Operation GhostMail: Russian APT exploits Zimbra Webmail to Target Ukraine State Agency
www.seqrite.com/blog/operati...
Posts by marktsec
RedSun: How Windows Defender's Remediation Became a SYSTEM File Write
nefariousplan.com/posts/redsun...
A DNS setting change on a single router can quietly reroute an entire network’s authentication traffic.
www.lumen.com/blog-and-new...
Germany Doxes “UNKN,” Head of RU Ransomware Gangs REvil, GandCrab
krebsonsecurity.com/2026/04/germ...
Attackers Are Hunting High-Impact Node.js Maintainers in a Coordinated Social Engineering Campaign
socket.dev/blog/attacke...
Baphomet: Tooling KslDump / KslKatzBOF leverages a Microsoft-signed Defender driver (KslD.sys)
Microsoft patched the active driver, yet left a vulnerable version accessible locally
#ThreatIntel #infosec
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
cloud.google.com/blog/topics/...
“Say My Name”: How MioLab is building MacOS Stealer Empire
www.levelblue.com/blogs/spider...
#ThreatIntel #miolab #NovaStealer #Stealer #MAC
Hasta la vista, Hastalamuerte: An Overview of The Gentlemen's TTPs
www.group-ib.com/blog/hastala...
Operation Roundish: Uncovering an APT28 Roundcube Toolkit Used Against Ukrainian Government Targets
hunt.io/blog/operati...
Sednit reloaded: Back in the trenches
The resurgence of one of Russia’s most notorious APT groups
www.welivesecurity.com/en/eset-rese...
Cybersecurity Advisory. Phishing via messaging apps Signal and WhatsApp
english.aivd.nl/documents/20...
• Keylogger, clipboard monitoring, system recon
• DNS hijack, PacketFlight network tracking, vuln scanner
• Mass execution + unlimited client management
• AD recon (Domain Controller discovery) for lateral movement
New Atroposia infostealer + remote admin toolkit:
• Encrypted C2 with unique/native stubs (C++/Rust)
• Persistence + automatic UAC bypass + anti-VM evasion
• HVNC + Hidden RDP for invisible remote sessions
• Stealer/Grabber + Chromium/Gecko credential recovery
#ThreatIntel #infosec
Digital Forensics: How Hackers Defeat Microsoft’s 2026 NTLM Patch
hackers-arise.com/digital-fore...
A shared RaaS affiliate blacklist attributed to Nova, Qilin and DragonForce suggests emerging cartel-style governance in the ransomware ecosystem. Violators get 24h to resolve disputes or face platform wide bans
#ThreatIntel #infosec
Aura Stealer update:
Shift to native x64 builds, citing better crypter support, reduced WoW64 visibility, and improved evasion via direct kernel calls. They claim successful tests with low detection rates.
#ThreatIntel