Advertisement · 728 × 90

Posts by Feike Hacquebord

Preview
Edge Under Siege: How State-Sponsored Actors Exploit Your Perimeter Edge devices have become a primary entry point for state-sponsored espionage, giving attackers a cheaper, faster path to network access, credential theft, and traffic interception. Our report examines...

Edge devices are now the #1 entry point for state-sponsored espionage. Exploits cost $30K-$100K vs millions for mobile. China-aligned groups are burning through zero-days, seemingly in a coordinated way. Your edge devices are the new front door for attackers: www.trendmicro.com/vinfo/us/sec...

9 hours ago 0 0 0 0
Each country has a distinct AI strategy that shapes their APT operations. 

- China: "Full-Stack Anchor": The only nation capable of sustaining a large-scale AI arms race against the US. End-to-end domestic ecosystem. Expect advanced attacks from China-aligned actors using domestic AI tools, reducing our visibility into how they operate.
 
- Russia: "Sovereign Fortress": Hardware constraints offset by energy resources and increasing reliance on Chinese technology. AI applied to warfare, surveillance, and now embedded in active malware. 

 - North Korea: "Asymmetric Saboteur": Leveraging AI to automate cybercrime, funding the missile program through crypto-theft and deepfake-based social engineering. Reliant on third-party AI platforms and Russian infrastructure support.

Each country has a distinct AI strategy that shapes their APT operations. - China: "Full-Stack Anchor": The only nation capable of sustaining a large-scale AI arms race against the US. End-to-end domestic ecosystem. Expect advanced attacks from China-aligned actors using domestic AI tools, reducing our visibility into how they operate. - Russia: "Sovereign Fortress": Hardware constraints offset by energy resources and increasing reliance on Chinese technology. AI applied to warfare, surveillance, and now embedded in active malware. - North Korea: "Asymmetric Saboteur": Leveraging AI to automate cybercrime, funding the missile program through crypto-theft and deepfake-based social engineering. Reliant on third-party AI platforms and Russian infrastructure support.

The APT threat landscape is shaped by the "Digital Autocracy" bloc: an axis between CN, RU, DPRK and IR using AI as a force multiplier.

AI is no longer experimental for APT. It is operational. The next 24 months will be a race for "resilience at machine speed."

www.trendmicro.com/vinfo/us/sec...

4 days ago 7 2 0 1
Preview
Exclusive: Russia-linked hackers compromised scores of Ukrainian prosecutors’ email accounts, data shows Russia-linked hackers broke into more than 170 email accounts belonging to prosecutors and investigators across Ukraine during the last several ​months, according to data reviewed by Reuters, a campai...

It is not often the public gets to see the impact of Russia-aligned cyber operations. This article by Raphael Satter provides exactly that: Russia-aligned actors compromised 170+ accounts of Ukrainian officials tasked with fighting corruption and unmasking spies. www.reuters.com/world/russia...

4 days ago 1 0 0 0
Preview
Exclusive: Russia-linked hackers compromised scores of Ukrainian prosecutors’ email accounts, data shows Russia-linked hackers broke into more than 170 email accounts belonging to prosecutors and investigators across Ukraine during the last several ​months, according to data reviewed by Reuters, a campai...

Scoop: Allegedly Russian hackers have broken into more than 170 inboxes belonging to Ukrainian prosecutors and investigators.

Could help Moscow keep tabs on Ukrainian counterintelligence and sensitive corruption investigations.

www.reuters.com/world/russia...

5 days ago 21 21 4 2

It is unfortunate that the Rapid7 blog does not seem to reference prior work from up to 5 years ago, which has a very significant overlap with what was apparently presented at RSA 2026.

3 weeks ago 0 0 0 0
Preview
Pawn Storm Campaign Deploys PRISMEX, Targets Government and Critical Infrastructure Entities This blog discusses the steganography, cloud abuse, and email-based backdoors used against the Ukrainian defense supply chain in the latest Pawn Storm campaign that TrendAI™ Research observed and anal...

In our most recent report on the Russia-aligned APT group Pawn Storm (APT28, Fancy Bear, Forest Blizzard), we explain how they have been using PRISMEX, a collection of interconnected malware components, to target the defense supply chain of Ukraine and its allies - www.trendmicro.com/en_us/resear...

3 weeks ago 2 0 0 0
Preview
Cyber Considerations for Organizations During Times of Conflict This article provides a comprehensive overview of the necessary adjustments and strategies CISOs need to implement to safeguard their organizations’ assets, maintain business continuity, and uphold pu...

We published this article on "Cyber Considerations for Organizations During Times of Conflict" in 2024. It is worth a read again - www.trendmicro.com/vinfo/us/sec...

