<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Recorded Future</title>
        <link>https://www.recordedfuture.com</link>
        <description>Strengthen Your Defenses with Threat Intelligence</description>
        <lastBuildDate>Fri, 08 May 2026 17:42:58 GMT</lastBuildDate>
        <docs>https://validator.w3.org/feed/docs/rss2.html</docs>
        <generator>Recorded Future, Inc.</generator>
        <language>en</language>
        <copyright>Copyright © 2026 Recorded Future, Inc.</copyright>
        <atom:link href="https://www.recordedfuture.com/feed" rel="self" type="application/rss+xml"/>
        <item>
            <title><![CDATA[Working in London at the World’s Largest Intelligence Company]]></title>
            <link>https://www.recordedfuture.com/blog/working-for-recorded-future-london</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/working-for-recorded-future-london</guid>
            <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[See what it is like to work at the Recorded Future London office.]]></description>
            <content:encoded><![CDATA[
        <h2>Intro</h2>
        <p>There’s a certain energy you can only find at Recorded Future. Take that energy and bring it to London’s “Silicon Roundabout” and you get the perfect spot for Futurists to build and innovate.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1b4c2914a5020e28b188422104cf064507932f990.png?width=750&amp;format=png&amp;optimize=medium" width="1416" height="942" />
            </div>
          </div>
          <div>
            <div>Recorded Future's office @ The Bower on Old Street. Source: <a href="https://www.theboweroldst.com/">https://www.theboweroldst.com/</a></div>
          </div>
        </div>
        <p>Across the globe, Recorded Future is 1000+ employees working towards the same mission: Securing Our World With Intelligence.</p>
        <p>Our London office – one of our most storied hubs – hosts a range of departments supporting both local, regional, and global operations. The office brings together 100+ cross-functional professionals from People &amp; Talent Acquisition, Finance, Sales, Marketing, Global Services, Research, and more!</p>
        <h2>Looking back: From the Attic to The Bower</h2>
        <p>Our story in London didn’t start in the high-rise, but in a converted attic with just a handful of people and a big mission.</p>
        <div>
          <div>
            <div>When I first joined, we were in the attic of a 3-story building.It was full of great people and energy; the immediate feeling I got was that everyone was building something great together.”</div>
          </div>
          <div>
            <div>
              <p>Joe Rooke</p>
              <p>Director Risk Insights, Insikt Group</p>
            </div>
          </div>
        </div>
        <p>This passion for building something great fueled incredible growth. Sam Pullen, Director of Intelligence Services, remembers when the entire EMEA team was just about 20 people. Since 2018, we’ve gone from service a few dozen customers in the region to ~700 now.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_10deb562a661affd0c40624252b9254a9984c517e.png?width=750&amp;format=png&amp;optimize=medium" width="1130" height="1500" />
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1d271208d375759d0ff85a24b23becdece7d6bf08.png?width=750&amp;format=png&amp;optimize=medium" width="1130" height="1500" />
        </p>
        <p><strong>On the left</strong>: First Recorded Future office in London. <strong>On the right:</strong> Recorded Future's newest office</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1987f91030d330231b063ab5a5f15c947ad011e5f.png?width=750&amp;format=png&amp;optimize=medium" width="1536" height="2048" />
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_188751864711b193d7a1b99cbd61b292548c6a24a.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1536" height="2048" />
        </p>
        <p><strong>On the left:</strong> First Recorded Future office in London. <strong>On the right:</strong> Recorded Future's newest office</p>
        <h2>Inside the Office</h2>
        <p>This modern high-rise building’s open-plan layout offers quite a few collaboration spaces across our office, where the team likes to have small team meetings, breaks, or even lunch.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1002d0e142947532c93a5af8e8f8d572d0ce5a199.png?width=750&amp;format=png&amp;optimize=medium" width="1536" height="2048" />
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_141b3b979302f05f0b823995a79d0fa510ee4f2b3.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1536" height="2048" />
        </p>
        <p>Like all Recorded Future offices, our meeting rooms follow a unique naming convention. While Boston uses countries, and Sweden volcanoes - London chose islands. Rumors say we picked islands following a 95-day rain streak – we can neither confirm nor deny. So, in our London office, you’ll find Futurists collaborating in rooms like Bora Bora, Crete, and even San Andres.</p>
        <h2>Our Culture</h2>
        <p>What truly defines our London office is the sense of camaraderie – whether that’s competing in a friendly team padel game, testing your dartboard skills, or truly memorable summer &amp; end of year celebrations.</p>
        <div>
          <div>
            <div>The culture at the London office has always been welcoming and inclusive. The BDRs are the soul of the office, and you can always rely on them for a good conversation over a cup of tea.</div>
          </div>
          <div>
            <div>Sam Pullen</div>
          </div>
        </div>
        <p>Whether over summer picnics and pedalos in Hyde Park years, playing 5-a-side football in the pouring rain, or at the most recent Christmas party at the Savoy - our Futurists celebrate wins together.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1681dbbda15a9f6267c8ead7b85d0818eb3cdbc92.png?width=750&amp;format=png&amp;optimize=medium" width="1536" height="2048" />
            </div>
          </div>
          <div>
            <div>
              <h6>Friendly Team Padel Game at Canary Wharf</h6>
            </div>
          </div>
        </div>
        <h2>Onwards &amp; Upwards: Why Recorded Future</h2>
        <p>We asked Sam and Joe what has been the highlight of their long tenure at Recorded Future: the opportunity to build. For Sam, it has been the opportunity to build great relationships with clients over nearly a decade. For Joe, it has been the opportunity to build new solutions and new ways to work towards our mission.</p>
        <div>
          <div>
            <div>The company offers opportunities to builders. If you are willing to take the initiative to make something better, you are not stopped. That is rare.</div>
          </div>
          <div>
            <div>
              <p>Joe Rooke</p>
              <p>Director Risk Insights, Insikt Group</p>
            </div>
          </div>
        </div>
        <p>Ready for your next move? <a href="https://www.recordedfuture.com/work-with-us">Join the team!</a></p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1323d11d2859ec0745253085de01bb1caae51e1c7.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[A Complete History of Cybersecurity: From Early Viruses to AI-Powered Threats]]></title>
            <link>https://www.recordedfuture.com/blog/cybersecurity-history</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/cybersecurity-history</guid>
            <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[A comprehensive history of cybersecurity and the eras of threat on the internet.]]></description>
            <content:encoded><![CDATA[
        <p>Cybersecurity is a cornerstone of our modern world, but its roots stretch back long before the internet. Far from a recent phenomenon, the field began in university labs and evolved through decades of innovation and conflict. For professionals and everyday users alike, tracing this history reveals why today's defenses exist and why vigilance remains our most critical tool.</p>
        <h2>The 1940s: Theoretical Seeds and Massive Machines</h2>
        <p>Long before the first hack, pioneers were already contemplating the risks of digital intelligence. In 1945, the Electronic Numerical Integrator and Computer (ENIAC) - the first general-purpose electronic computer - showcased the power of computing, though it was a room-sized giant reserved for military use. While the idea of a "cybercriminal" was still science fiction, the theoretical groundwork for future threats was being laid.</p>
        <p>Mathematician John von Neumann began developing his "Theory of Self-Reproducing Automata" during this era. He proposed that a machine-based organism could replicate itself across systems - the conceptual birth of the computer virus.</p>
        <p>Key Characteristics of This Era:</p>
        <ul>
          <li>Physical Isolation: Security meant locking the door to a room-sized machine.</li>
          <li>Government Monopoly: Computers were exclusive to the military and the academic elite.</li>
          <li>Conceptual Threats: Risks were purely mathematical theories rather than practical realities.</li>
          <li>The Virus Blueprint: The foundational logic for self-replicating code was established.</li>
        </ul>
        <p>By understanding these early foundations, we can appreciate how a field born in the realm of theory has become the frontline of global stability.</p>
        <ul>
          <li><a href="https://www.hp.com/us-en/shop/tech-takes/computer-history-all-about-the-eniac">The ENIAC: America's Pioneering Electronic Computer</a></li>
          <li><a href="https://www.ias.edu/von-neumann">The Life, Work, and Legacy of John von Neumann</a></li>
        </ul>
        <h2>The 1950s: Mainframes, Physical Security, and Phone Phreaking</h2>
        <p>Governments, universities, and major businesses started using large, centralized machines known as mainframes. As these computers grew more powerful, the definition of "security" still remained grounded in the physical world. During this era, <a href="https://www.recordedfuture.com/services/intelligence-services">data protection</a> simply meant controlling access to the room where the hardware sat. However, a new kind of technical subculture was beginning to emerge on the fringes of the telecommunications industry.</p>
        <p>The 1950s saw the rise of phone phreaking, where enthusiasts exploited telephone signaling frequencies to make unauthorized long-distance calls. While not yet digital hacking, this movement introduced the concept of manipulating infrastructure for unintended purposes. This culture of curiosity and boundary-pushing would eventually produce industry titans; notably, both Steve Jobs and Steve Wozniak experimented with phreaking technology before the birth of Apple.</p>
        <p>Key Characteristics of This Era:</p>
        <ul>
          <li>Physical Perimeter: Security was defined by locks and restricted personnel access.</li>
          <li>Phone Phreaking: The first widespread exploitation of a technological network.</li>
          <li>Nascent Authentication: Password-based systems began to appear in informal, non-standardized forms.</li>
          <li>Fragmented Protocols: Without a connected internet, every institution developed its own isolated security rules.</li>
        </ul>
        <p>These early exploits proved that even the most robust physical defenses could be bypassed by those who understood the hidden language of the systems within.</p>
        <ul>
          <li><a href="https://cybersecurityventures.com/hacking-before-the-internet/">Phone Phreaking: Hacking Before The Internet</a></li>
          <li><a href="https://www.chaintech.network/blog/year-1971-early-days-of-phone-phreaking-with-steve-wozniak-steve-jobs/">Year 1971: Early Days Of Phone Phreaking With Steve Wozniak &amp; Steve Jobs</a></li>
        </ul>
        <h2>The 1960s: The First Hackers and Growing Vulnerabilities</h2>
        <p>While known primarily for its social shifts, the 1960s also marked the birth of "hacking" as a technical practice. As computers became more prevalent in universities and large institutions, a new generation of users began exploring the limits of these systems. This era shifted the focus from purely physical security to the inherent vulnerabilities within the software itself.</p>
        <p>In 1967, IBM invited students to test a new system, only to be surprised that their probing caused system crashes and revealed weaknesses. This informal "penetration test" proved that any system accessible to users was inherently open to exploitation. It was a wake-up call that sparked the transition of cybersecurity from a passive state to an active, intellectual discipline.</p>
        <p>Key Characteristics of This Era:</p>
        <ul>
          <li>Intentional Probing: The birth of deliberate <a href="https://www.recordedfuture.com/resources/maturity-assessment">vulnerability testing</a> and "white hat" exploration.</li>
          <li>Curiosity-Driven Hacking: Hacking emerged as a way to explore system boundaries, generally motivated by academic interest rather than malice.</li>
          <li>Access vs. Security: Institutions realized that providing user access created inevitable security risks.</li>
          <li>Beyond the Lock: The realization that cybersecurity required ongoing digital strategy, not just physical barriers.</li>
        </ul>
        <p>This decade transformed the computer from a mysterious black box into a challenge to be solved, proving that human ingenuity would always be the greatest threat - and defense - to any system.</p>
        <ul>
          <li><a href="https://www.academia.edu/28863235/History_of_Hacking">The History of Hacking</a></li>
          <li><a href="https://www.staysafeonline.org/articles/the-evolution-of-ethical-hacking-from-curiosity-to-cybersecurity">The Evolution of Ethical Hacking: From Curiosity to Cybersecurity</a></li>
        </ul>
        <h2>The 1970s: Networking and the First "Worm"</h2>
        <p>The 1970s transformed cybersecurity from a localized concern into a networked reality. The launch of ARPANET, the precursor to the modern internet, enabled researchers to share resources across distances but also opened a doorway for autonomous software to travel between systems.</p>
        <p>In 1971, this potential was realized with Creeper, the world's first self-replicating network program. While harmless, its ability to move across the network and display messages was a revolutionary proof of concept. In response, programmer Ray Tomlinson created Reaper - the first antivirus program - specifically designed to hunt and delete Creeper. This decade also saw the rise of Kevin Mitnick, whose exploits in the 1980s showed that psychological manipulation, or social engineering, could bypass even the strongest technical barriers.</p>
        <p>Key Characteristics of This Era:</p>
        <ul>
          <li>Network Connectivity: ARPANET's birth created the first interconnected digital landscape.</li>
          <li>The First Worm: Creeper demonstrated that programs could self-propagate autonomously.</li>
          <li>The First Antivirus: Reaper established the "detect and delete" model of digital defense.</li>
          <li>Social Engineering: Early hacks highlighted that human error is often the weakest link in the security chain.</li>
        </ul>
        <p>This era proved that once computers started talking to each other, the "locked door" was no longer enough to keep an intruder out.</p>
        <ul>
          <li><a href="https://ybpyt.neocities.org/thecreepervirus">The Creeper Virus</a></li>
          <li><a href="https://pandorafms.com/blog/creeper-and-reaper/">Creeper and Reaper: The First Virus and Anti-Virus</a></li>
        </ul>
        <h2>The 1980s: Personal Computers and the Birth of an Industry</h2>
        <p>The 1980s shifted computing from sterile labs to homes and offices. This explosion of connectivity via modems and floppy disks turned theoretical threats into a global reality, giving rise to the first commercial antivirus software and formal incident response teams like CERT.</p>
        <p>Key Characteristics of This Era:</p>
        <ul>
          <li>Wild Malware: Viruses like Elk Cloner and the Brain Virus moved beyond labs to infect personal computers worldwide.</li>
          <li>The Morris Worm (1988): The first major network-wide disruption, leading to the first conviction under the Computer Fraud and Abuse Act (Robert Tappan Morris).</li>
          <li>Cyber Espionage: Marcus Hess's breach of military systems for Soviet intelligence proved that digital networks had massive geopolitical stakes.</li>
          <li>Ransomware Roots: The AIDS Trojan introduced the world to the concept of holding digital files hostage for payment.</li>
        </ul>
        <p>The 1980s proved that as computers became personal, the threats against them became universal.</p>
        <ul>
          <li><a href="https://www.ttu.edu/cybersecurity/lubbock/digital-life/digital-identity/malware.php">What is Malware?</a></li>
          <li><a href="https://cyber.tap.purdue.edu/blog/articles/viruses-of-the-80s/">Computer Viruses of the 80s</a></li>
        </ul>
        <h2>The 1990s: The Public Internet and Exploding Threats</h2>
        <p>As the World Wide Web went mainstream, the attack surface grew exponentially. This was the era of the "Macro Virus," where malicious code hid in everyday documents, and the dominance of Windows made it a universal target for hackers.</p>
        <p>Key Characteristics of This Era:</p>
        <ul>
          <li>Mass-Mailers: The Melissa virus demonstrated how email could be weaponized to clog global servers in hours.</li>
          <li>The Encryption Standard: Netscape's SSL (1995) laid the foundation for secure online commerce and HTTPS.</li>
          <li>Network Fortification: Firewalls became standard equipment as businesses scrambled to block external intrusions.</li>
          <li>Legal Frameworks: Organizations like the EFF began fighting for digital privacy and standardized cybercrime laws.</li>
        </ul>
        <p>This decade transformed <a href="https://www.recordedfuture.com/services/analyst-on-demand">cybersecurity services</a> from a technical niche into a vital pillar of global commerce and law.</p>
        <ul>
          <li><a href="https://www.sei.cmu.edu/documents/540/2000_019_001_497190.pdf">The Melissa Virus: FAQs</a></li>
          <li><a href="https://cyberpills.news/item/2054-online-security-the-transformation-from-ssl-to-tls-and-their-historical-impact.html">The History and Impact of Netscape's SSL</a></li>
        </ul>
        <h2>The 2000s: Professionalized Crime and Mature Defenses</h2>
        <p>The 2000s saw cybercrime scale into a high-profit industry. High-speed broadband and the rise of e-commerce meant that a single breach could compromise tens of millions of records, forcing the industry to develop more sophisticated authentication and <a href="https://www.recordedfuture.com/services/managed-monitoring">monitoring</a> tools.</p>
        <p>Key Characteristics of This Era:</p>
        <ul>
          <li>Massive DDoS Attacks: "Mafiaboy" proved that even giants like Amazon and eBay could be paralyzed by flooded traffic.</li>
          <li>Social Engineering at Scale: The ILOVEYOU virus infected millions by exploiting human curiosity and trust.</li>
          <li>Data Breach Epidemics: The TJX breach accelerated the adoption of strict data security standards like PCI DSS.</li>
          <li>Encrypted Ransomware: In 2006, ransomware began using RSA encryption, making it nearly impossible to recover files without a key.</li>
        </ul>
        <p>As attacks became more lucrative, the defensive industry responded with the first generation of modern security standards and behavioral analysis.</p>
        <ul>
          <li><a href="https://www.bcs.org/articles-opinion-and-research/25-years-ago-the-iloveyou-worm/">25 Years Ago: The ILOVEYOU Worm</a></li>
          <li><a href="https://whyy.org/segments/iloveyou-how-a-students-email-virus-exploited-human-nature/">How a Computer Science Student Created One of the First Email Viruses That Spread by Preying on Human Nature</a></li>
        </ul>
        <h2>The 2010s: Nation-States and Digital Weapons</h2>
        <p>The 2010s shifted the focus from criminal profit to national security. Cybersecurity became a theater of war, with governments deploying digital weapons to destroy physical infrastructure and influence global politics.</p>
        <p>Key Characteristics of This Era:</p>
        <ul>
          <li>The Stuxnet Worm: The first acknowledged cyberweapon designed to cause physical destruction to industrial equipment.</li>
          <li>The Snowden Leaks: Exposed the massive scale of global surveillance, sparking a decade-long debate on privacy.</li>
          <li>Automation and AI: Machine learning began appearing on both sides - defenders used it for detection, while attackers used it to find flaws.</li>
          <li>Global Ransomware: WannaCry and NotPetya showed how automated exploits could cripple hospitals and shipping lines across 150 countries.</li>
        </ul>
        <p>By the end of the decade, it was clear that a line of code could be just as impactful as a physical weapon.</p>
        <ul>
          <li><a href="https://swisscyberinstitute.com/blog/6-worst-computer-viruses-in-history/">Top 12 Worst Computer Viruses in History (&amp; What They Taught Us About Cybersecurity)</a></li>
          <li><a href="https://www.ibm.com/think/x-force/wannacry-worm-ransomware-changed-cybersecurity">Wannacry: How the Widespread Ransomware Changed Cybersecurity</a></li>
        </ul>
        <h2>The 2020s: AI Threats and Modern Threat Intelligence</h2>
        <p>Today, the line between the physical and digital worlds has vanished. With remote work and cloud-native businesses, security is now a proactive game of "Threat Intelligence", which involves predicting and neutralizing an adversary's move before they even make it.</p>
        <p>Key Characteristics of This Era:</p>
        <ul>
          <li>Targeting Infrastructure: Attacks on power grids and water systems have raised the stakes from financial loss to public safety.</li>
          <li>AI-Powered Attacks: Adversaries use AI to create deepfakes and hyper-personalized phishing at speeds humans can't match.</li>
          <li>Predictive Defense: Modern strategy relies on Threat Intelligence, using AI to analyze patterns and stop attacks in their tracks.</li>
          <li>Cloud &amp; Remote Security: The shift away from traditional offices has forced a move toward "Zero Trust" security models.</li>
        </ul>
        <p>The ongoing battle between human ingenuity and artificial intelligence now defines the frontlines of our digital existence.</p>
        <ul>
          <li><a href="https://learn.microsoft.com/en-us/security/zero-trust/zero-trust-overview">What is a "Zero Trust" Security Model?</a></li>
          <li><a href="https://extension.harvard.edu/blog/ai-and-the-future-of-cybersecurity/#How-AI-Enables-the-Next-Generation-of-Cyber-Attacks-">AI and the Future of Cybersecurity</a></li>
          <li><a href="https://www.ncsc.gov.uk/report/impact-ai-cyber-threat-now-2027">The Impact of AI on Cyber Threat From Now to 2027</a></li>
          <li><a href="https://www.ie.edu/insights/ideas-to-shape-the-future/idea/what-is-the-future-of-cybersecurity/">What Is the Future of Cybersecurity?</a></li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_14b1a1ef4390d02385a641660591272ebb0215a17.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[The Different Types of Payment Fraud and How to Prevent Them]]></title>
            <link>https://www.recordedfuture.com/blog/types-of-payment-fraud</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/types-of-payment-fraud</guid>
            <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore the different types of payment fraud and become aware of telltale signs and how to prevent them.]]></description>
            <content:encoded><![CDATA[
        <p>Payment fraud is growing in scale and sophistication, affecting businesses across every industry, and as digital payments expand, so do the opportunities for bad actors to exploit vulnerabilities. Understanding how fraud works and how to prevent it is essential for protecting revenue, maintaining trust, and staying resilient in an increasingly complex threat landscape.</p>
        <h2>What Is Payment Fraud?</h2>
        <p>Payment fraud refers to the theft of money from businesses or individuals through unauthorized transactions or deceptive purchases. Fraudsters may act using their own accounts or by gaining unauthorized access to someone else's account.</p>
        <p>While payment fraud can happen in person, online transactions are especially vulnerable. According to Juniper Research, global business losses from online payment fraud are projected to surpass $362 billion between 2023 and 2028. A business's fraud risk depends largely on its industry, the sensitivity of the data it handles, and the payment methods it accepts. The more ways customers can interact with accounts and complete purchases, the more entry points exist for bad actors to exploit.</p>
        <h2>Different Types of Payment Fraud</h2>
        <p>Fraudsters use many tactics, and below we list 14 of the most common. Given the large number of threats, businesses must prepare their teams to recognize a variety of warning signs. Strong internal communication policies, clear escalation procedures, and knowledge of the landscape are foundational to any fraud prevention strategy.</p>
        <h3>1. Phishing</h3>
        <p>Phishing is a social engineering tactic in which criminals attempt to trick people into revealing sensitive information such as account credentials or payment details. These attacks often come in the form of malicious links sent via email or text, but they can also occur over the phone. Attackers may pose as trusted figures - a friend, a bank representative, or a government official - to manipulate victims.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Let customers know exactly how your business will contact them, including phone numbers and email addresses.</li>
          <li>Be transparent about what information your staff will and will not ask for.</li>
          <li>Alert customers to any known phishing attempts targeting your brand.</li>
          <li><a href="https://www.recordedfuture.com/services/analyst-on-demand">Train employees</a> on information security protocols and how to identify suspicious communications.</li>
        </ul>
        <h3>2. Credit and Debit Card Fraud</h3>
        <p>This type of fraud involves obtaining card information - either physically or digitally - and using it to make unauthorized purchases. Cards may be stolen directly, or details may be harvested through card skimming devices installed on ATMs or point-of-sale terminals. Attackers also acquire card data through phishing schemes or by purchasing stolen credentials on the dark web.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Restrict POS system access to authorized personnel and regularly inspect payment hardware for tampering.</li>
          <li>Build secure, encrypted payment pages that comply with data protection standards.</li>
          <li>Offer customers multiple notification options for purchases and account activity.</li>
          <li>Warn customers never to share account or confirmation numbers with unverified sources.</li>
        </ul>
        <h3>3. Wire Transfer Fraud</h3>
        <p>In wire transfer fraud, criminals convince victims to send money directly to them. Because wire transfers are difficult to reverse, they are a preferred method among scammers. Attackers commonly impersonate someone the victim trusts - a family member, a company executive, or a business vendor. The use of a convincing back-story is often referred to as "social engineering." For example, an attacker may text employees pretending to be their CEO, claiming an emergency and requesting an urgent fund transfer.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Train employees to spot the signs of social engineering and impersonation.</li>
          <li>Establish official communication channels and avoid conducting financial business over easily spoofed channels like text messages.</li>
          <li>Report and share all phishing attempts with the entire team.</li>
        </ul>
        <h3>4. Check Fraud</h3>
        <p>Check fraud involves using counterfeit or altered checks to make payments or writing checks from accounts that lack sufficient funds. Fake checks may be digitally printed or modified versions of real checks. In some cases, the check is genuine but drawn from a closed account.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Implement software that verifies the authenticity of checks.</li>
          <li>Train staff to recognize the visual and physical signs of fraudulent checks.</li>
        </ul>
        <h3>5. Chargeback and Refund Fraud</h3>
        <p>Also known as "friendly fraud," chargeback fraud occurs when a customer makes a legitimate purchase and then falsely claims a refund - either directly from the business or through their credit card company. This type of fraud is particularly tricky because it can be hard to distinguish from genuine disputes, especially when delivery or service quality is involved.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Validate customer information, including billing addresses and card security codes.</li>
          <li>Use payment platforms that include <a href="https://www.recordedfuture.com/services/intelligence-services">fraud protection</a> and dispute automation tools.</li>
          <li>Respond to refund and chargeback requests quickly.</li>
          <li>Minimize legitimate chargebacks by fulfilling orders accurately and on time.</li>
        </ul>
        <h3>6. Identity Theft</h3>
        <p>Identity theft happens when a criminal obtains someone's personal information and uses it for financial gain or to make purchases in someone else's name. For businesses, a common result is having to deal with chargebacks after customers discover fraudulent charges on their accounts. Although the primary victim is the customer, businesses have a responsibility to prevent data breaches that expose customer information in the first place.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Train employees to recognize phishing and follow secure information handling practices.</li>
          <li>Ensure your payment systems comply with PCI DSS (Payment Card Industry Data Security Standard) requirements.</li>
        </ul>
        <h3>7. Account Takeover Fraud</h3>
        <p>Account takeover (ATO) fraud typically follows identity theft. Once attackers obtain a user's credentials, they change the password and contact information to lock the real owner out. From there, they may use the account for fraudulent purchases or sell it to other bad actors.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Enforce strong password requirements for all accounts.</li>
          <li>Require two-factor authentication (2FA) and send confirmation alerts for any significant account changes.</li>
          <li>Notify customers of purchases and account modifications in real time.</li>
        </ul>
        <h3>8. New Account Fraud</h3>
        <p>New account fraud (NAF) occurs when someone uses stolen or fabricated identities to open new lines of credit or accounts. These fraudulent accounts can then be used to make purchases or commit further fraud down the line.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Require multi-factor authentication (MFA) - not just email verification - during account creation.</li>
          <li>Verify address details and card security information during transactions.</li>
          <li>Use fraud protection tools that leverage machine learning to detect unusual account creation patterns.</li>
        </ul>
        <h3>9. Gift Card Fraud</h3>
        <p>Gift card fraud is a social engineering scam where criminals pressure victims into purchasing gift cards and handing over the card numbers. Once the numbers are given, the funds are essentially unrecoverable, making this a popular method among scammers.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Display warnings about gift card scams during the checkout process.</li>
          <li>Remind customers never to share gift card numbers with people they don't personally know.</li>
          <li>Educate in-store staff to recognize signs of gift card fraud and when to escalate the situation.</li>
        </ul>
        <h3>10. Merchant Identity Theft</h3>
        <p>In merchant identity theft, attackers impersonate legitimate businesses or vendors to defraud customers or partner organizations. They may use phishing to extract employee credentials and gain access to business systems, or they may pose as a trusted vendor and redirect payments to themselves.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Train staff to identify phishing attempts and follow secure communication practices.</li>
          <li>Establish verification procedures when communicating with vendors and business partners.</li>
          <li>Report phishing attempts to employees and partners promptly.</li>
        </ul>
        <h3>11. Pagejacking and Domain Spoofing</h3>
        <p>Pagejacking involves cloning an existing webpage and redirecting users to the fake version to steal login credentials or payment information. Domain spoofing follows a similar concept - attackers build an identical-looking site under a slightly different URL. Users are typically directed to these fraudulent pages through malicious emails or texts.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Run plagiarism detection tools to identify duplicate versions of your pages online.</li>
          <li>Pay attention to unusual customer service complaints that might signal a spoofed site.</li>
          <li>Submit takedown requests to search engines if you discover a duplicate site, and notify affected customers.</li>
        </ul>
        <h3>12. Mobile Payment Fraud</h3>
        <p>As mobile payments become more prevalent, they've also become a target for fraud. Attackers can exploit mobile apps through malware installation, stolen app credentials, or interception of 2FA codes. For example, a scammer may call a customer pretending to represent a business and ask them to read back a verification code - which is actually a 2FA code the attacker has triggered on the victim's account.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Authenticate customers over the phone carefully to reduce the risk of impersonation-based fraud.</li>
          <li><a href="https://www.recordedfuture.com/services/managed-monitoring">Monitor</a> for unusual spending or refund activity in mobile transactions.</li>
          <li>Educate customers about the risks of clicking on unknown links, QR codes, or visiting unfamiliar websites.</li>
        </ul>
        <h3>13. Push Payment Fraud</h3>
        <p>Unlike unauthorized transaction fraud, push payment fraud involves tricking the victim into willingly sending money to a fraudster. This can take many forms, including phishing, blackmail, or deceptive scenarios like fake emergencies. The key distinction is that the victim actively initiates the transfer.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Clearly communicate to customers what your staff can and cannot ask them to do or pay.</li>
          <li>Make it easy for customers to report anyone impersonating your business.</li>
          <li>Issue proactive alerts about ongoing scam attempts tied to your brand.</li>
        </ul>
        <h3>14. ACH Payment Fraud</h3>
        <p>ACH (Automated Clearing House) payment fraud involves criminals gaining unauthorized access to a victim's bank account details and using them to initiate fraudulent transfers. For businesses, this risk can come from both outside attackers and malicious insiders.</p>
        <p>Prevention tips:</p>
        <ul>
          <li>Strictly limit and monitor employee access to business bank accounts.</li>
          <li>Educate all staff with account access about phishing tactics and establish firm security policies.</li>
        </ul>
        <h2>Which Businesses Have the Highest Fraud Risk?</h2>
        <p>Not all businesses face the same level of exposure. Fraud risk is generally highest in sectors that process online payments, handle sensitive personal data, or still accept paper checks.</p>
        <h3>E-Commerce Businesses</h3>
        <p>E-Commerce businesses are particularly vulnerable. Online retail involves accepting payments from a wide range of locations, often with multiple payment methods. Features like peer-to-peer payment integrations or international checkout add more potential points of failure. The more accounts and payment methods a customer has linked, the more attractive a target they become for data breaches.</p>
        <h3>Healthcare, Banking, and Data-Sensitive Industries</h3>
        <p>These sectors are at elevated risk because of the high value of the information they store. A breach in these sectors doesn't just expose financial data - it can compromise identity information used to commit fraud across many platforms simultaneously.</p>
        <h3>Businesses Still Accepting Checks</h3>
        <p>These kinds of businesses face unique challenges. As check usage declines, employees may become less experienced at identifying fakes, which makes training and verification systems all the more important. According to the Association for Financial Professionals, check fraud remains one of the most common forms of payment fraud.</p>
        <h2>How to Mitigate Risk</h2>
        <p>A variety of tools and strategies are available to help businesses identify and reduce fraud exposure. Conducting a <a href="https://www.recordedfuture.com/resources/maturity-assessment">security risk assessment</a> is a strong starting point, helping teams understand which vulnerabilities are most critical and where to prioritize investment.</p>
        <p>From there, organizations should focus on establishing a solid operational and security foundation before layering in more advanced fraud detection capabilities.</p>
        <h3>Foundational Controls</h3>
        <p>These measures create a baseline level of protection by securing systems, safeguarding data, and reducing avoidable losses:</p>
        <ul>
          <li>Strong network and password security: Establish internal policies governing account access, password requirements, and physical access to devices and systems.</li>
          <li>Network tokenization: Ensure payment systems encrypt and tokenize customer data to protect sensitive information.</li>
          <li>PCI standards compliance: Build payment workflows that meet Payment Card Industry (PCI) standards to safeguard cardholder data.</li>
          <li>3D Secure (3DS) authentication: Use the latest 3DS protocols to validate transactions and verify user identity before completing purchases.</li>
          <li>Chargeback protection: Work with your payment processor to implement tools that help minimize financial losses from disputed transactions.</li>
        </ul>
        <p>Once these core protections are in place, businesses can enhance their fraud prevention strategies with more dynamic, data-driven approaches.</p>
        <h3>Advanced Detection &amp; Optimization</h3>
        <p>These techniques improve visibility, adaptability, and long-term resilience against evolving fraud tactics:</p>
        <ul>
          <li>Fraud KPI tracking: Monitor key metrics such as dispute rates, authorization rates, and approval/decline ratios to identify trends and respond proactively.</li>
          <li>Rules-based systems: Implement rule-based detection as a reliable operational backbone. While rules require ongoing maintenance, they are especially useful in early stages and can be refined over time.</li>
          <li>Machine learning algorithms: Leverage ML-powered systems to analyze large, complex datasets and uncover patterns that are difficult to detect manually. These models continuously improve as they adapt to new fraud behaviors.</li>
        </ul>
        <h2>Staying Ahead of Payment Fraud</h2>
        <p>Payment fraud is an ongoing challenge, but a proactive, layered approach can significantly reduce risk. By combining strong foundational controls with data-driven detection and continuous monitoring, businesses can stay ahead of evolving threats.</p>
        <p>Ultimately, effective fraud prevention requires regular review, employee awareness, and a commitment to adapting as tactics change.</p>
        <h2>Additional Resources</h2>
        <ul>
          <li><a href="https://www.financialprofessionals.org/training-resources/resources/survey-research-economic-data/details/payments-fraud">2026 AFP Payments Fraud and Control Survey Report</a></li>
          <li><a href="https://www.frbservices.org/news/fed360/issues/060325/check-fraud-remains-top-threat">Learn How Federal Reserve Financial Services Can Help Against Check Fraud</a></li>
          <li><a href="https://onlinedegrees.sandiego.edu/cyber-security-statistics/">47 Cybersecurity Statistics and Facts for 2026</a></li>
          <li><a href="https://cltc.berkeley.edu/2025/01/16/beyond-phishing-exploring-the-rise-of-ai-enabled-cybercrime/">Beyond Phishing: Exploring the Rise of AI-enabled Cybercrime</a></li>
          <li><a href="https://www.dol.gov/agencies/eta/ui-modernization/fraud">Preventing Fraud</a></li>
          <li><a href="https://omh.ny.gov/omhweb/resources/internal_control_top_ten.html">Top Ten Internal Controls to Prevent And Detect Fraud</a></li>
          <li><a href="https://thepaymentsassociation.org/article/the-escalating-threat-of-authorised-push-payment-fraud/">The Escalating Threat of Authorised Push Payment Fraud</a></li>
          <li><a href="https://primer.io/blog/spotlight-payments-fraud">Payment Fraud and How To Fight Back</a></li>
          <li><a href="https://privsec.harvard.edu/prevent-phishing">A Short Guide for Spotting Phishing Attempts</a></li>
          <li><a href="https://www.techuk.org/resource/eight-ways-to-combat-fraud-in-the-ai-age.html">Eight Ways to Combat Fraud in The AI Age</a></li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_100da79cbabd12fe9344c4613428d23e68899228e.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Digital Citizenship Glossary: Key Terms Every Internet User Should Know]]></title>
            <link>https://www.recordedfuture.com/blog/digital-citizenship-glossary</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/digital-citizenship-glossary</guid>
            <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[A glossary of key internet terms every user should know to protect themselves from scams, phishing, malware, and other digital threats.]]></description>
            <content:encoded><![CDATA[
        <p>The internet is basically a giant digital city, and you need to be just as streetwise here as outside your front door. Most people go online every day - scrolling through TikTok, finishing a research paper, or making purchases - but they don't always know the "rules of the road" or the vocabulary that tech experts use to describe our digital lives. Here's a breakdown of essential digital citizenship terms to help you navigate the web and <a href="https://www.recordedfuture.com/platform/mobile-app">mobile apps</a> like a pro:</p>
        <p><strong>Authority</strong> - Authority refers to how trustworthy a source is based on who created it. If information comes from a <a href="https://www.recordedfuture.com/services/analyst-on-demand">qualified expert</a> or a well-known organization, it's more likely to be reliable than something posted by an unknown user.</p>
        <p><strong>Bystander</strong> - A bystander is someone who sees harmful behavior online, like cyberbullying, but chooses not to get involved or take action.</p>
        <p><strong>Cookies</strong> - Cookies are small files that websites store on your device to remember information about you, like login details or browsing habits. They make websites easier to use, but they also allow service providers to track your activity.</p>
        <p><strong>Cyberbullying</strong> - Cyberbullying is when someone uses digital platforms to repeatedly harass, threaten, or embarrass another person. Unlike trolling, it usually targets a specific individual.</p>
        <p><strong>Data Breach</strong> - A data breach happens when private or sensitive information is accessed or stolen without permission, often from companies or large platforms.</p>
        <p><strong>Digital Citizen</strong> - A digital citizen is anyone who uses technology to interact with others online. Being a good digital citizen means using the internet responsibly, respectfully, and safely.</p>
        <p><strong>Digital Footprint</strong> - A digital footprint is the trail of information you leave behind online through posts, searches, and interactions. The more you share, the greater your exposure to privacy issues or misuse of personal information. Also, once something is online, it can be very difficult to remove.</p>
        <p><strong>Digital Identity Theft</strong> - Digital identity theft occurs when someone steals your personal information, like passwords or account details, to pretend to be you or access your accounts.</p>
        <p><strong>Digital Divide</strong> - The digital divide refers to the gap between people who have access to modern technology and the internet and those who do not.</p>
        <p><strong>Encryption</strong> - Encryption is a method of <a href="https://www.recordedfuture.com/services/intelligence-services">protecting data</a> by turning it into a coded format that only authorized users can read. It helps keep sensitive information secure.</p>
        <p><strong>Firewall</strong> - A firewall is a security system that monitors and controls incoming and outgoing network traffic, blocking anything that looks suspicious or harmful.</p>
        <p><strong>Imaginary Audience</strong> - The imaginary audience is the feeling that people are constantly watching and judging you. Social media can make this feeling stronger by showing likes, views, and comments.</p>
        <p><strong>Invisible Audience</strong> - The invisible audience refers to the unknown people who may see your online content, including strangers, future employers, or others outside your immediate circle. It pays to <a href="https://www.recordedfuture.com/resources/maturity-assessment">assess your security blind spots</a> because you may not realize who is viewing your posts.</p>
        <p><strong>Malware</strong> - Malware is any type of harmful software designed to damage devices, steal information, or disrupt normal operations. It is often installed as part of a package or application that otherwise appears innocent.</p>
        <p><strong>Password Hygiene</strong> - Password hygiene refers to the practice of creating strong, unique passwords and keeping them secure instead of reusing the same one across multiple accounts.</p>
        <p><strong>Phishing</strong> - Phishing is a scam where attackers pretend to be a trusted source to trick you into giving away personal information, often through fake emails, texts, or websites.</p>
        <p><strong>Public Wi-Fi Risk</strong> - Public Wi-Fi risk refers to the potential dangers of using unsecured networks, where hackers may be able to intercept your data.</p>
        <p><strong>Reliability</strong> - Reliability refers to whether information is accurate and dependable. Just because something looks professional online doesn't mean it's true.</p>
        <p><strong>Social Comparison</strong> - Social comparison is the act of comparing your life to what you see online. Since people often share only their best moments, it can create unrealistic expectations.</p>
        <p><strong>Targeted Advertising</strong> - Targeted advertising uses your online behavior, location, and personal data to show ads that are specifically tailored to you.</p>
        <p><strong>Trolling</strong> - Trolling is when someone posts deliberately annoying or provocative content online to get attention or start arguments.</p>
        <p><strong>Two-Factor Authentication (2FA)</strong> - Two-factor authentication is a security feature that requires a second form of verification, like a code sent to your phone, in addition to your password.</p>
        <p><strong>Upstander</strong> - An upstander is someone who takes action when they see harmful behavior online, such as supporting the victim or reporting the issue.</p>
        <p><strong>VPN (Virtual Private Network)</strong> - A VPN is a tool that creates a secure, encrypted connection to the internet, helping protect your data and privacy, especially on public networks.</p>
        <h2>Additional Resources to Learn More</h2>
        <ul>
          <li><a href="https://safecomputing.umich.edu/protect-yourself/be-safe-online/digital-citizenship">What is a Digital Citizen?</a></li>
          <li><a href="https://gssr.georgetown.edu/the-forum/topics/technology/the-global-tech-divide-how-the-digital-revolution-is-leaving-some-of-us-in-the-digital-dark-ages/">The Global Tech Divide: How the Digital Revolution is Leaving Some of Us in the Digital Dark Ages</a></li>
          <li><a href="https://www.internetsociety.org/blog/2024/10/understanding-digital-footprints/">What is a Digital Footprint?</a></li>
          <li><a href="https://www.udel.edu/home/it/ask-it/blog/2025/october/identity-theft-what-to-know/">What is Digital Identity Theft?</a></li>
          <li><a href="https://www.forbes.com/sites/ericwood/2025/11/09/studies-suggests-that-social-media-creates-a-real-imaginary-audience/">Research About The "Imaginary Audience"</a></li>
          <li><a href="https://its.wsu.edu/information-security-services/security-spam-phishing-and-malware/">What is Spam, Phishing, and Malware?</a></li>
          <li><a href="https://library.unm.edu/services/instruction/information-digital-literacy/authority-and-value.php">Authority and Value of Information</a></li>
          <li><a href="https://www.amity.edu/gurugram/blog/career-guidance/dealing-with-comparison-in-the-age-of-social-media">Dealing with Social Comparison in the Age of Social Media</a></li>
          <li><a href="https://lawreview.law.ucdavis.edu/archives/58/3/targeted-advertising">What is Targeted Advertising?</a></li>
          <li><a href="https://news.uga.edu/internet-troll/">What Makes a Troll? The Dangers of Online Narcissism</a></li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_170a907460862545463e135e32cfc0749d89fd10b.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Quantum Risk Explained]]></title>
            <link>https://www.recordedfuture.com/research/quantum-risk-explained</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/quantum-risk-explained</guid>
            <pubDate>Thu, 07 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Learn how the "Harvest Now, Decrypt Later" (HNDL) risk exposes long-lived sensitive data today, regardless of when Cryptographically Relevant Quantum Computers (CRQCs) arrive.]]></description>
            <content:encoded><![CDATA[
        <h2>Summary</h2>
        <ul>
          <li>Quantum computing is moving from theory toward early practical use, with direct implications for encryption, authentication, and long-term data confidentiality.</li>
          <li>The primary risk is the eventual emergence of cryptographically relevant quantum computers (CRQCs), which would break today’s public-key cryptography and undermine encryption, digital identity, and software trust at scale.</li>
          <li>Quantum risk is already present: “harvest now, decrypt later” activity exposes long-lived sensitive data today, regardless of when CRQCs ultimately arrive.</li>
          <li>Regulatory mandates and procurement standards are accelerating post-quantum cryptography (PQC) adoption, making quantum readiness a multi-year compliance and resilience priority.</li>
          <li>Organizations that delay preparation beyond 2026 are likely to face compressed migration timelines, higher transition costs, and increased operational disruption.</li>
        </ul>
        <h2>Quantum Computing Explained</h2>
        <p>Quantum computing applies principles of physics to solve certain complex problems far more efficiently than classical computers. Its security relevance lies primarily in cryptanalysis and optimization: A sufficiently powerful quantum computer will reduce the calculations required to protect today's public-key encryption from thousands of years to hours or less. Researchers have used the term “Q-Day” to refer to the hypothetical point at which quantum computers will be powerful enough to break encryption.</p>
        <p>Quantum computing is now moving from theory toward early practical use, bringing “Q-Day” closer to reality. Industry estimates suggest quantum computing alone could generate up to <a href="https://www.mckinsey.com/capabilities/tech-and-ai/our-insights/quantum-technology-sees-record-investments-progress-on-talent-gap">$1.3 trillion</a> in value by 2035. Major cloud providers, including <a href="https://newsroom.ibm.com/blog-ibm-collaborates-across-four-national-quantum-innovation-centers-to-help-drive-the-future-of-quantum-centric-supercomputing">IBM</a>, <a href="https://blog.google/innovation-and-ai/technology/research/google-willow-quantum-chip/">Google</a>, and <a href="https://azure.microsoft.com/en-us/blog/quantum/2025/02/19/microsoft-unveils-majorana-1-the-worlds-first-quantum-processor-powered-by-topological-qubits/">Microsoft</a>, are expanding their quantum services, while specialised firms such as <a href="https://www.quantinuum.com/blog/quantinuum-nvidia-partnership">Quantinuum</a> and <a href="https://www.psiquantum.com/news-import/inside-construct">PsiQuantum</a> continue to improve system stability and error correction. While these advances are not yet transformative, they are consistent with the early stages of commercial adoption.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Figure 1: Key risks of quantum computing" src="https://www.recordedfuture.com/media_1ff047594639919ef4ac5e248c6a4c0dbaefadde7.png?width=750&amp;format=png&amp;optimize=medium" width="1694" height="684" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>Key risks of quantum computing (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Alongside its potential benefits across <a href="https://www.bis.org/publ/bppdf/bispap149.htm">finance</a>, <a href="https://www.mckinsey.com/industries/life-sciences/our-insights/the-quantum-revolution-in-pharma-faster-smarter-and-more-precise">pharmaceuticals</a>, <a href="https://geopoliticalfutures.com/the-military-benefits-of-quantum-technology/">defense</a>, and other sectors, quantum computing introduces four key security risks.</p>
        <h3>Risk 1: Breaking Public-Key Encryption</h3>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Figure 2: Potential impacts of breaking public-key encryption" src="https://www.recordedfuture.com/media_1cc307e86e38c263825fc4b05767a676b3784d969.png?width=750&amp;format=png&amp;optimize=medium" width="1014" height="862" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Potential impacts of breaking public-key encryption (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p><br />The most critical risk is the eventual <a href="https://www.nist.gov/cybersecurity/what-post-quantum-cryptography">arrival</a> of cryptographically relevant quantum computers (CRQCs), systems <a href="https://qubip.eu/cryptographically-relevant-quantum-computers-a-2025-perspective/">capable</a> of breaking widely used public-key algorithms such as RSA, Elliptic Curve Cryptography (ECC), and Diffie-Hellman. These algorithms underpin internet communications (Transport Layer Security [TLS], virtual private networks [VPNs], Secure Shell [SSH]), identity and access management, industrial and internet-of-things (IoT) systems, and the integrity of software supply chains.</p>
        <p>If broken, threat actors could decrypt sensitive data, impersonate trusted systems, and undermine digital authentication. This could enable:</p>
        <ul>
          <li>Forged digital signatures</li>
          <li>Compromised code-signing pipelines</li>
          <li>Spoofed websites, identities, and certificates</li>
          <li>Manipulated financial transactions and legal documents</li>
        </ul>
        <h3>Risk 2: Harvest Now, Decrypt Later (HNDL)</h3>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Figure 3: “Harvest now, decrypt later” workflow" src="https://www.recordedfuture.com/media_108f2318ba28848f615e8c1c9e9430771a2e2cda0.png?width=750&amp;format=png&amp;optimize=medium" width="1526" height="594" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3: “</strong>Harvest now, decrypt later” workflow (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Although cryptographically relevant quantum computers (CRQCs) may still be years away, the risk is already materializing through “<a href="https://www.federalreserve.gov/econres/feds/files/2025093pap.pdf">harvest now, decrypt later</a>” (HNDL) activity. State-sponsored threat actors are <a href="https://www.techmonitor.ai/hardware/quantum/harvest-now-decrypt-later-cyberattack-quantum-computer">likely</a> collecting and storing encrypted data today with the intent to decrypt it once quantum capabilities mature. A 2021 Booz Allen Hamilton <a href="https://www.nextgov.com/emerging-tech/2021/11/report-china-may-steal-encrypted-government-data-now-decrypt-quantum-computers-later/187020/">assessment</a> found that Chinese economic espionage operations are likely targeting encrypted data with long-term intelligence value, including biometric identifiers, covert source identities, and weapons designs.</p>
        <p>Large-scale routing manipulation offers one method for intercepting such data. Researchers at the US Naval War College and Tel Aviv University <a href="https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1050&amp;context=mca">documented</a> systematic Border Gateway Protocol (BGP) hijacking by China Telecom between 2016 and 2019, which redirected traffic from US, Canadian, and Scandinavian networks through Chinese infrastructure. These types of operations align with a long-term HNDL collection strategy.</p>
        <p>Under the HNDL model, exposure occurs at the moment data is transmitted or stored, not when it is eventually decrypted. The primary risk, therefore, centers on long-lived data: information that must remain confidential for a decade or more, or whose sensitivity does not diminish over time, such as government and national security records, intellectual property and trade secrets, personal identifiers, financial data, biometric templates, healthcare records, and legal archives. For these data classes, compromise may not be immediately visible, but once decrypted, the consequences are irreversible. As a result, organizations holding long-lived sensitive data face near-term strategic risk regardless of when CRQCs become operational.</p>
        <p>Large-scale routing manipulation offers one method for intercepting such data. Researchers at the US Naval War College and Tel Aviv University <a href="https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1050&amp;context=mca">documented</a> systematic Border Gateway Protocol (BGP) hijacking by China Telecom between 2016 and 2019, which redirected traffic from US, Canadian, and Scandinavian networks through Chinese infrastructure. These types of operations align with a long-term HNDL collection strategy.</p>
        <p>Under the HNDL model, exposure occurs at the moment data is transmitted or stored, not when it is eventually decrypted. The primary risk, therefore, centers on long-lived data: information that must remain confidential for a decade or more, or whose sensitivity does not diminish over time, such as government and national security records, intellectual property and trade secrets, personal identifiers, financial data, biometric templates, healthcare records, and legal archives. For these data classes, compromise may not be immediately visible, but once decrypted, the consequences are irreversible. As a result, organizations holding long-lived sensitive data face near-term strategic risk regardless of when CRQCs become operational.</p>
        <h3>Risk 3: Quantum-Accelerated Brute-Force Attacks (Grover’s Algorithm)</h3>
        <p>Quantum computing does not break modern symmetric encryption outright, but it can accelerate search-intensive tasks through techniques such as <a href="https://learn.microsoft.com/en-us/azure/quantum/concepts-grovers">Grover’s algorithm</a>. This reduces defender reaction time and increases the effectiveness of weak or legacy cryptographic implementations. In practice, this could enable faster brute-force attempts against outdated encryption, quicker identification of exposed secrets or misconfigurations, and more efficient malware tuning and exploit development.</p>
        <p>Recent <a href="https://thequantuminsider.com/2025/02/20/silicon-quantum-computing-executes-high-fidelity-grovers-algorithm-without-qec-but-scaling-challenges-remain/">demonstrations</a>, such as Silicon Quantum Computing’s high-accuracy implementation on a four-qubit processor, remain limited in scale but reflect steady progress toward these capabilities. However, Grover’s algorithm is constrained by high hardware requirements and limited parallelization. As a result, modern symmetric algorithms such as AES-128/192/256 are expected to remain secure for the foreseeable future, while environments with poor cryptographic hygiene will be affected first.</p>
        <h3>Risk 4: Quantum- and AI-Enhanced Vulnerability Discovery</h3>
        <p>Quantum capability will not develop in isolation. As quantum systems improve optimization and search performance, and AI automates reconnaissance, exploit development, and lateral movement, adversaries are likely to operate at <a href="https://thequantuminsider.com/2026/02/09/from-quantum-threat-to-ai-exposure-why-security-is-converging-faster-than-enterprises-expect/">unprecedented speed and scale</a>. Rather than identifying isolated weaknesses, attackers could rapidly map entire attack surfaces, chain misconfigurations, and deploy optimized malware variants in near real time. <a href="https://eprint.iacr.org/2024/169">Research</a> from 2024 demonstrates that machine-learning classifiers can already recover full cryptographic keys from PQC implementations using only a few hundred power traces, underscoring that even post-quantum algorithms will require hardened deployment.</p>
        <p>This convergence of AI and quantum technologies could significantly increase an attacker's operational tempo and amplify the impact of individual security lapses. The risk is compounded by the fact that a rising number of organizations carry substantial <a href="https://fintechmagazine.com/articles/why-the-finance-sector-grapples-with-software-security-debt">security debt</a>, with many reporting slow remediation cycles that leave vulnerabilities exposed for extended periods.</p>
        <h2>When Will CRQCs Arrive?</h2>
        <p>There is no definitive timeline for CRQCs. Most <a href="https://postquantum.com/q-day/q-day-predictions/">projections</a> place their arrival in the mid-to-late 2030s, with credible breakthroughs possible earlier in the decade. These estimates should be treated with caution: forecasting is inherently uncertain because progress in quantum error correction and qubit scaling occurs in uneven advances rather than linear progression.</p>
        <p>For security leaders, the precise date of “Q-Day” is less important than the lifecycle of deployed systems. Infrastructure implemented today may remain operational when CRQCs emerge. Current cryptographic decisions are therefore future-binding.</p>
        <p>Under the HNDL model, quantum risk is already material for long-lived data. Preparedness, visibility, and cryptographic agility matter more than timeline prediction.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Figure 4: No definitive timeline for CRQCs" src="https://www.recordedfuture.com/media_17371c5ac255f5ec94d1a64506d10b47e30510d9e.png?width=750&amp;format=png&amp;optimize=medium" width="1539" height="589" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>No definitive timeline for CRQCs (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>How Should Organizations Prepare?</h2>
        <p>The transition to post-quantum cryptography (PQC) is no longer a theoretical exercise. It is increasingly driven by regulation, procurement requirements, and emerging industry norms. These developments should be interpreted as operational signals necessitating forward planning.</p>
        <p>In the US, the <a href="https://www.hsgac.senate.gov/wp-content/uploads/imo/media/doc/Quantum%20Computing%20Cybersecurity%20Preparedness%20Act.pdf">Quantum Computing Cybersecurity Preparedness Act</a> requires federal agencies to inventory quantum-vulnerable cryptography and develop migration plans. NIST’s <a href="https://www.federalregister.gov/documents/2024/08/14/2024-17956/announcing-issuance-of-federal-information-processing-standards-fips-fips-203-module-lattice-based">2024 PQC standards</a> now set the baseline for federal procurement and are rapidly becoming global reference points. In parallel, <a href="https://media.defense.gov/2025/May/30/2003728741/-1/-1/0/CSA_CNSA_2.0_ALGORITHMS.PDF">Commercial National Security Algorithm (CNSA) 2.0</a> defines approved algorithms and transition timelines for national security systems, with full migration targeted by 2035. Similar momentum is building in Europe. The <a href="https://digital-strategy.ec.europa.eu/en/policies/cybersecurity-act">EU Cybersecurity Act</a> and national quantum-preparedness strategies are accelerating early adoption, particularly across critical infrastructure sectors such as energy and transportation.</p>
        <p>Although many of these mandates formally apply to public-sector systems, their practical impact extends well beyond government. Procurement requirements and supply-chain expectations are translating policy into commercial pressure. As a result, cryptographic inventory, structured migration planning, vendor alignment, and crypto-agility are likely to become baseline governance expectations rather than optional best practices. Boards are beginning to treat quantum risk as a strategic planning issue, not a distant technical concern, with some sectors allocating dedicated quantum-security budgets <a href="https://investor.forrester.com/news-releases/news-release-details/forresters-2026-technology-security-predictions-ais-hype-fades">approaching 5%</a> of total cybersecurity spend to support preparation.</p>
        <p>Industry coordination further reinforces this direction of travel. Financial institutions, payment networks, and telecommunications providers are forming quantum-readiness <a href="https://www.fsisac.com/hubfs/Knowledge/PQC/FutureState.pdf">working groups</a> to align migration timelines and manage shared dependencies. SWIFT is developing PQC migration <a href="https://wqs.events/swift-migration-to-post-quantum-cryptography-a-comprehensive-implementation-guide/">guidance</a> for its global messaging network, and Mastercard has released a PQC migration <a href="https://www.mastercard.com/content/dam/mccom/shared/news-and-trends/stories/2025/quantum-explainer-and-white-paper/Migration-to-post-quantum-cryptography-WhitePaper_2025.pdf">white paper</a> outlining practical transition steps.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Figure 5: Planning for the uncertain arrival of CRQCs" src="https://www.recordedfuture.com/media_1e73ead952dab51913768a583bb5c28d81cad1eb2.png?width=750&amp;format=png&amp;optimize=medium" width="1036" height="459" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 5:</strong></em> <em>Planning for the uncertain arrival of CRQCs (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>As the HNDL risk window narrows, organizations that begin structured preparation now are likely to manage transition risk deliberately and cost-effectively. Security leaders should ensure they understand where quantum-vulnerable cryptography resides, how regulatory obligations may cascade through customers and partners, and whether critical suppliers have credible PQC transition roadmaps. Those that delay risk compressed timelines, regulatory pressure, and materially higher transition costs later in the decade. Specific technical and governance steps are detailed in the Mitigations section.</p>
        <h2>Outlook</h2>
        <p><strong>HNDL activity will continue to expand.</strong><br />State-sponsored threat actors are highly likely to increase long-term interception and storage of encrypted data, particularly from sectors handling information with long confidentiality lifetimes. Even as storage economics fluctuate, scalable interception infrastructure and economically sustainable long-term storage models enable continued accumulation of high-value encrypted material. Demonstrated routing manipulation <a href="https://digitalcommons.usf.edu/cgi/viewcontent.cgi?article=1050&amp;context=mca">capabilities</a> further support persistent collection at scale, ensuring exposure continues to build regardless of when CRQCs ultimately arrive.</p>
        <p><strong>Attacker operational tempo will increase.</strong><br />The convergence of AI-enabled automation with quantum-accelerated search and optimization is likely to compress defender response windows and amplify the impact of existing security debt. Organizations reliant on legacy cryptography and slow remediation cycles will feel this pressure first.</p>
        <p><strong>Regulatory and procurement pressure will intensify.</strong><br />Post-quantum readiness is increasingly likely to become a baseline requirement for regulated markets, government contracts, and high-trust supply chains. US and European initiatives are formalizing transition timelines, and these mandates will propagate through vendor ecosystems, reframing quantum preparedness as a competitive requirement rather than a discretionary control.</p>
        <p><strong>Migration risk will become a primary enterprise challenge.</strong><br />Organizations that delay cryptographic inventories and crypto-agility investments are likely to face compressed transition timelines, higher costs, and greater operational disruption as standards mature and vendor dependencies shift.</p>
        <h2>Mitigations</h2>
        <p>Organizations should treat quantum resilience as a phased program aligned to visibility, flexibility, and systemic risk reduction, with leaders actively testing assumptions at each stage.</p>
        <h3>Short-term (2026): Establish visibility and prioritization</h3>
        <p>Security teams should maintain a comprehensive cryptographic inventory, identifying quantum-vulnerable algorithms across applications, infrastructure, and third-party dependencies, as well as public key infrastructure (PKI), operational technology, and IoT environments, and mapping them to data sensitivity and confidentiality requirements.</p>
        <p>Leaders should be asking:</p>
        <ul>
          <li>Do we have an enterprise-wide inventory of where quantum-vulnerable cryptography is embedded, including in legacy and third-party systems?</li>
          <li>Which data assets must remain confidential for a decade or more, and are they currently protected by algorithms likely to be broken by CRQCs?</li>
        </ul>
        <h3>Medium-term (2026–2028): Enable flexibility</h3>
        <p>Organizations should design for cryptographic agility, ensuring that new systems and major upgrades allow algorithm replacement without architectural redesign. Vendors supporting long-lived products should provide credible PQC transition roadmaps aligned to emerging standards.</p>
        <p>Leaders should be asking:</p>
        <ul>
          <li>Are we continuing to deploy systems that hard-code cryptographic algorithms, thereby increasing future migration risk?</li>
          <li>Do our critical suppliers have credible, time-bound PQC transition plans, and how exposed would we be if they fell behind?</li>
        </ul>
        <h3>Long-term (2028-onwards): Reduce systemic exposure</h3>
        <p>Migration should prioritize long-lived data and high-trust functions, including identity infrastructure, code signing, certificate management, secure build pipelines, and critical third-party software. Strengthening software and supply-chain integrity will be essential to minimizing cascading risk during transition.</p>
        <p>CISOs should be asking:</p>
        <ul>
          <li>Which enterprise trust anchors (for example, certificate authorities, signing keys, or hardware security modules) would create systemic impact if rendered vulnerable in a post-quantum scenario?</li>
          <li>Can we rotate and replace cryptographic components at scale without operational disruption if migration timelines compress unexpectedly?</li>
        </ul>
        <p>Recorded Future intelligence can support these efforts by tracking emerging cryptographic risks through our <a href="https://www.recordedfuture.com/products/threat-intelligence">Threat Intelligence Module</a>, identifying exposed dependencies through our <a href="https://www.recordedfuture.com/products/attack-surface-intelligence">Attack Surface Intelligence</a>, and assessing third-party quantum readiness as standards and vendor capabilities evolve through our <a href="https://www.recordedfuture.com/products/third-party-intelligence">Third-Party Intelligence Module</a>.</p>
        <h2>Risk Scenario</h2>
        <p>GridCore Systems is a US-based provider of industrial control systems (ICS) and grid-management software for electric utilities nationwide. The firm relies on quantum-vulnerable public-key cryptography (RSA/ECC) for remote access, software signing, and secure data exchange with utilities and regulators, and has not yet completed a post-quantum cryptographic transition.</p>
        <h3>First-Order Implications</h3>
        <div>
          <div>
            <div>
              <h3>Threat</h3>
            </div>
            <div>
              <h3>Risk</h3>
            </div>
          </div>
          <div>
            <div>Adversaries intercept GridCore’s encrypted communications and software-update traffic for long-term storage under a harvest-now, decrypt-later (HNDL) model, while exploiting an exposed support system to map cryptographic dependencies.</div>
            <div>
              <ul>
                <li><strong>Legal or compliance failure:</strong> Exposure of regulated energy-sector data triggers scrutiny under North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) and federal cybersecurity requirements.</li>
                <li><strong>Operational disruption:</strong> Incident response and emergency access restrictions delay maintenance and update cycles for utility customers.</li>
                <li><strong>Brand impairment:</strong> Disclosure of quantum-readiness gaps undermines customer and regulator confidence.</li>
              </ul>
            </div>
          </div>
        </div>
        <h3>Second-Order Implications</h3>
        <div>
          <div>
            <div>
              <h3>Threat</h3>
            </div>
            <div>
              <h3>Risk</h3>
            </div>
          </div>
          <div>
            <div>Attackers leverage harvested metadata and mapped trust relationships to position for future cryptographic compromise, focusing on software-signing infrastructure and authentication mechanisms.</div>
            <div>
              <ul>
                <li><strong>Operational disruption:</strong> Utilities delay deployments and require additional validation of software integrity and access controls.</li>
                <li><strong>Brand impairment:</strong> Public concerns over update authenticity erode GridCore’s reputation as a trusted infrastructure provider.</li>
                <li><strong>Competitive disadvantage:</strong> Customers begin to favor vendors with demonstrable post-quantum migration progress.</li>
              </ul>
            </div>
          </div>
        </div>
        <h3>Third-Order Implications</h3>
        <div>
          <div>
            <div>
              <h3>Threat</h3>
            </div>
            <div>
              <h3>Risk</h3>
            </div>
          </div>
          <div>
            <div>Following the emergence of cryptographically relevant quantum computers, previously harvested data is decrypted, exposing historical grid telemetry, credentials, and engineering documentation.</div>
            <div>
              <ul>
                <li><strong>Operational disruption:</strong> Adversaries plan targeted intrusions or disrupt contingencies during periods of geopolitical tension.</li>
                <li><strong>Legal or compliance failure:</strong> Retroactive exposure of protected data leads to long-term regulatory action and contractual liability.</li>
                <li><strong>Competitive disadvantage:</strong> GridCore loses preferred-vendor status and future contracts to quantum-ready competitors.</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_1163dd082af56f227c5eaa25ef0f7c257c8609133.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Recorded Future Named a Leader in the 2026 Gartner® Magic Quadrant™ for Cyberthreat Intelligence Technologies. And there’s more.]]></title>
            <link>https://www.recordedfuture.com/blog/recorded-future-named-a-leader</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/recorded-future-named-a-leader</guid>
            <pubDate>Wed, 06 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future shares exciting developments since being named a leader.]]></description>
            <content:encoded><![CDATA[
        <p>For security professionals evaluating threat intelligence vendors, the Gartner Magic Quadrant offers an indispensable perspective. Gartner analysts’ thorough and nuanced analysis cuts through the noise, making it easier for teams to understand each platform’s approach, strengths, and considerations—and helping them determine whether a particular vendor fits their organization’s unique needs.</p>
        <p>That’s why we’re honored to share that Gartner has named Recorded Future a Leader in the first-ever Magic Quadrant™ for Cyberthreat Intelligence Technologies. <a href="https://go.recordedfuture.com/2026GartnerMQ.html?utm_source=website&amp;utm_medium=article&amp;utm_campaign=fy26-global-gartnermq">This new report</a> evaluated 17 vendors in the space, providing a comprehensive look at the competitive landscape.</p>
        <p>“In our view, being recognized as a Leader means something specific to us: we feel it reflects our ability to help our customers with the outcomes they depend on. These include stopping threats pre-attack, running intelligence autonomously at a scale no human team can match, and making every security control they own more effective," said Colin Mahony, CEO, Recorded Future. “We believe this recognition reflects both the trust our customers place in us and the strength of the outcomes we help them achieve.”</p>
        <h2>A research methodology that prioritizes customer voice</h2>
        <p>A Gartner Magic Quadrant is a culmination of research in a specific market, giving you a wide-angle view of the relative positions of the market’s competitors. By applying a graphical treatment and a uniform set of evaluation criteria, a Magic Quadrant helps you quickly ascertain how well technology providers are executing their stated visions and how well they are performing against Gartner’s market view.</p>
        <p>For Recorded Future, this meant that Gartner analysts spoke directly with our customers about their real-world experiences—the challenges they face, how they use our Platform, and the outcomes they've realized. We feel their voices shaped our position in the Magic Quadrant, just as they’ve always shaped our product offerings and roadmap.</p>
        <p>The new Gartner report offers a snapshot of what the analysts heard from customers. We haven’t stopped working since then and there’s much to talk about.</p>
        <h2>There’s more… the next phase of threat intelligence</h2>
        <p>In conversations throughout 2025, our customers gave us their thoughts about product complexity, pricing models, and the challenges of scaling intelligence across their teams. As a result of their input, we’ve fundamentally changed how they can access and make the most of Recorded Future threat intelligence.</p>
        <p>Here are the highlights of our continued commitment to simplicity and innovation to provide better experiences for our customers in 2026:</p>
        <p><strong>1. Goodbye, modules. Hello, simplicity. Meet our four new solutions.</strong><br />Our <a href="https://www.recordedfuture.com/solutions-overview">four new solution areas</a> cover the four major attack surfaces—an organization’s systems, brand, supply chain, and payment methods:</p>
        <ul>
          <li><strong>Cyber Operations</strong>—This foundational solution empowers security teams with the intelligence to monitor and prioritize threats and vulnerabilities, get in-depth malware insights, triage alerts and detect threats, and stand up an intelligence-driven defense.</li>
          <li><strong>Digital Risk Protection</strong>—Also foundational, this solution allows teams to monitor malicious sites, code repositories, and the dark web to detect brand abuse, employee credential compromise, and other threats to digital trust.</li>
          <li><strong>Third-Party Risk</strong>—This solution enables teams to continuously assess supplier security posture with real-time intelligence, accurate risk ratings, vendor action plans, and more.</li>
          <li><strong>Payment Fraud</strong>—With this solution, teams can detect and prevent card-not-present fraud with intelligence that identifies compromised payment data before it's used.</li>
        </ul>
        <p>The solutions are built on a unified intelligence foundation to provide consistency, accuracy, and alignment around shared security outcomes. And they integrate with other security solutions like CrowdStrike Falcon and Google SecOps, bringing the benefits of Recorded Future intelligence and rich context directly into common SIEM and EDR workflows.</p>
        <p><strong>2. New pricing packages for less friction, more intelligence</strong><br />We’re offering the four solutions in <a href="https://www.recordedfuture.com/blog/recorded-future-solutions-packages">new pricing packages</a> designed to fit customer needs:</p>
        <ul>
          <li><strong>Simplicity</strong>—Customers can purchase one package instead of juggling multiple modules</li>
          <li><strong>End-to-end workflows</strong>—Packages cover full use cases, complete with the key capabilities to get the job done</li>
          <li><strong>Wider access</strong>—Higher tiers offer unlimited seats, so everyone now can be intelligence-led.</li>
        </ul>
        <p>In addition, integrations are included. Now your tools in the security stack—SIEM, SOAR, firewall, endpoint protection, ticketing system, and more—can leverage Recorded Future intelligence without integration fees or limitations.</p>
        <p><strong>3. Expansion into Latin America</strong><br />The threat landscape knows no geographical borders, and neither do we. We’ve expanded Recorded Future’s operations into Latin America, giving security teams in the region better access to the expertise and support they need to mount a successful proactive defense.</p>
        <p><strong>4. Autonomous Threat Operations for autonomous defense</strong><br />In February, we launched <a href="https://www.recordedfuture.com/products/autonomous-threat-operations">Autonomous Threat Operations</a> to help customers move from isolated threat intelligence insights and manual workflows to automated and continuous defensive actions across the entire security ecosystem. Complete with AI-powered, 24/7 autonomous threat hunting and multi-source correlation in the Intelligence Graph®.</p>
        <p>As we continue to build on our vision of moving from automated to autonomous operations, we’re developing Recorded Future AI and agentic experiences to help our customers reduce alert fatigue, save time on research, and run threat hunts faster so they can detect and defend at scale.</p>
        <h2>Explore the Gartner Magic Quadrant report today</h2>
        <p>We’re proud to be recognized by Gartner as a Leader in Cyberthreat Intelligence Technology, and we’ll continue innovating for our customers to help them mitigate risk and stay ahead of evolving threats.</p>
        <p><a href="https://go.recordedfuture.com/2026GartnerMQ.html?utm_source=website&amp;utm_medium=article&amp;utm_campaign=fy26-global-gartnermq">Get the report</a> to review Gartner analysis and see how Recorded Future fits your CTI program needs.</p>
        <p>____________________________________________________________________________________________________________________________________</p>
        <p>Gartner, Magic Quadrant for Cyberthreat Intelligence Technologies, By <a href="https://www.gartner.com/analyst/b9c908b87ba1">Jonathan Nunez</a>, <a href="https://www.gartner.com/analyst/b9c909b579a5">Carlos De Sola Caraballo</a>, <a href="https://www.gartner.com/analyst/b9cb03bf7ca6">Jaime Anderson</a>, 04 May 2026.</p>
        <p><em>Gartner and Magic Quadrant are trademarks of Gartner, Inc. and/or its affiliates.</em></p>
        <p><em>Gartner does not endorse any company, vendor, product or service depicted in its publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner publications consist of the opinions of Gartner’s business and technology insights organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this publication, including any warranties of merchantability or fitness for a particular purpose.</em></p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1a5c3484e52ab4160760d9e31ebcdb3ac05008a87.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Threat Activity Enablers: The Backbone of Today’s Threat Landscape]]></title>
            <link>https://www.recordedfuture.com/blog/threat-activity-enablers</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/threat-activity-enablers</guid>
            <pubDate>Wed, 06 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Behind every ransomware demand, botnet, or threat activity group is a server sitting in a data center.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>This article introduces threat activity enablers (TAEs), the infrastructure providers and networks that underpin modern cyber threats across both criminal and state-sponsored activity. These entities sustain operations by enabling resilient, high-risk infrastructure that persists despite sanctions, takedowns, and public exposure.</div>
          </div>
        </div>
        <p>Behind every ransomware demand, botnet, or threat activity group is a server sitting in a data center. While most legitimate hosting providers evict threat actors once identified, a specific class of providers does the opposite. Recorded Future<sup>®</sup> calls these providers threat activity enablers(TAEs).</p>
        <h2>What Is a Threat Activity Enabler?</h2>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1fed9a2196f01bb447c257ef0819ce6ecec676dec.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="2048" height="1908" />
            </div>
          </div>
          <div>
            <div>Figure 1: Overview of threat activity enablers’ patterns, ecosystem, and impact</div>
          </div>
        </div>
        <p>A threat activity enabler (TAE) is an individual, organization, or service provider that supports malicious cyber activity by providing infrastructure or services leveraged by threat actors. More commonly, this includes providers that lack a formal physical or virtual storefront, conduct business only via email or messaging platforms, and do not enforce know-your-customer (KYC) policies. It also includes hosting providers that selectively respond to abuse reports or law enforcement inquiries to maintain plausible deniability, as well as more traditional self-proclaimed “bulletproof” providers that openly ignore oversight or advertise non-cooperation.<br /><br />TAE networks serve as the backbone for ransomware groups, infostealer campaigns, botnets, and even state-sponsored threat actor operations. What distinguishes TAE networks is the sustained concentration of malicious infrastructure within their networks.</p>
        <h2>How TAEs Operate</h2>
        <p>TAEs are masters of obfuscation and are highly resilient, hiding behind layers of decoy companies to evade accountability. They use several core tactics:</p>
        <ul>
          <li><strong>Corporate Shell Games</strong>: They establish front companies across multiple jurisdictions to create legal distance between the infrastructure and the operators.</li>
          <li><strong>Strategic Resource Control</strong>: They often operate as local internet registries (LIRs). This gives them direct control over IP resources and autonomous systems (ASNs), allowing them to manipulate network resources at will.</li>
          <li><strong>Rapid Rebranding</strong>: When a network becomes too "hot" due to scrutiny, TAEs rapidly transfer IP address prefixes to a newly registered, clean-looking entity.</li>
        </ul>
        <h2>Identifying High-Risk TAE Networks</h2>
        <p>Recorded Future actively identifies high-risk TAE networks through its Network Threat Density List. These networks are ranked by their Threat Density Score, calculated from the concentration of validated malicious activity relative to the total number of IP address prefixes a network announces.</p>
        <p>This approach cuts through the noise to quickly expose infrastructure that is disproportionately associated with threat activity, a core characteristic of TAEs, allowing network defenders to prioritize the infrastructure most likely to pose material risk.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Chart" src="https://www.recordedfuture.com/media_16c51cd61c26920af1bcad502b85b34a3369920e2.png?width=750&amp;format=png&amp;optimize=medium" width="2048" height="1386" />
            </div>
          </div>
          <div>
            <div>Figure 2: High-risk suspected or confirmed TAE networks in 2025, ranked by Threat Density Score</div>
          </div>
        </div>
        <h2>From Insight to Action</h2>
        <p>Tracking TAE networks allows security teams to move from reacting to individual threats to proactively managing infrastructure risk. In practice, this means applying TAE intelligence across three core areas: prevention, detection, and exposure.</p>
        <h2>Operationalize TAE Intelligence</h2>
        <div>
          <div>
            <div><a href="/data/blog/threat-activity-blog-icon-card.json">https://main--2025recordedfuturewebsite--recorded-future-website.aem.page/data/blog/threat-activity-blog-icon-card.json</a></div>
          </div>
        </div>
        <p>Figure 3: Three steps for operationalizing TAE intelligence</p>
        <p>TAEs are persistent and continuously evolving, adapting quickly in response to sanctions, enforcement actions, and exposure. While their identities may change, their underlying infrastructure patterns often remain consistent.</p>
        <h2>The "metaspinner" Case Study</h2>
        <p>In April 2025, a TAE tracked by Recorded Future, Virtualine Technologies, shifted its IPv4 resources to a newly registered network that fraudulently impersonated a legitimate German software firm, <a href="https://www.recordedfuture.com/research/malicious-infrastructure-finds-stability-with-aurologic-gmbh">metaspinner net GmbH</a>. Because this provider’s historical infrastructure patterns were already being tracked, the newly created network was immediately identified as a front. Within weeks, this network became a primary distribution hub for malware families such as Latrodectus and AsyncRAT. When the operation was eventually exposed, Virtualine Technologies simply pivoted the infrastructure to a new identity within one of its existing autonomous systems to maintain its operations.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Chart" src="https://www.recordedfuture.com/media_1d882e5b2ce38b5df856f2ffebbe35125e3e77824.png?width=750&amp;format=png&amp;optimize=medium" width="2048" height="1386" />
            </div>
          </div>
          <div>
            <div>Figure 4: Validated malicious activity associated with Virtualine Technologies in 2025</div>
          </div>
        </div>
        <p>This case underscores the reality of TAE networks: while identities, ownership records, and corporate fronts may change, the underlying infrastructure and its associated risk persist, making continuous tracking essential to identifying and prioritizing the networks that will drive future threat activity, as demonstrated by Virtualine subsequently emerging as the highest-risk TAE network in 2025.</p>
        <h2>The Stark Industries Case Study</h2>
        <p>In May 2025, the European Union sanctioned UK-registered hosting provider Stark Industries Solutions and its executives for enabling Russian state-sponsored cyber operations. However, enforcement did not halt Stark Industries’ operations. In the weeks leading up to the sanctions announcement, Stark Industries began transferring IP resources, modifying RIPE registrations, and shifting infrastructure to affiliated entities.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_190a9bd2b2490f6e609299c7228f2bf256f70bfbc.png?width=750&amp;format=png&amp;optimize=medium" width="2048" height="829" />
            </div>
          </div>
          <div>
            <div>Figure 5: Timeline of Stark Industries-related events in 2025</div>
          </div>
        </div>
        <p>Despite the sanctions, the underlying infrastructure, routing relationships, and operational patterns remained traceable across these new fronts. Continuous monitoring of TAE ecosystems enables defenders to detect these pivots in near real time, revealing continuity beneath corporate rebrands and legal restructurings. This case underscores a broader reality: sanctions may change names and ownership records, but without infrastructure-level visibility, the enabling networks behind malicious activity often persist.</p>
        <h2>What This Means for Security Leaders</h2>
        <p>TAEs represent an ongoing challenge. While individual campaigns and threat actors may come and go, the infrastructure that supports them remains adaptive and deliberately resilient.</p>
        <p>For security leaders, this requires an additional shift from solely reacting to individual indicators to understanding and prioritizing the infrastructure that enables threat activity at scale. By identifying and tracking high-risk networks, organizations can reduce investigative noise, focus resources on the most impactful threats, and take proactive steps to limit exposure before attacks materialize.</p>
        <p>Ultimately, addressing TAEs is not just about detection; it’s also about disrupting the conditions that enable modern cyber threats to operate.</p>
        <h2>Questions You Should Be Asking</h2>
        <ul>
          <li>How much of your network communicates with high-risk infrastructure?</li>
          <li>Are you prioritizing alerts involving high-risk networks?</li>
          <li>Is TAE or ASN risk intelligence integrated into your detection and triage workflows to ensure the highest-risk activity is addressed first?</li>
          <li>Do any of your third-party providers rely on TAE-linked infrastructure?</li>
          <li>Do you have hidden exposure to TAE networks?</li>
          <li>Are your controls dynamically adjusting to infrastructure risk?</li>
          <li>Can you proactively restrict or challenge traffic to and from high-risk networks?</li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_10569a4d0a64470c8d18b5af323b45569f74f4659.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Hacking Embodied AI]]></title>
