Advertisement · 728 × 90

Posts by Mark Kelly

Preview
I’d come running back to EU again: TA416 resumes European government espionage campaigns | Proofpoint US Key findings From mid-2025 onwards, the China-aligned threat actor TA416 resumed observed targeting of European government and diplomatic organizations following a period of reduced EU-

After a lull in activity targeting Europe from mid-2023 to mid-2025, the China-aligned espionage actor #TA416 (RedDelta, Vertigo Panda, Red Lich) has resumed targeting European government and diplomatic entities, with a recent expansion to the Middle East. brnw.ch/21x1f0j

2 weeks ago 6 4 1 1

Proofpoint has directly observed a targeted email campaign that delivers DarkSword RCE, and we attribute the messages to Russian FSB threat actor TA446 with high confidence. 🧵

3 weeks ago 18 13 1 2
Preview
Iran conflict drives heightened espionage activity against Middle East targets | Proofpoint US Analyst note: Proofpoint uses the UNK_ designator to define clusters of activity that are still developing and have not been observed for long enough to receive a numerical TA designation.

Conflict in Iran is accelerating cyber espionage across the Middle East.

Since the start of Operation Epic Fury on February 28, 2026,
Proofpoint researchers have observed heightened cyber activity against Middle East targets tied to the war.

Details: brnw.ch/21x0EJi.

1 month ago 3 5 1 0
Post image

📣 #PIVOTcon26 Agenda is here 🤟 We are thrilled to announce the lineup for this year's edition!
2⃣ days and 19 talks from leading #ThreatResearch experts.
The agenda link is in the first comment👇, and the talks and speakers are in the thread.🧵
#CTI #ThreatIntel
1/15

1 month ago 15 10 1 1

One of the fastest ways to trigger me in a work context these days is to whisper "Mustang Panda". Instant menty b ✨

2 months ago 2 1 1 0

In addition to espionage threat actors, financially motivated cybercriminals have been exploiting the WinRAR vulnerability CVE-2025-8088.

The highly effective ecrime actor, typically seen distributing Koi Stealer/Koi Loader (TA4561), was observed doing so in Fall 2025.

Details. ⤵️

2 months ago 3 3 1 0

Alongside this activity recently highlighted by Google (cloud.google.com/blog/topics/...), Proofpoint threat researchers have observed additional exploitation of WinRAR vulnerability CVE-2025-8088 by state‑aligned groups linked to China and the DPRK.

2 months ago 2 1 1 0

The report includes a section on suspected RU-aligned actor UNK_AcademicFlare, which has been very active using compromised gov/mil emails to target gov, think tanks, academia & transport sectors in US/EU, often via weeks-long benign rapport building prior to delivering a device code phish.

4 months ago 0 0 0 0
Advertisement

New espionage/e-crime crossover blog from the team on the continued rise of device code phishing by state-aligned and financially motivated groups.

4 months ago 6 2 1 0
Post image

A study in the evolution of SVR cyberespionage tradecraft

4 months ago 22 4 0 1
Preview
Dangerous Invitations: Russian Threat Actor Spoofs European Security Events in Targeted Phishing Attacks In early 2025, Volexity published two blog posts detailing a new trend among Russian threat actors targeting organizations through the abuse of Microsoft 365 OAuth and Device Code authentication workf...

@volexity.com tracks a variety of threat actors abusing Device Code & OAuth authentication workflows to phish credentials, which continue to see success due to creative social engineering. Our latest blog post details Russian threat actor UTA0355’s campaigns impersonating European security events.

4 months ago 10 8 0 0
Preview
Intellexa’s Global Corporate Web

1/ Today we release a new report exposing previously undisclosed entities connected to the wider #Intellexa ecosystem as well as newly identified activity clusters in Iraq and indications of activity in Pakistan: www.recordedfuture.com/research/int...

4 months ago 26 18 2 4

PlugX C2: doorforum[.]com

4 months ago 3 0 0 0

I'm just glad I'm not the one being shut up this time

5 months ago 3 0 1 0
Preview
Crossed wires: a case study of Iranian espionage and attribution | Proofpoint US Proofpoint would like to thank Josh Miller for his initial research on UNK_SmudgedSerpent and contribution to this report.  Key findings  Between June and August 2025,

New Iran drop from me tracking an attribution nightmare - UNK_SmudgedSerpent! A little Charming, a little Muddy, and a lot C5. Targeting policy experts with benign conversation starters, health-themed infra, OnlyOffice spoofs, and RMMs. Check out the full story www.proofpoint.com/us/blog/thre...

5 months ago 18 12 2 0

Proofpoint threat researchers have designed an open-source tool—named PDF Object Hashing—to track and detect the unique characteristics of PDFs used by threat actors... similar to a digital fingerprint. 🫆

We use this tool internally to help track multiple threat actors with high confidence.

5 months ago 18 8 1 2
Advertisement
Video

📣 🔥 🛋️ SAVE THE DATE 🛋️ 🔥 📣
The next #PIVOTcon will be on 6-8 May 2026, in Malaga, ES!!!

You favorite ;) #ThreatResearch conference is coming back and we are planning to bring you the usual experience and content of utmost quality. Follow us + #StayTuned for more info
#CTI #ThreatIntel #PIVOTcon26

6 months ago 17 10 0 1

Good piece covering a big burst of TA416 activity targeting European governments last week!

