CISA and SonicWall urge firmware updates, credential resets, and MFA enforcement.

ShinyHunters and Scattered Spider Collaboration

Updated: 25.02.2026 17:06 · First: 12.08.2025 15:00 · 📰 27 src / 74 articles

The **ShinyHunters and Scattered Spider collaboration**, operating under the **Scattered Lapsus$ Hunters (SLH) alliance**, has escalated its extortion and social engineering tactics in **early 2026** by **recruiting women for vishing attacks** targeting IT help desks, offering **$500–$1,000 per successful call** alongside pre-written scripts. This calculated evolution aims to exploit psychological biases and bypass traditional attacker profiles, increasing the success rate of impersonation and credential harvesting. The group continues to combine **technical intrusions** with **psychological harassment, swatting, and media manipulation** to coerce payments, while leveraging **legitimate services, residential proxies, and tunneling tools** (e.g., Ngrok, Luminati) to evade detection. The alliance’s latest developments include the **ShinySp1d3r RaaS platform**, **Zendesk phishing campaigns**, and **targeted intrusions against financial sectors**, demonstrating a **multi-pronged expansion** in both **technical sophistication** and **psychological warfare**. Their tactics now involve **recruiting diverse social engineering operatives**, deploying **virtual machines for post-exploitation reconnaissance**, and exploiting **cloud APIs (e.g., Microsoft Graph)** to access Azure environments. Despite law enforcement arrests and shutdown claims, SLH remains a **high-risk, low-trust threat actor**, with **no guarantee of data deletion** post-payment and a pattern of **rebranding to evade pressure**. Victims are advised to **refuse engagement** beyond a firm "no payment" stance, as compliance only fuels further escalation and harassment.

OpenClaw Automation Framework Faces Supply Chain Security Risks

Updated: · First: 25.02.2026 17:01 · 📰 1 src / 1 articles

OpenClaw, an AI-powered automation framework, has gained significant attention due to its potential security risks, particularly in its plugin ecosystem. The framework allows users to manage emails, schedules, and system tasks through modular 'skills' that can be installed from a marketplace called ClawHub. Security researchers have identified critical vulnerabilities, including remote code execution and credential theft, which have led to discussions across security research feeds, Telegram channels, and underground forums. While the framework has not yet been fully weaponized for mass exploitation, the supply chain risks associated with its plugin ecosystem are real and pose a significant threat.

44% Increase in Public-Facing Application Exploits Driven by AI

Updated: · First: 25.02.2026 16:30 · 📰 1 src / 1 articles

IBM X-Force reports a 44% surge in cyberattacks targeting public-facing applications, primarily due to missing authentication controls and AI-enabled vulnerability scanning. Vulnerability exploitation led to 40% of incidents in 2025, while active ransomware and extortion groups grew by 49%, with publicly disclosed victim counts rising by 12%. AI is accelerating attacker operations, including reconnaissance and advanced ransomware attacks.

Broken Triage Processes Increase Security Risks and Operational Costs

Updated: · First: 25.02.2026 16:30 · 📰 1 src / 1 articles

Ineffective triage processes in security operations centers (SOCs) are leading to increased business risks, including missed SLAs, higher costs per case, and more opportunities for real threats to evade detection. Five key issues—lack of real evidence, dependency on analyst seniority, delays in triage, over-escalation, and manual work—are identified as major contributors to these problems. High-performing teams are addressing these issues by leveraging execution evidence early in the triage process, using interactive sandboxes to validate behavior and reduce uncertainty. The use of sandboxes like ANY.RUN allows teams to see the full attack chain quickly, leading to faster, evidence-backed decisions. This approach reduces the cost per case, minimizes missed threats, and ensures consistent triage outcomes across shifts. Additionally, it helps in shrinking the time-to-decision, reducing escalation volumes, and increasing Tier 1 capacity by automating repetitive tasks.

Telephone-Oriented Attack Delivery (TOAD) Bypasses Secure Email Gateways

Updated: · First: 25.02.2026 16:00 · 📰 1 src / 1 articles

Telephone-Oriented Attack Delivery (TOAD) emails, which contain only a phone number as the payload, are bypassing secure email gateways and becoming a significant threat. These attacks, which accounted for nearly 28% of gateway-bypassing detections, exploit the simplicity of a phone number to evade detection and manipulate victims into revealing sensitive information or granting remote access. The attacks are particularly effective due to their ability to blend in with legitimate business communications and the increasing sophistication of evasion tactics.