            <link>https://www.recordedfuture.com/research/hacking-embodied-ai</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/hacking-embodied-ai</guid>
            <pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Embodied AI, intelligent systems in physical forms such as humanoid and quadruped robots, is moving from spectacle to staffing plans.]]></description>
            <content:encoded><![CDATA[
        <h2>Summary</h2>
        <p><strong>Embodied AI has arrived.</strong>. Humanoid and quadruped robots are moving off factory floors and into everyday operations, military deployments, and critical infrastructure. Technological advances in large language models LLMs and robotics are enabling robots to perform complex tasks autonomously.</p>
        <p><strong>Security has not kept pace.</strong> Researchers have demonstrated that commercially available robots can be hijacked over Bluetooth, covertly exfiltrate audio, video, and spatial data to servers in China, and even infect neighboring robots wirelessly, forming physical botnets. If unaddressed, these security weaknesses are set to scale massively once humanoid robots are fully integrated into critical workflows.</p>
        <p><strong>The risks need to be taken extremely seriously.</strong> A robot should be treated less like a machine on the balance sheet and more like a cyber-physical endpoint with cameras, microphones, radios, cloud dependencies, and motors. That means tougher procurement, tighter network controls, continuous vulnerability monitoring, and a credible plan for operational continuity if a fleet has to be pulled offline.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Summary of Unitree G1 vulnerabilities, associated business risks" src="https://www.recordedfuture.com/media_1aa3ae8873074d3668f2fc7ff1af6da284b4aef6c.png?width=750&amp;format=png&amp;optimize=medium" width="1972" height="988" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>Summary of Unitree G1 vulnerabilities, associated business risks, mapped CVEs, and observed network activity (IPs and data exfiltration rates) (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Analysis</h2>
        <h3><strong>Market Drivers of Embodied AI Adoption</strong></h3>
        <p>Embodied AI, intelligent systems in physical forms such as humanoid and quadruped robots, is moving from spectacle to staffing plans.</p>
        <p>The shift is being driven as much by demographics as by technological progress. There are growing <a href="https://www.oecd.org/en/publications/oecd-employment-outlook-2025_194a947b-en/full-report/editorial-from-job-shortage-to-labour-shortage-the-new-challenge-of-population-ageing_77cf5ed3.html">reports</a> that the working-age population worldwide has begun to <a href="https://www.economist.com/leaders/2025/09/11/dont-panic-about-the-global-fertility-crash">decline</a>. China, an economic success story, has seen its population also <a href="https://edition.cnn.com/2026/02/13/china/china-population-robots-intl-hnk-dst">decline</a> again in 2025 as births hit a record low. These trends do not make large-scale automation inevitable, but they seriously strengthen the economic <a href="https://edition.cnn.com/2026/02/13/china/china-population-robots-intl-hnk-dst">case</a> for it in both corporate and government decision-making.</p>
        <p>The International Federation of Robotics <a href="https://ifr.org/ifr-press-releases/news/top-5-global-robotics-trends-2026">identifies</a> labor shortages, real-world testing of humanoid robots, and increasing attention to safety and cybersecurity as defining trends for 2026. Some early <a href="https://www.nytimes.com/2026/02/12/us/elliq-ai-robot-senior-companion.html">deployments</a> of embodied AI reinforce this trajectory. BMW <a href="https://www.bmwgroup.com/en/news/general/2026/humanoid-robot-in-leipzig.html">reports</a> that the Figure 02 humanoid robot has assisted in the production of more than 30,000 X3 vehicles, while GXO and Agility Robotics <a href="https://www.agilityrobotics.com/content/gxo-signs-industry-first-multi-year-agreement-with-agility-robotics">describe</a> their partnership (established in 2024) as “the first formal commercial deployment of humanoid robots.” In high-risk environments, Sellafield is <a href="https://www.gov.uk/government/case-studies/how-are-robot-dogs-helping-clean-up-sellafield">deploying</a> quadruped robots to reduce human exposure in nuclear decommissioning.</p>
        <p>Capital markets are also responding. Unitree filed for a <a href="https://www.reuters.com/world/asia-pacific/unitree-plans-shanghai-ipo-testing-interest-humanoid-robots-2026-03-20/">reported</a> $610 million initial public offering (IPO) in Shanghai in March 2026. Taken together, these signals suggest that robots are leaving pilot programs and becoming operational.</p>
        <p>That transition makes the security question immediate rather than theoretical.</p>
        <h3><strong>Expanding Attack Surface in Embodied AI Systems</strong></h3>
        <p>Unlike traditional IT assets, embodied AI systems combine multiple high-risk components in a single platform: cameras, microphones, sensors, wireless radios, cloud connectivity, and physical actuation. This convergence creates a broad and under-secured attack surface.</p>
        <p>A compromised robot can exfiltrate sensitive environmental and operational data, provide persistent remote access to internal networks, and interact physically with its environment, potentially causing unintended physical effects. This elevates robots from conventional endpoints to cyber-physical systems with both digital and real-world consequences.</p>
        <p>The risk is compounded by architectural choices. Many platforms rely on cloud-dependent telemetry, wireless provisioning interfaces, and centralized control mechanisms. These design decisions create multiple entry points for attackers and increase the likelihood of compromise across entire fleets of embodied AI systems.</p>
        <h3><em><strong>Demonstrated Vulnerabilities and Exploits</strong></em></h3>
        <p>The risks are no longer theoretical. Documented vulnerabilities show that commercially available robots can be compromised with relative ease. Unlike traditional cyber threats, which mostly affect the digital world, exploiting robots enables attackers to manipulate the physical world, maximizing the potential for harm.</p>
        <p>In 2025, <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-2894"></a>researchers discovered an undocumented <a href="https://nvd.nist.gov/vuln/detail/CVE-2025-2894">backdoor</a> in Unitree’s Go1 quadruped robot that enabled remote access via the CloudSail service. Axios <a href="https://www.axios.com/2025/04/01/threat-spotlight-backdoor-in-chinese-robots-future-of-cybersecurity">reported</a> that an exposed web application programming interface (API) could allow attackers to locate devices globally and, if a robot was online, view live camera feeds without authentication. Where default credentials remained unchanged, full device control was possible. Whether described as a backdoor or a design failure, the implication is the same: robots may be <a href="https://go.censys.com/rs/120-HWT-117/images/2024SOTIR.pdf">reachable</a> in ways operators do not anticipate, just like any other Internet of Things (IoT) device.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Summary of vulnerabilities affecting the Unitree Go1 robot with intelligence card insights" src="https://www.recordedfuture.com/media_10c6d2ab723f9be0642a77952e5837e537162dc36.png?width=750&amp;format=png&amp;optimize=medium" width="1988" height="666" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Summary of vulnerabilities affecting the Unitree Go1 robot, with Intelligence Card insights from the Recorded Future Intelligence Operations Platform (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Further research <a href="https://arxiv.org/pdf/2509.14139">disclosed</a> a critical vulnerability in the Bluetooth Low Energy and Wi-Fi provisioning interface used by multiple Unitree models, including the Go2, B2, G1, R1, and H1 robots. According to both the <a href="https://github.com/Bin4ry/UniPwn">UniPwn research</a> and <a href="https://spectrum.ieee.org/unitree-robot-exploit">IEEE Spectrum</a>, the flaw combined hard-coded cryptographic keys, trivial authentication bypass, and command injection in the Wi-Fi setup process. An attacker within radio range could obtain root-level access without physical contact, giving them control over the robot.</p>
        <p>Because the exploit propagates wirelessly, a single compromised device can enable lateral movement across nearby robots. This creates a fleet-level compromise scenario in which multiple units can be controlled simultaneously. The result resembles a physical botnet capable of both digital and physical actions.</p>
        <p>Surveillance risks are equally significant. Researchers <a href="https://medium.com/@creed_1732/the-unitree-g1-security-crisis-explains-how-a-humanoid-robot-became-a-spy-and-cyber-weapon-439180135ba1">wrote</a> that the Unitree G1 robot continuously exfiltrated multimodal sensor and service-state telemetry every 300 seconds without the operator’s knowledge. This included streaming data to external servers, potentially including audio, video, and spatial mapping. A robot operating inside a plant or laboratory may therefore be mapping the environment in real time.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Unitree G1 quietly transmitting audio, video and sensor data" src="https://www.recordedfuture.com/media_15d15fd08649b1406a5b4df4e3a993de07f8d7cf2.png?width=750&amp;format=png&amp;optimize=medium" width="1962" height="902" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3:</strong></em> <em>Researchers</em> <em><a href="https://web.archive.org/web/20250927205104/https://www.zmescience.com/science/news-science/cybersecurity-experts-say-these-humanoid-robots-secretly-send-data-to-china-and-let-hackers-take-over-your-network/">found</a></em> <em>Unitree’s G1 quietly transmitting audio, video, and sensor data to the IP address (43[.]175[.]229[.]18) without user awareness (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>The attack surface extends beyond firmware and networking layers. Researchers <a href="https://www.yicaiglobal.com/news/chinese-cybersecurity-expert-hacks-control-system-of-unitrees-humanoid-robot-in-one-minute">showed</a> they could take control of a Unitree humanoid in about a minute, bypass its normal controller, and trigger physical actions. Demonstrations at GEEKCon in Shanghai <a href="https://interestingengineering.com/ai-robotics/security-flaw-could-allow-hackers-control-robots">indicated</a> that both voice commands and short-range wireless exploits could hijack robots and propagate attacks to nearby units, including those not actively in use.</p>
        <p>At the software layer, embodied AI systems introduce <a href="https://www.universityofcalifornia.edu/news/misleading-text-physical-world-can-hijack-ai-enabled-robots">additional</a> risks due to their reliance on large vision-language models. Researchers <a href="https://arxiv.org/abs/2510.00181">demonstrated</a> that physical-world text can influence system behavior, as injected visual prompts were shown to <a href="https://www.universityofcalifornia.edu/news/misleading-text-physical-world-can-hijack-ai-enabled-robots">steer</a> autonomous driving, drone landing, and tracking tasks without compromising the underlying software. This would enable threat actors to take control of a self-driving car or turn a drone into their own surveillance feed by embedding a visual prompt in the environment, such as <a href="https://thehackernews.com/2017/08/self-driving-car-hacking.html">hiding</a> a message on a stop sign.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Chinese robotic systems demonstrated during military training" src="https://www.recordedfuture.com/media_1e9fd27d1aeb85db2aab9347d688949b559683e3b.png?width=750&amp;format=png&amp;optimize=medium" width="1292" height="602" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>Chinese robotic systems demonstrated during military training exercises (left) (Source:</em> <em><a href="https://youtu.be/3m3iUHplvQE?si=yQYNuXsPDW7y6cxn">ABC YouTube</a>); Concept rendering of the Atlas 2.0 robot operating in a next-generation factory environment (right) (Source:</em> <em><a href="https://www.youtube.com/watch?v=rrUHZKlrxms">Boston Dynamics YouTube</a>)</em></div>
          </div>
        </div>
        <h3><em><strong>Systemic and Operational Risk Implications</strong></em></h3>
        <p>The implications extend beyond individual devices to organizational and systemic risk. Embodied AI systems are already being deployed in environments where compromise has consequences beyond data loss. Manipulation or malfunction of robots during critical operations would have outsized economic or public safety consequences. Militaries are also experimenting with robotic systems (see <strong>Figure 4</strong>).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Droid TW 12.7 machine gun drone" src="https://www.recordedfuture.com/media_1f75bf259dda7b9c0821f98385522c9836e7e503b.png?width=750&amp;format=png&amp;optimize=medium" width="1136" height="1092" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 5:</strong></em> <em>Droid TW 12.7 machine gun drone, deployed by Ukrainian forces to capture Russian positions without ground troops (Source:</em> <em><a href="https://www.telegraph.co.uk/world-news/2026/04/14/ukraine-forces-russians-to-surrender-using-only-robots/">The Telegraph</a>)</em></div>
          </div>
        </div>
        <p>In 2024, the Golden Dragon exercise between Cambodia and China <a href="https://apnews.com/article/01090258ee039fa29db09aa59a5ba91b">featured</a> robot dogs among the systems on display. Meanwhile, in the US, politicians have begun <a href="https://www.fdd.org/analysis/2026/03/27/as-chinese-robotics-industry-surges-senate-considers-limited-federal-procurement-ban/">pushing</a> for Unitree to be designated as a federal supply-chain risk, reflecting national security concerns about commercial robotics platforms. This is a very similar move to Poland’s <a href="https://apnews.com/article/poland-army-chinese-vehicle-ban-spying-data-20bf62e4eeb5d809f7b6dea34662550f">ban</a> on sensor-rich vehicles accessing military sites to limit surveillance risk. Ukraine has successfully <a href="http://bbc.com/news/articles/c62662gzlp8o">deployed</a> ground-based robots and drones in combat operations, marking a significant shift in modern warfare. In a landmark operation in April 2026, Ukrainian forces <a href="https://www.telegraph.co.uk/world-news/2026/04/14/ukraine-forces-russians-to-surrender-using-only-robots/">captured</a> a Russian position using only unmanned systems — the first recorded instance of a robot-only assault in the conflict.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Flow Chart" src="https://www.recordedfuture.com/media_1b10c93a859048bb11894c72a1e477fc54448b962.png?width=750&amp;format=png&amp;optimize=medium" width="1300" height="394" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 6:</strong></em> <em>A single vulnerability can simultaneously produce operational, data, safety, and strategic risks (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>As adoption scales, these risks become interconnected. A vulnerability affecting one platform or vendor could propagate across fleets, sites, or sectors, creating systemic exposure.</p>
        <p>At the same time, the pace of commercial development is outstripping regulatory oversight. Bank of America <a href="https://www.theregister.com/2025/12/09/humanoid_robot_security/">estimates</a> that as many as three billion humanoid robots could be in operation by 2060. This convergence of demographic pressure, advancing AI capabilities, and falling production costs suggests that large-scale human-machine coexistence is highly <a href="https://www.recordedfuture.com/research/future-humanoid-robotics">probable</a>.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Summary of the factors fueling growth in robotics production" src="https://www.recordedfuture.com/media_1b9f3585e3ed774b03686576399efbfd92c89cc5a.png?width=750&amp;format=png&amp;optimize=medium" width="1332" height="476" />
            </div>
          </div>
          <div>
            <div>
              <p><em><strong>Figure 7:</strong></em> <em>Summary of the factors fueling growth in robotics production, illustrated by</em> <em><a href="https://institute.bankofamerica.com/content/dam/transformation/humanoid-robots.pdf">Bank of America data</a></em></p>
              <p><em>(Source: Recorded Future)</em></p>
            </div>
          </div>
        </div>
        <p>Securing embodied AI systems is therefore not a peripheral technical issue. It is a strategic requirement that must be addressed before widespread deployment locks in insecure architectures at scale.</p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_165d0d375ab46bd1deb3705cf840ece4d870213cb.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[The Iran War: What You Need to Know]]></title>
            <link>https://www.recordedfuture.com/blog/the-iran-war-what-you-need-to-know</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/the-iran-war-what-you-need-to-know</guid>
            <pubDate>Fri, 01 May 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group tracks the cyber, physical, and geopolitical components of the US-Israeli strikes on Iran — with continuously updated threat analysis and scenarios.]]></description>
            <content:encoded><![CDATA[
        <p><em>Last updated: 1 May 2026 at 1500 GMT</em></p>
        <div>
          <div>
            <div>
              <p><strong>New from Insikt Group: Iran War — Future Scenarios and Business Implications</strong></p>
              <p>Insikt Group has published a dedicated Cone of Plausibility analysis examining how the Iran conflict could evolve over the next 6–12 months — from a fragile ceasefire baseline to regional war, regime collapse, and nuclear crisis. Each scenario includes business implications and 0–90 day priority actions.<a href="https://www.recordedfuture.com"></a></p>
            </div>
          </div>
          <div>
            <div><a href="https://www.recordedfuture.com/research/iran-war-future-scenarios">Read the full analysis.</a></div>
          </div>
        </div>
        <p>This report is updated as the situation evolves across the geopolitical, cyber, and influence operations dimensions of this conflict. It will be of greatest interest to organizations in the US, Israel, and Gulf states concerned about targeting by Iranian state-sponsored or state-aligned threat actors, as well as those with exposure to energy markets, maritime shipping, and critical infrastructure potentially impacted by regional escalation.</p>
        <h3>The Latest Updates</h3>
        <h3>Geopolitical Landscape</h3>
        <ul>
          <li><strong>Iran’s hardliners are driving strategic deadlock, blockade resilience, and Strait closure.</strong> Insikt Group assesses Iran’s calculus is very likely shaped by IRGC influence and hardliner dominance: Supreme Leader Khamenei’s April 30 <a href="https://www.reuters.com/world/middle-east/irans-supreme-leader-mojtaba-khamenei-says-new-phase-taking-shape-gulf-strait-2026-04-30/">statement</a> frames Iranian control of the Strait of Hormuz as a post-American regional order, chief negotiator Ghalibaf has <a href="https://www.jns.org/news/world/ghalibaf-said-to-step-down-as-irans-top-negotiator-amid-internal-rifts">reportedly</a> resigned after a reprimand for raising nuclear issues in talks, and Iran’s public position has converged on a single precondition — the US must lift its naval blockade before negotiations can resume.</li>
          <li><strong>The US blockade has cut Iranian oil exports by ~70% but has not achieved its strategic objectives.</strong> Iran faces critical oil storage constraints — Bloomberg reported 22 days or less of unused capacity as of April 27 — yet Insikt Group assesses Iran can very likely survive the current pressure level, and the full financial blow will lag three to four months as ~130 million barrels already loaded before the blockade remain in transit.</li>
          <li><strong>Maritime standoff deepens as Iran seizes vessels, lays additional mines, and ceasefire talks stall.</strong> Following the US seizure of the Touska, the IRGC seized the MSC Francesca and Epaminondes and fired on a third vessel transiting the Strait; the IRGC reportedly dropped additional mines during the final week of April, and the Pentagon assesses mine-clearing could take up to six months after a formal end to hostilities.</li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1639b94af082849a6929a572441c5012d6e2eb22d.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Risk Scenarios for the US’s Strategic Pivot]]></title>
            <link>https://www.recordedfuture.com/research/us-strategic-pivot</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/us-strategic-pivot</guid>
            <pubDate>Thu, 30 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[The United States (US) is shifting toward a more force-driven security strategy primarily relying on military operations and economic pressure to counter transnational criminal organizations and limit Chinese, Russian, and Iranian influence in the Western Hemisphere.]]></description>
            <content:encoded><![CDATA[
        <h2>Summary</h2>
        <p>The United States (US) is shifting toward a more force-driven security strategy primarily relying on military operations and economic pressure to counter transnational criminal organizations and limit Chinese, Russian, and Iranian influence in the Western Hemisphere.</p>
        <p>Regional outcomes diverge across three core scenarios:</p>
        <ul>
          <li>US-aligned authoritarian cooperation with fragile stability</li>
          <li>Political fragmentation enabling criminal expansion and governance breakdown</li>
          <li>A strategic realignment toward BRICS that reduces US influence and increases great power competition</li>
        </ul>
        <p>Each scenario increases the risks of political instability, regulatory fragmentation, and cyber threats, including increased surveillance, cybercrime, and targeting of critical infrastructure and multinational businesses.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Chart of possible scenarios resulting from the US’s strategic pivot to Western Hemisphere security" src="https://www.recordedfuture.com/media_184d5d3f6d8f667e949ae56dfe34d14ab26453183.png?width=750&amp;format=png&amp;optimize=medium" width="1132" height="634" />
            </div>
          </div>
          <div>
            <div>
              <p><em><strong>Figure 1:</strong></em> <em>Overview of possible scenarios resulting from the US’s strategic pivot to Western Hemisphere security</em></p>
              <p><em>(Source: Recorded Future)</em></p>
            </div>
          </div>
        </div>
        <h2>Analysis</h2>
        <p>The US <a href="https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf">2025 National Security Strategy</a> formalized a shift toward hemispheric priorities and narrower strategic objectives. This shift had been building throughout President Donald Trump’s first term:</p>
        <ul>
          <li>January 2025: An <a href="http://whitehouse.gov/presidential-actions/2025/01/designating-cartels-and-other-organizations-as-foreign-terrorist-organizations-and-specially-designated-global-terrorists/">executive order</a> formally designates cartels as foreign terrorist organizations.</li>
          <li>August 2025: The president signed a <a href="https://www.nytimes.com/2025/08/08/us/trump-military-drug-cartels.html">classified order</a> directing military action against cartels beyond traditional law-enforcement frameworks.</li>
          <li>September 2025: US forces carried out the first strike on alleged drug-trafficking vessels. Since then, more than <a href="https://www.nytimes.com/article/trump-drug-boat-strikes-timeline.html">two dozen</a> kinetic strikes in the Caribbean and Eastern Pacific have resulted in over 100 fatalities.</li>
          <li>December 2025: The US begins <a href="https://www.bloomberg.com/news/newsletters/2025-12-17/trump-turns-up-the-heat-on-venezuela-s-maduro-with-oil-blockade">seizing</a> oil tankers accused of sanctions evasion.</li>
          <li>January 2026: The US launches a special <a href="https://www.brookings.edu/articles/making-sense-of-the-us-military-operation-in-venezuela/">operation</a> to capture and extract Venezuelan President Nicolás Maduro to face drug trafficking charges in court.</li>
          <li>March 2026: The US <a href="https://www.state.gov/releases/office-of-the-spokesperson/2026/03/the-united-states-to-host-the-shield-of-the-americas-summit">launches</a> the “Shield of the Americas” initiative, intended to counter drug trafficking, transnational criminal networks, and illegal migration in the Western Hemisphere. In an address to Congress two weeks later, the commander of US Southern Command reinforced a greater military role in countering foreign terrorist organizations (FTOs) and managing other security priorities in the region.</li>
        </ul>
        <p>Taken together, these moves suggest a shift from a law-enforcement-led regional security model toward more overt coercion driven by military intervention.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="US military activity in Latin America has increased significantly since the August 2025 order directing chart" src="https://www.recordedfuture.com/media_18d2414b9b576da747707cc8bd5a0864c3d6cd795.png?width=750&amp;format=png&amp;optimize=medium" width="2048" height="976" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>US military activity in Latin America has increased significantly since the August 2025 order directing action against cartels (Source:</em> Recorded Future<em>)</em></div>
          </div>
        </div>
        <p>At a strategic level, US objectives remain centered on limiting transnational criminal activity and countering external competitors. Transnational criminal organizations are framed as a primary threat vector due to their role in narcotics trafficking and financial crime. China’s growing economic presence, anchored in <a href="https://www.cfr.org/backgrounders/china-influence-latin-america-argentina-brazil-venezuela-security-energy-bri">trade</a> and <a href="https://www.cfr.org/backgrounders/chinas-massive-belt-and-road-initiative">Belt and Road Initiative</a> (BRI) infrastructure, is also seen as a threat to US interests. Russia and Iran maintain more targeted but persistent footholds, particularly through surveillance coordination in Nicaragua, Cuba, and Venezuela. US policy is oriented toward constraining adversary influence while reinforcing its own economic and security partnerships. The US is pursuing these objectives through a combination of expanded military operations, law enforcement activity, and coercive economic measures, including tariffs and sanctions tied to political alignment.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="US naval and air assets have been deployed to the Caribbean" src="https://www.recordedfuture.com/media_1ab5267640450aa0511cee30072624e50e2d4b14d.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1143" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3:</strong></em> <em>US naval and air assets have been deployed to the Caribbean to counter drug trafficking (Source:</em> <em><a href="https://www.newsweek.com/list-us-navy-ships-venezuela-trump-maduro-2123734">Newsweek</a>)</em></div>
          </div>
        </div>
        <h2>Scenarios</h2>
        <p>The shift toward prioritizing US influence in the Western Hemisphere over other national security objectives will likely reshape the regional risk landscape. To assess the potential medium-term outcomes, Recorded Future identified key drivers and established baseline assumptions that underpin scenario development.</p>
        <div>
          <div>
            <div>
              <h3>Drivers</h3>
            </div>
            <div>
              <h3>Assumptions</h3>
            </div>
          </div>
          <div>
            <div>
              <p>● Increased US military interventions against alleged transnational criminal organizations TCOs and enablers</p>
              <p>● Expanding role of TCOs and armed groups in regional instability</p>
              <p>● Existing security cooperation between the US and Latin America LATAM governments</p>
              <p>● Growing Chinese economic and infrastructure investment in LATAM</p>
              <p>● Historical and ongoing relationships between Russia, Iran, and LATAM (notably Venezuela, Cuba, and Nicaragua)</p>
              <p>● Increased adoption of commercial spyware and surveillance tools by LATAM governments</p>
            </div>
            <div>
              <p>● US policy will prioritize countering malign influence and security threats within the Western Hemisphere over other regions</p>
              <p>● Policy direction will remain sensitive to domestic political cycles in both the US and Latin America, creating potential for shifts following elections</p>
              <p>● The US will favor limited-duration, high-impact interventions over prolonged military or large-scale nation-building efforts</p>
              <p>● China will continue to expand its economic and diplomatic engagement in Latin America, positioning itself as an alternative partner (instead of the US</p>
              <p>● Russia and Iran will seek to exploit opportunities to challenge US influence in the region, particularly through relationships with anti-US governments</p>
              <p>● Regional governments will continue to leverage emerging surveillance and cyber capabilities to address internal security challenges</p>
            </div>
          </div>
        </div>
        <p>The following scenarios explore potential outcomes as the US reorients its security strategy toward the Western Hemisphere:</p>
        <h3>Scenario 1: Initial Authoritarian Stability</h3>
        <p>In this scenario, the US successfully asserts influence over historically adversarial authoritarian regimes, notably Venezuela and Cuba. These governments pivot toward cooperation with the US on trade, energy, and security, while maintaining repressive political systems domestically. US intervention has already reshaped Venezuela’s leadership and opened pathways for Western energy investment, while Cuba has responded to continued pressure by showing openness to economic reforms. Meanwhile, democracies like Colombia and Ecuador may adopt more coercive internal security postures, particularly in states facing cartel violence, in response to US pressure.</p>
        <p>The US takes more aggressive measures to deter and counter non-Western infrastructure investments, leading to a relative diminishment in the influence of China and Russia as US engagement deepens. However, both powers will likely retain significant hemispheric influence and may pursue limited, asymmetric responses rather than direct confrontation.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="interim Venezuelan president Delcy Rodriguez" src="https://www.recordedfuture.com/media_111b2e95859bd404752f47f5313e6d94a6f625b18.png?width=750&amp;format=png&amp;optimize=medium" width="478" height="718" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>US President Trump has praised interim Venezuelan president Delcy Rodriguez (Image source:</em> <em><a href="https://www.lemonde.fr/en/international/article/2026/03/05/trump-and-venezuela-s-rodriguez-exchange-lavish-praise-amid-oil-partnership_6751110_4.html">Le Mond</a>e)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <h3>Organizational Risks</h3>
            </div>
            <div>
              <h3>Cyber Risks</h3>
            </div>
          </div>
          <div>
            <div>
              <p>● <strong>Operational disruption:</strong> This outcome may appear stable in the short term but is likely structurally fragile, as it depends on sustained coercive pressure and political alignment. Electoral changes will almost certainly bring in a new set of priorities and approaches to the region. This will create an operating environment at high risk of disruption.</p>
              <p>● <strong>Reputational damage:</strong> Companies seen as being too close to one political bloc or regime may face reputational damage as policies reverse.</p>
            </div>
            <div>
              <p>● <strong>Chinese and Russian state-sponsored actors</strong> will likely increase cyber operations against expanding US assets in the region, particularly in telecommunications and energy, to gather information or conduct strategic, limited disruption.</p>
              <p>● <strong>Surveillance, including the use of commercial spyware</strong>, will almost certainly increase as states escalate law enforcement operations against cartels and non-state armed groups.</p>
            </div>
          </div>
        </div>
        <h3>Scenario 2: Fragmentation and Criminal Expansion</h3>
        <p>US intervention produces a political backlash, weakening democracies and fueling the collapse of transitional regimes. Inconsistent or heavy-handed military actions against alleged criminals increase public outrage, leading to electoral turnover and instability. As governments escalate repression to maintain control, resistance movements and localized violence intensify, further eroding state authority. This dynamic creates governance vacuums that strengthen TCOs, particularly in border regions. In this environment, cartels and armed groups re-emerge as dominant power brokers, reversing gains in regional security and leading to a resurgence in criminal activity and violence.</p>
        <div>
          <div>
            <div>
              <h3>Organizational Risks</h3>
            </div>
            <div>
              <h3>Cyber Risks</h3>
            </div>
          </div>
          <div>
            <div>
              <p><strong>● Operational disruption:</strong> Violence and corruption will likely increase instability. Further, regime collapse in Cuba or Venezuela would provide a haven for criminal groups.</p>
              <p><strong>● Financial fraud:</strong> Expanding criminal influence increases the likelihood of cyber or violent crimes, such as fraud or extortion.</p>
            </div>
            <div>
              <p><strong>● Industrial-scale cybercrime operations,</strong> similar to the <a href="https://www.cnn.com/2026/01/04/asia/china-myanmar-scam-crime-families-intl-hnk-dst">scam call centers</a> in under-governed regions of Myanmar, may increase under cartel control. This would scale up <a href="https://home.treasury.gov/news/press-releases/sb0400">fraud</a>, cryptocurrency theft, and money laundering operations, likely targeting Spanish-, Portuguese-, and English-speaking populations.</p>
              <p><strong>● Internet blackouts</strong> are used as a weapon by governments struggling to maintain control, causing instability in communications and other infrastructure.</p>
            </div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Chancay “megaport” in Chancay, Peru" src="https://www.recordedfuture.com/media_1d79f6835c4ded2959094ccfc0073104712bc799d.png?width=750&amp;format=png&amp;optimize=medium" width="960" height="600" />
            </div>
          </div>
          <div>
            <div>
              <p><em><strong>Figure 5:</strong></em> <em>Chancay “megaport” in Chancay, Peru, is funded under China’s Belt and Road Initiative</em></p>
              <p><em>(Image source:</em> <em><a href="https://chinaglobalsouth.com/analysis/belt-road-initiative-record-2025/">China’s Global South Project)</a></em></p>
            </div>
          </div>
        </div>
        <h3>Scenario 3: Accelerated Pivot to China</h3>
        <p>The US’s overreliance on military solutions at the expense of soft power enables China to position itself as an appealing alternative partner by offering positive incentives and stable, long-term policy-making. As a result, LATAM governments across the ideological spectrum quietly accelerate their pivot toward China, building on existing trade and investment ties. As this trend continues, LATAM governments feel emboldened to adopt more overt mechanisms to resist US influence, including legal challenges to military operations and regulations targeting US companies. Both China and Russia are able to increase their economic footprint and political influence in the region, especially if the US becomes less willing to maintain a consistent security presence.</p>
        <div>
          <div>
            <div>
              <h3>Organizational Risks</h3>
            </div>
            <div>
              <h3>Cyber Risks</h3>
            </div>
          </div>
          <div>
            <div>
              <p><strong>● Competitive disadvantage:</strong> Expanding Chinese and Russian economic influence may displace US companies in key sectors such as energy, agriculture, telecommunications, and infrastructure, reducing market access and long-term competitiveness</p>
              <p><strong>● Legal and compliance failure:</strong> A more hostile regulatory environment could limit operations or force costly restructuring</p>
            </div>
            <div>
              <p><strong>● China and Russia gain a greater surveillance foothold,</strong> taking advantage of LATAM countriesʼ construction of telecommunications and “<a href="https://www.ifri.org/sites/default/files/migrated_files/documents/atoms/files/ekman_smart_cities_battleground.pdf">Smart Cities</a>ˮ infrastructure using companies like Huawei, as well as the use of Russian digital <a href="https://app.recordedfuture.com/portal/research/insikt/doc:2Oyt8T">surveillance</a> technology, to ensure visibility.</p>
              <p><strong>● Increased data sovereignty and related technology regulations</strong> can disrupt regional and global business operations, particularly for cloud services, financial systems, and multinational supply chains.</p>
            </div>
          </div>
        </div>
        <h2>Outlook</h2>
        <p>The scenarios are not mutually exclusive: multiple outcomes can play out in different countries or regions across Latin America. Below are key indicators to monitor to anticipate which outcome is more likely to emerge:</p>
        <ul>
          <li><strong>Election Outcomes:</strong> Colombia, Peru, and Brazil all have elections in the next year; a change in leadership may reflect popular dissatisfaction with the current government’s foreign policy, precipitating a policy shift. Furthermore, a decisive Republican defeat in the US midterms may reduce appetite for foreign intervention, leading to inconsistent policy.</li>
          <li><strong>US Intervention in Cuba:</strong> The US government is strongly signaling its intention to replace or significantly reform Cuba’s long-standing Communist regime. The success of the operation and the willingness of the US to back a transitional or reform government will determine which scenario described above plays out.</li>
          <li><strong>LATAM Security Cooperations:</strong> Criminal groups and militias thrive in contested or under-governed regions, such as along borders. Look for signed agreements and joint operations as signs of cooperation — or the lack thereof signalling potential breakdown in security coordination and a greater likelihood of criminal expansion.</li>
          <li><strong>The China Alternative:</strong> While China is likely to want to avoid direct confrontation over influence in the Western Hemisphere, the CCP may seek to offer more positive incentives to increase its economic footprint in the region, such as continued investments in ports, telecommunications, and other critical infrastructure.</li>
          <li><strong>The War in Iran:</strong> Even though it’s happening on the other side of the world, the Iran war is likely to shape how the US pursues military operations in the Western Hemisphere. Battlefield setbacks could decrease appetite for military intervention, or energy security pressures could increase the imperative to ensure influence.</li>
        </ul>
        <h2>Mitigations</h2>
        <ul>
          <li><strong>Strengthen cyber resilience and third-party risk management:</strong> Enhance monitoring and defenses for critical infrastructure, telecommunications, and cloud environments. Use Recorded Future’s <strong>Geopolitical Intelligence</strong> module to understand the surveillance risk in countries where you operate. Conduct regular assessments of vendors and partners to reduce exposure to espionage, surveillance, and cybercrime.</li>
          <li><strong>Prepare for regulatory fragmentation and data localization requirements:</strong> Develop flexible compliance frameworks that can adapt to diverging data sovereignty laws, sanctions regimes, and trade restrictions. This includes establishing localized data storage where necessary and maintaining legal contingency plans for rapid policy changes.</li>
          <li><strong>Enhance crisis response and continuity planning:</strong> Build scenario-based contingency plans for political instability, violence, or infrastructure disruption (such as internet outages or supply-chain interruptions), which are routinely monitored in the Geopolitical Intelligence module. Contingency planning should include evacuation preparation, alternative logistics routes, and redundant communications systems to ensure operational continuity across volatile environments.</li>
        </ul>
        <h2>Further Reading</h2>
        <div>
          <div>
            <div>
              <h3>Source</h3>
            </div>
            <div>
              <h3>Title</h3>
            </div>
          </div>
          <div>
            <div><strong>Insikt Group</strong></div>
            <div><a href="https://www.recordedfuture.com/research/latin-america-and-the-caribbean-cybercrime-landscape">Latin America and the Caribbean Cybercrime Landscape</a></div>
          </div>
          <div>
            <div><strong>Insikt Group</strong></div>
            <div><a href="https://www.recordedfuture.com/research/understanding-and-anticipating-venezuelan-government-actions">Understanding and Anticipating Venezuelan Government Actions</a></div>
          </div>
          <div>
            <div><strong>Recorded Future Blog</strong></div>
            <div><a href="https://www.recordedfuture.com/blog/latin-america-cybersecurity-turning-point">Latin America’s Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence</a></div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_131592ae03a082c06f2e749215e98832923fd7b5d.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Building with AI: Here's What No Briefing Will Tell You]]></title>
            <link>https://www.recordedfuture.com/blog/building-with-ai</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/building-with-ai</guid>
            <pubDate>Thu, 30 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[What building with AI for three months revealed about four leadership blind spots executives can't afford to ignore: the comprehension gap, eroding competitive moats, deployment complexity, and what "senior" really means now.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <ul>
                <li>Executives making AI decisions without hands-on building experience have a comprehension gap that no briefing can close.</li>
                <li>AI is rapidly eroding most traditional competitive moats, and proprietary data's real value now comes down to how long it would take a competitor to reconstruct it.</li>
                <li>As AI equalizes development speed, the most valuable engineers are those with sharp judgment and companies need to actively protect the foundational skills that make that judgment possible</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_16b1d84f79c0e64645df026a3bf75634a68678460.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[The Money Mule Solution: What Every Scam Has in Common]]></title>
            <link>https://www.recordedfuture.com/blog/money-mule-solution</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/money-mule-solution</guid>
            <pubDate>Tue, 28 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Learn how mule account intelligence — not tactic-tracking — is the most effective lever for preventing APP fraud before funds move.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <ul>
                <li><strong>Scams are a $450B–$1T global problem</strong>, and unlike card fraud, they don't require a breach; just convincing a victim to send money themselves.</li>
                <li><strong>The mule account is the most stable target</strong>: every scam needs an exit point, and intelligence gathered before a transaction occurs is more actionable than behavioral monitoring after the fact.</li>
                <li><strong>CYBERA's approach uses agentic personas</strong> to engage active scammers and extract verified mule account details, confirmed intelligence, not probabilistic scoring.</li>
                <li><strong>Regulatory pressure is accelerating</strong>: the UK already mandates APP fraud reimbursement, and the US, Canada, and Australia are following, raising the stakes for institutions that don't act proactively.</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_163af009dcce942c2656525fa83eab645571db892.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Lazarus Doesn't Need AGI]]></title>
            <link>https://www.recordedfuture.com/blog/lazarus-does-not-need-agi</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/lazarus-does-not-need-agi</guid>
            <pubDate>Tue, 28 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore the 2026 Claude Mythos breach, supply chain risks, and the $2B+ crypto theft pipeline.]]></description>
            <content:encoded><![CDATA[
        <p>Last week’s <a href="https://www.bloomberg.com/news/articles/2026-04-21/anthropic-s-mythos-model-is-being-accessed-by-unauthorized-users"></a><a href="https://www.bloomberg.com/news/articles/2026-04-21/anthropic-s-mythos-model-is-being-accessed-by-unauthorized-users">reporting</a> on unauthorized access to Claude Mythos reads as an AI security story. It is also, structurally, a North Korea (DPRK) story. Even if the current suspects turn out to be Discord hobbyists.</p>
        <p>Mythos was meant to be contained. Within hours of the public <a href="https://www.anthropic.com/project/glasswing"></a><a href="https://www.anthropic.com/project/glasswing">Project Glasswing announcement</a>, a third-party contractor environment became the access vector. Not because Anthropic did something wrong. Because controlled release, at the scale modern enterprise software operates, is a goal rather than a guarantee.</p>
        <p>The interesting question isn’t who got in this time. It’s who gets in next, and their economics.</p>
        <h2>What happened?</h2>
        <p>The group accessed Mythos the same day it was announced, guessing the endpoint based on Anthropic’s naming conventions for prior models. The vector was an individual employed at a third-party contractor, not Anthropic’s core infrastructure. Source characterizations point to a research community “not wreaking havoc” with the model.</p>
        <h3>The misread</h3>
        <p>If the coverage only centers on Anthropic’s security posture or the AI safety debate, we’re missing an important angle.</p>
        <p>The structural signal is that any preview or controlled-access model release has porous boundaries by design. Access controls on paper (contracts, NDAs, approved vendor lists) differ from those in practice. Every partner brings their own contractors, endpoints, and people with legitimate credentials and uneven security hygiene. That is the real control surface, not the cryptographic perimeter around the model itself. Which makes this a supply chain problem that happens to be about AI, not an AI problem that happens to involve vendors.</p>
        <h3>The blind spot</h3>
        <p>AI policy discourse is locked on US versus China, including energy, chip controls, export rules, sovereign AI posture, and who wins the race.</p>
        <p>Structurally missing from the larger conversation is the one state actor whose entire foreign currency revenue stream is cyber-enabled theft. DPRK doesn’t need to win any race. They need a 20-30% productivity gain in existing operations.</p>
        <p>The pipeline is documented. Insikt Group’s <a href="https://www.recordedfuture.com/research/crypto-country-north-koreas-targeting-cryptocurrency"></a><em><a href="https://www.recordedfuture.com/research/crypto-country-north-koreas-targeting-cryptocurrency">Crypto Country</a></em> estimated that regime-linked cryptocurrency theft reached roughly $3 billion through 2023. The <a href="https://www.state.gov/releases/office-of-the-spokesperson/2025/10/joint-statement-of-the-multilateral-sanctions-monitoring-team-msmt-on-the-report-covering-dprk-cyber-and-it-worker-activities">Multilateral Sanctions Monitoring Team</a> (successor to the UN Panel of Experts after Russia’s 2024 veto) has since done the harder primary work. MSMT’s October 2025 report documents $2.8 billion stolen from cryptocurrency companies between January 2024 and September 2025 across more than 40 heists, with proceeds explicitly tied to WMD and ballistic missile program funding. <a href="https://www.state.gov/releases/office-of-the-spokesperson/2026/01/the-democratic-peoples-republic-of-koreas-violations-and-evasions-of-un-sanctions-through-cyber-and-it-worker-activities/">The State Department updated the tally in January 2026</a>: another $400 million stolen in the three months since publication, bringing the 2025 totals above $2 billion.</p>
        <p><strong>Every successful crypto exchange intrusion ends up on a launch pad.</strong></p>
        <h2>Why North Korea wants the next model</h2>
        <p>Crypto exchange intrusions are labor-intensive at every phase. Recon, social engineering at scale (fake developer personas on GitHub and LinkedIn, spear-phishing of individual engineers at wallet providers), credential harvesting, post-exploit lateral movement, key extraction, and <a href="https://www.amazon.com/Lazarus-Heist-Hollywood-Finance-Inside/dp/024155425X"></a><a href="https://www.amazon.com/Lazarus-Heist-Hollywood-Finance-Inside/dp/024155425X">laundering</a>.</p>
        <p>Agentic capability compresses the cycle to include the same operator-hours, more successful intrusions, and more stolen $$$ per operator.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_15f31a75ee8d7950daa388a7f6eaceb059a2ebffa.png?width=750&amp;format=png&amp;optimize=medium" width="2048" height="1215" />
        </p>
        <p>Bybit is an easy example. <a href="https://www.fbi.gov/investigate/cyber/alerts/2025/north-korea-responsible-for-1-5-billion-bybit-hack">The FBI attributed approximately $1.5 billion in stolen virtual assets to TraderTraitor</a> in February 2025. <a href="https://fortune.com/crypto/2025/03/04/north-korea-bybit-hack-ethereum-safe-dprk-lazarus-group-tradertraitor/">The intrusion chain</a> ran months of patient targeting against a single Safe{Wallet} system administrator via phishing, followed by post-compromise operational patience. These types of attacks are expensive, time-intensive, and still extraordinarily productive.</p>
        <p>Lazarus and TraderTraitor don’t need AGI. They need the productivity lift that turns a junior operator into a senior one and shaves weeks off the planning phase. It doesn’t have to be Mythos specifically. Any comparable capability through a comparable vector does the job.</p>
        <p>Better tools mean more successful intrusions. More successful intrusions mean more stolen crypto. More stolen crypto means more missiles.</p>
        <h2>Three access patterns</h2>
        <p>Three different tradecraft patterns keep getting conflated in media coverage. They are not the same TTP, and treating them as one weakens the response on all three.</p>
        <p><strong>1. Contractor misuse.</strong> A legitimately credentialed employee at a third-party vendor uses their access for unauthorized purposes. This is the Mythos story. The credentials and access are real, though the intent is variable. Defenses (easy to say, hard to do well): telemetry, behavioral monitoring, and least-privilege scoping at the vendor tier.</p>
        <p><strong>2. Fraudulent hiring.</strong> An adversary places its own operatives inside the target through stolen or synthetic identities, often via remote IT contracting. This is the DPRK IT worker scheme. Insikt’s <a href="https://www.recordedfuture.com/research/inside-the-scam-north-koreas-it-worker-threat"></a><em><a href="https://www.recordedfuture.com/research/inside-the-scam-north-koreas-it-worker-threat">Inside the Scam</a></em> documents PurpleBravo’s infrastructure: front companies in China spoofing legitimate IT firms, and a malware ecosystem (BeaverTail, InvisibleFerret, OtterCookie) targeting the cryptocurrency industry. The credentials are real, but the identities are fake. Defenses: identity verification at hire (in-person interviews to avoid AI tricks), ongoing personnel vetting, geographic and behavioral baselining.</p>
        <p><strong>3. Supply chain compromise</strong>. A trusted vendor’s systems get breached, and the attacker uses that vendor’s legitimate distribution channel to reach the real target. <a href="https://intelligence2risk.substack.com/p/digital-supply-chain-breach"></a><a href="https://intelligence2risk.substack.com/p/digital-supply-chain-breach">TeamPCP’s March 2026 LiteLLM compromise</a> hit the AI toolchain directly, poisoning Trivy (a defensive security scanner) to reach a package with 95 million monthly downloads. Defenses: build-pipeline integrity, dependency monitoring, signed artifacts.</p>
        <p>These three attack vectors converge on the same truth. Any preview or limited-release AI program that depends on third parties is exposed to all three vectors simultaneously. DPRK is the actor most motivated across the full triangle because the revenue case is specific, measurable, and directly beneficial for the regime. They are incentivized to be “AI native.”</p>
        <h3>So what?</h3>
        <p>In the security industry, we need to stop thinking about AI access as purely a lab problem when it’s also a sanctions problem. The great-power competition framing obscures the actor already online, with a rich history of monetizing cyber heists to fund missiles.</p>
        <p>“Limited release” is a wonderful bumper sticker. The AI reality, from a threat-modeling perspective, is a countdown to turbo-charging adversarial capabilities.</p>
        <h3>Now what?</h3>
        <p>The honest conversation is that perimeter-style AI “controlled access” is less effective against State-sponsored adversaries. A productive security path is a distinct preview infrastructure, aggressive telemetry, canaries, and third-party access tied to personnel-level vetting rather than contractual attestation. (Guessable endpoints should be the first thing dead.)</p>
        <p>Crypto exchanges and custodians: your threat model needs to anticipate what Lazarus can do 3 to 6 months from now, not what they did last quarter. Assume they improve faster than your defenses do.</p>
        <p>Policymakers: DPRK is a first-class entity in AI access governance. The Multilateral Sanctions Monitoring Team framework already documents cyber-enabled sanctions evasion thoroughly. What it doesn’t yet do is name AI capability access as a sanctions-relevant category. Dual-use export controls have governed the transfer of semiconductor and missile technology for decades. AI capability is the obvious next category.</p>
        <p>Corporate CISOs (outside the AI-lab orbit): your third-party contractor environments are now inside the AI capability threat surface, whether you opted in or not. Inventory accordingly.</p>
        <h2>Close</h2>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ca2bf6995854d8b040cb1aac51172cac2a249bf3.png?width=750&amp;format=png&amp;optimize=medium" width="2048" height="1282" />
        </p>
        <p>Mythos is a preview of an access pattern. Any actor whose business model is stealing money to build weapons will find the third-party seam. This time, it was hobbyists. DPRK has spent two decades proving why nonproliferation is the right frame here.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1cd4a735414dc9382080bc199d70d19bf3a8c153e.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[From Overwhelmed to Autonomous: Rethinking Threat Intelligence in 2026]]></title>
            <link>https://www.recordedfuture.com/blog/rethinking-threat-intelligence-in-2026</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/rethinking-threat-intelligence-in-2026</guid>
            <pubDate>Fri, 24 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[For most security teams today, volume and access to intelligence isn’t the problem. It’s the speed at which they can turn that intelligence into action. .]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li>The real challenge in cybersecurity isn’t intelligence or visibility, it’s speed. Attackers operate at machine speed, while most organizations are still constrained by manual, human-driven workflows.</li>
          <li>Traditional threat intelligence falls short because it stops at insight. To reduce risk effectively, intelligence must not only inform decisions but also actively drive response.</li>
          <li>Fragmentation across cyber, fraud, and third-party risk creates exploitable gaps. A unified, intelligence-driven approach is essential to understanding and addressing modern threats holistically.</li>
          <li>Autonomous defense is the path forward. By enabling continuous, real-time action across the attack surface, organizations can close the speed gap and move from reactive security to proactive risk reduction.</li>
        </ul>
        <p>For most security teams today, volume and access to intelligence isn’t the problem. It’s the speed at which they can turn that intelligence into action.</p>
        <p>Over the last decade, organizations have invested heavily in threat intelligence and cybersecurity. Global security spending has surged <a href="https://www.gartner.com/en/newsroom/press-releases/2024-08-28-gartner-forecasts-global-information-security-spending-to-grow-15-percent-in-2025">past $200 billion annually, growing double digits year over year,</a> while <a href="https://nationalcioreview.com/articles-insights/information-security/the-cost-of-good-security-analyzing-2024s-cyber-budget-trends">security’s share of IT budgets has climbed from under 9% to more than 13%</a>. Most CISOs report continued budget increases, and enterprises are making billion-dollar investments in intelligence capabilities.</p>
        <p>And yet, breaches still happen. Fraud still slips through. Third-party risk still catches teams off guard. The issue isn’t visibility. It’s the growing gap between how fast threats move and how fast organizations can respond.</p>
        <p>Attackers now operate at machine speed, leveraging automation and AI to identify vulnerabilities, launch campaigns, and exploit opportunities in real time. Most security teams, however, are still constrained by manual workflows, fragmented systems, and processes that require human intervention at every step. That mismatch is where risk can accumulate—and where even well-resourced teams fall behind.</p>
        <div>
          <div>
            <div>What many organizations are discovering is that the problem isn’t a lack of intelligence. The problem is their inability to turn the insights into contextualized, intelligence-led actions.</div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <h2>The Hidden Cost of Human-Speed Security</h2>
        <p>For many organizations, this gap shows up in subtle but compounding ways. Analysts spend hours triaging alerts, trying to determine which signals actually matter. Security teams often discover incidents after damage has already occurred, not because the data wasn’t there, but because it couldn’t be acted on quickly enough. Across the organization, teams responsible for cyber operations, fraud, and third-party risk operate in silos, each with their own tools and workflows, rarely sharing a unified view of risk.</p>
        <p>At the same time, expectations from leadership have shifted. Executives and boards no longer want activity metrics—<a href="https://www.idc.com/resource-center/blog/from-cyber-risk-to-business-risk-how-cisos-should-engage-the-board-in-2026">they want clear evidence that security investments are reducing business risk</a>. But when intelligence is not clearly connected to action from security teams, that proof becomes difficult to deliver.</p>
        <p>Traditional threat intelligence was designed to inform decisions made by humans, at human speed. In today’s environment, that model introduces delay. And delay, in cybersecurity, is increasingly indistinguishable from exposure.</p>
        <h2>Intelligence That Acts, Not Just Informs</h2>
        <p>Closing the speed gap requires more than incremental improvements. It requires a shift in how organizations think about intelligence altogether. Moving forward, the future of cybersecurity must be more than just intelligence-led—it must be intelligence-acted.</p>
        <p>In this model, intelligence doesn’t sit in dashboards waiting for analysts to interpret it. It continuously correlates signals, prioritizes what matters, and drives action across the security environment automatically. Instead of asking teams to move faster, it enables the entire system to operate at the speed of the threat.</p>
        <p>This is the foundation of autonomous defense, and it’s the future of effective, machine-speed cybersecurity.</p>
        <h2>From Reactive to Autonomous: A New Operating Model</h2>
        <p>Autonomous defense fundamentally changes the role of the security team. Rather than serving as the bottleneck between detection and response, analysts become decision-makers operating on top of continuously running intelligence.</p>
        <p>Recorded Future’s <a href="https://www.recordedfuture.com/products/autonomous-threat-operations">Autonomous Threat Operations</a> brings this model to life by eliminating the manual steps that slow teams down. It ingests and correlates intelligence from multiple sources, applies context in real time, and triggers actions across existing security tools—all without requiring constant human input.</p>
        <p>The impact of such a dramatic shift is immediate and measurable. Threat hunting becomes continuous instead of periodic. Alerts arrive enriched with context, reducing the time needed to investigate and respond. Detection and remediation workflows execute automatically, freeing analysts to focus on strategic threats rather than routine triage.</p>
        <p>Just as importantly, this approach transforms how organizations measure success. Instead of tracking activity—alerts processed, queries written, incidents reviewed—teams can demonstrate real outcomes: faster response times, reduced exposure, and a clearer connection between intelligence and risk reduction; the latter of which is becoming increasingly necessary for organizational buy-in.</p>
        <p>This is so much more than just adding another tool to the stack. Instead, it’s about making every existing control smarter, faster, and more effective. And it’s paying off. On average, <a href="https://app.userevidence.com/assets/1334BMEJ">security teams using Recorded Future save up to 100 hours per week through improved analyst productivity</a>, allowing teams to redirect effort toward threat hunting and proactive defense instead of repetitive manual analysis.</p>
        <h2>The Bigger Challenge: Fragmented Visibility Across the Attack Surface</h2>
        <p>Speed alone, however, is only part of the equation. Many organizations are also limited by how they view risk. Threats today don’t respect organizational boundaries. A phishing campaign can lead to credential theft, which can then be used to access systems, exploit third-party relationships, or enable fraudulent transactions. These events are connected, but still far too many organizations manage them in isolation.</p>
        <p>Cyber operations teams focus on internal threats. Fraud teams monitor transactions. Risk teams assess vendors. Each group has visibility into part of the problem, but no one has a complete picture. This fragmentation creates blind spots, and attackers are increasingly skilled at navigating between them.</p>
        <h2>A Unified Approach to Risk</h2>
        <p>To effectively reduce risk, organizations need more than faster response times. They need a connected understanding of their entire attack surface, along with the ability to act across it in a coordinated way.</p>
        <p>Recorded Future addresses this through four core solution areas—<a href="https://www.recordedfuture.com/products/cyber-operations">Cyber Operations</a>, <a href="https://www.recordedfuture.com/use-case/digital-risk">Digital Risk Protection</a>, <a href="https://www.recordedfuture.com/products/third-party-intelligence">Third-Party Risk</a>, and <a href="https://www.recordedfuture.com/products/payment-fraud-intelligence">Payment Fraud Intelligence</a>—all built on a single, integrated intelligence foundation.</p>
        <p>In <a href="https://assets.recordedfuture.com/Datasheets/2026_0313%20-%20CyberOps%20Datasheet.pdf">cyber operations</a>, this means moving beyond alert overload to real-time prioritization. Instead of forcing analysts to sift through volumes of data, intelligence surfaces the threats that are most relevant to the organization’s environment and enables immediate action. The combination of prioritization and automation allows teams to reduce noise while improving both detection speed and response quality.</p>
        <p>In <a href="https://assets.recordedfuture.com/Datasheets/2026_0313%20-%20Digital%20Risk%20Protection.pdf">digital risk protection</a>, the focus shifts beyond the traditional perimeter. Today’s attackers target brands, customers, and executives just as frequently as they target infrastructure. By monitoring the open, <a href="https://www.recordedfuture.com/blog/dark-web-threat-intelligence">deep, and dark web</a>, Recorded Future provides visibility into impersonation campaigns, credential exposure, and emerging threats long before they impact the organization. More importantly, it enables rapid response, whether that means taking down fraudulent domains or preventing account takeover attempts.</p>
        <p><a href="https://assets.recordedfuture.com/Datasheets/Datasheet_Third-Party_Risk.pdf">Third-party risk</a> represents another growing challenge. As organizations expand their ecosystems, they inherit risk from vendors and partners, often without real-time visibility. Third-party involvement in breaches has reached a <a href="https://deepstrike.io/blog/cybersecurity-statistics-2025-threats-trends-challenges">staggering 30%, up from just 15% a year ago</a>. Static assessments and periodic reviews can’t keep pace with how quickly vendor risk evolves today. Continuous monitoring, grounded in real-world intelligence, allows organizations to detect issues earlier, respond faster, and maintain a more accurate understanding of their exposure.</p>
        <div>
          <div>
            <div>Threat intelligence-driven security is vital. It’s the eyes and ears of a security team. You can’t protect yourself against what you don’t know. A couple times now, Recorded Future has alerted us to something prior to the third-party vendor. That’s huge when we’re trying to protect our data.</div>
          </div>
          <div>
            <div>
              <p>Natalie Salisbury</p>
              <p>Strategic Threat Intelligence Analyst, Novavax</p>
            </div>
          </div>
        </div>
        <p>In the realm of <a href="https://assets.recordedfuture.com/Datasheets/2026_0310%20-%20Payment%20Fraud%20Intelligence.pdf">payment fraud</a> intelligence, the shift is equally significant. There were some <a href="https://www.recordedfuture.com/research/annual-payment-fraud-intelligence-report-2024">269 million records posted</a> across dark and clear web platforms in 2024, and a tripling of certain e-skimmer infections. It’s important to keep in mind that fraud doesn’t begin at the moment of transaction. Rather, it begins much earlier, in the environments where stolen data is exchanged and tested. Recorded Future provides comprehensive coverage across the complete payment fraud lifecycle. Sophisticated cleanup and normalization techniques result in better data quality and richer data sets, reducing manual research and enabling high confidence mitigation actions. By identifying these signals upstream and intervening, organizations can stop fraud before it’s executed, reducing both financial loss and customer impact.</p>
        <h2>One Intelligence Foundation. Total Visibility.</h2>
        <p>What makes this approach fundamentally different is that these capabilities are not delivered as isolated solutions. They are unified through the <a href="https://www.recordedfuture.com/platform">Recorded Future Intelligence Platform</a>, which correlates data across millions of sources and billions of entities to provide a single, coherent view of risk.</p>
        <p>This unified foundation enables organizations to connect signals that would otherwise remain siloed. Threat actors, infrastructure, vulnerabilities, and campaigns are all linked, allowing teams to understand not just what is happening, but what is likely to happen next.</p>
        <p>That level of visibility is what makes autonomous defense possible. And not just within a single domain, but across the entire attack surface.</p>
        <p>The urgency behind this shift cannot be overstated. Attackers are already operating at machine speed, using automation to scale their efforts and reduce the time between discovery and exploitation. At the same time, organizations that rely on manual processes are finding it increasingly difficult to keep up.</p>
        <p>The consequences of this gap are significant. Longer dwell times allow attackers to entrench themselves more deeply. Delayed responses increase the cost and impact of incidents. And as breaches and fraud events become more visible, customer trust becomes harder to maintain.</p>
        <p>This is no longer a question of optimization. It’s a question of whether existing operating models can keep pace with the reality of modern threats.</p>
        <h2>Rethinking What Threat Intelligence Should Do</h2>
        <p>As organizations evaluate their approach to cybersecurity, the role of threat intelligence needs to be reconsidered. It is no longer enough for intelligence to provide visibility. It must enable action. It must operate in real time. And it must extend across the full scope of organizational risk—not just one domain at a time.</p>
        <p>Equally important, it must deliver outcomes that matter to the business. Faster detection, reduced exposure, and measurable risk reduction are no longer aspirational. They are essential for enterprise security in the modern, AI-powered threat landscape.</p>
        <p>The goal for most organizations isn’t to replace their security stack. It’s to make it work better. By enabling intelligence to act autonomously, connecting visibility across domains, and aligning security operations with the speed of modern threats, organizations can close the gap that has long existed between insight and action. Recorded Future is built to make that possible.</p>
        <p>If your team is still struggling with alert fatigue, delayed responses, or fragmented visibility, the issue may not be a lack of resources. It may be a limitation in how intelligence is being applied.</p>
        <p>Now is the time to rethink that model.</p>
        <p><strong>Connect with Recorded Future to see how autonomous defense can help your organization move at the speed of today’s threats—and stay ahead of what comes next.</strong></p>
        <p><em><a href="https://www.recordedfuture.com/get-started">Contact us</a></em></p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_12d6bc15802a3569cc98a12874c0790ad0d3cfa5f.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Critical minerals and cyber operations]]></title>
            <link>https://www.recordedfuture.com/research/critical-minerals-and-cyber-operations</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/critical-minerals-and-cyber-operations</guid>
            <pubDate>Thu, 23 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Learn how critical minerals and rare earth elements (REEs) are evolving from commodities into strategic flashpoints. Explore the geopolitical risks of China’s refining dominance, the race for resources in the Arctic and space, and the rising threat of state-sponsored cyber operations targeting the global mining sector.]]></description>
            <content:encoded><![CDATA[
        <h2>Summary</h2>
        <p>Critical elements and rare earth elements REEs are no longer commodities; they are <strong>strategic dependencies.</strong> Chinaʼs dominance in processing and refining provides it with enormous geopolitical leverage over other industrialized economies.</p>
        <p>Geopolitical competition over mining and refining critical elements and REEs is accelerating. <strong>Competition to mine them will almost certainly expand</strong> into the Arctic, Greenland, Antarctica, the seabed, and space. These emerging arenas introduce legal ambiguity, environmental tension, and strategic rivalry, creating new geopolitical flashpoints.</p>
        <p><strong>Cyber operations are increasingly intertwined</strong> with resource competition. Insikt Group has identified state-sponsored and criminally aligned cyber threat actors targeting mining organizations to gain a strategic advantage. As critical mineral supply chains grow in importance, cyber activity targeting the sector is expected to increase, with criminal groups potentially serving as proxies or access brokers for state-backed operations.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1c74b54ae4c681cd320d850bd40417b927d75d257.png?width=750&amp;format=png&amp;optimize=medium" width="939" height="590" />
            </div>
          </div>
          <div>
            <div><strong>Figure 1</strong>: Map of where critical elements and REEs are being mined or have been located, along with key findings in the report Source: Recorded Future)</div>
          </div>
        </div>
        <h2>Analysis</h2>
        <h3>What Are Rare Earth Elements and Critical Elements?</h3>
        <p><strong><a href="https://www.usgs.gov/centers/national-minerals-information-center/rare-earths-statistics-and-information">Rare earth elements (REEs)</a></strong> are a group of seventeen metals that are essential to modern technologies. REEs are vital to the <a href="https://www.mckinsey.com/featured-insights/mckinsey-explainers/what-are-industry-4-0-the-fourth-industrial-revolution-and-4ir">Fourth Industrial Revolution</a>, a term for the current era of connectivity, advanced analytics, automation, and advanced manufacturing technology. REEs are used in small but essential quantities; they significantly impact the efficiency, precision, and reliability of equipment. They also differ from most other critical elements because they are difficult to process and refine. The refining process requires complex separation, making supply chains slow to build and capital-intensive.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a528cc8e110e6b3d1a5a7fd49d20c970c824068e.png?width=750&amp;format=png&amp;optimize=medium" width="446" height="182" />
            </div>
          </div>
          <div>
            <div><strong>Figure 2:</strong> Simplified REE production process from mining to refining (Source: Recorded Future)</div>
          </div>
        </div>
        <p><strong><a href="https://www.usgs.gov/news/science-snippet/interior-department-releases-final-2025-list-critical-minerals">Critical elements</a></strong> such as lithium, copper, nickel, cobalt, and graphite are primarily used as structural, conductive, or energy-storage materials and are consumed in much larger quantities. These elements form the physical backbone of products like batteries, wiring, and digital infrastructure. In simple terms, critical elements build the systems, and REEs enable the systems to perform at high levels.</p>
        <h3>Where Are REEs and Critical Elements Located?</h3>
        <p><strong>On land,</strong> critical elements are unevenly distributed globally, with mining concentrated in a few countries. REEs are primarily mined in China, with significant deposits in Australia and the United States (US).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1937ab6649fb947acb48c88041aaade797e285913.png?width=750&amp;format=png&amp;optimize=medium" width="463" height="309" />
            </div>
          </div>
          <div>
            <div><strong>Figure 3:</strong> The distribution of where critical minerals were mined in 2023 Source: <a href="https://www.wri.org/insights/critical-minerals-explained">World Resources Institute</a>)</div>
          </div>
        </div>
        <p><strong>The seabed</strong> is an <a href="https://foreignpolicy.com/2025/06/04/seabed-china-russia-unclos/#cookie_message_anchor">emerging</a> arena for mining due to vast critical mineral reserves that are believed to lie on the ocean floor. On the seabed, <a href="https://www.gao.gov/products/gao-22-105507">minerals</a> are packed into potato-sized nodules, form hard crusts, accumulate in sediment layers, and are emitted from hydrothermal vents. In April 2025, the Trump administration <a href="https://www.wsj.com/articles/trump-signs-executive-order-calling-for-u-s-deep-sea-mining-f1c35516">issued</a> an executive order directing the US to rapidly scale its capability to mine and process seabed critical elements. Meanwhile, China continues to <a href="https://discoveryalert.com.au/seabed-mining-2026-implications-underwater-technologies/">expand</a> its deep-sea mining capabilities. Japan is also accelerating its deep-sea mining program and, in February 2026, <a href="https://www.japantimes.co.jp/news/2026/02/02/japan/japan-rare-earth-deep-sea/">recovered</a> REEs from 6,000 meters below the surface of the Pacific Ocean.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_13a82f103bfeeb975adbb457b49881c13e2e03072.png?width=750&amp;format=png&amp;optimize=medium" width="463" height="251" />
            </div>
          </div>
          <div>
            <div><strong>Figure 4:</strong> Diagram showing how minerals containing critical elements can be extracted from the seabed Source: <a href="https://www.gao.gov/products/gao-22-105507">US Government Accountability Office</a>)</div>
          </div>
        </div>
        <p><strong>Arctic</strong> ice volume has <a href="https://www.economist.com/finance-and-economics/2025/01/23/the-arctic-climate-changes-great-economic-opportunity">declined</a> by more than 70% since the 1980s, opening new shipping routes and exposing vast natural resources. As ice retreats, significant <a href="https://www.oxfordenergy.org/wpcms/wp-content/uploads/2025/02/SP36-Critical-Minerals-in-the-Arctic.pdf">deposits</a> of critical elements such as cobalt, tin, and REEs are becoming accessible, alongside oil and gas reserves. Mineral-rich seabed nodules are also being <a href="https://www.economist.com/europe/2021/11/27/riches-lie-below-the-waters-of-russias-arctic">uncovered</a>, attracting increasing interest from both nation-states and private investors.</p>
        <p><strong>Greenland</strong> <a href="https://www.bbc.co.uk/news/articles/cly9230yw15o">contains</a> 25 of the European Commission’s 34 designated critical raw materials as well as substantial oil and gas potential. Mining remains <a href="https://www.ft.com/content/efe3f385-7c7a-4a75-8dd3-ee245019d794">difficult</a> due to harsh conditions and limited infrastructure, but continued ice retreat combined with sufficient capital investment could unlock resources of major economic and geopolitical importance.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a21568577dceb08174b6afe7d8d98c163bad5053.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="745" />
            </div>
          </div>
          <div>
            <div><strong>Figures 5 and 6</strong>: Map showing critical minerals located on Greenland (left) Source: <a href="http://telegraph.co.uk/business/2026/01/10/trumps-plan-to-make-greenlanders-an-offer-they-cant-refuse/">The Telegraph</a>);Map showing critical minerals in the Arctic region (right) Source: <a href="https://www.economist.com/finance-and-economics/2025/01/23/the-arctic-climate-changes-great-economic-opportunity">The Economist</a>)</div>
          </div>
        </div>
        <p><strong>Antarctica</strong> is currently <a href="https://discoveringantarctica.org.uk/challenges/sustainability/future-of-antarctica/">off-limits</a> to mining until at least 2048 under a 1991 environmental agreement that designated the continent as a natural reserve. Antarctica is believed to hold significant reserves of oil, coal, and iron ore, which are already attracting growing interest for the future. China and Russia have <a href="https://www.csis.org/analysis/what-can-united-states-do-counter-growing-chinese-and-russian-influence-antarctica">announced</a> plans to expand their presence in Antarctica. China’s <a href="https://foreignpolicy.com/2025/05/19/antarctica-south-pole-china-russia-resources-geopolitics-treaty-security/">intentions</a> appear to be focused on resource exploitation, which could open up a new geopolitical fault line, this time in the South Pole.</p>
        <p><strong>Space</strong> is quickly becoming the next frontier for critical resource extraction. Critical elements are <a href="https://www.bbc.co.uk/future/article/20250320-how-close-are-we-really-to-mining-asteroids">abundant</a> on asteroids and on the Moon. As <a href="https://www.recordedfuture.com/blog/convergence-space-cyber">companies</a> move toward space mining, the US and China are simultaneously <a href="https://www.wired.com/story/china-us-moon-race-trump-losing/">racing</a> to establish a permanent presence in space by the 2030s, intensifying an already highly competitive astropolitical environment.</p>
        <h3>What Is the Geopolitical Importance of REEs and Critical Elements?</h3>
        <p>Because industrialized nations need critical elements and REEs to manufacture advanced technologies, global demand is <a href="https://www.wri.org/insights/critical-minerals-explained">rapidly</a> accelerating. China’s <a href="https://www.goldmansachs.com/insights/articles/resource-realism-the-geopolitics-of-critical-mineral-supply-chains">control</a> over critical elements and REEs stems primarily from its dominance of processing and refining rather than extraction. By controlling much of the world’s REE separation and refining capacity, China holds significant leverage over global supply chains and strategic technologies.</p>
        <p>This reliance has heightened <a href="https://www.economist.com/briefing/2025/10/23/china-is-using-americas-own-trade-weapons-to-beat-it">anxiety</a> in the US over access to critical and rare earth elements. In 2025, China demonstrated its leverage by threatening to <a href="https://www.politico.com/news/2025/07/04/us-china-trade-war-exports-00440019">suspend</a> REE exports to the US, which <a href="https://www.bbc.co.uk/news/articles/cql2x6d2zkgo">compelled</a> Washington to back away from plans to restrict the transfer of critical semiconductor technology.</p>
        <p>The US government has since accelerated international critical minerals <a href="https://www.iiss.org/online-analysis/online-analysis/2026/01/us-critical-minerals-diplomacy-from-america-first-deals-to-pax-silica/">deals</a> and begun <a href="https://www.independent.co.uk/news/world/americas/donald-trump-china-pentagon-oklahoma-howard-lutnick-b2907759.html">investing</a> in US mining operations to minimize its reliance on China, where <a href="https://apnews.com/article/usa-rare-earth-trump-commerce-4c012d70ad172f12d9e3aca24508e766">over</a> 90% of the world’s REEs are processed. Furthermore, we are now seeing the US strategically <a href="https://www.bloomberg.com/news/articles/2026-02-02/trump-launches-12-billion-minerals-stockpile-to-counter-china">stockpiling</a> critical minerals and seeking to form “<a href="https://www.reuters.com/world/china/us-hosts-countries-talks-weaken-chinas-grip-critical-minerals-2026-02-04/">critical minerals trade blocs</a>.”</p>
        <h3>Have Any Cyberattacks Been Linked to REEs and Critical Elements?</h3>
        <p>State-sponsored cyber capabilities are deployed to support national objectives linked to mining operations and the exploration of new critical minerals.</p>
        <p>In 2021, Insikt Group identified infrastructure previously linked to APT15, a Chinese state-sponsored threat actor targeting a Canada-based mining company focused on mining zinc, copper, and lead. While there is no public record of Chinese investment in that specific mining company, Chinese firms <a href="https://web.archive.org/web/20230208082223/https://www.yicaiglobal.com/news/chinese-miners-chengxin-zangge-hold-onto-canadian-lithium-assets-despite-exit-order">invested</a> approximately CAD 40 million (USD $30 million) in other Canadian lithium miners during the same period. Ottawa later <a href="https://www.fdiintelligence.com/content/1f4c378e-e103-51a8-828f-12eeaa8a7073">forced</a> those companies to divest on national security grounds.</p>
        <p>In 2025, Insikt Group identified several Chinese state-sponsored threat actors targeting an organization focused on monitoring and regulating seabed mining. These cyberattacks occurred around the same time that China entered into seabed exploration and mining <a href="https://natoassociation.ca/beneath-the-surface-chinas-deep-sea-diplomacy-in-the-pacific-ocean/">partnerships</a> with nations such as the Cook Islands, Kiribati, and Tonga. This campaign was almost certainly driven by a desire to gain advanced insight into deep-sea mining rules and rival nations' positions, helping it protect its critical minerals dominance and secure strategic seabed access ahead of its competitors.</p>
        <p>Between January 2021 and January 2026, Insikt Group identified multiple sophisticated cyber operations targeting Indonesia. While not every intrusion can be conclusively attributed to mining activity, these attacks align with China’s strategic interest in Indonesia’s natural resources; for example, Chinese companies <a href="https://www.aspistrategist.org.au/chinas-investment-in-indonesia-is-its-global-critical-minerals-template/">control</a> about 75% of Indonesia’s nickel refining capacity. Furthermore, Indonesia <a href="https://www.eria.org/news-and-views/indonesia-s-critical-minerals-moment--turning-resource-wealth-into-rules-based-prosperity">holds</a> approximately 55 million metric tons of nickel reserves, which is over 40% of global reserves.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_13cd150a6919671816dae8ff5df5748fb81fade17.png?width=750&amp;format=png&amp;optimize=medium" width="1140" height="700" />
            </div>
          </div>
          <div>
            <div><strong>Figure 7:</strong> Timeline of Chinese cyber threat actor campaigns identified by Insikt Group targeting Indonesia from January 2021 to January 2026,alongside large mining deals Source: Recorded Future)</div>
          </div>
        </div>
        <p>In 2025, a hacker group known as Silent Lynx (or YoroTrooper) was <a href="https://therecord.media/hackers-pose-kyrgyz-officials-russia-cyber-espionage">reported</a> to be targeting Russia's mining sector. Security researchers <a href="https://therecord.media/kazakhstan-hackers-target-governments-commonwealth-of-independent-states-yorotrooper-cisco">assessed</a> that Silent Lynx is likely Kazakhstan-based, due to its language fluency, use of local currency, and regional targeting.</p>
        <p>Ransomware and criminal cyber groups frequently target the mining sector, primarily for financial gain. As the sector’s global economic importance grows, it may attract increased extortion efforts. Insikt Group has previously <a href="https://www.recordedfuture.com/research/dark-covenant-3-controlled-impunity-and-russias-cybercriminals">identified</a> ransomware groups operating in close coordination with state actors, effectively using ransomware as a smokescreen; as a result, we cannot rule out criminal groups increasingly providing access to mining organizations for state-sponsored cyber operations.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ac32a6fbc42d1c481756fc15e5c91251cd9e25ca.png?width=750&amp;format=png&amp;optimize=medium" width="987" height="341" />
            </div>
          </div>
          <div>
            <div><strong>Figure 8:</strong> Data from Recorded Futureʼs Ransomware Dashboard showing the top five ransomware groups targeting the mining and metals sector in 2025 Source: Recorded Future)</div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_120e8fbdd71d3c012b84311ac0c104b77f91af32c.png?width=750&amp;format=png&amp;optimize=medium" width="1019" height="585" />
            </div>
          </div>
          <div>
            <div>
              <p><strong>Figure 9:</strong> Timeline from January 2021 to January 2026 showing mining companies being named on ransomware extortion sites,</p>
              <p>alongside mining company access being sold on dark web sites Source: Recorded Future)</p>
            </div>
          </div>
        </div>
        <p>In 2024, Northern Minerals, an Australian rare earths producer, was <a href="https://www.bloomberg.com/news/articles/2024-06-04/australian-rare-earths-miner-hit-by-cybersecurity-breac">compromised</a> by the ransomware group <a href="https://www.scworld.com/brief/data-breach-confirmed-by-northern-minerals-after-bianlian-leak">BianLian</a>. They published stolen data on the dark web shortly after Northern Minerals ordered Chinese-linked investors to divest their 10.4% stake. BianLian is a financially motivated group that opportunistically targets multiple sectors and is <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-136a">believed</a> to be operated by Russia-based threat actors. While this leak was likely financially driven, state collusion cannot be ruled out, as state-sponsored threat actors increasingly <a href="https://www.recordedfuture.com/research/dark-covenant-3-controlled-impunity-and-russias-cybercriminals">hide</a> operations behind criminal activity.</p>
        <h2>Outlook</h2>
        <p>The US and its allies will almost certainly intensify efforts to <strong>reduce strategic dependence on China</strong> for critical minerals. This is because control of mineral supply chains will be a decisive factor in determining leadership in the Fourth Industrial Revolution.</p>
        <p>Mining activity will almost certainly <strong>expand into new frontiers</strong>, including the deep sea, the Arctic, and Antarctica, permanently reshaping both economic competition and geopolitical risk.</p>
        <p>Space will very likely <a href="https://www.recordedfuture.com/research/space-and-cyber-race-above-battle-below">emerge</a> as the <strong>final frontier for resource extraction</strong>. The US and China will accelerate competition to secure access to lunar and asteroid-based minerals, extending terrestrial resource rivalries beyond Earth’s orbit.</p>
        <p>State-sponsored cyber threat actors operating on behalf of industrialized nations will almost certainly increase their focus <strong>on targeting mining companies and governments</strong> operating in strategically significant mining regions.</p>
        <p>Criminal cyber activity will very likely increasingly serve as a <strong>smokescreen or initial access vector</strong> for state-sponsored operations targeting critical mineral mining companies.</p>
        <h3>Recommended D3FEND Actions</h3>
        <div>
          <div>
            <div><strong><a href="https://d3fend.mitre.org/technique/d3f:AccessMediation/">Access Mediation</a></strong> <strong>(D3-AMED)</strong></div>
            <div>Tighten who can access sensitive supply-chain data</div>
          </div>
          <div>
            <div><strong><a href="https://d3fend.mitre.org/technique/d3f:NetworkAccessMediation/">Network Access Mediation</a></strong> <strong>(D3-NAM)</strong></div>
            <div>Control access to key network systems</div>
          </div>
          <div>
            <div><strong><a href="https://d3fend.mitre.org/technique/d3f:Multi-factorAuthentication/">Multi-factor Authentication</a></strong> <strong>(D3-MFA)</strong></div>
            <div>Reduce account takeover risk on the systems that hold this data</div>
          </div>
          <div>
            <div><strong><a href="https://d3fend.mitre.org/technique/d3f:RestoreDiskImage/">Restore Disk Image</a></strong> <strong>(D3-RDI)</strong></div>
            <div>Recover quickly from ransomware or destructive attacks</div>
          </div>
          <div>
            <div><strong><a href="https://d3fend.mitre.org/technique/d3f:ReissueCredential/">Reissue Credential</a></strong> <strong>(D3-RIC)</strong></div>
            <div>Replace compromised credentials quickly at scale</div>
          </div>
          <div>
            <div><strong><a href="https://d3fend.mitre.org/technique/d3f:CredentialRotation/">Credential Rotation</a></strong> <strong>(D3-CRO)</strong></div>
            <div>Shorten the “useful life” of stolen credentials and keys</div>
          </div>
        </div>
        <h3>Further Reading</h3>
        <div>
          <div>
            <div>
              <h3>Source</h3>
            </div>
            <div>
              <h3>Title</h3>
            </div>
          </div>
          <div>
            <div>Recorded Future</div>
            <div><a href="https://www.recordedfuture.com/blog/convergence-space-cyber">The convergence of space and cyber: An evolving threat landscape</a></div>
          </div>
          <div>
            <div>Insikt Group</div>
            <div><a href="https://www.recordedfuture.com/research/state-of-security">2026 State of Security</a></div>
          </div>
          <div>
            <div>Foreign Policy</div>
            <div><a href="https://foreignpolicy.com/2025/06/04/seabed-china-russia-unclos/#cookie_message_anchor">The Seabed Is Now a Battlefield</a></div>
          </div>
          <div>
            <div>The Economist</div>
            <div><a href="https://www.economist.com/graphic-detail/2025/03/24/a-visual-guide-to-critical-materials-and-rare-earths">A visual guide to critical materials and rare earths</a></div>
          </div>
        </div>
        <h2>Mitigations</h2>
        <p><strong>Know your exposure to changes in critical mineral supplies:</strong> Map the locations of critical minerals in your products and suppliers, and identify potential single points of failure.<br /><strong>Resilience question:</strong> <em>Are there any single points of failure in critical products or business lines if China were to restrict the supply of REEs?</em></p>
        <p><strong>Build a fallback plan:</strong> Put backup suppliers, alternate materials, and realistic inventory buffers in place for the highest-risk supplies your organization relies on.<br /><strong>Resilience question:</strong> <em>What is our Plan B for our top three critical electronic supplies, such as laptops?</em></p>