6 months ago 4 2 0 0
Preview
a group of people are putting their hands together in a huddle . ALT: a group of people are putting their hands together in a huddle .

Great report @cyberoverdrive.bsky.social and team 😁

6 months ago 1 0 0 0
Preview
RedNovember Targets Government, Defense, and Technology Organizations RedNovember, a likely Chinese state-sponsored cyber-espionage group, has targeted global government, defense, and tech sectors using advanced tools like Pantegana and Cobalt Strike. Discover the lates...

First public report at Recorded Future by yours truly is out! RedNovember (formerly TAG-100, a.k.a. Storm-2077) is a Chinese state-sponsored threat group focused on intelligence collection, especially on flashpoint issues of strategic interest to China. www.recordedfuture.com/research/red...

6 months ago 22 14 2 0
Preview
Going Underground: China-aligned TA415 Conducts U.S.-China Economic Relations Targeting Using VS Code Remote Tunnels | Proofpoint US What happened  Throughout July and August 2025, TA415 conducted spearphishing campaigns targeting United States government, think tank, and academic organizations utilizing U.S.-China

Proofpoint threat researchers have published new research identifying a new cyber-espionage campaign by #TA415 (#APT41), a China-aligned threat actor, exploiting growing uncertainty in U.S.-China economic relations.

Blog: www.proofpoint.com/us/blog/thre....

7 months ago 5 3 1 0

Our reporting overlaps this recent WSJ article:
www.wsj.com/politics/nat...

See our full research here:
www.proofpoint.com/us/blog/thre...

7 months ago 0 0 0 0
TA415 infection chain diagram

TA415 infection chain diagram

In these campaigns, TA415 delivered infection chains to set up VS Code Remote Tunnels 🚇 This is in line with recent TA415 phishing operations over the past year, which have relied on legit services (e,g, Google Sheets, Google Calendar, VS Code) for C2 to blend w/ trusted traffic

7 months ago 0 0 1 0

🚨🇨🇳💰 New @threatinsight.proofpoint.com blog on TA415 (aka APT41) economy and trade-themed spearphishing against US govt, think tanks & academia.

The campaigns used U.S.-China economic lures and spoofed the Chair of the House Select Committee on CCP competition + the US-China Business Council.

7 months ago 3 1 1 0

It is time the Mustang Panda moniker went the way of Winnti Group ☠️

7 months ago 5 0 1 0
Preview
Tracking Candiru’s DevilsTongue Spyware in Multiple Countries Recorded Future's Insikt Group uncovers active infrastructure linked to Candiru’s DevilsTongue spyware across multiple countries. Discover how this stealthy spyware targets high-value individuals and ...

1/ We've just released a new report uncovering new infrastructure tied to multiple activity clusters linked to the Israeli spyware vendor #Candiru across several countries. Full report: www.recordedfuture.com/research/tra...

8 months ago 12 12 1 0
Advertisement
Preview
Phish and Chips: China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting  | Proofpoint US Key findings  Between March and June 2025, Proofpoint Threat Research observed three Chinese state-sponsored threat actors conduct targeted phishing campaigns against the Taiwanese

🚨🆕🐟🍟 New blog from me and the amazing @threatinsight.proofpoint.com team covering recent activity by multiple China-aligned threat actors targeting semiconductor companies in Taiwan over the past few months:
www.proofpoint.com/us/blog/thre...

9 months ago 5 3 0 0
Preview
Exclusive: China-linked hackers target Taiwan's chip industry with increasing attacks, researchers say Chinese-linked hackers are targeting the Taiwanese semiconductor industry and investment analysts as part of a string of cyber espionage campaigns, researchers said on Wednesday.

New: A handful of Chinese-linked cyber espionage groups are stepping up targeting of Taiwanese semiconductor companies, per new analysis from @proofpoint.com. Campaigns include targeting of financial analysts focused on the sector as well: www.reuters.com/sustainabili...

9 months ago 15 9 1 0
Preview
Comic Sans and Cybercrime: Inside North Korea’s Global Cyber Playbook Podcast Episode · DISCARDED: Tales From the Threat Research Trenches · 07/01/2025 · 53m

New DISCARDED podcast drop! Join
@greg-l.bsky.social and me as we talk about our fave North Korean groups, DPRK as the neglected child, TA406 and the Russian connection, and finally, the dreaded but pervasive IT worker problem podcasts.apple.com/us/podcast/c...
open.spotify.com/episode/01d1...

9 months ago 8 4 1 0
Preview
10 Things I Hate About Attribution: RomCom vs. TransferLoader | Proofpoint US Threat Research would like to acknowledge and thank the Paranoids, Spur, and Pim Trouerbach for their collaboration to identify, track, and disrupt this activity.  Key takeaways

Fun crossover blog about TA829 (RomCom) & TransferLoader with my ecrime pals @selenalarson.bsky.social it’s got it all:

🛰️ Popped routers for sending phish

📊 ACH on attribution

👾 custom protocols

👽 cool malware

🕵️ crime

🎯 espionage

❔many unanswered questions

www.proofpoint.com/us/blog/thre...

9 months ago 17 12 0 2