L3Harris Employee Pleads Guilty to Selling Zero-Day Exploits to Russian Entities

Updated: 25.02.2026 14:59 · First: 30.10.2025 12:00 · 📰 6 src / 6 articles

Peter Williams, a former general manager at L3Harris cyber-division Trenchant, pleaded guilty to selling at least eight zero-day exploits to a Russian cyber broker between 2022 and 2025. The exploits, stolen from Trenchant, were sold for $1,300,000 in cryptocurrency and were intended for the exclusive use of the U.S. government and select allies. The broker's clients include the Russian government, posing a significant national security threat. Williams used his privileged access to the company's network to steal the exploits and transmitted them via encrypted channels. The FBI has emphasized the severity of the crime, highlighting the potential impact on US national security. Williams now faces up to 10 years in prison and fines of $250,000 or twice the gain or loss pertinent to the offense. The case underscores the growing concern over the trade in commercial spyware and zero-day exploits, with international efforts underway to curb this activity. Trenchant, the cyber-capabilities business unit within L3Harris Technologies, was conducting its own investigation into the potential leak of Google Chrome zero-day vulnerabilities, with another employee, Jay Gibson, at the epicenter of the accusations. Peter Williams, 39, was sentenced to a little over seven years in prison for selling eight zero-day exploits to Russian exploit broker Operation Zero. Williams was ordered to serve three years of supervised release with special conditions and forfeit illicit proceeds, including properties, clothing, jewelry, and luxury watches. The exploits could have been used against any manner of victim, civilian or military around the world, and engage in all manner of crime from cyber fraud, theft, and ransomware, to state directed spying and offensive cyber operations against military targets. Williams sold the trade secrets for up to $4 million in cryptocurrency. The actions are estimated to have incurred L3Harris $35 million in financial losses. The U.S. State Department designated Operation Zero, Sergey Sergeyevich Zelenyuk, and Special Technology Services LLC FZ (STS) under the Protecting American Intellectual Property Act (PAIPA). Zelenyuk is a Russian national and the director and owner of Operation Zero. Zelenyuk established STS in the U.A.E. to conduct business with various countries in Asia and the Middle East and likely get around U.S. sanctions imposed on Russian bank accounts. Operation Zero has offered up to $4 million in bounties for Telegram exploits and $20 million for tools that could be used to break into Android and iPhone devices. Operation Zero has sought to develop other cyber intelligence systems, including spyware and methods to extract personal identifying information and other sensitive data uploaded by users of artificial intelligence applications like large language models. The U.S. Treasury Department has sanctioned a Russian exploit broker who bought stolen hacking tools from a former executive of a U.S. defense contractor. The Department's Office of Foreign Assets Control (OFAC) designated Matrix LLC (doing business as Operation Zero and headquartered in St. Petersburg, Russia) on Tuesday, along with its owner, Sergey Sergeyevich Zelenyuk, and five associated individuals and companies. OFAC sanctioned the targets under the Protecting American Intellectual Property Act (PAIPA), a law specifically targeting intellectual property theft by foreign adversaries, the first time that law has been used since its enactment. The designations also coincide with the sentencing of Peter Williams, a 39-year-old Australian national and former general manager of Trenchant, a cybersecurity unit of U.S. defense contractor L3Harris that develops zero-day exploits and surveillance tools. Williams was sentenced Tuesday to 87 months in prison after pleading guilty in October to stealing eight zero-day exploits from Trenchant and selling them to Operation Zero for approximately $1.3 million in cryptocurrency, even though they were designed exclusively for use by the U.S. government and allied intelligence agencies. Operation Zero is offering millions of dollars in bounties to security researchers and others for the development or acquisition of exploits targeting commonly used software, including U.S.-built operating systems and encrypted messaging applications. The company, whose clients also include the Russian government, says it's selling zero-day exploits only to Russian private and government organizations. "Zelenyuk and Operation Zero trade in 'exploits'—pieces of code or techniques that take advantage of vulnerabilities in a computer program to allow users to gain unauthorized access, steal information, or take control of an electronic device'—the Department of the Treasury said. "Among the exploits that Operation Zero acquired were at least eight proprietary cyber tools, which were created for the exclusive use of the U.S. government and select allies and which were stolen from a U.S. company. Operation Zero then sold those stolen tools to at least one unauthorized user." OFAC also sanctioned Zelenyuk's UAE-based front company, Special Technology Services LLC, as well as two individuals with prior ties to Operation Zero (including Oleg Vyacheslavovich Kucherov, who is a suspected member of the Trickbot cybercrime gang) and a second exploit brokerage firm, Advance Security Solutions, with operations in the United Arab Emirates and Uzbekistan. The sanctions freeze all U.S.-held assets belonging to designated entities and individuals and expose American businesses and individuals conducting transactions with them to secondary sanctions or enforcement actions.