1 month ago 0 0 0 0
Advertisement

Spammers abused Atlassian Jira’s notifications to bypass email security filters and target government and corporate entities with spam. In one of the campaigns highly skilled Russians working abroad were targeted, even though the motivation looks to be financial - www.trendmicro.com/en_us/resear...

2 months ago 0 0 0 0
Preview
Navalny was poisoned with exotic frog toxin, five Western nations confirm Five European countries have confirmed that Navalny was poisoned with epibatidine — a high-potency neurotoxin derived from South American poison dart frogs. Traces of the toxin were found in tissue sa...

Navalny was poisoned with exotic frog toxin, five Western nations confirm

Multiple labs have independently analyzed biological samples taken from Alexei Navalny’s body and found epibatidine, a highly toxic alkaloid sourced from a South American poisonous frog.

2 months ago 55 36 1 3
Preview
Threat Attribution Framework: How TrendAI™ Applies Structure Over Speculation TrendAI™ brings structure and discipline to threat attribution, helping security leaders and teams make informed decisions about cyber risk, incident response, and overall defensive posture.

TrendAI formalizes threat attribution as a structured, repeatable discipline by combining standardized evidence scoring, relationship mapping, and bias testing, with a temporary stage that separates clustering from final naming. Article on how we attribute: www.trendmicro.com/vinfo/us/sec...

2 months ago 2 1 0 0

#BREAKING #ESETresearch identified the wiper #DynoWiper used in an attempted disruptive cyberattack against the Polish energy sector on Dec 29, 2025. At this point, no successful disruption is known, but the malware’s design clearly indicates destructive intent. 1/5

2 months ago 34 30 1 5
Post image

Trend Micro tracks SHADOW-VOID-042 spear-phishing (Nov 2025) using Trend Micro-themed lures and a decoy site mimicking Trend’s corporate style, targeting defence, energy, chemicals, cybersecurity and ICT sectors. www.trendmicro.com/en_us/resear...

4 months ago 3 3 0 0
spear phishing email using Trend Micro updates as a lure

spear phishing email using Trend Micro updates as a lure

targeted industries

targeted industries

comparison between this intrusion set and Void Rabisu

comparison between this intrusion set and Void Rabisu

Website mimicking Trend Micro graphical design

Website mimicking Trend Micro graphical design

We investigated an #APT with links to Void Rabisu (Romcom) that used Trend Micro updates as a lure in a recent campaign involving vulnerability exploitation. There were at least 4 stages before the final payload, some of them being tailored to the targeted machine www.trendmicro.com/en_us/resear...

4 months ago 1 1 0 0
Preview
SHADOW-VOID-042 Targets Multiple Industries with Void Rabisu-like Tactics

Recently various industries, including Trend Micro, were targeted by a Trend Micro-themed campaign. Trend Vision One™ stopped it early in the kill chain. The campaign somewhat aligns with Void Rabisu (ROMCOM). For now we track this temporarily under SHADOW-VOID-042 www.trendmicro.com/en_us/resear...

4 months ago 2 0 0 0
Preview
The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns

Cyberespionage campaigns are becoming increasingly complex due to the close collaboration between distinct APT groups. Learn how China-aligned Earth Estries provides initial access to compromised assets for Earth Naga (Flax Typhoon) to continue exploitation: www.trendmicro.com/en_us/resear....

5 months ago 1 0 0 0
Advertisement
Internet Crime Complaint Center (IC3) | Home Internet Connected Devices Facilitate Criminal Activity

One of the botnets that is using a modular approach that will likely be able to circumvent network-based access controls against residential proxies is known as BadBox 2.0. The FBI issued an advisory yesterday: www.ic3.gov/PSA/2025/PSA...

10 months ago 0 0 0 0

This modular model is already employed by residential proxy providers in the Far East who obtain millions of residential proxies by exploiting vulnerabilities in the supply chain of inexpensive IoT devices and by shipping pre-infected Android Open Source Project-supported devices (AOSP).

10 months ago 2 0 1 0

We anticipate that residential proxy providers will seek to bypass connection and session-based access controls, by uploading separate software modules to residential endpoints. These modules can independently carry out specific tasks like advertisement fraud without relying on proxied connections.

10 months ago 3 0 1 0
Preview
The Rise of Residential Proxies as a Cybercrime Enabler This research discusses how residential proxies help cybercriminals bypass antifraud and IT security systems, and how vulnerabilities in the IoT supply chain are exploited where Android-based devices ...

Residential proxies are a key enabler of cybercrime today. This creates a growing need for connection and session-based access control. We used Ja4T fingerprinting that successfully tagged incoming connections from residential proxies to 1,500 IDS systems. www.trendmicro.com/vinfo/us/sec...