        <p><strong>Prepare for criminal and state-sponsored cyberattacks:</strong> If you operate in or supply the mining and critical minerals sector, treat criminal intrusions as potentially more than financially motivated. In some cases, they may serve as cover for espionage. Actively monitor the latest indicators of compromise (IoCs) and the tactics, techniques, and procedures (TTPs) associated with threat actors known to target the sector or government bodies responsible for nation-state mining interests. Use Recorded Future’s <a href="https://www.recordedfuture.com/products/threat-intelligence">Threat Intelligence Module</a> to monitor for dark web and closed-source mentions tied to mining targeting.<br /><strong>Resilience question:</strong> <em>If we’re hit with ransomware, how quickly can we restore operations? Do we have backup systems and data?</em></p>
        <p><strong>Map out your supply-chain risks:</strong> If your organization operates in or near the mining industry, you might have robust security measures — but your suppliers might not. Use Recorded Future’s <a href="https://www.recordedfuture.com/products/third-party-intelligence">Third-Party Intelligence Module</a> to identify risks in your supply chain.<br /><strong>Resilience question:</strong> <em>Which supplier or contractor would cause us the most problems if they were hacked, and could they be easily hacked from what we can identify?</em></p>
        <p><strong>Monitor the new mining hotspots:</strong> Track developments in the Arctic, Greenland, Antarctica, deep-sea mining, and space, as rules and conflicts there can quickly affect supply and reputation. Use Recorded Future’s <a href="https://www.recordedfuture.com/products/geopolitical-intelligence">Geopolitical Intelligence Module</a> to gain visibility into new mining contracts and potential geopolitical risks from new deals.<br /><strong>Resilience question:</strong> <em>What early warning signs are we monitoring that could disrupt our supply chain in the next 6–12 months?</em></p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_190a8600b3b90022a74115178c103f4973ccd0512.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Today, trust is the superpower that makes innovation possible]]></title>
            <link>https://www.recordedfuture.com/blog/trust-is-a-superpower</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/trust-is-a-superpower</guid>
            <pubDate>Thu, 23 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[How better intelligence and collaboration can unlock new opportunities for growth and greater financial health for more people.]]></description>
            <content:encoded><![CDATA[
        <p>The paradoxes of today’s digital world are well-known to anyone with a smartphone.</p>
        <p>Over the last decade, connectivity has expanded, yet the world has become more fragmented. Our everyday lives are more digital, but we spend more time parsing text messages for scams or deliberating the authenticity of potential deepfakes. Technology is delivering great productivity gains to small businesses while making them a larger target for cybercriminals.</p>
        <p>In this environment, exposure becomes the default: Access points are growing, control is hard and reacting to change stops working. AI intensifies these dynamics because it compresses time for everyone, including adversaries.</p>
        <p>Today, trust has become the most critical tool to move all businesses forward. Without trust, even the best ideas stall. People hesitate, adoption slows and growth stagnates.</p>
        <p>Trust used to be something businesses tried to repair after a breach. Now it must be the starting point, and something to nurture and continuously prove in a world that has fundamentally changed.</p>
        <p>It would be impossible to eliminate the risk entirely. Some estimates project <a href="https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide/">cybercrime could cost the world $15.6 trillion</a> annually before 2030, <a href="https://www.worlddata.info/largest-economies.php">surpassing all but two</a> of the world’s largest economies. Instead, the goal must be to build the ability to see sooner, decide faster and limit impact when, not if, something breaks. Trust today is all about bringing together speed, intelligence and collaboration, and that’s exactly what we’re developing across our teams.</p>
        <p>Getting this right isn’t just good business sense, but the only way to ensure new technologies are embraced and economies can keep growing.</p>
        <h2>The advantage is intelligence</h2>
        <p>Real advantage comes from understanding context and connecting signals across systems. That’s what turns data into better decisions. This kind of intelligence increases speed, reduces risk and enables proactive action. With the right intelligence, teams can hunt for threats continuously, test assumptions and act before harm occurs, not just triage alerts after the fact.</p>
        <p>You can see this shift in how the payments industry is evolving, including the work we’re doing by bringing Recorded Future’s threat intelligence together with Mastercard’s security capabilities, payments infrastructure and partnership models. We’re helping organizations understand where risk concentrates, how it propagates, and how quick, collective action can reduce the cost of cybercrime.</p>
        <p>Faster insights mean earlier action, which minimizes impact — and deepens trust.</p>
        <h2>Trust is built through collaboration</h2>
        <p>Security doesn’t scale through isolated heroics. It scales through ecosystems: shared signals, shared standards and partners who can move together as new threats arise, attack vectors shift and failures spread.</p>
        <p>Resilience is strongest when public and private sectors plan, exercise and respond together, rather than in parallel. Different players have different sightlines in the digital ecosystem. Startups look at the edges of innovation. Enterprises understand the realities of operating in today’s environment. Governments see where systemic risk concentrates. When those visions combine, our shields strengthen and expand, pushing cybercriminals out of the frame.</p>
        <p>During our time here in Miami for the <a href="https://emergeamericas.com/">eMerge Americas conference</a>, we’ve had the opportunity to speak to enterprises, startups, investors and government leaders about the need to accelerate resilience in Latin America, where the digital economy is booming but security hasn’t always kept pace. The region has the world’s fastest-growing rate of disclosed cyber incidents — in 2025 alone, <a href="https://www.recordedfuture.com/research/latin-america-and-the-caribbean-cybercrime-landscape">Recorded Future tracked</a> 452 ransomware incidents — but only seven countries have developed cybersecurity plans protecting critical infrastructure, and only 20 have formal computer security incident response teams.</p>
        <p>That gap is where trust breaks, and where more collaboration can become a growth necessity. We can’t build sustainable economic growth in Latin America without building digital trust and cyber resilience. That’s why we are deepening our footprint here, enhancing regional threat intelligence and resilience and paving the way for stronger public-private collaboration to address these complex risks.</p>
        <p>Secure digital access unlocks economic opportunity — and insecurity shuts it down fast. For a first-time digital user, one fraud incident can be enough to opt out for good. For a small business, one account takeover can wipe out months of progress. That’s why trust is inextricably linked to financial health. People can’t build stability on top of systems they’re afraid to use. At Mastercard, we’ve <a href="https://www.mastercard.com/us/en/news-and-trends/stories/2026/mastercard-500-million-commitment.html">committed to connecting and protecting 500 million people and small businesses by 2030</a>, because secure participation is foundational, not optional.</p>
        <p>The bar for digital innovation today is not what we can deliver, but what people will trust enough to use, depend upon and harness for their own financial health. Because in the end, trust is the superpower.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1a779e8a128e82a969d30b523eb27ea00232c78e2.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Evolution of Chinese-Language Guarantee Telegram Marketplaces]]></title>
            <link>https://www.recordedfuture.com/research/evolution-of-the-chinese-language</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/evolution-of-the-chinese-language</guid>
            <pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Chinese-language, Telegram-based “guarantee” marketplaces are increasingly popular among Chinese-speaking criminal groups despite the widely publicized shutdown of Huione Guarantee in 2025.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Chinese-language, Telegram-based “guarantee” marketplaces are increasingly popular among Chinese-speaking criminal groups despite the widely publicized shutdown of Huione Guarantee in 2025. Although these guarantee marketplaces operate similarly to Huione Guarantee, they differ in their focus on particular aspects of cybercrime and in their targeting of specific geographies. To better understand these Chinese-language guarantee marketplaces, Insikt Group observed and analyzed another increasingly popular guarantee marketplace, dubbed Dabai Guarantee (“大白担保”).</p>
        <p>Given that guarantee marketplaces typically involve hundreds to thousands of public and private channels, this report outlines how Insikt Group analysts navigated through just one of the Telegram channels belonging to Dabai Guarantee’s large infrastructure. The channel is known as Dabai Guarantee Public Group 301 (@DBTM301), and its main objective is to conduct “sweeping” operations (using illicit techniques to make purchases of physical goods at retailers or to withdraw and transact at country-specific ATMs) in South Korea and Japan. This report also includes the visible organizational structure of Dabai Guarantee Public Group 301, key rules, staff, and customer service functions.</p>
        <p>This report primarily serves as an introduction to understanding how Chinese-language, Telegram-based guarantee marketplaces work and how to navigate them. It also includes interpretations of multiple criminal terminologies used by Chinese-speaking criminals, which are pivotal to understanding how Chinese cybercrime evolves over time. The cyber and fraud campaigns being promoted and launched on Dabai Guarantee and other similar guarantee marketplaces can negatively impact retail, banking, contactless payment providers, insurance companies, and individuals vulnerable to scam-related campaigns.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Dabai Guarantee is a platform that enables multiple Chinese-speaking threat groups with strong presences across multiple countries to coordinate and launch global-scale fraud and cyber campaigns.</li>
          <li>Chinese-speaking syndicates are using Dabai Guarantee as a platform to facilitate campaigns involving financial and retail fraud, such as ATM withdrawal and ghost-tapping.</li>
          <li>Criminal groups participating in campaigns are often siloed, acting independently, and restricting the sharing of information, resources, and goals, thereby creating barriers to tracking their activities.</li>
          <li>Unlike conventional ghost-tapping campaigns that mainly target luxury businesses, “sweeping teams” typically purchase goods that are less expensive but still considered valuable to criminal groups and are relatively easy to transport (such as women’s cosmetics and tobacco products), likely to avoid detection by law enforcement. The sweeping teams eventually resell them in other markets for cash.</li>
          <li>Dabai Guarantee’s bot search function makes it easy for Chinese-speaking criminals to enter specific search terms and be matched with existing public groups running those campaigns.</li>
        </ul>
        <h2>Background</h2>
        <p>Chinese-language guarantee marketplaces first emerged around 2021 with the launch of Huione Guarantee, serving as reliable alternatives to traditional dark web marketplaces accessible via the Tor network. Owners of traditional dark web marketplaces, such as Exchange Market and Chang’An Sleepless Night, have close to full control over advertisements and transactions. These guarantee marketplaces seek to eliminate distrust stemming from criminal groups scamming one another, dark web marketplaces shutting down, potential exit scams, and parties failing to honor terms that were previously agreed upon. Furthermore, guarantee marketplaces operate on publicly accessible Telegram channels by design; these public channels are meant to be found and appeal to a wider Chinese-speaking audience that uses Telegram, noting that most Chinese criminals still use Telegram rather than Tor for communication.</p>
        <p>Guarantee marketplaces are often different from typical peer-to-peer (P2P) transactions between threat actors. Guarantee marketplaces are one-stop shops that handle and facilitate all cryptocurrency transactions (typically Tether/USDT) and mediation services between parties, whereas P2P transactions typically take place directly between users or through a third-party escrow service. The preferred cryptocurrency of Chinese-speaking threat actors is USDT, a stablecoin pegged to the US dollar that maintains anonymity. Stablecoins are a type of cryptocurrency designed to maintain a stable value by pegging themselves to reserve assets, most commonly the US dollar, to mitigate the volatility of cryptocurrencies like Bitcoin. According to Chainalysis’s 2026 <a href="https://www.chainalysis.com/reports/crypto-crime-2026/">Crypto Crime Report</a>, stablecoins have come to dominate the landscape of illicit transactions, accounting for 84% of all illicit transaction volume in 2025. Chinese cybercriminals <a href="https://www.binance.com/en/square/post/21486862841738">prefer</a> using stablecoins such as USDT due to their combination of price stability, ease of border transfer, and relative anonymity. USDT also helps Chinese cybercriminals bypass China’s strict capital controls and traditional banking scrutiny to move money across borders.</p>
        <p>In January 2025, Insikt Group published a report on the Chinese-language guarantee marketplace Huione Guarantee, “Huione Guarantee Serves as a One-Stop Shop for Chinese-Speaking Cybercriminals.” The report described the activities facilitated by Huione Guarantee, which include investment fraud, money laundering, and various online scams. Despite Huione Guarantee’s shutdown on May 13, 2025, Insikt Group observed that other guarantee marketplaces, such as Tudou and Xinbi, <a href="https://www.elliptic.co/blog/telegram-dark-markets-expand-to-fill-the-gap-left-by-huione-guarantee">stepped in</a> to fill the void left by Huione Guarantee's closure. According to Elliptic, Tudou Guarantee also <a href="https://www.elliptic.co/blog/tudou-guarantee-winds-down-operations-after-12-billion-in-transactions">shut down</a> its operations in January 2026, after processing $12 billion in transactions. Even though Xinbi Guarantee was previously <a href="https://www.elliptic.co/blog/elliptic-data-telegram-market-takedown">reported</a> to have shut down, it has since been rebuilt and maintains a presence on Telegram as of this writing. Other, but not widely reported, active Chinese-language guarantee marketplaces operating on Telegram (besides Dabai Guarantee) are Yinuo, BoChuang, and Ouyi.</p>
        <p>Guarantee marketplaces can also facilitate new attack vectors such as ghost-tapping. In July 2025, Insikt Group published a report titled “<a href="https://www.recordedfuture.com/research/ghost-tapping-chinese-criminal-ecosystem">Ghost-Tapping and the Chinese Cybercriminal Retail Fraud Ecosystem</a>,” which details how Chinese-speaking cybercriminals and syndicates work together to conduct retail fraud using near-field communications (NFC) relay tactics. As of February 2026, Insikt Group observed that Dabai Guarantee has emerged as a major player in Chinese-language cybercrime, with its Telegram-based infrastructure resembling that of Huione Guarantee and offering malicious services similar to those advertised on Huione Guarantee, which is now defunct.</p>
        <h2>Dabai Guarantee Overview</h2>
        <p>Dabai Guarantee is a Telegram-based marketplace, consisting of thousands of public and private Chinese-language Telegram groups, that operates in a manner similar to Huione, Tudou, and Xinbi guarantees; many of these services cater to “small to medium-sized clients.” However, the operators of Dabai Guarantee do not maintain a clearnet website; they operate solely on Telegram, likely due to operational security (OPSEC) concerns. Operators of Dabai Guarantee likely chose not to have a clearnet website in light of Huione’s “bad OPSEC” practices — Huione Guarantee’s clearnet website made tracking much easier for law enforcement officials and researchers, which likely contributed to FinCEN <a href="https://www.fincen.gov/news/news-releases/fincen-finds-cambodia-based-huione-group-be-primary-money-laundering-concern">sanctioning</a> the organization in May 2025. The Dabai platform is populated with third-party vendors providing various services that facilitate cybercriminal and fraud activities, including money laundering methods and services, compromised social media and e-commerce accounts, SIM cards, personally identifiable information (PII), malware-as-a-service (MaaS), deepfake technology, know-your-customer (KYC) bypass services, and more.</p>
        <p>Dabai Guarantee was likely founded in December 2024, based on its Telegram Channel’s creation date. There are currently six known official main Telegram channels:</p>
        <ul>
          <li>“公群导航 @dabai” (@dabai_a): “Public Group for Navigation Purpose”, 15,372 subscribers, as of this writing</li>
          <li>“大白担保大群” (@dabai_c): “Dabai Guarantee Big Group”, 19,225 members, as of this writing</li>
          <li>“大白供需频道” (@dabaiyajing): “Dabai Supply and Demand Channel”, 17,085 subscribers, as of this writing</li>
          <li>“大白担保规则” (@dabai_e): “Dabai Guarantee rules”, 428 subscribers, as of this writing</li>
          <li>“大白担保客服人员名单” (@dabai_f): “Dabai customer service list”, 527 subscribers, as of this writing</li>
          <li>“大白担保 @dabai” (@dabai): “Dabai Guarantee bot channel”</li>
        </ul>
        <p>Dabai Guarantee’s public navigation channel, 公群导航 @dabai, is used to direct threat actors to different private/public Telegram channels to coordinate and collaborate on campaigns targeting both Chinese-speaking and non-Chinese-speaking victims. Below is a list of the service categories offered on the public Telegram groups on Dabai Guarantee. Each category has subcategories for more specific services. Each public Telegram group has a unique group number, the amount of the deposit made to Dabai Guarantee in USDT, the handles of group administrators and customer service representatives, the transaction rules, and a dedicated cryptocurrency wallet. More information can be found in Figure 1. These specialized channels include the following:</p>
        <ul>
          <li>“海外钓鱼类” (“Overseas Phishing”) — Coordinate phishing campaigns against individuals residing outside of China</li>
          <li>“买卖类” (“Trading”) — Buy and sell gift cards, databases, SIM cards, social media burner accounts, IP addresses, and physical goods</li>
          <li>“引流类” (“Traffic generation methods”) — Overseas SMS blasts, Baidu promotions, chat scripts, and other services</li>
          <li>“承兑类” (“Acceptance methods”) — Payment methods accepted by merchants include Alipay, WeChat Pay, and cryptocurrencies</li>
          <li>“通道合作类” (“Cooperation Channels”) — Motorcade teams to conduct overseas operations such as collecting or making payments via cash and cryptocurrencies, and logistic operations to move physical goods</li>
          <li>“短视频类” (“Short Videos”) — Short Douyin videos for promotions</li>
          <li>“合作类” (“Cooperation”) — ID Loans, Apple IDs, courier delivery services, and burner mobile phones</li>
          <li>“服务类” (“Services”) — SMS verification, file lookup, and graphic design services</li>
          <li>“卡商类” (“Carding Merchants”) — Money laundering through bank cards and contactless cash withdrawal without cards</li>
          <li>“搭建类” (“Developers”) — Software and bot setup services, and Apple signing/server/VPN/domain setup services</li>
          <li>“其他类” (“Others”) — Other miscellaneous fraud services, social escort services, police impersonation, artificial intelligence (AI), and search engine optimization (SEO)-related services</li>
          <li>“游戏类公群” (“Gaming-related public groups”) — Online gambling and video games</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ac90e51716ded086084b8b61e326f067431b0df5.png?width=750&amp;format=png&amp;optimize=medium" width="1080" height="1416" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>Dabai Guarantee’s public navigation purpose Telegram channel “公群导航 @dabai”, with listed categories</em> <em>(Source: Telegram)</em></div>
          </div>
        </div>
        <h2>Dabai Guarantee’s Rules (@dabai_e)</h2>
        <p>Dabai Guarantee’s rules channel (@dabai_e) has posted rules to prevent impersonation of the marketplace and to prevent users from creating their own “public groups” that are not officially regulated by Dabai Guarantee’s administrators. Some of the rules also showcase Dabai Guarantee’s OPSEC measures to prevent scamming and impersonation. The original Chinese text is in <strong>Appendix B</strong>. The following are some key rules:</p>
        <ul>
          <li>Members are not allowed to create their own public group channel without Dabai Guarantee`s approval.</li>
          <li>Members are not allowed to have private dealings with other parties or platforms, as Dabai Guarantee only guarantees transactions conducted on its platform. Dabai Guarantee also does not provide assurances for transactions with the Public Group “boss” or any other administrator. This means that no individual should have any transactions with the boss directly and should instead use Dabai Guarantee’s funds transfer mechanism.</li>
          <li>Individuals who initiate a chat session with you are 100% scammers; members are to block and refrain from chatting with them.</li>
          <li>The cryptocurrency address belonging to Dabai Guarantee is unique, and anyone sending other deposit addresses is a scammer.</li>
          <li>After members have staked their cryptocurrency as deposits, they are required to send Dabai Guarantee’s leadership screenshots of the deposit to @dabai for verification and confirmation. Any losses resulting from failure to contact @dabai will be the member’s responsibility.</li>
        </ul>
        <h2>Case Study: Public Group 301</h2>
        <h3>Group Structure</h3>
        <p>For this report, we will use the Telegram channel “Public Group 301,” which belongs to Dabai Guarantee, as a case study. This is not meant to be a comprehensive analysis of Dabai Guarantee’s massive infrastructure and that of other Chinese-language guarantee marketplaces. It is difficult to accurately quantify how many “Public Group” channels and threat groups are on Dabai Guarantee, as the numbers tagged to Public Groups are not assigned in chronological order, resulting in a lack of visibility — unlike Huione Guarantee, which had a clearnet website that listed the Public Group channels to redirect threat actors. Although there are thousands of channels belonging to Dabai Guarantee alone, understanding Public Group 301’s structure can at least provide insight into how threat actors use Dabai Guarantee in their campaigns.</p>
        <p>In guarantee marketplaces, threat actors looking to launch campaigns typically deposit USDT to start a public Telegram group approved by Dabai Guarantee. This model ensures that criminal syndicates do not have to deal with other threat actors directly, but have Dabai Guarantee as a mediator. In the case of Dabai Guarantee’s Public Group 301, affiliate threat groups do not have to engage directly with the group’s leader, @J0hnNo1, and instead receive payments from Dabai Guarantee after the completion of tasks required by @J0hnNo1. Guarantee marketplaces such as Huione, Tudou, Xinbi, and Dabai seek to eliminate the “lack of trust” among Chinese-speaking threat actors. These marketplaces are designed to become trusted platforms that foster coordination and cooperation between different Chinese-speaking criminal groups to achieve their objectives.</p>
        <p>Insikt Group navigated through Public Group 301’s Telegram infrastructure in order to identify the redirection flow. As shown in <strong>Figure 1</strong>, each category contains a hyperlink that redirects to other channels. From <strong>Figure 1</strong>, selecting category 5, sub-category 2 (“海外扫货车队”, or “Overseas Goods Sweeping Team”) redirected to a pinned message as seen in <strong>Figure 2</strong>. This message lists four different public channels (“公群”) containing campaigns targeting the US, Canada, South Korea, and Japan.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1dc5740cc91bfbd31fc40fea4e2d2e57696d5a535.png?width=750&amp;format=png&amp;optimize=medium" width="522" height="370" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Selecting “海外扫货车队” (Overseas Goods Sweeping Team) redirects users to four different Telegram groups, where threat actors are seen discussing and showing off their financial crime-related achievements in countries such as the US, Canada, South Korea, and Japan (Source: Telegram)</em></div>
          </div>
        </div>
        <p>As seen in <strong>Figure 2</strong>, “公群” refers to unique Public Group channels for specific purposes or operations. Each public channel here contains a numerical group identifier and a “U” deposit amount, where “U” refers to USDT. For example, “公群935已押2000U” refers to Public Group Number 935, with 2,000 USDT already being deposited in Dabai Guarantee to start the campaign. The naming convention for these Public Groups is ”dbtmxxx”; in this case, Public Group Number 935 will have the Telegram channel @dbtm935. When selecting the second option, “公群301已押1000U韩国，日本扫货组”, which means Public Group Number 301, with 1,000 USDT already deposited to “sweep goods” in South Korea and Japan, the corresponding Telegram channel is @dbtm301.</p>
        <p>Upon further investigation and analysis of the channel, Insikt Group assesses that “sweeping goods” refers to the use of illicit means, such as ghost-tapping, to purchase physical goods at physical retail stores (in this case, in South Korea and Japan). This activity also includes ATM cash withdrawals at Japanese or South Korean ATMs.</p>
        <h2>Key Personnel Involved in Public Group 301</h2>
        <p>The following terms are important for understanding the operations of criminals involved in Public Group 301, and the entire Dabai Guarantee infrastructure more broadly:</p>
        <ul>
          <li><strong>Boss (“群老板”)</strong>: The main coordinator overseeing a group’s operations. These individuals are not directly related to Dabai Guarantee and operate more like customers, making use of Dabai Guarantee’s infrastructure to lay out tasks and promising payouts in USDT upon completion. The boss will typically start a campaign by placing significant deposits into Dabai Guarantee’s USDT cryptocurrency addresses (“上押地址”) in order to get Dabai Guarantee’s administrators to approve the creation of a Public Group channel. In Dabai Guarantee’s Public Group 301 (@dbtm301), @J0hnNo1 is the boss of the channel. We observed that this threat actor intends to conduct ghost-tapping and fraud campaigns in Japan and South Korea, with the key objective of obtaining physical goods, cash, and funds through unauthorized transactions. Once the boss confirms receipt of the items and is satisfied with the outcome, they can ask Dabai Guarantee to release the payment to the criminals who participated in the requested task.</li>
          <li><strong>Channel Administrators (“管理员”)</strong>: Dabai Guarantee’s personnel who act as intermediaries between the boss and other Chinese syndicates, ensuring that the boss gets the items and physical cash, while the Chinese syndicates are paid in USDT. These are the people who will process the payments. Channel administrators will also inspect video evidence provided by sweeping and “goods-receiving” teams and wait for confirmation from the boss that everything is satisfactory before releasing payments to the various Chinese-speaking criminal groups.</li>
          <li><strong>Chinese Syndicates (“犯罪组织”)</strong>: Teams in charge of providing the people (“mules”) to form sweeping and goods-receiving teams. These syndicates will coordinate with the boss and receive payment in USDT after completing the required jobs.</li>
          <li><strong>Sweeping Teams (“扫货队”)</strong>: Personnel tasked by the boss or other administrators with obtaining physical goods or conducting ATM cash withdrawals, typically through illegal methods such as ghost-tapping or financial fraud, and to eventually transfer the goods to “goods receiving” teams.</li>
          <li><strong>Goods Receiving Teams</strong> <strong>(“收货队”)</strong>: Personnel tasked by either the boss or their respective Chinese syndicates with receiving goods from sweeping teams; the items will eventually have to reach the “goods inspection teams.”</li>
          <li><strong>Goods Inspection Teams</strong> <strong>(“检货队”)</strong>: Personnel tasked with physically inspecting the goods and cash being delivered by the sweeping or goods-receiving teams, typically appointed by bosses. When the “goods receiving” team is appointed by the boss, it is also possible that the “goods receiving” and “goods inspection” teams are composed of the same personnel, each fulfilling multiple roles. These teams will inform the boss whether the physical goods are satisfactory, and the boss will proceed to ask Dabai Guarantee to release the payment to the sweeping and goods-receiving teams.</li>
        </ul>
        <p>Insikt Group assesses that individuals in the sweeping, goods receiving, and goods inspection teams act as mules, and these teams likely consist of Chinese-speaking tourists who can amass large quantities of physical goods and cash and exit the targeted countries as soon as possible. It is also likely that Chinese-speaking groups have members who are long-term residents of the countries targeted by the operations, such as South Korea and Japan.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ce97c73277009b6799b7752814a9e1939b12c826.png?width=750&amp;format=png&amp;optimize=medium" width="2048" height="1136" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3:</strong></em> <em>Simplified illustration of Dabai Guarantee Public Group 301’s structure (Source: Recorded Future Data)</em></div>
          </div>
        </div>
        <p><strong>Figure 3</strong> is a simplified illustration of Dabai Guarantee’s Public Group 301’s organizational structure. The barrier to entry for participating in “sweeping operations” is low, as participants just need to have the legal right to enter Japan or South Korea, pose as tourists, and follow the instructions given by the boss and other administrators. We estimate that there are likely more than a dozen sweeping teams linked to Dabai Guarantee operating in Japan and South Korea alone. Sweeping teams are likely assigned to obtain certain goods and cash in very specific areas and do not coordinate with one another because they are being deployed by different Chinese syndicates. This model suggests that operations are siloed, where teams act as independent, isolated units that restrict the sharing of information, resources, and goals.</p>
        <p><strong>Figure 4</strong> shows the Telegram structure of Public Group 301, where @J0hnNo1 is the channel's boss. The channel is also composed of multiple Dabai Guarantee customer service staff, who serve as administrators. The original creator of the channel is @dbwb22; the Telegram account is no longer active, and @dbwb22 is no longer listed as one of Dabai Guarantee’s official customer service agents.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_12cb2147fb7aff18951a78baf893e89a34edd837f.png?width=750&amp;format=png&amp;optimize=medium" width="782" height="2004" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>List of key personnel in Dabai Guarantee’s Public Group 301 (@dbtm301); @J0hnNo1 is listed as this group’s public channel boss (Source: Telegram)</em></div>
          </div>
        </div>
        <p>The distribution of these teams significantly complicates efforts by researchers and law enforcement agencies to track and deter such criminal activities. For example, if members of “Sweeping Team A” are arrested for retail or financial fraud, law enforcement agencies will still need to locate the members of the “Goods Receiving Teams” and “Goods Inspection Teams” before they can even get close to decoding the identity of the boss, who is most likely coordinating operations from a location outside Japan or South Korea’s jurisdiction, such as Cambodia or Myanmar. Additionally, these sweeping teams most likely consist of low-level mules who are considered “expendables” by their Chinese syndicate recruiters. The screenshots in <strong>Figures 6, 7, 8, 9, and 10</strong> illustrate the siloed operations conducted by different sweeping teams.</p>
        <p><strong>Figure 5</strong> shows Dabai Guarantee customer service personnel @dbtm9 helping to set up public Telegram channel 301 on March 21, 2025, and serving as the channel’s key administrator. This individual serves as a mediator to facilitate transactions and dealings between the boss and other threat actors. The total amount of USDT deposited on that date was 485 USDT; as of this writing, it has risen to 1,000 USDT. The purpose of this channel is to encourage other threat actors to cooperate by taking part in sweeping and goods-receiving operations in Japan and South Korea. In the conversation below, the boss stated that the deposit amount will increase in proportion to the transaction amount. Insikt Group assesses that this would mean the sum of deposit scales with the size of operations in Japan and South Korea.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1e4ba0252148a2f85be1271c5233aa23507494356.png?width=750&amp;format=png&amp;optimize=medium" width="1684" height="1472" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 5:</strong></em> <em>Screenshot of Public Group 301’s (@dbtm301) administrator (@dbtm9) establishing a group for “sweeping goods” and “receiving goods” operations in South Korea and Japan</em></div>
          </div>
        </div>
        <p><strong>Figure 6</strong> shows that the boss is looking to recruit sweeping teams to conduct operations in Seoul, South Korea. The main objective is to purchase cosmetics, and once the goods have been delivered, the rewards will be “high.” The final sentence uses the term “速度快”, which means that the boss welcomes any sweeping team that can conduct and complete these operations quickly.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1cd95d17ea177ec9d4e1b12fc8c5afc5e93de569c.png?width=750&amp;format=png&amp;optimize=medium" width="998" height="308" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 6:</strong></em> <em>Screenshot of Public Group 301 “boss” @J0hnNo1 recruiting sweeping teams to purchase cosmetics in Seoul, South Korea (Source: Telegram)</em></div>
          </div>
        </div>
        <p><strong>Figure 7</strong> features a sweeping team involved in purchasing tobacco-related products from the Terea brand at a CU store, a South Korean convenience store chain in Seoul, South Korea. It is clear that the boss has goods from specific brands they wish to obtain, and such goods may be resold for cash in other foreign markets at a later date, likely at a lower price to obtain hard currency as soon as possible. Insikt Group assesses that the items are very likely purchased using the ghost-tapping attack vector or through stolen payment card information. This reflects a shift from targeting luxury retailers to smaller-sized businesses, likely to avoid arousing suspicion from law enforcement authorities</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ec36809b177102807f30cd70ff0013ec163416c0.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="960" height="1280" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 7:</strong></em> <em>Public Group 301’s boss @J0hnNo1 showing a CU receipt of tobacco sticks belonging to the Terea brand totaling 288,000 won, worth approximately $196 on March 25, 2025 (Source: Telegram)</em></div>
          </div>
        </div>
        <p><strong>Figure 8</strong> shows an Apple Store receipt listing unspecified Apple products totaling 499,600 yen (approximately $3,145.66, as of this writing). Public Group 301’s boss @J0hnNo1 also stated, “Who said there are no large transactions in Japan? Just a single receipt amounted to 500,000 Yen.” This is likely a post encouraging syndicates to send more sweeping teams to acquire as many Apple products as possible, while hinting that the rewards could be lucrative.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_197847c84c68f184bea9d618c370a0a4d8560fb9c.png?width=750&amp;format=png&amp;optimize=medium" width="772" height="1770" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 8:</strong></em> <em>Public Group 301’s boss @J0hnNo1 showing an Apple store receipt of items totaling 499,600 yen, approximately $3,145.66 on December 28, 2025 (Source: Telegram)</em></div>
          </div>
        </div>
        <p><strong>Figure 9</strong> provides some evidence that Vietnamese individuals are also involved in sweeping operations. In the top-left corner of the iPhone in the image, the Vietnamese phrase "Không có SIM" means "No SIM card." This indicates that the person holding the phone is very likely a Vietnamese-speaking individual conducting unauthorized banking transactions using burner iPhones. Every single burner phone appears to be tagged with a label, which is very similar to the tactics, techniques, and procedures (TTPs) we documented in our Insikt Group report on ghost-tapping. It is also likely that this individual understands Japanese in addition to Chinese, as they were observed interacting with a Japanese banking application that displayed processed transactions. The transactions shown in the screenshot are dated between July 30, 2025, and August 28, 2025. The ability to use Japanese banking applications is an indicator that this individual is legally residing in Japan. In general, most Japanese banks require foreigners to close their bank accounts before leaving permanently; these regulations are <a href="https://www.sbishinseibank.co.jp/english/powerflex/closing_account.html">implemented</a> by major Japanese banks such as Shinsei Bank.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1b0942315a93ecff4b6991a5404f277d589afeedf.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="960" height="1280" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 9:</strong></em> <em>Image posted by Public Group 301’s boss @J0hnNo1 involving multiple unauthorized banking transactions from July 30, 2025, to August 2025. Insikt Group assesses that this is indicative of a ghost-tapping campaign targeting Japanese retail businesses involving multiple Apple burner iPhones on August 28, 2025 (Source: Telegram)</em></div>
          </div>
        </div>
        <p><strong>Figure 10</strong> shows what appears to be an ATM cash withdrawal or transfer attempt at a Japanese ATM at an unspecified bank. This screenshot is also likely shown as an example of what sweeping teams in charge of withdrawing and transferring cash are expected and required to do.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1d6df5acc276b6ea526ffbf9567dd7154e6dd5dc1.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="960" height="1280" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 10:</strong></em> <em>Public Group 301’s boss @J0hnNo1 posted an image of what Insikt Group assesses to be an ATM cash withdrawal/transfer using a Japanese ATM machine on April 23, 2025 (Source: Telegram)</em></div>
          </div>
        </div>
        <p><strong>Figure 11</strong> shows a cryptocurrency transaction of 10,629 USDT via the Tron (TRX) network to a sweeping team for the successful completion of the “mission.” The boss @J0hnNo1 thanked the sweeping team coordinator without identifying them. The exact phrase used while posting the image was “感谢老板信任”, which translates from Chinese to “Thank you boss for trusting me.” Boss, in this context, refers to the Chinese syndicates that provide the sweeping teams for successful operations. In the entire Dabai Guarantee Public Group 301 channel, there were many screenshots of such cryptocurrency transactions being sent to teams that participated in sweeping operations. The boss redacts recipients' cryptocurrency wallet addresses to prevent law enforcement agencies from tracking them. The TRON wallet address used by Public Group 301 is TByDzGWCirpCABaUorkhz5eWhjyDdYWgSo, as shown in <strong>Figure 11</strong>; this wallet address has facilitated a total of 2,943 transactions as of this writing.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_104ad8a1582e89967c3c09082c6db0503fa4c2c0d.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="946" height="2048" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 11:</strong></em> <em>Multiple screenshots involving USDT transactions are posted on the channel, likely for transparency and to reassure the sweeping teams (Source: Telegram)</em></div>
          </div>
        </div>
        <h2>Dabai Guarantee’s Staff and Customer Service Functions (@dabai_f)</h2>
        <p>Dabai Guarantee maintains a list of its official staff and customer service agents on its Telegram channel @dabai_f to facilitate the creation of Public Group channels and transactions. This system also helps prevent impersonation and scamming. Members are to contact customer service agents directly for any queries or concerns. The staff and customer service teams usually provide the functions listed in <strong>Tables 1 and 2</strong>; the customer service agents are listed in <strong>Figure 12</strong> by their functions and Telegram handles.</p>
        <div>
          <div>
            <div>Chinese Term</div>
            <div>English Term</div>
            <div>Explanation of Function</div>
            <div>Telegram Moniker/Channel</div>
          </div>
          <div>
            <div>大白公群</div>
            <div>Main Dabai Public Group</div>
            <div>Dabai Guarantee’s directory, to help threat actors navigate through different aspects of cybercrime</div>
            <div>@dabai_a</div>
          </div>
          <div>
            <div>供求信息</div>
            <div>Supply and demand information</div>
            <div>A channel where Dabai Guarantee’s administrators post advertisements on behalf of their customers (other threat actors)</div>
            <div>@dabaiyajing</div>
          </div>
          <div>
            <div>核心大群</div>
            <div>Core group</div>
            <div>A channel where other threat actors can post their own advertisements and URLs for their websites, as well as key contact information, such as Telegram monikers</div>
            <div>@dabai_c</div>
          </div>
          <div>
            <div>客服频道</div>
            <div>Dabai Guarantee’s official customer service channel</div>
            <div>A channel for individuals to reach out to customer service officers who cater to different categories of cybercrime</div>
            <div>@dabai_f</div>
          </div>
          <div>
            <div>人工客服 @dabai 咨询、拉群、广告</div>
            <div>Human customer service agents for consultation, group chat, and advertising</div>
            <div>A bot channel that redirects individuals to human customer service agents for consultation, group chat, and advertising</div>
            <div>@dabai</div>
          </div>
          <div>
            <div>人工客服 @dabai 会员、解封、投诉</div>
            <div>Human customer service agents for membership queries, unblocking accounts, and complaints</div>
            <div>A bot channel that redirects individuals to human customer service agents for membership queries, unblocking accounts, and complaints</div>
            <div>@dabai</div>
          </div>
          <div>
            <div>人工客服 @dabai 验群、丢失群恢复</div>
            <div>Human customer service agents for group verification and lost group recovery</div>
            <div>
              <p>This is to prevent impersonation, such as threat actors starting their own Public Group that is not officially approved by Dabai Guarantee.</p>
              <p>There may be instances where Telegram deletes public channels for violating the terms of service, and the customer service team offers a service to restore them (This happened to Huione and Xinbi Guarantee; many of their channels were deleted by Telegram).</p>
            </div>
            <div>@dabai</div>
          </div>
          <div>
            <div>人工客服 @dabai 纠纷仲裁、资源对接</div>
            <div>Human customer service agents for dispute arbitration and resource matching</div>
            <div>
              <p>Customer service agents will attempt to resolve disputes between criminal groups when an unsatisfactory outcome is reached for one or more parties. They can also moderate disputes on transactions between buyers and sellers.</p>
              <p>Resource matching refers to customer service agents attempting to match criminal groups to certain existing groups that are already participating in specific campaigns. In addition, customer service agents can connect buyers with sellers of goods and services.</p>
            </div>
            <div>@dabai</div>
          </div>
          <div>
            <div>24小时客服机器人</div>
            <div>24-hour customer service bot</div>
            <div>@dabai</div>
          </div>
          <div>
            <div>公群报备机器人</div>
            <div>Public Group reporting bot</div>
            <div>A bot that assists members in reporting violations of the terms of service</div>
            <div>@dbhwbb_BOT</div>
          </div>
          <div>
            <div>公群记账机器人</div>
            <div>Public Group accounting bot</div>
            <div>A bot that can help to look up transactions, real-time USDT pricing in relation to Chinese Renminbi (RMB), and cryptocurrency wallet monitoring</div>
            <div>@dbjz_bot</div>
          </div>
          <div>
            <div>
              <p>客服人员名单 (@dbtm0 - @dbtm10 ）</p>
              <p>所有号标配 +888 虚拟号 没有一律骗子</p>
            </div>
            <div>
              <p>Customer service staff lists (@dbtm0 – @dbtm10)</p>
              <p>All customer service numbers come with a +888 virtual number. Any number without this is a scam.</p>
            </div>
            <div>@dbtm0 – @dbtm10</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>List of Dabai Guarantee’s official staff and functions (Source: Telegram, Recorded Future)</em></p>
        <div>
          <div>
            <div>Chinese Term</div>
            <div>English Term</div>
            <div>Explanation of Function</div>
            <div>Telegram Moniker/Channel</div>
          </div>
          <div>
            <div>业务号（大白）</div>
            <div>Business account (Dabai)</div>
            <div>A business account belonging to a person called Dabai, with no specific function stated</div>
            <div>@dbtm1</div>
          </div>
          <div>
            <div>业务号（萌萌）</div>
            <div>Business account (“Mengmeng” — Admin’s moniker)</div>
            <div>A business account belonging to a person called Mengmeng, with no specific function stated</div>
            <div>@dbtm9</div>
          </div>
          <div>
            <div>专群交易员</div>
            <div>Specialist traders</div>
            <div>A group of agents well-versed in certain types of trade to facilitate coordination and cooperation in the public channels</div>
            <div>
              <p>@dbtm0</p>
              <p>@dbtm3</p>
              <p>@dbtm4</p>
            </div>
          </div>
          <div>
            <div>公群交易员</div>
            <div>Public Group traders</div>
            <div>A group of agents who facilitate cryptocurrency transactions, receive deposits, and release payments to other criminal groups</div>
            <div>
              <p>@dbtm7</p>
              <p>@dbtm8</p>
              <p>@dbtm10</p>
            </div>
          </div>
          <div>
            <div>公群巡查号</div>
            <div>Public Group patrol account</div>
            <div>A group of agents who direct individuals to specific Public Group channels based on what they are looking for</div>
            <div>@dbtm2</div>
          </div>
          <div>
            <div>担保仲裁号</div>
            <div>Guarantee arbitration number</div>
            <div>A case reference number assigned by agents for any disputes between parties</div>
            <div>@dbtm5</div>
          </div>
          <div>
            <div>资源对接号</div>
            <div>Resource docking number</div>
            <div>A unique number is assigned to a case or transaction to track conversational and transaction records</div>
            <div>@dbtm6</div>
          </div>
        </div>
        <p><em><strong>Table 2:</strong></em> <em>List of Dabai Guarantee’s customer service agents (Source: Telegram, Recorded Future)</em></p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_115f4cbdef7c0992c48bda0b9b9ad1ce45fc57c4d.png?width=750&amp;format=png&amp;optimize=medium" width="946" height="1794" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 12:</strong></em> <em>Dabai Guarantee customer service Telegram channel “大白担保客服人员名单” (@dabai_f) provides a list of customer service agents (Source: Telegram)</em></div>
          </div>
        </div>
        <h2>Automated Bot System Directs Chinese Syndicates to Relevant Public Groups for Existing Campaigns</h2>
        <p>Insikt Group analyzed the public administrator bot @dbdbqg_bot to observe how a Dabai Guarantee user would be routed by the platform to participate in cybercriminal activities. To use this functionality, individuals must enter search terms in Mandarin. We used the terms 远程 (remote) and 数据 (data), which returned three and ten public channels, respectively. When querying for the term “远程” (remote), which typically refers to ghost-tapping campaigns involving NFC relay methods, three Public Group channels appeared as relevant results. When querying for the term “数据” (data), which typically refers to databases, ten Public Group channels specializing in datasets appeared in the results. In addition, using a country as a search term, such as 美国 (US), will also return results that show fraud or cyber campaigns targeting the US. This bot function demonstrates how easy it is for criminal groups to search for relevant groups, determine which campaigns they wish to participate in, and identify the types of datasets they are interested in procuring. <strong>Table 3</strong> shows the number of Public Group channels involved in fraud or cyber campaigns for the search terms; specific details are not listed due to certain global entities named in the Public Group channels belonging to Dabai Guarantee.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_15f049bcf72922d6642cce624cc2defd779717f0b.png?width=750&amp;format=png&amp;optimize=medium" width="2048" height="1499" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 13:</strong></em> <em>Dabai Guarantee’s public administrator bot @dbdbqg_bot has a search function that will return results relevant to the individual’s search (Source: Recorded Future Data)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>Chinese Criminal Lingo and Corresponding English Meaning</div>
            <div>Number of Channels Returned as Search Results</div>
            <div>Explanation of Function</div>
            <div>Telegram Channels</div>
          </div>
          <div>
            <div>远程 (Remote)</div>
            <div>3</div>
            <div>Ghost-tapping/remote NFC-related payment card fraud involving point-of-sale (POS) terminals</div>
            <div>
              <p>@dbtm153 (64 members, 800 USDT deposit as of writing)</p>
              <p>@dbtm439 (49 members, 777 USDT deposit as of writing)</p>
              <p>@dbtm307 (268 members, 500 USDT deposit as of writing)</p>
            </div>
          </div>
          <div>
            <div>数据 (Data)</div>
            <div>10</div>
            <div>Threat actors buying and selling databases</div>
            <div>
              <p>@dbtm123 (519 members, 888 USDT deposit as of writing)</p>
              <p>@dbtm99 (49 members, 500 USDT deposit as of writing)</p>
              <p>@dbtm688 (151 members, 500 USDT deposit as of writing)</p>
              <p>@dbtm369 (65 members, 500 USDT deposit as of writing)</p>
              <p>@dbtm567 (80 members, 2,888 USDT deposit as of writing)</p>
              <p>@dbtm449 (177 members, 500 USDT deposit as of writing)</p>
              <p>@dbtm298 (145 members, 500 USDT deposit as of writing)</p>
              <p>@dbtm327 (89 members, 500 USDT deposit as of writing)</p>
              <p>@dbtm211 (836 members, 500 USDT deposit as of writing)</p>
              <p>@dbtm816 (851 members, 500 USDT deposit as of writing)</p>
            </div>
          </div>
          <div>
            <div>美国 (US)</div>
            <div>2</div>
            <div>Fraud or cyber campaigns targeting US entities</div>
            <div>
              <p>@dbtm322 (338 members, 500 USDT deposit as of writing)</p>
              <p>@dbtm932 (956 members, 500 USDT deposit as of writing)</p>
            </div>
          </div>
          <div>
            <div>钓鱼 (Phishing)</div>
            <div>1</div>
            <div>Phishing campaigns</div>
            <div>@dbtm142 (234 members, 500 USDT deposit as of writing)</div>
          </div>
          <div>
            <div>账号 (Account)</div>
            <div>2</div>
            <div>Burner accounts being used for fraud campaigns</div>
            <div>
              <p>@dbtm322 (338 members, 500 USDT deposit as of writing)</p>
              <p>@dbtm425 (60 members, 500 USDT deposit as of writing)</p>
            </div>
          </div>
          <div>
            <div>银行 (Bank)</div>
            <div>2</div>
            <div>Fraud campaigns targeting or involving banks worldwide</div>
            <div>
              <p>@dbtm420 (117 members, 500 USDT deposit as of writing)</p>
              <p>@dbtm138 (50 members, 1,000 USDT deposit as of writing)</p>
            </div>
          </div>
        </div>
        <p><em><strong>Table 3:</strong></em> <em>Search results of Dabai Guarantee’s Public Group channels using their bot function (Source: Telegram, Recorded Future)</em></p>
        <h2>Outlook</h2>
        <p>Even with guarantee marketplaces such as Huione Guarantee being shut down, many Chinese criminals are likely turning to these Telegram-based guarantee marketplaces to sell illicit goods and to offer their services. Guarantee marketplaces such as Dabai Guarantee have demonstrated their ability to coordinate operations in countries such as Japan, South Korea, Canada, and the US by using Chinese-speaking individuals who are traveling or residing in those geographies to conduct retail and financial fraud. Over time, Dabai Guarantee may be able to establish itself as a trusted escrow platform for Chinese syndicates to rely on, despite the growing competition from existing and new guarantee marketplaces. There is also a possibility that operators of other guarantee marketplaces could execute an exit scam, leading to a loss of trust in guarantee marketplaces as a whole among Chinese criminals.</p>
        <p>Threat actors such as @J0hnNo1, the leader of Dabai Guarantee Public Group 301, seek to obtain physical goods and foreign currency through illegal means, giving specific instructions to different syndicates to complete their objectives. Such operations are scalable on demand and will become harder to track and disrupt over time due to the siloed nature of the sweeping and goods-receiving teams. This report showcases the activities and structure of a single group (Public Group 301), which is only one group among hundreds under Dabai Guarantee’s decentralized and growing infrastructure. Ghost-tapping and ATM withdrawals are commonly used by Chinese-speaking criminals for money laundering, and we will likely continue to see more threat actors facilitating such financial and retail-related crime on multiple guarantee marketplaces.</p>
        <p>Insikt Group assesses that Chinese syndicates will continue to recruit and deploy non-Chinese individuals with specific language skills to participate in campaigns, as exemplified by the Vietnamese individual mentioned in <strong>Figure 9</strong>.</p>
        <p>Insikt Group assesses that guarantee marketplaces have solidified themselves as a major alternative to traditional Chinese-language dark web marketplaces. This decentralized model is becoming increasingly popular among the global Chinese-speaking criminal diaspora, enabling criminals without sophisticated skillsets to coordinate with syndicates and participate in operations that require physical elements.</p>
        <h2>Appendix A: Glossary of Terms</h2>
        <div>
          <div>
            <div>Chinese</div>
            <div>Direct Translation</div>
            <div>Definition with Relevant Context</div>
          </div>
          <div>
            <div>公群</div>
            <div>Public Group</div>
            <div>Public Telegram channel/group facilitates a specific campaign, usually ending with a number; for example, 公群 1025 means Public Group 1025</div>
          </div>
          <div>
            <div>飞机</div>
            <div>Plane</div>
            <div>Cryptocurrency</div>
          </div>
          <div>
            <div>退押</div>
            <div>Backing down</div>
            <div>Withdrawal of funds from a Public Group</div>
          </div>
          <div>
            <div>交易所地址</div>
            <div>Transaction address</div>
            <div>Cryptocurrency transaction wallet address</div>
          </div>
          <div>
            <div>上押地址</div>
            <div>Betting/Staking Address</div>
            <div>Unique cryptocurrency addresses owned by Dabai Guarantee are usually listed in Public Groups. Threat actors who wish to launch a specific campaign must stake enough cryptocurrency as a deposit to create a Public Group channel; they will become the channel's “boss.”</div>
          </div>
          <div>
            <div>私下拉群做单</div>
            <div>Privately soliciting orders</div>
          </div>
          <div>
            <div>拉黑</div>
            <div>Blackmail</div>
            <div>When an individual blocks someone who contacts them directly (Dabai Guarantee’s staff will never initiate private chats with any individual)</div>
          </div>
          <div>
            <div>拉群</div>
            <div>Pull the crowd</div>
            <div>Start a new public Telegram group and get people to join it so other criminal groups can participate in a new, specific campaign</div>
          </div>
          <div>
            <div>扫货</div>
            <div>Sweep goods</div>
            <div>To obtain physical goods or conduct ATM cash withdrawals, typically through illegal methods such as ghost-tapping or financial fraud</div>
          </div>
          <div>
            <div>收货</div>
            <div>Receive goods</div>
            <div>To receive goods, typically obtained by sweeping teams via illegal means</div>
          </div>
          <div>
            <div>群老板</div>
            <div>Group boss</div>
            <div>Main coordinator to coordinate with other Chinese-speaking criminal groups for cyber and/or fraud campaigns; individuals who staked USDT to get approval to start a Public Group channel on Dabai Guarantee</div>
          </div>
          <div>
            <div>冒充</div>
            <div>Impersonate</div>
            <div>Some scammers may impersonate group bosses or create Telegram groups with the intention of scamming other Chinese syndicates.</div>
          </div>
          <div>
            <div>钱包监听</div>
            <div>Wallet monitoring</div>
            <div>To monitor cryptocurrency transactions in real time</div>
          </div>
          <div>
            <div>实时U价</div>
            <div>Real-time USDT value in relation to the Chinese Renminbi</div>
          </div>
        </div>
        <h2>Appendix B: Key Rules Written in Mandarin</h2>
        <p><em>(Translation available on p. 7)</em></p>
        <p>⚠️交易注意事项⚠️</p>
        <p>1.进群交易请先看置顶里面的群规则，交易过程请严格按照交易规则进行，群内所有事情请联系群内交易员 ，私下交易或者其他地方交易，后果自负，大白担保只担保本群内的交易。</p>
        <p>2.大白担保业务只担保我们的公群内已经报备过的交易，我们不为公群老板或者其他管理员个人做担保，公群群老板对自己的业务员负责，如果群内业务员违规操作，由公群老板负责。</p>
        <p>3.禁止以公群名义私下拉群做单，禁止金额不透明，如被用户举报后果自负。</p>
        <p>4.大白担保工作人员不会主动私聊你，主动私聊你的100%都是骗子，请直接拉黑。</p>
        <p>5.大白担保的上押地址是唯一的,发其它上押地址的一定是骗子,请大家远离骗子。</p>
        <p>6.客户上押后,请及时发送上押截图与我们 @dabai 核实确认,如长时间未找 @dabai 核实确认押金而造成的损失由自己负责。</p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_12a2b50348f87fdac796e23309b50952256de876b.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[AI Hype vs. Reality: Is AI Really Rewriting the Vulnerability Equation?]]></title>
            <link>https://www.recordedfuture.com/blog/ai-hype-vs-reality</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/ai-hype-vs-reality</guid>
            <pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[AI vulnerability research and discovery capabilities are improving, but they have not changed the fundamentals of vulnerability management.]]></description>
            <content:encoded><![CDATA[
        <p>AI vulnerability research and discovery capabilities are improving, but they have not changed the fundamentals of vulnerability management. Instead, they are scaling up problems familiar to vulnerability managers: patch prioritization and remediation backlogs.</p>
        <p>For defenders, the timeline for determining which vulnerabilities matter most and remediating them before exploitation begins is narrowing, even as the overall volume of vulnerabilities rises. Organizations that rely on manual prioritization, slow patch cycles, or legacy software will face growing operational and security risks.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1fb4a4f2fe7e8c18423993bce78372f9b03bc2cb9.png?width=750&amp;format=png&amp;optimize=medium" width="2048" height="1111" />
            </div>
          </div>
          <div>
            <div><strong>Figure 1:</strong> Reality versus hype of automated vulnerability research</div>
          </div>
        </div>
        <h2>The Vulnerability to Exploit Ratio</h2>
        <p>Vulnerabilities are software flaws attackers can use to gain access, run malicious code, escalate privileges, or disrupt operations. However, not every bug becomes a real-world threat: many are hard to reach, difficult to weaponize, or simply not worth an attacker’s time.</p>
        <p>The total number of disclosed vulnerabilities has increased sharply in recent years, rising from roughly 21,000 in 2021 to nearly 50,000 in 2025. Part of that increase likely reflects stronger disclosure practices and bug bounty activity, though software growth, a broader attack surface, and more systematic reporting also play a role. Nonetheless, in 2025, Recorded Future only identified 446 vulnerabilities that were actively exploited in the wild, a reminder that confirmed exploitations remain a small fraction of total disclosures.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Chart" src="https://www.recordedfuture.com/media_18527fc82a41818c43e47e083747868e40ae2a8c2.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="704" height="413" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Yearly comparison of disclosed CVEs against CVEs with public exploits and vulnerabilities assessed as actively exploited by the Cybersecurity and Infrastructure Agency’s Known Exploited Vulnerabilities (KEV) Catalog and Recorded Future, 2021-2025</em></div>
          </div>
        </div>
        <p>This is because attackers do not exploit every bug they find. Instead, they focus on developing exploits for the small subset of vulnerabilities that offer the best combination of reach, reliability, and return on investment, such as flaws that can be exploited remotely or affect widely used software. In other words, a vulnerability still has to be validated, turned into a reliable exploit, matched to a target, and integrated into an attack path worth the effort.</p>
        <p>When a flaw matches the criteria, however, exploitation can <a href="https://www.vulncheck.com/blog/state-of-exploitation-2026">move quickly</a>. VulnCheck found that nearly 29% of KEVs in 2025 were exploited on or before CVE publication, a slight increase from the previous year, indicating the continued prevalence of zero-days and n-days. Much as their legitimate counterparts use AI in software development, adversaries are <a href="https://www.microsoft.com/en-us/security/blog/2026/03/06/ai-as-tradecraft-how-threat-actors-operationalize-ai/">already using</a> AI to accelerate parts of the attack workflow, including vulnerability research, exploit-path analysis, and malware development, even if its precise effect on exploitation timelines is hard to quantify. <a href="https://zerodayclock.com/collapse#the-math">Some trackers</a> estimate the median time-to-exploit may now be measured in hours rather than days, demonstrating the shortening window of time to act on a high-impact vulnerability.</p>
        <h2>How AI Changes the Equation</h2>
        <p>Anthropic and OpenAI recently drew significant attention through their limited release of what they claimed were uniquely powerful cyber defense models. An independent <a href="https://www.aisi.gov.uk/blog/our-evaluation-of-claude-mythos-previews-cyber-capabilities">evaluation</a> of Anthropic’s Mythos found significant improvements in multi-step cyberattack simulations. However, AI-assisted vulnerability discovery and penetration testing predate these models, and most frontier models have <a href="https://c3.unu.edu/blog/large-language-models-in-vulnerability-research-opportunities-and-responsibilities">already demonstrated</a> the ability to identify vulnerabilities and assist with exploit development. At present, these tools are still most effective in the hands of capable operators rather than enabling frictionless, low-skill exploitation at scale. This matters, too, as even if these capabilities are used primarily by security researchers in the near term, the resulting increase in disclosures, proofs of concept, and validated findings still adds to the defensive burden.</p>
        <p>This impacts vulnerability management in three important ways:</p>
        <ul>
          <li><strong>More credible vulnerability reports to triage:</strong> New agentic systems can do more than flag suspicious code; they can reason through program behavior, validate findings, and help identify which weaknesses appear most exploitable.</li>
          <li><strong>Less time to mitigate exploitable vulnerabilities:</strong> Large-language models (LLMs) are accelerating the speed and scale of weaponization, meaning the path from disclosure to exploit could go from hours to minutes.</li>
          <li><strong>Reduced the cost of exploit development:</strong> Emerging models appear more capable of producing proof-of-concept exploit code, testing attack paths, and helping skilled operators iterate toward weaponizable exploits faster than before.</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_10874cbebef535ea3d33f126ec3451367c311bee9.png?width=750&amp;format=png&amp;optimize=medium" width="2048" height="990" />
            </div>
          </div>
          <div>
            <div><strong>Figure 3:</strong> The vulnerability equation: How automated capabilities will likely impact reporting, exploit development, and impact</div>
          </div>
        </div>
        <h3>More Reports, More Noise</h3>
        <p>Using AI agents for software code will almost certainly increase the number of reported vulnerabilities and developed proofs-of-concept. Microsoft’s April 2026 Patch Tuesday, which followed Anthropic’s Project Glasswing announcement, was the company’s second-largest on record. However, according to <a href="https://www.theregister.com/2026/04/14/microsofts_massive_patch_tuesday/">Microsoft</a>, it “does not reflect a significant increase in AI‑driven discoveries, though [they] did credit one vulnerability to an Anthropic researcher using Claude.” The more important question is not whether more flaws will be found — because they will be — but whether defenders can process, validate, and prioritize them fast enough to act.</p>
        <p>Vulnerability submissions are already overwhelming researchers’ ability to <a href="https://www.nist.gov/news-events/news/2026/04/nist-updates-nvd-operations-address-record-cve-growth">assess</a> their overall risk, creating a backlog of vulnerability enrichment and scoring. If AI sharply increases the volume of plausible findings, defenders will face even more uncertainty around which vulnerabilities represent the next high-impact systemic event and which are background noise.</p>
        <h3>Less Time to Act</h3>
        <p>For the vulnerabilities that are actually a problem, defenders have even less time to respond. Automated exploit development will likely shorten the path from discovery to proof of concept and, in some cases, to weaponization for the subset of vulnerabilities worth pursuing. Adding to the triage problem, some medium-severity or otherwise “non-critical” vulnerabilities will need to be re-evaluated as possible components of exploit chains, even if they would not normally rank as urgent on their own.</p>
        <h3>Drowning out the Alarms</h3>
        <p>Even as defenders deal with more noise, a larger volume of reported, plausible findings is likely to increase the absolute number of high-impact exploits they need to address quickly. As a result, defenders face an even greater challenge in identifying the small subset of issues that matter most before attackers do.</p>
        <p>This does not mean every newly disclosed flaw will be weaponized, or that high-impact, “internet-breaking” events will become commonplace; however, even a modest increase in exploited vulnerabilities puts more pressure on prioritization, patching speed, and compensating controls, especially for organizations already struggling with manual triage, slow patch cycles, or legacy software.</p>
        <h2>How to Use Automation for Good</h2>
        <p>For most organizations, the immediate risk is not that every vulnerability will suddenly be exploited, but that defenders will have less time to determine which findings matter most. Vulnerability discovery and exposure management should therefore be treated as related but distinct problems: AI may increase the number of findings, but defenders still need context to determine which exposures are actually reachable, high-impact, and worth urgent remediation.</p>
        <p>In this environment, using AI-enabled vulnerability discovery, prioritization, and defensive remediation will be essential to keeping pace with attackers. The five actions listed in the following section can help organizations stay ahead of the threat.</p>
        <h3>1. Automate Vulnerability Prioritization and Response</h3>
        <p>Shift from CVSS-only scoring to real-time exploitability and exposure-based risk scoring to handle the surge in AI-assisted vulnerability discovery. Deploy automated scanning, validation, and threat hunting to identify exploitation activity quickly, especially in widely used software and internet-facing systems. Recorded Future’s Insikt Group regularly reports on new vulnerabilities and exploit trends and develops Nuclei templates to detect actively exploited vulnerabilities.</p>
        <h3>2. Accelerate Patching and Upgrade Cycles</h3>
        <p>As the time to exploit shifts from days to hours, the time to mitigate vulnerabilities will similarly shorten. Patch management will need to move faster, particularly for internet-facing systems, widely used software components, and critical dependencies. Automated remediation and automated compensating controls will likely become necessary to keep pace with AI-accelerated discovery. The Vulnerability Intelligence module in the Recorded Future Intelligence Operations Platform can help with prioritization based on the likelihood of exploitation. Ensure all automated actions are logged and regularly audited by a human, and require a human-in-the-loop for any actions on high-impact systems.</p>
        <h3>3. Reduce Dependence on Legacy and Unsupported Software</h3>
        <p>AI may make it easier for threat actors to identify and validate exploitable weaknesses in older, under-maintained codebases. Unsupported systems and aging software are likely to become increasingly difficult to justify unless they are strongly isolated and tightly controlled.</p>
        <h3>4. Shift Vulnerability Detection Earlier in the Software Lifecycle</h3>
        <p>Organizations should integrate automated security testing and AI-assisted vulnerability discovery into development pipelines. Early detection can help defenders fix vulnerabilities before production, reducing remediation burden later.</p>
        <h3>5. Get Ready for the Next High-Impact Event</h3>
        <p>Develop emergency response and mitigation playbooks specifically for high-impact, broadly applicable flaws, including scenarios where a patch is not immediately available. Preparation should include not just patching, but also containment measures such as segmentation, access restrictions, traffic filtering, and other compensating controls.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_11168f446613f5d773eced354e3680b7c6f41322f.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Emerging Enterprise Security Risks of AI]]></title>
            <link>https://www.recordedfuture.com/research/emerging-enterprise-security-risks-of-ai</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/emerging-enterprise-security-risks-of-ai</guid>
            <pubDate>Tue, 21 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Agentic AI adoption is accelerating rapidly as enterprise software and applications increasingly incorporate task-specific AI agents, enabling autonomous execution of complex tasks at machine speed.]]></description>
            <content:encoded><![CDATA[
        <h2>Summary</h2>
        <p><strong>Agentic AI adoption is accelerating rapidly</strong> as enterprise software and applications increasingly incorporate task-specific AI agents, enabling autonomous execution of complex tasks at machine speed.</p>
        <p><strong>The autonomy and scale of AI agents introduce significant enterprise risk</strong>, as errors, misconfigurations, or malicious manipulation can propagate quickly across interconnected systems, amplifying the potential impact of incidents.</p>
        <p><strong>Agentic AI will exacerbate existing weaknesses</strong> in software supply chains, as vulnerable or malicious open-source components can be deployed faster and at scale.</p>
        <p><strong>Identity and access management risks will also expand dramatically</strong>, as agents require broad, cross-environment permissions; compromised credentials, SSO platforms, or agent identities could enable large-scale service disruption or data exfiltration.</p>
        <p><strong>Prompt engineering enables threat actors to manipulate agents into carrying out malicious actions</strong>, underscoring the importance of layered security controls, zero-trust principles, and human-in-the-loop checkpoints to mitigate agent-driven threats.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1aae5bbeba42b48fad7665fc3c8a645e69f1e524d.png?width=750&amp;format=png&amp;optimize=medium" width="1271" height="622" />
            </div>
          </div>
          <div>
            <div><strong>Figure 1:</strong> AI agents have the potential to improve efficiency, reduce costs, and improve decision-making. However, the same features that make them so powerful will bring new security risks, and scale up old ones, if not managed effectively. (Image source: Recorded Future)</div>
          </div>
        </div>
        <h2>Analysis</h2>
        <p><strong>Agentic Artificial Intelligence Is Set to Expand Rapidly</strong></p>
        <p>“Agentic artificial intelligence” refers to AI systems that can <a href="https://www.ibm.com/think/topics/agentic-ai">do things</a> with limited human intervention. For example, traditional AI can draft code for a user who wants to build a website; agentic AI not only writes the code, but registers the domain and sets up hosting to launch the site.</p>
        <p>Gartner <a href="https://www.gartner.com/en/newsroom/press-releases/2025-08-26-gartner-predicts-40-percent-of-enterprise-apps-will-feature-task-specific-ai-agents-by-2026-up-from-less-than-5-percent-in-2025">predicts</a> that as many as 40% of enterprise applications will incorporate task-specific AI agents by the end of 2026. A Deloitte <a href="https://www.deloitte.com/content/dam/assets-zone3/us/en/docs/services/consulting/2026/state-of-ai-2026.pdf">report</a> anticipates that at least 75% of companies will use agentic AI to some extent by 2028. The benefits of AI agents are that they can carry out complex tasks independently and at machine speed, working individually or as part of a multi-agent system.</p>
        <p>However, the same features that make these systems powerful also introduce significant security risks. To operate effectively, agents need to seamlessly interact with other agents, humans, and software. This requires high degrees of trust, which can be exploited by malicious actors. Security best practices, notably <a href="https://learn.microsoft.com/en-us/security/zero-trust/zero-trust-overview">zero-trust principles,</a> are specifically designed to slow down these interactions, creating an inherent tension between AI agent implementation and security.</p>
        <p><strong>Agents Amplify Systemic Cybersecurity Weaknesses</strong></p>
        <p>Software engineering teams <a href="https://www.zscaler.com/resources/industry-reports/threatlabz-ai-security-report-2026.pdf">account</a> for nearly 50% of AI use, demonstrating that AI is already deeply integrated into software development processes. This suggests that AI agents will likely play a significant role in future software development, working alongside human developers to generate, test, and deploy code.</p>
        <p>The introduction of agents will amplify <strong>software supply-chain security</strong> weaknesses, allowing threat actors to take advantage of vulnerable or intentionally manipulated code to embed exploits in enterprise software. While these issues have existed long before AI or AI agents, the introduction of agents will cause these mistakes to be carried out faster and at scale. Initial studies suggest that AI-generated code is <a href="https://arxiv.org/pdf/2508.21634">less secure</a> than human-generated code, though AI coding performance is <a href="https://hai.stanford.edu/ai-index/2025-ai-index-report/technical-performance">improving</a> rapidly. Ensuring transparency and documentation in agent coding workflows is critical to ensuring a rigorous, secure development operations (SecDevOps) process.</p>
        <p><strong>Identity and access</strong> are additional enterprise security issues that AI agents are likely to amplify. For AI agents to operate effectively, they will also need access to various cloud applications and environments. This increases the complexity of identity management, as identity and permissions will need to extend to virtual agents.</p>
        <p>Currently, many AI tools that connect to external data or to other tools operate in a trust-by-default mode, <a href="https://www.scworld.com/brief/misconfigured-mcp-servers-prevalent-analysis-shows">creating</a> significant vulnerabilities. If this is extended to agentic AI, the potential harms from exploitation could increase significantly, as agents are capable of acts such as sending emails, deleting files, or authorizing payments. Defenders will need to ensure access permissions are properly managed and tracked for agentic users in the same way they manage permissions for traditional software and human users.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_15430abe2f07eb14d7e0271bbdc3ddac9d0c9bbbe.png?width=750&amp;format=png&amp;optimize=medium" width="418" height="662" />
            </div>
          </div>
          <div>
            <div>
              <p><strong>Figure 2</strong>: How AI agents may amplify current security weaknesses</p>
              <p>(Image source: Recorded Future)</p>
            </div>
          </div>
        </div>
        <p><strong>Prompt Engineering Remains a Pervasive Threat to Agents</strong></p>
        <p>While AI agents will accelerate existing enterprise security problems, they also introduce risks unique to artificial intelligence. Threat actors can deliver malicious instructions to AI agents via prompt engineering, causing the agents to act in alignment with the threat actors rather than with their legitimate users. Prompts can be delivered directly (through a chat interface), encoded in malware, or hidden in emails or other innocuous communications.</p>
        <p>With the increased adoption of AI agents, threat actors may move further away from traditional malware and prioritize manipulating agents to scale and enhance operational efficiency. Targeting agents directly enables threat actors to leverage the speed and scale of AI agents, causing greater harm with a lower chance of detection or mitigation.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_123669f1b5fafc1cd5973b7d951811057cf9e1907.png?width=750&amp;format=png&amp;optimize=medium" width="960" height="540" />
            </div>
          </div>
          <div>
            <div><strong>Figure 3:</strong> Potential attack scenarios weaponizing AI agents (Image source: Recorded Future)</div>
          </div>
        </div>
        <p>Completely securing agents against prompt engineering is likely impossible. The need for AI agents to be useful will likely prevent developers from imposing fully effective guardrails against prompt engineering. This risk is similar to the difficulty of making humans resilient to social engineering operations. While training and awareness may help mitigate the effectiveness of some scams, threat actors continually find new ways to use people’s incentives against them.</p>
        <p>Defenders can make AI agents more resilient to prompt engineering attacks by implementing layered security. Building in checkpoints where a human or another agent can assess or approve an action will help detect misaligned behavior and limit the potential harm. This is similar to fraud prevention or mitigation for human employees, such as procedures requiring additional approvals for transferring large sums of money.</p>
        <p><strong>Multi-agent AI Increases Unpredictability</strong></p>
        <p>As AI agents become more common, they will increasingly interact independently with each other to complete tasks. Multiple agents are susceptible to both intentional and accidental manipulation, which can manifest in unpredictable ways. Researchers have <a href="https://arxiv.org/pdf/2502.14143">categorized</a> these outcomes as:</p>
        <ul>
          <li><strong>Miscoordination:</strong> Agents cannot align behaviors to achieve an objective</li>
          <li><strong>Collusion:</strong> Unwanted cooperation between AI agents</li>
          <li><strong>Conflict:</strong> AI agents act to enhance their position at the expense of others</li>
        </ul>
        <p>These outcomes can occur accidentally due to misaligned incentives and safety guardrails, or they can be programmed or intentionally manipulated. Despite safety guardrails, agents have been observed engaging in behavior they would otherwise have avoided. For example, AI agents on MoltBook, a social media network for bots, were <a href="https://es-la.tenable.com/blog/undercover-on-moltbook">observed</a> disclosing potentially sensitive information about their users, including names, hobbies, hardware, and software (in addition to <a href="https://www.wiz.io/blog/exposed-moltbook-database-reveals-millions-of-api-keys">serious</a> security failures associated with the site itself). Unwanted or unanticipated outcomes can occur when agents have free will to decide how they will carry out an objective.</p>
        <h2>Outlook</h2>
        <p><strong>The first agentic data breach will very likely be the result of overly permissive environments:</strong> When threat actors succeed in using AI agents to carry out a breach, it will very likely be the result of an enterprise environment that operated using default permission settings.</p>
        <p><strong>Identity security will very likely shift toward “agent identity governance”:</strong> Enterprises will very likely expand identity and access management (IAM) frameworks to treat AI agents as priority digital identities, requiring lifecycle management, least-privilege enforcement, behavioral monitoring, and dedicated audit controls similar to (or stricter than) those in place for human users.</p>
        <p><strong>Prompt injection will likely evolve into a mainstream enterprise attack technique:</strong> Threat actors will likely increasingly prioritize manipulating AI agents over deploying traditional malware, using prompt injection, poisoned data inputs, and agent swarms to scale financial scams, cyber-physical disruption, and market manipulation — driving demand for layered guardrails and human-in-the-loop validation controls.</p>
        <p><strong>AI will likely reshape cyber insurance risk modeling and pricing:</strong> As AI agents become embedded across enterprise environments, the cyber insurance industry will likely face greater uncertainty in modeling risk exposure. Insurers are likely to respond by tightening underwriting standards around AI governance, requiring demonstrable controls such as agent identity management, human-in-the-loop safeguards, and prompt injection resilience.</p>
        <h3>Further Reading</h3>
        <div>
          <div>
            <div>
              <h3>Source</h3>
            </div>
            <div>
              <h3>Title</h3>
            </div>
          </div>
          <div>
            <div><strong>Insikt Group</strong></div>
            <div><a href="https://www.recordedfuture.com/blog/ai-malware-hype-vs-reality">AI Malware: Hype vs. Reality</a></div>
          </div>
          <div>
            <div><strong>Insikt Group</strong></div>
            <div><a href="https://www.recordedfuture.com/research/2025-cloud-threat-hunting-defense-landscape">2025 Cloud Threat Hunting and Defense Landscape</a></div>
          </div>
          <div>
            <div><strong>Cooperative AI Foundation</strong></div>
            <div><a href="https://arxiv.org/pdf/2502.14143">Multi-agent Risks from Advanced AI</a></div>
          </div>
          <div>
            <div><strong>HAI Stanford</strong></div>
            <div><a href="https://hai.stanford.edu/ai-index/2025-ai-index-report">2025 AI Index Report</a></div>
          </div>
        </div>
        <h2>Mitigations</h2>
        <p><strong>Enforce zero-trust for agent identities:</strong> Treat AI agents as privileged digital identities subject to least-privilege access controls. Use Recorded Future <a href="https://www.recordedfuture.com/products/identity-intelligence">Identity Intelligence</a> to monitor for data breaches that expose agentic identities as well as human identities.</p>
        <p><em><strong>Resilience Question:</strong></em> <em>Do we have a strategy for onboarding virtual identities into our IAM solution?</em></p>
        <p><strong>Ensure visibility into agent behavior:</strong> Deploy continuous monitoring tailored to agent behavior, including logging agent decisions, prompts, and actions, and setting up detections for anomalous task execution patterns.</p>
        <p><em><strong>Resilience Question:</strong></em> <em>Do we understand how and why agents are making decisions, and can we quickly detect misaligned actions?</em></p>
        <p><strong>Strengthen supply-chain and code governance:</strong> Extend SecDevOps controls to AI-generated and agent-modified code. Assess AI-generated code for vulnerabilities and monitor for hallucinated or typosquatted dependencies. Use Recorded Future’s <a href="https://www.recordedfuture.com/products/third-party-intelligence">Third-Party Risk</a> to monitor for downstream vulnerabilities in third-party software.</p>
        <p><em><strong>Resilience Question:</strong></em> <em>Have we adapted SecDevOps to account for agentic coding?</em></p>
        <p><strong>Harden against prompt injection and input manipulation:</strong> Treat all external inputs as untrusted. Increase layered defenses to include multiple validation points and guardrails to minimize the impact of actions due to malicious prompts or inadvertent misalignment.</p>
        <p><em><strong>Resilience Question:</strong></em> <em>What detections are in place to monitor for suspicious prompts?</em></p>
        <h3>Recommended D3FEND Actions</h3>
        <div>
          <div>
            <div><strong><a href="https://d3fend.mitre.org/technique/d3f:AgentAuthentication/">Agent Authentication</a></strong> <strong>(D3-AA)</strong></div>
            <div>Verify agent identities to ensure they are authorized</div>
          </div>
          <div>
            <div><strong><a href="https://d3fend.mitre.org/technique/d3f:ResourceAccessPatternAnalysis/">Resource Access Pattern Analysis</a></strong> <strong>(D3-RAPA)</strong></div>
            <div>Analyze resources accessed by users (human and agentic) to detect unauthorized activity</div>
          </div>
          <div>
            <div><strong><a href="https://d3fend.mitre.org/technique/d3f:SoftwareUpdate/">Software Update</a></strong> <strong>(D3-SU)</strong></div>
            <div>Ensure all software components are up to date</div>
          </div>
          <div>
            <div><strong><a href="https://d3fend.mitre.org/technique/d3f:ApplicationConfigurationHardening/">Application Configuration Hardening</a></strong> <strong>(D3-ACH)</strong></div>
            <div>Modify an application's configuration to reduce its attack surface</div>
          </div>
          <div>
            <div><strong><a href="https://d3fend.mitre.org/technique/d3f:IdentifierReputationAnalysis/">Identifier Reputation Analysis</a></strong> <strong>(D3-IRA)</strong></div>
            <div>Analyze the reputation of the identifier based on third-party threat intelligence</div>
          </div>
          <div>
            <div><strong><a href="https://d3fend.mitre.org/technique/d3f:AgentAuthentication/">Agent Authentication</a></strong> <strong>(D3-AA)</strong></div>
            <div>Verify agent identities to ensure they are authorized</div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_15d4dbaf6b540824c4de25cfee011d5903a949c52.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[4 Essential Integration Workflows for Operationalizing Threat Intelligence Recorded Future]]></title>
            <link>https://www.recordedfuture.com/blog/4-essential-integration-workflows-for-operationalizing-threat-intelligence</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/4-essential-integration-workflows-for-operationalizing-threat-intelligence</guid>
            <pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Learn how to integrate threat intelligence into your existing security stack with Recorded Future. Explore four stages of cyber maturity, four key integration workflows, and practical steps to move your program from reactive to autonomous.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <ul>
                <li><strong>Integrate, don't replace.</strong> Recorded Future enriches your existing security tools by automatically layering in contextual threat intelligence, reducing manual effort and enabling faster, better-informed decisions.</li>
                <li><strong>Know where you stand.</strong> Assessing your organization's maturity across four stages — reactive, proactive, predictive, and autonomous — helps you identify which workflows to prioritize and where automation can have the most impact.</li>
                <li><strong>Start simple, then scale.</strong> Four core workflows (i.e., IOC enrichment, vulnerability prioritization, Autonomous Threat Operations, and watch list automation) offer a practical on-ramp, and many integrations can be activated in just a few clicks through Recorded Future's Integration Center.</li>
              </ul>
            </div>
          </div>
        </div>
        <p>Threat intelligence can elevate cybersecurity programs from reactive to autonomous, transforming workflows and delivering measurable improvements. <a href="https://recordedfuture.ondemand.goldcast.io/on-demand/3ff3403d-e307-4800-a4f1-f2cde1d83236">In a recent webinar</a>, we shared practical steps for integrating threat intelligence into existing security stacks, optimizing workflows, and accelerating organizational maturity in cybersecurity practices.</p>
        <p>Read on for actionable insights, frameworks, and tools shared during the session.</p>
        <p><strong>Bridging the gap: threat intelligence integration</strong></p>
        <p>The key to effective threat intelligence is making your tools work together seamlessly. Recorded Future doesn’t aim to replace your existing cybersecurity tools, but rather to <a href="https://www.recordedfuture.com/platform/integrations">enrich and connect them.</a></p>
        <p>When Recorded Future connects to the tools already in your stack, it automatically adds contextually relevant threat intelligence to whatever you're working on. This can mean less manual effort and faster, better-informed decisions.</p>
        <h2><strong>Understanding your organization’s cyber maturity</strong></h2>
        <p>A useful starting point is assessing where your organization currently stands across four stages of cybersecurity maturity: reactive, proactive, predictive, and autonomous:</p>
        <ol>
          <li><strong>Reactive</strong> organizations focus on responding to incidents as they occur.</li>
          <li><strong>Proactive</strong> organizations hunt for threats before they lead to incidents and align detection systems to adapt toward emerging risks.</li>
          <li><strong>Predictive</strong> programs extend threat intelligence beyond the security operations center (SOC) to other organizational stakeholders.</li>
          <li><strong>Autonomous</strong> programs leverage automation to identify and respond to threats in real time at machine speed.</li>
        </ol>
        <p><a href="https://www.recordedfuture.com/resources/maturity-assessment">Maturity</a> doesn't have to be assessed at the program level alone. Individual use cases may be at different stages. Alert management, for instance, may already be highly automated, while other workflows remain more reactive.</p>
        <p>A helpful way to identify where to focus is to ask a series of questions, including:</p>
        <ul>
          <li>What does my current alert workflow look like?</li>
          <li>What's my most time-consuming process?</li>
          <li>What's my top priority for the next 12 months?</li>
        </ul>
        <p>Your answers will enable you to identify areas for improvement and then prioritize your workflows as needed.</p>
        <h2><strong>Three key integration workflows—and one bonus workflow</strong></h2>
        <p>Next, we suggest integration workflows that are designed to help you optimize your security operations with Recorded Future threat intelligence:</p>
        <h3><strong>1. Indicator of compromise (IOC) enrichment</strong></h3>
        <p>Detection tools often generate alerts with limited context, leaving you asking why something was flagged and how risky it actually is.By integrating Recorded Future, you’ll find that those alerts can be automatically enriched with information such as malware families, exploited vulnerabilities, and threat actor connections—enabling better, faster decisions without additional manual research.</p>