Critical RCE flaw in Zyxel routers allows remote command execution

Updated: · First: 25.02.2026 14:53 · 📰 1 src / 1 articles

Zyxel has released security updates to address a critical command injection vulnerability (CVE-2025-13942) affecting over a dozen router models. The flaw allows unauthenticated attackers to execute OS commands via maliciously crafted UPnP SOAP requests. Successful exploitation requires both UPnP and WAN access to be enabled, with WAN access disabled by default. Zyxel also patched two high-severity post-authentication command-injection vulnerabilities (CVE-2025-13943 and CVE-2026-1459). Zyxel devices are frequently targeted in attacks due to their widespread use by internet service providers. The U.S. CISA is tracking 12 actively exploited Zyxel vulnerabilities. Additionally, Zyxel has no plans to patch two zero-day vulnerabilities (CVE-2024-40891 and CVE-2024-40891) affecting end-of-life routers, advising users to replace them with newer models.

Malicious NuGet and npm Packages Target Developers to Steal Data and Deploy Backdoors

Updated: · First: 25.02.2026 14:43 · 📰 1 src / 1 articles

Four malicious NuGet packages targeting ASP.NET developers were discovered, stealing sensitive data and creating persistent backdoors. Additionally, a malicious npm package named ambar-src was found to drop malware on Windows, Linux, and macOS systems, exfiltrating data to a Yandex Cloud domain. The NuGet packages, published between August 12 and 21, 2024, attracted over 4,500 downloads before being removed. The npm package, uploaded on February 13, 2026, amassed over 50,000 downloads before removal. The campaigns aim to compromise applications built by developers, granting attackers admin-level access and exfiltrating sensitive data.

OTI Impact Score Introduced for Measuring OT Cyber Incident Severity

Updated: · First: 25.02.2026 14:00 · 📰 1 src / 1 articles

A new Operational Technology Incident (OTI) Impact Score model, inspired by the Richter Scale, has been developed to measure the severity, reach, and duration of OT cyber incidents. The model aims to provide a standardized way to assess the actual effects of OT cyber incidents, which often get over- or under-hyped. The OTI Impact Score was unveiled at the S4x26 Conference in Miami and is designed to help business executives, governments, cyber insurers, the media, and the public understand the impact of OT attacks more accurately. The OTI Impact Score is calculated based on three criteria: severity (from minor disruption to catastrophic destruction), reach (geographic spread), and duration (length of time) of the incident. Volunteers from the ICS/OT industry will score OT cyber events via an online portal, with the goal of issuing the assessment within 12 hours. The model has been applied to past incidents, such as the 2021 Colonial Pipeline cyberattack, which received a high impact score of 3.9, and the 2024 Muleshoe water utility attack, which received a score of 0.0.

CISA Issues Emergency Directive for Cisco SD-WAN Vulnerabilities

Updated: · First: 25.02.2026 14:00 · 📰 1 src / 1 articles

CISA has issued Emergency Directive (ED) 26-03 to mitigate vulnerabilities in Cisco SD-WAN systems, which pose an unacceptable risk to federal networks. The directive requires immediate action from Federal Civilian Executive Branch (FCEB) agencies to inventory, collect artifacts, patch, hunt for evidence of compromise, and implement hardening measures. The directive follows collaborative efforts with international partners and emphasizes the critical need for immediate response due to the ease of exploitation of these vulnerabilities.

National Security Organizations Still Rely on Manual Processes for Sensitive Data Transfers

Updated: · First: 25.02.2026 13:00 · 📰 1 src / 1 articles

More than half of national security organizations still rely on manual processes to transfer sensitive data, creating systemic vulnerabilities and operational risks. Manual handling introduces delays, errors, and security gaps that adversaries can exploit, compromising mission readiness and decision-making. Automation is critical to addressing these risks, but legacy systems, procurement cycles, and cultural factors hinder its adoption.

UK ICO fines Reddit $19 million for unlawful collection of children's data

Updated: 25.02.2026 11:40 · First: 24.02.2026 16:54 · 📰 2 src / 2 articles

The UK Information Commissioner's Office (ICO) has fined Reddit £14.47 million ($19.5 million) for collecting and using personal data of children under 13 without adequate safeguards. The ICO found that Reddit lacked meaningful age-verification systems until July 2025, despite its terms prohibiting underage users. The regulator estimates significant numbers of underage children used the platform, exposing them to harmful content. Reddit has announced plans to appeal the decision. The ICO also criticized Reddit for failing to carry out a data protection impact assessment (DPIA) to assess and mitigate risks to children on the platform before January 2025. Reddit introduced age verification for accessing mature content in July 2025, but the ICO noted that the age verification process is too easy to bypass.