10 months ago 16 9 1 0
Post image

One of my favorite pieces of evidence we were able to obtain was 7 videos with English text, which painstakingly explain how to set up a Beavertail C&C. The screen recording, lasting more than 1 hour, was created by someone logged in with a BlockNovas account from an IP address probably in Russia.

11 months ago 2 0 0 0
Preview
Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations

DPRK cybercrime uses Russian infrastructure in Khasan and Khabarovsk, masked by VPNs, proxies, and RDPs. One fictitious DPRK company to lure IT professionals with interviews was BlockNovas. FBI seized BlockNovas' site and a related C&C on April 23, 2025. Read more: www.trendmicro.com/en_us/resear...

11 months ago 5 1 1 0
Preview
“Let’s hire an ISIS suicide bomber to blow him up in the street!”: Europe’s most wanted man plotted my murder — and that of my colleague A jury at the Old Bailey, London’s Central Criminal Court, has just found six of my compatriots — citizens of Bulgaria — guilty of conspiring with the Kremlin to kidnap and possibly murder me and my c...

Roman Dobrokhotov and Christo Grozev have extensively reported on FSB and GRU. Read this to learn about their ordeal when a team, led by Marsalek, was hunting them down. The story has fun elements and close calls. It highlights the dangers journalists face as they inform us: theins.ru/en/inv/279034

1 year ago 0 0 0 0
Preview
Updated Shadowpad Malware Leads to Ransomware Deployment

Updated Shadowpad malware used in recent attacks against the manufacturing industry led to ransomware in some incidents. Research by @thehellu.bsky.social : www.trendmicro.com/en_us/resear...

1 year ago 0 0 0 0
Preview
Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks

Yet another suspected case of publicly disclosed red team tools being used by an intelligence agency — allegedly the SVR — to conduct a sweeping surveillance operation.

(ht @feikeh.bsky.social)

www.trendmicro.com/en_us/resear...

1 year ago 8 6 0 0
Advertisement
Preview
Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks

Earth Koshchei (APT29): A cyberespionage group targeting critical sectors with stealthy techniques. Here’s what you need to know: www.trendmicro.com/en_us/resear... #Cybersecurity #ThreatIntel with @feikeh.bsky.social

1 year ago 4 3 0 0
Preview
Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks

Since Aug 2024 Earth Koshchei (APT29, Midnight Blizzard) used 193 RDP relays and 34 rogue backends against military, MFAs and others. The campaign peak was likely preceded by barely audible campaigns that ended with a bang in Oct 2024. Details and indicators here: www.trendmicro.com/en_us/resear...

1 year ago 8 7 0 0
Attack chain showing attacker generating link on Moonshine, then sending it through targeted application to the victim, which after clicking the links gets compromised and delivered the DarkNimbus backdoor

Attack chain showing attacker generating link on Moonshine, then sending it through targeted application to the victim, which after clicking the links gets compromised and delivered the DarkNimbus backdoor

Validation flow that fingerprints the target by looking at user agent and delivering the proper exploit

Validation flow that fingerprints the target by looking at user agent and delivering the proper exploit

multiple Chrome vulnerabilities exploited in the third-party applications

multiple Chrome vulnerabilities exploited in the third-party applications

List of Android applications being targeted
Most are very popular in South East Asia

List of Android applications being targeted Most are very popular in South East Asia

Our latest report presents Earth Minotaur, a threat actor targeting Tibetans and Uyghurs using Moonshine, an exploitation framework for Android apps described in 2019 by
@citizenlab.ca
leveraging vulnerabilities in applications embedding old versions of Chromium trendmicro.com/en_us/resear...

1 year ago 12 7 0 2
Post image

Nsocks provides an alternative explanation: "Competitors have hired an organization that has blocked our back-connect servers and continues DDOS attacks." Nsocks now also mandates authentication for their SOCKS5 entrance nodes (which was not the case previously - security by obscurity)

1 year ago 0 0 0 0
Post image

One week ago Lumen/Shadowserver sinkholed Water Barghest C&Cs. Nsocks (alleged seller of Ngioweb bots) apparently suffers from this: US proxies down to 4494 (was 14037), EU proxies down to 2038 (was 9092). I expected a faster recovery. Still expect Water Barghest will make their botnet more robust.

1 year ago 2 1 1 0
Preview
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices

Water Barghest automated each step between finding vulnerable IoT devices to offering them for rent on a commercial residential proxy provider. Water Barghest's infrastructure was used to exploit Cisco IOS XE devices with a 0-day in October 2023. Read more here: www.trendmicro.com/en_us/resear...

1 year ago 1 0 0 0