        <h3><strong>2. Vulnerability prioritization</strong></h3>
        <p>Most organizations depend on CVSS scores or vendor-provided data to assess vulnerabilities, but that approach doesn't always reflect real-world risk. A more effective strategy is asking: Is this vulnerability being actively exploited in targeted campaigns? Are threat actors targeting my industry with it?</p>
        <p>Recorded Future enhances vulnerability management primarily through threat intelligence context, with risk scoring that tells you why something is risky—specifically whether a CVE is being actively exploited in the wild, and whether it's targeting organizations in your industry.</p>
        <h3><strong>3. Autonomous Threat Operations</strong></h3>
        <p>The most advanced workflow involves automating threat detection and prevention from end to end. Recorded Future can identify emerging threats, initiate retroactive threat hunts, and automatically update detection and blocking lists in tools like EDR platforms—all without manual intervention. This will enable your security team to shift from reactive firefighting to real-time, autonomous threat prevention. <a href="https://www.recordedfuture.com/products/autonomous-threat-operations">Learn more about Autonomous Threat Operations</a>, available in Recorded Future’s Professional and Elite pricing packages.</p>
        <h3><strong>4. Bonus workflow: Watch list automation</strong></h3>
        <p>Your existing vulnerability scanners like Tenable, Qualys, Wiz, and Rapid7 are already identifying vulnerabilities in your environment. A Watch List automation connector can link those tools directly into Recorded Future's Watch Lists, so the Platform automatically reflects your real threat footprint at all times. Instead of tracking a static list of top vulnerabilities, you get contextual intelligence tied to what's actually in your environment, and you're automatically alerted when vulnerabilities change in risk status.This shifts vulnerability management from a reactive posture to a predictive one, and makes prioritization effectively autonomous.</p>
        <h2><strong>The role of Recorded Future’s Integration Center</strong></h2>
        <p>The <a href="https://www.recordedfuture.com/integrations">Integration Center</a> makes it straightforward to connect with popular security tools including Splunk, ServiceNow, CrowdStrike, and SentinelOne. Many of these integrations are pre-built and can be activated in just a few clicks, meaning there may already be value waiting to be unlocked within your existing SIEM, SOAR, EDR, TIP, vulnerability management tools, GRC platforms, and more.</p>
        <h2><strong>Driving business value with integrated threat intelligence</strong></h2>
        <p>Beyond operational efficiency, well-integrated threat intelligence workflows build organizational trust and give security leaders a stronger, data-backed narrative about how their teams are operating. Automating enrichment and response creates the space to focus on strategic priorities—and makes it easier to demonstrate the program's value to leadership.</p>
        <p>The path toward autonomous threat operations requires sophisticated technology, seamless integrations, smart prioritization, and strategic planning. The best approach is simply to start: Activate a workflow, see the value it delivers, and build from there.</p>
        <p>If you need help getting started or have questions about your organization’s specific needs, <a href="https://www.recordedfuture.com/get-started#book-demo">book a custom demo</a>.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_12d6bc15802a3569cc98a12874c0790ad0d3cfa5f.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[From Bazooka to Fake Nikes]]></title>
            <link>https://www.recordedfuture.com/blog/from-bazooka-to-fake-nikes</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/from-bazooka-to-fake-nikes</guid>
            <pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[A deep dive into business impersonation fraud — from fake companies cashing stolen checks to AI-powered shopping scams — and why the same vulnerability enables both.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <ul>
                <li>Business impersonation is the hidden thread connecting old and new fraud. Discover how the same core tactic is fueling both a surge in commercial check fraud and an explosion of AI-powered online shopping scams targeting younger consumers.</li>
                <li>Tools like Positive Pay and 3D Secure authentication, while effective against the fraud they were built to stop, have pushed threat actors to evolve their schemes in ways that render those controls irrelevant.</li>
                <li>Ecosystem gaps are often the real vulnerability. Fraudsters exploit the chain of assumed trust between social media platforms, card networks, merchant onboarders, banks, and local business registries — turning each party's reliance on the last into an open door.</li>
              </ul>
            </div>
          </div>
        </div>
        <p>If you’re a millennial or Gen Z-er, then you probably haven’t used a paper check in a while. According to the <a href="https://www.atlantafed.org/research-and-data/surveys/survey-and-diary-of-consumer-payment-choice?utm_source=substack&amp;utm_medium=email#panel=2">Federal Reserve Bank of Atlanta</a>, just 1 out of 5 of your peers used a check in the last 30 days, versus 2 out of 5 Gen Xers and 3 out of 5 boomers. Yet despite year-on-year decreases in overall usage, <a href="https://verafin.com/2025/12/nasdaq-verafin-catches-over-1-billion-in-check-fraud-in-2025/?utm_source=substack&amp;utm_medium=email">Nasdaq Verafin</a> saw check fraud instances rise another 11% in 2025.</p>
        <p>Then again, if you are a millennial or Gen Z-er, you will have seen an advertisement for a cheap product on social media. For <a href="https://www.pewresearch.org/short-reads/2025/11/19/about-a-third-of-americans-say-theyve-had-an-online-shopping-scam-happen-to-them/?utm_source=substack&amp;utm_medium=email">40% of you</a>, that has meant falling for an online shopping scam.</p>
        <p>On the face of it, these look like two ends of the fraud spectrum:</p>
        <ul>
          <li>On the one hand, we have what feels like the past: paper check usage rates even among those aged 65+ fell from 13% of transactions in 2013 to 6% in 2025 (<a href="https://www.atlantafed.org/research-and-data/publications/take-on-payments/2025/07/07/innovations-in-payments-acceptance-play-out-in-consumer-check-use?utm_source=substack&amp;utm_medium=email">Federal Reserve Bank of Atlanta</a>).</li>
          <li>On the other hand, we have the future: online shopping scams target a younger demographic through AI-enabled brand impersonation and sprawling social media ad ecosystems.</li>
        </ul>
        <p>The payment instruments, demographics, and the teams working at financial institutions to address these problems differ. So what’s the thread linking them together? Business impersonation. It manifests itself differently across schemes, but for anti-fraud systems built to detect check washing and counterfeiting on the one hand, and unauthorized third-party card fraud on the other, business impersonation has emerged as the fraudster’s response to exploit both.</p>
        <h2>Commercial checks and copycat businesses across state lines</h2>
        <p>In the past, stolen checks were often whitewashed to change the recipient and amount, and then walked into banks for cashout. The Postal Inspection Service received over 299,000 mail theft complaints in a single 12-month period—a 161% increase from the prior year. Recorded Future’s Fraud Intelligence Team analyzed and mapped stolen checks to US geographies, illustrating hot spots of physical crime and observing that it remains a national issue that extends beyond heavily urbanized areas.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ae67a7886291f3ca973623a136518e5754335b02.png?width=750&amp;format=png&amp;optimize=medium" width="1381" height="751" />
            </div>
          </div>
          <div>
            <div><em>Mapping stolen checks by zip code; courtesy of Recorded Future</em></div>
          </div>
        </div>
        <p>Yet even among declining consumer check usage rates, businesses’ use of commercial checks remains stubbornly high in the US: the <a href="https://www.financialprofessionals.org/training-resources/resources/survey-research-economic-data/Details/payments-fraud?__hstc=110159258.08b65636f3e81487b21bd53bc12a6e37.1770568886227.1770668440686.1770742788656.3&amp;__hssc=110159258.1.1770742788656&amp;__hsfp=4888b6684dc00907b9aeb05be67a9fa9&amp;utm_source=substack&amp;utm_medium=email">Association for Financial Professionals</a> (AFP) found that 91% of organizations are still using checks, and 63% experienced check fraud in 2024. When businesses send checks to suppliers, the amounts can rise quickly, leading fraudsters to expand beyond simple check-washing schemes.</p>
        <p>In perhaps the most eye-catching example, fraudsters <a href="https://manhattanda.org/d-a-bragg-check-fraud-ring-indicted-for-stealing-1-2m-from-bazooka-companies-maker-of-classic-bubble-gum/?utm_source=substack&amp;utm_medium=email">intercepted</a> a commercial check destined for bubble-gum giant Bazooka in 2022. A $1.24 million check. Over the next two weeks, they transferred and withdrew over half a million dollars. How’d they do it? You can’t just wash out the payee name on a million-dollar check, replace it with John Smith, and expect it to clear after depositing it into a personal checking account.</p>
        <p>Instead, the threat actors just created a fake Bazooka. The real Bazooka is registered in Delaware under the name “The Bazooka Companies, LLC”, so culprits registered a fictitious company in New York under the name “The Bazooka Companies 1 Inc”. They then used the official business license to open a corporate bank account for the new fictitious business. From there, they used cashier checks, withdrawals, and transfers to personal accounts to cash out the funds.</p>
        <p>Fast forward to today, and the scheme is still happening. Recent research from <strong><a href="https://www.recordedfuture.com/products/payment-fraud-intelligence">Recorded Future Payment Fraud Intelligence</a></strong> <strong>(PFI)</strong> surveyed stolen checks for sale on Telegram in Q4 2025 and found over 30 checks with a business as the payee, along with suspicious new entities registered in other states a few days later. The total face value of the checks amounted to $2M.</p>
        <p>As with most fraud, this scheme’s emergence is based on:</p>
        <ul>
          <li><strong>Exploiting ecosystem gaps between disparate parties:</strong> Businesses can have the same name as another when registered in different states. Pair that with most states’ limited mandate to investigate business registrations, and we’re left with the first gap:</li>
        </ul>
        <p><em>“As long as the basic filing requirements are met, the office[s] may have little or no authority to question or reject a document submitted for filing or to verify information included in the filing”</em> (<a href="https://www.nass.org/sites/default/files/reports/final-nass-report-business-filing-fraud-091925.pdf?utm_source=substack&amp;utm_medium=email">National Association of Secretaries of State</a>, September 2025)</p>
        <p>When a fraudster approaches a bank to open a business bank account, the bank conducts its own due diligence. But the focus here is on money laundering threats and the legitimacy of documents and applicants. If the fraudsters are using a clean identity — synthetic or otherwise — then the bank won’t have a clear reason to reject the application just because a business called John’s Toilet Supply, LLC exists in another state.</p>
        <ul>
          <li><strong>Delivering a reactionary counterpunch to effective fraud processes:</strong> Think of this as the cat-and-mouse game. Fraud defenders figure out how to stop one scheme, forcing fraudsters to innovate. In this case, Positive Pay has proven remarkably effective at preventing check washing and counterfeit checks (when parties agree to use it). Payee Positive Pay, in particular, allows the payer to make sure that when their checks are deposited, the check number, date, payee name, and amount match their files. But what happens if everything is correct, but a copycat payee deposits the check? Cases like Bazooka.</li>
        </ul>
        <h2>80% discount on shoes? How can you say no?</h2>
        <p>If we detour into e-commerce, we see a very similar dynamic play out, but at a staggeringly larger scale. The premise is simple: use AI to launch a fake online shop impersonating company A, B, or C, buy ad space on social media to drive traffic, pocket the proceeds, and launder the funds while customers wait for goods that never arrive.</p>
        <p>The scheme works because 53% of consumers, and 76% of Gen Zers, now begin shopping journeys on social media, according to <a href="https://www.salesforce.com/news/stories/social-shopping-stats-2025/?utm_source=substack&amp;utm_medium=email">Salesforce’s 2025 report</a>. The problem is that the journey is littered with traps: in November 2025, <a href="https://www.reuters.com/investigations/meta-is-earning-fortune-deluge-fraudulent-ads-documents-show-2025-11-06/?utm_source=substack&amp;utm_medium=email">leaked internal documents</a> from Meta claimed the “company shows its platforms’ users an estimated 15 billion ‘higher risk’ scam advertisements — those that show clear signs of being fraudulent — every day”. Industry reporting paints the same picture, with the Better Business Bureau finding online shopping scams as the most reported scam type and social media advertisements as the most common originator.</p>
        <div>
          <div>
            <div>
              <p>
                <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ccaa97f85eebb173855f1669c1422aee9e49f717.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1600" height="1200" />
              </p>
              <p>
                <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_11e27062f373f6e184680c4d10916a2b03c3da510.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1600" height="1153" />
              </p>
            </div>
          </div>
          <div>
            <div><em>Brand impersonation shopping scams impacting shoppers in January 2026; courtesy of Recorded Future</em></div>
          </div>
        </div>
        <p>The basics of the scheme are nothing new. Capture payment card data by creating a fake online store and advertise too-good-to-be discounts. What’s changed is that these are no longer just phishing websites. They’re functional online shops that process payments via merchant accounts. Behind each of these merchant accounts is a registered business.</p>
        <p>This is creating problems throughout the ecosystem:</p>
        <ul>
          <li>Cardholders see websites that exactly mimic major (and increasingly niche) brands, letting discounts outweigh better judgment.</li>
          <li>Financial institutions face the challenge of balancing their duty of care to process customer transactions with the risks of fraud and money laundering. But in these cases, the traditional indicators of cyber-enabled fraud aren’t present. The cardholder is authorizing the transaction, and there’s nothing suspicious within the behavioral or device indicators of the 3D Secure authentication stream. (Because, again, it’s the cardholder doing the transacting under manipulation.)</li>
          <li>The fingers begin to point back at the acquirers and payment facilitators responsible for merchant onboarding, but, from their perspective, the entity holds a proper commercial license to engage in business issued by the local authorities. (Though, as a divergence from the check fraud scheme, the fraudsters in online shopping scams rarely impersonate a real big-name brand at the business creation and merchant onboarding stage. Instead, the fraudsters hide evidence of impersonation from the merchant onboarders and leave the impersonation for the ads and fake online shops visible to victims.)</li>
        </ul>
        <p>But just like with the check fraud example, a big part of why online shopping scams have exploded — outside of generative AI making brand abuse content easier than ever to create at scale — is ecosystem gaps and fraudsters reacting to the defense:</p>
        <ul>
          <li><strong>Exploiting ecosystem gaps between disparate parties:</strong> By the time a victim is making a purchase on an online shopping scam website, each entity along the way has looked to the one before and trusted that due diligence had been performed. The cardholder wants to trust that the social media platform screened out malicious advertisers; the card issuer wants to trust the cardholder vetted the merchant; the card network wants to trust the merchant onboarder verified the business; and the merchant onboarder wants to trust local authorities properly licensed the business. A big, long line of incentivized trust.</li>
          <li><strong>Delivering a reactionary counterpunch to effective fraud processes:</strong> The industry has made huge strides in combating unauthorized, third-party card-not-present (CNP) fraud in the last decade. A major part of the success has been built on 3D Secure, introducing a layer of authentication on top of existing authorization controls. Online shopping scams completely sidestep the defensive layer by making the merchant the fraud surface and rendering cardholder authentication controls irrelevant.</li>
        </ul>
        <h2>Thinking towards the way out</h2>
        <p>On the check fraud side, the best solution may already be available, but, as with most solutions, it comes with trade-offs and adoption issues. The basic idea of Positive Pay and its derivative, Payee Positive Pay, is that a business informs its bank of the checks it is sending, and the bank only disburses funds if the check matches what the business provided. Positive Pay was designed to combat counterfeit and forged checks, and it does that very well.</p>
        <p>Of course, in the Bazooka example of same-name business impersonation, this wouldn’t help. Nothing about the check was modified. So here, banks offer Reverse Positive Pay, which basically means the business personally signs off on each sent check. It can solve the problem but shifts more operational and investigatory expenses onto the business (which might explain why <a href="https://www.alkami.com/resources/research/reports/positive-pay-adoption-trends-strategies-for-banks-credit-unions?utm_source=substack&amp;utm_medium=email">adoption rates</a> are south of 20%, according to Datos Insights and Alkamai). In the end, though, it makes you wonder why not heed the advice and move to alternative electronic payment methods?</p>
        <p>On the online shopping scam side, solutions are more complex and scattered across the ecosystem.</p>
        <ul>
          <li>At the top of the funnel, there’s rising pressure on online advertising platforms to do a better job at limiting the presence of fraudulent advertisements. Based on more leaked internal Meta documents, regulatory pressure may not be producing the desired outcome.</li>
          <li>At the merchant onboarding level, both the major card networks are forcing acquirers and payment facilitators to do more to defend the gates into payment processing, while also devoting more resources to identifying scam merchants that do make it in.</li>
        </ul>
        <p>For card issuers on the frontline, it’s a more delicate dance. Card issuers aren’t on the hook for authorized card payments to fraudsters under the Fair Credit Billing Act (FCBA) or Electronic Funds Transfer Act (EFTA), but <a href="https://www.alloy.com/reports/2025-scams-report?utm_source=substack&amp;utm_medium=email">67% of cardholders</a> expect them to cover scam losses. Though when cards transacting on scam websites end up on the dark web for resale, and unauthorized charges start rolling in, it is the issuer’s problem.</p>
        <p>The best solution aligns with the industry’s movement toward <a href="https://intelligence2risk.substack.com/p/the-need-for-cyber-fraud-fusion-centers?utm_source=substack&amp;utm_medium=email">CTI-fusion models</a> to address the cyber component of cyber-enabled fraud. The convergence of online shopping and purchase scams is precisely the type of problem the new organizational model was meant to combat.</p>
        <p>In applying the CTI-fraud fusion model to purchase scams, traditional fraud assets start at the end of the fraud attack chain to correlate reported cardholder manipulation and non-delivery alerts against merchant account patterns. The CTI assets start at the beginning, sourcing online shopping scams at runtime and attributing the abused merchant accounts. The two teams then meet in the middle, using modeled transaction patterns and threat-hunted active scam websites, ultimately leading to the deployment of merchant-based fraud risk rules.</p>
        <p>So, in the meantime, where does all this leave us? The same thing you’ve heard plenty of times: stop using checks if you can and don’t trust too-good-to-be-true offers from online ads.</p>
        <h3><strong>How Recorded Future Helps</strong></h3>
        <p>The research in this blog came directly from Recorded Future's Fraud Intelligence teams. Two capabilities speak to the threats described.</p>
        <ul>
          <li><strong><a href="https://www.recordedfuture.com/products/payment-fraud-intelligence">Payment Fraud Intelligence</a></strong> — tracks the complete fraud lifecycle: for check fraud, it uses OCR to extract payee, amount, and date from compromised checks being sold in forums, enabling deposit screening against known stolen checks; for card fraud, it monitors compromised merchants, stolen cards on criminal marketplaces, and the tester merchants fraudsters use to validate cards before striking.<a href="https://www.recordedfuture.com/products/payment-fraud-intelligence"></a></li>
          <li><strong><a href="https://www.recordedfuture.com/use-case/digital-risk">Digital Risk Protection</a></strong> — provides continuous monitoring across millions of sources for malicious sites, brand and executive impersonation, data leakage, and dark web mentions — with risk-based alerting that surfaces only actionable threats and takedown workflows built directly into the Platform.</li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_14faf4dcce5eb66f5d88bbbe34166aa2b8a612f07.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Your Supply Chain Breach Is Someone Else's Payday]]></title>
            <link>https://www.recordedfuture.com/blog/your-supply-chain-breach-is-someone-else-payday</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/your-supply-chain-breach-is-someone-else-payday</guid>
            <pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[A supply chain attack by TeamPCP compromised trusted software tools to harvest credentials at scale, enabling payroll fraud, logistics theft, and ransomware extortion.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <ul>
                <li>TeamPCP exploited a single stolen credential to gain write access to trusted software repositories, inject credential-harvesting malware, and cascade across five ecosystems in five days.</li>
                <li>Stolen credentials can enable payroll redirection, freight rerouting, and extortion — active campaigns Insikt Group is tracking that show how a software supply chain breach can quickly become a business operations crisis.</li>
                <li>Learn why an inventory of your software components isn't enough when malicious code is injected after the source commit, and what a truly effective defense — combining third-party due diligence. cryptographic signing, and AI-driven anomaly detection — actually requires.</li>
              </ul>
            </div>
          </div>
        </div>
        <p><br />In March 2026, a group calling itself TeamPCP compromised LiteLLM (a Python package with roughly <a href="https://pypistats.org/packages/litellm">97 million monthly downloads</a> used by thousands of organizations to connect to AI services) and <a href="https://checkmarx.com/blog/checkmarx-security-update/">Checkmarx</a> (one of the most widely used application security testing platforms on the planet). How they got in isn’t publicly confirmed. But the result was write access to a trusted software repository.</p>
        <p>From there, they injected a credential-harvesting payload into the software and <a href="https://thehackernews.com/2026/03/teampcp-hacks-checkmarx-github-actions.html">poisoned two Checkmarx GitHub Actions workflows</a>. The malware ran silently on installation, vacuuming up access keys, cloud credentials, secrets, and (the cruelest irony) every AI API key that LiteLLM was specifically designed to manage. The stolen data was encrypted, then pushed to a lookalike domain.</p>
        <p>And here is the part that should keep you up at night: this was one campaign, by one group, in one week. The downstream consequences are still unfolding.</p>
        <h2>Identity Is the Perimeter (and the Attack Surface)</h2>
        <p>The throughline in the TeamPCP campaign is identity. Start to finish.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_18861a03755acfcc02c8296c0299017c1ca7c333b.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1180" />
            </div>
          </div>
          <div>
            <div>TeamPCP intelligence summary courtesy of Recorded Future.</div>
          </div>
        </div>
        <p>No one has publicly confirmed exactly how TeamPCP gained access to the LiteLLM maintainer’s repository, but the most likely vector is stolen credentials. Recorded Future’s <a href="https://www.recordedfuture.com/products/identity-intelligence">identity intelligence</a> contains almost 1 million compromised GitHub developer credentials harvested by infostealers and sold across dark web marketplaces. A single publishing token or access key, lifted from a prior infection and left unrotated, would have been sufficient. TeamPCPs’ earlier compromise of <a href="https://www.aquasec.com/blog/trivy-supply-chain-attack-what-you-need-to-know/?utm_source=substack&amp;utm_medium=email">Aqua Security’s Trivy</a> infrastructure in late February (where <a href="https://www.wiz.io/blog/trivy-compromised-teampcp-supply-chain-attack?utm_source=substack&amp;utm_medium=email">incomplete credential rotation</a> left residual access open for weeks) demonstrates exactly this pattern: one stolen token, one missed rotation, and the door stays open.</p>
        <p>Whatever the precise mechanism, TeamPCP used valid credentials to push malicious code into trusted repositories. No firewall to bypass. No endpoint to exploit. Just a valid login and the implicit trust that comes with it.</p>
        <p>Then the payload itself was designed to steal more identities. Each compromised environment yielded credentials that unlocked the next target. Trivy led to GitHub Actions. GitHub Actions led to <a href="https://www.securityweek.com/from-trivy-to-broad-oss-compromise-teampcp-hits-docker-hub-vs-code-pypi/?utm_source=substack&amp;utm_medium=email">four additional software distribution ecosystems</a>. One incomplete incident response created a cascading chain of supply chain compromises across five ecosystems in five days.</p>
        <p>This is the identity and access management problem stated as plainly as possible: if the perimeter is identity, then every stolen credential is a breach in the wall. And unlike a firewall rule, a stolen credential doesn’t trigger an alert. It just works.</p>
        <p>We <a href="https://intelligence2risk.substack.com/p/the-bug-that-wont-die-10-years-of?utm_source=substack&amp;utm_medium=email">previously wrote</a> about how deserialization vulnerabilities have plagued enterprise software for over a decade. The pattern is always the same: trusting input that should not be trusted. Supply chain attacks are the organizational equivalent. We trust the packages we install. We trust the pipelines we build. We trust the security tools we deploy. TeamPCP exploited every layer of that trust, starting with a single compromised identity.</p>
        <h2>The Impact Is Not Just Ransomware</h2>
        <p>TeamPCPs’ <a href="https://socradar.io/blog/teampcp-checkmarx-github-actions-attack/?utm_source=substack&amp;utm_medium=email">Telegram channel references a ransomware victim’s site</a>. The group appears to operate as a ransomware affiliate and has publicly discussed extorting companies by threatening to release over 300 GB of stolen data. Reports indicate a possible collaboration with the Lapsus$ extortion group. Ransomware is the obvious play.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_17e32149dd47f3a6051343744918be53349840a08.jpg?width=750&amp;format=jpg&amp;optimize=medium" width="1100" height="794" />
            </div>
          </div>
          <div>
            <div>CipherForce intelligence summary courtesy of Recorded Future.</div>
          </div>
        </div>
        <p>But ransomware is only the most visible impact. The more dangerous question is: what else can you do with over a million stolen cloud credentials, API keys, and service account tokens?</p>
        <p>The answer, based on what <a href="https://www.recordedfuture.com/research/insikt-group?utm_source=substack&amp;utm_medium=email">Insikt Group</a> is tracking across multiple unrelated campaigns, is far broader than encryption and extortion.</p>
        <p>Redirect payroll. Late last year (2025) Insikt Group was monitoring activity around a campaign called “Swiper,” run by likely Russian-speaking actors who set up phishing infrastructure impersonating major financial institutions and payroll service providers. Stolen credentials were transmitted in real time, enabling the actors to alter direct deposit accounts and redirect payments before anyone noticed. The responsible actor was identified through a dispute on a <a href="https://www.recordedfuture.com/research?utm_source=substack&amp;utm_medium=email&amp;page=1">criminal forum</a>, and their cryptocurrency wallet has processed over 7,000 transactions. This was a credential theft operation that converted identity compromise directly into financial theft. Now imagine that same playbook amplified by a supply chain attack that harvests payroll platform credentials at scale.</p>
        <p>Reroute shipments. Separately, Insikt Group has identified TAG-160, a threat group targeting the US logistics and transportation sector. TAG-160 impersonates logistics companies, sends fraudulent rate confirmations via phishing emails, and delivers remote access malware. But TAG-160 has also been caught running “double brokering scams,” where they pose as a legitimate carrier, obtain valid load details from a real broker, then re-advertise the load under the broker’s name to contract a different carrier. The legitimate carrier moves the freight. The threat actor collects the payment. The real carrier never gets paid. A second, unrelated threat cluster targets German logistics companies with a similar playbook.</p>
        <p>These are not theoretical scenarios. They are active campaigns running in parallel with the TeamPCP supply chain compromises. And the common denominator across all of them is credential theft and identity abuse.</p>
        <p>In the <a href="https://intelligence2risk.substack.com/p/five-risk-categories?utm_source=substack&amp;utm_medium=email">five risk impact categories</a> we use as a framework for translating cyber threats into business risk, the TeamPCP compromise touches every single one: operational disruption (ransomware, system lockout), financial fraud (payroll redirection, double brokering fraud, extortion payments), competitive disadvantage (credentials, trade secrets, PII), brand impairment (customers learning their security tooling was the vector), and legal and compliance consequences (breach notification obligations, potential liability for downstream impacts).</p>
        <p>The tendency is to categorize supply chain attacks as a “security tool problem” or a “developer problem.” It is neither. It is a business risk problem whose blast radius extends from IT operations to payroll to logistics to the boardroom.</p>
        <p>Organizations should ask how they can use AI-driven analysis to continuously verify the integrity of every package and build artifact entering their production systems. This means comparing distributed packages against their source repositories to detect injected code. It means analyzing updates to flag anomalous changes in behavior. It means automated provenance verification that traces software from source to distribution, flagging breaks in the chain.</p>
        <p>But the TeamPCP campaign exposed a truth the industry has been slow to internalize: the security tools themselves are targets. TeamPCP specifically chose a vulnerability scanner and an application security platform because those tools have the broadest access to credentials and infrastructure. Compromising the tool that checks your code is the ultimate fox-in-the-henhouse scenario.</p>
        <p>The organizations that weather this era of supply chain risk will be those that treat code integrity verification as a continuous, automated, AI-augmented process rather than a periodic audit.</p>
        <h2>So What. Now What.</h2>
        <p>TeamPCP is not done. Their Telegram channel explicitly states the operation is still unfolding, and they claim to be working with new partners to monetize stolen data at scale.</p>
        <p>For security leaders, the immediate actions are straightforward: if your organization uses LiteLLM, Trivy, or Checkmarx GitHub Actions, assume compromise and rotate every credential on affected systems. Audit your software pipelines for unauthorized changes. Pin software dependencies to verified, <a href="https://www.microsoft.com/en-us/security/blog/2026/03/24/detecting-investigating-defending-against-trivy-supply-chain-compromise/?utm_source=substack&amp;utm_medium=email">immutable versions</a>.</p>
        <p>But the longer-term lesson is more fundamental. Supply chain attacks convert the trust model of modern software development into an attack surface. The packages you install, the tools you run, the pipelines you build: these are not neutral infrastructure. They are vectors. And the credential stolen today from a compromised software package could show up tomorrow as a payroll redirect, a rerouted shipment, or a ransomware demand.</p>
        <p>The keys to your kingdom are scattered across every package manager, every automation token, and every service account in your environment. Someone is collecting them. And your supply chain breach is already someone else’s payday.</p>
        <h2>How Recorded Future Helps</h2>
        <p>The TeamPCP campaign left signals at every stage. Three Recorded Future capabilities speak directly to this threat:</p>
        <ul>
          <li><a href="https://www.recordedfuture.com/products/identity-intelligence">Identity Intelligence</a> — monitors infostealer logs, dark web markets, and credential dumps in real time, automatically detecting compromised employee credentials and triggering immediate response — including the nearly one million compromised GitHub developer credentials already in Recorded Future's dataset.</li>
          <li><a href="https://www.recordedfuture.com/research/insikt-group">Insikt Group</a> — elite analysts with deep government, law enforcement, and intelligence agency experience <a href="https://www.recordedfuture.com/research/insikt-group"></a>who produced the TeamPCP, Swiper, TAG-160, and CipherForce research in this blog. Customers see threats as they develop, not after they've made headlines.</li>
          <li><a href="https://www.recordedfuture.com/products/third-party-intelligence">Third-Party Risk</a> — continuously monitors vendors for ransomware extortion activity, breach indicators, and credential leaks, replacing point-in-time questionnaires with real-time visibility across your supply chain.</li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1d6aff1dc009c244e9b6f66a1f1fe7bd44e4b681f.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Iran War: Future Scenario and Business Implications]]></title>
            <link>https://www.recordedfuture.com/research/iran-war-future-scenarios</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/iran-war-future-scenarios</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Iran War: Future Scenarios and Business Implications]]></description>
            <content:encoded><![CDATA[
        <p>The Iran situation remains volatile and uncertain, with material impacts for organizations.</p>
        <p>Leaders should plan for multiple future scenarios, prioritizing resilience and effective decision-making</p>
        <p><strong>Current State (April 10)</strong></p>
        <ul>
          <li><strong>Severe tensions persist despite a two-week ceasefire:</strong><br />The agreement remains fragile and conditional on reopening the Strait of Hormuz; each side has already accused Iran War: Future Scenarios and Business Implications the other of violations.</li>
          <li><strong>Maritime flows partially resume but remain uncertain:</strong><br />Disruptions and elevated security risks persist. President Trump has signaled readiness to resume strikes on Iranian infrastructure if ceasefire conditions are not met.</li>
          <li><strong>Economic conditions remain unstable:</strong><br />Energy markets remain volatile, with continued pressure on supply chains. Shipping, insurance, and aviation activity are only partially restored. Inside Iran, infrastructure damage is driving power shortages and industrial disruption.</li>
          <li><strong>Cyber activity has intensified</strong>:<br />Operations targeting energy and critical infrastructure are increasing, reinforcing systemic risk across key sectors.</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1b1f2acb431306cd4d209bbb5f95b0224fc15fc9f.png?width=750&amp;format=png&amp;optimize=medium" width="398" height="561" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1</strong>: An explosion in Tehran, February 28, 2026 (Source:</em> <em><a href="https://www.pbs.org/newshour/world/what-to-know-about-the-u-s-israel-attacks-on-iran">PBS</a>)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1b020e8bcace97f79eda497ff78080fa22a246e06.png?width=750&amp;format=png&amp;optimize=medium" width="892" height="379" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Cone of Plausibility Overview: Iran Conflict</em> <em>(Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Framework Overview</h2>
        <p>To assess how the Iran conflict could evolve over the next 6–12 months, Insikt Group analyzed regional and global dynamics using the <strong>PESTLE-M</strong> framework, covering <strong>Political, Economic, Social, Technological, Legal, Environmental,</strong> and <strong>Military</strong> domains, with a focus on Iran, the United States, Israel, and Gulf States.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_159b6d509a3a6f5a3d3b9155d4c282f74fa366642.png?width=750&amp;format=png&amp;optimize=medium" width="892" height="149" />
            </div>
          </div>
          <div>
            <div>Figure 3: PESTLE-M Framework (Source: Recorded Future)</div>
          </div>
        </div>
        <p>This analysis informed a scenario generation exercise using a <strong>Cone of Plausibility (CoP)</strong> method. The objective was not to predict a single outcome, but to explore a range of <strong>alternative futures</strong> based on observed signals and emerging trends.</p>
        <div>
          <div>
            <div>
              <p><strong>Wildcard</strong></p>
              <p><strong>Plausible</strong></p>
              <p><strong>Baseline</strong></p>
              <p><strong>Plausible</strong></p>
              <p>
                <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1123745b4ba7dc967aa307abce4f0cb1bdcc7631a.png?width=750&amp;format=png&amp;optimize=medium" width="560" height="381" />
              </p>
            </div>
          </div>
          <div>
            <div>Figure 4: Cone of Plausibility Framework (Source: Recorded Future)</div>
          </div>
        </div>
        <h2><br />Methodology</h2>
        <p>For each <strong>PESTLE-M</strong> category, we identified key <strong>drivers</strong> that could increase or decrease the likelihood of escalation, de-escalation, or sustained instability, and assessed how these dynamics may evolve under different <strong>assumptions</strong>. These were combined to develop <strong>six scenarios</strong>: one <strong>baseline</strong>, two <strong>plausible</strong> (best and worst case), and three <strong>wildcard</strong> scenarios, enabling organizations to evaluate how the conflict may unfold and the potential impacts on their operating environment.</p>
        <p>Within the CoP framework:</p>
        <ul>
          <li><strong>Drivers</strong> are signals and trends that could shape future developments</li>
          <li><strong>Assumptions</strong> reflect how those drivers may evolve over time</li>
          <li><strong>Scenarios</strong> describe how these dynamics could combine to produce distinct future states</li>
        </ul>
        <p>We define scenarios as follows:</p>
        <ul>
          <li><strong>Baseline:</strong> A forward projection of current trends and conditions</li>
          <li><strong>Plausible:</strong> A realistic alternative outcome based on evolving drivers and assumptions</li>
          <li><strong>Wildcard:</strong> A low-probability, high-impact scenario that challenges existing assumptions</li>
        </ul>
        <h2>Baseline Scenario: Fragile Ceasefire with Sustained Economic Disruption</h2>
        <p>Key Drivers <strong>and Assumptions</strong></p>
        <ul>
          <li>Conditional ceasefire <strong>-&gt; Underlying conflict causes unaddressed</strong></li>
          <li>Maritime coercion <strong>-&gt; Economic warfare persists</strong></li>
          <li>Infrastructure targeting <strong>-&gt; Energy disruption continues</strong></li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1915b1bdbe852f19651fd2a87f32416d9ec8cebcd.png?width=750&amp;format=png&amp;optimize=medium" width="512" height="368" />
            </div>
          </div>
          <div>
            <div>Figure 5: Brent oil prices and projections (Source: <a href="https://www.oxfordeconomics.com/resource/prolonged-war-in-iran-could-tip-the-global-economy-into-recession/">Oxford Economics</a>)</div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_124435e23803004755d4ea76bd411aa2046ba5a20.png?width=750&amp;format=png&amp;optimize=medium" width="1280" height="720" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 6:</strong></em> <em>Iran is also threatening maritime traffic through the Bab al-Mandab, another key route (Source:</em> <em><a href="https://timesofindia.indiatimes.com/defence/iran-parliament-planning-to-target-bab-el-mandeb-why-this-red-seagulf-of-aden-strait-matters-india-trade-chokepoint/articleshow/130017334.cms">Times of India</a>)</em></div>
          </div>
        </div>
        <h2>Baseline: A forward projection of current trends and conditions</h2>
        <p><strong>Ceasefire holds, but conflict shifts into sustained economic warfare.</strong></p>
        <p>A fragile ceasefire reduces the pace of direct military exchanges strikes, but the drivers of conflict remain unresolved. Iran lacks the capacity for decisive escalation but retains asymmetric leverage, while the US prioritizes energy market stability and conflict containment. The Strait of Hormuz reopens only intermittently, with recurring disruptions, inspections, and security incidents, keeping shipping, insurance, and energy markets under sustained pressure. Gulf financial, logistics, and technology sectors operate intermittently, airlines maintain some route suspensions, and cyber activity remains elevated against regional infrastructure and Western-linked organizations. The conflict evolves into economic coercion as a primary tool, driving elevated oil and gas prices, persistent market volatility, and tighter financing conditions. Supply chains gradually reconfigure away from high-risk routes, increasing costs and reducing efficiency. Russia benefits from sustained high energy prices and reduced Western focus, strengthening its position in Ukraine. China capitalizes on fragmentation by expanding alternative trade and financial networks, reinforcing a more bifurcated global system.</p>
        <h3>Likelihood</h3>
        <p><strong>Most likely if ceasefire holds without resolution:</strong> Conflict remains below full-scale war, but economic disruption persists as the dominant mode of competition.</p>
        <div>
          <div>
            <div><strong>Business Implications</strong></div>
            <div><strong>Priority Actions (0-90 days)</strong></div>
          </div>
          <div>
            <div><strong>Operational:</strong> Intermittent shipping, route, and supplier disruption increases cost and complexity</div>
            <div>Stress-test <strong>exposure to Hormuz-related</strong> shipping and energy disruption</div>
          </div>
          <div>
            <div><strong>Financial:</strong> Elevated energy prices and volatility sustain margin pressure and tighter financing</div>
            <div>Harden resilience for <strong>energy, logistics, and cyber-dependent</strong> operations</div>
          </div>
          <div>
            <div><strong>Competitive:</strong> Firms with diversified routing and lower energy exposure gain advantage</div>
            <div>Review <strong>sanctions, insurance, and counterparty risk</strong> across key jurisdictions</div>
          </div>
          <div>
            <div><strong>Legal:</strong> Evolving sanctions and emergency measures raise compliance burden and enforcement risk</div>
            <div></div>
          </div>
          <div>
            <div><strong>Reputational:</strong> Scrutiny over pricing, shortages, and regional exposure increases brand risk</div>
            <div></div>
          </div>
        </div>
        <h2>Plausible Scenario (Best Case): Managed Stalemate</h2>
        <p>Key Drivers <strong>and Assumptions</strong></p>
        <ul>
          <li>US threats and military strikes fail to coerce Iran into concession <strong>-&gt; Limited appetite for sustained conflict</strong></li>
          <li>Significant economic disruption <strong>-&gt; Economic costs drive political decisions</strong></li>
          <li>US military footprint in region <strong>-&gt; Potential for re-escalation</strong></li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_18d51aeb2def07a958821fbcdbd793d73232787f4.png?width=750&amp;format=png&amp;optimize=medium" width="569" height="356" />
            </div>
          </div>
          <div>
            <div>Figure 7: US President Trump delivers a warning to Iran at a White House Easter event (Source: <a href="https://www.pbs.org/newshour/politics/watch-live-trumps-hold-white-house-easter-egg-roll-as-iran-war-escalates">PBS News</a>)</div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_107d6e3aa00de195130d129c6ba9a979c794548f9.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="900" />
            </div>
          </div>
          <div>
            <div>Figure 8: Iran has used maritime traffic through the Strait of Hormuz as leverage in the conflict (Source: <a href="https://www.cnbc.com/2026/03/02/strait-of-hormuz-crisis-us-iran-israel-war-shipping-trade-oil.html">CNBC</a>)</div>
          </div>
        </div>
        <h2><strong>Plausible:</strong> A realistic alternative outcome based on evolving drivers and assumptions</h2>
        <p><strong>The US portrays its leadership decapitation campaign as successfully facilitating “regime change,” creating space for diplomatic engagement with “new” leadership. Iran maintains increased level of oversight over the Strait of Hormuz, while internally the IRGC plays a greater role in strategic decision-making.</strong></p>
        <p>Domestic economic and political pressure leads to the US to scale back military operations without clear resolution of key regional security issues, including Iran’s right to nuclear enrichment, ballistic missile program, and support to regional proxies. Maritime traffic slowly returns to pre-war levels, with a new protocol for vessel traffic under an internationally accepted mandate. Iran retains an increased level of oversight over the Strait of Hormuz passages and profits from the traffic. This relieves some economic strain, though lingering supply chain effects remain. Cyber attacks persist as a means of asymmetric coercion. The US lifts some sanctions against the “new” regime, but other sanctions remain in place, complicating the regulatory environment. Interest in renewable energy increases as companies seek to mitigate against future disruption, though oil demand returns to pre-conflict norms. Israel continues limited, highly targeted strikes, while the US retains its military presence in the region, keeping the possibility for re-escalation open.</p>
        <h3>Likelihood</h3>
        <p><strong>Less likely as conflict continues:</strong> This scenario assumes the US’s limited appetite for full-scale war, but the opportunities for de-escalation diminish as the conflict persists.</p>
        <div>
          <div>
            <div><strong>Business Implications</strong></div>
            <div><strong>Priority Actions (0-90 days)</strong></div>
          </div>
          <div>
            <div><strong>Operational:</strong> Recurring disruption risk for regional transport corridors, ports, and cross-border trade</div>
            <div>Keep <strong>sanctions, export-control, and third-party due diligence</strong> on heightened alert</div>
          </div>
          <div>
            <div><strong>Financial:</strong> Long-term effects of recovery</div>
            <div>Build <strong>redundancy</strong> into critical suppliers</div>
          </div>
          <div>
            <div><strong>Competitive:</strong> Competitors with diversified sourcing, redundancy, and mature sanctions controls are best positioned to withstand ongoing shocks</div>
            <div>Maintain an <strong>elevated cyber posture</strong></div>
          </div>
          <div>
            <div><strong>Legal:</strong> Continued tensions mean sanctions and export controls may tighten again with little notice</div>
            <div>Tighten <strong>executive decision rights</strong> and trigger points for regional exposure</div>
          </div>
          <div>
            <div><strong>Reputational:</strong> Price increases tied to lingering supply-chain effects may trigger accusations of profiteering</div>
            <div><strong>Accelerate resilience investments</strong> with strategic upside, especially energy efficiency, renewable sourcing, and inventory visibility</div>
          </div>
        </div>
        <h2>Plausible Scenario (Worst Case): Regional Conflict with Gulf Involvement</h2>
        <p>Key Drivers <strong>and Assumptions</strong></p>
        <ul>
          <li>Conditional ceasefire <strong>-&gt; Continuing provocation re-escalates conflict</strong></li>
          <li>Strait of Hormuz chokehold effective <strong>-&gt; Asymmetric advantage to disruption</strong></li>
          <li>Gulf infrastructure targeted <strong>-&gt; Multi-state escalation</strong></li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1b38ced8d30b196363e863e8fd1e1885036e97ded.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1066" />
            </div>
          </div>
          <div>
            <div><strong>Figure 9:</strong> The Saudi crown prince reportedly urged President Trump to continue war (Source: <a href="https://www.nytimes.com/2026/03/24/us/politics/saudi-prince-iran-trump.html">NYT</a>)</div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1c1b0a0987467003970eb1d67ec3764b0d7f291ad.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1029" />
            </div>
          </div>
          <div>
            <div><strong>Figure 10:</strong> The UAE has been proactive in the conflict, taking nonmilitary measures against Iran (Source: <a href="https://www.scmp.com/week-asia/economics/article/3348996/uae-squeezes-iranian-economic-lifeline-retaliation-attacks">South China Post</a>)</div>
          </div>
        </div>
        <h2><strong>Plausible:</strong> A realistic alternative outcome based on evolving drivers and assumptions</h2>
        <p><strong>Ceasefire collapses, triggering multi-state regional war.</strong></p>
        <p>A temporary ceasefire breaks down following renewed strikes and failure to secure maritime access. Iran escalates missile and proxy attacks, including targeting Gulf energy infrastructure. With critical thresholds crossed, Saudi Arabia, the UAE, and Bahrain enter the conflict directly to protect economic and political stability. The Strait of Hormuz and Bab al-Mandab become sustained conflict zones, with repeated attacks, mining, and vessel seizures. Shipping and insurance markets withdraw at scale, severely constraining global energy flows. Energy prices surge, driving inflation and recession risk globally. Fuel shortages emerge in import-dependent economies, triggering industrial slowdowns, reduced mobility, and rolling outages. Cyber operations escalate into coordinated campaigns targeting energy, logistics, and financial systems. Legal fragmentation accelerates, with overlapping sanctions regimes, asset controls, and enforcement actions constraining cross-border operations. Russia exploits elevated energy revenues and reduced Western focus to press its advantage in Ukraine. China remains indirect but leverages Western overstretch to increase pressure on Taiwan.</p>
        <h3>Likelihood</h3>
        <p><strong>More likely if ceasefire collapses and Gulf assets are targeted:</strong> Escalation becomes self-reinforcing once regional actors are drawn into direct conflict.</p>
        <div>
          <div>
            <div><strong>Business Implications</strong></div>
            <div><strong>Priority Actions (0-90 days)</strong></div>
          </div>
          <div>
            <div><strong>Operational:</strong> Supplier and production relocation, increased redundancy, and higher cost and complexity</div>
            <div><strong>Harden critical infrastructure</strong> dependences (energy, logistics, third parties)</div>
          </div>
          <div>
            <div><strong>Financial:</strong> Energy costs and inflation drive margin pressure, while financing becomes tighter and more expensive</div>
            <div>Test <strong>business continuity under outage</strong> scenarios</div>
          </div>
          <div>
            <div><strong>Competitive:</strong> Resilient, energy-secure firms gain advantage; exposed firms lose share</div>
            <div><strong>Segment and isolate high-value systems;</strong> prioritize offline backups and rapid recovery</div>
          </div>
          <div>
            <div><strong>Legal:</strong> Fragmented, fast-changing sanctions increase compliance burden and legal risk</div>
            <div>Review <strong>third-party and regional concentration risk</strong>, particularly for Middle</div>
          </div>
          <div>
            <div><strong>Reputational:</strong> Scrutiny over pricing, shortages, and exposure drives brand and trust risk</div>
            <div>Establish <strong>crisis governance</strong> and decision cadence</div>
          </div>
        </div>
        <h2>Wildcard Scenario 1: Lasting Peace Agreement</h2>
        <p>Key Drivers <strong>and Assumptions</strong></p>
        <ul>
          <li>Severe degradation of Iranian infrastructure <strong>-&gt; Iran compelled to concede</strong></li>
          <li>Global economic disruption <strong>→ International support for peace process</strong></li>
          <li>Sustained disruption to Hormuz and energy markets <strong>→ Mutual incentive to stabilize</strong></li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_15ce8db2bf558a0ff77b27d30d8ea263a96999b49.png?width=750&amp;format=png&amp;optimize=medium" width="1440" height="960" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 11:</strong></em> <em>Pakistan has offered to host talks to broker peace between US, Iran (Source:</em> <em><a href="https://time.com/article/2026/03/29/iran-war-pakistan-talks-trump/">Time</a>)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1c4d4feb2a20813e86458cd2601e1220aab347bc2.png?width=750&amp;format=png&amp;optimize=medium" width="466" height="269" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 12:</strong></em> <em>Traffic through the Strait of Hormuz dropped significantly since conflict began (Source:</em> <em><a href="https://www.icis.com/chemicals-and-the-economy/2026/03/strait-of-hormuz-closure-starts-to-have-major-economic-impact/">Lloyd's List</a>)</em></div>
          </div>
        </div>
        <h2><strong>Wildcard:</strong> A low-probability, high-impact scenario that challenges existing assumptions</h2>
        <p><strong>Negotiated settlement reached between the US and Iran, allowing for longterm drawdown of conflict.</strong><br />Significant degradation of Iran’s energy, military, and industrial infrastructure, combined with mounting economic strain, power shortages, and reduced capacity to sustain conflict, compels Tehran to reassess its position and signal willingness to accept concessions. In parallel, the United States faces rising economic costs from prolonged energy disruption, inflation, and market instability, increasing pressure to stabilize conditions. A negotiated settlement emerges through indirect talks, mediated by Oman, with Iran accepting concessions on maritime security and nuclear constraints in exchange for phased sanctions relief and assurances against further strikes. Iran seeks a revised Strait of Hormuz security framework and limited economic concessions, though broader demands such as reparations are only partially addressed. The Strait of Hormuz fully reopens under agreed security mechanisms, restoring stable shipping and energy flows. Sanctions ease gradually, enabling reintegration of Iranian energy exports and limited foreign investment. Military activity declines sharply, cyber operations reduce, and global energy markets stabilise, easing inflationary pressures and improving financial conditions.</p>
        <h3>Likelihood</h3>
        <p><strong>Low probability:</strong> Requires significant concessions from one side under sustained pressure.</p>
        <div>
          <div>
            <div><strong>Business Implications</strong></div>
            <div><strong>Priority Actions (0-90 days)</strong></div>
          </div>
          <div>
            <div><strong>Operational:</strong> Supply chains stabilize, enabling efficiency gains and reduced redundancy</div>
            <div><strong>Monitor stabilization signals</strong> and time market re-entry strategically</div>
          </div>
          <div>
            <div><strong>Financial:</strong> Lower energy prices ease margin pressure and improve access to capital</div>
            <div>Secure <strong>long-term energy and supply contracts</strong> at favorable prices</div>
          </div>
          <div>
            <div><strong>Competitive:</strong> Early movers capture growth opportunities in recovering markets</div>
            <div><strong>Re-optimize supply chains</strong> and reduce excess redundancy</div>
          </div>
          <div>
            <div><strong>Legal:</strong> Sanctions easing reduces compliance burden and enables cross-border activity</div>
            <div><strong>Reassess sanctions</strong> exposure and compliance frameworks</div>
          </div>
          <div>
            <div><strong>Reputational:</strong> Stabilization and reinvestment strengthen stakeholder trust</div>
            <div>Align <strong>growth and investment strategy</strong> to recovering regional markets</div>
          </div>
        </div>
        <h2>Wildcard Scenario 2: Iranian Regime Collapses</h2>
        <p>Key Drivers <strong>and Assumptions</strong></p>
        <ul>
          <li>Decades of political repression <strong>-&gt; No viable alternative to Iranian regime</strong></li>
          <li>Sectarian and political unrest <strong>-&gt; Protracted internal conflic</strong>t</li>
          <li>Targeting of leadership <strong>-&gt; Regime instability and eventual collapse</strong></li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1f76e8d0ed0b303d248403a2219cbf67447bf89b9.png?width=750&amp;format=png&amp;optimize=medium" width="664" height="374" />
            </div>
          </div>
          <div>
            <div><strong>Figure 13:</strong> Mass protests against the regime in December 2025 were brutally repressed (Source: <a href="https://www.lemonde.fr/en/international/article/2026/01/09/iran-cuts-internet-as-protest-movement-against-regime-grows_6749254_4.html#">Le Monde</a>)</div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_15426b985b3d8912decf5b57a8bf69dcca736409f.png?width=750&amp;format=png&amp;optimize=medium" width="900" height="505" />
            </div>
          </div>
          <div>
            <div><strong>Figure 14:</strong> Displaced Syrians have lived in refugee camps for ten years, demonstrating the long-term impacts of internal conflict (Source: <a href="https://www.unhcr.org/news/stories/jordans-zaatari-refugee-camp-10-facts-10-years">UNHCR</a>)</div>
          </div>
        </div>
        <h2><strong>Wildcard:</strong> A low-probability, high-impact scenario that challenges existing assumptions</h2>
        <p><strong>The Islamic Republic collapses, plunging the country into a civil war and complex humanitarian crisis.</strong></p>
        <p>The US and Israel’s persistent “decapitation strategy” weakens the regime to the point where it is no longer able to assert internal control. With no viable alternative, the country falls into a multiparty civil war made up of pro-regime, pro-democracy, and assorted regional and ideological militias. Food and fuel shortages are severe in certain regions. Refugee camps are built in Iraq while Europe’s asylum system faces overwhelming demands. The US claims Kharg Island in the chaos and asserts control over the Strait of Hormuz, mitigating international economic damage. However, the political instability gives pro-regime and other ideological groups a base for asymmetric operations, leading to persistent regional disruption. Cyber capabilities degrade amid internal fighting, though some hacktivist operations persist against a wider variety of ideological enemies. Damage to water and energy facilities sustained during the conflict exacerbates humanitarian crisis and slows recovery. Russia supplies military support to pro-regime factions, but not enough to significantly tilt the balance of power.</p>
        <h2>Likelihood</h2>
        <p><strong>Long-term resilience of regime and viability of alternatives is unknown</strong>, making it difficult to assess likelihood with confidence.</p>
        <div>
          <div>
            <div><strong>Business Implications</strong></div>
            <div><strong>Priority Actions (0-90 days)</strong></div>
          </div>
          <div>
            <div><strong>Operational:</strong> Reduced reliability of just-in-time inventory models, especially for firms dependent on Gulf maritime corridors</div>
            <div><strong>Segment critical operations</strong></div>
          </div>
          <div>
            <div><strong>Financial:</strong> Long-term increase in operational and energy costs</div>
            <div><strong>Harden sanctions</strong> and third-party controls</div>
          </div>
          <div>
            <div><strong>Competitive:</strong> Larger firms use stronger government relationships or balance sheets to secure logistics</div>
            <div>Require an <strong>immediate review of regional dependencies,</strong> with backup routing and alternate sourcing plans for critical business lines</div>
          </div>
          <div>
            <div><strong>Legal:</strong> Export-control failures involving dual-use goods, technology, industrial inputs, or cyber tools</div>
            <div>Ensure <strong>employee protection measures</strong> are ready across the region</div>
          </div>
          <div>
            <div><strong>Reputational:</strong> Activist or online campaigns tying the firm to foreign intervention or opportunism</div>
            <div>Create a <strong>90-day resilience plan</strong> including decision triggers for escalation or market withdrawal</div>
          </div>
        </div>
        <h2>Wildcard Scenario 3: Nuclear Crisis</h2>
        <p>Key Drivers <strong>and Assumptions</strong></p>
        <ul>
          <li>Protracted high-intensity conflict <strong>-&gt; Increased likelihood of miscalculation</strong></li>
          <li>Location of facility <strong>-&gt; Risks of radiological contamination spread by air and water</strong></li>
          <li>Diplomatic failures <strong>-&gt; Inability to coordinate on response</strong></li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_11b53b765492fc8b26c103c37690c25df9c8cb78b.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="900" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 15:</strong></em> <em>Bushehr has not yet been a direct target, though missiles have landed near it (Source:</em> <em><a href="https://www.developmentaid.org/news-stream/post/205823/iaea-grossi-bushehr-nuclear-plant-attack-iran-safety-concern-2026">Development Aid</a>)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="Screenshot 2026-04-08 at 4.38.23 PM.png" src="https://www.recordedfuture.com/media_1d81874eed5075ce08a2b37cbf7d2815150e3f685.png?width=750&amp;format=png&amp;optimize=medium" width="1082" height="692" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 16:</strong></em> <em>Weather patterns following the Chernobyl nuclear disaster spread radiological material affecting up to 6 million people (Source:</em> <em><a href="https://www.unscear.org/unscear/en/publications/2024_2.html">UNSCEAR</a>)</em></div>
          </div>
        </div>
        <h2><strong>Wildcard:</strong> A low-probability, high-impact scenario that challenges existing assumptions</h2>
        <p><strong>Missile strikes hitting a nuclear facility lead to a radiological incident, causing immediate global shock and rapid escalation.</strong></p>
        <p>A missile strike causes extensive damage to Iran’s Bushehr civilian nuclear power facility, causing radiological release with cross-border contamination. This occurs due to escalation, miscalculation, or degraded command and control. Immediate impacts include evacuation zones and disruption to regional energy supply. Emergency response efforts are delayed by ongoing conflict, limiting containment and extending environmental and economic damage. As a result, southern Iran and Gulf States experience long-term harm to drinking water supply and maritime food sources. The conflict also prevents long-term monitoring in Iran, which extends the long-term health and environmental damage from inadvertent exposure. Contamination further restricts maritime trade routes in the Gulf, while energy markets react sharply to both supply disruption and elevated systemic risk. Cyber and information operations amplify panic and misinformation.</p>
        <h3>Likelihood</h3>
        <p><strong>Low probability, high impact:</strong> Risk of intentional or unintended strike increases under sustained conflict.</p>
        <div>
          <div>
            <div><strong>Business Implications</strong></div>
            <div><strong>Priority Actions (0-90 days)</strong></div>
          </div>
          <div>
            <div><strong>Operational:</strong> Disruption to regional operations and supply chains; site closures</div>
            <div>Activate <strong>crisis management</strong> and continuity protocols</div>
          </div>
          <div>
            <div><strong>Financial:</strong> Extreme market volatility and energy price spikes</div>
            <div>Protect personnel and <strong>account for regional workforce exposure</strong></div>
          </div>
          <div>
            <div><strong>Competitive:</strong> Firms with geographic diversification gain advantage</div>
            <div>Secure critical systems and <strong>prepare for sustained disruption</strong></div>
          </div>
          <div>
            <div><strong>Legal:</strong> Emergency regulations, sanctions, and liability exposure increase</div>
            <div>Identify <strong>alternative routes</strong> and supply chain contingencies</div>
          </div>
          <div>
            <div><strong>Reputational:</strong> Heightened scrutiny around safety, workforce protection, and response</div>
            <div><strong>Manage disinformation</strong> through strong crisis communications process</div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_1627d52be2bcdad9118913daf3e68f8df1cb60111.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[A New Way to Buy Recorded Future: Solutions and Packages Built for the 2026 Threat Landscape]]></title>
            <link>https://www.recordedfuture.com/blog/recorded-future-solutions-packages</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/recorded-future-solutions-packages</guid>
            <pubDate>Tue, 14 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future is rolling out new pricing and packaging that bundles its intelligence capabilities into four solutions and three tiered plans, with unlimited users and integrations included.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <ul>
                <li>Recorded Future is now offering four solutions covering cyber operations, digital risk protection, third-party risk, and payment fraud.</li>
                <li>Three tiered packages (Core, Professional, Elite) bundle these solutions to scale with an organization's security program.</li>
                <li>Packages include unlimited users and integrations so intelligence reaches everyone who needs it.</li>
              </ul>
            </div>
          </div>
        </div>
        <p>The global threat landscape didn't simplify in 2025. It shattered. Recorded Future's Insikt Group® <a href="https://www.recordedfuture.com/research/state-of-security#download-the-full-report"></a><a href="https://www.recordedfuture.com/research/state-of-security#download-the-full-report">2026 State of Security</a> documented how geopolitical fragmentation, state-sponsored operations, and criminal ecosystem adaptation reshaped global risk. Threats that once stayed in distinct lanes converged, and they converged fast.</p>
        <p>Consider what Insikt Group® tracked last year:</p>
        <ul>
          <li>State-sponsored cyber actors shifted from intelligence collection to persistent access, pre-positioning inside target infrastructure so they can disrupt operations the moment geopolitical tensions escalate.</li>
          <li>Weak governance and systemic corruption <a href="https://www.cnn.com/2026/01/04/asia/china-myanmar-scam-crime-families-intl-hnk-dst">fueled</a> industrialized cybercrime, enabling payment fraud and criminal operations to scale like legitimate businesses.</li>
          <li>Influence operators and hacktivist groups multiplied alongside rising interstate conflict, amplifying fear, uncertainty, and doubt through exaggerated exploit claims.</li>
          <li>Loosely organized criminal collectives used social engineering to compromise third-party SaaS platforms, rapidly adapting to law enforcement action and traditional defenses alike.</li>
        </ul>
        <p>The risk surface has expanded well beyond networks and endpoints. Your brand, your third-party vendors, your payment networks: each has its own threat actors, its own attack methods, and its own intelligence requirements. Yet most intelligence programs only cover one of these domains. Or they monitor them in silos, with no shared context.</p>
        <p>The right intelligence, from the right sources, at the right time, is a critical competitive advantage. But intelligence only matters if you can act on it across every critical risk domain before attackers reach their objective.</p>
        <h2>Re-Imagining How Intelligence Is Delivered And Operationalized</h2>
        <p>Historically, Recorded Future has been sold on a <strong>per-user</strong> and <strong>per-capability</strong> basis - a model that worked well in a simpler world where security teams were focused on solving the most urgent problem in front of them.</p>
        <p>Today’s threat landscape is <strong>fast, more complex, and deeply interconnected</strong>. Customers are no longer looking for point solutions, they’re asking for a fundamentally different way to consume and operationalize intelligence.</p>
        <p>Customers are asking us to provide:</p>
        <ul>
          <li>Complete capabilities to support use cases aligned with core risk domains.</li>
          <li>Democratized access to intelligence across teams, workflows and systems.</li>
          <li>A simplified and predictable way to purchase for ease of budgeting and adoption.</li>
        </ul>
        <p>In response, we’ve re-imagined Recorded Future is delivered:</p>
        <p><strong>“Four Solutions. Three Packages. One Intelligence Foundation.”</strong></p>
        <p>A unified approach designed to scale with your organization, accelerate time to value, and embed intelligence into every decision that matters.</p>
        <h2>Four Solutions for Four Critical Risk Domains</h2>
        <p>Your threats span your infrastructure, your brand, your vendors, and your payment networks. Your intelligence should too. We’ve re-organized our platform into <a href="https://www.recordedfuture.com/solutions-overview">four purpose-built solutions</a> tied to distinct domains of enterprise risk.</p>
        <p><strong>Cyber Operations</strong> gives your security team the intelligence, workflows, and autonomous actions to detect, investigate, and respond to threats targeting your infrastructure. Alert triage, real-world vulnerability prioritization, malware analysis, proactive hunting: this is where reactive firefighting becomes predictive, intelligence-led defense.</p>
        <p><strong>Digital Risk Protection</strong> helps detect and disrupt threats that never touch your network but directly damage your business: brand impersonation, domain abuse, credential leaks, and phishing infrastructure across the open, deep, and dark web. With access to active infostealer logs and automated IAM remediation, your team can act on exposures within hours, not weeks.</p>
        <p><strong>Third-Party Risk</strong> delivers continuous, intelligence-driven monitoring of your vendor ecosystem. Security ratings combined with real-time threat intelligence surface breaches, ransomware activity, and dark web exposure days or weeks before formal vendor notification, giving your security and GRC teams evidence they can act on and defend to stakeholders.</p>
        <p><strong>Payment Fraud Intelligence</strong> identifies stolen payment cards, compromised checks, scam merchants, and web-skimming activity earlier in the fraud lifecycle, so financial institutions can stop losses before they materialize.</p>
        <p>Each solution delivers complete, end-to-end capability for its risk domain. And because all four run on the same Intelligence Graph®, a signal detected in one domain immediately enriches context across the others.</p>
        <h2>Three Packages That Scale With Your Program</h2>
        <p>Modern organizations operate across multiple risk domains. We are introducing three packages that reflect that reality, meeting customers where they are and scale as their programs mature.</p>
        <ul>
          <li><strong>Core</strong> is the foundation for intelligence-led security. It enables organizations to tackle essential use cases on day one - threat detection and alert triage, vulnerability monitoring, credential exposure detection, domain abuse monitoring, and executive impersonation protection. The package combines capabilities across Cyber Operations and Digital Risk Protection solutions, providing immediate, high-impact coverage.</li>
          <li><strong>Professional</strong> is built for organizations ready to mature their program and operationalize intelligence at scale. Building on Core, it introduces deeper insights and automation to extend team capacity - enabling autonomous threat hunting, multi-source correlation, and external asset discovery. The result is broader coverage, faster response, and more leverage for security teams without adding headcount.</li>
          <li><strong>Elite</strong> delivers the most comprehensive intelligence coverage available. By unifying Cyber Operations, Digital Risk Protection, and Third-Party Risk, it provides a complete view of risk across infrastructure, brand, and supply chain. With a single pane of glass, Elite operationalizes intelligence across workflows and teams—from CTI to SOC to Risk—driving smarter and faster risk-enabled decision making and response.</li>
        </ul>
        <p>Across all packages, customers get full access to the Intelligence Graph®, Recorded Future AI, all compatible integrations, APIs, and Collective Insights. No hidden costs or barriers to connect to your existing security stack.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_12b2d0d3fac0e2942d3f007ce5150af9dbad58272.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="886" />
        </p>
        <h2>Built for Everyone Who Needs Intelligence, Not Just Analysts</h2>
        <p>Intelligence only creates value when the right people can act on it. That's why our platform packages include unlimited users. Every analyst, every engineer, every stakeholder who needs intelligence gets it, with no seat limits and no trade-offs about who gets access.</p>
        <p>For smaller teams building early-stage programs, we still offer flexible user-based licensing so you can start where it makes sense and expand as your program matures. Either way, pricing is predictable. You know what you're paying, and you can scale with confidence.</p>
        <p>Every package also includes unlimited integrations from Recorded Future’s hundreds of supported applications at no additional cost. Your SIEMs, EDRs, SOAR platforms, and ticketing systems all get equipped with real-time intelligence, so every analyst and engineer working in those tools benefits from enriched context without switching screens. Add Autonomous Threat Operations, and those same integrations become the foundation for autonomous hunting, detection, and prevention across your entire stack. Connected tools become an intelligence-led defense system that acts continuously, with minimal human intervention.</p>
        <h2>One Intelligence Foundation Across Every Domain</h2>
        <p>What makes this approach powerful isn't just simpler packaging. All four solutions and all three packages run on the same intelligence foundation: the Intelligence Graph®, correlating over 1.2 million sources and 26 billion entities across cyber, digital, third-party, and fraud domains.</p>
        <p>A credential leak detected in Digital Risk Protection immediately informs a Cyber Operations investigation. A vulnerability under active exploitation triggers prioritized patching in your workflow. A third-party vendor breach surfaces before the vendor discloses it. Intelligence flows across your entire risk surface, giving you the correlated, high-confidence context that point solutions can't deliver.</p>
        <p>That's what it means to be intelligence-led. Not consuming more data. Connecting signals across domains so you can act earlier, with greater confidence, at machine speed.</p>
        <h2>The Path Forward</h2>
        <p>Adversaries in 2026 are faster, more coordinated, and more resourceful than they've ever been. They operate across every attack surface simultaneously, and they're accelerating.</p>
        <p>Whether you're a team of three building your first intelligence program or a global enterprise running intelligence-led autonomous operations, there's a clear path. Start with the solution or package that matches your priorities today. Grow into deeper automation and broader coverage as your program matures. And at every step, you're backed by the most comprehensive and independent intelligence platform in the industry.</p>
        <p>We built this for the threats you're facing right now, and the ones coming next.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1e8bfe6c30d46a0a069c153bdd14cca201642a2b4.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[March 2026 CVE Landscape: 31 High-Impact Vulnerabilities Identified, Interlock Ransomware Group Exploits Cisco FMC Zero-Day]]></title>
            <link>https://www.recordedfuture.com/blog/march-2026-cve-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/march-2026-cve-landscape</guid>
            <pubDate>Mon, 13 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[March 2026 saw a 139% increase in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 31 vulnerabilities requiring immediate remediation, up from 13 in February 2026.]]></description>
            <content:encoded><![CDATA[
        <p>In March 2026, <a href="https://www.recordedfuture.com/research/insikt-group">Insikt Group®</a> identified <strong>31 high-impact vulnerabilities that should be prioritized for remediation</strong>, 29 of which had a Very Critical Recorded Future Risk Score.</p>
        <p>These vulnerabilities affected products from the following vendors: Cisco, Microsoft, Google, ConnectWise, Langflow, Citrix, Aquasecurity, Nginx UI, Qualcomm, F5, Craft CMS, Laravel, Apple, Synacor, Wing FTP Server, n8n, Omnissa, SolarWinds, Ivanti, Hikvision, Rockwell, and Broadcom. This month’s most affected vendors were Microsoft and Apple, together accounting for approximately 32% of the 31 vulnerabilities.</p>
        <p>One vulnerability (<a href="https://app.recordedfuture.com/portal/intelligence-card/TKKaG7/overview?organization=uhash%3A5cJsHMHeSM">CVE-2017-7921</a> affecting Hikvision) is approximately nine years old, reinforcing how <strong>attackers continue to exploit long-known weaknesses in environments where patching has lagged</strong>. Legacy and unpatched systems remain attractive targets. Defenders should not discount older CVEs; instead, they should prioritize based on observed activity, maintain strong asset visibility, and apply compensating controls where remediation is not possible.</p>
        <p>In March, Insikt Group® created Nuclei templates for a high-severity path traversal vulnerability in MindsDB (CVE-2026-27483) and a critical missing authentication vulnerability in Nginx UI (CVE-2026-27944). Additionally, Insikt Group® had already published a Nuclei template for <a href="https://app.recordedfuture.com/portal/intelligence-card/BBzIRBQ/overview">CVE-2025-68613</a> (n8n) in December, prior to its exploitation this month. We also identified public proof-of-concept (PoC) exploits for 10 of the 31 vulnerabilities.</p>
        <h2>Quick Reference: March 2026 Vulnerability Table</h2>
        <p><em>All 31 vulnerabilities below were actively exploited in March 2026. The table below also provides examples of public PoCs identified by Insikt Group®. These PoCs were not tested for accuracy or efficacy. Vulnerability management teams should exercise caution and verify the validity of PoCs before testing.</em></p>
        <div>
          <div>
            <div><strong>#</strong></div>
            <div><strong>Vulnerability</strong></div>
            <div><strong>Risk</strong><br /><strong>Score</strong></div>
            <div><strong>Affected Vendor/Product</strong></div>
            <div><strong>Vulnerability Type/Component</strong></div>
            <div><strong>Public PoC</strong></div>
          </div>
          <div>
            <div>1</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BFRKHY5/overview">CVE-2026-20131</a></div>
            <div>99</div>
            <div>Cisco Secure Firewall Management Center (FMC)</div>
            <div>CWE-502 (Deserialization of Untrusted Data)</div>
            <div><a href="https://github.com/search?q=CVE-2026-20131&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>2</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BFoBpjQ/insikt-group">CVE-2026-21262</a></div>
            <div>99</div>
            <div>Microsoft SQL Server (2016 SP3, 2017, 2019, 2022, 2025)</div>
            <div>CWE-284 (Improper Access Control)</div>
            <div>No</div>
          </div>
          <div>
            <div>3</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BFn9MQ7/overview">CVE-2026-26127</a></div>
            <div>99</div>
            <div>Microsoft .NET (9.0, 10.0) and Microsoft.Bcl.Memory</div>
            <div>CWE-125 (Out-of-bounds Read)</div>
            <div>No</div>
          </div>
          <div>
            <div>4</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BDX4YdD/overview">CVE-2026-3909</a></div>
            <div>99</div>
            <div>Google Skia</div>
            <div>CWE-787 (Out-of-bounds Write)</div>
            <div>No</div>
          </div>
          <div>
            <div>5</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BDYGD9W/overview">CVE-2026-3910</a></div>
            <div>99</div>
            <div>Google Chromium V8</div>
            <div>CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)</div>
            <div>No</div>
          </div>
          <div>
            <div>6</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BDuduqq/overview">CVE-2026-3564</a></div>
            <div>99</div>
            <div>ConnectWise ScreenConnect</div>
            <div>CWE-347 (Improper Verification of Cryptographic Signature)</div>
            <div>No</div>
          </div>
          <div>
            <div>7</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BGDkG7T/overview">CVE-2026-33017</a></div>
            <div>99</div>
            <div>Langflow</div>
            <div>CWE-94 (Code Injection), CWE-95 (Eval Injection), CWE-306 (Missing Authentication for Critical Function)</div>
            <div><a href="https://github.com/search?q=CVE-2026-33017&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>8</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BC_b0iQ/overview">CVE-2026-3055</a></div>
            <div>99</div>
            <div>Citrix NetScaler</div>
            <div>CWE-125 (Out-of-bounds Read)</div>
            <div><a href="https://github.com/search?q=CVE-2026-3055&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>9</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BGZlyzi/overview">CVE-2026-33634</a></div>
            <div>99</div>
            <div>Aquasecurity Trivy</div>
            <div>CWE-506 (Embedded Malicious Code)</div>
            <div><a href="https://github.com/search?q=CVE-2026-33634&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>10</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BFoBple/overview">CVE-2026-25187</a></div>
            <div>94</div>
            <div>Microsoft Windows</div>
            <div>CWE-59 (Link Following)</div>
            <div>No</div>
          </div>
          <div>
            <div>11</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BGyXkVZ/overview">CVE-2026-33032</a></div>
            <div>94</div>
            <div>Nginx UI</div>
            <div>CWE-306 (Missing Authentication for Critical Function)</div>
            <div>No</div>
          </div>
          <div>
            <div>12</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BFJwFWu/overview">CVE-2026-21385</a></div>
            <div>89</div>
            <div>Qualcomm (Multiple Chipsets)</div>
            <div>CWE-190 (Integer Overflow or Wraparound)</div>
            <div>No</div>
          </div>
          <div>
            <div>13</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/_YufFK/overview">CVE-2025-53521</a></div>
            <div>99</div>
            <div>F5 BIG-IP</div>
            <div>CWE-121 (Stack-based Buffer Overflow)</div>
            <div>No</div>
          </div>
          <div>
            <div>14</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/5GY7RL/overview">CVE-2025-32432</a></div>
            <div>99</div>
            <div>Craft CMS</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2025-32432&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>15</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/8EgOyF/overview">CVE-2025-54068</a></div>
            <div>99</div>
            <div>Laravel Livewire</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2025-54068&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>16</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/5R0AQh/overview">CVE-2025-43510</a></div>
            <div>99</div>
            <div>Apple (Multiple Products)</div>
            <div>CWE-667 (Improper Locking)</div>
            <div>No</div>
          </div>
          <div>
            <div>17</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/5R0IDa/overview">CVE-2025-43520</a></div>
            <div>99</div>
            <div>Apple (Multiple Products)</div>
            <div>CWE-120 (Classic Buffer Overflow)</div>
            <div>No</div>
          </div>
          <div>
            <div>18</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/4vXkLn/overview">CVE-2025-31277</a></div>
            <div>99</div>
            <div>Apple (Multiple Products)</div>
            <div>CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)</div>
            <div>No</div>
          </div>
          <div>
            <div>19</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BCABqPu/overview">CVE-2025-66376</a></div>
            <div>99</div>
            <div>Synacor Zimbra Collaboration Suite (ZCS)</div>
            <div>CWE-79 (Cross-site Scripting)</div>
            <div>No</div>
          </div>
          <div>
            <div>20</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BC79ud1/overview">CVE-2026-20963</a></div>
            <div>99</div>
            <div>Microsoft SharePoint</div>
            <div>CWE-502 (Deserialization of Untrusted Data)</div>
            <div><a href="https://github.com/jenniferreire26/CVE-2026-20963">Yes</a></div>
          </div>
          <div>
            <div>21</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/5913NU/overview">CVE-2025-47813</a></div>
            <div>99</div>
            <div>Wing FTP Server</div>
            <div>CWE-209 (Generation of Error Message Containing Sensitive Information)</div>
            <div>No</div>
          </div>
          <div>
            <div>22</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BBzIRBQ/overview">CVE-2025-68613</a></div>
            <div>99</div>
            <div>n8n</div>
            <div>CWE-913 (Improper Control of Dynamically-Managed Code Resources)</div>
            <div><a href="https://github.com/search?q=CVE-2025-68613&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>23</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/k5mef6/overview">CVE-2021-22054</a></div>
            <div>99</div>
            <div>Omnissa Workspace One UEM</div>
            <div>CWE-918 (SSRF)</div>
            <div><a href="https://github.com/MKSx/CVE-2021-22054">Yes</a></div>
          </div>
          <div>
            <div>24</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/3LwTz8/overview">CVE-2025-26399</a></div>
            <div>99</div>
            <div>SolarWinds Web Help Desk</div>
            <div>CWE-502 (Deserialization of Untrusted Data)</div>
            <div>No</div>
          </div>
          <div>
            <div>25</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BDPo5zB/overview">CVE-2026-1603</a></div>
            <div>99</div>
            <div>Ivanti Endpoint Manager (EPM)</div>
            <div>CWE-288 (Authentication Bypass Using an Alternate Path or Channel)</div>
            <div>No</div>
          </div>
          <div>
            <div>26</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/TKKaG7/overview">CVE-2017-7921</a></div>
            <div>99</div>
            <div>Hikvision (Multiple Products)</div>
            <div>CWE-287 (Improper Authentication)</div>
            <div><a href="https://github.com/search?q=CVE-2017-7921&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>27</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/hZXl2g/overview">CVE-2021-22681</a></div>
            <div>99</div>
            <div>Rockwell (Multiple Products)</div>
            <div>CWE-522 (Insufficiently Protected Credentials)</div>
            <div>No</div>
          </div>
          <div>
            <div>28</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/ssAv1Q/overview">CVE-2023-43000</a></div>
            <div>99</div>
            <div>Apple (Multiple Products)</div>
            <div>CWE-416 (Use After Free)</div>
            <div>No</div>
          </div>
          <div>
            <div>29</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/lEMfcP/overview">CVE-2021-30952</a></div>
            <div>92</div>
            <div>Apple (Multiple Products)</div>
            <div>CWE-190 (Integer Overflow or Wraparound)</div>
            <div>No</div>
          </div>
          <div>
            <div>30</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/t5YiER/overview">CVE-2023-41974</a></div>
            <div>99</div>
            <div>Apple iOS and iPadOS</div>
            <div>CWE-416 (Use After Free)</div>
            <div>No</div>
          </div>
          <div>
            <div>31</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEwAt0u/overview">CVE-2026-22719</a></div>
            <div>89</div>
            <div>Broadcom VMware Aria Operations</div>
            <div>CWE-77 (Command Injection)</div>
            <div>No</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>List of vulnerabilities that were actively exploited in March based on Recorded Future data.</em></p>
        <h2>Key Trends: March 2026</h2>
        <ul>
          <li>Most commonly observed weaknesses: CWE-502 (Deserialization of Untrusted Data) and CWE-94 (Code Injection).</li>
          <li>Two vulnerabilities and one exploit kit (consisting of 23 exploits, 12 of which are currently associated with specific CVEs) were linked to malware campaigns.
            <ul>
              <li>Interlock Ransomware Group exploited a zero-day in Cisco Secure Firewall Management Center to compromise enterprise networks, deploy custom remote access trojans (RATs), and facilitate ransomware operations.</li>
              <li>Separately, the DarkSword iOS full-chain exploit enabled Safari-based remote code execution (RCE), sandbox escape, and kernel-level access, leading to deployment of the GHOSTKNIFE, GHOSTSABER, and GHOSTBLADE payloads.</li>
              <li>The Coruna exploit kit similarly compromised iOS devices to deliver the PlasmaLoader (PLASMAGRID) malware.</li>
            </ul>
          </li>
          <li>9 of the 31 vulnerabilities (<a href="https://app.recordedfuture.com/portal/intelligence-card/BDYGD9W/overview">CVE-2026-3910</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/BGDkG7T/overview">CVE-2026-33017</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/5GY7RL/overview">CVE-2025-32432</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/8EgOyF/overview">CVE-2025-54068</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/BC79ud1/overview">CVE-2026-20963</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/BBzIRBQ/overview">CVE-2025-68613</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/3LwTz8/overview">CVE-2025-26399</a>, <a href="https://app.recordedfuture.com/portal/intelligence-card/lEMfcP/overview">CVE-2021-30952</a>, and <a href="https://app.recordedfuture.com/portal/intelligence-card/t5YiER/overview">CVE-2023-41974</a>) allowed attackers to conduct RCE.