Windows 11 KB5077241 Update Introduces BitLocker Improvements and Sysmon Tool

Updated: · First: 25.02.2026 09:51 · 📰 1 src / 1 articles

Microsoft released the KB5077241 optional cumulative update for Windows 11, featuring 29 changes, including BitLocker reliability enhancements, a new network speed test tool, and native System Monitor (Sysmon) functionality. The update also improves taskbar behavior, adds support for WebP images as desktop backgrounds, and introduces Remote Server Administration Tools (RSAT) for Windows 11 Arm64 devices. This preview update allows admins to test new features and improvements before they are generally available. The update is optional and does not include security fixes, focusing instead on quality improvements.

Active Exploitation of FileZen CVE-2026-25108 OS Command Injection Vulnerability

Updated: · First: 25.02.2026 07:23 · 📰 1 src / 1 articles

CISA added a recently disclosed OS command injection vulnerability in FileZen (CVE-2026-25108) to its KEV catalog, confirming active exploitation. The flaw, with a CVSS v4 score of 8.7, allows authenticated users to execute arbitrary commands via crafted HTTP requests. Affected versions include 4.2.1 to 4.2.8 and 5.0.0 to 5.0.10. Exploitation requires the FileZen Antivirus Check Option to be enabled and user login with general privileges. Soliton Systems reported at least one incident of damage. Users are advised to update to version 5.0.11 or later and change passwords if compromised. FCEB agencies must apply fixes by March 17, 2026.

Diesel Vortex Phishing Campaign Targets Freight and Logistics Organizations

Updated: · First: 25.02.2026 01:57 · 📰 1 src / 1 articles

A financially motivated threat group, Diesel Vortex, has been conducting a phishing campaign since September 2025, targeting freight and logistics organizations in the U.S. and Europe. The group has stolen 1,649 unique credentials from critical platforms in the freight industry, using 52 domains and sophisticated phishing techniques. The campaign was disrupted through a coordinated effort involving multiple cybersecurity firms.

Wynn Resorts Employee Data Breach Confirmed

Updated: · First: 24.02.2026 23:51 · 📰 1 src / 1 articles

Wynn Resorts confirmed a data breach involving employee data after being listed on the ShinyHunters extortion gang's data leak site. The company activated incident response protocols and launched an investigation with external cybersecurity experts. The attackers claimed the stolen data had been deleted, and Wynn has not observed any evidence of misuse. The breach did not impact guest operations or physical properties, and affected employees are being offered credit monitoring and identity protection services.

1Campaign Platform Facilitates Prolonged Malicious Google Ads

Updated: · First: 24.02.2026 23:45 · 📰 1 src / 1 articles

A cybercrime service called 1Campaign enables threat actors to run malicious Google Ads that evade detection by security researchers. The platform uses cloaking techniques to show benign content to researchers while directing malicious content to potential victims. Operated by a developer known as 'DuppyMeister,' 1Campaign has been active for at least three years and provides a user-friendly dashboard for managing campaigns. The platform filters visitors in real-time based on geography, ISP, and device characteristics, allowing attackers to focus on relevant regions while avoiding scrutiny. In one instance, 99.4% of visitors were blocked, resulting in a success rate of just 0.6%. The system assigns a fraud risk score to each visitor, flagging those from cloud providers and security vendors. 1Campaign has been observed distributing traffic in multiple countries, including the United States, Canada, and Germany. The platform also offers a Google Ads launcher tool that helps operators bypass Google's policy limitations and impersonate legitimate brands. Despite Google's safeguards, 1Campaign's cloaking system makes static URL scanning less effective, necessitating more sophisticated detection methods.

RoguePilot Vulnerability in GitHub Codespaces Enables GITHUB_TOKEN Leak via Copilot

Updated: · First: 24.02.2026 20:52 · 📰 1 src / 1 articles

A vulnerability named RoguePilot in GitHub Codespaces allowed attackers to inject malicious instructions into GitHub issues, which were then processed by GitHub Copilot. This enabled silent control of the AI agent in Codespaces, leading to the leakage of sensitive GITHUB_TOKENs. The flaw has been patched by Microsoft after responsible disclosure. The attack involved embedding malicious prompts within GitHub issues, which were then executed by Copilot when a user launched a Codespace from the issue. This allowed attackers to exfiltrate sensitive data, including GITHUB_TOKENs, to external servers under their control.

CarGurus data breach exposes 12.4 million records

Updated: · First: 24.02.2026 20:08 · 📰 1 src / 1 articles

The ShinyHunters extortion group has leaked personal information from 12.4 million CarGurus accounts. The data includes email addresses, phone numbers, physical addresses, and financial application details. CarGurus has not confirmed the breach, but HaveIBeenPwned (HIBP) has verified the dataset, noting that 3.7 million records are new. The leaked data could be used for phishing attacks. CarGurus is a U.S.-based digital auto platform with an estimated 40 million monthly visitors. The breach follows a pattern of similar attacks by ShinyHunters, who often use social engineering to gain access to SaaS platforms like Salesforce and Microsoft 365.

Microsoft 365 Copilot Bug Bypasses DLP Policies for Confidential Emails

Updated: 24.02.2026 19:30 · First: 18.02.2026 14:03 · 📰 2 src / 3 articles

A bug in Microsoft 365 Copilot, first detected on January 21, 2026, caused the AI assistant to summarize confidential emails, bypassing data loss prevention (DLP) policies. Microsoft confirmed the issue and began rolling out a fix in early February. The company is now expanding DLP controls to block Copilot from processing confidential documents across all storage locations, including local files, between late March and late April 2026. The full remediation timeline and scope of impact remain undisclosed.

Insider Incidents Cost Organizations $19.5M on Average in 2025

Updated: · First: 24.02.2026 19:00 · 📰 1 src / 1 articles

The average cost of insider incidents surged 20% to nearly $20 million per organization in 2025, driven primarily by employee negligence related to shadow AI usage. Malicious insider activities accounted for 27% of losses, while negligence and mistakes amounted to $10.3 million per company. The report highlights the growing risks associated with undocumented AI use and the need for better AI governance policies.

Bitpanda Phishing Campaign Uses Fake MFA to Harvest Personal Data

Updated: · First: 24.02.2026 18:05 · 📰 1 src / 1 articles

A sophisticated phishing campaign impersonating Bitpanda combines credential theft with extensive personal data harvesting. The scheme uses a near-perfect replica of the legitimate platform to deceive users into providing sensitive information through a staged, fake multi-factor authentication (MFA) process. The attack begins with an email mimicking official Bitpanda communications, urging users to update their information or risk account suspension. Victims are directed to a fraudulent website that closely resembles the genuine Bitpanda login screen but uses a deceptive domain. Once credentials are entered, victims are prompted to provide additional personal information, including first and last name, telephone number, residential address, and date of birth. After completing the forms, users see a confirmation message and are redirected to the legitimate Bitpanda login page.

AI Agent Security Requires Intent-Based Access Controls

Updated: · First: 24.02.2026 17:02 · 📰 1 src / 1 articles

AI agents are increasingly operating autonomously within enterprises, performing tasks like infrastructure provisioning, customer support, and code writing. These agents behave as identities, using API keys, OAuth tokens, and service accounts, but are often not governed as such. Traditional identity and access management (IAM) is insufficient for AI agents due to their dynamic and context-driven nature. Intent-based permissioning is emerging as a critical security measure to ensure AI agents act within their approved missions.

Lazarus Group Linked to Medusa Ransomware Attacks on U.S. Healthcare

Updated: 24.02.2026 16:30 · First: 24.02.2026 13:00 · 📰 3 src / 5 articles

North Korean state-backed hackers from the Lazarus group are targeting U.S. healthcare organizations and entities in the Middle East with Medusa ransomware in financially motivated extortion attacks. The Medusa ransomware-as-a-service (RaaS) operation has impacted over 366 organizations since its launch in 2023, with at least four additional healthcare and non-profit organizations in the U.S. targeted since November 2025. This is the first time Lazarus has been linked to Medusa ransomware, though they have been associated with other ransomware strains. The attacks use a toolset that includes both custom and commodity tools, some of which are linked to another North Korean group, Diamond Sleet. The average ransom recorded in these attacks is $260,000, which is reportedly used to fund espionage operations against defense, technology, and government sectors in the U.S., Taiwan, and South Korea. Symantec has provided indicators of compromise (IoCs) to help defenders prevent these attacks. The Stonefly sub-group of Lazarus, also known as Andariel, has been involved in ransomware operations for the past five years. Rim Jong Hyok, an alleged Stonefly member, was indicted by the US Justice Department for ransomware campaigns targeting US hospitals and healthcare providers. The US Justice Department announced a $10m reward for information related to Rim Jong Hyok.