            <ul>
              <li>These 9 vulnerabilities affected Google, Langflow, Craft CMS, Laravel, Microsoft, n8n, SolarWinds, and Apple.</li>
            </ul>
          </li>
        </ul>
        <h2>Exploitation Analysis</h2>
        <p>This section analyzes two of the highest-impact, actively exploited vulnerabilities this month. Where applicable, it also highlights the availability of Nuclei templates created by Insikt Group®. The full list of reports and detection rules from March is available to customers in the Recorded Future Intelligence Operations Platform.</p>
        <h3>Interlock Ransomware Group Exploits Cisco FMC Zero-Day (CVE-2026-20131)</h3>
        <p>On March 18, 2026, Amazon Threat Intelligence published an analysis detailing an ongoing <a href="https://app.recordedfuture.com/portal/intelligence-card/zVBC51/overview">Interlock ransomware</a> campaign exploiting <a href="https://app.recordedfuture.com/portal/intelligence-card/BFRKHY5/overview">CVE-2026-20131</a>. CVE-2026-20131 is a critical vulnerability affecting <a href="https://app.recordedfuture.com/portal/intelligence-card/QtqtQ_/overview">Cisco’s Secure Firewall Management Center (FMC)</a> software that allows unauthenticated threat actors to execute arbitrary Java code as root on vulnerable devices. Cisco Secure FMC is a centralized management platform that allows administrators to configure, monitor, and control Cisco firewall devices and network security policies across an enterprise environment. According to Amazon Threat Intelligence, <a href="https://app.recordedfuture.com/portal/intelligence-card/zeRf3k/overview">Interlock Ransomware Group</a> exploited CVE-2026-20131 as a zero-day vulnerability beginning January 26, 2026, indicating active exploitation prior to its public disclosure and enabling early compromise of enterprise networks.</p>
        <p>The Interlock Ransomware Group exploits vulnerable Cisco FMC instances via crafted HTTP requests exploiting CVE-2026-20131 to execute arbitrary Java code as root. After gaining access, the threat actors deploy a malicious ELF binary from a staging server at <em>37[.]27[.]244[.]222</em> (<a href="https://app.recordedfuture.com/portal/intelligence-card/ip%3A37.27.244.222/overview">Intelligence Card</a>) to support follow-on operations.</p>
        <p>They then use custom Java- and JavaScript-based RATs, a memory-resident web shell, and proxy infrastructure to maintain access, enable lateral movement, and evade detection. Post-compromise activity includes reconnaissance, data collection and staging, and the use of legitimate tools such as ConnectWise ScreenConnect, Volatility, and Certify for remote access, credential theft, and privilege escalation.</p>
        <p>Insikt Group® obtained a <code>screen locker</code> sample (SHA256: <a href="https://app.recordedfuture.com/portal/intelligence-card/hash%3A6c8efbcef3af80a574cb2aa2224c145bb2e37c2f3d3f091571708288ceb22d5f/overview">6c8efbcef3af80a574cb2aa2224c145bb2e37c2f3d3f091571708288ceb22d5f</a>) shared by Amazon Threat Intelligence from <a href="https://www.recordedfuture.com/products/cyber-operations">Recorded Future Malware Intelligence</a>. Sandbox analysis detected the sample as benign. Based on sandbox and static code analysis, the sample performs the following actions on a victim’s machine:</p>
        <ul>
          <li>Changes the machine’s desktop wallpaper that displays a pornographic image</li>
          <li>Delays execution using the Sleep API function for evasion</li>
          <li>Detects debuggers using the GetTickCount API function to compare timing</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_186a5991dfbe0bc8b2faaeac82ea8f42c1a8c4b35.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="769" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>Risk Rules History from Hash Intelligence Card® for 6c8efbcef3af80a574cb2aa2224c145bb2e37c2f3d3f091571708288ceb22d5f in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Recorded Future customers can find additional exploitation details and MITRE ATT&amp;CK techniques associated with the exploitation of Cisco FMC Zero-Day (CVE-2026-20131) in the Diamond Models section of this <a href="https://app.recordedfuture.com/portal/research/insikt/doc:BGLaVtO/diamond">TTP Instance</a>.</p>
        <h3>Critical Deserialization of Untrusted Data Vulnerability Affecting Cisco Secure FMC Software and Cisco SCC Firewall Management (CVE-2026-20131)</h3>
        <p>On March 11, 2026, GitHub user Sadaf Athar Khan (sak110 on GitHub) shared an <a href="https://github.com/sak110/CVE-2026-20131">alleged proof-of-concept PoC exploit</a> for <a href="https://app.recordedfuture.com/portal/intelligence-card/BFRKHY5/overview">CVE-2026-20131</a>. CVE-2026-20131 is a critical Deserialization of Untrusted Data vulnerability affecting <a href="https://app.recordedfuture.com/portal/intelligence-card/QtqtQ_/overview">Cisco Secure Firewall Management Center (FMC)</a> Software and <a href="https://app.recordedfuture.com/portal/intelligence-card/BFMZUkl/overview">Cisco Security Cloud Control (SCC) Firewall Management</a>. Cisco Secure FMC Software is a web-based platform for centrally managing firewall policies, events, and device administration. Cisco SCC Firewall Management is a Software-as-a-Service-based (SaaS) solution for centralized configuration, monitoring, and maintenance across firewall deployments.</p>
        <p>Exploitation of CVE-2026-20131 allows an unauthenticated remote threat actor to execute arbitrary code and gain root privileges on the affected devices. On March 4, 2026, Cisco published a security advisory and released software updates to fix CVE-2026-20131. The vulnerability resides in the web-based management interface of FMC, where insecure deserialization of a user-supplied Java byte stream allows threat actors to pass serialized objects into Java object handling without sufficient validation. As a result, an unauthenticated remote threat actor can send a crafted serialized Java object to the management interface, trigger arbitrary code execution, and escalate privileges to root.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1d915f77fc51c8a00cb25b9d3961761c63f602a4a.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="778" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em><a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2026-20131 in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Based on Sadaf Athar Khan’s repository, the PoC requires a target URL and a command. Once provided, the PoC generates a malicious Java-serialized object using <code>ysoserial</code>, embedding the supplied command within the payload and preparing it for delivery to the specified target.</p>
        <p>The PoC then attempts to submit the serialized object to a set of candidate endpoints included in the PoC that accept serialized Java data. A reachable deserialization path allows the application to process the object and run the embedded command on the target host. After delivery, the PoC checks the server’s HTTP response codes and treats an HTTP 500 response as an indication that deserialization triggered command execution. The PoC flags HTTP 200 for manual verification because exploitation could succeed without returning visible output.</p>
        <p>Insikt Group® has not tested this PoC for accuracy or efficacy. Recorded Future customers can find MITRE ATT&amp;CK techniques associated with the alleged PoC in the Entities section of this <a href="https://app.recordedfuture.com/portal/research/insikt/doc:BGKXT9d/entities">TTP Instance</a>.</p>
        <h2>Take Action</h2>
        <p>Timely and relevant information on vulnerabilities in your environment and that of your vendors and suppliers is critical for reducing risk. Find out how Recorded Future can support your team by increasing visibility, improving efficiency, and enabling confident decisions.</p>
        <p><strong><a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a></strong> – Prioritize vulnerabilities based on the likelihood of exploitation – not just the severity. Easily understand the risk of exploitation alongside severity, and real-time contextualized intelligence to help you quickly make confident decisions, patch what matters, and prevent attacks.</p>
        <p><strong><a href="https://www.recordedfuture.com/products/attack-surface-intelligence">Attack Surface Intelligence</a></strong> – Identify internet-facing assets vulnerable to a specific CVE. Attack Surface Intelligence provides an outside-in view of your organization to help you actively discover, prioritize, and respond to unknown, vulnerable, or misconfigured assets.</p>
        <p><strong><a href="https://www.recordedfuture.com/products/third-party-intelligence">Third-Party Intelligence</a></strong> – Gain an external view of the security posture of your vendors and partners. Eliminate time-consuming research and vendor communication cycles with the ability to promptly assess vulnerabilities in their internet-facing systems.</p>
        <p><strong><a href="https://www.recordedfuture.com/research/insikt-group">Insikt Group®</a></strong> – Receive access to exclusive reports on new vulnerabilities and trends from Recorded Future’s team of experts, the Insikt Group®. Download Nuclei templates created by Insikt Group® for select CVEs to test potentially vulnerable instances.</p>
        <p><strong><a href="https://www.recordedfuture.com/services/intelligence-services">Recorded Future Professional Services</a></strong> – Work with our Professional Services team on a Vulnerability Analysis Engagement. Designed to equip your team with advanced strategies for identifying, prioritizing, and mitigating threats effectively, this program delves into technologies and operations essential for a successful vulnerability management program. (Learn more about how our Professional Services team can help your elevate your team by watching our recent <a href="https://www.brighttalk.com/webcast/20971/650977?utm_source=brighttalk-portal&amp;utm_medium=web&amp;utm_campaign=channel-page&amp;utm_content=cve-monthly-blog">Vulnerability Prioritization Workshop</a>)</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1eb057ac8d9e33292f2d343e2c01e9ea4a86902bd.jpg?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[VIP Credential Monitoring Blog]]></title>
            <link>https://www.recordedfuture.com/blog/vip-credential-monitoring-blog</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/vip-credential-monitoring-blog</guid>
            <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Executives and high-privilege users are prime targets for credential theft — and standard monitoring often misses them. Learn how VIP Credential Monitoring in Recorded Future Identity Intelligence protects your most sensitive accounts across work and personal email, and why detection speed is the difference between a resolved alert and a major incident.]]></description>
            <content:encoded><![CDATA[
        <p>There's a category of employee credentials where standard monitoring often falls short: executives, finance leaders, IT administrators, and those with privileged access have a large target on their back.</p>
        <p>VIP Credential Monitoring in Recorded Future is built to solve this problem. It continuously monitors for credential exposures tied to your most sensitive individuals across both work and personal accounts, and alerts your team fast enough to act before an account takeover occurs.</p>
        <h2>The Challenge with Protecting Your Most Targeted People</h2>
        <p>According to <a href="https://www.verizon.com/business/resources/reports/2025-dbir-executive-summary.pdf">Verizon's 2025 Data Breach Investigations Report</a>, credential abuse was the most prominent initial access vector observed across breaches. Attackers don't need to find a technical vulnerability to get inside your organization. Stolen credentials are widely available across criminal forums and dark web marketplaces, and buying access is often faster and cheaper than building an exploit.</p>
        <p>What makes this particularly calculated is how threat actors decide which credentials to buy. Infostealer malware logs don't just capture usernames and passwords — they capture the authorization URLs where those credentials were entered. According to Recorded Future’s <a href="https://www.recordedfuture.com/blog/identity-trend-report-march-blog">2025 Identity Threat Landscape Report</a>, 7 million credentials were indexed with identifiable authorization URLs, with 63.2% of those having been linked to authentication systems.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a62ce422e875506eaab3067aac23093b66512971.png?width=750&amp;format=png&amp;optimize=medium" width="932" height="599" />
            </div>
          </div>
          <div>
            <div><strong>Figure 1</strong>: Top authorization URL categories, 2025 (Source: Recorded Future)</div>
          </div>
        </div>
        <p>That means attackers can usually identify the access endpoints credentials unlock and they will prioritize accordingly. Executives and anyone with broad access to systems and data sit at the top of that list.</p>
        <p>The 2025 cyber attack on University of Pennsylvania illustrates exactly how this plays out. A threat actor compromised a single employee's SSO credential and used it to move laterally across corporate systems, ultimately exposing data on approximately 1.2 million donors, alumni, and students. One credential, one login, and an organizational crisis.</p>
        <p>The threat doesn't stop at corporate accounts. When attackers can't get hold of an executive's work credentials, they target personal accounts for these high-value targets. A personal email or social account can expose sensitive communications, private information, or material an attacker can use for extortion.</p>
        <p>Corporate security controls don't extend to personal accounts. When those credentials are stolen, most security teams have no line of sight.</p>
        <p>That gap between exposure and discovery is where the risk lives. Credentials stolen by infostealer malware are often purchased and weaponized within 48 hours of the compromise, potentially days or weeks before a security team has any indication something is wrong. For standard employee accounts, that window is serious. For your CEO or Head of Engineering, it's critical.</p>
        <h2>Monitoring Built for High-Value Targets</h2>
        <p>VIP Credential Monitoring provides continuous monitoring and alerting on compromised credentials for your high-value targets. Security teams can add personal or work email addresses for their executives and others with widespread access.</p>
        <p>From that point forward, Recorded Future continuously monitors for those accounts across its full source coverage: infostealer malware logs from 30+ malware families, dark web forums, criminal marketplaces, paste sites, and breach dumps. When a VIP credential surfaces in that data, the team receives an alert with full contextual detail (malware family, authorization URL, compromised host information, etc.) so they can act with confidence.</p>
        <p>Many executive monitoring solutions surface credential data that is days or weeks old by the time it reaches an analyst. By then, the window to get ahead of an attacker has often closed. <a href="https://www.recordedfuture.com/blog/identity-trend-report-march-blog">For all stolen credentials indexed in 2025</a>, Recorded future detected 36.4% within 24 hours of exfiltration, and 52.9% within one week.</p>
        <p>The gap between when credentials are stolen and when a security team finds out is where breaches happen. Recorded Future closes that gap.</p>
        <p>When a VIP credential appears in exposure data, teams can initiate a password reset, review active sessions, or reach out directly to the individual — all before the credential is exploited. For identities that carry this level of organizational risk, getting ahead of the exposure isn't just operationally valuable; it can be the difference between a resolved alert and a significant incident.</p>
        <h2>A Complete Picture of Identity Exposure</h2>
        <p>VIP Credential Monitoring is built on the same intelligence infrastructure that powers Recorded Future <a href="https://www.recordedfuture.com/products/identity-intelligence">Identity Intelligence</a> broadly: the same source coverage, the same detection engine, the same alert and triage workflow. It applies that capability to a category of identities that warrant closer attention, without requiring a separate tool, process, or integration. That's the logic behind Identity Intelligence as a whole: a unified view of credential exposure across every category of identity your organization needs to protect, covering employees, customers, and your highest-risk individuals.</p>
        <p>For teams already using Identity Intelligence to monitor employee and customer credentials, VIP Monitoring is a targeted extension of coverage that fits into what they've already built. Any VIP credentials identified will benefit from the same core features of Identity Intelligence.</p>
        <p>This includes Incident Reports, which surfaces any other credentials that may have been compromised from the same machine, and Customizable Alerting, which streamlines prioritization of these detections and can trigger response workflows through existing integrations with Okta, Microsoft Entra ID, XSOAR, Splunk, and others.</p>
        <p>Attackers don't limit their targets to one type of account, and your monitoring shouldn't either. To see where you stand today, request a free <a href="https://pages.recordedfutureext.com/IdentityExposureReport_LandingPage.html">Identity Exposure Assessment Report</a> and get a concrete, evidence-based picture of your organization's credential exposure over the past year. Contact us to learn more about how Recorded Future can help your organization protect its identities and to see a demo of the platform in action.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_189c2081486ef4c5b4333dd74730e898e793786a9.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Third-Party Risk Is an Intelligence Operation. It's Time We Treated It Like One.]]></title>
            <link>https://www.recordedfuture.com/blog/recorded-future-sees-its-inclusion-in-the-2026-forrester-wave</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/recorded-future-sees-its-inclusion-in-the-2026-forrester-wave</guid>
            <pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future sees its inclusion in the 2026 Forrester Wave™ for Cybersecurity Risk Ratings Platforms as a reflection of a broader truth: the era of ratings-only vendor risk management is over.]]></description>
            <content:encoded><![CDATA[
        <p>For years, the cybersecurity industry has treated third-party risk management as a compliance exercise. Assess your vendors. Assign a score. File the report. Move on. That model was built for a different era. One where supply chains were smaller, threat actors were less sophisticated, and a quarterly questionnaire could reasonably approximate a vendor's security posture. That era is over.</p>
        <p>Today, the average enterprise works with hundreds of third parties. Threat actors actively target the weakest links across those supply chains, not because the vendors themselves are the prize, but because they're the path of least resistance into larger, more valuable targets.</p>
        <p>Ransomware groups list vendors on extortion sites before those vendors even know they've been compromised. Stolen employee credentials surface on dark web forums undetected. Critical vulnerabilities are weaponized in hours, not months. In this environment, a security rating is necessary. But it is nowhere near sufficient.</p>
        <h2>Recognized in the 2026 Forrester Wave™</h2>
        <p>Recorded Future was recently included in The Forrester Wave™: Cybersecurity Risk Ratings Platforms, Q2 2026. (The report is available online to <a href="https://www.forrester.com/report/RES192714">Forrester customers or for purchase</a> <a href="https://www.forrester.com/report/RES192714">here</a>).</p>
        <p>We see this recognition as a reflection of the market's evolution — and as an acknowledgement of the direction we've been building toward.</p>
        <p>We believe the cybersecurity risk ratings market is at an inflection point. Analysts and practitioners alike recognize that the category is moving beyond standalone ratings toward integrated intelligence and actionable insights. We see our inclusion in this evaluation as confirmation that the convergence of hygiene data and threat intelligence isn't a niche play — it's where the market is heading. In light of where the ratings market is today, let’s dive into where Recorded Future is going and how Recorded Future envisions the future of securing the third-party ecosystem.</p>
        <h2>The Gap Between Hygiene and Intelligence</h2>
        <p>Cyber risk ratings have earned their place in the security stack. They provide a standardized, scalable way to evaluate a vendor's external security posture — patching cadence, encryption practices, DNS configuration, exposed services. That hygiene baseline matters. It's a correlative signal for breach potential, and it gives risk teams a common language for comparing vendors and benchmarking against industry peers.</p>
        <p>But hygiene ratings only answer part of the problem: <em>How well is this vendor maintaining their defenses?</em></p>
        <p>They don't tell you whether anyone is actively trying to breach those defenses. They don't surface the dark web chatter on a specific vendor. They don't alert you when a vendor's credentials are leaked or has an active malware infection. This is the gap that has left third-party risk programs perpetually reactive. Teams learn about vendor compromises from news headlines or from the vendors themselves — often days or weeks after the initial breach. By then, the window for proactive response may have closed.</p>
        <p>From our own customer conversations, we hear that security and risk teams have shifted from wanting ratings and accuracy alone to demanding intelligence that reveals real cybersecurity risk, with prioritized findings and actionable remediation guidance. Ratings are increasingly commoditized. The differentiation now lies in what you do with the data, and what additional signals you bring to the table.</p>
        <h2>Third-Party Risk Management Is an Intelligence Operation</h2>
        <p>If you accept that ratings alone aren't enough, the logical next step is clear: third-party risk management must be treated as an intelligence operation.</p>
        <p>That means combining the hygiene baseline — the outside-in view of a vendor's security posture — with real-time threat intelligence that tells you who is being targeted, how, and what you should do about it. It means shifting from periodic assessments to continuous monitoring. It means equipping risk teams with the context to distinguish between a low-priority configuration issue and a vendor whose infrastructure is actively under attack. This is the problem <a href="https://www.recordedfuture.com/products/third-party-intelligence">Recorded Future Third-Party Risk</a> was built to solve.</p>
        <p>We've brought together two distinct capabilities that, until now, existed in separate worlds.</p>
        <ol>
          <li><a href="https://www.riskrecon.com/">RiskRecon</a> — built over a decade as one of the industry's leading cyber risk ratings platforms, trusted by 21,500+ users across 30+ industries, provides the hygiene foundation: transparent, evidence-backed security ratings evaluated across 40+ criteria in 9 security domains, with 99% audited data accuracy.</li>
          <li><a href="https://www.recordedfuture.com/platform">Recorded Future's threat intelligence capabilities</a>, powered by collection and analysis across more than 1 million sources, adds the threat dimension: real-time alerting on ransomware extortion activity, dark web exposures, credential leaks, and active vulnerability exploitation — often before the affected vendor is even aware.</li>
        </ol>
        <p>Together, these capabilities create something the market hasn't had before: <strong>a single solution that covers the full lifecycle of third-party risk, from initial assessment and onboarding through continuous monitoring and incident response</strong>.</p>
        <h2>What This Looks Like in Practice</h2>
        <p>The value of combining hygiene ratings with threat intelligence isn't theoretical. Our customers are already seeing it play out.</p>
        <ul>
          <li>When a vendor appears on a ransomware extortion site, Third-Party Risk customers can receive alerts in hours — not the days or weeks it takes for vendor self-disclosure.</li>
          <li>When credentials associated with a monitored vendor surface on dark web markets, risk teams can initiate outreach and remediation before those credentials are weaponized.</li>
          <li>When a critical vulnerability is disclosed, intelligence context helps analysts determine which vendors are actually exposed and at risk of exploitation, rather than treating every vendor with the affected software as equally urgent.</li>
        </ul>
        <p>Customers consistently report a roughly 33% increase in visibility into third-party risks after adopting the platform (<a href="https://app.userevidence.com/assets/5382HRMQ">UserEvidence</a>). Teams save an average of 7 hours per week that was previously spent on manual research and monitoring (<a href="https://app.userevidence.com/assets/6884WZGT">UserEvidence</a>). And customers routinely detect vendor incidents before the vendor itself has disclosed — turning what used to be a reactive scramble into a controlled, proactive response.</p>
        <p>These aren't incremental improvements. They represent a fundamental shift from reactive compliance to proactive risk management.</p>
        <h2>Where We're Going</h2>
        <p>We're not done. Bringing RiskRecon and Recorded Future together was the first step in a broader vision for what third-party risk management should become.</p>
        <p>Our roadmap is focused on deepening the integration between these two platforms into a unified experience. One where hygiene ratings, threat intelligence, and risk workflows operate seamlessly together. We're investing in AI-driven capabilities that will help risk analysts cut through noise faster, automate routine assessment workflows, and surface the insights that matter most. And we're building toward predictive intelligence that doesn't just tell you what's happening now, but helps you anticipate where risk is headed.</p>
        <p>The goal is straightforward: make third-party risk management as data-driven, automated, and intelligence-led as the best security operations programs already are.</p>
        <h2>Join the Shift to Intelligence-Driven Third-Party Risk</h2>
        <p>Third-party risk programs that rely exclusively on hygiene ratings will continue to be caught off guard. The vendors who score well on a Tuesday can be breached by Wednesday. The questionnaire response you received last quarter may not reflect today's reality.</p>
        <p>The organizations that are getting ahead of this are the ones treating third-party risk as what it actually is: an intelligence operation that requires continuous monitoring, real-time alerting, and the context to act decisively when something changes.</p>
        <p>That's the future we're building. And we believe we're the only ones building it with the depth of intelligence and the strength of ratings data required to get it right.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_100e70f38b09c3ffd0d78368f1b1fb6b9fab24f95.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Understanding and Anticipating Venezuelan Government Actions]]></title>
            <link>https://www.recordedfuture.com/research/understanding-and-anticipating-venezuelan-government-actions</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/understanding-and-anticipating-venezuelan-government-actions</guid>
            <pubDate>Wed, 08 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore an in-depth analysis of Venezuela’s political landscape following the January 2026 US operation to capture Nicolás Maduro. This executive summary examines Acting President Delcy Rodríguez’s transition strategy, her pragmatic re-engagement with Washington, and the internal threats posed by PSUV rivals like Diosdado Cabello. Gain insights into the "three-phase" US plan for stabilization, the 2026 Organic Hydrocarbons Law reforms, and the outlook for economic recovery versus the existential threat of competitive elections. Essential intelligence for organizations monitoring Latin American geopolitical risk and energy sector investments.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Venezuelan Acting President Delcy Rodríguezʼs policy decisions will affect economic and political stability in Venezuela in the coming months. Her approach will likely be shaped by a deep familiarity with the state security apparatus, her revolutionary identity, a demonstrated willingness to break from orthodoxy and seek coordination with Washington, an interest in restoring support for the ruling United Socialist Party of Venezuela PSUV, and a long memory for perceived slights. These principles, paired with changing local power dynamics after the January 3, 2026, United States US special operation to capture former Venezuelan President Nicolás Maduro and his wife, Cilia Flores, suggest Rodríguez is very likely to prioritize near-term governability and economic stabilization over maximalist ideological positioning. At the same time, she will likely find ways to cooperate with the US in ways designed to preserve the rule of PSUV and her credibility with other members of the ruling coalition. Rodríguezʼs core objectives are very likely to preserve PSUV rule and resist an opposition-led transfer of power, while maximizing the economic benefits of reengagement with Washington, including sanctions relief, investment, and a possible economic recovery. This will likely contribute to Rodríguez governing in a manner that avoids high-risk moves that could fracture her coalition or trigger instability that undermines her utility to the White House. In this approach, the biggest internal threat she faces in the short term is very likely PSUV rivals, including Interior Minister Diosdado Cabello, and other military and economic elites who perceive US engagement as a direct threat to their interests. While it is impossible to predict every move the Venezuelan government may take, public and private organizations can better anticipate risks to stability and investments — such as resistance to US-supported reforms or evidence of internal divisions in the regime — by systematically monitoring the rhetoric and actions of Delcy Rodríguez, Diosdado Cabello, and other senior officials using the Recorded Future® Intelligence Operations Platform</p>
        <h2>Key Findings</h2>
        <ul>
          <li>The January 3, 2026, US operation provoked panic among Venezuelan elites and fueled deep uncertainty regarding the plan to succeed Maduro, which was only resolved when US signaling prompted Venezuelan institutions to confirm that Rodríguez would assume presidential duties.</li>
          <li>Rodríguezʼs hold on power is threatened internally by rival PSUV figures, chief among them Interior Minister Diosdado Cabello and his network of allies across Venezuelaʼs security apparatus and among pro-government armed groups.</li>
          <li>Externally, the main threats to Rodríguezʼs power stem from US leverage over Caracas, including US geopolitical aims to bring Venezuela further under Washingtonʼs influence as well as US officialsʼ stated pursuit of a transition and support for the opposition faction led by María Corina Machado.</li>
          <li>To avoid a destabilizing rupture that could trigger US backlash, Delcy Rodríguez will very likely prioritize internal governability and economic stabilization, cooperating with Washington enough to see sustained sanctions relief while seeking to manage rather than expel hardline rivals from her coalition.</li>
          <li>To preserve her own credibility and influence in Venezuela, Rodríguez is likely to pair compliance with Washingtonʼs demands with “face-savingˮ gestures that assert Venezuelan sovereignty, and to resist genuinely competitive elections unless economic gains materially improve the PSUVʼs electoral odds.</li>
        </ul>
        <h2>Assessing Current Dynamics in Venezuela</h2>
        <p>Over the past 25 years, US-Venezuela relations have worsened as Venezuela’s government actively sought to oppose US interests in the Western Hemisphere, deepened relations with US rivals around the globe, and became increasingly authoritarian. This began under the deceased former president Hugo Chávez, whose movement, known as “Chavismo,” has governed the country since 1999. After Nicolás Maduro took power in Venezuela following Chávez’s death in 2013, he accelerated the consolidation of power and the erosion of democratic institutions begun by his predecessor. The US <u></u><a href="https://www.atlanticcouncil.org/commentary/trackers-and-data-visualizations/who-is-the-international-community-sanctioning-in-venezuela/">responded</a> by imposing financial and oil sanctions meant to limit Venezuela’s ability to profit from its vast oil reserves and sanctioning over 200 members of the Venezuelan elite. The US pressure campaign on Venezuela accelerated in late 2025 under President Donald Trump, who deployed a historic number of naval assets to the Caribbean.</p>
        <p>This military campaign culminated at around 02:00 Venezuelan Standard Time (VET) on January 3, 2026, when US special forces carried out airstrikes and a surgical intervention into Venezuela as part of an operation to capture and extract Maduro and his wife, Cilia Flores, to face drug trafficking and terrorism charges in New York. These events were the most significant US military operation in Latin America since the 1989 invasion of Panama, and ratified a new US doctrine that emphasizes primacy and willingness to use all available tools (economic, diplomatic, and military) to advance US interests in the Western Hemisphere, as <a href="https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf">laid</a> out in the 2025 National Security Strategy. In Venezuela, the events of January 3 precipitated the most impactful shakeup of the country’s political order in decades.</p>
        <p>While Acting President Delcy Rodríguez has <u></u><a href="https://cnnespanol.cnn.com/2026/02/26/venezuela/video/delcy-rodriguez-amigo-socio-donald-trump-sanciones">signaled</a> an openness to working with US priorities, this cooperation is affected by active tensions among the ruling elite and longstanding mistrust between Washington and Caracas. Understanding the events of January 3, 2026, and the immediate aftermath is crucial to evaluating the state of play on the ground and in the bilateral relationship.</p>
        <h2>Uncertainty in the Immediate Aftermath of the US Operation</h2>
        <p>In the immediate aftermath of the January 3 operation, there was widespread uncertainty in Venezuela regarding the future of PSUV rule. While the constitutional line of succession makes clear that the vice president should assume power in the president’s absence, initial messages from Venezuelan officials emphasized solidarity with Maduro and Flores rather than offering clarity on the future of PSUV governance. There was no official public reaction to the operation from the Venezuelan government until 04:14 VET, when former Defense Minister Vladimir Padrino López published a video on social media condemning the attack. He stated that Venezuela’s military — the Bolivarian Armed Forces (FANB) — was declaring a national emergency and deploying at strategic points around the country and <a href="https://www.facebook.com/PadrinoVladimir/videos/pueblo-heroico-de-venezuela-soldados-de-la-patria-hijos-e-hijas-de-bol%C3%ADvar-la-fu/692139637164231/">called</a> for unity against “imperialist threats.” Statements from Venezuelan officials since then confirmed the raid but did not clarify the makeup of the Venezuelan government.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1efba2db35f8d6829c5783b4a88eb7415755e9a6a.png?width=750&amp;format=png&amp;optimize=medium" width="686" height="386" />
            </div>
          </div>
          <div>
            <div>
              <p><em><strong>Figure 1:</strong></em> <em>Venezuelan state TV broadcast showing Rodríguez presiding over a meeting of the</em></p>
              <p><em>Council of National Defense (Source:</em> <em><a href="https://www.youtube.com/watch?v=Z3E0uWN88Gk">Telesur</a>)</em></p>
            </div>
          </div>
        </div>
        <p>The first clarity on Venezuela’s future leadership came from Washington. At roughly 11:50 EST (12:50 VET), US president Donald Trump gave a public address in which he explicitly <a href="https://www.youtube.com/watch?v=SsdkClL2_bg">stated</a> that Washington would work with Rodríguez as it assumed a more direct role in overseeing the country’s energy and security policies. Trump also said that María Corina Machado, the most popular opposition figure in the country (who had been outside the country since December 2025 and is currently in Washington) did not “have the support within or the respect within the country” to rule. While Trump claimed that Rodríguez had been "sworn in," Rodríguez’s hold on power was not publicly ratified until 15:20 VET. At that time, state television <a href="https://www.youtube.com/watch?v=p4V7Qiu7NrQ">aired</a> footage of the Council of National Defense, a body made up of the main institutional leaders of the country, featuring Rodríguez chairing the meeting and Cabello, López, and National Assembly President Jorge Rodríguez (Delcy Rodríguez’s brother) present. It was not until roughly 22:00 VET that state media began circulating a <a href="https://historico.tsj.gob.ve/decisiones/scon/enero/352131-0001-3126-2026-26-0001.HTML">decision</a> from the Constitutional Chamber of the Venezuelan Supreme Tribunal of Justice (TSJ) that made clear that Rodríguez would assume the duties of the president. In its ruling, the TSJ invoked a Chávez-era precedent to overrule constitutional language that would otherwise require her to schedule an early election, effectively indicating that Rodríguez is very likely seeking a mandate until Maduro’s term ends in January 2031. Neither Rodríguez nor any other official has yet made this claim explicit, and US officials have <a href="https://www.politico.com/news/2026/02/06/white-house-frustrations-with-venezuelas-machado-surface-after-election-comments-00770005">suggested</a> that new elections should be held before then. On January 5, she was officially sworn into office in a televised ceremony held in the National Assembly in the presence of key figures in the regime and diplomats from China, Iran, Russia, and Cuba.</p>
        <h2>US-Venezuela Relations Since January 3</h2>
        <p>Since January 3, the US has generally signaled support for a working relationship with Delcy Rodríguez, while making clear that Washington expects full cooperation with its energy and security priorities. In the immediate aftermath of the operation, President Trump told reporters that he might <a href="https://www.reuters.com/world/us/venezuelas-maduro-custody-trump-says-us-will-run-country-2026-01-04">consider</a> a second strike if Rodríguez did not cooperate, but then, on January 9, <a href="https://truthsocial.com/@realDonaldTrump/posts/115864395969123502">announced</a> on Truth Social that he had “cancelled the previously expected second Wave of Attacks” in response to the Venezuelan government releasing a number of political prisoners. Since this announcement, Trump has <a href="https://www.reuters.com/world/americas/trump-venezuelan-leader-Rodr%C3%ADguez-tout-positive-phone-call-2026-01-14/">sought</a> to 1 convey that he and Rodríguez work closely together. On March 5, 2026, Trump <a href="https://truthsocial.com/@realDonaldTrump/posts/116172714486213504">posted</a> on social media that Rodríguez is “doing a great job, and working with US Representatives very well.”</p>
        <p>US Secretary of State Marco Rubio has also expressed a willingness to work with Rodríguez’s interim government, but provided more explicit emphasis on a transition as the ultimate end goal of US policy. Speaking to reporters on January 7, Rubio <a href="https://www.reuters.com/world/us/rubio-says-us-plan-venezuela-is-stability-recovery-then-transition-2026-01-07/">described</a> the US approach as consisting of three main phases: stabilization, recovery, and transition. Stabilization, he stated, is needed to prevent Venezuela from “descending into chaos,” which would be avoided by US control over oil-sale proceeds. Rubio clarified that the “recovery” phase would be aimed at reopening the oil sector to US and other Western firms, and it would ultimately be followed by a “process of transition” that would include reconciliation among Venezuelans. This three-phase framing has been echoed by other US officials, although to date, no fixed timeframe for a transition has been made public. US officials have also <a href="https://www.nytimes.com/2026/01/16/us/politics/cia-director-ratcliffe-venezuela.html">said</a> that severing Venezuela’s ties to Russia, China, Cuba, and other US geopolitical adversaries is a top priority in the relationship.</p>
        <p>US-Venezuela coordination on energy policy appears to be advancing rapidly. On January 29, Venezuela’s PSUV-controlled National Assembly <a href="https://www.asambleanacional.gob.ve/noticias/an-sanciona-reforma-de-ley-organica-de-hidrocarburos">passed</a> a reform to the country’s Organic Hydrocarbons Law, aimed at increasing autonomy for private companies involved in the country’s oil and gas industry. While the revised law continues to assert state ownership over hydrocarbon reserves, it broadens the mechanisms through which private companies can participate in upstream activity, including allowing private operators — via contracts with state-owned energy company Petróleos de Venezuela S.A. (PDVSA) or joint ventures — to assume operational control while retaining a share of production. The reform also introduces a much more flexible framework for royalties and taxes, which can be set on a case-by-case basis by the Ministry of Energy, with royalties of up to 30% and taxes of up to 15%. Previous windfall taxes have been eliminated in this reform.</p>
        <p>US support for revitalized energy cooperation with Venezuela has been enthusiastic, and President Trump has actively <a href="https://www.youtube.com/watch?v=l6u3H4hKgjA">encouraged</a> US and other Western oil companies to invest as much as $100 billion in Venezuela. Two days after the passage of the Organic Hydrocarbons Law reforms, the US <a href="https://www.cnn.com/2026/01/31/politics/us-envoy-venezuela-arrival">sent</a> Chargé d’Affaires Laura Dogu, who leads the Venezuela Affairs Unit out of the US Embassy in Colombia, to Caracas, where she is tasked with overseeing the restoration of diplomatic ties with Venezuela. While Dogu has conveyed US support for closer relations, she has reiterated US support for an eventual transition. On February 2, she met with Rodríguez, and afterward <a href="https://x.com/usembassyve/status/2018460485709095330">posted</a> on X that in the meeting she reiterated “the three phases that Secretary Rubio has outlined for Venezuela: stabilization, economic recovery and reconciliation, and transition.”</p>
        <p>In the wake of the Organic Hydrocarbons Law reform, the US Treasury Department’s Office of Foreign Assets Control (OFAC) <a href="https://ofac.treasury.gov/sanctions-programs-and-country-information/venezuela-related-sanctions">issued</a> a series of general licenses allowing US and other Western companies to produce, refine, transport, and sell oil without seeking individual exemptions, effectively lifting sanctions that had previously restricted these activities (see <strong>Appendix A)</strong>. These OFAC licenses mandate that any authorized transactions with Venezuela's government or state energy company PDVSA must follow US laws (with disputes being resolved in the US), and that payments to the Venezuelan government or any other Venezuelan sanctioned entity be made into a US-overseen fund. US support for energy investment in Venezuela was emphasized from February 11 to 12, when US Energy Secretary Chris Wright led a delegation to Caracas to meet with Rodríguez, becoming the highest-ranking US official to visit Venezuela in years.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ad1dc22918718a39396ba9124959a30421f70065.png?width=750&amp;format=png&amp;optimize=medium" width="1170" height="728" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>US Energy Secretary Chris Wright examining crude oil at a PDVSA project site with Rodríguez (Source:</em> <em><a href="https://x.com/SecretaryWright/status/2022781983118500275/photo/1">Social Media</a>)</em></div>
          </div>
        </div>
        <h2>Internal and External Threats Confronting Acting President Rodríguez</h2>
        <p>Since Acting President Rodríguez took over from Maduro in the immediate aftermath of the US operation on January 3, she has voiced support for cooperation with Washington — but her incentives to cooperate fully are very likely limited. Rodríguez is aware of Washington’s “three point plan” for Venezuela and is likely supportive of US plans to stabilize the country, lift sanctions, and promote investment. However, she is almost certainly seeking to preserve her rule and a government led by the PSUV, and will very likely resist any attempt to preside over a transition of power to an opposition-led government. Her ability to do so will very likely depend on her ability to consolidate power and manage potential spoilers within her own coalition, as well as her ability to deepen cooperation with US interests and demonstrate utility to the White House. In doing so, she faces a number of internal and external threats to her rule, which include challenges by rivals inside the ruling PSUV over the next six to twelve months, and pressure by Washington to hold new elections over the next twelve to twenty-four months.</p>
        <h3>Internal Threats to Rodríguez’s Rule</h3>
        <p>The main internal threat to Rodríguez’s power in the short term is other members of the ruling elite. She has steadily worked to consolidate power and secure the support of the military and intelligence services, but her support among the country’s political and economic sectors is far from settled. There are almost certainly key figures in the security forces, the business community, and in the ruling party who view Rodríguez, and her relationship with the US, as a challenge to the previous status quo and its associated privileges, economic arrangements, and patronage schemes. They may be concerned about their future influence, immunity</p>
        <p>As Rodríguez continues to establish her rule, some of these individuals may seek to oppose her, either by seeking to derail or sabotage her rapprochement with Washington or by openly rebelling against her. In this context, an attempted palace coup cannot be ruled out. Her primary rivals include the following figures and networks, each of whom has a distinct power base and incentive to view Rodríguez as an adversary or rival:</p>
        <ul>
          <li><strong>Diosdado Cabello, Minister of Interior, Justice and Peace.</strong> Cabello is a senior power broker within the ruling party and has been the PSUV’s Secretary General since 2011. He has deep <a href="https://insightcrime.org/es/noticias/papel-colectivos-lucha-poder-venezuela-salida-maduro/">connections</a> to the security services and hardline enforcement networks, including to pro-government armed paramilitary organizations known as “colectivos” (see <strong>Figure 3</strong>). State media has <a href="https://www.elfinanciero.com.mx/mundo/2026/01/28/el-chavismo-se-cuadra-vladimir-padrino-y-diosdado-cabello-juran-lealtad-a-delcy-rodriguez/">sought</a> to downplay reported tensions between Cabello and Rodríguez, but Cabello’s incentives to undermine her are straightforward: Her consolidation of power threatens his influence over the party, the security apparatus, and his networks. He is also the only current cabinet member who was <a href="https://www.justice.gov/opa/media/1422326/dl">named</a> in the unsealed drug trafficking indictment US prosecutors issued to capture Maduro, and he likely suspects that Rodríguez may eventually hand him over to the US.</li>
          <li><strong>General Vladimir Padrino López, former Minister of Defense</strong>. Padrino’s Lopez’s likely core incentive is to preserve the influence he accumulated after over a decade as the institutional head of the FANB, and to preserve the patronage networks he developed as the country’s longest-serving defense minister. He also likely seeks to protect himself and senior officers loyal to him from eventual prosecution for corrupt activities or involvement in repression, and therefore very likely views Rodríguez’s government as a challenge to longstanding FANB impunity. While there is no public evidence of any cracks between Padrino López and Rodríguez, it is very likely that he will resist meaningful reforms inside the armed forces</li>
          <li><strong>Major General Alexis Rodríguez Cabello, Director of the Servicio Bolivariano de Inteligencia Nacional (SEBIN)</strong>. Cabello is a cousin of Diosdado Cabello and is believed to be close to him. As head of the primary intelligence service, Rodríguez Cabello has strong incentives to resist reforms that would expose him or his network to prosecution, and to preempt any purge that might impact him or his network.</li>
          <li><strong>Major General Iván Rafael Hernández Dala, former director of the General Directorate of Military Counterintelligence (DGCIM)</strong>. Hernández Dala, a close confidant of Maduro, was head of DGCIM until replaced by Rodríguez in January 2026. He is also believed to be a longstanding opponent of both Rodríguez and Cabello, and of their respective factions in the PSUV. Even if sidelined from formal command, Hernández Dala likely retains networks inside the intelligence and security apparatus. He likely has incentives to undermine Rodríguez if he anticipates facing prosecution for past abuses, loss of status, or exclusion from any protection or economic deals between Washington and Caracas.</li>
          <li><strong>Business and Political Elites Tied to Maduro</strong>. Maduro and Flores dominated Venezuelan politics for nearly thirteen years. During that time, they cultivated a vast network of well-connected economic, military, and political elites that helped them sustain power. Many of them are not overtly tied to the Rodríguez siblings, and instead may be willing to ally themselves with rival factions to advance their own interests. Possible figures in this category include:
            <ul>
              <li><strong>Tarek William Saab, Acting Ombudsman</strong>. Until his resignation in February 2026, Saab served as attorney general since 2017 and held significant influence over how the repressive apparatus was deployed, overseeing detentions and prisoner releases. Saab’s resignation was very likely forced, and he has clear incentives to resist any reform process that reduces his discretion or creates a credible path to independent investigations into past repression or corruption.</li>
              <li><strong>Nicolas Maduro Guerra, also known as “Nicolasito</strong>.” A member of the National Assembly and son of Maduro and Flores, Maduro Guerra is not one of the top PSUV powerbrokers in his own right but has played a crucial role in securing continuity by appearing publicly with Rodríguez and <a href="https://cnnespanol.cnn.com/2026/02/12/venezuela/hijo-maduro-padre-pasos-correctos-unidad-orix">claiming</a> she has his parents’ full support. Given lingering questions over internal Chavista involvement in the January 3 operation, he has leverage to complicate Rodríguez’s narrative and may seek to use it if he feels that his interests are threatened by the Rodríguez administration.</li>
              <li><strong>Alex Saab</strong>. Saab <a href="https://ofac.treasury.gov/media/43236/download?inline">played</a> a crucial role in facilitating sanctions evasion networks until his arrest by US law enforcement in 2020. Saab was later returned to Venezuela in a 2023 prisoner swap, and Maduro rewarded him by making him Minister of Industry and National Production. Rodríguez replaced him in January 2026, likely understanding that Saab was not palatable for US business interests, but Saab likely retains enough social capital within Venezuela’s private sector to pose a challenge to Rodríguez. This is the likely reason why Saab was reportedly <a href="https://www.nytimes.com/2026/02/04/world/americas/venezuela-said-to-detain-maduro-allies-targeted-by-the-us.html">detained</a> by Venezuelan intelligence in February 2026, although his lawyer has maintained that he is not under arrest.</li>
            </ul>
          </li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_16b6465db49374e12b6530f2c980c6d73129cc6b8.png?width=750&amp;format=png&amp;optimize=medium" width="1542" height="1600" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3:</strong></em> <em>Illustration of key internal rivals of Venezuelan Acting President Delcy Rodríguez (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>External Threats to Rodríguez’s Rule</h2>
        <h3>US Pressure to Box Out Geopolitical Adversaries</h3>
        <p>In the short term, the most significant external threat that Rodríguez faces is a reversal of United States policy — either via renewed military or intelligence operations intended to force her removal, or through a more indirect pressure campaign meant to trigger a domestic fracture. A second US special forces operation to depose her outright is unlikely, but it remains a scenario Rodríguez and her circle will have to treat seriously, given the direct and disproportionate leverage that Washington currently holds over Caracas. More likely than further military action is the prospect of renewed pressure: the US can calibrate sanctions relief, revoke OFAC licences, and facilitate or block diplomatic recognition in ways that shape incentives and perceptions of the regime’s survivability among Venezuelan elites. Recent reporting <a href="https://www.reuters.com/world/china/us-intelligence-raises-doubts-about-venezuela-leaders-cooperation-2026-01-28/">suggests</a> Washington is simultaneously pursuing deepened energy engagement while remaining skeptical about whether Rodríguez will fully align with US strategic demands, which increases the possibility of an abrupt shift away from Rodríguez if she does not deliver on US priorities.</p>
        <p>A major fault line in the US-Venezuela relationship is Venezuela’s ongoing relationships with US geopolitical adversaries, namely China, Russia, Iran, and Cuba, even as the US has increasingly sought to box them out of Venezuela. US officials publicly <a href="https://www.cbsnews.com/news/marco-rubio-secretary-of-state-face-the-nation-transcript-01-04-2026/">demanded</a> that Venezuela cut ties with adversary nations and have actively moved to push them out. The US has successfully pressured Venezuela to end fuel shipments to Cuba, and OFAC general licenses intended to facilitate Venezuelan oil and gas activity explicitly do not authorize transactions involving Russian, Chinese, or Iranian entities. In spite of this, Rodríguez has sought to publicly <a href="https://en.mehrnews.com/news/240521/Venezuela-interim-pres-receives-Iran-China-Russia-envoys">demonstrate</a> an interest in retaining these partnerships.</p>
        <h3>Opposition Efforts to Limit US-Venezuela Engagement</h3>
        <p>Another short-term external threat to Rodríguez is opposition figure María Corina Machado. While she remains the most popular opposition figure in Venezuela, and her faction has a <a href="https://www.bbc.com/news/articles/cyv3vlz01g3o">demonstrated</a> capacity to organize protests on the ground, these have so far not presented a significant threat to stability or to PSUV governance. Her presence in Washington since December 2025, however, has provided her with a major platform to directly shape the US foreign policy debate over Venezuela. With Machado and close advisors operating from Washington, she has <a href="https://www.politico.com/news/2026/02/06/white-house-frustrations-with-venezuelas-machado-surface-after-election-comments-00770005">advanced</a> a narrative publicly supportive of the US agenda while privately calling on allies in Congress and in the international community to <a href="https://www.nytimes.com/2026/01/20/us/politics/house-foreign-affairs-machado-venezuela.html">press</a> for a clearer timetable for new elections and the ouster of the PSUV. She has also used her platform to <a href="https://www.nbcnews.com/world/latin-america/corina-macado-returning-venezuela-opposition-rcna261278">promise</a> she will return soon, and to highlight perceived inconsistencies between Rodríguez’s actions and her rhetoric, noting, for instance, the gap between the government’s claimed political prisoner release numbers and the figures cited by independent rights organizations.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1c851bb0a0865849d18243e4144cefc596663c07a.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="900" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>Photo of Venezuelan opposition leader Maria Corina Machado at a rally ahead of the 2024 presidential election (Source:</em> <em><a href="https://www.reuters.com/world/americas/venezuelas-nobel-prize-winner-bets-big-trump-pressure-builds-maduro-2025-10-28/">Reuters</a>)</em></div>
          </div>
        </div>
        <p>Machado has received <a href="https://www.foreign.senate.gov/press/dem/release/ranking-member-shaheen-senators-curtis-durbin-cruz-kaine-and-scott-bipartisan-statement-on-venezuela">strong support</a> from bipartisan lawmakers in the US House and Senate, who have questioned US engagement with Rodríguez. While Machado’s efforts to raise the political cost of engagement with the Rodríguez government have earned her support from some allies in Washington, the White House has reportedly <a href="https://www.politico.com/news/2026/02/06/white-house-frustrations-with-venezuelas-machado-surface-after-election-comments-00770005">expressed</a> frustration with her criticism, with officials claiming it undermines US policy. These efforts very likely represent a lesser threat to Rodríguez’s hold on power, given White House insistence on working with Rodríguez, but introduce persistent uncertainty into the sustainability of US support for her.</p>
        <h3>Calls for a Competitive Election</h3>
        <p>Beyond these immediate pressures, the most important mid-term threat to Rodríguez and to future PSUV rule is the election timeline reportedly being promoted by the Trump administration. While the US has refrained from presenting a specific timetable, officials ranging from Chargé d’Affaires Dogu to Secretaries Rubio and Wright have increasingly <a href="https://www.wsj.com/world/americas/venezuelas-new-leader-is-trying-to-run-out-the-clock-on-trump-f5564b52?mod=hp_listb_pos2">signaled</a> publicly that the US expects to see new elections in the next eighteen to twenty-four months. The specifics of these elections, like whether they would be only presidential or include broader general elections (to replace the PSUV-dominated National Assembly), have not been disclosed, but the US insistence on elections in some form very likely forces Rodríguez to reconcile her approach to coalition management with a desire to seek electoral legitimacy on a compressed timeline.</p>
        <p>At the moment, Rodríguez, her inner circle, and PSUV elites almost certainly view a competitive presidential election as an existential threat. Polls have repeatedly demonstrated that the PSUV is unpopular. While Rodríguez is the most popular figure in the PSUV, she would very likely lose a presidential race with Machado by a two-to-one margin, and Machado would very likely defeat any PSUV candidate absent a significant shift in public opinion. Maduro’s removal has not automatically revived grassroots loyalty to the ruling party, with local PSUV leaders <a href="https://www.reuters.com/world/americas/distrust-desertions-dwindling-bonuses-undermine-socialist-partys-grip-venezuela-2026-02-08/%20">describing</a> fractures, demobilization, and severe drops in participation inside local party structures since January 2026.</p>
        <p>Given the PSUV’s lack of legitimacy, US support for elections will likely become a flash point in the relationship with Rodriguez. These tensions will also very likely be exacerbated by opposition mobilization inside the country and Machado’s efforts to marshal support in Washington. While US authorities have not yet demanded that Machado be allowed to return to Venezuela (and has reportedly <a href="https://www.nytimes.com/2026/03/12/world/americas/trump-maria-corina-machado-venezuela.html">asked</a> her to delay any plans to this effect), her return is almost certain to occur well in advance of an election as she has openly said she will run. The temporary <a href="https://www.cnn.com/2026/02/08/americas/venezuela-political-prisoners-opposition-released-latam-intl">re-arrest</a> of opposition figure Juan Pablo Guanipa in February after he began organizing anti-government rallies suggests the ruling party will likely seek to use the repressive apparatus to restrict Machado’s campaigning efforts, elevating the likelihood of pre-election instability. Even if a competitive election is held under the PSUV, the experience of the July 2024 election <a href="https://www.cartercenter.org/publication/final-report-observation-of-the-2024-presidential-election-in-venezuela/">suggests</a> that the ruling party is unlikely to recognize the results if the opposition wins, raising the likelihood of post-election instability, protests, and violence.</p>
        <h2>Delcy Rodríguez’s Origins and Principles of Her Approach to Decisionmaking</h2>
        <p>Before her emergence in recent years as the face of relative economic pragmatism in Chavismo, Delcy Rodríguez’s background was not well-known internationally. But her rise to power reveals a number of factors that likely inform her approach to governance and likely impact the prospect for political and economic stability moving forward. These include:</p>
        <ul>
          <li><strong>Familiarity with Venezuela’s Intelligence and Repressive Apparatus</strong>: In addition to her reputation as an economic reformer, Rodríguez likely has a deep familiarity with intelligence work that, according to state media, goes back to the Chávez years. In 2002-2003, she <a href="https://presidencia.gob.ve/Site/Web/Principal/paginas/classMostrarEvento3.php?id_evento=26747">reportedly</a> worked with the SEBIN’s predecessor agency, the Dirección General Sectorial de los Servicios de Inteligencia y Prevención (DISIP), on undisclosed counterintelligence work involving “geopolitical reports” with former DISIP head Eliezer Otaiza. From the time she rose to the office of Executive Vice President in 2018 until 2021, the SEBIN technically fell under her office. While there is no publicly available evidence that she explicitly directed SEBIN-led repression of dissidents, her role likely afforded her a deep familiarity with the main Venezuelan intelligence agency’s response during the government’s crackdown on the post-2018 election protests and the 2019 protest wave led by opposition figure Juan Guaidó. It is likely that she was, at a minimum, aware of acts of torture, extrajudicial executions, arbitrary detentions, and other alleged human rights violations and crimes against humanity since 2014 that have been <a href="https://www.ohchr.org/en/hr-bodies/hrc/ffmv/index">credibly documented</a> by the Independent International Fact-Finding Mission on Venezuela created by the United Nations (UN) Human Rights Council.</li>
          <li><strong>Identity Shaped by Revolutionary Politics</strong>: Rodríguez was born in Caracas in 1969 and grew up in a politically active left-wing family. Her father, Jorge Antonio Rodríguez, <a href="https://elestimulo.com/de-interes/2022-07-07/carlos-lanz-la-faln-y-los-secuestros-de-las-hijas-de-renny-ottolina-y-de-niehous/">founded</a> an armed urban guerrilla group and was killed in police custody in 1976, allegedly under interrogation. His death made him a martyr among the Venezuelan left, which cemented the revolutionary identities of Rodríguez and her older brother Jorge from an early age. Rodríguez has <a href="https://diariovea.com.ve/asi-conto-delcy-rodriguez-su-experiencia-como-estudiante-de-derecho-su-vida-en-paris-y-el-significado-del-4-f/">framed</a> her decision to study law as an effort to “do justice for her father’s case,” and both she and her brother routinely cite his death as a justification for their support for Hugo Chávez and the movement he founded. In public, Rodríguez has repeatedly expressed strong support for the ruling party’s socialist ideology. In a September 2019 <a href="https://chicagoalbasolidarity.org/2019/10/01/english-text-of-venezuela-vice-president-delcy-rodriguez-speech-to-the-united-nations-general-assembly-september-27-2019/">address</a> to the United Nations General Assembly, she criticized “capitalist supremacism” and ended with a call to “save the world from capitalist violence.”</li>
          <li><strong>Willingness to Break from Ideological Purity</strong>: In practice, Rodríguez’s rise demonstrates that she is open to abandoning ideological purity in order to accomplish her objectives. Unlike Maduro and other ruling party figures who developed close personal ties to Chávez, she had a notoriously poor relationship with the former leader and spent significant time outside Venezuela in her formative years. Rodríguez <a href="%20https://open.spotify.com/episode/009i1LDavksXStl4lboqwf%20">studied</a> law at the Central University of Venezuela, but later pursued postgraduate studies abroad in labor law in London and Paris, and reportedly spent time in the United States. She <a href="https://www.washingtonpost.com/world/2026/01/09/venezuela-us-maduro-capture-vatican-russia">speaks</a> English and French. Rodríguez returned to Venezuela after an opposition-led failed coup attempt against Chávez in 2002, and first worked as an advisor in the Foreign Ministry, and then as Deputy Minister for European Affairs before ending up as Chávez’s Minister for Presidential Affairs. She did not last long in this position, however, and was abruptly dismissed after she <a href="https://talcualdigital.com/delcy-rodriguez-diplomacia-en-pie-de-guerra-perfil/">reportedly</a> argued with and insulted him during a presidential visit to Moscow. Rodríguez then adopted a lower profile in Venezuelan political life until Maduro took power, who made her his foreign minister in 2014. As foreign minister (2014-2017), president of the pro-government National Constituent Assembly (2017-2018), and then as executive vice president (2018-2026), she <a href="https://www.reuters.com/article/world/cubas-new-leader-praises-maduro-in-solidarity-visit-to-venezuela-idUSKCN1IV1ZU/">developed</a> a reputation as a shrewd political operator and staunch Maduro ally.</li>
          <li><strong>Interest in Addressing PSUV’s Declining Popularity</strong>: Although Rodríguez was and arguably remains a Maduro ally, she has demonstrated a clear awareness of how the PSUV’s economic mismanagement has led to its declining popularity and has shown an interest in reversing it. Ahead of the 2018 presidential election, she briefly led a satellite party of the PSUV called the Movimiento Somos Venezuela (“We Are Venezuela Movement”) and served as its leader in a likely attempt to “rebrand” Chavismo and connect with a younger generation of Venezuelans. She was officially <a href="https://2001online.com/nacionales/delcy-rodriguez-vuelve-al-psuv-y-que-paso-con-somos-venezuela">reincorporated</a> into the PSUV’s leadership in late 2018 after her party failed to account for more than six percent of Maduro’s reelection vote. When Maduro made Rodríguez his Minister of Economy in 2020, she began to advance an agenda of relative economic liberalization, and <a href="https://www.bloomberg.com/news/articles/2021-03-09/venezuela-taps-former-ecuador-minister-as-financial-adviser">brought on</a> a team of Ecuadorean advisors to impose tighter fiscal discipline and stabilize the exchange rate, eventually <a href="https://www.reuters.com/article/markets/venezuela-dollarization-has-allowed-for-some-growth-in-commerce-group-says-idUSL1N2PJ1FL/">promoting</a> the de facto dollarization of the economy. The success of the policies contributed to a modest but important economic rebound and led Maduro to appoint her in 2024 as Energy Minister as well, a post she technically still occupies. In overseeing this economic agenda, she began to cultivate a reputation for herself as less of an ideologue and more of a pragmatist, and began to pursue closer relationships with major energy companies and other investors. This reputation almost certainly contributed to the US decision to engage with her government after removing Maduro.</li>
          <li><strong>Calculating Operator with Sense of Persecution</strong>: Rodríguez has a history of keeping track of past instances where she has been slighted, even <a href="https://www.youtube.com/watch?v=NjZn6upVcCc%20">referring</a> to her support of Chavismo and of its revolution as her and her brother’s “personal revenge” for the death of their father. Rodríguez herself has alluded to this trait on state media. In a 2024 appearance on the <em>Con Maduro Podcast,</em> she recalled running into former Argentine President Mauricio Macri, a vocal critic of the Venezuelan government, at the 2022 World Cup in Qatar. Macri had recently been made the Executive Chairman of the FIFA Foundation, and, according to Rodríguez, she shook his hand and <a href="https://fidelernestovasquez.wordpress.com/wp-content/uploads/2024/02/boletin-del-psuv-nr-382-carpeta-fidel-ernesto-vasquez.pdf%20">told him</a>: "Did you see where you are now, and where we are? We're with the Venezuelan people. And you? You're here picking up balls.” Rodríguez is also a savvy operator, and her rise to prominence reflects not only her ability to deliver on economic policy objectives but also her ability to outmaneuver rivals. The best-known instance of this is her leadership of an anti-corruption campaign in 2024, which <a href="%20https://apnews.com/article/delcy-Rodr%C3%ADguez-maduro-trump-venezuela-e71f2289bc801446e05550d8f900a8d1">resulted</a> in the imprisonment of former vice president, oil minister, and longtime rival Tareck El Aissami.</li>
          <li><strong>Openness to Dialogue with Washington</strong>: Even before the current rapprochement between Washington and Caracas, Rodríguez was known for <a href="https://laverdaddevargas.com/delcy-Rodriguez-venezuela-esta-dispuesta-a-dialogar-con-eeuu/">consistently favoring</a> a deeper diplomatic relationship with Washington — albeit one built on mutual respect. During the 2022 phase of exploratory talks in which the two countries negotiated sanctions relief in exchange for holding presidential elections in 2024, Rodríguez publicly maintained that the relationship “cannot be conditioned,” <a href="https://www.aa.com.tr/es/mundo/vicepresidenta-de-venezuela-el-acercamiento-a-estados-unidos-no-fue-condicionado-/2532597">saying</a> that Venezuela’s doors were open to any country that arrived “with respect” and treated it as an equal under international law. During this period, she specifically centered the importance of discussing US oil and gas interests in bilateral diplomacy, saying that Venezuela was willing to pursue “energy dialogue” with US firms, <a href="https://www.mppef.gob.ve/dialogo-venezuela-eeuu-no-puede-estar-condicionado/">indicating</a> a view of energy cooperation as a channel for de-escalating tensions.</li>
        </ul>
        <h2>A Framework for Anticipating Delcy Rodríguez’s Policy Decisions</h2>
        <p>When Delcy Rodríguez faces policy decisions that impact economic and political stability in Venezuela in the coming months, her approach is likely informed by the pillars described above: her revolutionary identity, tactical pragmatism, openness to US engagement, an interest in restoring popular support for the PSUV, a long memory for slights, and familiarity with the security apparatus, as well as the internal and external short- and mid-term threats to her rule. Given these factors, Insikt Group assesses that she is very likely to prioritize near-term governability and economic stabilization over maximalist ideological positioning, while likely cooperating with the US in ways that preserve her credibility inside the ruling coalition. This matters for prospective investors because it suggests the Venezuelan government is likely to seek to maintain a pragmatic economic policy environment focused on short-term macroeconomic stability. At the same time, companies seeking to invest will almost certainly continue to face elevated sanctions compliance risks and potential policy reversals depending on the evolving Washington-Caracas relationship, making it critical to closely monitor Rodríguez’s evolving policy decisions and internal relationships.</p>
        <h3>Coalition Management over Open Confrontation with Rivals</h3>
        <p>Rodríguez will likely prioritize maintaining and reconfiguring her coalition over seeking conflict with internal rivals, because the external pressure she faces makes internal rupture more risky than compromise. Her main rival, Diosdado Cabello, has significant sway over the repressive apparatus and over pro-government armed “colectivos” loyal to him, and his removal could therefore provoke unrest and destabilizing violence. This is precisely the kind of chaos Washington has <a href="https://x.com/RapidResponse47/status/2012228403739418816">sought</a> to avoid, and very likely why it opted to keep Rodríguez in place as interim president in the first place. She therefore likely assesses that purging, detaining, or otherwise sidelining Cabello or other top PSUV rivals could risk calling into question her ability to maintain order, and would undermine her position with Washington as a lynchpin of relative calm and continuity.</p>
        <p>This is likely the reason that Rodríguez has sought to balance the ruling coalition since taking power rather than immediately shaping it to align with her preferences. Although she <a href="https://www.swissinfo.ch/spa/rodr%C3%ADguez-nombra-a-un-exjefe-del-banco-central-de-venezuela-como-vicepresidente-econ%C3%B3mico/90734912">elevated</a> her allies to higher positions in her government early in her tenure — such as appointing Calixto Ortega as Vice President of Economy — she has largely kept the ruling apparatus in place. Not only has she left a number of other figures close to Cabello in their positions, but she has also promoted figures in Cabello’s network. Just three days after Maduro’s capture, she <a href="https://www.eltiempo.com/mundo/venezuela/el-blindaje-de-delcy-Rodr%C3%ADguez-una-pieza-de-diosdado-cabello-asume-control-de-seguridad-presidencial-3522518">named</a> Gustavo González López, believed to be a Cabello ally, to lead both the Presidential Honor Guard and the Directorate General of Military Counterintelligence (DGCIM). On March 18, she also named González López to be her Defense Minister, replacing Padrino López. She also appointed Cabello’s daughter, Daniella Cabello, to be Minister of Tourism — a significant post that will afford her a direct role in reopening Venezuela to international commercial activity. These moves were likely taken out of a desire to effectively secure Cabello’s support for her economic normalization agenda.</p>
        <h3>Face-Saving Cooperation with Washington</h3>
        <p>Rodríguez will likely continue to cooperate with Washington’s energy priorities, but she will very likely pair this compliance with visible signaling aimed at saving face with PSUV loyalists. This is likely why, even as she has received high-level US officials in Caracas and even spoken with Trump over the phone, she has publicly demonstrated support for retaining partnerships with US adversaries. On January 8, for instance, Cuban Foreign Minister Bruno Rodríguez traveled to Caracas and accompanied the interim president to <a href="https://www.reutersconnect.com/item/ceremony-honouring-venezuelan-and-cuban-military-and-security-personnel-who-died-during-a-us-operation-to-capture-venezuelas-president-maduro-and-his-wife-in-caracas/dGFnOnJldXRlcnMuY29tLDIwMjY6bmV3c21sX1JDMjZYSUFJRURDNA">speak</a> at a commemoration event at Venezuela’s Military Academy for the Cuban and Venezuelan casualties from the January 3 US operation to capture Maduro. This was Rodríguez’s first event in which she officially presided over a military ceremony as commander in chief of the armed forces. On the same day, state-run media reported that Rodríguez held a meeting with Chinese Ambassador to Venezuela Lan Hu, in which she <a href="https://www.scmp.com/news/china/diplomacy/article/3339375/china-says-it-still-deeply-committed-venezuela-ambassador-meets-new-leader">thanked</a> China for its support for Venezuelan sovereignty and described the encounter as “cordial.” The ambassadors of China, Russia, and Iran were given <a href="https://www.telesurtv.net/delcy-Rodriguez-presidenta-encargada-venezuela">front row seats</a> to Rodríguez’s January 5 swearing-in ceremony, and state TV broadcast images of the Venezuelan leader greeting them affectionately.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_143aa6ed2eebd4cdc806f2d890d690d017670ae16.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="909" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 5:</strong></em> <em>Screenshot of Venezuelan state TV broadcast showing Chinese ambassador Lan Hu, Russian ambassador Sergey Mélik-Bagdasárov, and Iranian ambassador Ali Chegueni were prominently seated at Venezuelan Acting President Delcy Rodríguez’s January 5, 2025, swearing-in ceremony (Source:</em> <em><a href="https://www.youtube.com/watch?v=3oMay9b3BnI&amp;t=398s">Telesur</a>)</em></div>
          </div>
        </div>
        <p>Such gestures will very likely continue as they offer Rodríguez a way to preserve credibility among PSUV elites and everyday party faithful. She can claim that her rapidly evolving relationship with Washington is a sovereign decision that improves stability and living conditions, rather than a relationship that is shaped by a drastically uneven playing field. As part of presenting an image of mixed compliance with Washington’s demands for Venezuelan audiences, she will almost certainly continue insisting that Maduro remains the legitimate president and demand his return, even as she works to consolidate her own power.</p>
        <h3>Leveraging Hardliners to Justify Non-Compliance</h3>
        <p>The internal rivalries identified above represent significant threats to Rodríguez’s legitimacy inside the PSUV and her claim to power, and attempting to balance her coalition while consolidating her control will almost certainly be a major challenge for Rodríguez. However, it is likely that Rodríguez will, over time, point to alleged hardliners to justify selective non-compliance with US aims, credibly or otherwise. Ultimately, it may be useful for Rodríguez to be able to point to ongoing tensions in her coalition or the prospect of instability as a way of warding off US pressure for an eventual transition or for competitive elections to be held. This justification is likely to lose credibility over time if she continues to consolidate administrative control and accumulate legitimacy, especially if she presides over significant economic gains amid US sanctions relief. Ultimately, the very steps that allow her to consolidate her rule may eventually be used by Washington to justify accelerating the end of it.</p>
        <h3>Resistance to Elections if Seen as an Existential Threat</h3>
        <p>Rodríguez’s past political experience and the PSUV’s record across more than 25 years of governing suggest the Venezuelan government will very likely seek to maximize political gain from any economic growth resulting from US sanctions relief and economic normalization. And while US officials have routinely conveyed that they expect elections to be held in the next two years, the Venezuelan government is almost certain to resist or sabotage elections unless it perceives that economic improvement has boosted the PSUV’s chances of winning a competitive election. Even then, the PSUV will very likely seek to use its control of government to activate patronage networks, divert public resources to politicized social programs, and attempt to present legal obstacles to opposition campaigning — just as it did in the lead-up to the 2024 presidential election.</p>
        <p>Ultimately, this logic is consistent with how Chavista elites have historically conceptualized elections: In multiple instances of US-backed talks meant to offer sanctions relief in exchange for competitive elections, Venezuelan government negotiators routinely <a href="https://www.wola.org/wp-content/uploads/2021/07/WOLA-USIP-Report.pdf">argued</a> that elections can be considered “fair” only if voters can judge the government without the distorting economic effects of sanctions. If economic growth does not translate into a boost in popular support for the ruling party, Rodríguez will likely come under increasing pressure from rivals to resist a US-backed transition. It is therefore likely that democratization in Venezuela will be phased and gradual, not immediate, and will likely depend in large part on whether elements of the ruling elite see a viable future for themselves in the country as a possible outcome after alternating power.</p>
        <h2>Outlook</h2>
        <p>Over the coming months, Delcy Rodríguez is very likely to prioritize near-term governability and economic stabilization over maximalist ideological positioning, while still finding ways to cooperate with the United States that preserve her rule and credibility inside the ruling PSUV coalition. In the short- to mid-term, the main challenge she faces is the threat posed by internal rivals who may feel threatened by her reforms. This makes her cabinet changes, and evidence of backlash among political and economic elites, crucial variables to watch. In confronting internal threats to her rule, she will likely pursue a strategy of coalition management over one of open confrontation. Even as Rodríguez continues to consolidate power and tries to keep hardline rivals contained, she will likely avoid high-risk moves that could fracture elite support and risk threatening her relationship with Washington.</p>
        <p>In the short and mid terms, the main flashpoints will be US pressure to end Caracas’s relationships with Moscow, Beijing, and other US adversaries, as well as US pressure to hold competitive elections in the next two years and eventually to advance a political transition. Rodríguez and PSUV elites likely view a genuinely competitive presidential vote as an existential threat. As a result, the government is almost certain to resist or sabotage competitive elections unless economic improvement significantly boosts the PSUV’s electoral odds. Even then, it would likely use patronage, politicized social programs, and legal obstacles to constrain opposition campaigning and preserve an institutional advantage. This raises the prospect of instability both in the lead-up and in the aftermath of any elections, given the likelihood of opposition protests and an associated crackdown. Given these dynamics, any transition is more likely to be phased and gradual than immediate, with stability hinging on whether Rodríguez is able to consolidate support among the ruling elite and whether the broader Chavista coalition can see a viable future for itself under any eventual alternation of power.<br /><br /><br /><strong>Appendix A: 2026 OFAC Licenses Issued for Venezuela</strong></p>
        <div>
          <div>
            <div>Date Issued</div>
            <div>Title (Hyperlink)</div>
            <div>Scope</div>
          </div>
          <div>
            <div>February 3, 2026</div>
            <div>
              <h4><a href="https://ofac.treasury.gov/recent-actions/20260203">Venezuela General License 47: “Authorizing the Sale of U.S.-Origin Diluents to Venezuela”</a></h4>
            </div>
            <div>Authorizes US persons to export/reexport/sell/supply US-origin diluents to Venezuela even when transactions involve the Government of Venezuela, PDVSA, or PDVSA-majority entities, as long as contracts are governed by US law and disputes are resolved in the US</div>
          </div>
          <div>
            <div>February 10, 2026</div>
            <div>
              <h4><a href="https://ofac.treasury.gov/recent-actions/20260210_33">Venezuela General License 46A: “Authorizing Certain Activities Involving Venezuelan-Origin Oil”</a></h4>
            </div>
            <div>Authorizes “established US entities” to engage in transactions that are ordinarily incident and necessary to the lifting, export/reexport, sale/resale, supply, storage, marketing, purchase, delivery, transportation, and refining of Venezuelan-origin oil, including related logistics, even when the activity involves the Government of Venezuela, PDVSA, or PDVSA-majority entities</div>
          </div>
          <div>
            <div>February 10, 2026</div>
            <div>
              <h4><a href="https://ofac.treasury.gov/sanctions-programs-and-country-information/venezuela-related-sanctions">Venezuela General License 48: “Authorizing the Supply of Certain Items and Services to Venezuela</a></h4>
              <h4><a href="https://ofac.treasury.gov/sanctions-programs-and-country-information/venezuela-related-sanctions">”</a></h4>
            </div>
            <div>Authorizes OFAC to permit the provision from the US of goods, technology, software, and services needed for oil and gas exploration, development, production, and maintenance in Venezuela, even when transactions involve the Government of Venezuela and PDVSA</div>
          </div>
          <div>
            <div>February 13, 2026</div>
            <div>
              <h4><a href="https://ofac.treasury.gov/recent-actions/20260213">Venezuela General License 49: “Authorizing Negotiations of and Entry Into Contingent Contracts for Certain Investment in Venezuela”</a></h4>
            </div>
            <div>Authorizes transactions otherwise that are “related to the negotiation of and entry into” contingent contracts with the Government of Venezuela, PDVSA, or PDVSA-majority-owned entities — so long as the contract’s performance is expressly contingent on separate OFAC authorization</div>
          </div>
          <div>
            <div>February 13, 2026</div>
            <div>
              <h4><a href="https://ofac.treasury.gov/recent-actions/20260213">Venezuela General License 50: “Authorizing Transactions Related to Oil or Gas Sector Operations in Venezuela of Certain Entities”</a></h4>
            </div>
            <div>Authorizes transactions related to oil or gas sector operations in Venezuela conducted by specified companies and their subsidiaries, provided contracts are governed by US law (with disputes resolved in the US) and most payments to blocked persons (including taxes/royalties) are routed to specified US-directed deposit funds</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>A list of OFAC general licenses issued since the passage of the Venezuela hydrocarbons law(source: US Office of Foreign Assets Control)</em></p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_1d08f25ae63a57a954e41789fb5634f3df6f8a5c5.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Day in the Life: Product Manager at Recorded Future]]></title>
            <link>https://www.recordedfuture.com/blog/kyle-kohler-product-manager</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/kyle-kohler-product-manager</guid>
            <pubDate>Fri, 03 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[VentureFizz interviews Senior Product Manager Kyle Kohler on his role at Recorded Future]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>Recorded Future is the World’s Largest Intelligence Company. Our team works to build products that customers love. In this video, Kyle Kohler interviewed with VentureFizz about his day-to-day as a Senior Product Manager for Integrations. He describes the job as truly multifaceted, encompassing starting new strategic initiatives, turning customers feedback into improvements, and enabling other team members to do the same. Full video and transcript available below.</div>
          </div>
        </div>
        <div>
          <div>
            <div><a href="https://www.youtube.com/watch?v=EbnzqFfySs0&amp;t=94s">https://www.youtube.com/watch?v=EbnzqFfySs0&amp;t=94s</a></div>
          </div>
        </div>
        <p><strong>Read the Full Video Transcript:</strong></p>
        <p>I’m Kyle Kohler. I’m a product manager over the integration strategy at Recorded Future.</p>
        <p>Recorded Future is the world’s largest threat intelligence provider. We are covering all sorts of domains of intelligence. It’s geopolitical intelligence, cyber intelligence, payment fraud intelligence. And essentially intelligence is this data that an organization uses to take action and make a better decision. So the more that you understand a subject or topic, a current event, the better that you can define what actions you take to either defend your organization or proactively increase your competitive edge.</p>
        <p>As a product manager, it’s funny. I see it as this arson firefighter educator role. And I think that definitely needs to be unpacked a bit. As an arson, you’re starting fires. So, very strategically, which fire do I put under which team, under which initiative, which fire do I stoke and one do I burn hotter? And as a firefighter, you’ve got maybe fires coming in being reported to you from a customer, from an organization, from another product team who needs this other product team to make something happen. And so, you’re very strategically figuring out what to stamp out, what to stoke. And as an educator, you’re also teaching others how to start fires and put out fires. So, you’re constantly going from one thing to the next and keeping all of these moving pieces going. There’s no one project that you just shepherd along and that’s the only thing you work on. You’re constantly context switching and a good product manager has that multi-domain knowledge to think laterally, but also track how this thing affects that thing and how it might affect the other thing in the future.</p>
        <p>At Recorded Future, we’re a global organization and I’m based on the west coast of California. So I wake up in the morning and the first thing I’ve got are 10 to 12 Slack messages from across the globe that come in from different geographies. Other people are ending their day and they’ve got some questions that maybe I can answer or they’re looking for how to direct on who might have the right answer. So the first thing generally starts with voraciously checking Slack and I’m answering notifications as I mentioned questions and the next thing is okay well from the answers to those questions are there new initiatives that need to get spun up or are there existing initiatives that need to get nudged along or are there certain fires that need to get stamped out and that’s the whole day is you’re really tracking where things are in their current state what needs to get responded to and what needs to get pushed along.</p>
        <p>Recorded Future really was attractive to me because it was a pretty new field within cyber security and within technology but also as a company was not just related to IT and cyber had this geopolitical and payment fraud type of angle looking at the world. So it was really taking a big data problem how do you track everything that happens everywhere but then how do you break that down into these bite-sized pieces that ultimately help an organization’s current mission. So I really was attracted by the fact that we are helping organizations secure the world. We’re able to do that by securing the world with intelligence, but it’s so multi-domain that you’re just never going to get bored. There’s always something new. There’s always something to track. There’s always some new threat. There’s always some new initiative, some new innovation. And Recorded Future has really been at that cutting edge of innovation. Always coming up with what’s next in the market, what’s next in the threat landscape and how will we as a company address supercharging the existing missions of our organizations that we help today.</p>
        <p>Original content: <a href="https://venturefizz.com/insights/what-i-do-at-recorded-future-senior-product-manager/">https://venturefizz.com/insights/what-i-do-at-recorded-future-senior-product-manager/</a></p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1c70771f1d2a1c1ea57a0c8903617a776599d63c7.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Latin America and the Caribbean Cybercrime Landscape]]></title>
            <link>https://www.recordedfuture.com/research/latin-america-and-the-caribbean-cybercrime-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/latin-america-and-the-caribbean-cybercrime-landscape</guid>
            <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[This report provides an overview of trends and developments in the cybercriminal ecosystem of Latin America and the Caribbean (LAC) in 2025.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>This report provides an overview of trends and developments in the cybercriminal ecosystem of Latin America and the Caribbean (LAC) in 2025. Insikt Group found that threat actors operating in or targeting the LAC region predominantly use client-server applications and end-to-end encrypted messaging platforms such as Telegram, as well as established English- or Russian-speaking dark web and special-access forums, to communicate and conduct activities. Threat actors demonstrate increased sophistication in their operations, adapting their tactics, techniques, and procedures (TTPs) over time, while still relying primarily on traditional methods such as phishing and social engineering, malware distribution, and ransomware. Based on our analysis, we have determined that Brazil, Mexico, and Argentina were the countries most targeted by financially motivated cybercriminals, likely because they are LAC's largest economies. Additionally, based on this research, Insikt Group found that threat actors often targeted critical industries such as healthcare, finance, and government because they hold high-value data, face operational urgency, and, at times, rely on legacy systems that may be vulnerable.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Insikt Group assesses that criminal forum DarkForums and the messaging platform Telegram are the primary special-access forums and communications platforms used by threat actors operating in or targeting the LAC region.</li>
          <li>Threat actors operating in or targeting LAC are typically financially motivated and frequently leverage social engineering, ransomware, and various forms of mobile malware to gain initial access to government, healthcare, and financial institutions.</li>
          <li>In 2025, Insikt Group recorded 452 ransomware incidents impacting the LAC region. The top five industries affected were healthcare, manufacturing, government, information technology, and education, all of which observed a noticeable increase in attacks compared to the previous year.</li>
          <li>Insikt Group continued to identify banking trojans being leveraged by threat actors, with established variants being the most widely used. Specifically, threat actors used banking trojans in targeted smishing campaigns targeting WhatsApp users to gain access to financial data and steal credentials.</li>
          <li>Insikt Group identified LummaC2 as the most prolific information stealer (infostealer) affecting organizations in LAC in the first half of 2025 and Vidar in the second half, following law enforcement disruption of LummaC2.</li>
        </ul>
        <h2>Background</h2>
        <p>In the <a href="https://digiamericas.org/wp-content/uploads/2025/06/FinancialSector_EN.pdf">aftermath</a> of the COVID-19 pandemic, the LAC region underwent rapid digital development that outpaced security maturity, leading to asymmetrical cloud adoption, reliance on legacy infrastructure, and the introduction of remote work across all verticals. Many organizations adopted software-as-a-service (SaaS) platforms without effectively implementing strong access controls or multi-factor authentication (MFA) methods, leaving them exposed to ransomware and data theft, among other cyberattacks. Economic instability (inflation and currency controls) in LAC countries has created incentives for cybercrime while weakening institutional defenses. Political volatility, social protests, and corruption have created new opportunities for financially and politically motivated threat actors. Compounded factors such as high youth unemployment, income inequality, and the influence of informal economies have driven individuals to seek alternative sources of income, which in turn fuels much of the cybercrime we see today.</p>
        <p>According to a World Economic Forum report, <a href="https://www.weforum.org/press/2026/01/cyber-enabled-fraud-is-now-one-of-the-most-pervasive-global-threats-says-new-report-45dc3f679b/">13%</a> of respondents in the LAC region expressed low confidence in their country’s preparedness to respond to significant cyber incidents. Despite significant <a href="https://publicadministration.un.org/egovkb/en-us/Reports/UN-E-Government-Survey-2024">progress</a> in digital government, regulatory advancements, and investments in the region, many countries still lack the technical competence in their workforce and the resources to sustainably harden their environments. Many LAC government networks hold large amounts of sensitive data but are <a href="https://digiamericas.org/wp-content/uploads/2024/05/LATAM-CISO-REPORT-2024_.pdf">deficient</a> in their security best practices, leaving their systems vulnerable to cyberattacks. Large breaches are routinely circulated, recycled, and resold on dark web marketplaces, enabling identity theft, synthetic identity fraud, SIM swaps, and account takeovers, among other types of cybercriminality to flourish at a larger scale.</p>
        <p>Although the LAC region has made significant technological advancements, particularly in the financial services sector, innovations are creating new challenges. The financial technology industry has introduced mobile banking applications, digital wallets, and instant payment systems. LAC countries face rising levels of cyber-enabled fraud in the financial sector because real-time payment rails have weaker identity verification controls, rendering social engineering attempts more effective. Instant payment systems, such as Brazil’s PIX and similar mobile banking platforms, have often been targeted by threat actors. With faster transaction speeds at higher volumes, detection and recovery efforts have become increasingly complex, making scams significantly more profitable and scalable.</p>
        <p>The LAC region has the world's fastest-growing <a href="https://openknowledge.worldbank.org/server/api/core/bitstreams/692c6149-748f-40dc-b9e6-8e09ba3e47bf/content">rate</a> of disclosed cyber incidents, though many remain unreported. <a href="https://digiamericas.org/wp-content/uploads/2024/05/LATAM-CISO-REPORT-2024_.pdf">Only</a> seven LAC countries have plans to protect their critical infrastructure from cyberattacks, and only twenty have Computer Security Incident Response Teams (CSIRTs). Despite <a href="https://unctad.org/page/cybercrime-legislation-worldwide">31</a> LAC countries having some form of legislation addressing cybercrime, many face skills shortages, creating barriers to enforcement. Limited law enforcement resources and unreliable interstate cooperation further delay investigation and prosecution, enabling threat actors to operate across jurisdictions with relative ease. A cultural perception that cybercrime carries low risk and offers high reward undermines the deterrent effect that reliable law enforcement action would otherwise have. This incentive structure, coupled with reduced stigma, encourages repeat offenses and recruitment, as reflected in the cybercriminal trends observed by Insikt Group in 2025.</p>
        <h2>Cybercriminal Activities in LAC</h2>
        <p>Throughout 2025, Insikt Group investigated and identified different types of cybercriminals operating on clearnet and dark web sources. Cybercriminals routinely leveraged phishing for initial access, and among the most common methods seen was the search and collection of sensitive information directly from a compromised host's file system or databases. This technique is often a critical pre-exfiltration step used to obtain financial records, passwords, and other forms of personally identifiable information (PII), likely to conduct account takeovers or fraud. Insikt Group research found that cybercriminals have also begun evolving their TTPs to exploit near-field communications (NFC) to commit financial fraud and are using malware to target cryptocurrency wallets. Insikt Group intelligence indicates that cybercriminals are primarily interested in selling compromised databases and access methods, as well as participating in hacktivist collectives. In some instances, advanced persistent threats (APTs) have also begun to overlap their activities with cybercrime when targeting the region.</p>
        <h2>Cybercriminal Sources</h2>
        <p>Threat actors operating in or targeting the LAC region continued to rely on the infrastructure of established English- and Russian-speaking forums throughout 2025 (see <strong>Appendix A</strong>). Insikt Group identified Spanish- and Portuguese-language postings on several established dark web and special-access forums. Even though these sources are predominantly English- and Russian-speaking, these posts likely indicate a preference among threat actors targeting LAC to seek more established, traditional platforms for conducting business. Research showed that low to moderate-tier forums are most commonly used by threat actors based in or targeting LAC countries, possibly suggesting lower levels of sophistication, as higher-tier forums often require vouching, payment, demonstration of knowledge or technical abilities, and sometimes private invitation to gain access.</p>
        <p>Insikt Group assesses that most communications between threat actors likely occur on encrypted messaging platforms such as Telegram, WhatsApp, and Signal due to speed, ease of access, and higher levels of trust among group members. Given the privacy-enhancing features of many of these platforms, collection efforts can become significantly more constrained. Telegram is predominantly used because it offers larger channel and group capacities, account creation is simple, it enables threat actors to leverage bot automation and support for their malicious activities, and content moderation is typically less stringent than on other platforms. By offering a path of least resistance, threat actors enjoy the added privacy that end-to-end encrypted messaging platforms provide without delaying their operations.</p>
        <p>Financially motivated threat actors often advertise a variety of data types, including PII, financial data, login credentials, system access credentials, exploits and vulnerabilities, malware, ransomware, and hacking tutorials. In some instances, Insikt Group observed threat actors selling customer relationship management (CRM) access, virtual private network (VPN) access with domain user privileges and local administrator rights on a database server, and command-and-control (C2) access to LAC-based entities in 2025. Leveraging this access to information, cybercriminals may facilitate further crimes, including but not limited to extortion attempts, digital and social engineering scams, ransomware deployment, data theft, and account takeovers. Insikt Group research indicates that threat actors generally advertise breached databases and payment card data because they can be lucrative, require relatively low levels of sophistication, and are sought after by other cybercriminals.</p>
        <p>Threat actors often target government systems because they contain highly sensitive data that can be profitable for scams, identity theft, or extortion. For instance, shortly after a tense general election, Ecuador’s legislature, the National Assembly, <a href="https://therecord.media/ecuador-national-assembly-cyberattack">reported</a> it had suffered two cyberattacks aimed at accessing confidential data and disrupting the availability of information services. In another example, threat actors exposed sensitive data on millions of Paraguayan citizens on the dark web; among the alleged exfiltrated data are national ID numbers, dates of birth, physical addresses, and health service records.</p>
        <p>DarkForums was the primary dark web and special-access forum where Insikt Group recorded the most posts relating to cybercrime-related events in Spanish and Portuguese in 2025. This forum is an English-language, low-tier forum operated by English-speaking administrators, launched in March 2023, and is accessible via a clearnet domain. Additionally, DarkForums was observed hosting leaked databases and data breaches involving Spanish-speaking countries, with posts describing the compromise of thousands of records and credentials. Other forums, such as XSS, Exploit, RehubcomPro, Cracked, BreachForums 2, ProCrd, and CrdPro, were also among the top forums to contain posts in Spanish and Portuguese. <strong>Appendix A</strong> presents a sample of Spanish and Portuguese forum threads from these sources.</p>
        <h2>Cybercriminal Tactics and Attack Vectors</h2>
        <p>The LAC region has a long history of financially motivated cybercrime; as a result, Insikt Group observed in this analysis that threat actors continue to heavily target the financial sector. Threat actors typically rely on traditional initial access methods, such as phishing via email, SMS, and WhatsApp messages, impersonating financial institutions, and requesting invoices or payments. Threat actors deliver lures via malicious links that redirect to fake login pages and contain malicious attachments with embedded links. Many of these techniques are effective when targeting entities in the LAC region due to an overwhelming reliance on email and messaging applications for business, as well as a general strong trust in branded communications. Artificial intelligence (AI) has introduced more sophisticated methods into the cybercriminal ecosystem in LAC, lowering the barrier to entry for threat actors and significantly increasing the scalability of attacks through automation. AI helps threat actors create more effective phishing messages that could be generated in native Spanish or Portuguese, rendering them more convincing to the local target audience. The advent of <a href="https://publications.iadb.org/en/publications/english/viewer/2025-Cybersecurity-Report-Vulnerability-and-Maturity-Challenges-to-Bridging-the-Gaps-in-Latin-America-and-the-Caribbean.pdf">agentic AI</a> also presents new opportunities and attack vectors for cybercriminal groups to exploit and greatly facilitates cybercrime-as-a-service. Organized criminal groups have <a href="https://www.fiap.gob.es/wp-content/uploads/2024/11/ELPACCTO2-IAyCrimen-EN.pdf">integrated</a> AI into their operations to assist with drug smuggling, money laundering, cyber-enabled fraud, and malware development.</p>
        <p>Throughout 2025, Insikt Group observed threat actors targeting the LAC region by compromising remote desktop protocol (RDP), VPNs, and web admin panels, and obtaining credentials from prior infostealer infections, password reuse, brute-force attacks, and other initial access points. Based on data within the Recorded Future Intelligence Operations Platform, there are approximately 29,000 references to exposed LAC-related credentials on Russian Market. These exposed credentials are from domains belonging to the top organizations (by revenue) in the healthcare, government, and financial sectors across the five largest economies in LAC. Russian Market is one of the leading dark web marketplaces for the sale and distribution of infostealer logs. Most of these logs were from LummaC2 and then Acreed Stealer, consistent with what Insikt Group observed in its review of additional infostealer logs. It should be noted that many of the 29,000 exposed credentials are likely customers of these organizations and not necessarily employees, as Recorded Future does not have access to internal-facing employee domain addresses to search for exposed credentials; however, those can be added by an end user. Insikt Group assesses that these attack vectors were likely effective for infiltrating the systems of targets in the LAC region due to increased remote work adoption, legacy infrastructure in many public institutions, and limited monitoring and resources. Insikt Group observed threat actors advertising carding tools, bulk SMS/Email blasting, SIM swapping, hacking assistance, and other similar services on Telegram channels.</p>
        <p>In 2025, Insikt Group observed a rise in novel types of malware that actively leverage and exploit NFC. First <a href="https://www.threatfabric.com/blogs/phantomcard-new-nfc-driven-android-malware-emerging-in-brazil">identified</a> by Threat Fabric, PhantomCard is an Android trojan, notably a variant of China-origin NFC relay malware-as-a-service (MaaS), primarily <a href="https://www.threatfabric.com/blogs/phantomcard-new-nfc-driven-android-malware-emerging-in-brazil">targeting</a> banking customers in Brazil. PhantomCard enables relay attacks by obtaining NFC data from a victim's banking card and transmitting it to a threat actor's device to perform transactions at point-of-sale (POS) systems or ATMs. PhantomCard is distributed via malicious webpages that impersonate legitimate applications, prompting victims to tap their cards and enter their personal identification numbers (PINs) for authentication. Once credentials are fraudulently obtained, they are relayed to attackers.<br />Similarly, in late 2025, threat actors deployed RelayNFC, a mobile malware that targets contactless payment cards, in a phishing campaign targeting Brazilian users. This evolution in TTPs parallels the shift by threat actors from skimming magnetic stripe data to “shimming” Europay, Mastercard, and Visa (EMV) chip data in the payment fraud ecosystem, since unique cybercriminal solutions typically follow new security innovations.</p>
        <p>Per the 2025 Cybercriminal Cryptocurrency Annual Activity Report, Insikt Group consistently observed activity in which cryptocurrency wallets were targeted by various forms of malware, such as drainers, clippers, and miners, to steal funds. Given the persistent lag in cybersecurity measures in LAC and the rapid growth of the cryptocurrency market in the LAC region, its users may become attractive targets for cybercriminals. The top <a href="https://www.chainalysis.com/blog/latin-america-crypto-adoption-2025/">five</a> countries in the LAC region that dominate the cryptocurrency ecosystem are Brazil, Argentina, Mexico, Venezuela, and Colombia. However, Brazil is the clear <a href="https://www.chainalysis.com/blog/latin-america-crypto-adoption-2025/">leader</a>, accounting for a third of overall cryptocurrency activity. Insikt Group assesses that, as the mainstream adoption of cryptocurrency continues, threat actors will likely seek targets in these countries, as knowledge and security practices among the user base in these regions will likely be lacking. Additionally, as with threat actors in other regions of the world, those targeting LAC will almost certainly leverage this medium of exchange to transact and launder illicit funds. As countries continue to adopt new regulations and introduce new forms of cryptocurrency, we expect threat actors to identify new vectors for exploitation. As of 2025, Argentina, Brazil, Colombia, Ecuador, Paraguay, Trinidad and Tobago, Uruguay, and Venezuela are participating in INTERPOL’s inaugural pilot phase for the new <a href="https://www.interpol.int/News-and-Events/News/2025/INTERPOL-publishes-first-Silver-Notice-targeting-criminal-assets">Silver Notice</a>, which will be published to “help trace and recover criminal assets, combat transnational organized crime and enhance international police cooperation,” likely including cryptocurrency assets if linked to criminal proceeds.</p>
        <h2>Advanced Persistent Threats (APTs) and Cybercrime</h2>
        <p>Throughout 2025, Insikt Group observed a rise in APT activity targeting the LAC region using traditional cybercriminal methods, such as phishing and ransomware. This suggests some APT groups may also have financial motivations extending beyond seeking strategic geopolitical influence. Prominent APTs, such as Dark Caracal, conducted cyber espionage and delivered the Poco RAT via financial-themed phishing. TAG-144 (Blind Eagle) primarily targeted government entities in South American countries, notably Colombia, using TTPs such as spearphishing and remote access trojans (RATs) in campaigns blending espionage and financial motives.</p>
        <p>Insikt Group assesses that some Chinese state-sponsored activity is likely aimed at <a href="https://www.atlanticcouncil.org/commentary/the-5x5-the-state-of-cybersecurity-in-latin-america/">protecting</a> economic investments in the region, such as the Belt and Road Initiative (BRI), sovereign loans, and widespread commercial interests. In addition to the above APT groups, Chinese state-sponsored groups are also targeting entities in LAC countries. TAG-141 (FamousSparrow) leveraged SparrowDoor malware against entities in Mexico, Argentina, and Chile. Storm-2603 (Gold Salem) deployed ransomware, including Warlock, LockBit, and Babuk, targeting multiple sectors across agriculture, government, energy and natural resources, and telecommunications in the LAC and Asia-Pacific (APAC) regions. This activity may signal that China is seeking to retain influence in the LAC region through cybercriminal means or is interested in financial gain.</p>
        <h2>Hacktivism</h2>
        <p>The LAC region has repeatedly experienced periods of complex political and social unrest fueled by debates regarding economic reforms, corruption, and inequality. Unlike financially motivated cybercrime, hacktivism tends to be political or ideological, and these tense conditions can create an environment where hacktivism spikes. In late 2025, Insikt Group noticed increased activity from Chronus Team, a hacktivist group known for defacement attacks and data leaks aimed at exposing security vulnerabilities, primarily targeting organizations in Mexico. The threat group leverages Telegram channels for communication and propaganda. It has loosely aligned with other hacktivist and cybercriminals groups, such as Elite 6-27 and Sociedad Privada 157, to gain attention and increase its reputation. Insikt Group observed another trend where several hacktivist groups began transitioning to ransomware-as-a-service (RaaS) for financial gain. One such hacktivist group, “FiveFamilies”, functions as a collective of several groups; some of their targeted entities included those located in Cuba and Brazil.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1adeca9f01a5609ed0ab681070409af59d1685f44.png?width=750&amp;format=png&amp;optimize=medium" width="868" height="546" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1</strong>: Chronus Team hack and web defacement of the website for the budget transparency for the municipality of Hermosillo, Sonora, Mexico (Source: Social Media)</em></div>
          </div>
        </div>
        <h2>Malware Trends</h2>
        <p>In 2025, Insikt Group observed elevated ransomware activity targeting organizations in the LAC region. Additionally, banking trojans also remained a prominent issue affecting LAC countries, with Insikt Group noting an uptick in campaigns specifically leveraging WhatsApp for delivery. Infostealers remained a popular initial access enabler in the LAC region. Botnets have grown in the region largely due to small office/home office (SOHO) devices, such as routers and other internet-of-things (IoT) appliances with weak security, outdated firmware, and a reliance on default credentials. Botnet activity can contribute to credential theft, the propagation of phishing campaigns, the distribution of spam, the takeover and abuse of residential IP addresses, and the enabling of distributed denial-of-service (DDoS) attacks. Insikt Group also observed threat actors targeting payment terminals in 2025 with ATM and POS malware.</p>
        <h2>Ransomware</h2>
        <p>In 2025, Recorded Future’s Global Ransomware Landscape Dashboard recorded 452 ransomware incidents impacting the LAC region out of 7,346 total globally, based on all publicly known ransomware victims listed on associated ransomware blogs. Attacks on entities in the LAC region constituted just over 6% of all global ransomware attacks in 2025. The top five industries most impacted by ransomware in the LAC region in 2025 were Healthcare (36 attacks), Manufacturing (49 attacks), Government (28 attacks), Information Technology (21 attacks), and Education (20 attacks), as demonstrated in <strong>Figure 3</strong>. Insikt Group research on ransomware in the LAC region covers 27 of the 33 constituent countries. Insikt Group did not obtain ransomware data from Antigua and Barbuda, Belize, Cuba, Saint Kitts and Nevis, Saint Lucia, or Suriname in 2025.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_13c187088bebe57a3ba341e5db6d3955c5db15fcd.png?width=750&amp;format=png&amp;optimize=medium" width="1512" height="545" />
            </div>
          </div>
          <div>
            <div><strong>Figure 2:</strong> Global Ransomware Landscape Dashboard view of attack metrics for the top five ransomware groups impacting LAC in 2025 (Source: Recorded Future)</div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1fa7b50698ac634f7f8edf4b0d090a89ad875dda1.png?width=750&amp;format=png&amp;optimize=medium" width="1512" height="840" />
            </div>
          </div>
          <div>
            <div><strong>Figure 3:</strong> Global Ransomware Landscape Dashboard view of attack metrics for the top five most impacted industries in LAC in 2025 (Source: Recorded Future)</div>
          </div>
        </div>
        <p>Insikt Group observed an increase in ransomware activity across all major industries in LAC compared to the prior year. Insikt Group specifically examined ransomware attacks against financial, government, and healthcare entities across the LAC region and identified the following: 16 attacks targeting the finance sector, 28 attacks targeting the government sector, and 36 attacks targeting the healthcare sector. <strong>Appendix C</strong> highlights a sample of these ransomware attacks.</p>
        <p>Regarding LAC countries, the top five countries most impacted by ransomware in the LAC region in 2025 were Brazil (128 attacks), Mexico (78 attacks), Argentina (63 attacks), Colombia (51 attacks), and Peru (27 attacks). These countries are among the largest economies in the region, which may lead to downstream spillover effects for enterprises that conduct business directly with them or with neighboring countries. Insikt Group found that the majority of ransomware groups leverage double extortion. This extortion technique involves encrypting a victim’s data, exfiltrating the data, and then threatening to publicly leak the data on the ransomware group’s name-and-shame blog if a ransom is not paid. Recorded Future assesses countries by network intrusion and ransomware targeting risk every quarter to provide awareness and help organizations assess risk exposure. Takeaways from the top five impacted countries based on metrics and analysis from Recorded Future include:</p>
        <ul>
          <li>Brazil’s network intrusion risk score increased from Medium to Very High, and Brazil’s ransomware targeting risk score remained Medium by the end of 2025. Brazil was the most targeted country in LAC and among the top ten countries worldwide impacted by ransomware in 2025, with a total of 130 victims.</li>
          <li>Mexico’s network intrusion risk score increased from Very Low to Low, and Mexico’s ransomware targeting risk score increased from Low to Medium at the end of 2025. Notably, data was leaked relating to a Mexican government entity on the dark web name-and-shame extortion website, Tekir Apt Data Leak Site.</li>
          <li>Argentina’s network intrusion risk score increased from Very Low to Low, and Argentina’s ransomware targeting risk score increased from Low to Medium at the end of 2025. Insikt Group observed that Argentina was targeted by a new rust-based ransomware “RALord”.</li>
          <li>Colombia’s network intrusion risk score increased from Low to High, and Colombia’s ransomware targeting risk score remained low with no observed changes at the end of 2025. Colombia’s financial sector was impacted by the ransomware group Crypto24, which posted victims' names on its blog.</li>
          <li>Peru’s network intrusion risk score increased from Very Low to Low, and Peru’s ransomware targeting risk score was low with no observed changes at the end of 2025. A pharmaceutical company headquartered in Peru was named as a victim on the Dire Wolf Blog.</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1dac72236ed639639adfd668cafbc142247671aae.png?width=750&amp;format=png&amp;optimize=medium" width="1512" height="825" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>Global Ransomware Landscape Dashboard view of the most affected countries in LAC in 2025 (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Banking Trojans</h2>
        <p>According to the Global System for Mobile Communications Association (GSMA), in 2024, approximately 64% of the LAC population used mobile internet; it is <a href="https://www.gsma.com/solutions-and-impact/connectivity-for-good/mobile-economy/wp-content/uploads/2025/05/GSMA_Latam_ME2025_R_Web.pdf">projected</a> that this will increase to nearly three-quarters by 2030. <a href="https://publications.iadb.org/en/publications/english/viewer/2025-Cybersecurity-Report-Vulnerability-and-Maturity-Challenges-to-Bridging-the-Gaps-in-Latin-America-and-the-Caribbean.pdf">Increasing</a> internet penetration and high cell phone subscription rates in LAC signify a rising reliance on mobile devices, likely making them more appealing targets for threat actors. <a href="https://gs.statcounter.com/os-market-share/mobile/south-america/2025">Android</a> remains the predominant operating system (OS) of mobile devices in South America with an 84.59% market share. Android devices may support more sideloaded applications (links and Android application packages [APKs] from social media or third-party stores) than Apple iOS, which typically has tighter ecosystem controls, and Android users may be running older OS versions, thereby making Android devices attractive targets for cybercriminals. The Android ecosystem grants developers more freedom to list apps within the Google Play Store, and the vetting and verification process is less stringent, allowing malicious APK domain mirrors to go undetected. In LAC, users may rely on mobile phones as their <a href="https://www.undp.org/sites/g/files/zskgke326/files/2022-09/undp-rblac-Digital-EN.pdf">primary</a> or only computing device, making them desirable initial access points for threat actors to deploy Android-based malware. According to the <a href="https://www.worldbank.org/en/publication/globalfindex">World Bank's</a> Global Findex 2025 report, 37% of adults in the LAC region had a mobile money account as of 2024. Mobile banking, digital wallets, and QR payments are commonplace in the area. Based on the World Bank’s findings, Insikt Group assesses that persistent mobile banking malware targeting LAC is likely driven by rapid digital banking integration that has outpaced security controls and the expansion of MaaS ecosystems. Sophisticated localized social engineering attacks and disproportionate regional enforcement capacity are further accelerating this trend within LAC’s ever-evolving mobile financial landscape.</p>
        <p>Insikt Group research reflected an increase in banking trojans targeting the WhatsApp platform in 2025. Brazilian authorities have, in recent years, focused their attention on <a href="https://therecord.media/brazil-police-arrests-grandoreiro-banking-trojan-suspects">disrupting</a> banking trojans. A significant amount of crimeware in LAC consists of mobile banking trojans, though similar in many ways, they are not a monolith and differ in unique ways. Insikt Group analysis from 2025 reflects that, despite some law enforcement disruptions, banking trojans are still a prominent issue in the LAC region and will likely continue to be in 2026. <strong>Appendix D</strong> highlights the most active banking trojans across the LAC region in 2025.</p>
        <h2>Infostealers</h2>
        <p>Infostealers pose a persistent threat worldwide, and the LAC region is no exception. Insikt Group analyzed a small sample of the domains belonging to the top organizations (based on revenue) in the healthcare, government, and financial sectors across the top five largest economies in LAC. Analysis showed that the most prominent infostealer threats observed in 2025 were LummaC2, Vidar, Rhadamanthys, RedLine, and Nexus. This is despite multiple law enforcement operations under Operation Endgame conducting takedowns impacting <a href="https://www.europol.europa.eu/media-press/newsroom/news/end-of-game-for-cybercrime-infrastructure-1025-servers-taken-down">Rhadamanthys</a> and <a href="https://www.justice.gov/opa/pr/justice-department-seizes-domains-behind-major-information-stealing-malware-operation">LummaC2</a>.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_10acef9d339a54f3193b63b20cdcf8ebd3a52f4a8.png?width=750&amp;format=png&amp;optimize=medium" width="1512" height="636" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 5:</strong></em> <em>Infostealers infection trends in 2025 for the domains belonging to the top organizations (based on revenue) in the healthcare, government, and financial sectors for countries with the top five largest economies in LAC (Source: Recorded Future data)</em></div>
          </div>
        </div>
        <p>LummaC2 was undoubtedly the most active infostealer targeting entities in the LAC region despite being targeted by law enforcement. LummaC2 has been discussed in several news sources and Telegram chatter as targeting users in Argentina, Paraguay, and Mexico. Cybercriminals deploy LummaC2 to obtain victim credentials to carry out financial fraud and cryptocurrency theft. Insikt Group conducted research into LummaC2 affiliates and identified a likely Mexico-based threat actor operating under multiple aliases linked to Lumma build ID “re0gvc”. In mid-2025, law enforcement took measures to disrupt LummaC2; the operation effectively led to the takedown of approximately 2,300 malicious domains integral to LummaC2’s infrastructure, Lumma’s central command, and associated criminal marketplaces. Shortly after this operation, it appears LummaC2 still had infected victims in several countries, including Brazil and Colombia, likely because <a href="https://blogs.microsoft.com/on-the-issues/2025/05/21/microsoft-leads-global-action-against-favored-cybercrime-tool/">sinkholing</a> requires some time to have a noticeable effect as it redirects traffic but does not automatically clean infected machines. More complete remediation would require patching and malware removal on affected systems, which is challenging to implement at scale when infected devices are spread across the world. However, Insikt Group observed a significant decrease in credentials exposed by LummaC2 in the second half of 2025, likely due to the success of the joint Microsoft and law enforcement operation, as well as the main threat actor being banned from Exploit.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_15861d6f118617071c82f361bbec193b87feccd4d.png?width=750&amp;format=png&amp;optimize=medium" width="1512" height="397" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 6:</strong></em> <em>LummaC2 infection trends in 2025 for the domains belonging to the top organizations (based on revenue) in the healthcare, government, and financial sectors for countries with the top five largest economies in LAC (Source: Recorded Future data)</em></div>
          </div>
        </div>
        <p>In the wake of the LummaC2 operation, Recorded Future detected an increase in Vidar infections during the latter half of 2025. This increase highlights threat actors’ ability to migrate between infostealers to facilitate their criminality despite disruptions.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1039a8a696c49e31ab94796a1a8b0e40112173726.png?width=750&amp;format=png&amp;optimize=medium" width="1512" height="397" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 7:</strong></em> <em>Vidar</em> <em>Infection trends in 2025 for the domains belonging to the top organizations (based on revenue) in the healthcare, government, and financial sectors for countries with the top five largest economies in LAC (Source: Recorded Future data)</em></div>
          </div>
        </div>
        <h2>Botnets</h2>
        <p>Botnet activity has grown steadily in the LAC region, enabling financial fraud, spam distribution, credential harvesting, initial access for ransomware and large-scale DDoS attacks targeting financial and government institutions. Botnets remained a priority for international law enforcement in 2025. For example, the ongoing <a href="https://www.europol.europa.eu/operations-services-and-innovation/operations/operation-endgame">Operation Endgame</a> aims to hinder threat actors' remote-control capabilities by dismantling ransomware and other malware infrastructure. Emerging in late 2025, Kimwolf, also known as AISURU, is a botnet that targets compromised streaming devices. News reporting and dark web chatter indicate many of the devices infected with Kimwolf are based in Brazil, India, the US, and Argentina. Additional <a href="https://krebsonsecurity.com/2026/01/who-benefited-from-the-aisuru-and-kimwolf-botnets/">reporting</a> suggests a threat actor involved with the AISURU botnet is likely based in Brazil. Horabot is a malware family and type of botnet first identified in June 2023, targeting Spanish-speaking users in six LAC countries: Mexico, Guatemala, Colombia, Peru, Chile, and Argentina. Horabot uses invoice-themed phishing emails to gain initial access to victims' systems.</p>
        <h2>Payment Terminal Malware</h2>
        <p>Threat actors also continued to target payment infrastructure for financial gain. ATM malware activity has continued to <a href="https://www.mcsystems.com/insight/atm-malware-attacks-on-the-rise-in-the-region-warns-fintech-expert/">rise</a> in LAC, with some experts noting ATM malware attacks have spiked by 46% across LAC in 2025. For instance, Ploutus is a sophisticated malware family first detected in Mexico in 2013, which compromises ATMs by issuing unauthorized commands to their cash dispensing modules. In <a href="https://therecord.media/doj-charges-gang-malware-ploutus">December</a> 2025, the US Department of Justice indicted 54 individuals associated with the Venezuelan gang Tren de Aragua (TDA) for participation in a massive ATM jackpotting scheme that exploited Ploutus malware. Moreover, the POS malware MajikPOS, designed to infiltrate systems connected to POS terminals and extract magnetic stripe payment data from bank cards, remained an active threat to companies operating in Brazil.</p>
        <h2>Mitigations</h2>
        <ul>
          <li><strong>Use Recorded Future’s Global Ransomware Landscape Dashboard</strong>: Recorded Future customers can proactively mitigate this threat by operationalizing the Recorded Future Global Ransomware Landscape Dashboard and leveraging the victimology tab to filter based on ransomware group, country, and industry of interest. Recorded Future customers can customize their own ransomware risk profile and establish alerts that align with their risk priorities.</li>
          <li><strong>Use Recorded Future’s Threat and Third-Party Risk Monitoring</strong>: Configure alerts in the Recorded Future Intelligence Cloud to track activity across Telegram channels, darkweb forums, and other platforms for proactive awareness. Use the Third-Party Intelligence module to assess risk exposure for current and future partnerships.</li>
          <li><strong>Update Legacy Systems</strong>: Threat actors, whether opportunistic or financially motivated, or both, often seek to exploit vulnerable systems. Organizations that rely on outdated technology stacks leave themselves exposed to preventable cyber threats and attacks.</li>
          <li><strong>Engage in Public-Private Information Sharing</strong>: To bolster regional collaboration and establish standardized best practices, coordinate with law enforcement, and create intelligence-sharing channels to enhance investigations and decrease incident response times.</li>
          <li><strong>Generate Awareness through Education</strong>: Advocating for digital literacy through university partnerships and scholarship in the LAC region will encourage good cyber hygiene and prepare for a stronger, more competent workforce. Enterprises can implement mandatory cybersecurity training during new hire onboarding and establish routine drills to ensure protocols are followed.</li>
        </ul>
        <h2>Outlook</h2>
        <p>Insikt Group has highlighted the most salient cybercriminal trends and methods observed throughout the LAC region in 2025. Threat actors conducted phishing and credential theft to gain and sell initial access to LAC organizations while often relying on dark web forums and end-to-end encrypted messaging platforms to communicate and monetize compromised data and access methods. Cybercriminals carried out elevated ransomware attacks against the healthcare, government, finance, and other critical sectors. Banking trojan and infostealer activity persisted throughout LAC despite law enforcement disruption attempts. Cybercriminals have proven to be adaptive and resilient, often capitalizing on immature or emerging businesses that lack the skills, tools, and personnel to prevent attacks. Small and medium-sized enterprises (SMEs) constitute over <a href="https://www.eucybernet.eu/wp-content/uploads/2025/09/guide-for-smes-lac4-2025-september-2025.pdf">95%</a> of all businesses in LAC. SMEs are desirable targets for cybercriminals because they typically have limited resources and expertise, lack robust infrastructure, and have a high overreliance on third-party platforms. Insikt Group trend analysis supports these findings.</p>
        <p>Absent regional harmonization of cybersecurity policies and best practices, LAC countries will likely continue to use fragmented incident response approaches, complicating cross-border cooperation and collaboration. For effective and sustainable protection of systems and information against cyber threats, LAC countries should focus on working together to establish standardized risk assessments and reporting mechanisms, protocols for information sharing to bolster timely remediation, and implement proactive “secure by design” principles. Possible <a href="https://digiamericas.org/wp-content/uploads/2024/05/LATAM-CISO-REPORT-2024_.pdf">approaches</a> to accomplishing this may include increased investment in workforce development, participation in public-private partnerships, and the establishment of centralized cybersecurity management systems. Despite the lack of prominent Spanish- and Portuguese-language forums, it is likely that threat actors will continue to leverage traditional platforms and methods similar to those used by the English- and Russian-speaking cybercriminal underground. Based on current and historical data, we anticipate these trends will continue, and LAC will likely remain a popular target for ransomware groups and a hotspot for mobile malware in 2026.</p>
        <h2>Appendix A: Sample Listing of Posts Targeting Entities in LAC Countries on Dark Web and Special Access Forums</h2>
        <div>
          <div>
            <div><strong>Alleged Access or Leak</strong></div>
            <div><strong>Source</strong></div>
            <div><strong>LAC Country and Sector Impacted</strong></div>
          </div>
          <div>
            <div>Access to a Brazilian banking entity</div>
            <div>XSS Forum</div>
            <div>Brazil/Finance</div>
          </div>
          <div>
            <div>VPN access to a Colombian bank</div>
            <div>Exploit Forum</div>
            <div>Colombia/Finance</div>
          </div>
          <div>
            <div>Access to a leaked government database</div>
            <div>DarkForums</div>
            <div>Mexico/Government</div>
          </div>
          <div>
            <div>Database access to the official government portal</div>
            <div>Exploit Forum</div>
            <div>Argentina/Government</div>
          </div>
          <div>
            <div>Web shell access with root privileges for a healthcare provider</div>
            <div>XSS Forum</div>
            <div>Chile/Healthcare</div>
          </div>
          <div>
            <div>Global VPN access to a healthcare network</div>
            <div>RehubcomPro Forum</div>
            <div>Brazil/Healthcare</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix B: Sample Metrics of the Top Five Ransomware Groups Impacting LAC in 2025</h2>
        <div>
          <div>
            <div><strong>Group Name</strong></div>
            <div><strong>Total Attacks (All Sectors)</strong></div>
            <div><strong>Healthcare</strong></div>
            <div><strong>Manufacturing</strong></div>
            <div><strong>Government</strong></div>
            <div><strong>IT</strong></div>
            <div><strong>Education</strong></div>
          </div>
          <div>
            <div>Qilin (Agenda)</div>
            <div>54</div>
            <div>4</div>
            <div>6</div>
            <div>0</div>
            <div>2</div>
            <div>2</div>
          </div>
          <div>
            <div>LockBit Gang (BITWISE SPIDER, DEV-0396, Flighty Scorpius)</div>
            <div>29</div>
            <div>2</div>
            <div>3</div>
            <div>1</div>
            <div>1</div>
            <div>4</div>
          </div>
          <div>
            <div>Safepay</div>
            <div>27</div>
            <div>2</div>
            <div>4</div>
            <div>0</div>
            <div>0</div>
            <div>0</div>
          </div>
          <div>
            <div>The Gentlemen</div>
            <div>22</div>
            <div>3</div>
            <div>1</div>
            <div>0</div>
            <div>0</div>
            <div>1</div>
          </div>
          <div>
            <div>Kazu</div>
            <div>21</div>
            <div>0</div>
            <div>0</div>
            <div>17</div>
            <div>0</div>
            <div>2</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix C: Sample Data of Ransomware Incidents Impacting Healthcare, Government, and Financial Sectors in LAC Countries in 2025</h2>
        <div>
          <div>
            <div><strong>Ransomware Group</strong></div>
            <div><strong>Country</strong></div>
            <div><strong>Sector</strong></div>
          </div>
          <div>
            <div>Safepay</div>
            <div>Argentina</div>
            <div>Healthcare</div>
          </div>
          <div>
            <div>The Gentlemen</div>
            <div>Brazil</div>
            <div>Healthcare</div>
          </div>
          <div>
            <div>Kazu</div>
            <div>Colombia</div>
            <div>Government</div>
          </div>
          <div>
            <div>Kazu</div>
            <div>Mexico</div>
            <div>Government</div>
          </div>
          <div>
            <div>Qilin (Agenda)</div>
            <div>Ecuador</div>
            <div>Finance</div>
          </div>
          <div>
            <div>Qilin (Agenda)</div>
            <div>Argentina</div>
            <div>Finance</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
        <h2>Appendix D: Trends from the Most Active Banking Trojans in LAC in 2025</h2>
        <div>
          <div>
            <div><strong>Banking Trojan</strong></div>
            <div><strong>Attributes</strong></div>
            <div><strong>Activity in 2026</strong></div>
          </div>
          <div>
            <div>Grandoreiro</div>
            <div>Spreads through phishing emails with seemingly legitimate documents, such as PDFs. Once on a device, it performs anti-sandbox checks, logs keystrokes, and communicates with C2 servers to exfiltrate sensitive banking credentials</div>
            <div>New variants emerged with advanced evasion techniques, rendering them more effective at bypassing modern security measures</div>
          </div>
          <div>
            <div>Crocodilus</div>
            <div>Employs sophisticated tactics such as remote control capabilities, keylogging, overlay attacks to capture user credentials, and the ability to harvest cryptocurrency wallet seed phrases</div>
            <div>Expanded operational reach by targeting users in Poland, Spain, Brazil, Argentina, Indonesia, the US, and India</div>
          </div>
          <div>
            <div>Mispadu (URSA)</div>
            <div>Employs sophisticated infection methods, including spam emails containing malicious PDFs that trigger multi-stage download processes that deploy the Mispadu payload after performing anti-sandbox and anti-virtual machine checks</div>
            <div>Insikt Group created a YARA rule to detect Mispadu after analysis indicated the trojan had targeted several LAC banks</div>
          </div>
          <div>
            <div>Astaroth (Guildma)</div>
            <div>Distribution methods include spearphishing attacks and the use of compromised cloud infrastructure for hosting malicious content. Insikt Group conducted technical static analysis and detection using sigma rules</div>
            <div>Resurfaced with a multi-stage campaign, “STAC3150”, involving WhatsApp session hijacking, credential theft, and persistence on compromised systems</div>
          </div>
          <div>
            <div>SORVEPOTEL</div>
            <div>Targeted Brazil in several campaigns; Insikt Group assesses that at least some SORVEPOTEL operators are likely Portuguese-speaking, based on language artifacts in the panels analyzed and consistent targeting of Brazilian victims; analysis of a notable campaign dubbed “Water Saci” <a href="https://app.recordedfuture.com/portal/research/insikt/doc:_BftJL"></a>indicates WhatsApp Web was used for distribution</div>
            <div>Analysis of the new infrastructure tied to the SORVEPOTEL loader demonstrates that it has distributed Coyote and Maverick</div>
          </div>
          <div>
            <div>Casabaneiro (“Mekotio” and “Metamorfo”)</div>
            <div>Primarily targets financial institutions in LAC, leverages phishing emails that typically contain malicious URLs, which lead to ZIP archives or ISO files with payloads that execute PowerShell scripts designed for obfuscation and evading detection</div>
            <div>Water Saci campaign targeting Brazilian financial platforms via WhatsApp propagation linked to Casbaneiro malware family</div>
          </div>
          <div>
            <div>BBTok</div>
            <div>Distribution methods that trigger infections via LNK files and exhibit advanced capabilities for credential theft and data exfiltration, leveraging techniques such as dynamic-link library (DLL) embedding within downloaded files and the use of legitimate Windows utility commands for evasion</div>
            <div>A new tactic emerged where the primary delivery method was WhatsApp</div>
          </div>
          <div>
            <div>Coyote</div>
            <div>Primarily targets Brazilian users, capable of executing keylogging, capturing screenshots, and displaying phishing overlays to steal sensitive credentials; Coyote’s infrastructure is dynamic and hosted on various platforms, indicating robust evasion techniques by its operators</div>
            <div>Coyote remained active in 2025 and was observed in a WhatsApp-based worm campaign that used self-propagating messages containing malicious ZIP archives that further distributed the malware</div>
          </div>
          <div>
            <div>Herodotus</div>
            <div>Distributed through smishing messages that lure victims into downloading malicious APKs; Herodotus has been observed primarily targeting users in countries like Brazil and Italy</div>
            <div>Insikt Group analyzed a sample, where Herodotus impersonated a security application named “Modulo Seguranca Stone” in a campaign in Brazil</div>
          </div>
        </div>
        <p><em>(Source: Recorded Future)</em></p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_170df75f7415b871f0e4a8ee069a6ce7922d8e7ae.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Panorama del cibercrimen en América Latina y el Caribe]]></title>
            <link>https://www.recordedfuture.com/research/latin-america-and-the-caribbean-cybercrime-landscape-es</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/latin-america-and-the-caribbean-cybercrime-landscape-es</guid>
            <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Este informe ofrece una visión general de las tendencias y desarrollos en el ecosistema cibercriminal de América Latina y el Caribe (LAC) en 2025.]]></description>
            <content:encoded><![CDATA[
        <h2>Resumen ejecutivo</h2>
        <p>Este informe brinda un resumen de las tendencias y los desarrollos en el ecosistema cibercriminal de América Latina y el Caribe (LAC) en 2025. Insikt Group identificó que los actores maliciosos que operan en la región de LAC o que la tienen como objetivo utilizan principalmente aplicaciones cliente-servidor y plataformas de mensajería con cifrado de extremo a extremo como Telegram, así como foros de la dark web y de acceso especial en inglés o ruso, para comunicarse y llevar a cabo sus actividades. Los actores maliciosos demuestran una mayor sofisticación en sus operaciones, ya que adaptan sus tácticas, técnicas y procedimientos (TTP) con el tiempo, pero siguen apoyándose principalmente en métodos tradicionales como el phishing y la ingeniería social, la distribución de malware, y el ransomware. A partir de nuestros análisis, determinamos que Brasil, México y Argentina son los países más atacados por cibercriminales financieros, probablemente porque son las economías más grandes de la región de LAC. Además, a partir de esta investigación, Insikt Group determinó que los actores maliciosos a menudo atacan industrias críticas, como las de salud, finanzas y gobierno, porque poseen datos de alto valor, afrontan urgencias operativas y, a veces, utilizan sistemas antiguos que pueden ser vulnerables.</p>
        <h2>Principales hallazgos</h2>
        <ul>
          <li>Insikt Group estima que el foro criminal DarkForums y la plataforma de mensajería Telegram son los principales medios de acceso especial utilizados por los actores maliciosos que operan en la región LAC o que la tienen como objetivo.</li>
          <li>Los actores maliciosos que operan en la región LAC o que la tienen como objetivo suelen estar impulsados por motivos financieros y, a menudo, utilizan la ingeniería social, el ransomware y diferentes formas de malware móvil para obtener acceso inicial a las instituciones gubernamentales, de salud o financieras.</li>
          <li>En 2025, Insikt Group registró 452 incidentes de ransomware que afectaron la región de LAC. Las cinco principales industrias afectadas fueron las de salud, fabricación, gobierno, tecnología de la información y educación; todas ellas observaron un aumento notable en los ataques en comparación con el año anterior.</li>
          <li>Insikt Group identificó que los actores maliciosos usan troyanos bancarios, especialmente las variantes más establecidas. En particular, estos actores usaron troyanos bancarios en campañas de smishing dirigidas a usuarios de WhatsApp con el objetivo de acceder a datos financieros y robar credenciales.</li>
          <li>Insikt Group identificó a LummaC2 como el ladrón de información (infostealer) más prolífico que afectó a organizaciones de la región LAC en el primer semestre de 2025, y a Vidar en el segundo semestre, tras la intervención de las fuerzas del orden contra LummaC2</li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_170df75f7415b871f0e4a8ee069a6ce7922d8e7ae.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Panorama do cibercrime na América Latina e Caribe]]></title>
            <link>https://www.recordedfuture.com/research/latin-america-and-the-caribbean-cybercrime-landscape-pt</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/latin-america-and-the-caribbean-cybercrime-landscape-pt</guid>
            <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Este relatório oferece uma visão geral das tendências e desenvolvimentos no ecossistema cibercriminoso da América Latina e do Caribe (LAC) em 2025.]]></description>
            <content:encoded><![CDATA[
        <h2>Resumo executivo</h2>
        <p>Este relatório apresenta uma visão geral das tendências e desenvolvimentos no ecossistema do cibercrime na América Latina e Caribe (LAC) em 2025. O Insikt Group descobriu que os agentes de ameaças que operam na região da América Latina e Caribe (LAC) ou que a têm como alvo usam predominantemente aplicações cliente-servidor e plataformas de mensagens criptografadas de ponta a ponta, como o Telegram, bem como a dark web estabelecida em inglês ou russo e fóruns de acesso restrito, para se comunicarem e realizarem atividades. Os agentes de ameaças demonstram crescente sofisticação nas operações, adaptando táticas, técnicas e procedimentos (TTPs) ao longo do tempo, embora ainda dependam principalmente de métodos tradicionais, como phishing e engenharia social, distribuição de malware e ransomware. Com base na nossa análise, determinamos que Brasil, México e Argentina foram os países mais visados por cibercriminosos com motivação financeira, provavelmente por serem as maiores economias da América Latina e Caribe. Além disso, com base nesta pesquisa, o Insikt Group descobriu que os agentes de ameaças frequentemente visavam a setores críticos, como saúde, finanças e governo, pois esses setores detêm dados valiosos, enfrentam urgências operacionais e, às vezes, dependem de sistemas legados que podem ser vulneráveis.</p>
        <h2>Principais descobertas</h2>
        <ul>
          <li>O Insikt Group avalia que o fórum criminoso DarkForums e a plataforma de mensagens Telegram são os principais fóruns de acesso restrito e plataformas de comunicação usados por agentes maliciosos que operam na região da América Latina e Caribe ou que têm essa região como alvo.</li>
          <li>Os agentes de ameaça que operam na América Latina e Caribe (LAC) ou que têm como alvo a região são geralmente motivados por interesses financeiros e frequentemente adotam engenharia social, ransomware e várias formas de malware em aparelhos móveis, a fim de terem acesso inicial a instituições governamentais, financeiras e de saúde.</li>
          <li>Em 2025, o Insikt Group registrou 452 incidentes de ransomware que afetaram a região da América Latina e Caribe. Os cinco setores mais afetados foram saúde, manufatura, governo, tecnologia da informação e educação, que registraram um aumento considerável nos ataques em comparação ao ano anterior.</li>
          <li>O Insikt Group continuou a identificar trojans bancários sendo usados por agentes de ameaças; os mais usados são as variantes já estabelecidas. Especificamente, os agentes maliciosos usaram trojans bancários em campanhas de smishing direcionadas a usuários do WhatsApp para terem acesso a dados financeiros e roubarem credenciais.</li>
          <li>O Insikt Group identificou o LummaC2 como o ladrão de informações (infostealer) mais prolífico, afetando organizações na América Latina e Caribe no primeiro semestre de 2025; e o Vidar no segundo semestre, após a desarticulação das atividades do LummaC2 pelas autoridades policiais.</li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_170df75f7415b871f0e4a8ee069a6ce7922d8e7ae.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Industrialization of the Fraud Ecosystem Blog]]></title>
            <link>https://www.recordedfuture.com/blog/industrialization-of-the-fraud-ecosystem-blog</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/industrialization-of-the-fraud-ecosystem-blog</guid>
            <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Payment fraud has industrialized, and that's a defensive advantage. Learn how standardized attack infrastructure creates detectable patterns that financial institutions can act on before losses occur.]]></description>
            <content:encoded><![CDATA[
        <p>Payment fraud no longer operates as a collection of discrete schemes run by individual threat actors.</p>
        <p>It is increasingly sustained by an industrial support ecosystem: purpose-built infrastructure, packaged toolkits, and professionalized services that allow threat actors to maximize fraud output while minimizing the skill and effort required to execute attacks.<br /><br />According to Recorded Future's <a href="https://go.recordedfuture.com/Payment_Fraud_Intelligence_Report_2025.html">Annual Payment Fraud Intelligence Report: 2025</a>, this industrialization was driven by technical advances and increasingly professionalized support services.</p>
        <p>The Magecart e-skimmer supply chain is the clearest example. Full-stack e-skimmer kits and Malware-as-a-Service (MaaS) offerings have made large-scale compromise of ecommerce websites accessible to less technically capable threat actors.</p>
        <p>The "Sniffer by Fleras" kit, responsible for 26% of all e-skimmer infections observed in 2025, includes a web-based portal for generating malicious scripts and a management server for stolen data. The result was more than 10,500 unique Magecart infections active at some point during the year, likely compromising more than 23 million transactions.</p>
        <p>Additionally, the "AcceptCar" e-skimmer, discovered in H2 2025, illustrates how far the service model has matured. Operators handle installation and operation on compromised e-commerce sites; in return, threat actors pay 50% of proceeds from card data sales or 70% of raw data intake. Using services like AcceptCar, fraud threat actors can participate in large-scale compromise operations without owning or managing any underlying infrastructure.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1cf0554d71b8866a15155b12102ca303275f2a8cd.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="804" />
            </div>
          </div>
          <div>
            <div>Figure 1: Line graph showing Magecart e-skimmer infections in 2025, by different groups, kits, and techniques. (Source: Recorded Future)</div>
          </div>
        </div>
        <p><a href="https://pages.recordedfutureext.com/2025-Purchase-Scams-Report.html?_gl=1*1t58uut*_gcl_au*NTQ0NDYzNDU2LjE3NzI0ODkyMDc.">Purchase scam operations</a> reflect a similar dynamic. <a href="https://www.recordedfuture.com/products/payment-fraud-intelligence">Recorded Future Payment Fraud Intelligence</a> identified more than 3,600 scam merchant accounts in 2025, up 2.5x from 2024, spanning at least 40 countries and 230 acquirers.</p>
        <p>Recurring patterns in merchant registration data indicate that scam operators have standardized their merchant acquisition workflows, standing up fraudulent payment infrastructure at scale through repeatable, low-friction processes.</p>
        <p>Card testing operates on the same service-economy logic. Telegram-based card testing services validated at least 27 million card records in 2025 through public-facing card generation and testing channels that any threat actor can access.</p>
        <p>Among dark web checker services, over 1,350 legitimate merchant accounts were abused for card testing, with 94% not observed prior to 2025, suggesting systematic rotation to stay ahead of detection.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_102beab38154914c05c00b2fffd52e34417ac6a84.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="466" />
            </div>
          </div>
          <div>
            <div>Figure 2: Graphic illustrating the purchase scam attack chain. (Source: Recorded Future)</div>
          </div>
        </div>
        <h2>The Ecosystem Is Concentrated Upstream</h2>
        <p>Notably, each of these industrialized attack vectors sits <a href="https://www.recordedfuture.com/blog/getting-ahead-of-payment-fraud">upstream of the fraudulent transaction</a>. E-skimmer infections and scam merchants compromise card data during online purchases. Card testing validates that stolen data before it’s monetized.</p>
        <div>
          <div>
            <div>
              <p>Fraud outcomes are visible, but the pathways that enable them are often not.</p>
              <p><a href="https://go.recordedfuture.com/Payment_Fraud_Intelligence_Report_2025.html">Annual Payment Fraud Intelligence Report: 2025</a></p>
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <p>"Fraud outcomes are visible, but the pathways that enable them are often not."</p>
        <p>This industrialized scale across these attack vectors requires standardization, and standardization produces detectable patterns.</p>
        <p>When 26% of e-skimmer infections trace back to a single kit, when scam operators reuse merchant registration patterns across hundreds of acquirers, when card testers rotate through predictable BIN attack workflows, the convergence that makes fraud scalable also makes it mappable. As that standardization deepens, a single indicator of compromise reaches further across the threat landscape.</p>
        <p>That standardization creates something concrete: a window.</p>
        <p>Magecart infections are active and identifiable before stolen card data is harvested.<br />Scam merchants often display detectable signals, including recent domain registration, merchant rotation, and merchant category code mismatches.</p>
        <p>Card testing activity reveals when a monetization attempt is likely to occur.</p>
        <p>Each stage represents an opportunity to act before fraud registers as a financial loss.</p>
        <h2>Transaction Monitoring Looks at the Wrong End of the Lifecycle</h2>
        <p>Transaction monitoring and behavioral fraud models are built to detect anomalies at the point of payment, like unusual spend patterns, velocity, and geographic inconsistencies. They do what they were designed to, but provide no visibility into the increasingly industrialized, pre-monetization stages that were built to avoid detection by these traditional processes.</p>
        <p>Purchase scams are explicitly designed to circumvent transaction-based controls by manipulating cardholders into authorizing the fraudulent transaction themselves, making the payment appear legitimate by design.</p>
        <p>Card testers cycle through new merchants specifically because historical tester merchants get flagged (94% of tester merchants identified in 2025 were not previously observed). A detection approach built around transaction signals will always be working with information that arrives after the upstream infrastructure has already done its job.</p>
        <p>As the upstream ecosystem industrializes, the volume of activity that transaction monitoring cannot see has grown. With purchase scam detections more than quadrupling year-over-year and Magecart infections having likely compromised more than 23 million transactions in 2025 alone, the cost of that blind spot compounds.</p>
        <p><strong>Maintaining an effective fraud posture will increasingly require financial institutions to complement reactive account monitoring with proactive, intelligence-informed defenses.</strong></p>
        <h2>How Recorded Future Payment Fraud Intelligence Addresses This</h2>
        <p><a href="https://www.recordedfuture.com/products/payment-fraud-intelligence">Recorded Future Payment Fraud Intelligence</a> monitors each of the upstream stages discussed in this post.</p>
        <p>With daily monitoring of Magecart-infected sites and enriched merchant data that integrates with transaction monitoring, Payment Fraud Intelligence can enable detection of high-risk merchants months before stolen card data appears for sale.<br /><br />Additionally, the Scam Merchants dataset can identify fraudulent merchant accounts and their associated domains before customers are defrauded and before downstream card data reaches criminal markets.</p>
        <p>Tester merchant monitoring surfaces card testing activity as an early signal of which portfolios are being targeted ahead of any monetization attempt.</p>
        <p>Because Payment Fraud Intelligence monitors the sources, kits, and infrastructure that threat actors have increasingly standardized around, a single identified indicator can surface exposure across a portfolio at scale.<br /><br />According to Recorded Future data, 75% of compromised cards are identified before fraud occurs, and 90% of compromised card assets are identified within hours of a breach.</p>
        <p>The pre-monetization window will not narrow as the fraud ecosystem matures — if anything, the report's data suggests it will widen as standardization deepens. Financial institutions with visibility into that window can act before losses occur. Those without it will continue to respond after the fact.</p>
        <p>Read <em>the full</em> <a href="https://go.recordedfuture.com/Payment_Fraud_Intelligence_Report_2025.html">Annual Payment Fraud Intelligence Report: 2025</a> to explore this year's findings in depth.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_153cda5c0105b1bf45066ca44c92e63fe63172790.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[The Shift: An Era of Quantum Geopolitics]]></title>
            <link>https://www.recordedfuture.com/blog/the-shift-an-era-of-quantum-geopolitics</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/the-shift-an-era-of-quantum-geopolitics</guid>
            <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[The expanding conflict around Iran signals a deeper shift. We have entered an era of quantum geopolitics, where the old rules of the international order no longer apply]]></description>
            <content:encoded><![CDATA[
        <p>The expanding conflict around Iran signals a deeper shift. We have entered an era of <strong>quantum geopolitics</strong>, where the old rules of the international order no longer apply. What began as a regional confrontation is already reshaping global markets, supply chains, and corporate security planning. Leaders must adapt how they think, spend, and communicate in a system where uncertainty is not a risk to manage—it is the operating environment itself.</p>
        <h2><strong>What is Quantum Geopolitics?</strong></h2>
        <p>A useful analogy comes from physics.<br /><br />Classical systems produce predictable outcomes. Quantum systems behave probabilistically, where interactions in one place can produce distant effects.</p>
        <p>International politics increasingly resembles the latter.<br /><br />The assumptions that shaped corporate strategy for decades—durable alliances, expanding globalization, and broadly coherent regulation—are weakening. Geopolitical shocks now move rapidly through tightly interconnected systems.</p>
        <p>Four dynamics define how this system now behaves.</p>
        <p>🌓 <strong>Superposition: Friends, Rivals, and Everything in Between</strong></p>
        <p>Countries can no longer be neatly categorised “ally” or “adversary.” They exist in overlapping states, with true alignment revealed only in moments of crisis.</p>
        <p>States balance security partnerships with the West while maintaining economic ties with rivals. Turkey <a href="https://carnegieendowment.org/europe/strategic-europe/2025/11/turkey-stakes-its-claim-in-the-ukraine-peace-process">supports</a> Ukraine diplomatically while <a href="https://turkishminute.com/2025/09/09/turkey-has-become-russias-second-largest-trading-partner-minister-says/">sustaining</a> trade flows that benefit Russia. India <a href="https://www.whitehouse.gov/briefings-statements/2025/02/united-states-india-joint-leaders-statement/">deepens</a> defence ties with the United States even as it increases purchases of Russian oil.</p>
        <p>Public statements offer limited guidance. Trade flows, enforcement patterns, and technology controls are more reliable indicators of intent.</p>
        <p>For multinational firms, geopolitical positioning is no longer fixed. It is fluid.</p>
        <p>🌀 <strong>The End of Guarantees: Promises Now Come with Caveats</strong></p>
        <p>Security commitments, trade access, and regulatory stability have shifted from certainties to probabilities.</p>
        <p>Export controls can reroute supply chains within months. Sanctions regimes expand or unwind quickly. Even long-standing alliances depend on political will at the moment they are tested.</p>
        <p>For businesses, this means long-term investments now carry elevated policy risk.</p>
        <p>Leaders must plan for variance.</p>
        <p>🧬 <strong>Quantum Entanglement: Local Conflicts Are Not Local</strong></p>
        <p>Global systems—financial, technological, logistical—are tightly coupled. Regional conflicts now generate immediate global effects.</p>
        <p>Threats to Gulf commercial hubs <a href="https://www.thebanker.com/content/c0847003-aa2d-4c4a-92ae-e8714a5f6bb2">disrupt</a> international banking. Instability in the Strait of Hormuz <a href="https://www.orfonline.org/english/expert-speak/the-global-costs-of-instability-in-the-strait-of-hormuz">drives</a> energy price volatility and <a href="https://www.insurancejournal.com/news/international/2026/03/17/862173.htm">strains</a> global shipping insurance. Cyber <a href="https://www.recordedfuture.com/blog/the-iran-war-what-you-need-to-know">campaigns</a> tied to the conflict target companies far beyond the region.</p>
        <p>Disruption is rarely contained. Risk can no longer be managed by geography or function alone.</p>
        <p>🔬 The Observer Effect: Whoever Sets the Rules First Wins</p>
        <p>Influence increasingly derives from shaping rules rather than operating within them.</p>
        <p>States that move early to establish standards in artificial intelligence, semiconductors, digital infrastructure, and financial regulation compel others to adapt.</p>
        <p>Waiting for clarity can therefore be a strategic liability in itself.<br />If you do not shape the agenda, you become subject to it.</p>
        <h2><strong>Why This Moment Feels Different</strong></h2>
        <p>These dynamics are most visible in cyberspace, where geopolitical competition unfolds continuously below the threshold of open conflict.</p>
        <p>State-sponsored actors operate inside corporate networks without triggering overt confrontation. Criminal groups, proxies, and intelligence services overlap, complicating attribution and response.</p>
        <p>The boundary between geopolitical conflict and corporate exposure is now thin. A single breach can trigger regulatory scrutiny, customer loss, market volatility, and diplomatic tension at once.</p>
        <p>Cybersecurity is no longer a technical function. It is a core enterprise risk.</p>
        <h2><br /><strong>How Security Leaders Should Respond</strong></h2>
        <p>In a system governed by probabilities rather than predictability, security leaders must adapt how they think, allocate resources, and position their organizations.</p>
        <p>1. <strong>Mindset Shift: Scenarios, Not Forecasts</strong></p>
        <p>Replace long planning horizons and static risk assessments with continuous scenario planning. Tools such as the <a href="https://prescient2050.com/the-cone-of-plausibility-can-assist-your-strategic-planning-process/">Cone of Plausibility</a> can stress-test responses to sanctions escalation, maritime disruption, regulatory fragmentation, or supply chain shocks.<br /><br />Evaluate decision speed, cross-functional coordination, and response thresholds under pressure.<br />Adaptability matters more than accuracy.</p>
        <p>2. <strong>Spending Shift: Invest in Resilience, Not Just Efficiency</strong></p>
        <p>Systems optimized solely for efficiency often lack resilience.</p>
        <p>Diversifying suppliers, strengthening sanctions compliance, improving cybersecurity, and increasing visibility into third-party exposure can reduce vulnerability to geopolitical shocks.</p>
        <p>Resilience is not a defensive expense; it is operational insurance.</p>
        <p>3. <strong>Communication Shift: From Reporting to Action</strong></p>
        <p>Security leaders must translate geopolitical developments into clear decision frameworks before crises materialize.</p>
        <p>This requires close coordination across legal, finance, and operations, as well as proactive engagement with regulators and industry partners.</p>
        <p>Speed and clarity determine whether the organization shapes outcomes or reacts to them.</p>
        <h2><strong>Final Thoughts</strong></h2>
        <p>The Iran conflict offers a preview of what comes next. Alliances are conditional. Economic pressure, cyber activity, and regulatory responses unfold simultaneously.</p>
        <p>Quantum geopolitics does not eliminate strategy. It demands a different kind—one built on scenario readiness, structural resilience, and faster decision cycles.</p>
        <p>Leaders who wait for clarity will move too late.</p>
        <p>Those who organize for uncertainty will operate ahead of it.</p>
        <p><strong>To access the latest Insikt</strong> <strong>Group®</strong> <strong>research</strong> <a href="https://www.recordedfuture.com/research/insikt-group">click here</a>.</p>
        <p><em><a href="https://www.recordedfuture.com/research/insikt-group">Insikt Group®</a></em> <em>helps Recorded Future secure our world with threat intelligence. With deep experience in government, law enforcement, military, and intelligence agencies, we power the Recorded Future Platform with analyst-validated data, analytics, along with cyber and geopolitical intelligence. This enables our customers to reduce risk and prevent disruption.</em></p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_100c2720c5cfd6aa24faaccb21a0f62fb9d70448e.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[ClickFix Campaigns Targeting Windows and macOS]]></title>
            <link>https://www.recordedfuture.com/research/clickfix-campaigns-targeting-windows-and-macos</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/clickfix-campaigns-targeting-windows-and-macos</guid>
            <pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Insikt Group reveals five ClickFix social engineering clusters (QuickBooks, Booking.com, Birdeye) targeting Windows and macOS. Learn how threat actors exploit native system tools with malicious, obfuscated commands to gain initial access, and get key mitigations for defense]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Insikt Group identified five distinct clusters leveraging the ClickFix social engineering technique to facilitate initial access to host systems. Observed since at least May 2024, these clusters include those impersonating financial application Intuit QuickBooks and the travel agency Booking.com. Insikt Group leveraged the Recorded Future® HTML Content Analysis dataset, which enables systematic monitoring of embedded web artifacts to identify and track new malicious domains and infrastructure.</p>
        <p>The clusters demonstrate significant operational variance in lure themes and infrastructure patterns, and highlight the technique's evolution, moving past simple verification by visually fooling victims with various fake challenges and demonstrating technical sophistication through operating system detection to tailor execution chains. Despite these structural differences, its operation is largely the same, showing that ClickFix’s core techniques work across platforms and only the social engineering lure needs to be adapted to the victim. Threat actors manipulate victims into executing malicious, obfuscated commands directly within native system tools like the Windows Run dialog box or macOS Terminal.</p>
        <p>This living-off-the-land (LotL) approach allows malicious scripts to execute in-memory, effectively bypassing traditional browser security and endpoint controls. Parallel clusters targeting sectors as diverse as accounting, real estate, and legal services indicates that ClickFix has transitioned into a standardized, high-ROI template for both cybercriminal and potentially advanced persistent threat (APT) groups.</p>
        <p>To protect against these threats, security defenders should move beyond simple indicator blocking and prioritize aggressive behavioral hardening. Key recommendations include disabling the Windows Run dialog box via Group Policy Objects (GPO), implementing PowerShell Constrained Language Mode (CLM), and operationalizing Digital Risk Prevention tools such as Recorded Future's Malicious Websites to identify and mitigate threats to your digital assets.</p>
        <p>Based on increasing use since 2024, Insikt Group assesses that the ClickFix methodology will very likely remain a primary initial access vector throughout 2026 as threat actors continue to social engineer victims to enable exploitation. Looking ahead, Insikt Group anticipates ClickFix lures will become increasingly technically adaptive, incorporating more selective browser fingerprinting, while continuing to use infrastructure that can be built and dismantled quickly. In addition to technical refinements, Insikt Group predicts that the social engineering component will continue to evolve, leveraging new techniques to lure victims into executing malicious commands.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Insikt Group identified and tracked five distinct ClickFix activity clusters exhibiting significant operational variance in lure themes and infrastructure patterns despite a shared reliance on fraudulent human-verification lures. This indicates that the ClickFix methodology has transitioned into a standardized, high-ROI template adopted across a fragmented ecosystem of threat actors.</li>
          <li>While visually diverse, all analyzed clusters use a consistent execution framework that bypasses traditional browser security controls by shifting the point of exploitation to user-assisted manual commands. These campaigns target a wide variety of sectors, including accounting (QuickBooks), travel (Booking.com), and system optimization (macOS).</li>
          <li>ClickFix technical execution follows a standardized four-stage pattern: input of highly encoded or fragmented strings, native execution via legitimate system shells living-off-the-land binaries (LOLBins), remote ingress from threat actor-controlled infrastructure, and immediate in-memory execution. This methodology allows threat actors to stage and run remote code with limited and short-lived forensic artifacts on the host system.</li>
        </ul>
        <h2>Background</h2>
        <p>First <a href="https://www.todyl.com/blog/clickfix-evolution-copy-paste-social-engineering">documented</a> in late 2023, ClickFix has transitioned from a niche social engineering tactic to a cornerstone of the global cybercriminal ecosystem. ClickFix is a social engineering methodology that <a href="https://www.group-ib.com/blog/clickfix-the-social-engineering-technique-hackers-use-to-manipulate-victims/">lures</a> victims into manually executing malicious commands by masquerading as a <a href="https://www.darktrace.com/blog/unpacking-clickfix-darktraces-detection-of-a-prolific-social-engineering-tactic">necessary technical</a> resolution for fabricated system errors or human-verification prompts. This technique represents an evolutionary shift from the FakeUpdates (SocGholish) <a href="https://www.proofpoint.com/uk/blog/threat-insight/part-1-socgholish-very-real-threat-very-fake-update">model</a>, prioritizing manual user intervention to <a href="https://www.bitdefender.com/en-gb/blog/businessinsights/how-clickfix-cyberattack-technique-works?srsltid=AfmBOorcXXl_4BqrPLnwcNkY6CwC40PfEMhP6qzfszoh65C9Ko4teVBE">evade</a> the increasingly robust security features of modern web browsers and automated endpoint detection systems. In this context, the methodology embodies a "think smart, not hard" approach. The simplicity of relying on a manual user action makes it a potent defensive evasion tactic: bypassing typical browser-based security makes it difficult to detect, while the high number of threat actors using it makes it difficult to track across a fragmented threat landscape.</p>
        <p>The technical core of the methodology relies primarily on pastejacking, where background JavaScript <a href="https://www.truesec.com/hub/blog/threat-actors-paste-jacking-remote-code-execution">populates</a> a victim's clipboard with an obfuscated command while they are <a href="https://www.bleepingcomputer.com/news/security/inside-a-real-clickfix-attack-how-this-social-engineering-hack-unfolds/">distracted</a> by visual lures such as fraudulent reCAPTCHA or Cloudflare Turnstile overlays. In some instances, malicious commands are not automatically pasted into the victim’s clipboard, but rather, victims are manipulated into copying and running the command manually. By leveraging a living-off-the-land (LotL) approach, threat actors manipulate users into <a href="https://unit42.paloaltonetworks.com/preventing-clickfix-attack-vector/">executing</a> these commands directly within trusted system tools like the Windows Run dialog box, PowerShell, or the macOS Terminal. This user-assisted execution <a href="https://www.microsoft.com/en-us/security/blog/2025/08/21/think-before-you-clickfix-analyzing-the-clickfix-social-engineering-technique/">allows</a> malicious scripts to execute silently and bypass traditional browser and endpoint security perimeters.</p>
        <p>ClickFix has been weaponized by a diverse spectrum of threat actors, ranging from high-volume initial access brokers (IABs) to <a href="https://www.securityweek.com/clickfix-widely-adopted-by-cybercriminals-apt-groups/#:~:text=All%20variations%20work%20in%20a,distribution%20of%20the%20XWorm%20RAT.">sophisticated state-sponsored</a> groups such as BlueDelta (aka <a href="https://cert.gov.ua/article/6281123">APT28</a>) and the <a href="https://www.infosecurity-magazine.com/news/clickfake-interview-campaign/">North Korean</a> group PurpleBravo. The <a href="https://socradar.io/blog/clickfix-filefix-copy-paste-top-social-engineering/">methodology</a> enables a repeatable and scalable delivery framework capable of deploying a wide variety of secondary payloads, including infostealers like Lumma Stealer and Vidar, or remote access trojans (RATs) such as NetSupport RAT and Odyssey Stealer. These <a href="https://netlas.io/blog/fake_prompts/">operations</a> are frequently supported by highly adaptive, disposable infrastructure designed to maintain operational continuity even as individual domains are identified and blocked.</p>
        <h2>Technical Analysis</h2>
        <p>Insikt Group identified and tracked five emerging ClickFix clusters by leveraging the Recorded Future HTML Content Analysis dataset, which enables the systematic monitoring of embedded web artifacts. By pivoting on unique technical identifiers, including specific Document Object Model (DOM) hashes, hard-coded image source tags, and unique page titles, Insikt Group mapped ClickFix’s infrastructure and identified new malicious domains and infrastructure, facilitating the discovery of active domains and near real-time monitoring of cluster evolution.</p>
        <p>Across the analyzed clusters, Insikt Group detailed the ClickFix commands victims were manipulated into executing on their systems. These commands relied heavily on LOLBins to achieve operational goals. By using LOLBins, threat actors leveraged native, legitimately signed executables to download malicious payloads to a victim's machine. Depending on the security implementation of personal machines or corporate endpoints, this methodology can effectively evade standard detections and foundational security principles.</p>
        <h2>ClickFix Clusters</h2>
        <p>Insikt Group identified five clusters (see Figure 1) that exhibited significant operational variance despite a shared reliance on the ClickFix social engineering technique. These clusters were defined by their infrastructure patterns and targeting approaches, ranging from logistics-themed lures to dual-platform selection logic. This indicates that the ClickFix methodology is being deployed across a fragmented ecosystem of threat actors, each tailoring the technique to suit their own delivery requirements and victim profiles.</p>
        <p>These clusters were grouped based on observable patterns in infrastructure reuse, lure formatting, platform targeting, and operational adjustments over time. While core technical elements and delivery mechanisms overlap, each cluster maintained a distinct footprint within the broader landscape. Insikt Group categorized the activity into the following five clusters:</p>
        <ul>
          <li><strong>Intuit QuickBooks:</strong> Targeted impersonation of accounting software, often leveraging aged domains to bypass security filters</li>
          <li><strong>Booking.com:</strong> Used fraudulent domains to present fake verification portals</li>
          <li><strong>Birdeye:</strong> A large-scale cluster that lures users of the AI marketing company Birdeye by spoofing domains and manipulating victims to use a malicious command to deliver NetSupport RAT.</li>
          <li><strong>Dual-Platform Selection:</strong> Used operating system detection to deliver platform-tailored lures and malware</li>
          <li><strong>macOS Storage Cleaning:</strong> Used counterfeit prompts mimicking macOS system optimization to trick users into executing encoded terminal commands</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_150aa308107dfdb116e75074b6d2fe2a56e876ba8.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1129" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1</strong>: Overview of ClickFix and associated clusters (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Cluster 1: Intuit QuickBooks</h2>
        <p>Cluster 1 was observed operating from January 2026 to the time of writing, primarily targeting organizations through social engineering lures impersonating the accounting software Intuit QuickBooks. QuickBooks is widely used for tax preparation in the United States; given the campaign's active window coincides with the US tax season (typically January through April 15), Insikt Group assesses with moderate confidence that the timing was a calculated effort to target entities engaged in financial reporting. Although this cluster recently pivoted to targeting users of the US real estate marketplace Zillow, QuickBooks-related artifacts and brand-specific imagery remain deeply embedded throughout the Document Object Model (DOM) of the malicious landing pages.</p>
        <h3>Cluster 1 Profile</h3>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1afae411ae78063da81d0b8523c7a456001ecf471.png?width=750&amp;format=png&amp;optimize=medium" width="1522" height="1162" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2</strong>: Overview of ClickFix Cluster 1 — Intuit QuickBooks (Source: Recorded Future)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_16f899c13b76a95cab5142d9de36b9e832cf66f63.png?width=750&amp;format=png&amp;optimize=medium" width="1522" height="758" />
            </div>
          </div>
          <div>
            <div><em><strong>Table 1:</strong></em> <em>PowerShell commands observed across Cluster 1</em></div>
          </div>
        </div>
        <h3><em>Cluster 1 Infection Chain</em></h3>
        <p>The infection chain begins when a victim lands on a ClickFix landing page. The page presents a fraudulent human-verification interface (see <strong>Figure 3</strong>) that instructs the victim to complete specific "verification" steps.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1953657b4363956e75250f0c155e1224d5e030c22.png?width=750&amp;format=png&amp;optimize=medium" width="1351" height="878" />
            </div>
          </div>
          <div>
            <div><strong>Figure 3</strong>: Intuit QuickBooks-themed ClickFix page (Source: Recorded Future Web Scans)</div>
          </div>
        </div>
        <p>By interacting with the page, the victim unknowingly copies a malicious command to their system clipboard. The technique often results in execution through native system utilities, such as Windows Run dialog and PowerShell, leveraging LOLBins to evade traditional browser and endpoint-based security controls.</p>
        <p>Upon pasting the command, an obfuscated PowerShell script (Figure 4) executes in a hidden window. This stager uses self-referential function names to dynamically construct and invoke <code>Invoke-RestMethod</code> to the domain nobovcs[.]com.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_15ac4061a037d6d798b97174406beabefc69fc35d.png?width=750&amp;format=png&amp;optimize=medium" width="1508" height="292" />
            </div>
          </div>
          <div>
            <div><strong>Figure 4</strong>: Obfuscated PowerShell command executed in a hidden window, dynamically reconstructing and invoking code via iex (Source: Recorded Future)</div>
          </div>
        </div>
        <p>This request triggers the retrieval of a short PowerShell stager (see <strong>Figure 5</strong>) that downloads a second-stage payload,<code> bibi.php</code>, saving it to the <code>%TEMP%</code> directory as script.ps1. This stager is the initial execution step that kicks off the NetSupport RAT installation.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1dfacfa2916f08dad6926c4489f4289563aee07c2.png?width=750&amp;format=png&amp;optimize=medium" width="1508" height="626" />
            </div>
          </div>
          <div>
            <div><strong>Figure 5:</strong> Stager script to download second-stage script, bibi.php (Source: Recorded Future)</div>
          </div>
        </div>
        <p>The <code>bibi.php</code> script is essential for the final deployment phase and for obfuscating on-disk artifacts. It contains a function called <code>Get-RomanticName</code>, which selects and combines strings from a thematic wordlist, including terms such as "Heart", "Soul", and "Desire", to generate a randomized folder name under <code>%LOCALAPPDATA%</code>, where the staging files are placed.</p>
        <p>The script retrieves four primary files from <em>nobovcs[.]com,</em> detailed in Table 2.</p>
        <div>
          <div>
            <div><strong>Filename</strong></div>
            <div><strong>SHA-256</strong></div>
          </div>
          <div>
            <div>at.7z</div>
            <div>c0af6e9d848ada3839811bf33eeb982e6c207e4c40010418e0185283cd5cff50</div>
          </div>
          <div>
            <div>lnk.7z</div>
            <div>5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db</div>
          </div>
          <div>
            <div>7z.exe</div>
            <div>43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87</div>
          </div>
          <div>
            <div>7z.dll</div>
            <div>b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c</div>
          </div>
        </div>
        <p><em><strong>Table 2:</strong></em> <em>Filenames and SHA256 hashes of the files downloaded from</em> nobovcs[.]com <em>(Source: Recorded Future)</em></p>
        <p>The script uses <code>7z.exe</code> to extract <code>at.7z</code> (protected by the password “pppp”), which contains the NetSupport RAT binary, <code>neservice.exe</code>. Persistence is established by hijacking Startup shortcuts; if no existing shortcut is detected, the script extracts <code>lnk.7z</code> to the Startup folder to ensure the payload launches automatically upon system reboot.</p>
        <p>Following successful execution, the binary <code>neservice.exe</code> performs an HTTP GET request to <em>gologpoint[.]com</em> to initiate command-and-control (C2) communications. <em>gologpoint[.]com</em> resolves to the IP address <em>62[.]164[.]177[.]230</em>.</p>
        <h2>Cluster 2: Booking.com</h2>
        <p>Cluster 2 was observed operating from February 2026 to the time of writing, impersonating the travel agency Booking.com. Insikt Group tracked the cluster by pivoting on a unique DOM hash made possible by the threat actor’s repeated use of a unique HTML title and consistent image files. Indicators of compromise (IoCs) tagged in this cluster can be seen in the Recorded Future HTML Content Analysis. The landing pages for this cluster use a counterfeit reCAPTCHA v2 challenge, requiring victims to select all photos containing a "bucket" (<strong>Figure 6</strong>). Insikt Group observed that the same challenge photos are presented in the same order across all analyzed pages.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_188f4bdaf603c790d3c24ab3fb11342099dff27c7.png?width=750&amp;format=png&amp;optimize=medium" width="1298" height="728" />
        </p>
        <h3>Cluster 2 Profile</h3>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_15fb5ca7c219bf306c0b154c98992ceec8bb83113.png?width=750&amp;format=png&amp;optimize=medium" width="1508" height="954" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 7</strong>: Overview of ClickFix Cluster 2 — Booking.com (Source: Recorded Future)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_113c8926c6e60fa47227578a7bdacee4e10079a96.png?width=750&amp;format=png&amp;optimize=medium" width="1458" height="246" />
            </div>
          </div>
          <div>
            <div><em><strong>Table 3:</strong></em> <em>PowerShell commands observed across Cluster 2</em></div>
          </div>
        </div>
        <h3>Cluster 2 Infection Chain</h3>
        <p>The process begins when a victim interacts with the fake challenge. Upon completing the challenge, the victim is redirected to a verification page where a malicious PowerShell command (<strong>see Figure 8</strong>) is copied to the system clipboard. Instructions on the verification page manipulate the victim into opening the Windows Run dialog box and entering the command. Executing this malicious command starts the infection chain for NetSupport RAT.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_142f6e6aeed187e29123ff2cddd49f883ba4586be.png?width=750&amp;format=png&amp;optimize=medium" width="1494" height="322" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 8:</strong></em> <em>Command from the booking campaign that reaches out to the payload server (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>The PowerShell command provided in <code>script.ps1</code> (see <strong>Figure 9</strong>) executes with the <code>-NoProfile</code> and <code>-ExecutionPolicy Bypass</code> flags to evade standard logging and security restrictions. Following execution, the system pulls four staging files to a directory named <code>DesireSpark Serenade</code>. This directory naming convention is functionally identical to the "romantic" naming methodology observed in Cluster 1.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1466ddd2b2d192abf84da2039c64f98b9ca8c3d15.png?width=750&amp;format=png&amp;optimize=medium" width="1510" height="770" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 9</strong>: DOM file from</em> checkpulse[.]com <em>that details the command to be run on the victim machine, suppressing the protections normally in place to pull down the PowerShell command and execute it (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>The primary staging mechanism relies on <code>script.ps1</code> to pull secondary payloads from the staging server. In one analyzed instance, scripts originating from <em>thestayreserve[.]</em>com reached out to <em>checkpulses[.]</em>com to retrieve the files detailed in <strong>Table 4.</strong></p>
        <div>
          <div>
            <div><strong>Filename</strong></div>
            <div><strong>SHA-256</strong></div>
          </div>
          <div>
            <div>at.7z</div>
            <div>397dcea810f733494dbe307c91286d08f87f64aebbee787706fe6561ed3e20f8</div>
          </div>
          <div>
            <div>lnk.7z</div>
            <div>5d821db386c7c879caeabf3e9f94c94a48eec6ec5a3a0efbae9d69da3f52c1db</div>
          </div>
          <div>
            <div>7z.exe</div>
            <div>43907e54cf3d1258f695d1112759b5457576481072cc76a679b8477cfeb3db87</div>
          </div>
          <div>
            <div>7z.dll</div>
            <div>b17c3e4058aacdcc36b18858d128d6b3058e0ea607a4dc59eb95b18b7c6acc7c</div>
          </div>
        </div>
        <p><em><strong>Table 4:</strong></em> <em>Filenames and SHA256 hashes of the files downloaded from</em> checkpulses[.]com <em>(Source: Recorded Future)</em></p>
        <p>The <code>7z.exe</code> utility is used to extract <code>at.7z</code>, which contains the NetSupport RAT binary <code>neservice.exe</code>. Persistence is established by adding a link to the system Startup folder.</p>
        <p>The domains observed across this cluster use a similar PowerShell command pattern. However, once the command is executed, the infection chain varies slightly with the staging infrastructure being called. In the cases of <em>sign-in-op-token[.]com</em> and the <em>thestayreserve[.]com</em> domains, the malicious command is identical in terms of pattern and organization, but the hard-coded dropper domain is <em>bkng-updt[.]com</em> and <em>checkpulses[.]com</em>, respectively.</p>
        <p>While staging domains vary, the final payloads across this cluster converge on the same NetSupport RAT C2 infrastructure (<strong>Table 5</strong>).</p>
        <div>
          <div>
            <div><strong>Click Fix Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>Dropper</strong></div>
            <div><strong>NetSupport RAT C2</strong></div>
          </div>
          <div>
            <div>sign-in-op-token[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>
              <p>bkng-updt[.]com</p>
              <p>77[.]91[.]65[.]144</p>
            </div>
            <div>
              <p>hotelupdatesys[.]com</p>
              <p>152[.]89[.]244[.]70</p>
            </div>
          </div>
          <div>
            <div>thestayreserve[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>
              <p>checkpulses[.]com</p>
              <p>77[.]91[.]65[.]31</p>
            </div>
            <div>
              <p>chrm-srv[.]com</p>
              <p>ms-scedg[.]com</p>
              <p>152[.]89[.]244[.]70</p>
            </div>
          </div>
        </div>
        <p><em><strong>Table 5:</strong></em> <em>IoCs observed in the Booking.com infection chain (Source: Recorded Future)</em></p>
        <p>Following installation, the malware from <em>thestayreserve[.]com</em> initiates communication (<strong>Figure 10</strong>) with <em>chrm-srv[.]com</em> and <em>ms-scedg[.]com</em>, both of which resolve to <em>152[.]89[.]244[.]70</em>. The domain <em>hotelupdatesys[.]com</em> , resolves to the same IP address as the NetSupport RAT C2 for <em>sign-in-op-token[.]com</em>.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_17e4c38a5fc2867dd56076e5a5fdbcf434b8ad6fe.png?width=750&amp;format=png&amp;optimize=medium" width="1466" height="772" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 10:</strong></em> <em>POST Request from</em> sign-in-op-token[.]com <em>showing NetSupport interaction (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Cluster 3: Birdeye</h2>
        <p>Cluster 3 was observed operating from May 2024 until the time of writing. Previously reported on by Insikt Group, this cluster uses infrastructure centered on domains incorporating the keyword "bird" to deliver its ClickFix lure pages, trackable in Recorded Future’s HTML Content Analysis. These lures spoof Birdeye, an AI marketing company, to manipulate victims into executing malicious commands.</p>
        <h3>Cluster 3 Profile</h3>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1df156ae60dfd2e6c4b1d3a2ee033c7eae94c5c25.png?width=750&amp;format=png&amp;optimize=medium" width="1480" height="1042" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 11</strong>: Overview of ClickFix Cluster 3 — Birdeye (Source: Recorded Future)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_152cb9c63c01bb7c8a4abb2cfff959cd1e5dfe5a1.png?width=750&amp;format=png&amp;optimize=medium" width="1476" height="240" />
            </div>
          </div>
          <div>
            <div><em><strong>Table 6:</strong></em> <em>PowerShell command observed across Cluster 3</em></div>
          </div>
        </div>
        <h3>Cluster 3 Infection Chain</h3>
        <p>The infection chain begins when a victim visits a compromised site and is presented with a Cloudflare-style CAPTCHA challenge. Upon interacting with the page, the victim is prompted to run a command in the Windows Run dialog box. Insikt Group identified this cluster by pivoting on unique technical identifiers within the HTML artifacts, including a consistent and unique page title and a static image used across the infrastructure.</p>
        <p>The command the victim is manipulated into running causes the victim’s device to reach out to <em>alababababa[.]cloud</em> to download a payload from <em>hxxps[://]alababababa[.]cloud/cVGvQio6[.]txt.</em> To further reduce suspicion, once the malicious command is executed, the victim is redirected to the legitimate <em>birdeye.com</em> website (see <strong>Figure 12)</strong>.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_19de0a1b7b9ff9d5e6f1ef0dc991bd6180c38a92f.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 12:</strong></em> <em>The redirect to the legitimate Birdeye website (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Analysis of the JavaScript within the DOM for this cluster, provided in <strong>Appendix F,</strong> revealed insights into the threat actor's methods. A notable portion of the script uses seven obfuscated lines that are concatenated into a single string to be attached to the victim's clipboard. The developer left comments within the code that detail the deobfuscated purpose of each line. For example, one comment explicitly identifies the portion of the command calling PowerShell with specific flags (<strong>Figure 13</strong>).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_174bbc4877775d467b17148e38520931ee756c7d2.png?width=750&amp;format=png&amp;optimize=medium" width="1476" height="136" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 13:</strong></em> <em>Portion of JavaScript containing threat actor comments (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Furthermore, a comment written in Cyrillic at the beginning of the script translates to, "This should help bypass Cloudflare static analysis". This internal documentation suggests the threat actor is purposefully detailing their actions to refine bypass techniques against security scanners.</p>
        <p>Historically, <em>alababababa[.]cloud</em> has been <a href="https://dti.domaintools.com/securitysnacks/hunting-for-malware-networks">associated</a> with the delivery of multiple malware strains, including Lumma Stealer and RedLine Stealer. The large volume of domains identified in this cluster, exceeding 40 unique entries, highlights the scale of the "run and repeat" model used to sustain this activity.</p>
        <h2>Cluster 4: Dual-Platform Selection</h2>
        <p>Cluster 4 was observed operating from March 2025 to the time of writing. This cluster is unique for its use of operating system detection to deliver tailored ClickFix lures for both Windows and macOS users. Unlike standard ClickFix behavior that typically pushes commands to the clipboard automatically, this variant provides detailed manual instructions, requiring the victim to open native system tools and manually copy and paste the provided staging payload. One of the ClickFix pages used to analyze this behavior was <em>macosapp-apple[.]com</em>, hosted at IP address <em>45[.]144[.]233[.]192.</em></p>
        <h3>Cluster 4 Profile</h3>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_133d418b6a1811ed5c4ec6a91a5ad4948c6fd5d05.png?width=750&amp;format=png&amp;optimize=medium" width="1476" height="1224" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 14</strong>: Overview of ClickFix Cluster 4 — Dual-Platform Selection (Source: Recorded Future)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1355d223dd69035a45bcc034a66983b44f5504547.png?width=750&amp;format=png&amp;optimize=medium" width="1476" height="532" />
            </div>
          </div>
          <div>
            <div><em><strong>Table 7:</strong></em> <em>Encoded commands observed across Cluster 4</em></div>
          </div>
        </div>
        <h3>Cluster 4 Infection Chain</h3>
        <p>The infection chain begins when a victim lands on a ClickFix page that instructs them to verify they are human (<strong>Figure 15</strong>).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1dd0aad9b15938b48669c9aa30af7cce46081babb.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 15</strong>: ClickFix page identified in Cluster 4 (Source: Recorded Future Web Scans)</em></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1da0a662a297a2130b487e627394bbe8e6a250860.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 23</strong>: Landing page for</em> mac-os-helper[.]com <em>(Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Once the Terminal is open, the victim is prompted to execute a multi-stage command that purportedly "finds and removes temporary system files".</p>
        <p>In reality, these commands (see <strong>Table 9</strong>) use different encoding layers to hide their true intent; the first example decodes a hexadecimal string to reveal a Base64-encoded client URL (curl) instruction, while the second directly decodes a Base64 string to run an executable command. Both methods ultimately bypass simple pattern matching by obfuscating the malicious payload until execution.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a8a940b22efe1a0138ad299b1a137a4f5fec5441.png?width=750&amp;format=png&amp;optimize=medium" width="1486" height="396" />
            </div>
          </div>
          <div>
            <div><em><strong>Table 9</strong>: Encoded and obfuscated ClickFix commands for macOS (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>As shown in <strong>Table 10</strong>, the revealed curl instruction uses a compound set of arguments, in this cluster, <code>-kfsSL</code>, to facilitate silent delivery. These flags ensure that Transport Layer Security (TLS) certificate checks are bypassed, server-side errors are suppressed, and the process remains hidden from the user's view while following redirections to reach the final payload domain.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1455f0d1912baf993ed061038c5191b4538089d06.png?width=750&amp;format=png&amp;optimize=medium" width="1486" height="258" />
            </div>
          </div>
          <div>
            <div><em><strong>Table 10:</strong></em> <em>Decoded and deobfuscated ClickFix commands for macOS (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>Based on historic evidence (<a href="https://threatfox.abuse.ch/ioc/1748676/">1</a>, <a href="https://threatfox.abuse.ch/ioc/1743300/">2</a>) and forensic patterns, Insikt Group assesses with high confidence that the information stealer MacSync was the primary payload used to infect victims in this cluster. The malicious commands on these pages caused the infected systems to reach out to a specific set of staging and C2 infrastructure, detailed in <strong>Table 11</strong>. Notably, while the domains varied, they were frequently observed behind Cloudflare to complicate network-level blocking.</p>
        <div>
          <div>
            <div><strong>Indicator</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>octopox[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2026-02-06</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>joeyapple[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2026-02-04</div>
            <div>2026-03-05</div>
          </div>
        </div>
        <p><em><strong>Table 11</strong>: C2 servers identified for the macOS cleaner campaign (Source: Recorded Future)</em></p>
        <h2>Copy Command Analysis</h2>
        <p>Insikt Group analyzed commands across the five clusters identified in this research. While the visual lures and impersonated brands vary between groups like Cluster 1 (Intuit QuickBooks) and Cluster 5 (macOS Storage Cleaning), the underlying execution logic remains consistent. This "run and repeat" methodology relies on a narrow set of trusted LOLBins and lightweight obfuscation to stage remote code with minimal forensic artifacts.</p>
        <p>The technical implementation of ClickFix follows a standardized four-stage pattern across all target operating systems, as summarized in <strong>Table 12</strong>.</p>
        <div>
          <div>
            <div><strong>Stage</strong></div>
            <div><strong>Action</strong></div>
            <div><strong>Technical Intent</strong></div>
          </div>
          <div>
            <div><strong>Obfuscated Input</strong></div>
            <div>Input of highly encoded or fragmented strings</div>
            <div>Bypass static analysis and signature-based detection</div>
          </div>
          <div>
            <div><strong>Native Execution</strong></div>
            <div>Leveraging trusted system shells (<code>zsh</code>, <code>bash</code>, or <code>powershell.exe</code>)</div>
            <div>Execute the initial stager using legitimate system binaries</div>
          </div>
          <div>
            <div><strong>Remote Ingress</strong></div>
            <div>Initiation of external requests to threat actor-controlled IPs or domains</div>
            <div>Download secondary scripts or payloads from the staging infrastructure</div>
          </div>
          <div>
            <div><strong>In-Memory Execution</strong></div>
            <div>Piping downloaded content directly into an interpreter</div>
            <div>Ensure no malicious files are initially saved to disk to evade endpoint security</div>
          </div>
        </div>
        <p><em><strong>Table 12</strong>: Standardized four-stage ClickFix execution pattern (Source: Recorded Future)</em></p>
        <p>Insikt Group identified two primary command styles used in macOS-centric campaigns, such as Cluster 4 and Cluster 5, which are detailed in <strong>Table 13</strong>.</p>
        <div>
          <div>
            <div><strong>Technique</strong></div>
            <div><strong>Observed Pattern</strong></div>
            <div><strong>Defender Insight</strong></div>
          </div>
          <div>
            <div><strong>Multi-Stage Encoding</strong></div>
            <div>Hex -&gt; Base64 -&gt; ZSH</div>
            <div>The use of <code>xxd -r -p</code> in a user-initiated command is a significant indicator of malicious intent, as it is rarely used in legitimate troubleshooting.</div>
          </div>
          <div>
            <div><strong>Persistence and Backgrounding</strong></div>
            <div>Use of <code>nohup</code> and the <code>&amp;</code> operator</div>
            <div>This ensures the malicious process continues to run in the background even after the user closes the terminal, providing persistence during staging.</div>
          </div>
        </div>
        <p><em><strong>Table 13</strong>: Observed tactics, techniques, and procedures (TTPs) for macOS and Linux (</em><code>zsh</code> <em>and</em> <code>bash</code><em>) commands (Source: Recorded Future)</em></p>
        <p>Windows-based commands, particularly those observed in Cluster 1 and Cluster 2, exhibit a higher degree of sophistication through "Command Swizzling" and case randomization, as shown in <strong>Table 14</strong>.</p>
        <div>
          <div>
            <div><strong>Technique</strong></div>
            <div><strong>Observed Pattern</strong></div>
            <div><strong>Defender Insight</strong></div>
          </div>
          <div>
            <div><strong>Parameter Obfuscation</strong></div>
            <div>Randomized casing and shortened aliases (for example, <code>-wINDoW MiNI</code>, <code>-wi mi</code>, or <code>-w h</code>)</div>
            <div>Threat actors use these to evade security tools looking for literal strings like "Hidden" or "Minimized".</div>
          </div>
          <div>
            <div><strong>The "Golden" Pattern</strong></div>
            <div>Combining Invoke-RestMethod (<code>irm</code>) with Invoke-Expression (<code>iex</code>)</div>
            <div>This allows for the seamless retrieval and execution of remote code entirely in memory. This combination is a high-fidelity hunt for ClickFix activity.</div>
          </div>
          <div>
            <div><strong>String Manipulation Deception</strong></div>
            <div>Using <code>.Substring()</code> or <code>.Replace()</code> to "build" commands</div>
            <div>Clusters like Cluster 1 avoid explicitly typing <code>iex</code> to bypass static signature detections.</div>
          </div>
        </div>
        <p><em><strong>Table 14</strong>: Observed TTPs for Windows (PowerShell) commands (Source: Recorded Future)</em></p>
        <h2>Mitigations</h2>
        <p>To mitigate the threats posed by ClickFix social engineering and related living-off-the-land (LotL) techniques, Insikt Group recommends a defense-in-depth approach that combines proactive intelligence monitoring with aggressive hardening of native system utilities.</p>
        <ul>
          <li><strong>Operationalize HTML Content Analysis:</strong> Recorded Future customers should use the HTML Content Analysis source to monitor for impersonations of their brand, which are leveraged to deliver ClickFix. Leverage the Recorded Future Intelligence Operations Platform to monitor for unique web artifacts, such as specific Document Object Model (DOM) hashes and page titles, to identify new ClickFix domains in real time.</li>
          <li><strong>Use Recorded Future Threat Intelligence:</strong> Recorded Future customers can proactively mitigate this threat by operationalizing Recorded Future Intelligence Operations Platform data, specifically by leveraging continuously updated Risk Lists and by blocklisting IP addresses and domains associated with ClickFix to block communication with malicious infrastructure.</li>
          <li><strong>Monitor Malicious Infrastructure Risk Lists:</strong> Continuously update security information and event management (SIEM) and endpoint detection and response (EDR) tools with Recorded Future Risk Lists to block traffic to identified staging and command-and-control (C2) domains.</li>
          <li><strong>Use Malware Intelligence</strong>: Leverage the Recorded Future Intelligence Operations Platform to hunt for indicators of compromise (IoCs) associated with payloads identified in this report, such as NetSupport RAT, Odyssey Stealer, and Lumma Stealer.</li>
          <li><strong>Leverage Network Intelligence:</strong> Use <a href="https://go.recordedfuture.com/hubfs/Network_Intelligence_Datasheet.pdf">Recorded Future Network Intelligence</a> to detect exfiltration events early (such as those linked to NetSupport RAT), which can help prevent intrusions before they escalate. This approach relies on comprehensive, proactive infrastructure discovery provided by Insikt Group and the analysis of vast amounts of network traffic.</li>
          <li><strong>Use Identity Module</strong>: Recorded Future customers should leverage the Identity Module to monitor for credentials and passwords being sold on the dark web that have been stolen by information stealers.</li>
          <li><strong>Disable Windows Run Dialog via Group Policy Objects (GPOs)</strong>: For corporate environments, disable the <code>Win+R </code>keyboard shortcut and the Run command in the Start menu via Group Policy Objects (GPOs). This significantly hinders the ClickFix execution chain, as victims are typically instructed to paste malicious commands directly into this dialog box.</li>
          <li><strong>Restrict Terminal and PowerShell Execution</strong>: Implement PowerShell Constrained Language Mode (CLM) and use AppLocker or Windows Defender Application Control (WDAC) to prevent the execution of unassigned scripts and the misuse of living-off-the-land binaries (LOLBins). On macOS, restrict Terminal and other shell interpreters (for example, <code>zsh</code> and <code>bash</code>) using application control policies enforced via mobile device management (MDM), and leverage System Integrity Protection (SIP) and endpoint security controls to limit unauthorized script execution and abuse of native command-line utilities.</li>
          <li><strong>User Awareness and Training</strong>: Conduct targeted social engineering simulations that specifically educate users on the dangers of "manual verification" prompts that require copying and pasting commands into system utilities.</li>
        </ul>
        <h2>Outlook</h2>
        <p>The identification of five parallel operational clusters targeting diverse sectors, including accounting, travel, real estate, and legal services, indicates that the ClickFix methodology has transitioned from a niche technique to a standardized template within the cybercriminal ecosystem. This standardized "run and repeat" model is facilitating broader adoption by both lower-tier "traffers" and sophisticated advanced persistent threat (APT) groups. Threat actors are able to maintain operational continuity even when individual domains are blocked due to the availability of disposable infrastructure and shared technical templates.</p>
        <p>Insikt Group assesses with high confidence that the ClickFix methodology will very likely remain a heavily used initial access vector throughout 2026. The continued success of ClickFix is driven by its ability to bypass advanced browser-based security controls by shifting the point of exploitation to user-assisted manual actions. As long as native system utilities such as PowerShell and Terminal remain accessible to end-users, ClickFix will continue to offer threat actors a high-return, low-complexity alternative to traditional exploit kits.</p>
        <p>Looking ahead, ClickFix lures will likely become increasingly technically adaptive. Future iterations are expected to incorporate more granular browser fingerprinting to conditionally serve payloads based on a victim's hardware, geographic location, or organizational profile. Furthermore, since threat actors are already purposefully documenting bypass techniques for static analysis engines within their code, Insikt Group anticipates a long-term trend toward more resilient and obfuscated staging environments. This convergence of sophisticated social engineering and LotL techniques necessitates a shift in defensive strategy, moving away from simple indicator blocking toward aggressive behavioral hardening of the system utilities that ClickFix relies upon.</p>
        <h2>Appendix A: Indicators of Compromise</h2>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_18ce7edd37f19ffb5fc8f2ecc71373f3289507995.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="1392" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_16be742309696be96075872e73f72ec87ce30c67a.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="1484" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1904a7c17ae9ec924e23ba147931e923adc8fff00.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="1484" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1bc0ec972fec574cbdd3f4d73c41f7e02345540f5.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="1272" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <h2>Appendix B: Cluster 1 — Intuit QuickBooks Indicators</h2>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN/AS</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>mrinmay[.]net</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-21</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>guypinions[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-20</div>
            <div>2026-02-25</div>
          </div>
          <div>
            <div>4freepics[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-20</div>
            <div>2026-02-24</div>
          </div>
          <div>
            <div>ariciversontile[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-20</div>
            <div>2026-02-25</div>
          </div>
          <div>
            <div>quiptly[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-20</div>
            <div>2026-02-25</div>
          </div>
          <div>
            <div>anthonydee[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-20</div>
            <div>2026-02-26</div>
          </div>
          <div>
            <div>ned.coveney-ltd[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2025-10-10</div>
            <div>2025-11-20</div>
          </div>
          <div>
            <div>grandmastertraders[.]traderslinkfx[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2025-12-01</div>
            <div>2026-02-24</div>
          </div>
          <div>
            <div>nhacaired88[.]com</div>
            <div>193[.]58[.]122[.]97</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-10</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>elive777a[.]com</div>
            <div>94[.]156[.]112[.]115</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-02</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>fomomforhealth[.]com</div>
            <div>94[.]156[.]112[.]115</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-02</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>suedfactoring[.]it[.]com</div>
            <div>45[.]93[.]20[.]141</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2026-01-30</div>
            <div>2026-02-09</div>
          </div>
          <div>
            <div>shopifyservercloud[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2026-01-10</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>elive123go[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2026-01-09</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>hostmaster[.]extracareliving[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2026-01-25</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>orkneygateway[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2025-12-14</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>ustazazharidrus[.]com</div>
            <div>87[.]236[.]16[.]20</div>
            <div>Beget LLC (AS198610)</div>
            <div>2026-02-02</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2026-01-09</div>
            <div>2026-02-01</div>
          </div>
          <div>
            <div>deinhealthcoach[.]com</div>
            <div>193[.]222[.]99[.]212</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>bancatangcode[.]com</div>
            <div>193[.]222[.]99[.]212</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>billiardinstitute[.]com</div>
            <div>193[.]58[.]122[.]97</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-10</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>yvngvualr[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2025-04-06</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>visitbundala[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2025-03-10</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>surecomforts[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2026-01-09</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>theinvestworthy[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2025-12-13</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>customblindinstall[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-21</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>extracareliving[.]com</div>
            <div>45[.]93[.]20[.]50</div>
            <div>Chang Way Technologies Co. Limited (AS57523)</div>
            <div>2025-12-14</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>subsgod[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-21</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>traderslinkfx[.]com</div>
            <div>193[.]35[.]17[.]12</div>
            <div>PLAY2GO INTERNATIONAL LIMITED (AS215439)</div>
            <div>2026-02-21</div>
            <div>2026-03-05</div>
          </div>
        </div>
        <h2>Appendix C: bibi.php Script</h2>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_14f678dfcceb86fe66848ade7c543ab0017cbb1c3.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="1390" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_191574e4830e7909e62a79e4d3ff1c612e928c1bc.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="1490" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_123d049fb8874e716baa55e028a0bdc98a5aabbae.png?width=750&amp;format=png&amp;optimize=medium" width="1258" height="548" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <h2>Appendix D: Cluster 2 — Booking.com Indicators</h2>
        <div>
          <div>
            <div><strong>Indicator</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>sign-in-op-token[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-03-01</div>
            <div>2026-03-03</div>
          </div>
          <div>
            <div>thestayreserve[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-23</div>
            <div>2026-02-24</div>
          </div>
          <div>
            <div>accountpulse[.]help</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>admin-activitycheck[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-22</div>
            <div>2026-02-27</div>
          </div>
          <div>
            <div>accountmime[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-21</div>
            <div>2026-02-24</div>
          </div>
          <div>
            <div>checkhelpdesk[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-18</div>
            <div>2026-02-23</div>
          </div>
          <div>
            <div>thepulseactivity[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-18</div>
            <div>2026-02-23</div>
          </div>
          <div>
            <div>checkaccountactivity[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-17</div>
            <div>2026-02-23</div>
          </div>
          <div>
            <div>account-helpdesk[.]top</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-15</div>
            <div>2026-02-18</div>
          </div>
          <div>
            <div>pulse-help-desk[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-13</div>
            <div>2026-02-19</div>
          </div>
          <div>
            <div>account-helpdesk[.]icu</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-10</div>
            <div>2026-03-02</div>
          </div>
          <div>
            <div>account-helpdesk[.]info</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-08</div>
            <div>2026-02-11</div>
          </div>
          <div>
            <div>helpdeskpulse[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-06</div>
            <div>2026-02-09</div>
          </div>
          <div>
            <div>account-help[.]info</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-08</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>acconthelpdesk[.]com</div>
            <div>91[.]202[.]233[.]206</div>
            <div>Prospero (AS200593)</div>
            <div>2026-02-05</div>
            <div>2026-03-03</div>
          </div>
        </div>
        <h2>Appendix E: Cluster 3 — Birdeye Indicators</h2>
        <div>
          <div>
            <div><strong>Indicator</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>acebirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>bebirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankbox[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankfx[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankgo[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankinc[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankllc[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankmax[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdranktip[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankup[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankus[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankusa[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2024-05-16</div>
          </div>
          <div>
            <div>birdrankvip[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrankzen[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrepbiz[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrepgo[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrephelp[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdreplab[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrepsys[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrepusa[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>birdrepuse[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>bitbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>bitbirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>fixbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>getbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>gobirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>helpbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>helpbirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>infobirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>justbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>mybirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>nowbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>optbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>probirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>topbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>topbirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-17</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>usbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2024-05-16</div>
          </div>
          <div>
            <div>usebirdrep[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>vipbirdrank[.]com</div>
            <div>Cloudflare</div>
            <div>Cloudflare</div>
            <div>2024-05-16</div>
            <div>2026-03-05</div>
          </div>
        </div>
        <h2>Appendix F: Birdeye Cluster Javascript</h2>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_12fdc05c3f194f5e29fe1c8db7ca9e25f0abf6f79.png?width=750&amp;format=png&amp;optimize=medium" width="1260" height="1360" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_13dd203417b2a025c2bd1932c5f7ee8402ef84fa8.png?width=750&amp;format=png&amp;optimize=medium" width="1260" height="1484" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1f84a894f6c81d0e7ebd89e08af321da549187eb1.png?width=750&amp;format=png&amp;optimize=medium" width="1260" height="1484" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1196b63329b8f8e703bf1869ef5ea63b49bffb750.png?width=750&amp;format=png&amp;optimize=medium" width="1268" height="1246" />
            </div>
          </div>
          <div>
            <div></div>
          </div>
        </div>
        <h2>Appendix G: Cluster 4 — Dual-Platform Selection Indicators</h2>
        <div>
          <div>
            <div><strong>Indicator</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
            <div><strong>First Seen</strong></div>
            <div><strong>Last Seen</strong></div>
          </div>
          <div>
            <div>valetfortesla[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-11-12</div>
            <div>2026-03-05</div>
          </div>
          <div>
            <div>macxapp[.]org</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-18</div>
            <div>2025-06-18</div>
          </div>
          <div>
            <div>apposx[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-13</div>
            <div>2025-06-24</div>
          </div>
          <div>
            <div>cryptonews-info[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-18</div>
            <div>2025-12-20</div>
          </div>
          <div>
            <div>macosx-app[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-14</div>
            <div>2025-06-16</div>
          </div>
          <div>
            <div>cryptoinfnews[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-14</div>
            <div>2025-06-30</div>
          </div>
          <div>
            <div>macxapp[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-14</div>
            <div>2025-06-16</div>
          </div>
          <div>
            <div>cryptoinfo-allnews[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-13</div>
            <div>2025-06-30</div>
          </div>
          <div>
            <div>appxmacos[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-13</div>
            <div>2025-06-30</div>
          </div>
          <div>
            <div>appmacintosh[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-12</div>
            <div>2025-06-13</div>
          </div>
          <div>
            <div>macosxappstore[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-09</div>
            <div>2025-06-30</div>
          </div>
          <div>
            <div>macosx-apps[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-09</div>
            <div>2025-06-11</div>
          </div>
          <div>
            <div>cryptoinfo-news[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-06-08</div>
            <div>2025-06-29</div>
          </div>
          <div>
            <div>financementure[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-27</div>
            <div>2025-06-30</div>
          </div>
          <div>
            <div>appsmacosx[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-27</div>
            <div>2025-06-09</div>
          </div>
          <div>
            <div>appmacosx[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-27</div>
            <div>2025-06-14</div>
          </div>
          <div>
            <div>macosxapp[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-27</div>
            <div>2025-06-09</div>
          </div>
          <div>
            <div>macosapp-apple[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-25</div>
            <div>2025-05-26</div>
          </div>
          <div>
            <div>macapps-apple[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-23</div>
            <div>2025-05-24</div>
          </div>
          <div>
            <div>macapp-apple[.]com</div>
            <div>45[.]144[.]233[.]192</div>
            <div>Baykov Ilya Sergeevich<br />(AS41745)</div>
            <div>2025-05-13</div>
            <div>2025-05-23</div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_16fe3d928ba14ff57277e6047a05663f3be02b365.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[2025 Year in Review: Malicious, Infrastructure]]></title>
            <link>https://www.recordedfuture.com/research/2025-year-in-review-malicious-infrastructure</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/2025-year-in-review-malicious-infrastructure</guid>
            <pubDate>Thu, 19 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Explore Insikt Group’s 2025 Malicious Infrastructure Report. Gain insights into Cobalt Strike, Vidar infostealers, and AI-driven threats to secure your 2026 strategy.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>In 2025, Insikt Group significantly expanded its tracking of malicious infrastructure, broadening<br />coverage across additional malware families and threat categories spanning cybercriminal and APT activity. This expansion included deeper analysis of infrastructure types, enhanced integration of data sources such as Recorded Future Network Intelligence®, improved threat detection methodologies,more granular higher-tier infrastructure insights, expanded victimology analysis, and a new focus on so-called threat activity enablers (TAEs). While many patterns identified in 2024 persisted, including Cobalt Strike’s dominance among offensive security tools (OSTs), AsyncRAT and QuasarRAT leading the remote access trojan (RAT) landscape, the widespread use of open-source or cracked malware variants, and the continued prevalence of Android malware within the mobile threat ecosystem, Insikt Group observed several notable shifts and emerging trends throughout 2025.</p>
        <p>For example, although Cobalt Strike remained the most prominent OST, its relative share of detected command-and-control (C2) servers declined as detection coverage expanded and competing tools gained traction. Tools such as RedGuard, Ligolo, and Supershell saw significant growth in use throughout 2025. Following law enforcement disruption efforts targeting LummaC2, Vidar and other infostealers partially filled the gap, reflecting continued volatility in the infostealer ecosystem. Similar fluctuations were observed in the loader and dropper landscape, where new malware families consistently emerged, including CastleLoader, attributed to GrayBravo. Additionally, Insikt Group observed sustained and widespread use of traffic distribution systems (TDS), including activity by TAG-124, GrayCharlie, and other threat actors.</p>
        <p>Defenders should leverage the insights from this report to strengthen security controls by prioritizing the detection and mitigation of the most prevalent malware families and infrastructure techniques. This includes enhancing network monitoring capabilities and deploying relevant detection mechanisms such as YARA, Sigma, and Snort rules. Organizations should also invest in tracking evolving malicious infrastructure dynamics, conducting threat simulations to validate their defensive posture, and maintaining continuous monitoring of the broader threat landscape. With respect to legitimate infrastructure services (LIS), defenders must carefully balance blocking, flagging, or allowing high-risk services based on assessed criticality and organizational risk tolerance.</p>
        <p>As malicious infrastructure continues to evolve alongside improving detection capabilities, Insikt Group anticipates that many current trends will persist into 2026. Rather than dramatic shifts, change is likely to be driven by incremental innovation, adaptation to defensive measures, and reactions to public reporting and law enforcement actions. Threat actors are expected to continue leveraging legitimate tools, services, and content delivery networks (CDNs) such as Cloudflare, a pattern also heavily observed among multiple APT groups, to blend malicious activity with legitimate traffic. While not yet widely observed at the infrastructure layer, Insikt Group assesses that artificial intelligence may increasingly be leveraged to support evasion and operational resilience. The “as-a-service” ecosystem is likely to continue expanding across malware categories, enabling scalability and lowering barriers to entry for threat actors. Although public reporting and sanctions targeting certain TAEs have triggered increased scrutiny, the ecosystem’s underlying economic and operational logic is expected to remain</p>
        <p>intact, allowing established actors to continue operating. At the same time, Insikt Group anticipates increasingly assertive international law enforcement actions targeting malicious infrastructure, including coordinated takedowns and other disruption efforts.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Infostealers remained the primary infection vector in 2025, with malware-as-a-service (MaaS)offerings dominating. Vidar outperformed competitors, Lumma proved resilient despite law enforcement and doxxing pressure, and the wider ecosystem remained highly volatile.</li>
          <li>Cobalt Strike retained clear dominance in OST detections (~50%) despite declining share, while Metasploit and Mythic held their positions. RedGuard, Ligolo, and Supershell expanded notably, and jQuery again led as the most prevalent malleable C2 profile by detections and geographic reach.</li>
          <li>The malware ecosystem remained anchored in MaaS and open-source tooling across desktop and mobile, with AsyncRAT and Quasar RAT leading the RAT landscape, DcRAT and REMCOS RAT gaining share, and families such as XWorm, SectopRAT, and GOSAR entering the top tier, while Android dominated mobile activity (nine of the top ten families) amid rising use of mercenary spyware.</li>
          <li>Droppers, loaders, and TDS remained dynamic but resilient in 2025, with high loader turnover following Operation Endgame 2024, driven by Latrodectus expansion and the rise of MintsLoader and GrayBravo’s CastleLoader, alongside sustained and widespread TDS activity linked to TAG-124, GrayCharlie, and other threat actors.</li>
          <li>Lastly, in 2025, Insikt Group pivoted to identifying TAEs via the Threat Density List, highlighting high-risk networks such as Virtualine Technologies, often transiting via aurologic GmbH, that sustained operations through Regional Internet Registry (RIR) resource abuse and rapid rebranding despite sanctions and law enforcement pressure.</li>
        </ul>
        <h2>Background</h2>
        <p>Insikt Group proactively identifies and monitors infrastructure linked to hundreds of malware families,threat actors, and related artifacts, including phishing kits, scanners, and relay networks. Through daily,automated validation using proprietary methods, Insikt Group delivers accurate risk representation,enabling Recorded Future customers to strengthen their detection and defense capabilities.</p>
        <p>Building on Insikt Group’s annual malicious infrastructure reports from <a href="https://www.recordedfuture.com/research/2022-adversary-infrastructure-report">2022</a>, <a href="https://www.recordedfuture.com/research/2023-adversary-infrastructure-report">2023</a>, and <a href="https://www.recordedfuture.com/research/2024-malicious-infrastructure-report">2024</a>, this year’s report delivers a concise, data-driven overview of malicious infrastructure observed throughout 2025. While the percentages presented throughout the report are intended to provide insight into trends and the state of malicious infrastructure in 2025, it is important to note that Insikt Group continuously adds new detections for both existing and emerging families, which makes year-over-year comparisons imperfect.</p>
        <p>This year, the focus continues to be on the synergy between passive infrastructure detection,<br />higher-tier infrastructure insights powered by <a href="https://support.recordedfuture.com/hc/en-us/articles/360020582674-Recorded-Future-Network-Intelligence">Recorded Future Network Intelligence</a>, and victim<br />identification. It also expands to examine trends across the ecosystem of TAEs that underpin cyber threats, including how sanctions against selected entities have reshaped that landscape. Overall, this report is intended for anyone interested in malicious infrastructure, providing a high-level overview of its current state along with summaries of key findings to support informed decision-making and offer a broad perspective on this rapidly evolving landscape.</p>
        <p>Recognizing the challenge of categorizing malware types in a mutually exclusive manner due to their overlapping functionalities, this report establishes a set of malware categories to facilitate analysis, as detailed in Appendix A, with brief definitions for each. Notably, certain malware categories, such as crypters, have been intentionally excluded because they typically lack network artifacts.</p>
        <p>Beyond examining malicious infrastructure through the lens of malware categories, Insikt Group also monitors it by type, assigning each a distinct risk score within the Recorded Future Intelligence Operations Platform®. This differentiation reflects varying levels of severity. For instance, network traffic to or from a C2 server in a corporate network may indicate a higher risk compared to the presence of a management panel, as the former typically implies active malicious activity. The infrastructure types defined by Insikt Group are detailed in Appendix B.</p>
        <p><a href="https://assets.recordedfuture.com/insikt-report-pdfs/2026/cta-2026-0319.pdf">Download the full report</a></p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_1c826d2a3e8f6fd7496b1368f37ed9a99ce300731.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[2025 Identity Threat Landscape Report: Inside the Infostealer Economy: Credential Threats in 2025]]></title>
            <link>https://www.recordedfuture.com/blog/identity-trend-report-march-blog</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/identity-trend-report-march-blog</guid>
            <pubDate>Mon, 16 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future's 2025 Identity Threat Landscape Report analyzes hundreds of millions of compromised credentials to reveal how infostealer malware is evolving, which systems attackers are targeting, and what security teams must do to get ahead of credential-based breaches.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Credential theft is the dominant initial access vector for enterprise breaches. In 2025, Recorded Future detected:</p>
        <ul>
          <li>1.95 billion malware combo list credential exposures</li>
          <li>36 million database combo list credential exposures</li>
          <li>24 million database dump credential exposures</li>
          <li>892 million malware log credential exposures</li>
        </ul>
        <p>Five findings stand out from the data:</p>
        <ol>
          <li><strong>Credential theft accelerated as the year progressed.</strong> Recorded Future identified 50% more credentials in the second half of 2025 than in the first half of the year. 90% more credentials were identified in the last three months of the year than in the first three months</li>
          <li><strong>Stolen credentials are targeted, not random.</strong> Of the 7 million credentials indexed with identifiable authorization URLs, 63.2% were tied to authentication systems. VPNs, RMM tools, cloud platforms, and detection software also featured prominently — meaning attackers are often going directly for the systems that provide the broadest access and, in some cases, the ability to blind security teams entirely.</li>
          <li><strong>Infostealer malware is outpacing traditional breach detection.</strong> Each compromised device yielded an average of 87 stolen credentials. The scale and precision of modern infostealers means a single infected endpoint — including a personal device used to access corporate systems — can expose an entire organization.</li>
          <li><strong>MFA alone is no longer sufficient protection.</strong> 276 million of the credentials indexed in 2025 included active session cookies, meaning attackers can bypass multi-factor authentication entirely. This represents 31% of all malware-sourced credentials.</li>
          <li><strong>Detection speed is the decisive advantage.</strong> Over half of all credentials (53%) were indexed within one week of exfiltration, and 36.4% within 24 hours. Organizations that act on intelligence quickly can intervene before stolen credentials are exploited.</li>
        </ol>
        <h2>The Scale of the Problem: Compromised Credentials in 2025</h2>
        <h3>Volume Grew Throughout the Year</h3>
        <p>Credential compromise from malware logs was not a static risk in 2025 — it compounded. Recorded Future observed a consistent upward trend throughout the year, with the second half producing 50% more indexed credentials than the first.</p>
        <p>The final three months of the year were particularly active: They saw 90% more volume than the first three months, reflecting both the continued proliferation of infostealer malware-as-a-service (MaaS) and the disruption and reformation of major malware families mid-year (covered in detail in the malware section below).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_100437fc59ff266567d6d895e1cfa0d0d64a78e6c.png?width=750&amp;format=png&amp;optimize=medium" width="1024" height="434" />
            </div>
          </div>
          <div>
            <div>CHART 1: Monthly credential volume from malware logs, full year 2025 (Source: Recorded Future)</div>
          </div>
        </div>
        <p>What this means for security teams: Seasonal or quarterly threat reviews are insufficient. The volume and pace of credential exposure in 2025 demands continuous monitoring — not periodic audits.</p>
        <h3>What do Those Credentials Actually Unlock?</h3>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a62ce422e875506eaab3067aac23093b66512971.png?width=750&amp;format=png&amp;optimize=medium" width="932" height="599" />
            </div>
          </div>
          <div>
            <div>CHART 2: Top authorization URL categories, 2025 (Source: Recorded Future)</div>
          </div>
        </div>
        <p>More credentials exposed means more doors open to attackers. The authorization URL data from 2025 reveals exactly which doors they're targeting — and the picture is stark.</p>
        <p>Of the 7 million credentials with high-risk authorization URLs indexed in 2025, 63.2% were tied to authentication systems. The next largest categories were web content management (9.95%) and cloud computing (7.58%), followed by remote monitoring and management tools (6.19%) and email infrastructure (3.87%).</p>
        <p>This is not a random distribution. Authentication systems, cloud platforms, and remote access tools — VPNs at 2.4% and RMM tools at 6.19% — are precisely the systems that give attackers the broadest foothold inside an organization. A single stolen credential for an authentication portal or VPN can serve as the entry point for lateral movement, privilege escalation, and ultimately a full breach.</p>
        <p>The presence of detection and response software (1.17%) and SIEM platforms (0.06%) in this list is particularly notable. Credentials for the tools organizations rely on to detect attacks are themselves being stolen — giving attackers the ability to blind security teams before they strike.</p>
        <p>What this means for security teams: The value of a stolen credential is determined by what it unlocks. Prioritize monitoring and rapid response for credentials tied to authentication systems, remote access tools, cloud infrastructure, and security platforms — these can represent the highest-leverage targets for attackers operating with stolen credentials.</p>
        <h3>A Global Problem With Regional Concentration</h3>
        <p>Compromised credentials were indexed from organizations across the globe. The ten countries with the highest credential volume in 2025 were:</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1b91e7f35209bbe3196cde31382adc2ead95cc599.png?width=750&amp;format=png&amp;optimize=medium" width="740" height="477" />
            </div>
          </div>
          <div>
            <div>Table 1: Credentials indexed by country (Source: Recorded Future)</div>
          </div>
        </div>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ca316c640ac71930edee449150b110dace9a3120.png?width=750&amp;format=png&amp;optimize=medium" width="1024" height="590" />
            </div>
          </div>
          <div>
            <div>MAP 1: Credentials indexed by country (Source: Recorded Future)</div>
          </div>
        </div>
        <p>The breadth of this data underscores that credential theft is not concentrated in a single region or industry — it is a universal risk. Organizations with global workforces, multinational supply chains, or international customer bases face exposure across multiple geographies simultaneously.</p>
        <h2>The Anatomy of a Compromise: What Attackers Actually Steal</h2>
        <h3>87 Credentials Per Device</h3>
        <p>When an employee's device is infected with infostealer malware, the damage rarely stops at one account. In 2025, the average compromised device yielded 87 stolen credentials — spanning corporate applications, personal accounts, and cloud services accessed from the same machine.</p>
        <p>Recorded Future's Compromised Host Incident Reports surface the full scope of each device-level infection, including the malware family responsible, file paths, IP addresses, and infection timelines. This context is what separates actionable intelligence from a list of leaked passwords.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_18e329ab6afb10fd7fcfa888764ed37e99a49b591.png?width=750&amp;format=png&amp;optimize=medium" width="1532" height="1600" />
            </div>
          </div>
          <div>
            <div>Image 1: Incident Report results in Recorded Future <a href="https://www.recordedfuture.com/products/identity-intelligence">Identity Intelligence</a></div>
          </div>
        </div>
        <p>What this means for security teams: A single alert should trigger a device-level incident response, not just a password reset. Understanding what else was on that machine — and what else may have been exfiltrated — is essential to containing the full extent of the exposure.</p>
        <h3>The Cookie Problem: Why MFA Isn't Enough</h3>
        <p>One of the most significant findings from 2025 is the volume of credentials that included active session cookies alongside stolen passwords. Recorded Future indexed 276 million credentials with cookies — 31% of all malware-sourced credentials — a figure that grew 30% from the first half of the year to the second half.</p>
        <p>Session cookies allow attackers to authenticate as a user without entering a password or completing an MFA challenge. They effectively render secondary authentication controls irrelevant for as long as the session remains active.</p>
        <p>December was the single highest month for cookie-bearing credential exposure, indexing 18% more than the next highest month (November).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_179d0293bed7183e9a44a23b2349ec0d9380d8e99.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="741" />
            </div>
          </div>
          <div>
            <div>CHART 3: Monthly volume of credentials with cookies, 2025 (Source: Recorded Future)</div>
          </div>
        </div>
        <p>What this means for security teams: MFA enrollment is necessary but not sufficient. Organizations should monitor for session cookie theft specifically, enforce shorter session token lifespans for high-risk applications, and treat any credential exposure from an infostealer log as a potential authentication bypass — not just a password reset trigger.</p>
        <h2>The Infostealer Ecosystem: How the Malware Landscape Shifted in 2025</h2>
        <h3>LummaC2: The Year's Dominant Threat</h3>
        <p>LummaStealer emerged as the most widely deployed infostealer of 2025. Operating under a malware-as-a-service model since late 2022, it matured significantly over the past year, targeting Windows systems to harvest browser credentials, session cookies, cryptocurrency wallets, and two-factor authentication tokens.</p>
        <p>Its distribution relied heavily on social engineering — fake software downloads and "ClickFix" techniques that trick users into executing malicious commands disguised as CAPTCHA challenges. Recent campaigns used CastleLoader for delivery, running obfuscated payloads in memory to evade detection.</p>
        <p>In May 2025, a coordinated law enforcement action neutralized more than 2,300 LummaC2 command-and-control domains. The disruption was significant — but not fatal. LummaStealer operators migrated to bulletproof hosting services and employed sophisticated sandbox evasion techniques, including trigonometric analysis of mouse movements to avoid automated detection environments. Activity continued under private, select-affiliate operations through the remainder of the year.</p>
        <h3>How the Rest of the Ecosystem Responded</h3>
        <p>The 2025 infostealer landscape was shaped as much by law enforcement disruption as by attacker innovation. Each takedown created a vacuum that other malware families quickly filled.</p>
        <p>Early 2025: The late-2024 law enforcement actions against RedLine and META pushed users toward emerging MaaS alternatives, consolidating volume around LummaC2 and accelerating its dominance through Q2.</p>
        <p>Mid-2025: Following the LummaC2 disruption in May, established families — Rhadamanthys, Vidar, and StealC — absorbed the displaced activity. Rhadamanthys led through the summer until its own infrastructure was taken down by law enforcement in November 2025. Vidar stepped into the lead position thereafter.</p>
        <p>Rebranding as a survival strategy: Disruption prompted reinvention. StealC relaunched as StealC v2. Vidar operators attempted a similar rebrand. These moves reflect a deliberate effort by malware developers to obscure continuity and frustrate attribution.</p>
        <p>macOS: Atomic macOS Stealer (AMOS) dominated the macOS market through most of 2025, disappearing in October before returning in February 2026. MacSync (formerly Mac.C) emerged as the primary commodity macOS infostealer by year end.</p>
        <p>Private operations grew: Increased law enforcement pressure on publicly accessible MaaS tools pushed sophisticated threat actors toward private infostealers with restricted affiliate access. Acreed (also known as ACR Stealer) and Odyssey Stealer represented the most significant private-operation families of 2025. Private Lumma operations also continued post-disruption.</p>
        <p>What this means for security teams: Malware family names change. Takedowns create temporary disruption, not permanent resolution. Organizations that track exposure by malware family rather than only by leaked credential volume will be better positioned to understand the true source and scope of each incident.</p>
        <h2>Recommendations for Security Teams</h2>
        <p>The 2025 data points to four areas where security teams can meaningfully reduce their exposure to credential-based attacks.</p>
        <p>1. Extend monitoring to personal devices. The majority of infostealer infections occur on personal devices used to access corporate systems — a risk that endpoint detection tools and traditional perimeter controls cannot address. Monitoring infostealer malware logs directly provides visibility into these exposures before they are weaponized.</p>
        <p>One large automotive parts distributor found that Recorded Future surfaced stolen credentials tied to an employee's personal device — an exposure their existing tools had no visibility into and would likely never have caught.</p>
        <p>2. Treat session cookie exposure as a critical-severity event. With 276 million credentials carrying active cookies in 2025, any infostealer-sourced credential exposure should trigger immediate session invalidation in addition to a password reset. MFA bypass via stolen cookies is not a theoretical threat — it is an observed, frequent attack pattern.</p>
        <p>3. Automate response workflows to close the detection-to-remediation gap. The data shows that most credentials are indexed within days of theft. Organizations that have pre-built response playbooks — automatically checking Active Directory, clearing sessions, forcing resets, and notifying managers — respond in minutes rather than hours.</p>
        <p>"We created a custom SOAR playbook using the Identity Intelligence module. This playbook takes the information of compromised corporate user accounts, runs an Active Directory check for the credentials, clears user sessions and resets the password if the account is found to be compromised. It also notifies the user's manager for email response. To date, we have processed over 330 different identity alerts. " — Bryan Cassidy, Lead Cyber Defense Engineer, 7-Eleven (<a href="https://app.userevidence.com/assets/2701BQGV">UserEvidence</a>)</p>
        <p>4. Monitor your entire domain footprint — including subsidiaries and third parties. Some of the most consequential exposures in 2025 involved obscure subsidiaries and supply chain partners, not core corporate domains. Attackers do not limit themselves to obvious targets. Security teams shouldn't limit their monitoring to obvious domains either.</p>
        <p>One large international financial services firm detected an infostealer on a third-party service provider's machine through Recorded Future — surfacing a supply chain exposure that would have been invisible through traditional monitoring alone.</p>
        <h2>The Recorded Future Advantage: Detection Speed – From Exfiltration to Alert in Hours</h2>
        <p>The gap between when credentials are stolen and when a security team finds out is where breaches happen. Most organizations discover compromised credentials days or weeks after the fact — through a public breach disclosure, a tip from law enforcement, or an incident that's already underway.</p>
        <p>Recorded Future closes that gap. In 2025, 36.4% of all indexed credentials were detected within 24 hours of exfiltration, and 52.9% within one week. By the time stolen credentials are being traded or weaponized, Recorded Future customers have already been alerted.</p>
        <div>
          <div>
            <div>Credential Exfiltration Breakdown</div>
          </div>
          <div>
            <div>Within 24 hours</div>
            <div>36%</div>
          </div>
          <div>
            <div>Within 1 week</div>
            <div>53%</div>
          </div>
          <div>
            <div>Within 1 month</div>
            <div>85%</div>
          </div>
          <div>
            <div>Within 1 year</div>
            <div>99%</div>
          </div>
          <div>
            <div>Over 1 year</div>
            <div>1%</div>
          </div>
        </div>
        <p>Table 2: Exfiltration freshness breakdown (Source: Recorded Future)</p>
        <p>Speed matters because attackers move fast. Infostealer logs are often listed for sale within hours of collection. Every day between exfiltration and detection is a day an attacker may already have access. The 15.3% of credentials not detected within a month illustrate what happens when that window stays open — extended attacker dwell time, lateral movement, and incidents that escalate into major breaches.</p>
        <p>For Recorded Future customers, early detection is only half the equation. Pre-built integrations with Okta, Microsoft Entra ID, and SOAR platforms like XSOAR mean that when a credential alert fires, automated workflows can clear sessions, force password resets, and notify managers — without waiting for an analyst to pick up the ticket.</p>
        <p>A large international financial services firm's Team Lead described a recent credential leak: identified and escalated in under 24 hours, triggering immediate automated remediation — exactly the outcome their team had built toward.</p>
        <h2>Appendix: Notable Passwords from 2025 Credential Exposures</h2>
        <p>The following passwords appeared most frequently across credentials indexed by Recorded Future in 2025. Their prevalence reflects the continued gap between password policies and actual user behavior — and the reason why credential monitoring cannot rely on password complexity alone as a proxy for risk.</p>
        <p>
          <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1f94cdabb3370ab7cf99bcab6358d5be3aa72aad0.png?width=750&amp;format=png&amp;optimize=medium" width="1306" height="312" />
        </p>
        <h2>About This Report</h2>
        <p>This report is based on data indexed by Recorded Future's Identity Intelligence Module across the full calendar year 2025. Recorded Future monitors credentials across open web, dark web, paste sites, Telegram channels, and infostealer malware logs sourced from 30+ malware families. All credential data can be processed and analyzed without storing plaintext passwords in customer-facing systems.</p>
        <h2>Find out What’s Already Exposed in Your Environment</h2>
        <p>The data in this report reflects the broader threat landscape. The question is how much of it applies to your organization specifically.</p>
        <p>Recorded Future's complimentary Identity Exposure Assessment pulls directly from the Recorded Future Intelligence Graph to show you the volume, recency, and severity of your organization's credential exposure over the past year — including compromised employee credentials, infostealer-sourced data, and how your exposure has trended over time.</p>
        <p>There's no commitment required. Just a clear picture of where your organization stands.</p>
        <p><a href="https://pages.recordedfutureext.com/IdentityExposureReport_LandingPage.html">Get your complimentary Identity Exposure Assessment →</a></p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1546ac0dd95673dede4cdd0ced6a52f34d677471c.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[February 2026 CVE Landscape: 13 Critical Vulnerabilities Mark 43% Drop from January]]></title>
            <link>https://www.recordedfuture.com/blog/february-2026-cve-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/february-2026-cve-landscape</guid>
            <pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[February 2026 saw a 43% decrease in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 13 vulnerabilities requiring immediate remediation, down from 23 in January 2026.]]></description>
            <content:encoded><![CDATA[
        <p>February 2026 saw a 43% decrease in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying <strong>13 vulnerabilities</strong> requiring immediate remediation, down from <a href="https://www.recordedfuture.com/blog/january-2026-cve-landscape">23 in January 2026</a>. All 13 carried a ‘Very Critical’ Recorded Future Risk Score.</p>
        <p><strong>What security teams need to know:</strong></p>
        <ul>
          <li><strong>Microsoft dominates:</strong> Six of 13 vulnerabilities affected Microsoft products, accounting for 46% of February's findings; all were added to CISA's KEV catalog on the same day</li>
          <li><strong>Supply-chain attack on Notepad++:</strong> Lotus Blossom, a suspected China state-sponsored threat actor, exploited CVE-2025-15556 to hijack Notepad++'s update channel and deliver a Cobalt Strike Beacon and the Chrysalis backdoor</li>
          <li><strong>APT28 exploits MSHTML flaw:</strong> The Russian state-sponsored group leveraged CVE-2026-21513 via malicious Windows Shortcut files for multi-stage payload delivery</li>
          <li><strong>Public exploits available:</strong> Four of 13 vulnerabilities have publicly available proof-of-concept code; an alleged exploit for a fifth is being advertised for sale</li>
        </ul>
        <p><strong>Bottom line:</strong> Despite a 43% drop in volume, February's vulnerabilities include named threat actor exploitation and five RCE-enabling flaws, making prioritized, intelligence-driven remediation as important as ever.</p>
        <h2><strong>Quick Reference: February 2026 Vulnerability Table</strong></h2>
        <p><em>All 13 vulnerabilities below were actively exploited in February 2026.</em></p>
        <div>
          <div>
            <div><strong>#</strong></div>
            <div><strong>Vulnerability</strong></div>
            <div><strong>Risk</strong><br /><strong>Score</strong></div>
            <div><strong>Affected Vendor/Product</strong></div>
            <div><strong>Vulnerability Type/Component</strong></div>
            <div><strong>Public PoC</strong></div>
          </div>
          <div>
            <div>1</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BD2JXlW/overview">CVE-2025-15556</a></div>
            <div>99</div>
            <div>Notepad++</div>
            <div>CWE-494 (Download of Code Without Integrity Check)</div>
            <div><a href="https://github.com/George0Papasotiriou/CVE-2025-15556-Notepad-WinGUp-Updater-RCE">Yes</a></div>
          </div>
          <div>
            <div>2</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BECGjWe/overview">CVE-2026-1731</a></div>
            <div>99</div>
            <div>BeyondTrust Remote Support (RS) and Privileged Remote Access (PRA)</div>
            <div>CWE-78 (Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))</div>
            <div><a href="https://github.com/win3zz/CVE-2026-1731">Yes</a></div>
          </div>
          <div>
            <div>3</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEF-/overview">CVE-2026-21510</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-693 (Protection Mechanism Failure)</div>
            <div>No</div>
          </div>
          <div>
            <div>4</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEGB/overview">CVE-2026-21513</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-693 (Protection Mechanism Failure)</div>
            <div>No</div>
          </div>
          <div>
            <div>5</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEGC/overview">CVE-2026-21514</a></div>
            <div>99</div>
            <div>Microsoft Office</div>
            <div>CWE-807 (Reliance on Untrusted Inputs in a Security Decision)</div>
            <div>No</div>
          </div>
          <div>
            <div>6</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEGG/overview">CVE-2026-21519</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-843 (Access of Resource Using Incompatible Type ('Type Confusion'))</div>
            <div>No</div>
          </div>
          <div>
            <div>7</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEGJ/overview">CVE-2026-21525</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-476 (NULL Pointer Dereference)</div>
            <div>No</div>
          </div>
          <div>
            <div>8</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEGN/overview">CVE-2026-21533</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-269 (Improper Privilege Management)</div>
            <div>*Yes</div>
          </div>
          <div>
            <div>9</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEPyPC6/overview">CVE-2026-20700</a></div>
            <div>99</div>
            <div>Apple iOS, macOS, tvOS, watchOS, and visionOS</div>
            <div>CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)</div>
            <div>No</div>
          </div>
          <div>
            <div>10</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEThw_R/overview">CVE-2026-25108</a></div>
            <div>99</div>
            <div>Soliton Systems K.K. FileZen</div>
            <div>CWE-78 (Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'))</div>
            <div>No</div>
          </div>
          <div>
            <div>11</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BC48fmD/overview">CVE-2026-2441</a></div>
            <div>99</div>
            <div>Google Chromium</div>
            <div>CWE-416 (Use After Free)</div>
            <div><a href="https://github.com/huseyinstif/CVE-2026-2441-PoC">Yes</a></div>
          </div>
          <div>
            <div>12</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEdM197/overview">CVE-2026-22769</a></div>
            <div>99</div>
            <div>Dell RecoverPoint for Virtual Machines (RP4VMs)</div>
            <div>CWE-798 (Use of Hard-coded Credentials)</div>
            <div>No</div>
          </div>
          <div>
            <div>13</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/BEzsB0i/overview">CVE-2026-20127</a></div>
            <div>99</div>
            <div>Cisco Catalyst SD-WAN Controller and Manager</div>
            <div>CWE-287 (Improper Authentication)</div>
            <div><a href="https://github.com/search?q=CVE-2026-20127&amp;type=repositories">Yes</a></div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>List of vulnerabilities that were actively exploited in February based on Recorded Future data. *An alleged exploit for</em> <em><a href="https://app.recordedfuture.com/portal/intelligence-card/BEMKEGN/overview">CVE-2026-21533</a></em> <em>is being advertised for sale across Github. Recorded Future Triage was used to browse the website advertising the exploit, which can be</em> <em><a href="https://tria.ge/260305-bl376shz8w/behavioral1#:~:text=v16-,Replay%20Monitor,-Downloads">viewed here</a></em> <em>via the Replay Monitor. (Source: Recorded Future)</em></p>
        <h2><strong>Key Trends: February 2026</strong></h2>
        <h3><strong>Vendors Most Affected</strong></h3>
        <ul>
          <li><strong>Microsoft</strong> led with six vulnerabilities across Windows, Windows Server, Office, and Microsoft 365 products</li>
          <li><strong>BeyondTrust</strong> faced a critical OS command injection flaw in Remote Support (RS) versions 25.3.1 and earlier, and Privileged Remote Access (PRA) versions 24.3.4 and earlier</li>
          <li><strong>Cisco</strong> saw active exploitation of an authentication bypass in Catalyst SD-WAN infrastructure</li>
          <li>Additional affected vendors: Notepad++, Apple, Soliton Systems K.K., Google, and Dell</li>
        </ul>
        <h3><strong>Most Common Weakness Types</strong></h3>
        <ul>
          <li><strong>CWE-78</strong> – OS Command Injection (tied for most common)</li>
          <li><strong>CWE-693</strong> – Protection Mechanism Failure (tied for most common)</li>
          <li><strong>CWE-476</strong> – NULL Pointer Dereference</li>
          <li><strong>CWE-843</strong> – Type Confusion</li>
          <li><strong>CWE-807</strong> – Reliance on Untrusted Inputs in a Security Decision</li>
        </ul>
        <h3><strong>Exploitation Activity</strong></h3>
        <p><strong>Vulnerabilities associated with malware campaigns:</strong></p>
        <ul>
          <li><strong>Lotus Blossom</strong> (suspected China state-sponsored) exploited <strong>CVE-2025-15556</strong> to hijack Notepad++ update traffic between June and December 2025. The campaign rotated C2 servers across three attack chains to deliver a Metasploit loader, Cobalt Strike Beacon, and a custom backdoor called Chrysalis.</li>
          <li><strong>APT28</strong> (Russian state-sponsored) exploited <strong>CVE-2026-21513</strong> using malicious Windows Shortcut (.lnk) files with embedded HTML payloads for multi-stage payload delivery, with observed network communication to infrastructure associated with the threat group.</li>
          <li><strong>UNC6201</strong> (suspected China-nexus) exploited <strong>CVE-2026-22769</strong> to compromise Dell RecoverPoint for VMs appliances, deploying the SLAYSTYLE web shell, BRICKSTORM backdoor, and GRIMBOLT, a C#-based backdoor with native AOT compilation to complicate detection.</li>
        </ul>
        <p><strong>Long-running exploitation activity:</strong></p>
        <ul>
          <li><strong>UAT-8616</strong> exploited <strong>CVE-2026-20127</strong>, chaining it with CVE-2022-20775 to achieve root-level access on Cisco Catalyst SD-WAN systems, with <a href="https://blog.talosintelligence.com/uat-8616-sd-wan/">Cisco Talos attributing</a> the activity to a sophisticated threat actor and assessing that the activity dates back to at least 2023.</li>
        </ul>
        <h2><strong>Priority Alert: Active Exploitation</strong></h2>
        <p>These vulnerabilities demand immediate attention due to confirmed exploitation in the wild.</p>
        <h3>CVE-2025-15556 | Notepad++</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | CISA KEV: Added February 12, 2026</p>
        <p><strong>Why this matters:</strong> Lotus Blossom exploited this flaw to replace legitimate Notepad++ update packages with malicious installers, deploying Cobalt Strike and the Chrysalis backdoor to targeted users over a six-month period. The vulnerability affects the WinGUp updater used by Notepad++ versions prior to 8.8.9, which fails to cryptographically verify downloaded update metadata and installers.</p>
        <p><strong>Affected versions:</strong> Notepad++ versions prior to 8.8.9 (version 8.9.1 recommended)</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Update to Notepad++ version 8.9.1, released January 26, 2026</li>
          <li>Hunt for the malicious update.exe sample (SHA256: 4d4aec6120290e21778c1b14c94aa6ebff3b0816fb6798495dc2eae165db4566) in your environment</li>
          <li>Monitor for GUP.exe spawning unexpected child processes</li>
          <li>Review network connections for traffic to 45[.]76[.]155[.]202, 45[.]77[.]31[.]210, 45[.]32[.]144[.]255, or 95[.]179[.]213[.]0</li>
          <li>Check for directories named ProShow under %APPDATA% or unexpected files in %APPDATA%\Adobe\Scripts\</li>
          <li>Block or alert on curl.exe uploading files to temp[.]sh</li>
        </ul>
        <p><strong>Known C2 infrastructure:</strong> 45[.]76[.]155[.]202, 45[.]77[.]31[.]210, cdncheck[.]it[.]com, safe-dns[.]it[.]com, 95[.]179[.]213[.]0</p>
        <p><strong>Detection resources:</strong> Insikt Group created Sigma rules to detect update.exe's execution of reconnaissance commands (whoami, tasklist, systeminfo, and netstat -ano) and curl commands for system information exfiltration, available to Recorded Future customers.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_155577ae992ec4ffecd3c5a7fa077ece6041dcb4c.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="801" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>Risk Rules History from</em> <em><a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2025-15556 in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1eb057ac8d9e33292f2d343e2c01e9ea4a86902bd.jpg?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Latin America's Cybersecurity Turning Point: From Reactive Defense to Threat Intelligence]]></title>
            <link>https://www.recordedfuture.com/blog/latin-america-cybersecurity-turning-point</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/latin-america-cybersecurity-turning-point</guid>
            <pubDate>Tue, 03 Mar 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Latin America's threat landscape is evolving fast — and reactive defense is no longer enough. PIX fraud, ransomware, and targeted attacks are outpacing overstretched security teams. Recorded Future provides LATAM-specific intelligence, automation, and seamless integrations to help your team get ahead of threats before they hit.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways</h2>
        <ul>
          <li>Latin America faces a distinct and evolving cyber threat landscape, from PIX payment fraud to ransomware hitting critical infrastructure.</li>
          <li>Most LATAM security teams are still reactive by necessity, and that posture is costing organizations in downtime, data, and trust.</li>
          <li>Recorded Future offers LATAM-specific threat intelligence, automation, and 100+ integrations to help stretched teams get ahead of attacks before they land.</li>
          <li>Meet us at RSA Booth N-6090 to see how intelligence-led security can transform your team's posture, from response to prevention.</li>
          <li>Join our upcoming webinar to learn what proactive intelligence looks like for your region.<br />Understanding the Dark Covenant, Its Evolution, and Impact</li>
        </ul>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_17ffeff1c5b7cfe37313bfcf34dda6673c3c7026d.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Recorded Future Expands Coverage of Scams and Financial Fraud with Money Mule Intelligence from CYBERA]]></title>
            <link>https://www.recordedfuture.com/blog/recorded-future-money-mule-intelligence-cybera</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/recorded-future-money-mule-intelligence-cybera</guid>
            <pubDate>Thu, 26 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Recorded Future is expanding its payment fraud prevention capabilities through a partnership with CYBERA, the industry leader in detecting and verifying data on scam-linked bank accounts.]]></description>
            <content:encoded><![CDATA[
        <p>Recorded Future is expanding its payment fraud prevention capabilities through a partnership with <a href="https://www.cybera.io/company/contact">CYBERA</a>, the industry leader in detecting and verifying data on scam-linked bank accounts.</p>
        <p>Available for purchase now via the Recorded Future Platform, Money Mule Intelligence helps fraud teams identify the accounts criminals use to extract and move stolen funds—addressing a critical gap as scams increasingly become banks' most pressing fraud challenge.</p>
        <h2><strong>The Growing Threat of Authorized Push Payment Fraud</strong></h2>
        <p>Authorized Push Payment (APP) fraud is accelerating. In the U.S., APP fraud losses are projected to reach nearly $15B by 2028, up from $8.3B in 2024, according to <a href="https://www.deloitte.com/us/en/insights/industry/financial-services/authorized-push-payment-fraud.html">Deloitte</a>. While traditional card fraud continues to decline, APP fraud is climbing, fueled by AI-generated deepfakes, personalized scam scripts, and instant payment systems like FedNow and Zelle that move money faster than conventional fraud controls can intercept it.</p>
        <p>Mule accounts, or money mules, are part of the critical infrastructure that makes these scams possible. They provide the bridge that converts stolen payments into untraceable cash or cryptocurrency. Without them, most APP fraud would collapse because criminals cannot risk receiving funds directly into their own accounts. By the time victims realize they've been scammed, mule accounts have already moved the money through multiple layers, typically ending in cash withdrawals or crypto conversions.</p>
        <p>Additionally, the sophistication of mule operations is increasing. Criminal organizations now employ "mule herders" who manage hundreds of accounts at once, using AI to simulate normal transaction behavior (grocery purchases, streaming subscriptions, etc.) so accounts don't appear dormant or suspicious. This makes detection through traditional pattern analysis increasingly difficult.</p>
        <p>Regulators are responding by shifting liability to banks, often viewing those allowing mule accounts to operate as part of the criminal infrastructure itself. For example, the UK now requires banks to reimburse scam victims and allows them to delay suspicious payments for investigation, while U.S. regulators are signaling that banks may be held liable for failing to detect mule accounts.</p>
        <p>Detecting mule accounts is fundamentally difficult. They’re designed to blend in with legitimate activity, and traditional fraud controls can struggle to distinguish between a genuine customer payment and a scam transfer until it's too late.</p>
        <h2><strong>CYBERA's Approach to Mule Intelligence</strong></h2>
        <p>The challenge of detecting and disrupting mule account networks is what led CYBERA's founders to build their solution. Coming from legal practice and law enforcement, CYBERA's leadership team worked scam cases where they witnessed how recovery becomes impossible once funds move through the financial system. They realized that money mule networks represent a central vulnerability in the scam economy, one that banks had limited visibility into.</p>
        <p>Today, CYBERA helps banks and payment networks disrupt scams at the point where funds are extracted. CYBERA's AI-powered Scam Engagement System generates intelligence on bank accounts and payment endpoints actively used by scam networks.</p>
        <p>Unlike probabilistic risk scoring, CYBERA verifies each account, providing evidence and contextual metadata to enable proactive prevention across both internal accounts and outbound payments while minimizing false positives.</p>
        <p>CYBERA supports two core use cases:</p>
        <ul>
          <li><strong>On-Us Mule Detection</strong>, which helps identify mule accounts held at your institution that are already linked to confirmed scam activity. This enables early detection and disruption of high-risk accounts, reducing downstream fraud, repeat victimization, and regulatory exposure within a bank’s accountholders.</li>
          <li><strong>Off-Us Screening</strong>, which screens outbound payments to external beneficiary accounts before execution, helping to prevent customers from sending funds to scammer-controlled accounts. This is particularly valuable for high-value transfers, social engineering attacks, and customer-initiated payments where traditional controls are limited.</li>
        </ul>
        <p>Large financial institutions have already prevented multiple six-figure losses by embedding CYBERA’s intelligence into their transaction monitoring workflows. CYBERA has also been accepted as a member of the Mastercard Start Path program, making it the first Recorded Future partner to achieve this distinction and further validating its role in the payments ecosystem.</p>
        <h2><strong>How Money Mule Intelligence Expands Payment Fraud Intelligence</strong></h2>
        <p><a href="https://www.recordedfuture.com/products/payment-fraud-intelligence">Payment Fraud Intelligence</a> (PFI) correlates the widest set of disparate, pre-monetization indicators of fraud to help teams act before their customers are impacted. Money Mule Intelligence extends that capability, giving fraud teams the verified intelligence needed to make high-confidence decisions that disrupt scams by flagging accounts that have been confirmed as mule infrastructure through direct investigation. Together, they provide coverage from initial compromise through attempted cash-out, helping fraud teams prevent losses at multiple intervention points.</p>
        <div>
          <div>
            <div>“Securing payments requires more than reacting to fraud — it requires anticipating it. Integrating Money Mule Intelligence strengthens our ability to illuminate the infrastructure behind financial crime, which is fully aligned with our strategy of securing payments with intelligence.”</div>
          </div>
          <div>
            <div>
              <p><strong>Jamie Zajac</strong></p>
              <p>Chief Product Officer at Recorded Future</p>
            </div>
          </div>
        </div>
        <p>As regulators increasingly expect banks to prevent scam-enabled transfers, Money Mule Intelligence provides the verified data needed to comply with emerging reimbursement requirements while reducing the operational burden of post-incident investigation and remediation.</p>
        <p>PFI users that purchase this capability, can now act on both sides of the transaction—compromised payment instruments and scam-linked receiving accounts—with evidence-backed intelligence that minimizes false positives and aligns with the industry's shift toward proactive fraud prevention.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1f90928a17759f89a1ada2a65299215200ab27b00.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[January 2026 CVE Landscape: 23 Critical Vulnerabilities Mark 5% Increase, APT28 Exploits Microsoft Office Zero-Day]]></title>
            <link>https://www.recordedfuture.com/blog/january-2026-cve-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/january-2026-cve-landscape</guid>
            <pubDate>Tue, 24 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[January 2026 saw 23 actively exploited CVEs, including APT28’s Microsoft Office zero-day and critical auth bypass flaws impacting enterprise systems.]]></description>
            <content:encoded><![CDATA[
        <p>January 2026 saw a modest 5% increase in high-impact vulnerabilities, with Recorded Future's Insikt Group® identifying 23 vulnerabilities requiring immediate remediation, up from 22 in December 2025. Noteworthy trends last month included Russian state-sponsored exploitation of a Microsoft Office zero-day and critical authentication bypass flaws affecting enterprise infrastructure.</p>
        <p><strong>What security teams need to know:</strong></p>
        <ul>
          <li><strong>APT28's Operation Neusploit:</strong> Russian state-sponsored actors exploited CVE-2026-21509 (Microsoft Office) via weaponized RTF files, delivering MiniDoor, PixyNetLoader, and Covenant Grunt implants</li>
          <li><strong>Microsoft and SmarterTools lead concerns:</strong> These vendors accounted for 30% of January's vulnerabilities, with multiple critical authentication bypass and RCE flaws</li>
          <li><strong>Public exploits proliferate:</strong> Fourteen of the 23 vulnerabilities reported have public proof-of-concept exploit code available</li>
          <li><strong>Code Injection dominates:</strong> CWE-94 (Code Injection) was the most common weakness type, followed by CWE-288 (Authentication Bypass Using an Alternate Path or Channel) and CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor)</li>
        </ul>
        <p><strong>Bottom line:</strong> The slight increase masks significant threats. APT28's zero-day exploitation and multiple critical authentication bypass flaws demonstrate that threat actors continue targeting enterprise communication and management platforms for initial access and persistence.</p>
        <h2>Quick Reference Table</h2>
        <p><em>All 23 vulnerabilities below were actively exploited in January 2026.</em></p>
        <div>
          <div>
            <div><strong>#</strong></div>
            <div><strong>Vulnerability</strong></div>
            <div><strong>Risk</strong><br /><strong>Score</strong></div>
            <div><strong>Affected Vendor/Product</strong></div>
            <div><strong>Vulnerability Type/Component</strong></div>
            <div><strong>Public PoC</strong></div>
          </div>
          <div>
            <div>1</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-20029">CVE-2026-20029</a></div>
            <div>99</div>
            <div>Cisco Identity Services Engine Software</div>
            <div>CWE-611 (Improper Restriction of XML External Entity Reference)</div>
            <div>No</div>
          </div>
          <div>
            <div>2</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-20805">CVE-2026-20805</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor)</div>
            <div><a href="https://github.com/search?q=CVE-2026-20805&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>3</div>
            <div><a href="http://CVE-2026-20931">CVE-2026-20931</a></div>
            <div>99</div>
            <div>Microsoft Windows</div>
            <div>CWE-73 (External Control of File Name or Path)</div>
            <div>No</div>
          </div>
          <div>
            <div>4</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-23550">CVE-2026-23550</a></div>
            <div>99</div>
            <div>Modular DS Plugin</div>
            <div>CWE-266 (Incorrect Privilege Assignment)</div>
            <div><a href="https://github.com/search?q=CVE-2026-23550&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>5</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-24061">CVE-2026-24061</a></div>
            <div>99</div>
            <div>GNU InetUtils</div>
            <div>CWE-88 (Argument Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2026-24061&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>6</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-20045">CVE-2026-20045</a></div>
            <div>99</div>
            <div>Cisco Unified Communications Manager</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2026-20045&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>7</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-23760">CVE-2026-23760</a></div>
            <div>99</div>
            <div>SmarterTools SmarterMail</div>
            <div>CWE-288 (Authentication Bypass Using an Alternate Path or Channel)</div>
            <div><a href="https://github.com/search?q=CVE-2026-23760&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>8</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-24423">CVE-2026-24423</a></div>
            <div>99</div>
            <div>SmarterTools SmarterMail</div>
            <div>CWE-306 (Missing Authentication for Critical Function)</div>
            <div><a href="https://github.com/search?q=CVE-2026-23760&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>9</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-21509">CVE-2026-21509</a></div>
            <div>99</div>
            <div>Microsoft Office</div>
            <div>CWE-807 (Reliance on Untrusted Inputs in a Security Decision)</div>
            <div><a href="https://github.com/search?q=CVE-2026-21509&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>10</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-24858">CVE-2026-24858</a></div>
            <div>99</div>
            <div>Fortinet Multiple Products</div>
            <div>CWE-288 (Authentication Bypass Using an Alternate Path or Channel)</div>
            <div><a href="https://github.com/search?q=CVE-2026-24858&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>11</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-40551">CVE-2025-40551</a></div>
            <div>99</div>
            <div>SolarWinds Web Help Desk</div>
            <div>CWE-502 (Deserialization of Untrusted Data)</div>
            <div>No</div>
          </div>
          <div>
            <div>12</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-1281">CVE-2026-1281</a></div>
            <div>99</div>
            <div>Ivanti Endpoint Manager Mobile (EPMM)</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2026-1281&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>13</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2026-1340">CVE-2026-1340</a></div>
            <div>99</div>
            <div>Ivanti Endpoint Manager Mobile (EPMM)</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2026-1340&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>14</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2018-14634">CVE-2018-14634</a></div>
            <div>99</div>
            <div>Linux Kernel</div>
            <div>CWE-190 (Integer Overflow or Wraparound)</div>
            <div><a href="https://github.com/search?q=CVE-2018-14634&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>15</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-52691">CVE-2025-52691</a></div>
            <div>99</div>
            <div>SmarterTools SmarterMail</div>
            <div>CWE-434 (Unrestricted Upload of File with Dangerous Type)</div>
            <div><a href="https://github.com/search?q=CVE-2025-52691&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>16</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2024-37079">CVE-2024-37079</a></div>
            <div>99</div>
            <div>Broadcom VMware vCenter Server</div>
            <div>CWE-787 (Out-of-bounds Write)</div>
            <div>No</div>
          </div>
          <div>
            <div>17</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-68645">CVE-2025-68645</a></div>
            <div>99</div>
            <div>Synacor Zimbra Collaboration Suite (ZCS)</div>
            <div>CWE-98 (PHP Remote File Inclusion)</div>
            <div><a href="https://github.com/search?q=CVE-2025-68645&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>18</div>
            <div><a href="http://CVE-2025-34026">CVE-2025-34026</a></div>
            <div>99</div>
            <div>Versa Concerto</div>
            <div>CWE-288 (Authentication Bypass Using an Alternate Path or Channel)</div>
            <div>No</div>
          </div>
          <div>
            <div>19</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-31125">CVE-2025-31125</a></div>
            <div>99</div>
            <div>Vite Vitejs</div>
            <div>CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor), CWE-284 (Improper Access Control)</div>
            <div><a href="https://github.com/search?q=CVE-2025-31125&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>20</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-54313">CVE-2025-54313</a></div>
            <div>99</div>
            <div>Prettier eslint-config-prettier</div>
            <div>CWE-506 (Embedded Malicious Code)</div>
            <div>No</div>
          </div>
          <div>
            <div>21</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-8110">CVE-2025-8110</a></div>
            <div>89</div>
            <div>Gogs</div>
            <div>CWE-22 (Path Traversal)</div>
            <div><a href="https://github.com/search?q=CVE-2025-8110&amp;type=repositories">Yes</a></div>
          </div>
          <div>
            <div>22</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2009-0556">CVE-2009-0556</a></div>
            <div>89</div>
            <div>Microsoft Office</div>
            <div>CWE-94 (Code Injection)</div>
            <div>No</div>
          </div>
          <div>
            <div>23</div>
            <div><a href="https://app.recordedfuture.com/portal/intelligence-card/CVE-2025-37164">CVE-2025-37164</a></div>
            <div>89</div>
            <div>Hewlett Packard Enterprise OneView</div>
            <div>CWE-94 (Code Injection)</div>
            <div><a href="https://github.com/search?q=CVE-2025-37164&amp;type=repositories">Yes</a></div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>List of vulnerabilities that were actively exploited in January based on Recorded Future data (Source: Recorded Future)</em></p>
        <h2>Key Trends in January 2026</h2>
        <h3>Affected Vendors</h3>
        <ul>
          <li><strong>Microsoft</strong> faced four critical vulnerabilities across Windows and Office products, including APT28's zero-day exploitation of CVE-2026-21509</li>
          <li><strong>SmarterTools</strong> accounted for three critical vulnerabilities affecting SmarterMail, all enabling authentication bypass or RCE</li>
          <li><strong>Cisco</strong> saw two critical flaws in Identity Services Engine and Unified Communications Manager</li>
          <li><strong>Ivanti</strong> dealt with two pre-authentication RCE vulnerabilities in Endpoint Manager Mobile</li>
          <li>Additional affected vendors/projects: Fortinet, SolarWinds, Broadcom, Synacor, Versa, Hewlett Packard Enterprise, GNU, Linux, Vite, Prettier, Gogs, and Modular DS</li>
        </ul>
        <h3>Most Common Weakness Types</h3>
        <ul>
          <li><strong>CWE-94</strong> – Code Injection</li>
          <li><strong>CWE-288</strong> – Authentication Bypass Using an Alternate Path or Channel</li>
          <li><strong>CWE-200</strong> – Exposure of Sensitive Information to an Unauthorized Actor</li>
        </ul>
        <h3>Threat Actor Activity</h3>
        <p><strong>APT28's Operation Neusploit</strong> <strong>marked January's most sophisticated campaign:</strong></p>
        <ul>
          <li>Exploited CVE-2026-21509 (Microsoft Office) via weaponized RTF files</li>
          <li>Deployed MiniDoor, a malicious Outlook VBA project designed to collect and forward victim emails to hardcoded addresses</li>
          <li>Deployed PixyNetLoader, which staged additional components and culminated in a Covenant Grunt implant</li>
          <li>Abused Filen API as a C2 bridge between the implant and actor-controlled Covenant listener</li>
        </ul>
        <h2>Priority Alert: Active Exploitation</h2>
        <p>These vulnerabilities demand immediate attention due to confirmed exploitation in the wild.</p>
        <h3>CVE-2026-21509 | Microsoft Office</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | Active exploitation by APT28</p>
        <p><strong>Why this matters:</strong> Zero-day exploitation by Russian state-sponsored actors bypasses Office security features, enabling delivery of email collection implants and backdoors. The vulnerability stems from reliance on untrusted inputs in security decisions, allowing unauthorized attackers to bypass OLE mitigations.</p>
        <p><strong>Affected versions:</strong> Microsoft 365 and Microsoft Office (versions not specified in advisory)</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Install Microsoft's out-of-band update released January 26, 2026</li>
          <li>Search email systems for RTF attachments with embedded malicious droppers</li>
          <li>Check for modifications to %appdata%\Microsoft\Outlook\VbaProject.OTM</li>
          <li>Review registry keys: HKCU\Software\Microsoft\Office\16.0\Outlook\Security\Level, Software\Microsoft\Office\16.0\Outlook\Options\General\PONT_STRING, and Software\Microsoft\Office\16.0\Outlook\LoadMacroProviderOnBoot</li>
          <li>Monitor for connections to 213[.]155[.]157[.]123:443 and remote connectivity to Microsoft Office CDN endpoints</li>
          <li>Hunt for scheduled tasks named "OneDriveHealth" and suspicious files in %programdata%\Microsoft\OneDrive\setup\Cache\SplashScreen.png</li>
          <li>Block email addresses: ahmeclaw2002@outlook[.]com and ahmeclaw@proton[.]me</li>
        </ul>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1d8e4dc50a83f9e11b1c9b0b7e1e5476bd9fb3016.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="779" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em><a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2026-21509 in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
        <div></div>
        <h3>CVE-2026-23760 | SmarterTools SmarterMail</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | CISA KEV: Added January 26, 2026</p>
        <p><strong>Why this matters:</strong> Unauthenticated attackers can reset system administrator passwords without any credentials or prior access, enabling complete administrative takeover and potential RCE through volume mount command injection.</p>
        <p><strong>Affected versions:</strong> SmarterTools SmarterMail prior to build 9511</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Upgrade to build 9511 or later immediately</li>
          <li>Review administrator account activity logs for unauthorized password resets</li>
          <li>Check Volume Mounts configuration for suspicious command entries (this one IS correct for SmarterMail)</li>
          <li>Review administrator access patterns and session logs</li>
          <li>Audit system for unauthorized changes made with compromised admin access</li>
        </ul>
        <div></div>
        <h3>CVE-2026-1281 &amp; CVE-2026-1340 | Ivanti Endpoint Manager Mobile</h3>
        <p><strong>Risk Score: 99 (Very Critical)</strong> | CISA KEV: CVE-2026-1281 added January 29, 2026</p>
        <p><strong>Why this matters:</strong> Pre-authentication RCE vulnerabilities in EPMM enable unauthenticated attackers to execute arbitrary code by exploiting Apache RewriteMap helper scripts that pass attacker-controlled strings to Bash.</p>
        <p><strong>Affected versions:</strong> Ivanti EPMM 12.5.0.0 and earlier, 12.5.1.0 and earlier, 12.6.0.0 and earlier, 12.6.1.0 and earlier, and 12.7.0.0 and earlier</p>
        <p><strong>Immediate actions:</strong></p>
        <ul>
          <li>Install temporary fixes via RPM packages: EPMM_RPM_12.x.0 - Security Update - 1761642-1.0.0S-5.noarch.rpm and EPMM_RPM_12.x.1 - Security Update - 1761642-1.0.0L-5.noarch.rpm</li>
          <li>Plan migration to EPMM 12.8.0.0 (scheduled for Q1 2026 release)</li>
          <li>Monitor for unusual Apache RewriteMap activity</li>
          <li>Review logs for crafted HTTP parameters to app store retrieval routes</li>
          <li>Check for unauthorized code execution attempts via RewriteRule handling</li>
        </ul>
        <p><strong>Exposure:</strong> EPMM instances accessible over corporate networks or VPN connections</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_13dd09f2863edb79f18c40c52cdf0379e47eecaf5.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="790" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Risk Rules History from</em> <em><a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a></em> <em>Card® for CVE-2026-1340 in Recorded Future (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h2>Technical Deep Dive: Exploitation Analysis</h2>
        <h3>APT28's Operation Neusploit (CVE-2026-21509)</h3>
        <p><strong>The multi-stage attack chain:</strong> CVE-2026-21509 enables bypass of Office OLE mitigations through weaponized RTF files:</p>
        <ul>
          <li><strong>Initial delivery</strong> <strong>–</strong> Specially-crafted RTF file exploits CVE-2026-21509</li>
          <li><strong>Server-side evasion</strong> <strong>–</strong> Malicious DLL returned only for requests from targeted geographies with an expected HTTP User-Agent</li>
          <li><strong>Dropper variants</strong> <strong>–</strong> Two distinct infection paths deployed based on targeting:
            <ul>
              <li><strong>Variant 1 (MiniDoor):</strong> Writes VBA project to Outlook, modifies registry settings to enable macro execution, forwards emails to hardcoded recipient addresses</li>
              <li><strong>Variant 2 (PixyNetLoader):</strong> Creates mutex asagdugughi41, decrypts embedded payloads using rolling XOR key, establishes persistence via COM hijacking</li>
            </ul>
          </li>
        </ul>
        <p><strong>Why this matters:</strong> APT28 demonstrates sophisticated exploitation combining zero-day vulnerabilities with anti-analysis techniques, targeting government and business users for email collection and persistent access.</p>
        <div></div>
        <h3>Modular DS WordPress Plugin Exploitation (CVE-2026-23550 &amp; CVE-2026-23800)</h3>
        <p><strong>The authentication bypass chain:</strong> CVE-2026-23550 enables administrator-level access without authentication:</p>
        <ul>
          <li>Plugin treats requests as trusted based on request-supplied indicators rather than cryptographic verification</li>
          <li>/api/modular-connector/login flow grants access based on site connector enrollment state</li>
          <li>If no user identifier is supplied, the code selects an existing administrative user and establishes a privileged session</li>
          <li>CVE-2026-23800 represents the second exploitation path via REST API user creation: /?rest_route=/wp/v2/users&amp;origin=mo&amp;type=x</li>
        </ul>
        <p><strong>Known IoCs associated with CVE-2026-23550:</strong></p>
        <ul>
          <li>45[.]11[.]89[.]19</li>
          <li>185[.]196[.]0[.]11</li>
          <li>64[.]188[.]91[.]37</li>
        </ul>
        <p><strong>Known IoCs associated with CVE-2026-23800:</strong></p>
        <ul>
          <li>62[.]60[.]131[.]161</li>
          <li>185[.]102[.]115[.]27</li>
          <li>backup[@]wordpress[.]com</li>
          <li>backup1[@]wordpress[.]com</li>
        </ul>
        <p><strong>Why this matters:</strong> WordPress plugin vulnerabilities enable threat actors to compromise multiple sites from a single centralized management platform, amplifying attack impact.</p>
        <div></div>
        <h3>SmarterMail Authentication Bypass (CVE-2026-23760)</h3>
        <p><strong>The password reset flaw:</strong> CVE-2026-23760 exposes privileged password reset to anonymous callers:</p>
        <ul>
          <li>ForceResetPassword controller attribute explicitly permits unauthenticated access</li>
          <li>Backend ForcePasswordReset routine branches on client-supplied IsSysAdmin boolean rather than deriving account type from server-side context</li>
          <li>System administrator branch performs basic checks, then sets Password directly from the supplied NewPassword</li>
          <li>Logic fails to validate OldPassword, lacks an authenticated session requirement, and omits authorization controls</li>
        </ul>
        <p><strong>Why this matters:</strong> Complete administrative takeover without credentials enables threat actors to deploy web shells, modify configurations, and establish persistent access to mail server infrastructure.</p>
        <h2>Detection &amp; Remediation Resources</h2>
        <h3>Nuclei Templates from Insikt Group®</h3>
        <p>Recorded Future customers can access Nuclei templates for:</p>
        <ul>
          <li><strong>CVE-2025-8110 (Gogs) -</strong> Version detection and fingerprinting check</li>
          <li><strong>CVE-2026-23760 (SmarterMail) -</strong> Authentication bypass validation</li>
        </ul>
        <h3>Recorded Future Product Integrations</h3>
        <ul>
          <li><strong><a href="https://www.recordedfuture.com/products/vulnerability-intelligence">Vulnerability Intelligence</a></strong> – Prioritize based on active exploitation data, including APT28 targeting</li>
          <li><strong><a href="https://www.recordedfuture.com/products/attack-surface-intelligence">Attack Surface Intelligence</a></strong> – Discover exposed SmarterMail, Ivanti EPMM, and Modular DS assets</li>
          <li><strong><a href="https://www.recordedfuture.com/products/third-party-intelligence">Third-Party Intelligence</a></strong> – Monitor vendor vulnerabilities across your supply chain</li>
        </ul>
        <h2>January 2026 Summary</h2>
        <p><strong>State-sponsored zero-days return.</strong> APT28's exploitation of CVE-2026-21509 demonstrates continued Russian interest in email collection and persistent access through Office vulnerabilities.</p>
        <p><strong>Authentication bypass dominates enterprise risk.</strong> Multiple critical flaws in SmarterMail, Modular DS, and Cisco products enable complete administrative takeover without credentials.</p>
        <p><strong>Legacy vulnerabilities persist.</strong> CVE-2009-0556 (Microsoft Office) highlights how threat actors continue targeting unretired systems where patching has lagged for over a decade.</p>
        <h2>Take Action</h2>
        <p>Ready to see how Recorded Future can help your team detect state-sponsored exploitation, prioritize authentication bypass fixes, and reduce enterprise attack surface? Explore our <a href="https://www.recordedfuture.com/demo">demo center</a> for live examples, or dive deeper with <a href="https://www.recordedfuture.com/research">Insikt Group research</a> for technical threat intelligence.</p>
        <p><strong>About Insikt Group®:</strong></p>
        <p>Recorded Future's Insikt Group® is a team of elite analysts, linguists, and security researchers providing actionable intelligence to protect organizations worldwide. Our research combines human expertise with AI-powered analytics to deliver timely, relevant threat intelligence on emerging vulnerabilities and threat actor campaigns.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1eb057ac8d9e33292f2d343e2c01e9ea4a86902bd.jpg?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Preparing for Russia’s New Generation Warfare in Europe]]></title>
            <link>https://www.recordedfuture.com/research/preparing-for-russias-new-generation-warfare-in-europe</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/preparing-for-russias-new-generation-warfare-in-europe</guid>
            <pubDate>Tue, 24 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Russia is escalating its hybrid warfare against NATO into a coordinated, full-scale campaign blending cyber attacks, sabotage, and influence operations. Read the full report to understand what New Generation Warfare means for your organization.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Since its full-scale invasion of Ukraine in February 2022, Russia has waged what we assess is largely opportunistic, though increasingly aggressive, hybrid warfare in NATO territory. Moscow has very likely not yet leveraged its full capability to integrate cyber, political, and sabotage tools into a full-scale campaign.</p>
        <p>Over the next two years, Russian President Vladimir Putin will likely escalate Russia’s hybrid warfare campaign against NATO members into a full-fledged campaign likely consistent with a Russian military doctrine called New Generation Warfare (NGW). Putin will likely use this campaign to degrade NATO political unity and defense capabilities, reinforce Russia’s network of overt and covert assets across NATO, and optimize the physical and political environment, should Putin decide to launch a military incursion into NATO territory.</p>
        <p>In a full-scale NGW campaign in NATO territory, Russia would likely move from its current pattern of influence operations efforts combined with largely opportunistic cyber and sabotage targeting to a Europe-wide campaign that is more intentionally planned and aims to project Russian power and weaken European defenses on a systemic level. An NGW campaign would very likely involve Russia using the same tactics it is currently using, including sabotage operations, influence operations, territorial waters and airspace violations, and exploitation of some NATO states’ dependence on Russian oil and gas. The primary differences between Russia’s current operations in Europe and an NGW campaign would include greater geographic breadth of those operations; greater frequency of operations; and Russia likely using tactics simultaneously and in coordinated ways. For example, likely Russia-directed threat actors might use a drone to violate the airspace over a NATO state’s airport, forcing the temporary closure of that airport, coupled with a distributed denial-of-service attack on the airport’s internal communications system. Russia might then post a video of the incidents through one of its overt or covert propaganda outlets, arguing that they show NATO cannot adequately protect its aviation network.</p>
        <p>An NGW campaign in NATO territory would very likely have significant implications for private and public sector entities, including degradation of critical infrastructure, reputational risk for individuals and companies named in Russian influence operation campaigns, and reduced public confidence in the government’s ability to ensure their safety.</p>
        <p>Over the next three to five years, Putin will likely evaluate the feasibility of moving from an NGW-like campaign in Europe to a kinetic military incursion. Factors Putin would likely weigh when making such a decision include NATO military capabilities, the likelihood that the US would defend a NATO state if it were attacked, and Russian military capabilities. However, even if the necessary conditions for such an operation emerge, the probability of a proactive Russian military operation into NATO territory very likely remains low.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>Russia’s hybrid warfare campaign in NATO territory between February 2022 and January 2026 has been increasingly aggressive, but likely opportunistic and not reflective of Russia’s full cyber, influence operations, and sabotage capabilities.</li>
          <li>Putin likely views the next two years as an opportunity to test NATO’s defensive capabilities and prepare the physical and psychological environment, should he decide to launch a military incursion. Putin likely assesses that the 2028 US presidential election could lead to a US president more willing to commit US resources to NATO. As such, Putin likely views the next two years as an opportunity to exploit existing US-NATO tensions to weaken NATO’s unity and ability to defend itself.</li>
          <li>Russia’s escalated aggression against NATO over the next two years is likely to have the hallmarks of a Russian military doctrine called New Generation Warfare (NGW), which combines sabotage operations, cyberattacks, influence operations, and other non-military actions to undermine the enemy’s confidence and prepare the physical and psychological environment, should Russia elect to escalate into a kinetic military campaign.</li>
          <li>A full-scale NGW campaign would likely involve an intensified campaign of tactics Russia has used against NATO in the last few years, including sabotage operations, influence operations, violations of NATO airspace with drones and jets, violations of NATO states’ territorial waters, targeting of undersea cables, and exploitation of some NATO states’ dependence on Russian gas and oil. Russia would likely deploy these tactics more frequently, across more states simultaneously, and would likely use tactics simultaneously in an attempt to strain NATO resources.</li>
          <li>A full-scale NGW campaign would have significant implications for private and public sector entities operating in NATO territory, including disruption to critical services, reputational risk for individuals and firms named in influence campaigns, supply chain disruptions, and reduced public trust in the government’s ability to safeguard critical infrastructure. The fact that most of the critical infrastructure in NATO territory is privately owned means public-private partnerships will be essential in mitigating the impact of escalated Russian aggression.</li>
        </ul>
        <h2>Russia Likely to Escalate into New Generation Warfare Campaign in Europe Over Next Two Years</h2>
        <p>Since Russia’s full-scale invasion of Ukraine in February 2022, it has waged what Insikt Group assesses is largely opportunistic, though increasingly aggressive, hybrid warfare in Europe. These actions, though destructive, have very likely not leveraged Russia’s full capability to integrate cyber, political, and sabotage tools into a full-scale campaign.</p>
        <p>Nonetheless, Russian president Vladimir Putin very likely still prioritizes weakening European unity and defensive capabilities in service to his overarching foreign policy goal of <a href="https://mid.ru/en/foreign_policy/fundamental_documents/1860586/">replacing</a> the US-led international system with a multipolar world in which Russia, the US, and China are relatively equal in terms of geopolitical influence. Putin very likely judges that <a href="https://www.whitehouse.gov/wp-content/uploads/2025/12/2025-National-Security-Strategy.pdf">uneven</a> US assistance to European defensive efforts creates a window of opportunity for Russia to weaken Europe’s ability to resist Russian aggression. Putin likely views recent US-NATO tensions, such as the US’s articulated <a href="https://time.com/7354005/trump-davos-speech-greenland/">intention</a> to control Greenland, as an opportunity to exacerbate the strategic distance between the US and NATO, thereby weakening the transatlantic partnership that has formed the core of the US-led, post-World War II security architecture. Putin also likely views the next two years as an opportunity to optimize the physical and informational environment in Europe, should he decide to launch a kinetic military attack against Europe.</p>
        <p>Putin very likely views this window of opportunity as finite. He likely recognizes that the 2028 US presidential election could result in a US president more willing to commit US military and political resources to amplifying Europe’s defensive capabilities. As such, over the next two years, Putin will likely escalate Russia’s hybrid warfare against Europe into an expanded campaign that is likely consistent with the principles of Russian New Generation Warfare (NGW) –– a warfare doctrine <a href="https://www.armyupress.army.mil/portals/7/military-review/archives/english/militaryreview_20160228_art008.pdf">espoused</a> by senior Russian military officials emphasizing control of the information and psychological spaces, as well as the use of undeclared special forces, to weaken an enemy prior to using traditional military forces.</p>
        <p>Europe’s efforts to bolster its defenses against current levels of Russian hybrid warfare likely reinforce Putin’s perception that Europe is motivated to weaken Russia, thereby likely making him more motivated to target Europe. Putin’s perception that Europe’s defensive efforts are actually a threat to Russia is likely rooted in his calculus that NATO is fundamentally an anti-Russia bloc. Putin has substantiated this assessment by pointing to actions such as NATO’s expansion to include former Warsaw Pact countries and its decision to install missile defense systems in Poland.<sup>1</sup></p>
        <h2>New Generation Warfare Origins and Principles</h2>
        <p>Insikt Group assesses that much of Russia’s aggressive foreign policy actions since the annexation of Crimea in March 2014 –– which marked the beginning of Putin’s more assertive efforts to push back against perceived Western efforts to weaken Russia –– have been consistent with NGW, a Russian doctrine in which the state aims to bring about political change in another country primarily by using overt and covert influence tools, as opposed to conventional military force. These tools can include influence operations, sabotage operations, and exploiting economic leverage.</p>
        <p>New Generation Warfare is typically associated with Chief of the General Staff Valery Gerasimov’s 2013 <a href="https://www.armyupress.army.mil/portals/7/military-review/archives/english/militaryreview_20160228_art008.pdf">article</a> in the Russian journal <em>Military-Industrial Kurier</em>, though NGW is essentially a modern version of Soviet active measures. “Active measures” (<em>aktivnye meropriyatiya</em>) was a term <a href="https://www.marshallcenter.org/en/publications/security-insights/active-measures-russias-covert-geopolitical-operations-0">used</a> by the Soviet Union from the 1950s onwards to describe covert influence and subversion operations, including establishing front organizations, backing pro-Soviet political movements abroad, and attempting to orchestrate regime change in foreign countries. Active measures declined during the 1980s and 1990s, but Putin revived its use in the early 2000s. Indeed, in 2007, retired major-general Alexander Vladimirov alluded to that revival when he stated that “modern wars are waged on the level of consciousness and ideas” and that “modern humanity exists in a state of permanent war” in which it is “eternally oscillating between phases of actual armed struggle and constant preparation for it.”<sup>2</sup></p>
        <p>Despite the long history of Russia using active measures, Gerasimov’s 2013 article provides the most comprehensive account of how current Russian military leaders likely view this doctrine. Gerasimov’s article suggests that he views NGW both as the reality of modern warfare and as a preferred way of weakening enemies. Gerasimov argued that the Arab Spring demonstrated that modern wars are not declared conflicts between traditional militaries, but instead depend more on a combination of declared military force and tactics such as domination of the information space, targeting of critical enemy facilities, “asymmetric and indirect operations,” and the use of unofficial special forces. He argued that “the very ‘rules of war’ have changed. The role of nonmilitary means of achieving political and strategic goals has grown and, in many cases, they have exceeded the power of force of weapons in their effectiveness.”</p>
        <p>The following table, taken from a translation of the article, shows Gerasimov’s view of traditional warfare as opposed to New Generation Warfare:</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1a2e8f66cd46382f09a2845436e016ce2d9e46822.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="852" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>New Generation Warfare and traditional warfare forms and methods (Source:</em> <em><a href="https://www.armyupress.army.mil/portals/7/military-review/archives/english/militaryreview_20160228_art008.pdf">Military Review</a>)</em></div>
          </div>
        </div>
        <p>We assess that Russia’s campaign in Ukraine, starting with the annexation of Crimea in March 2014 and extending to its ongoing full-scale military operation, bears many of the hallmarks of NGW. Russia’s military operations more closely aligned with NGW principles from 2014 through 2021; after Russia’s full-scale invasion of Ukraine in February 2022, the Russian military transitioned to more traditional operations. Russia’s exploitation of influence operations and asymmetric warfare has been a feature of its operations since 2014, and since 2022, Russia has <a href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/">expanded</a> asymmetric and sabotage operations in Europe likely as part of a multi-faceted strategy to use power exertion in Ukraine and Europe to weaken the Western geopolitical system.</p>
        <p>This does not mean that Russian military leadership have consciously used NGW as their guiding principle in Ukraine at all times; indeed, we lack the insight into Russian military leadership thinking to assess with high confidence the principles they are employing. Rather, the combination of Gerasimov’s writings and observation of Russian operations in Ukraine means we can assess with medium confidence that Russia’s Ukraine operations prior to 2022 often reflected NGW principles. As such, we assess that NGW is a useful framework for understanding Russian military operations.</p>
        <div>
          <div>
            <div><strong>NGW Principle</strong></div>
            <div><strong>Example of How the Ukraine Operation Exemplifies Principle</strong></div>
          </div>
          <div>
            <div>Initiation of military operations by groupings of line units in peacetime</div>
            <div><strong>March 2014–February 2022:</strong> Russian regular line units (Russian Airborne Forces [VDV], Naval Infantry, and Main Intelligence Directorate [GRU]-controlled <a href="https://www.osce.org/sites/default/files/f/documents/d/1/220141.pdf">unit</a> formations) entered Ukrainian territory, <a href="https://digitallibrary.un.org/record/767883">annexed</a> Crimea, and <a href="https://www.osce.org/sites/default/files/f/documents/5/d/196991.pdf">operated</a> in eastern Ukraine without a declared state of war. In eastern Ukraine, troops operated under attempted deniability, with Moscow claiming the operations were being <a href="https://www.osce.org/sites/default/files/f/documents/1/f/146341.pdf">conducted</a> by sympathetic Ukrainian separatist forces.<br /><br /><strong>February 2022–January 2026:</strong> Though Russia acknowledged its presence throughout Ukraine, it still operates<sup>3</sup> without a full declaration of war, instead casting its campaign as a “special military operation.”</div>
          </div>
          <div>
            <div>Highly maneuverable, noncontact combat operations of interbranch groupings of line units</div>
            <div><strong>March 2014–February 2022:</strong> Russian battalion tactical groups (BTGs) generally <a href="https://www.rusi.org/explore-our-research/publications/commentary/getting-know-russian-battalion-tactical-group">demonstrated</a> high operational mobility, integrating ground forces, artillery, electronic warfare, and intelligence, surveillance, and reconnaissance (ISR) assets.<br /><br /><strong>February 2022–January 2026:</strong> As Russia has attempted to take more territory, it has <a href="https://www.rusi.org/explore-our-research/publications/commentary/attritional-art-war-lessons-russian-war-ukraine">transitioned</a> to a greater emphasis on attritional, contact-heavy warfare.</div>
          </div>
          <div>
            <div>Reduction of the military-economic potential of the enemy state via the destruction of critically important military and civilian infrastructure</div>
            <div><strong>March 2014–January 2026:</strong> Russia has consistently <a href="https://ukraine.ohchr.org/en/Increasing-attacks-on-Ukraine-s-energy-infrastructure-place-civilians-at-risk-UN-human-rights-monitors-warn">attempted</a> to degrade Ukraine’s critical infrastructure, including through long-range strikes and cyberattacks <a href="https://www.cisa.gov/news-events/ics-alerts/ir-alert-h-16-056-01">targeting</a> power plants, transportation and logistics hubs, and defense-industrial facilities.</div>
          </div>
          <div>
            <div>Mass use of precision weaponry, special operations forces, and robotics systems</div>
            <div><strong>March 2014–January 2026:</strong> Russia has increasingly <a href="https://en.defence-ua.com">used</a> precision weapons (for example, Iskander-M ballistic missiles, Kalibr cruise missiles, Kh-101/555 air-launched cruise missiles), GRU special operations <a href="https://www.osce.org/sites/default/files/f/documents/d/1/220141.pdf">units</a> (including the 3rd Separate Spetsnaz Brigade and the 346th Independent Spetsnaz Brigade); and <a href="https://www.dia.mil/Portals/110/Documents/News/Military_Power_Publications/UAV_Book.pdf">unmanned</a> systems (such as Orlan-10, Lancet, Shahid-136 drones, and ground robots for logistics and mine-clearing operations).</div>
          </div>
          <div>
            <div>Simultaneous effects on line-units and enemy facilities throughout the enemy state’s territory</div>
            <div><strong>March 2014–January 2026:</strong> Russia has <a href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-141a">conducted</a> strikes across Ukraine, using frontline units, operational rear units, missile and ground attacks, and cyber operations.</div>
          </div>
          <div>
            <div>Warfare simultaneously in physical and information space</div>
            <div><strong>March 2014–January 2026:</strong> Russia has consistently used covert and overt means to <a href="https://stratcomcoe.org/publications/analysis-of-russias-information-campaign-against-ukraine/151">propagate</a> narratives meant to justify intervention and regime change in Ukraine. These include <a href="https://www.euvsdisinfo.eu/report/ukraine-promotes-nazism-because-it-oppresses-russians/">allegations</a> of Nazism in the Ukrainian military and government writ large; discrimination against Russians in Ukraine; and Western government efforts to foment revolution in Ukraine.</div>
          </div>
          <div>
            <div>Use of asymmetric and indirect operations</div>
            <div>
              <p><strong>March 2014–February 2022:</strong> Russia’s operations were indirect because they <a href="https://www.congress.gov/crs_external_products/IF/PDF/IF12344/IF12344.3.pdf">included</a> non-acknowledged units, private military companies, and proxy forces such as Donetsk People’s Republic (DPR) and Luhansk People’s Republic (LPR) militias.</p>
              <p><strong>February 2022–January 2026:</strong> Russia escalated its use of asymmetric and indirect operations against Europe, including <a href="https://www.gov.uk/government/news/joint-expeditionary-force-activates-uk-led-reaction-system-to-track-threats-to-undersea-infrastructure-and-monitor-russian-shadow-fleet">targeting</a> undersea cables and critical infrastructure, likely to pressure Europe and Kyiv to abandon efforts to resist Russia’s Ukraine campaign.</p>
            </div>
          </div>
          <div>
            <div>Command and control of forces and assets in a unified information space</div>
            <div><strong>March 2014–January 2026:</strong> Russia has attempted to <a href="https://www.usmcu.edu/Outreach/Marine-Corps-University-Press/MCU-Journal/JAMS-vol-14-no-2/Russias-War-in-Ukraine/">integrate</a> its C2 structures, including shared ISR, targeting data, and operational planning, across services, and has centralized strike coordination for long-range fires.<br /><br />However, limitations have been <a href="https://www.congress.gov/crs_external_products/R/PDF/R47068/R47068.1.pdf">apparent</a> in Russia’s ability to accomplish this, especially since February 2022, likely stemming from deficiencies such as poor inter-service coordination, rigid command structures, and underestimation of Ukrainian capabilities and willingness to fight.</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>New Generation Warfare principles (Source: Recorded Future)</em></p>
        <h2>New Generation Warfare Toolkit</h2>
        <p>In a full-scale New Generation Warfare campaign in Europe, Russia would likely move from its current pattern of influence operations efforts combined with largely opportunistic cyber and sabotage targeting to a Europe-wide campaign that is both proactive and reactive. It would likely involve the same tactics Russia has used against NATO states for the past few years. The difference would likely be that Russia would deploy these tactics more frequently and across a greater number of states at once. A full NGW campaign would likely also involve using some operational methods simultaneously and in ways that amplify one another.</p>
        <p>Even in a full-scale NGW campaign, Russia would very likely aim to keep destruction below the threshold that risks NATO invoking Article 5. NATO officials have not specified precisely what the Article 5 threshold is; indeed, former NATO Secretary General Jens Stoltenberg <a href="https://ccdcoe.org/library/publications/cyber-attacks-and-article-5-a-note-on-a-blurry-but-consistent-position-of-nato/">stated</a> that the grounds for invoking Article 5 “must remain purposefully vague.” However, it is likely that it would include a mass casualty event or the use of a chemical or biological weapon. The text of Article 5 <a href="https://www.nato.int/en/what-we-do/introduction-to-nato/collective-defence-and-article-5">specifies</a> that the threshold involves “an armed attack.” NATO officials <a href="https://ccdcoe.org/library/publications/cyber-attacks-and-article-5-a-note-on-a-blurry-but-consistent-position-of-nato/">said</a> in 2022 that a cyberattack could constitute grounds for invoking Article 5, though they did not specify what kind of cyberattack would qualify.</p>
        <p>Russia is likely to face few downsides during an NGW campaign, due to minimal risk of Russian casualties and the campaign’s tactical flexibility. Unlike a conventional military campaign, which risks a high level of casualties that can cause domestic public dissatisfaction, an NGW campaign very likely would involve minimal risk to Russian citizens. In addition, an NGW campaign inherently offers significant tactical flexibility, as it is not a declared campaign in which Russia needs to articulate goals to justify the campaign to the Russian public and elites. As such, Putin would likely have the option to draw down tactics that are proving less effective and increase the use of more effective tactics, without needing to justify tactical failures. This flexibility would likely allow Putin to continue at least aspects of an NGW campaign in the likely event that Europe responds to an NGW campaign with escalated efforts to counter Moscow.</p>
        <h3>Influence Operations and Propaganda</h3>
        <p>Russian “active measures” serve as a force multiplier for Moscow’s broader political warfare, integrating influence operations, propaganda, and sabotage. In Europe, these efforts aim to weaken transatlantic cohesion, erode public and political support for Ukrainian sovereignty and assistance to Kyiv, and exacerbate internal societal divisions, economic uncertainty, and other challenges. By cultivating sanctions fatigue and encouraging selective bilateral re-engagement with Russia through active measures, Moscow seeks to mitigate its international isolation and <a href="https://www.cnas.org/publications/commentary/russia-wants-a-new-world-order">undermine</a> the rules-based international order, thereby advancing a Russia-favored multipolar system <a href="https://www.csis.org/blogs/post-soviet-post/four-myths-about-russian-grand-strategy">characterized</a> by exclusive spheres of influence. Notably, these activities also include angles of domestic preservation by portraying the West as chaotic, corrupt, and immoral, and thereby discouraging the expansion of liberal democracies elsewhere, particularly from within.</p>
        <p>Since Russia’s full-scale invasion of Ukraine in 2022, Insikt Group has observed concentrated Russian influence operations targeting the domestic audiences of what Moscow likely views as Kyiv’s core European supporters: the UK, France, Germany, and Poland. Insikt Group investigations, in addition to public reporting, have previously identified multiple influence operations targeting the above-mentioned major European allies, including Doppelgänger, Operation Overload, Operation Undercut, and CopyCop. These influence operations have commonly impersonated national and pan-European media outlets to disseminate messages aligned with Kremlin propaganda, including anti-Ukraine themes and content that denigrates pro-European political figures. Elsewhere, Russian influence operations have sought to use fear and physical demonstrations to manipulate public opinion. In France, for example, Russia-linked physical intimidation very likely intended to provoke public anxiety and societal unrest <a href="https://www.bbc.com/news/world-europe-67360768">included</a> the Star of David and red hand graffiti, as well as the <a href="https://www.lemonde.fr/en/pixels/article/2024/06/03/coffins-at-the-eiffel-tower-suspicions-point-to-another-case-of-russian-interference_6673608_13.html">placement</a> of caskets near the Eiffel Tower ahead of the 2024 Paris Olympic Games. Similar efforts have also appeared elsewhere in Europe, including the <a href="https://edition.cnn.com/2024/09/13/europe/pro-russian-posters-italy-intl-scli">emergence</a> of pro-Russian billboards in Italy and the "Children of War, Alley of Angels" <a href="https://eaworldview.com/2025/02/ukraine-war-europe-facing-trump-russia/">exhibit</a> in Germany.</p>
        <p>Russian influence efforts have also leveraged illicit financing and alleged bribery to attempt to favorably reshape European politics. For example, in spring 2024, Czech authorities <a href="https://www.politico.eu/article/czech-republic-russia-influence-voice-of-europe/">attributed</a> the Voice of Europe, an organization linked to Viktor Medvedchuk, to paying politicians in several EU countries to spread anti-Ukraine messages. In September and October 2024, Moldovan police <a href="https://www.reuters.com/world/europe/moldova-says-russia-linked-network-tried-buy-votes-2024-10-04/">reported</a> that a Russia-linked network, allegedly run by fugitive oligarch Ilan Shor, channeled tens of millions of dollars to buy votes ahead of Moldova’s October 20, 2024, presidential election and EU referendum. In December 2024, Romanian prosecutors <a href="https://www.reuters.com/world/europe/romania-probes-alleged-russian-linked-campaign-financing-tiktok-2024-12-06/">conducted</a> raids and opened probes into alleged illegal campaign financing and payments to TikTok users and influencers associated with the then-annulled presidential vote. More recently, former UK Member of the European Parliament (MEP) Nathan Gill was <a href="https://www.reuters.com/world/uk/former-uk-mep-jailed-accepting-bribes-linked-russia-2025-11-21/">sentenced</a> on November 21, 2025, after pleading guilty for accepting bribes to make pro-Russian statements.</p>
        <p>Insikt Group assesses Russia’s NGW against Europe will likely consist of aggressive influence operations targeting Europe that aim to erode European unity and advance Russia’s quest for a multipolar world order. NGW will very likely continue supporting Moscow’s core objectives of eroding political and public support for Ukrainian sovereignty and assistance to Kyiv, accelerate sanctions fatigue, and exploit domestic political crises and election cycles to fracture European cohesiveness and transatlantic cooperation. Moscow will likely expand its reliance on access to third parties and intermediaries, including sympathetic socio-political organizations and fringe movements, to launder Kremlin-aligned messages into the European information environment.</p>
        <p>Across Europe, Russia will almost certainly continue to attempt to delegitimize existing democratic institutions and Europe’s information ecosystem by continuing to foster distrust in elections, mainstream media, the EU, and pro-European government figures. In a post-war environment, assuming European sanctions on Russian media enterprises are lifted, Russia will very likely attempt to reestablish its state media presence while also hardening itself to withstand future disruptions, legal restrictions, and platform or government takedowns in the event of a kinetic conflict with Europe.</p>
        <p>New Generation Warfare operations against Europe will very likely incorporate much of Russia’s current-era influence tradecraft, including social media influence via human and automated networks, media impersonation and covert media outlet brands, illicit financing and bribery, and cyber-enabled influence such as hack-and-leak narratives. Further, Insikt Group assesses Moscow will very likely continue attempting to cultivate sympathetic allies through covertly funded fringe socio-political organizations, using these entities to astroturf “grassroots” support, amplify Kremlin-aligned narratives, and catalyze or intensify domestic unrest across Europe. We assess that Russia will also adapt emerging technologies, particularly AI, to scale the production, localization, and quality of influence content, increase dissemination efficiency, and optimize targeting. Continued advances in generative AI will almost certainly improve the realism of propaganda images and fabricated reporting, forged documents and correspondence, and synthetic impersonations of public figures, including audio and video deepfakes.</p>
        <h3>Airspace Incursions by Drones and Jets</h3>
        <p>Beginning in September 2025, suspected violations of NATO airspace by Russia-directed drone operators or Russian jets increased to unprecedented levels, as Russia likely sought to project power across NATO territory and test NATO resolve while maintaining plausible deniability. Insikt Group tracked 30 suspected or confirmed violations between September 2025 and January 2026, compared to 23 suspected or confirmed violations between March 2022 and August 2025. The most commonly targeted countries since March 2022 have been Poland and Romania; however, suspected Russian violations of NATO airspace have occurred outside of Russia’s historic sphere of influence, including in Germany, UK, Denmark and Norway. Violations have most frequently targeted critical infrastructure, such as military bases and airports.</p>
        <p>In a full-scale New Generation Warfare-like campaign in Europe, Russia likely would escalate the frequency and level of aggressiveness of these violations. Russia’s targeting would likely continue to focus on critical infrastructure, but violations would very likely significantly increase in frequency. Russia would also likely use drones to fly closer to targets and perhaps hover over them for extended periods of time, in a likely effort to test NATO’s willingness to shoot down drones and perhaps collect intelligence on critical infrastructure facilities. Indeed, in September 2025, Polish authorities said they <a href="https://www.bbc.com/news/articles/c147065pzdzo">shot</a> down Russian drones that violated Poland’s airspace.</p>
        <p>Other ways Russia would likely escalate the aggressiveness of its airspace violations include timing those violations with major NATO events, such as military exercises and summits. Russia could escalate its use of drones as electronic warfare mechanisms, perhaps to disrupt NATO military exercises or the functioning of critical infrastructure facilities.</p>
        <p>Russia would likely also use its drones to amplify its psychological warfare as a way of projecting power and demonstrating to the public that Moscow can disrupt everyday life in NATO countries. Russia could do this via tactics such as hovering drones over civilian transportation infrastructure, like railways or airports, which have already been <a href="https://www.cbsnews.com/news/drones-europe-nato-airports-russia-hybrid-warfare-belgium-uk-anti-drone-troops/">forced</a> to temporarily close. Russia could also launch drones over facilities hosting political summits, such as the annual NATO Summit, or over polling places during elections to stoke public fear. In a full-scale NGW campaign that involves coordination of multiple tactics, Russian propaganda outlets might release footage of these incidents to propagate a narrative that NATO states cannot protect their infrastructure. Russia could also combine drone or jet violations with sabotage operations to further sow public panic and force NATO governments into a defensive posture.</p>
        <p>Russia would very likely seek to maintain some level of deniability and would avoid airstrikes and mass casualty events, which would almost certainly guarantee an Article 5 declaration.</p>
        <h3>Territorial Waters Violations and Targeting of Undersea Cables</h3>
        <p>Insikt Group assesses that, since February 2022, Russia has increasingly used violations of NATO states’ territorial waters<sup>4</sup> and targeting of undersea cables to test the alliance’s resilience, collect intelligence, keep NATO in a reactive, defensive posture, and attempt to deter NATO from undermining Russian strategic interests. In June 2023, Deputy Chairman of the Security Council Dmitriy Medvedev <a href="https://www.reuters.com/world/europe/russias-medvedev-says-moscow-now-has-free-hand-destroy-enemies-undersea-2023-06-14/">stated</a> that, “if we proceed from the proven complicity of Western countries in blowing up the Nord Streams, then we have no constraints — even moral — left to prevent us from destroying the ocean-floor cable communications of our enemies.” Medvedev’s comments were likely purposefully hyperbolic; however, they likely reflect a Kremlin perception that NATO is targeting Russian strategic interests, thereby justifying retaliatory action.</p>
        <p>Examples of Russia likely targeting undersea cables and maritime assets include an April 2025 incident in which the UK <a href="https://www.thetimes.com/uk/defence/article/russia-secret-war-uk-waters-submarines-dpbzphfx5">identified</a> Russian sensors attempting to collect intelligence on UK nuclear submarines and other underwater critical infrastructure; the Russian Yantar surveillance ship <a href="https://www.theguardian.com/world/2024/nov/16/russian-spy-ship-escorted-away-from-internet-cables-in-irish-sea">sailing</a> near cables carrying data for Google and Microsoft under the Irish Sea in November 2024; and reports suggesting that the Russian Eagle S ship accused of damaging multiple undersea cables in December 2024 <a href="https://www.lloydslist.com/LL1151955/Russia-linked-cable-cutting-tanker-seized-by-Finland-was-loaded-with-spying-equipment">carried</a> spy equipment to monitor naval activity.</p>
        <p>Russian ships have also violated NATO states’ territorial waters, likely to test NATO resilience, force NATO into a defensive posture, and project power. Examples include a July 2025 incident in which a Russian border guard vessel <a href="https://news.err.ee/1609755954/russian-border-guard-vessel-violates-estonia-s-maritime-border">entered</a> Estonian territorial waters without permission; a July 2024 incident in which a Russian naval vessel <a href="https://www.rferl.org/a/finland-russia-vessel-border-guard-territorial-waters/33052301.html?utm_source=chatgpt.com">entered</a> Finnish territorial waters without authorization; and frequent <a href="https://apnews.com/article/nato-russia-shadow-fleet-jets-ukraine-sanctions-oil-revenue-5e74109e5b1d84dc73ac2592068d4689">encounters</a> between NATO states and Russia-linked “shadow fleet” vessels. These vessels are tankers sailing under other flags, which often refuse inspection or orders from local navies.</p>
        <p>During a full-scale New Generation Warfare campaign against NATO, Russia likely would escalate its targeting of undersea cables and violations of territorial waters. This could include more frequent cable targeting, likely to cause minor but persistent damage to undersea critical infrastructure that tests NATO resilience and Russian destructive capabilities without provoking an Article 5 declaration. Russia could also conduct electronic jamming operations during cable repairs to inhibit communications and use Russian ships to harass those conducting repairs.</p>
        <p>Russia would also likely attempt longer and more provocative territorial waters violations, including placing Russian ships near NATO vessels and expanding these activities into areas such as the Mediterranean; conducting concurrent hybrid activity such as GPS jamming and automatic identification system (AIS) spoofing; refusing escort out of territorial waters; and combining territorial waters violations with airspace violations by Russian aircraft or targeting of undersea infrastructure.</p>
        <p>Russia would likely aim to overwhelm NATO’s existing efforts to prevent sabotage of undersea infrastructure. In January 2025, Allied Joint Force Command Brunssum (JFCBS) <a href="https://shape.nato.int/operations/operations-and-missions/baltic-sentry">launched</a> Baltic Sentry — a campaign that uses tools such as frigates, maritime patrol assets, and naval drones to deter sabotage of undersea infrastructure. Since the launch of Baltic Sentry, the Baltic Sea has <a href="https://www.atlanticcouncil.org/in-depth-research-reports/issue-brief/how-the-baltic-sea-nations-have-tackled-suspicious-cable-cuts/">experienced</a> very few undersea sabotage efforts; however, it is not clear whether this is the result of Baltic Sentry or a lack of planned operations.</p>
        <h3>Sabotage Operations</h3>
        <p>We assess Russia has escalated its use of sabotage operations in NATO territory since its full-scale invasion of Ukraine in 2022, likely to test the resilience particularly of NATO states’ critical infrastructure; propagate a narrative that Western states cannot protect their populations from threats; harm NATO’s ability to collectively respond to Russian aggression by forcing NATO into a reactive, defensive posture; and degrade NATO states’ ability to provide material support to Ukraine. Sabotage operations are loosely defined, but typically <a href="https://www.rferl.org/a/parcels-exploded-russian-plot/33189080.html">consist</a> of targeting <a href="https://apnews.com/article/lithuania-russia-intelligence-arson-attack-ikea-vilnius-b7f915c6376c0711b852657d17a30c0d">civilian</a> or dual-use <a href="https://foreignpolicy.com/2024/07/26/russia-sabotage-poison-finland-water-treatment/">infrastructure</a> with physical security attacks by deniable entities.</p>
        <p>Particularly since 2022, Russia-linked entities have focused sabotage operations on critical infrastructure in NATO states, exploiting vulnerabilities wrought from <a href="https://www.fme.nl/system/files/publicaties/2023-12/rapport%20infra%20maintenance%20EU%20%2B%20intro.pdf">deferred</a> maintenance and lack of sufficient public or private <a href="https://www.visualcapitalist.com/sp/charted-europes-2-trillion-infrastructure-investment-deficit-gxeu01/">investment</a> in upkeep. Within critical infrastructure, the most frequently <a href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/">targeted</a> sectors include undersea telecommunication and power cables; water supply and distribution; transportation; military; healthcare; and telecommunications. The number of Russian sabotage operations has quadrupled from 2023 to 2024, and in 2025, it was likely at levels consistent with 2024. Operations have occurred across NATO, as opposed to being focused in Russia’s historic sphere of influence. That said, the most commonly <a href="https://www.iiss.org/research-paper/2025/08/the-scale-of-russian--sabotage-operations--against-europes-critical--infrastructure/">targeted</a> states between January 2018 and June 2025 were Germany, Estonia, Latvia, Lithuania, and Poland.</p>
        <p>In a New Generation Warfare-like campaign targeting NATO territory, Moscow would likely move from what we assess has thus far been largely opportunistic sabotage to operations with more consistency and geographic breadth, and that complement other tactics.</p>
        <p>Russia would likely still focus its sabotage operations on critical infrastructure, but would likely place a premium on damaging the critical infrastructure of NATO states that either would be probable targets of a Russian military incursion — such as Poland or the Baltic states — or would lend significant assistance to those states, such as the UK, Germany, or France. This is because in an NGW campaign, Russia would likely view sabotage operations as, in part, a way to test the resilience of potential victim states and their allies. Russia’s sabotage operations against those targets would likely be more frequent and could coincide with significant events such as elections or military exercises. Russia would likely pair sabotage operations with other tactics, such as offensive cyber operations or airspace violations, to augment the destructive impact of the operations and try to strain NATO states’ capacity by forcing them to respond to multiple disruptions at once, while still staying below the threshold that would risk an Article 5 declaration.</p>
        <h3>Offensive Cyber Operations for Disruption and Counterintelligence</h3>
        <p>Russian cyber activity directed at European targets has consistently emphasized access-oriented operations, including attacks on internet-facing firewalls, virtual private networks (VPNs), email services, and web portals. This activity aligns with documented Russian cyber practices focused on enabling intelligence collection, operational reach, and long-term flexibility rather than immediate disruptive effects. Recent Insikt Group reporting highlights BlueEcho activity targeting perimeter infrastructure to establish footholds and enable follow-on credential capture and lateral movement, while BlueDelta campaigns demonstrate sustained credential harvesting at scale using impersonated Microsoft Outlook Web App (OWA), Sophos VPN, and Google login workflows. This tradecraft is low-cost, repeatable, and consistent with long-term counterintelligence targeting of government, defense, and research entities.</p>
        <p>Russian cyber activity affecting Europe has been broad in scope, with targeting observed across <a href="https://www.recordedfuture.com/research/gru-linked-bluedelta-evolves-credential-harvesting">multiple regions and sectors</a>. If cyber operations were used for more overtly disruptive purposes, effects would likely be more pronounced in states with weaker cybersecurity maturity or slower coordinated response mechanisms, such as fragmented local-government IT environments or limited national incident response surge capacity. This does not preclude activity against major NATO states, where Russian cyber operations have historically focused more heavily on intelligence collection and access. BlueDelta’s targeting of NATO-aligned and defense-related organizations reflects continued Russian interest in strategically valuable European targets aligned with GRU intelligence requirements.</p>
        <p>Observed Russian cyber activity also provides insight into how operations could escalate if strategic conditions were to change and Russia were to launch a full-scale NGW campaign. Russian threat actors have demonstrated the ability to establish and maintain access over time, including through persistent connections and tunneling, which could be repurposed to degrade remote access services, manipulate edge-device configurations, or cause temporary service disruption. In Ukraine, cyber activity has been observed alongside influence operations and physical sabotage, including Recorded Future–tracked influence campaigns such as <a href="https://www.recordedfuture.com/research/copycop-deepens-its-playbook-with-new-websites-and-targets">CopyCop</a>, which leveraged automated content replication and spoofed media infrastructure to amplify pro-Russian narratives in parallel with other forms of hybrid activity. If applied elsewhere, similar coordination could increase pressure on incident response capabilities and undermine public confidence in the reliability of essential services. Credential-harvesting operations further provide pathways beyond inbox access, including potential compromise of identity providers, VPN portals, and privileged administrative portals.</p>
        <p>Russian cyber operations have historically involved establishing and maintaining access to targeted networks over extended periods, a pattern also <a href="https://www.security.com/blog-post/ukraine-russia-attacks">documented</a> in prior campaigns in Ukraine. However, there is no public evidence demonstrating that the access currently observed in European networks is intended for future disruptive operations. If a kinetic conflict were to escalate in Europe, Russia would likely seek to expand or prioritize access within relevant networks to support intelligence collection, operational coordination, or potential disruption. Russia also has a <a href="https://www.recordedfuture.com/research/dark-covenant-3-controlled-impunity-and-russias-cybercriminals">documented</a> history of tolerating or leveraging cybercriminal activity alongside state-directed operations, including overlap with criminal infrastructure and access brokers, which may allow operators to expand scale, complicate attribution, and generate disruptive effects without overtly exposing state-linked capabilities. Collectively, activity associated with BlueAlpha, BlueDelta, BlueEcho, Sandworm, and Dragonfly illustrates Russia’s ability to scale cyber operations from access and intelligence collection toward disruption if strategic conditions were to change, consistent with broader hybrid and New Generation Warfare practices.</p>
        <h3>Exploitation of European Dependence on Russian Oil and Natural Gas</h3>
        <p>Russia has long exploited other states’ dependence on its natural gas and oil to exercise leverage over them, typically by strategically <a href="https://www.reuters.com/world/poland-bulgaria-face-russian-gas-cut-ukraine-crisis-escalates-2022-04-26/">decreasing</a> supply flows, particularly during high-demand periods, such as winter. For example, in 2006, Georgia <a href="https://www.rferl.org/a/1064976.html">accused</a> Russia of intentionally cutting gas supplies during an unusually cold period to increase political pressure on Tbilisi. In the run-up to Russia’s full-scale invasion of Ukraine in February 2022, Russian state gas company Gazprom <a href="https://www.reuters.com/world/europe/gazprom-cuts-gas-flows-europe-ukraine-tensions-2021-10-06/">reduced</a> natural gas deliveries to Europe, likely in an effort to pressure Europe into abandoning a unified stance on supporting Ukraine.</p>
        <p>Since 2022, many NATO states have sought to <a href="https://gasoutlook.com/analysis/europe-breaks-with-russian-gas-but-still-depends-on-the-u-s/">reduce</a> their dependence on Russian natural gas and oil; however, several states remain dependent, including <a href="https://pism.pl/publications/slovakia-remains-dependent-on-russian-energy">Slovakia, Hungary, and Türkiye</a>. In a full-scale New Generation Warfare campaign in Europe, Russia would very likely escalate its exploitation of those states’ dependence on Russian energy imports to demonstrate Moscow’s ability to degrade European critical infrastructure, undermine NATO unity, gauge the resilience of these states’ critical infrastructure, and test Russia’s ability to handicap critical infrastructure, should Putin decide to launch a military incursion into NATO territory.</p>
        <p>Moscow’s willingness to exploit these states’ dependence on Russian energy likely varies by state. Moscow is less likely to exploit Hungary’s dependence on Russian oil and gas, given Budapest’s <a href="https://www.bbc.com/news/articles/c058lny3pdqo">strong</a> relations with Russia. Slovakia is a more likely target, as it seeks a <a href="https://www.reuters.com/business/energy/slovakia-wants-normalise-relations-with-russia-ramping-up-gas-imports-pm-fico-2025-09-02/">positive</a> relationship with Moscow, but is likely of less strategic importance to Russia than Hungary. Moscow’s relations with Türkiye have <a href="https://carnegieendowment.org/research/2024/10/understanding-turkiyes-entanglement-with-russia">fluctuated</a> between positive and adversarial; the likelihood of exploiting Türkiye’s dependence on Russian energy imports would likely depend, in part, on how positive the overall Russia-Türkiye relationship is at that time.</p>
        <p>Escalation of economic critical infrastructure targeting would likely take the form of both more frequent and more geographically broad operations, particularly during high-demand periods such as the winter and perhaps during NATO military exercises or elections. Russia could also escalate its use of pricing manipulation to punish states that work against Russia’s strategic priorities in Ukraine, and reward pro-Russia states such as Hungary.</p>
        <p>Russia would also likely combine supply cuts with sabotage operations. For example, in 2006, Moscow <a href="https://www.reuters.com/article/world/georgia-hit-by-gas-cut-and-power-line-blast-idUSL08601420060122/">cut</a> gas supplies in Georgia at the same time it sabotaged an electricity line. Following a successful operation, pro-Russia propaganda outlets would likely amplify narratives that claim European critical infrastructure is weak and vulnerable, and that this demonstrates the inadequacy of democracy and the Western political system writ large at fulfilling basic public needs.</p>
        <p>In a New Generation Warfare campaign against Europe, Russia would be unlikely to seek permanent damage to European critical infrastructure or mass civilian harm from disruption of energy flows. Russia would also likely avoid long-term disruption of oil and gas deliveries to limit the financial impact, since oil and gas revenues <a href="https://www.reuters.com/business/energy/russias-oil-gas-budget-revenue-set-sink-46-january-reuters-calculations-show-2026-01-19/#:~:text=Summary,the%20same%20month%20in%202024.">comprise</a> roughly 25% of Russia’s annual federal revenue.</p>
        <h2>Indicators of NGW Campaign in Europe, Implications for Public and Private Sectors, and Recommended Mitigations</h2>
        <h3>Tactic: Influence Operations</h3>
        <h4>Indicators of NGW Campaign</h4>
        <ul>
          <li>Increased convergence of narratives across propaganda outlets, including state media, inauthentic social media accounts, and so on</li>
          <li>Parallel narratives tailored to each country or region</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public Sector:</strong> more pronounced political polarization; reduced public trust in government competence</li>
          <li><strong>Private Sector:</strong> brand damage if firms are targeted in influence operation (IO) campaigns; employee or executive harassment or doxxing</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Ensure communication response protocols are in place, such as rapid rebuttal measures</li>
          <li>Ensure information environment monitoring is attuned to Russia-nexus narratives so inauthentic behavior can be detected quickly</li>
        </ul>
        <h3>Tactic: Airspace Incursions by Drones and Jets</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>More frequent incursions that last longer and target strategic sites such as military training grounds, critical infrastructure nodes, and so on</li>
          <li>Incursions are conducted at lower altitudes, with transponders turned off</li>
          <li>Violations are clustered around NATO decisions or major military exercises</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> forced closures of critical infrastructure sites during airspace violations, thereby disrupting operations, as well as likely escalation of public alarm and potential decrease in public confidence in the government’s ability to keep critical infrastructure safe</li>
          <li><strong>Private:</strong> business operation disruptions due to critical infrastructure closures</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Strengthen counter-measures against unmanned aircraft systems (UASs) around critical sites</li>
          <li>Ensure joint civil-military air incident protocols are in place, including aviation alerts and Notice to Airmen (NOTAM) coordination</li>
          <li>Improve GPS resilience</li>
        </ul>
        <h3>Tactic: Territorial Waters Violations and Targeting of Undersea Cables</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>More frequent territorial waters violations</li>
          <li>Violations by state-linked vessels</li>
          <li>Non-compliance with escort or hails; risky maneuvering around NATO state vessels, perhaps to provoke potential collisions</li>
          <li>Increased loitering of suspicious vessels near cable routes and landing areas</li>
          <li>Repeated “anchor drag” incidents</li>
          <li>Interference with repair ships</li>
          <li>Simultaneous cyber activity against telecommunications and energy operators</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> intermittent communications degradation; potential harm to energy infrastructure</li>
          <li><strong>Private:</strong> major potential operational losses for telecommunications, finance, and other key sectors; potential increases in insurance costs for shipping companies, should territorial waters violations at ports become common</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Consider mapping alternative sea routes in case primary routes are disrupted; consider rapid reroute contracts</li>
          <li>Ensure sufficient port and state coordination</li>
          <li>Ensure physical hardening at cable landing sites</li>
          <li>Expand Baltic Sentry efforts to other locations</li>
        </ul>
        <h3>Tactic: Sabotage Operations</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>More frequent operations, including arson, vandalism, explosions, and rail disruptions</li>
          <li>Targeting of high-priority sites, such as military logistics hubs, defense suppliers, and so on</li>
          <li>Targeting of civilian sites, such as shopping malls or residential neighborhoods</li>
          <li>Concurrent operations in multiple geographic regions, suggesting intentional planning</li>
          <li>Combined sabotage operations and airspace or territorial waters violations</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> potential reduction in public confidence in government’s ability to protect critical infrastructure and residential areas; in the event of significant escalation in sabotage operations, emergency services could be strained</li>
          <li><strong>Private:</strong> facility damage or loss; threat to worker safety; supply chain interruption; business interruption; reputational liability</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Expand insider threat and contractor vetting at critical infrastructure sites</li>
          <li>Ensure physical security measures are in place, including perimeter detection, anti-drone measures, camera coverage, and access control</li>
          <li>Enhance public-private partnerships, as most of the critical infrastructure NATO relies upon is commercially owned</li>
          <li>Ensure rapid liaison channels with law enforcement and intelligence services</li>
        </ul>
        <h3>Tactic: Offensive Cyber Operations</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>Campaigns that target strategic pressure points, such as logistics and transportation hubs, defense supply chains, and local government entities</li>
          <li>Intrusion and distributed denial-of-service (DDoS) activity spikes at politically significant moments, including elections, military exercises, or geopolitical summits</li>
          <li>Campaigns that blend state and proxy activity, such as hacktivist DDoS campaigns that amplify Kremlin-aligned narratives</li>
          <li>Coupling of multiple tactics, such as cyber and influence operation hybrid campaigns</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> DDoS and ransomware campaigns can undermine public confidence in the reliability of institutions; compromise of government narratives can result in less public confidence in the truth of government messaging; even attempted election manipulation can reduce confidence in voting systems</li>
          <li><strong>Private:</strong> elevated risk of disruption of key logistics, transport, rail, and aviation systems; hack and leak operations pose risk to reputation, personally identifiable information, and intellectual property rights; targeting of critical infrastructure can result in operational disruption</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Enforce phishing-resistant multi-factor authentication</li>
          <li>Implement conditional network access based on geopolitical and risk factors</li>
          <li>Patch for commonly exploited software</li>
          <li>Reduce exposure (lock down admin portals; restrict by IP address; remove unused services)</li>
          <li>Use DDoS protection, autoscaling</li>
          <li>Coordinate with the national computer emergency response team (CERT) and National Counterintelligence and Security Center (NCSC), as well as upstream providers; rehearse continuity plans</li>
          <li>Require multi-factor authentication (MFA) and logging parity from third-party providers; segment privileged access; monitor for abnormal remote management activity</li>
        </ul>
        <h3>Tactic: Leveraging Economic Dependence</h3>
        <h4>Indicators of an NGW Campaign</h4>
        <ul>
          <li>Supply manipulation, including threats or actions to raise price volatility</li>
          <li>Exploitation of legal measures, including sudden contract disputes or claims of force majeure</li>
          <li>More frequent cessation of oil and gas supplies, especially during high-demand periods such as winter</li>
        </ul>
        <h4>Implications for Public and Private Sectors</h4>
        <ul>
          <li><strong>Public:</strong> higher energy bills and supply disruption, potentially leading to public dissatisfaction</li>
          <li><strong>Private:</strong> price shocks, supply uncertainty, costs related to resolving alleged contract disputes</li>
        </ul>
        <h4>Recommended Mitigations</h4>
        <ul>
          <li>Diversify suppliers and routes</li>
          <li>Ensure on-site backup generation where feasible</li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_17cedbb65db54e421fed3abc0cc62f5ed6f6fa0aa.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[2025 Cloud Threat Hunting and Defense Landscape]]></title>
            <link>https://www.recordedfuture.com/research/2025-cloud-threat-hunting-defense-landscape</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/2025-cloud-threat-hunting-defense-landscape</guid>
            <pubDate>Thu, 19 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Threat actors are doubling down on cloud infrastructure — exploiting misconfigurations, abusing native services, and pivoting through hybrid environments to maximize impact. See how attack patterns are evolving across exploitation, ransomware, credential abuse, and AI service targeting in this latest cloud threat roundup.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Insikt Group has observed continued trends of growth and increased activity of threat actors leveraging and exploiting cloud infrastructure to broaden the number of victims they target and infect. Recent reporting across the observed incidents shows that cloud-focused threats are converging on a few consistent patterns, which serve as the main sections of this report:</p>
        <ul>
          <li>Exploitation and Misconfiguration</li>
          <li>Cloud Abuse</li>
          <li>Cloud Ransomware</li>
          <li>Credential Abuse, Account Takeover, and Unauthorized Access</li>
          <li>Third-Party Compromise</li>
        </ul>
        <p>Across cases, initial access frequently comes from vulnerable or misconfigured services exposed to the internet — including application delivery controllers, monitoring dashboards, email security gateways, and enterprise resource planning (ERP) platforms — as well as stolen or weakly governed credentials sourced from public leaks, compromised developer workstations, and socially engineered helpdesk workflows. Once inside a targeted environment, threat actors systematically pivot through hybrid identity and virtual private network (VPN) infrastructure, targeting directory-synchronized accounts, non-human and executive identities, and privileged cloud roles to gain tenant-wide administrative control.</p>
        <p>Post-compromise activity is characterized by heavy use of built-in cloud and SaaS functionality: enumerating and exfiltrating data via native storage and backup services, destroying or encrypting cloud backups and snapshots for impact, manipulating static frontends and continuous integration/continuous deployment (CI/CD) pipelines to subvert trust in applications and repositories, and using mainstream platforms such as calendar services as covert command-and-control (C2) channels.</p>
        <p>In comparison to its previous <a href="https://www.recordedfuture.com/research/cloud-threat-hunting-defense-landscape">iteration</a>, the majority of the events discussed in this report indicate that threat actors are engaging in similar threat behaviors; however, there are three specific trends that appear to have emerged since the most recent iteration:</p>
        <ul>
          <li>Cloud threat actors are registering their own legitimate cloud resources for use in attack chains.</li>
          <li>DDOS attacks are becoming less effective when targeting cloud environments, even in instances of record-breaking throughput, due to increased cloud-native capabilities for mitigating these threats.</li>
          <li>Cloud threat actors are increasingly diversifying the types of services that they target in victim environments during an attack chain, with a notable focus on LLM and other AI-powered services hosted in cloud environments.</li>
        </ul>
        <p>The trends associated with abuse indicate a shift in threat actor perception, demonstrating that threat actors are exploring the broader benefits that compromised cloud services can provide.</p>
        <p><strong><a href="https://assets.recordedfuture.com/Executive-Insights/CTA-20260219_Cloud_Threat_Landscape_Exec_Report.pdf">Download Cloud Threat Landscape: Executive Insights</a></strong></p>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_1dd2d1174c3e28d579004a1fe4f44c24107a72547.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[GrayCharlie Hijacks Law Firm Sites in Suspected Supply-Chain Attack]]></title>
            <link>https://www.recordedfuture.com/research/graycharlie-hijacks-law-firm-sites-suspected-supply-chain-attack</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/graycharlie-hijacks-law-firm-sites-suspected-supply-chain-attack</guid>
            <pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[GrayCharlie turns compromised WordPress sites into malware delivery machines. Discover how this threat actor chains fake browser updates and ClickFix lures to deploy NetSupport RAT, Stealc, and SectopRAT.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Insikt Group has been monitoring GrayCharlie, a threat actor overlapping with SmartApeSG and active since mid-2023, for some time, and is now publishing its first report on the group. GrayCharlie compromises WordPress sites and injects them with links to externally hosted JavaScript that redirects visitors to NetSupport RAT payloads delivered via fake browser update pages or ClickFix mechanisms. These infections often progress to the deployment of Stealc and SectopRAT. Insikt Group identified a large amount of infrastructure linked to GrayCharlie, primarily tied to MivoCloud and HZ Hosting Ltd. This includes NetSupport RAT command-and-control (C2) servers, both actor-controlled and compromised staging infrastructure, and higher-tier infrastructure used to administer operations. While most compromised websites appear to be opportunistic and span numerous industries, Insikt Group identified a cluster of United States (US) law firm sites that were likely compromised around November 2025, possibly through a supply-chain compromise involving a shared IT provider.</p>
        <p>To protect against GrayCharlie, security defenders should block IP addresses and domains tied to associated remote access trojans (RATs) and infostealers, flag and potentially block connections to compromised websites, and deploy updated detection rules (YARA, Snort, Sigma) for current and historical infections. Other controls include implementing email filtering and data exfiltration monitoring. See the <strong>Mitigations</strong> section of this report for implementation guidance and <strong>Appendix A</strong> for a complete list of indicators of compromise (IoCs).</p>
        <h2>Key Findings</h2>
        <ul>
          <li>GrayCharlie, which overlaps with SmartApeSG and first emerged in mid-2023, is a threat actor that injects links to externally hosted JavaScript into compromised WordPress sites. These links redirect victims to NetSupport RAT infections delivered via fake browser update pages or ClickFix techniques, ultimately resulting in Stealc and SectopRAT infections.</li>
          <li>Insikt Group identified a wide range of GrayCharlie infrastructure, largely associated with MivoCloud and HZ Hosting Ltd. This includes NetSupport RAT command-and-control (C2) servers, staging infrastructure made up of both actor-controlled and compromised infrastructure, as well as components of GrayCharlie’s higher-tier infrastructure used to manage its operations.</li>
          <li>Insikt Group identified two primary attack chains associated with GrayCharlie: one in which victims encounter fake browser update pages after visiting compromised websites, and another in which they are presented with a ClickFix pop-up, a technique that has become increasingly common in 2025.</li>
        </ul>
        <h2>Background</h2>
        <p>GrayCharlie is Insikt Group’s designation for a threat activity group that first appeared in mid-2023 and is behind SmartApeSG, also referred to as ZPHP or HANEYMANEY. The group’s operations typically involve injecting malicious JavaScript into legitimate but compromised WordPress sites. Visitors to these sites are shown convincing, browser-specific fake update prompts (such as for Chrome, Edge, or Firefox) that encourage them to download what appears to be an update but is actually malware.</p>
        <p>In late March or early April 2025, SmartApeSG <a href="https://www.malware-traffic-analysis.net/2025/06/18/index.html">shifted</a> from using fake browser updates to deploying ClickFix lures, mirroring a broader trend among threat actors of increasingly adopting ClickFix.</p>
        <p>GrayCharlie predominantly delivers NetSupport RAT; however, deployments of Stealc and, more recently, SectopRAT, have been observed in rare instances. The group’s ultimate objectives remain uncertain. Current evidence suggests a focus on data theft and financial gain, with a theoretical, but unsubstantiated, possibility that it may sell or transfer access to other threat actors.</p>
        <h2>Threat Analysis</h2>
        <p>Insikt Group has been tracking GrayCharlie for an extended period and has observed the actor’s persistent behavior since its emergence in 2023. GrayCharlie continues to conduct the same types of operations, regularly deploying large volumes of new infrastructure and adhering to consistent tactics, techniques, and procedures (TTPs), including continued use of the same infection chains and NetSupport RAT payloads. The group targets organizations worldwide, with a particular focus on the US. The following sections provide a detailed examination of GrayCharlie’s operational infrastructure and its two primary attack chains.</p>
        <h3>Infrastructure Analysis</h3>
        <h4>NetSupport RAT Clusters</h4>
        <p>Insikt Group identified two main NetSupport RAT clusters linked to GrayCharlie based on factors such as TLS certificates, NetSupport serial numbers and license keys, and the timing of the activity (see <strong>Figure 1</strong>). In addition, Insikt Group identified a range of other NetSupport RAT C2 servers linked to GrayCharlie activity, but which are not currently attributed to either of the two main clusters. Insikt Group assesses that these clusters may correspond either to different individuals associated with GrayCharlie or to distinct GrayCharlie campaigns. The clusters are further described below.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_14fd6cf6079b29690c9ef99e5ec9308e54ce5364d.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="618" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>Overview of GrayCharlie clusters observed in 2025 (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h5>Cluster 1</h5>
        <p>Cluster 1 comprises NetSupport RAT C2 servers whose TLS certificates display a recurring monthly naming pattern. All servers in this cluster are hosted by MivoCloud and were deployed between March and August 2025. Notably, NetSupport RAT samples associated with the cluster’s March and April infrastructure used the license key <code>DCVTTTUUEEW23</code> and serial number <code>NSM896597</code>, before shifting to the license key <code>EVALUSION</code> and serial number <code>NSM165348</code> in subsequent deployments. The C2 servers associated with this cluster are listed in <strong>Table 1</strong>.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>TLS Common Name</strong></div>
            <div><strong>License Key</strong></div>
            <div><strong>Serial Number</strong></div>
          </div>
          <div>
            <div>194[.]180[.]191[.]51</div>
            <div>mar5</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]168</div>
            <div>mar4</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]171</div>
            <div>mar3</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]60</div>
            <div>mar1</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]17</div>
            <div>mar2</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]66</div>
            <div>apr2</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]81</div>
            <div>apr3</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>185[.]225[.]17[.]74</div>
            <div>apr4</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]189</div>
            <div>apr1</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>5[.]252[.]178[.]123</div>
            <div>may5</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]104</div>
            <div>may1</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]115</div>
            <div>may2</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]118</div>
            <div>may3</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]131</div>
            <div>may4</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]137</div>
            <div>may53</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]13</div>
            <div>june2</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]174</div>
            <div>june6</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]140</div>
            <div>june1</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]30</div>
            <div>june7</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]63</div>
            <div>june3</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]111</div>
            <div>june7</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]135</div>
            <div>june5ebatquot</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>5[.]252[.]178[.]23</div>
            <div>july9</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]41</div>
            <div>july1</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]61</div>
            <div>july3</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]73</div>
            <div>july4</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]87</div>
            <div>july6</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]97</div>
            <div>july8</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]130</div>
            <div>july9</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
        </div>
        <p><em><strong>Table 1:</strong></em> <em>NetSupport RAT C2 servers linked to Cluster 1 (Source: Recorded Future)</em></p>
        <p>Notably, the NetSupport RAT C2 servers in Cluster 1 are connected not only through the characteristics previously described, but also by the near-simultaneous creation of their TLS certificates. For example, the TLS certificate with the common name <code>june5ebatquot</code> associated with IP address <em>94[.]158[.]245[.]135</em> was generated on June 30, 2025 at 4:55:20 PM, while the certificate with the common name june6 linked to <em>94[.]158[.]245[.]174</em> was created only 20 seconds later.</p>
        <h5>Cluster 2</h5>
        <p>Cluster 2 comprises NetSupport RAT command-and-control servers whose TLS certificates typically start with two or more repetitions of “s”, followed by an “i” and a number (so “<code>sssi3</code>”, for example). NetSupport RAT samples linked to Cluster 2 used the license key <code>XMLCTL</code> and serial number <code>NSM303008</code>. The NetSupport RAT C2 servers typically also host an instance of the vulnerability scanner Acunetix. The C2 servers associated with this cluster are listed in <strong>Table 2</strong>. Notably, all TLS certificates associated with this cluster were created in a single batch on June 17, 2025.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>TLS Common Name</strong></div>
            <div><strong>License Key</strong></div>
            <div><strong>Serial Number</strong></div>
          </div>
          <div>
            <div>5[.]181[.]159[.]112</div>
            <div>sssi3</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]9</div>
            <div>ssi1</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]38</div>
            <div>sssi2</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]140</div>
            <div>ssssi6</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]143</div>
            <div>ssssi8</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]142</div>
            <div>sssssi7</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]139</div>
            <div>ssssi5</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
        </div>
        <p><em><strong>Table 2:</strong></em> <em>NetSupport RAT C2 servers linked to Cluster 2 (Source: Recorded Future)</em></p>
        <p>Of note, one NetSupport RAT C2 server (<em>94[.]158[.]245[.]56</em>) used a TLS certificate with the common name 23sss, created in May 2025, and was linked to a NetSupport RAT sample that carried the same license key (<code>EVALUSION</code>) and serial number (<code>NSM165348</code>) previously observed in Cluster 1.</p>
        <h5>Other NetSupport RAT C2 Servers</h5>
        <p>Insikt Group identified an additional set of NetSupport RAT C2 servers linked to GrayCharlie that did not form a distinct cluster (see <strong>Table 3</strong>). However, all the servers were hosted by MivoCloud and were associated with NetSupport RAT samples using license key and serial number combinations observed in Clusters 1 and 2.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>TLS Common Name</strong></div>
            <div><strong>License Key</strong></div>
            <div><strong>Serial Number</strong></div>
          </div>
          <div>
            <div>5[.]181[.]159[.]29</div>
            <div>ssdecservicsdes</div>
            <div>N/A</div>
            <div>N/A</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]18</div>
            <div>papichssd2</div>
            <div>DCVTTTUUEEW2</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]153</div>
            <div>kosmo2</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>94[.]158[.]245[.]170</div>
            <div>normvork</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]159[.]62</div>
            <div>ffdds</div>
            <div>DCVTTTUUEEW23</div>
            <div>NSM896597</div>
          </div>
          <div>
            <div>5[.]181[.]156[.]234</div>
            <div>wedn1</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]252[.]178[.]35</div>
            <div>scgs234123</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]209</div>
            <div>novemsdf</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]181[.]156[.]244</div>
            <div>wends4</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>194[.]180[.]191[.]121</div>
            <div>novaksuur</div>
            <div>EVALUSION</div>
            <div>NSM165348</div>
          </div>
          <div>
            <div>5[.]252[.]177[.]120</div>
            <div>lohsd</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>5[.]252[.]177[.]15</div>
            <div>bounce</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
          <div>
            <div>185[.]163[.]45[.]16</div>
            <div>update1</div>
            <div>XMLCTL</div>
            <div>NSM303008</div>
          </div>
        </div>
        <p><em><strong>Table 3:</strong></em> <em>Additional NetSupport RAT C2 servers linked to GrayBravo (Source: Recorded Future)</em></p>
        <h4>Staging Infrastructure</h4>
        <p>Once GrayCharlie victims land on the compromised WordPress sites, thereby satisfying the conditional logic, the payload is typically fetched from the attacker-controlled infrastructure and injected into the compromised WordPress sites. Insikt Group has identified two distinct types of staging infrastructure, each characterized by different website templates. Type 1 is modeled after “Wiser University,” and Type 2 is modeled after “Activitar.”</p>
        <h5>Type 1: “Wiser University”</h5>
        <p>The IP addresses associated with the Type 1 staging infrastructure are linked to websites impersonating “Wiser University” (see <strong>Figure 2</strong>), a fictional entity used to demonstrate Wiser, a free Bootstrap HTML5 education <a href="https://themewagon.com/themes/free-bootstrap-4-html5-education-website-template-wiser/">website template</a> for school, college, and university websites. (As a sidenote, Oreshnik is the name of a Russian intermediate-range ballistic missile reportedly capable of speeds exceeding Mach 10.) <strong>Appendix B</strong> lists the IP addresses associated with the Type 1 staging infrastructure. All IP addresses, except for one, are announced by AS202015 (HZ Hosting Ltd).</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1500e0d2021b91244c59d04e70097054a1c748693.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 2:</strong></em> <em>Website impersonating “Wiser University” (Source: Recorded Future)</em></div>
          </div>
        </div>
        <h6>Suspected Testing Infrastructure</h6>
        <p>Although most IP addresses associated with the Type 1 staging infrastructure are announced by AS202015, as shown in <strong>Appendix B</strong>, Insikt Group also identified a small subset announced by other ASNs that host the same websites (see <strong>Table 4</strong>). On average, approximately one such IP address appears to be established each month. Notably, most of these IP addresses appear to geolocate to Russia, and the same ASNs are consistently reused within the same timeframe.</p>
        <div>
          <div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
            <div><strong>Country</strong></div>
            <div><strong>Date of Emergence</strong></div>
          </div>
          <div>
            <div>89[.]253[.]222[.]25</div>
            <div>AS41535</div>
            <div>RU</div>
            <div>2025-08-29</div>
          </div>
          <div>
            <div>89[.]253[.]222[.]156</div>
            <div>AS41535</div>
            <div>RU</div>
            <div>2025-08-26</div>
          </div>
          <div>
            <div>89[.]169[.]12[.]48</div>
            <div>AS207957</div>
            <div>GB</div>
            <div>2025-07-08</div>
          </div>
          <div>
            <div>185[.]231[.]245[.]158</div>
            <div>AS202984</div>
            <div>RU</div>
            <div>2025-06-27</div>
          </div>
          <div>
            <div>95[.]182[.]123[.]86</div>
            <div>AS202984</div>
            <div>RU</div>
            <div>2025-05-19</div>
          </div>
          <div>
            <div>23[.]140[.]40[.]66</div>
            <div>AS61400</div>
            <div>RU</div>
            <div>2025-04-11</div>
          </div>
          <div>
            <div>217[.]114[.]15[.]253</div>
            <div>AS198610</div>
            <div>RU</div>
            <div>2025-04-09</div>
          </div>
          <div>
            <div>45[.]153[.]191[.]245</div>
            <div>AS198610</div>
            <div>RU</div>
            <div>2025-03-21</div>
          </div>
          <div>
            <div>46[.]29[.]163[.]28</div>
            <div>AS51659</div>
            <div>RU</div>
            <div>2025-02-06</div>
          </div>
        </div>
        <p><em><strong>Table 4:</strong></em> <em>Additional infrastructure possibly linked to GrayCharlie (Source: Recorded Future)</em></p>
        <h5>Type 2: “Activitar”</h5>
        <p>Insikt Group identified an additional set of staging infrastructure, referred to as “Type 2.” The IP addresses in this cluster commonly host specific websites (see <strong>Figure 3</strong>). Insikt Group assesses that this template was sourced elsewhere and is not unique to GrayCharlie.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1156a61a7697db00d450ae4f44a3a4252c377b599.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1200" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 3:</strong></em> <em>Website impersonating “Activitar” (Source: Recorded Future)</em></div>
          </div>
        </div>
        <p>A subset of domains and IP addresses associated with Type 2 is presented in <strong>Table 5</strong>. Notably, most of the IP addresses are also announced by AS202015 (HZ Hosting Ltd), and one domain in <strong>Table 5</strong>, <em>filmlerzltyazilimsx[.]shop</em>, is linked to the email address <em>oreshnik[@]mailum[.]com</em> through its WHOIS record.</p>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>IP Address</strong></div>
            <div><strong>ASN</strong></div>
          </div>
          <div>
            <div>filmlerzltyazilimsx[.]shop</div>
            <div>79[.]141[.]163[.]169</div>
            <div>AS202015</div>
          </div>
          <div>
            <div>foolowme[.]com</div>
            <div>144[.]172[.]115[.]211</div>
            <div>AS14956</div>
          </div>
          <div>
            <div>joiner[.]best</div>
            <div>79[.]141[.]162[.]135</div>
            <div>AS202015</div>
          </div>
          <div>
            <div>lowi1[.]com</div>
            <div>185[.]33[.]86[.]11</div>
            <div>AS202015</div>
          </div>
          <div>
            <div>morniksell[.]com</div>
            <div>172[.]86[.]90[.]84</div>
            <div>AS14956</div>
          </div>
          <div>
            <div>persistancejs[.]store</div>
            <div>185[.]80[.]53[.]79</div>
            <div>AS59711</div>
          </div>
          <div>
            <div>pomofight[.]com</div>
            <div>45[.]61[.]134[.]76</div>
            <div>AS14956</div>
          </div>
          <div>
            <div>port4loms[.]com</div>
            <div>194[.]15[.]216[.]118</div>
            <div>AS197155</div>
          </div>
          <div>
            <div>signaturepl[.]com</div>
            <div>77[.]83[.]199[.]162</div>
            <div>AS202015</div>
          </div>
          <div>
            <div>yungask[.]com</div>
            <div>91[.]193[.]19[.]220</div>
            <div>AS202015</div>
          </div>
        </div>
        <p><em><strong>Table 5:</strong></em> <em>Domains and IP addresses linked to Type 2 staging infrastructure (Source: Recorded Future)</em></p>
        <h4>Compromised Infrastructure</h4>
        <p>GrayCharlie commonly injects malicious scripts into the Document Object Model (DOM) of compromised WordPress sites using script tags. Insikt Group has identified several recurring URL patterns tied to this activity: some URLs load externally hosted JavaScript files (such as <em>hxxps://joiner[.]best/work/original[.]js</em>), while others call a PHP file on specific endpoints <a href="https://urlscan.io/result/0199e8a3-1d07-76d2-9ccb-39ea171d3744/dom">using</a> an ID parameter (such as <em>hxxps://signaturepl[.]com/work/index[.]php?abje2LAw</em>). Notably, these URLs are updated over time by the threat actor, complicating detection and indicating the threat actor maintains ongoing access to a large pool of compromised WordPress installations. <strong>Appendix A</strong> lists a subset of WordPress websites infected by GrayCharlie.</p>
        <p>Although the exact initial access vector is unknown, it is likely that the actors either purchase access, such as via malware logs containing WordPress admin credentials, or exploit vulnerable WordPress plugins. The latter <a href="https://www.wp-1click.com/blog/how-hackers-target-wordpress-sites/">remains</a> the most frequent cause of all WordPress compromises.</p>
        <h4><strong>Suspected Compromise of “Law Firm Acceleration Company” SMB Team</strong></h4>
        <p>While the GrayCharlie-linked compromised WordPress sites span a wide range of industry verticals, in a few rare instances, the threat actors appear to have obtained, either through their own intrusions or via a third party, a more targeted set of WordPress domains. Specifically, at least fifteen websites belonging to US law firms were observed loading the external JavaScript hosted at <em>hxxps://persistancejs[.]store/work/original[.]js</em> (see <strong>Table 6</strong>).</p>
        <p>Insikt Group assesses that GrayCharlie (or the third party GrayCharlie works with) likely compromised these websites through a supply-chain vector. One potential avenue is SMB Team, the self-described “fastest-growing law firm acceleration company,” which has supported thousands of firms across North America, according to its website, as its logo and other references appear across many of the websites listed in <strong>Table 6</strong> (see <strong>Figure 4</strong>). Notably, credentials associated with an SMB Team email address used for a WordPress hosting platform surfaced around the same time that the domain <em>persistancejs[.]store</em> first began resolving. This temporal overlap suggests that the threat actors may have gained access to SMB Team-related infrastructure through the use of legitimate, compromised credentials.</p>
        <div>
          <div>
            <div><strong>Domain</strong></div>
            <div><strong>Company</strong></div>
            <div><strong>Country</strong></div>
            <div><strong>SMB Team</strong></div>
          </div>
          <div>
            <div>bianchilawgroup[.]com</div>
            <div>Bianchi Law Group</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>brattonlawgroup[.]com</div>
            <div>Bratton Law Group</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>brighterdaylaw[.]com</div>
            <div>Brighter Day Law</div>
            <div>US</div>
            <div>N/A</div>
          </div>
          <div>
            <div>defensegroup[.]com</div>
            <div>The Defense Group</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>dwicriminallawcenter[.]com</div>
            <div>Benjamin Law Firm LLC</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>fisherstonelaw[.]com</div>
            <div>Fisher Stone, P.C.</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>jarrettfirm[.]com</div>
            <div>Jarrett &amp; Price LLC</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>raineyandrainey[.]com</div>
            <div>Rainey &amp; Rainey Attorneys At Law PLLC</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>rbbfirm[.]com</div>
            <div>Buchanan Law Group</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>rmvlawyer[.]com</div>
            <div>The Law Office of Brian Simoneau, P.C.</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]brentadams[.]com</div>
            <div>Brent Adams &amp; Associates</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]cfblaw[.]com</div>
            <div>Cohen Forman Barone, PC</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]gerlinglaw[.]com</div>
            <div>Gerling Law Injury Attorneys</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]immigration-defense[.]com</div>
            <div>Law Offices of Daniel Shanfield</div>
            <div>US</div>
            <div>Yes</div>
          </div>
          <div>
            <div>www[.]schwartzandschwartz[.]com</div>
            <div>Schwartz &amp; Schwartz Attorneys at Law, P.A.</div>
            <div>US</div>
            <div>N/A</div>
          </div>
        </div>
        <p><em><strong>Table 6:</strong></em> <em>Compromised law firm websites linked to GrayCharlie (Source: Recorded Future)</em></p>
        <div>
          <div>
            <div>
              <p>
                <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_18fd20865333f5d84a84b457d80ddd430d382877b.png?width=750&amp;format=png&amp;optimize=medium" width="1588" height="830" />
              </p>
              <p>
                <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ebd43f461510a56badf377e44049eaf90555a74a.png?width=750&amp;format=png&amp;optimize=medium" width="430" height="117" />
              </p>
            </div>
          </div>
          <div>
            <div><em><strong>Figure 4:</strong></em> <em>Website of Gerling Law Injury Attorneys (top) and SMBTeam logo (bottom) (Source:</em> <em><a href="https://urlscan.io/result/019b035c-aed8-73a6-8f38-60388c596fb6">URLScan</a>)</em></div>
          </div>
        </div>
        <p>Notably, while an SMB Team compromise is possible, Insikt Group also assesses that the actors may have exploited a specific version of WordPress or its plugins used by SMB Team, which could explain the simultaneous compromise of all affected websites.</p>
        <p>In some instances, the same compromised WordPress sites are compromised by multiple threat actors simultaneously. For example, <em>bianchilawgroup[.]com</em> was also breached by TAG-124 (also known as LandUpdate808 or Kongtuke) since at least December 2025, which <a href="https://urlscan.io/result/019b027f-5214-74ff-b1e3-efec9160620d/dom">used</a> the domain <em>vimsltd[.]com</em>.</p>
        <h4>Higher-Tier Analysis</h4>
        <p>GrayCharlie administers its staging infrastructure primarily over SSH, though other ports are used intermittently. The group manages its NetSupport RAT C2 servers over TCP port 443. Overall, Insikt Group assesses that GrayCharlie relies extensively on proxy services to administer its infrastructure. Additionally, based on presumed browsing activity from higher-tier servers, at least some individuals linked to GrayCharlie are assessed to be Russian-speaking.</p>
        <h3>Attack-Chain Analysis</h3>
        <p>GrayCharlie has been observed using two different attack chains to deliver NetSupport RAT. The first chain uses compromised websites to distribute a fake browser update that triggers the retrieval and installation of a script-based payload; the second chain uses compromised WordPress sites and a ClickFix-style lure that copies a command to fetch and install the RAT. Both culminate in NetSupport execution from <code>%AppData%</code>, Registry Run key persistence, and C2 connectivity; the technical details are expanded below.</p>
        <h4>Attack Chain 1: Fake Browser Update Leading to NetSupport RAT</h4>
        <p>According to public reporting, when GrayCharlie first <a href="https://www.proofpoint.com/us/blog/threat-insight/are-you-sure-your-browser-date-current-landscape-fake-browser-updates">became</a> active in mid-2023, it <a href="https://www.threatdown.com/blog/smartapesg-06-11-2024/">relied</a> on fake browser updates to deliver the NetSupport RAT. Although the group later shifted to the ClickFix technique, Insikt Group <a href="https://infosec.exchange/@monitorsg/115363334718836118">observed</a> a return to fake browser updates as early as October 12, 2025. <strong>Figure 5</strong> provides an overview of Attack Chain 1.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ca8e19bb49da0d1924539da6e91ae9ddaf6d3227.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="475" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 5:</strong></em> <em>Attack Chain 1 (Source: Recorded Future)</em></div>
          </div>
        </div>
        <ol>
          <li><strong>Website compromise and lure delivery</strong>. Threat actors modify legitimate sites to load malicious scripts that render a browser-specific “update” prompt. Selecting the prompt initiates download of a ZIP “update” package containing a primary JavaScript file alongside decoy <code>.dat</code> files.</li>
          <li><strong>User-executed JavaScript loader</strong>. The victim manually runs the <code>.js</code> script. The script mimics a benign browser component to reduce suspicion while silently initiating the next stage of the attack.</li>
          <li><strong>PowerShell staging via WScript</strong>. The JavaScript launches <code>wscript.exe</code>, which spawns <code>powershell.exe</code>. PowerShell reaches out to a remote host to fetch an obfuscated JavaScript containing encoded tasking.</li>
          <li><strong>Secondary payload retrieval</strong>. PowerShell decodes instructions and downloads the actual payload ZIP archive. This archive contains a complete NetSupport RAT client set, including <code>client32.exe</code> and required DLLs.</li>
          <li><strong>File deployment and execution</strong>. The archive is extracted under the user profile (for example, <code>%AppData%\Roaming\...</code>). <code>client32.exe</code> is started in the background to minimize visible indicators to the user.</li>
          <li><strong>Persistence establishment</strong>. A Windows Run registry key is created to automatically launch <code>client32.exe</code> at logon, ensuring the NetSupport RAT remains active after reboots without requiring further user interaction.</li>
          <li><strong>C2 readiness</strong>. With the NetSupport RAT client running on the infected host, the endpoint is prepared to establish command-and-control connectivity with the attacker's infrastructure.</li>
        </ol>
        <h4>Attack Chain 2: WordPress Redirects and ClickFix Leading to NetSupport RAT</h4>
        <p>As early as April 2025, GrayCharlie <a href="https://www.cybereason.com/blog/net-support-rat-wordpress-clickfix">began</a> using ClickFix as a secondary attack chain, consistent with industry reporting that many threat actors have adopted ClickFix techniques due to their effectiveness. <strong>Figure 6</strong> provides an overview of Attack Chain 2.</p>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1ae1c0d8952cb5c0f7b8157e5acfe6511630de60c.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="618" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 6:</strong></em> <em>Attack Chain 2 (Source: Recorded Future)</em></div>
          </div>
        </div>
        <ol>
          <li><strong>Initial delivery and redirection.</strong> Phishing emails, malicious PDFs, or links on gaming sites direct users to compromised WordPress pages that embed attacker JavaScript.</li>
          <li><strong>Background script and profiling.</strong> A background script loads when the site is visited, injects an iframe, and profiles the environment (such as the operating system and browser) to deliver the next stage.</li>
          <li><strong>ClickFix fake CAPTCHA.</strong> The page presents a fake CAPTCHA that quietly copies a malicious command to the user’s clipboard and instructs them to paste it into the Windows Run dialog (Win+R), turning social engineering into user-assisted execution (see <strong>Figure 7</strong>).</li>
        </ol>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_1f878a544b5193108d0dd7bc5d1359a3487d5a705.png?width=750&amp;format=png&amp;optimize=medium" width="509" height="392" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 7:</strong></em> <em>Fake Captcha (Source:</em> <em><a href="https://www.elastic.co/security-labs/a-wretch-client">Elastic</a>)</em></div>
          </div>
        </div>
        <ol>
          <li><strong>Command-driven staging.</strong> The pasted command retrieves a batch file that downloads a ZIP containing NetSupport RAT and uses PowerShell to extract it into <code>%AppData%\Roaming\</code> (see <strong>Figure 8</strong>).</li>
        </ol>
        <div>
          <div>
            <div><code>powershell -Win^dow Style Hidden -Command "Add-Type -AssemblyName 'System. IO.Compression FileSystem'; [IO.Compression.ZipFile]::ExtractToDirectory('!CF0JOAXML!','!WFHEYHKMZ!')"</code></div>
          </div>
        </div>
        <p><em><strong>Figure 8:</strong></em> <em>PowerShell command (Source:</em> <em><a href="https://www.cybereason.com/blog/net-support-rat-wordpress-clickfix">Cybereason</a>)</em></p>
        <ol>
          <li><strong>NetSupport RAT launch and persistence.</strong> The batch file starts <code>client32.exe</code> and sets a Run registry key to automatically relaunch the NetSupport RAT client at startup, establishing persistence on the endpoint.</li>
          <li><strong>Remote access and follow-on actions.</strong> Once connected to C2, operators can interact with the system, perform reconnaissance (for example, domain group membership queries), transfer files, execute additional commands, and potentially move laterally using access acquired from the host.</li>
        </ol>
        <h3>Observed Operator Activity</h3>
        <p>In October 2025, Insikt Group detonated a NetSupport RAT sample (SHA256: 31804c48f9294c9fa7c165c89e487bfbebeda6daf3244ad30b93122bf933c79c) with the C2 server <em>5[.]181[.]156[.]234[:]443</em> linked to GrayCharlie within a controlled environment. Later that day, approximately three hours later, the threat actor connected using NetSupport RAT, compressed and moved two files, and then executed group and account reconnaissance commands. The same actor returned three days later and repeated the previously observed reconnaissance commands (see <strong>Figure 9</strong>).</p>
        <div>
          <div>
            <div>
              <pre><code>net group /domain "Domain COmputers"
C:\Windows\system32\net1 group /domain "Domain COmputers"
</code></pre>
            </div>
          </div>
        </div>
        <p><em><strong>Figure 9:</strong></em> <em>Reconnaissance commands (Source: Recorded Future)</em></p>
        <p>When both files were compressed into a single ZIP archive and the executable was detonated, the process sideloaded a DLL identified as Sectop RAT (SHA256: 59e7e7698d77531bfbfea4739d29c14e188b5d3109f63881b9bcc87c72e9de78) with the C2 server <em>85[.]158[.]110[.]179[:]15847</em>. The executable (SHA256: 5f1bd92ad6edea67762c7101cb810dc28fd861f7b8c62e6459226b7ea54e1428) was identified as “Merge XML Files”, version 1.2.0.0, developed by Vovsoft, and was signed with a digital certificate that expired on October 31, 2025.</p>
        <h2>Mitigations</h2>
        <ul>
          <li>Leverage the IoCs in <strong>Appendix A</strong> and <strong>Appendix B</strong> to investigate potential past or ongoing infections, both successful and attempted; Recorded Future customers can use the Recorded Future Intelligence Operations Platform to monitor for future IoCs associated with GrayCharlie.</li>
          <li>Monitor for validated infrastructure associated with the malware families discussed in this report, including NetSupport RAT and Stealc, as well as numerous others identified and validated by Insikt Group, and integrate these indicators into relevant detection and monitoring systems.</li>
          <li>Leverage the Sigma, YARA, and Snort rules provided in <strong>Appendices D</strong>, <strong>E</strong>, and <strong>F</strong> in your security information and event management (SIEM) or endpoint detection and response (EDR) tools to detect the presence or execution of NetSupport RAT. Customers can use additional detection rules available in the Recorded Future Intelligence Operations Platform.</li>
          <li>Use Recorded Future Network Intelligence to detect instances of data exfiltration from your corporate infrastructure to known malicious infrastructure.</li>
          <li>Use the Recorded Future Intelligence Operations Platform to monitor GrayCharlie, other threat actors, and the broader cybercriminal ecosystem, ensuring visibility into the latest tactics, techniques, and procedures (TTPs), preferred tools and services (for example, specific threat activity enablers [TAEs] used by threat actors), and emerging developments.</li>
          <li>Use Recorded Future AI’s reporting feature to generate tailored reports on topics that matter to your company. For example, if you want to stay informed about activities related to GrayCharlie, you can receive regular AI-generated updates on this threat actor.</li>
        </ul>
        <h2>Outlook</h2>
        <p>GrayCharlie has been operating for more than two years, and despite shifts in its tactics, such as alternating between fake updates and ClickFix techniques or transitioning from SmartApe to other hosting providers like MivoCloud, the group’s core behaviors have remained consistent. Given its sustained activity, GrayCharlie is highly likely to remain active and continue targeting organizations worldwide, with a current emphasis on US entities, as indicated by Recorded Future Network Intelligence.</p>
        <p>Insikt Group will continue to closely monitor GrayCharlie to detect emerging threats and evaluate the group’s strategic direction within the broader cybercriminal ecosystem.</p>
        <h2>Appendix A: Indicators of Compromise</h2>
        <div>
          <div>
            <div>
              <pre><code>Cluster 1 NetSupport RAT C2 IP Addresses:
5[.]181[.]159[.]60
5[.]252[.]178[.]23
5[.]252[.]178[.]123
94[.]158[.]245[.]13
94[.]158[.]245[.]63
94[.]158[.]245[.]66
94[.]158[.]245[.]81
94[.]158[.]245[.]104
94[.]158[.]245[.]111
94[.]158[.]245[.]115
94[.]158[.]245[.]118
94[.]158[.]245[.]131
94[.]158[.]245[.]135
94[.]158[.]245[.]137
94[.]158[.]245[.]140
94[.]158[.]245[.]174
185[.]163[.]45[.]30
185[.]163[.]45[.]41
185[.]163[.]45[.]61
185[.]163[.]45[.]73
185[.]163[.]45[.]87
185[.]163[.]45[.]97
185[.]163[.]45[.]130
185[.]225[.]17[.]74
194[.]180[.]191[.]17
194[.]180[.]191[.]51
194[.]180[.]191[.]168
194[.]180[.]191[.]171
194[.]180[.]191[.]189

Cluster 2 NetSupport RAT C2 IP Addresses:
5[.]181[.]159[.]9
5[.]181[.]159[.]38
5[.]181[.]159[.]112
5[.]181[.]159[.]139
5[.]181[.]159[.]140
5[.]181[.]159[.]142
5[.]181[.]159[.]143

Other NetSupport RAT C2 Servers:
5[.]181[.]156[.]234
5[.]181[.]156[.]244
5[.]181[.]159[.]29
5[.]181[.]159[.]62
5[.]252[.]177[.]15
5[.]252[.]177[.]120
5[.]252[.]178[.]35
94[.]158[.]245[.]153
94[.]158[.]245[.]170
185[.]163[.]45[.]16
194[.]180[.]191[.]18
194[.]180[.]191[.]121
194[.]180[.]191[.]209

NetSupport RAT Hashes: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“Type 1” Staging Server IP Addresses:
77[.]83[.]199[.]3
77[.]83[.]199[.]15
77[.]83[.]199[.]31
77[.]83[.]199[.]42
77[.]83[.]199[.]73
77[.]83[.]199[.]82
77[.]83[.]199[.]88
77[.]83[.]199[.]90
77[.]83[.]199[.]112
77[.]83[.]199[.]123
77[.]83[.]199[.]132
77[.]83[.]199[.]142
77[.]83[.]199[.]170
79[.]141[.]160[.]24
79[.]141[.]160[.]34
79[.]141[.]161[.]50
79[.]141[.]161[.]171
79[.]141[.]162[.]35
79[.]141[.]162[.]37
79[.]141[.]162[.]50
79[.]141[.]162[.]132
79[.]141[.]162[.]149
79[.]141[.]162[.]169
79[.]141[.]162[.]177
79[.]141[.]162[.]181
79[.]141[.]162[.]187
79[.]141[.]162[.]204
79[.]141[.]162[.]229
79[.]141[.]163[.]138
79[.]141[.]163[.]176
79[.]141[.]172[.]204
79[.]141[.]172[.]223
79[.]141[.]172[.]229
79[.]141[.]172[.]232
79[.]141[.]172[.]240
79[.]141[.]173[.]60
79[.]141[.]173[.]161
79[.]141[.]173[.]168
85[.]158[.]111[.]29
85[.]158[.]111[.]38
85[.]158[.]111[.]53
85[.]158[.]111[.]75
85[.]158[.]111[.]81
85[.]158[.]111[.]126
89[.]46[.]38[.]34
89[.]46[.]38[.]48
89[.]46[.]38[.]88
89[.]169[.]12[.]48
91[.]193[.]19[.]32
91[.]193[.]19[.]64
91[.]193[.]19[.]78
91[.]193[.]19[.]127
91[.]193[.]19[.]163
91[.]193[.]19[.]188
91[.]193[.]19[.]190
98[.]142[.]240[.]165
98[.]142[.]240[.]188
98[.]142[.]240[.]214
98[.]142[.]240[.]221
98[.]142[.]240[.]246
98[.]142[.]251[.]26
98[.]142[.]251[.]32
98[.]142[.]251[.]42
98[.]142[.]251[.]53
185[.]33[.]84[.]131
185[.]33[.]84[.]153
185[.]33[.]84[.]169
185[.]33[.]85[.]20
185[.]33[.]85[.]26
185[.]33[.]85[.]33
185[.]33[.]85[.]38
185[.]33[.]85[.]52
185[.]33[.]86[.]37
193[.]42[.]38[.]11
193[.]42[.]38[.]79
193[.]42[.]38[.]85
193[.]42[.]38[.]86
193[.]111[.]208[.]2
193[.]111[.]208[.]17
193[.]111[.]208[.]19
193[.]111[.]208[.]23
193[.]111[.]208[.]24
193[.]111[.]208[.]46
193[.]111[.]208[.]75
193[.]111[.]208[.]97
193[.]111[.]208[.]100

Additional IP Addresses Likely Linked to “Type 1” Staging Infrastructure:
23[.]140[.]40[.]66
45[.]153[.]191[.]245
46[.]29[.]163[.]28
89[.]169[.]12[.]48
89[.]253[.]222[.]25
89[.]253[.]222[.]156
95[.]182[.]123[.]86
185[.]231[.]245[.]158
217[.]114[.]15[.]253

“Type 2” Staging Server IP Addresses:
45[.]61[.]134[.]76
77[.]83[.]199[.]162
79[.]141[.]162[.]135
79[.]141[.]163[.]169
91[.]193[.]19[.]220
144[.]172[.]115[.]211
172[.]86[.]90[.]84
185[.]33[.]86[.]11
185[.]80[.]53[.]79
194[.]15[.]216[.]118

“Type 2” Staging Server Domains:
filmlerzltyazilimsx[.]shop
foolowme[.]com
joiner[.]best
lowi1[.]com
morniksell[.]com
persistancejs[.]store
pomofight[.]com
port4loms[.]com
signaturepl[.]com
yungask[.]com

Domains Linked to oreshnik[@]mailum[.]com:
108zhao[.]shop
1sou[.]top
6hms[.]top
789pettoys[.]shop
7serv[.]top
99wc[.]top
abocamuseum[.]icu
actionmovies[.]top
alcmz[.]top
alhasba[.]com
amxdh1[.]icu
anoteryo[.]top
arearugs[.]top
as5yo[.]top
ashesplayer[.]top
avodaride[.]top
azyaamode[.]shop
baihao[.]shop
baihuah[.]top
bedoueroom[.]top
bestproductreviews[.]xyz
bestrollerballpen[.]top
blogdojhow[.]com
bnpparibas[.]top
bokra[.]top
bond007[.]xyz
boxworld[.]top
bstionline[.]com
buildingjobs[.]xyz
buscavuelosbaratos[.]top
buyedmeds[.]top
buylisinopril[.]top
celebrex[.]top
chaojiwang[.]top
chenyiwen[.]top
chinapark[.]top
christianlouboutin2017[.]top
cialissale[.]top
cinselurunler[.]xyz
coinseasygenerator[.]top
couterfv[.]top
couturella[.]shop
covaticonstructioncorp[.]shop
cozartan[.]top
cryptohardware[.]shop
dcdh4[.]shop
dealermobil[.]top
depechemode[.]shop
directoryframework[.]top
discountmontblanc[.]top
discoveronline[.]top
doodstream[.]shop
downloadfreak[.]top
erectilehelp[.]top
filmezz[.]top
filmlerzltyazilimsx[.]shop
fjs95[.]shop
fmovies123[.]top
forging[.]top
fragzone[.]top
franquicias[.]top
fuckhdmov[.]top
gededewe[.]shop
getin[.]top
glitterygadgets[.]shop
gmartph[.]shop
gmt-a[.]shop
grandzxc[.]bet
guosong[.]top
haidao10[.]top
headtechnologies[.]xyz
healthcareplans[.]top
heim-k[.]shop
helperection[.]top
hilfe-ed[.]top
hirek[.]top
howtogetaloan[.]top
ida-ci[.]com
islighting[.]top
iwine[.]top
izone[.]digital
jerseysus[.]top
jiezishijie[.]top
jkse[.]shop
jsmakert[.]shop
k2bsc[.]top
kaestner[.]top
kamagrafr[.]icu
kanshuwang[.]top
kazumaka[.]top
kfzversicherungskosten[.]top
khusinhthaidanphuong[.]top
kingdomholding[.]top
krediteonlinevergleichen[.]top
lang3666[.]top
langwonet[.]top
layardrama21[.]top
lebensversicherungvergleich[.]top
levciavia[.]top
linhua97[.]top
linksoflondononsale[.]top
linksoflondonsale[.]top
liruo[.]top
liveskortv[.]shop
loanonline[.]top
loispaigesimenson[.]com
losartan[.]top
lovedou[.]top
lqsword[.]top
lx7v9[.]top
lycosex[.]top
machine-a-plastifier[.]com
manwithedhelp[.]top
marmocer[.]top
mbpen163[.]top
medicamentsbonmarche[.]top
meimei68[.]top
menjimmychooonline[.]top
milebox[.]shop
mindsetgrowth[.]shop
mm37[.]icu
monclerjackets[.]top
moruk[.]xyz
motocyclenews[.]top
moviefone[.]top
moviesone[.]top
movtime76[.]shop
movtime78[.]shop
musicdownloader[.]top
my-privatebanker[.]top
mybeststream[.]xyz
nackt-bilder[.]top
nana44[.]shop
newbalancesport[.]top
palcomp3[.]top
parisforrent[.]top
pasangiklan[.]top
patekphillipwatches[.]top
pielsteel[.]top
pravaix[.]top
rag382[.]top
rasin[.]shop
refanprediction[.]shop
regopramide[.]top
rnsddse[.]top
sales2016[.]top
sdnews[.]top
searchgo[.]shop
searchweb[.]top
semikeren[.]icu
simvascor[.]icu
simvascor[.]top
snapcans[.]top
sneakermall[.]top
soap2dayfree[.]top
socialsignals[.]shop
socksforrocks[.]shop
streaming-films[.]xyz
syavsp5[.]top
tdsc[.]top
techradar[.]top
tiffanyearringforwomen[.]top
todoarmarios[.]top
todocalefactores[.]top
todocarritos[.]top
travelplace[.]top
trendings[.]top
universaltechnology[.]top
uochut[.]shop
via345[.]top
villahome[.]top
viloriterso[.]icu
viptravelcentres[.]com
vog168[.]top
wandan[.]top
wap9[.]top
warpdrive[.]top
watchesbest[.]top
wavob[.]top
wdwnp[.]top
xelesex[.]top
ydh7[.]shop
yntz6[.]shop
yourcialsupply[.]top
youtubevideo[.]top
yxta[.]top
yybvf[.]top
zaheirx[.]shop
zakachka[.]top
zerolendnow[.]top
zt45gg[.]top

Compromised Law Firm Websites:
bianchilawgroup[.]com
brattonlawgroup[.]com
brighterdaylaw[.]com
defensegroup[.]com
dwicriminallawcenter[.]com
fisherstonelaw[.]com
jarrettfirm[.]com
raineyandrainey[.]com
rbbfirm[.]com
rmvlawyer[.]com
www[.]brentadams[.]com
www[.]cfblaw[.]com
www[.]gerlinglaw[.]com
www[.]immigration-defense[.]com
www[.]schwartzandschwartz[.]com

Sectop RAT Hash:
59e7e7698d77531bfbfea4739d29c14e188b5d3109f63881b9bcc87c72e9de78

SecTopRAT C2 IP Address:
85[.]158[.]110[.]179[:]15847

Other Hashes:
5f1bd92ad6edea67762c7101cb810dc28fd861f7b8c62e6459226b7ea54e1428

Email Address Linked to GrayCharlie:
oreshnik[@]mailum[.]com
</code></pre>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_187b8e348054a7063fd37aec148dfc3337efc5d14.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Network Intelligence: Your Questions, Global Answers]]></title>
            <link>https://www.recordedfuture.com/blog/network-intelligence-questions-answered</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/network-intelligence-questions-answered</guid>
            <pubDate>Mon, 16 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Learn how network intelligence gives security teams control over threat investigation with global visibility—no more drowning in generic, passive threat feeds.]]></description>
            <content:encoded><![CDATA[
        <h2>The Problem with Pre-Packaged Intelligence</h2>
        <p>Security teams are drowning in threat intelligence feeds. Hundreds of vendors promise comprehensive coverage, real-time alerts, and actionable insights. Yet sophisticated adversaries continue to operate undetected, incidents take weeks to scope, and attribution remains elusive.</p>
        <p>The fundamental issue isn't quality but control. Traditional network visibility solutions force passive consumption: their alerts, their priorities, their timeline. This one-size-fits-all approach assumes threats targeting financial services match those facing critical infrastructure, or that yesterday's patterns predict tomorrow's campaigns.</p>
        <p>Network intelligence flips this model. With global visibility spanning billions of connections across 150+ sensors in 35+ countries, you can investigate what matters to your organization using your own selectors, questions, and mission requirements.</p>
        <h2>What Network Intelligence Actually Means</h2>
        <p>Effective network intelligence requires global visibility at scale: distributed sensors across dozens of countries processing billions of packets daily, generating tens of millions of network flow records. But collection methodology matters equally. Metadata-only approaches capture source and destination IPs, ports, protocols, flow counts, and timestamps without payloads or deep packet inspection. This enables operation at internet scale while better maintaining ethical boundaries and data minimization standards.</p>
        <p>At Recorded Future, our network intelligence capabilities provide this access to such global network traffic observations for specific IP addresses of interest. Our Insikt Group uses this same infrastructure to research 500+ malware families and threat actors. Government CERTs use these capabilities to analyze adversary infrastructure at national scale.</p>
        <h2>What This Means in Practice</h2>
        <p>Consider what changes when your security operations can query global network intelligence.</p>
        <p><strong>Faster SOC Triage</strong></p>
        <p>Your team flags a suspicious IP at 2 AM. Instead of guessing whether it's noise or the start of something worse, query the network intelligence platform. See its global communication patterns instantly. Understand whether you're looking at commodity scanning or infrastructure that's been quietly staging against targets for weeks. Internet scanner detection capabilities automatically classify the behavior and reveal specific ports targeted, web requests made, and geographic distribution. Triage in minutes, not hours.</p>
        <p><strong>Targeted or Opportunistic? Now You'll Know</strong></p>
        <p>When threats hit your industry, the first question is always: are we specifically in the crosshairs, or is this spray-and-pray? Network intelligence lets you track adversary infrastructure across your sector before it reaches your perimeter. See the pattern. Understand the targeting. Brief leadership with confidence because you're no longer guessing. You're showing them the actual traffic patterns that prove whether your organization is in the crosshairs or caught in the spray.</p>
        <p><strong>Fraud Infrastructure Exposed</strong></p>
        <p>Fraud campaigns depend on infrastructure that moves fast but leaves traces. Your selectors, run against global network intelligence, can reveal the networks behind credential stuffing, account takeover, and payment fraud before the campaign fully scales.</p>
        <p><strong>Attribution That Actually Holds Up</strong></p>
        <p>Mapping adversary infrastructure is hard. Connecting it to broader campaigns and ultimate operators is harder. Network intelligence gives you the longitudinal visibility to trace how infrastructure evolves, clusters, and connects. Administrative traffic analysis reveals patterns operators use to manage C2 infrastructure. When you identify admin flows from a common source connecting to multiple C2 servers, you're mapping the operator's pattern based on observed behavior across hundreds of global vantage points. You're turning indicators into intelligence.</p>
        <h2>Integration Into Security Workflows</h2>
        <p>Network intelligence integrates directly into existing security workflows through API access to SIEMs, SOAR platforms, and custom analysis tools. When your SIEM flags suspicious traffic, automated queries reveal global context: Is this IP conducting C2 communications? Scanning your sector specifically? Connected to infrastructure from last month's campaign? Curated threat lists reduce noise from legitimate security research while enabling early blocking of targeted reconnaissance, turning your existing tools into instruments for active investigation rather than passive alerting.</p>
        <h2>When Expertise Becomes Essential</h2>
        <p>For organizations facing persistent, sophisticated adversaries, network intelligence capabilities alone aren't sufficient. The difference between having access to global network visibility and operationalizing it effectively comes down to tradecraft.</p>
        <p>Recorded Future's Global Network Intelligence Advisory program addresses this by pairing technical capabilities with forward-deployed analysts and embedded engineers who work directly inside your SOC or intelligence fusion center. This becomes especially critical when nation-states are mapping your critical infrastructure, when advanced persistent threats are staging for long-term access, or when attribution could influence strategic decision-making. You need the ability to investigate specific questions with global visibility and the expertise to interpret what you find.</p>
        <h2>The Compliance Framework That Enables Trust</h2>
        <p>Network intelligence operates under strict ethical and legal guidelines. All use is subject to our Acceptable Use Policy and surveillance, profiling of individuals, or political targeting is prohibited. Access is invitation-only, requiring vetting and agreement to specific terms of use.</p>
        <p>These aren't just policies but foundational to how this capability operates. The metadata-only collection model, the data minimization approach, and the geographic distribution that prevents any single point of visibility into user communications are design choices. These constraints aren't obstacles to effectiveness but enablers of trust. They allow powerful intelligence capabilities to exist while promoting appropriate boundaries.</p>
        <h2>Moving Forward</h2>
        <p>The gap between what most security programs need and what traditional threat intelligence provides continues to widen. Adversaries operate at scale, evolving infrastructure faster than feeds can update. Internal telemetry shows only what touches your perimeter. Point-in-time observations lack the context to distinguish targeted attacks from noise.</p>
        <p>Network intelligence addresses this gap with the ability to query global visibility using your own selectors. At Recorded Future, we've developed capabilities that operate at this scale, with the compliance framework and operational expertise to make them effective. For organizations ready to move beyond pre-packaged feeds, we're offering these capabilities to select customers through an invitation-only program.</p>
        <p>What matters now is recognizing that your questions matter more than their answers and building security programs that reflect that reality.</p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_188ef07891988f2f97aad055a1f5a7c089fb55765.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[State of Security Report | Recorded Future]]></title>
            <link>https://www.recordedfuture.com/research/state-of-security</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/state-of-security</guid>
            <pubDate>Thu, 12 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Download Recorded Future's 2026 State of Security report which provides comprehensive threat intelligence on geopolitical fragmentation, state-sponsored operations, ransomware evolution, and emerging technology risk.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <h2>Fragmentation is the new normal</h2>
              <p>The global threat landscape didn't simplify in 2025—it shattered. Geopolitical alliances strained. Criminal enterprises splintered and regrouped. State-sponsored actors shifted from dramatic disruptions to quiet pre-positioning. And as long-established norms unwound, convergence across once-distinct domains created unprecedented uncertainty.</p>
              <p>The 2026 State of Security report delivers Insikt Group's most comprehensive annual analysis of the forces shaping global security—helping leaders reduce surprise, prioritize effectively, and act with confidence.</p>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_188a8fbb5001e358d9837adb14d5fb0897434527c.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Fragmentation Defined 2025's Threat Landscape. Here's What It Means for 2026]]></title>
            <link>https://www.recordedfuture.com/blog/fragmentation-in-2025-what-it-means-for-2026</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/fragmentation-in-2025-what-it-means-for-2026</guid>
            <pubDate>Thu, 12 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[The global threat landscape didn't simplify in 2025 — it shattered. The 2026 State of Security report represents Insikt Group's most comprehensive threat intelligence analysis to date, drawing on proprietary intelligence, network telemetry, and deep geopolitical research to help you stay ahead of converging threats.]]></description>
            <content:encoded><![CDATA[
        <p>Uncertainty has become the operating environment for business. And this year, fragmentation is driving it.</p>
        <p>The global threat landscape didn't simplify in 2025; it shattered. Geopolitical alliances strained. Criminal enterprises splintered under law enforcement pressure, then regrouped into smaller, faster, and harder-to-track operations. State-sponsored cyber actors shifted from dramatic disruptions to quiet pre-positioning, embedding themselves in networks and waiting. Hacktivist groups and influence networks amplified conflicts, blurring the line between genuine intrusions and perception warfare.</p>
        <p>But here's what makes this moment dangerous: as long-established norms unwind, fragmentation is paradoxically enabling greater interoperability across domains that were once distinct. State objectives, criminal capability, and private-sector technology increasingly reinforce one another. That convergence creates uncertainty, compresses warning time, and expands plausible deniability.</p>
        <p>Today, Recorded Future's Insikt Group releases the <strong><a href="https://www.recordedfuture.com/research/state-of-security">2026 State of Security</a></strong> report, our most comprehensive annual analysis of the forces shaping global security.</p>
        <p>Drawing on proprietary intelligence, network telemetry, and deep geopolitical analysis, this report examines how 2025's fractures are reshaping the threat environment — and what security leaders must prepare for in the year ahead.</p>
        <h2>The End of Stability as a Baseline Assumption</h2>
        <div>
          <div>
            <div>
              <img loading="lazy" alt="" src="https://www.recordedfuture.com/media_10c922a3a2103e396f22a400e3135d81ce6b0f02b.png?width=750&amp;format=png&amp;optimize=medium" width="1600" height="1220" />
            </div>
          </div>
          <div>
            <div><em><strong>Figure 1:</strong></em> <em>2025 redefined international relations (Source: Recorded Future)</em></div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_14120f6481cb46917d75b8ece722dda331953c861.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[From 27 Steps to 5: How Recorded Future Reimagined Threat Hunting with Autonomous Threat Operations]]></title>
            <link>https://www.recordedfuture.com/blog/threat-hunting-27-steps-to-5</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/threat-hunting-27-steps-to-5</guid>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Discover how Autonomous Threat Operations reduces 27 manual steps to as few as 5 largely automated ones, delivering the speed, scale, and effectiveness that the modern threat landscape demands.]]></description>
            <content:encoded><![CDATA[
        <div>
          <div>
            <div>
              <ul>
                <li>The manual operations gap can be a business risk</li>
                <li>Manual threat hunting requires 27 steps that burn analyst time</li>
                <li>Autonomous Threat Operations can reduce 27 steps to 5</li>
                <li>Autonomous operations prove measurable ROI</li>
              </ul>
            </div>
          </div>
        </div>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1d6aff1dc009c244e9b6f66a1f1fe7bd44e4b681f.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Rublevka Team: Anatomy of a Russian Crypto Drainer Operation]]></title>
            <link>https://www.recordedfuture.com/research/rublevka-team-anatomy-russian-crypto-drainer-operation</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/research/rublevka-team-anatomy-russian-crypto-drainer-operation</guid>
            <pubDate>Wed, 04 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[Rublevka Team exemplifies the industrialization of crypto scams. Learn how traffer teams and wallet drainers enable high-volume theft.]]></description>
            <content:encoded><![CDATA[
        <h2>Executive Summary</h2>
        <p>Insikt Group has identified a major cybercriminal operation specializing in large-scale cryptocurrency theft, operating under the moniker “Rublevka Team”. Since its inception in 2023, the threat group has generated over $10 million through affiliate-driven wallet draining campaigns. Rublevka Team is an example of a “traffer team,” composed of a network of thousands of social engineering specialists tasked with directing victim traffic to malicious pages. Unlike traditional malware-based approaches such as those used by the traffer teams Marko Polo and CrazyEvil (previously identified by Insikt Group, both of which distributed infostealer malware), Rublevka Team deploys custom JavaScript scripts via spoofed landing pages that impersonate legitimate crypto services, tricking victims into connecting their wallets and authorizing fraudulent transactions. Their infrastructure is fully automated and scalable, offering affiliates access to Telegram bots, landing page generators, evasion features, and support for over 90 wallet types. By lowering the technical barrier to entry, Rublevka Team has built an extensive ecosystem of global affiliates capable of launching high-volume scams with minimal oversight.</p>
        <p>This structure poses a growing threat to cryptocurrency platforms, fintech providers, and brands whose identities are being impersonated. Organizations that facilitate blockchain transactions, particularly fintech firms, exchanges, or wallet providers, face elevated reputational and legal risks if customers fall victim to these scams. Even if the victim’s compromise occurs outside a firm’s platform, failure to detect spoofed landing pages or fraudulent referrals can trigger consumer backlash, loss of trust, or regulatory scrutiny around customer protections and Know Your Customer (KYC) enforcement. The threat group’s agility — evidenced by its use of frequently rotating domains, targeting lower-cost chains like Solana (SOL), and exploiting Remote Procedure Call (RPC) APIs — undermines traditional fraud detection and domain takedown efforts. Their model mirrors ransomware-as-a-service (RaaS) operations, signaling a continuation of the broader shift toward scalable, service-based cybercrime that organizations must proactively monitor, disrupt, and defend against to protect customers and maintain trust.</p>
        <h2>Key Findings</h2>
        <ul>
          <li>The objective of a Rublevka Team scam is to create an attractive SOL-based offer, such as a promotion or an airdrop event, generate traffic to the lure via social media or advertisements, and trick a user into connecting their wallet to the website and signing a transaction that drains their wallet.</li>
          <li>As of writing, Rublevka Team’s primary Telegram channel has approximately 7,000 members. Over 240,000 messages have been posted to Rublevka Team’s automated “profits” channel, indicating at least 240,000 successful wallet drains, with transactions ranging from $0.16 to over $20,000.</li>
          <li>Rublevka Team offers a custom JavaScript drainer embedded into their landing pages, which exfiltrates victims’ SOL assets by draining held tokens. The drainer is compatible with over 90 SOL wallet types.</li>
          <li>The threat group’s infrastructure is fully automated via Telegram bots, offering affiliates tools for landing page creation, campaign tracking, cloaking, and distributed denial-of-service (DDoS) protection.</li>
          <li>The drainer campaign, active since 2023, leverages spoofed versions of legitimate services such as Phantom, Bitget, and Jito to maximize user trust and conversion</li>
        </ul>
      ]]></content:encoded>
            <category>Research (Insikt)</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/research/media_1f21796732ee17098dc9eae5148e093dc47d7f9de.gif?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
        <item>
            <title><![CDATA[Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team | Recorded Future]]></title>
            <link>https://www.recordedfuture.com/blog/autonomous-threat-operations-in-action</link>
            <guid isPermaLink="false">https://www.recordedfuture.com/blog/autonomous-threat-operations-in-action</guid>
            <pubDate>Sun, 01 Feb 2026 00:00:00 GMT</pubDate>
            <description><![CDATA[This article explores how Recorded Future served as Customer Zero for Autonomous Threat Operations, testing the new solution within our own SOC to validate its real-world impact before releasing it to the public. The article reveals how the technology transformed inconsistent, analyst-dependent threat hunting into unified, automated operations—enabling junior analysts to run 15–20 hunts weekly and allowing our CISO to launch comprehensive network hunts in five minutes in response to critical threats like Salt Typhoon. By understanding these outcomes, security leaders can see how autonomous threat hunting empowers teams at every skill level to shift from reactive to proactive defense.]]></description>
            <content:encoded><![CDATA[
        <h2>Key Takeaways:</h2>
        <ul>
          <li>Recorded Future deployed Autonomous Threat Operations within its own SOC before customer release, ensuring real-world effectiveness and identifying critical capabilities.</li>
          <li>Autonomous Threat Operations reduced analyst-dependent, inconsistent processes, creating standardized hunts that deliver the same input, output, and expectations every time.</li>
          <li>Team members now run 15-20 threat hunts weekly—work that previously required days or weeks of manual research, coordination, and planning.</li>
          <li>During the Salt Typhoon campaign, Recorded Future's CISO launched a comprehensive network-wide threat hunt in five minutes between meetings, enabling immediate risk mitigation.</li>
          <li>A single pane of glass eliminates context-switching across multiple tools, allowing analysts to hunt threats and research IOCs within one platform.</li>
        </ul>
        <h2>Autonomous Threat Operations in action: Real results from Recorded Future’s own SOC team</h2>
        <p>The ultimate test of any cybersecurity solution Recorded Future builds? Using it to defend our own network.</p>
        <p>That's exactly what we did with Autonomous Threat Operations. Before rolling it out to customers, we became Customer Zero, deploying the technology within our security operations organization to see if it could truly transform the way security teams hunt for threats.</p>
        <p>The results exceeded our expectations. What we discovered wasn't just incremental improvement; it was a fundamental shift in what our security team could accomplish.</p>
        <h2><strong>The challenge: Inconsistent and analyst-dependent threat hunting</strong></h2>
        <p>Prior to implementing Autonomous Threat Operations, we faced the same threat hunting challenges many security teams struggle with today. As Josh Gallion, Recorded Future's Incident Response Manager, explains: "Before using Autonomous Threat Operations, our approach to threat hunting was more piecemeal and unique to each analyst. It varied based on whatever they were comfortable with and however they were trained on the tooling."</p>
        <div>
          <div>
            <div>c4yy0f6y1p</div>
          </div>
        </div>
        <p>This inconsistency meant that the quality and thoroughness of our threat hunts varied significantly by analyst. And since each team member had different strengths, different levels of experience, and different comfort levels with our security tools, we struggled to standardize the process.</p>
        <h2><strong>The transformation: Unified, repeatable threat hunting</strong></h2>
        <p>Autonomous Threat Operations leveled the playing field immediately. "It unifies the hunting capability and makes it so that every time analysts run a hunt, it's the same," says Gallion. "We get the same input, we get the same output, and we know what to expect."</p>
        <p>The implementation was remarkably straightforward. "When we turned it on, it just was a simple connection to our Splunk environment," he says. "And once the team started using it, we could see an increase in the number of threat hunts each user would do."</p>
        <p>Perhaps most importantly, Autonomous Threat Operations enabled our team to shift from reactive, manual hunting to proactive, automated operations. "Now we can schedule hunts that will continuously run over time, update with the threat actor TTPs, and give us a more holistic view," Gallion says. "Before, we had to have an analyst get back into the product and look for new IOCs to run. Now it just runs it automatically and we know that that's taken care of."</p>
        <h2><strong>Real-world impact: Upskilling junior analysts and enabling rapid response</strong></h2>
        <p>According to Recorded Future's CISO, Jason Steer, the true value of Autonomous Threat Operations became clear through two significant outcomes.</p>
        <p>First, the technology dramatically upskilled our junior staff. In traditional manual workflows, preparing to run a single threat hunt could take days or even weeks—requiring extensive research, coordination, and planning.</p>
        <p>Today, our junior analysts are running 15–20 threat hunts each week to identify high-priority threats. This isn't just about quantity; it's about empowering less experienced team members to contribute meaningfully to our defense posture while accelerating their professional development.</p>
        <div>
          <div>
            <div>sn9crhxmaj</div>
          </div>
        </div>
        <p>Gallion sees this impact firsthand. "We have newer analysts who can do more advanced hunting based on IOCs, and it does it for them automatically in the background,” he says. “We get our results, and then they can do research in the app to shore up the findings."</p>
        <p>Second, the speed and accessibility of automated threat hunting has proven invaluable during critical moments. When Steer read about Salt Typhoon making its way into corporate networks, he didn't need to schedule a meeting, assemble a team, or wait for the next sprint cycle. In the five minutes between meetings, he was able to launch a comprehensive threat hunt across Recorded Future's entire network to identify and mitigate associated risks to our systems.</p>
        <p>That kind of rapid response would have been impossible with manual processes—and in today's threat landscape, that speed can mean the difference between containment and catastrophe.</p>
        <h2><strong>The advantage of a single pane of glass</strong></h2>
        <p>Another key benefit emerged around workflow efficiency. "Having a single pane of glass makes it a lot easier for an analyst to do not just the threat hunt, but also to see the meaning behind the IOCs that they're pulling back into the app," says Gallion. "Analysts don't like to have to get into a whole bunch of different applications. If we don't have to, it speeds things up and we can add context from inside the app."</p>
        <p>This unified approach has eliminated the context-switching and tool-juggling that had often slowed down our security team and led to missed findings.</p>
        <h2><strong>Why the Customer Zero experience matters</strong></h2>
        <p>Serving as Customer Zero validated what we believed Autonomous Threat Operations could deliver to every customer: consistent, repeatable threat hunting that empowers analysts of all skill levels to defend their organizations more effectively. By testing the new solution within our own security operations first, we were able to identify what works, refine the capabilities that matter most, and prove that Autonomous Threat Operations isn't just a theoretical improvement—it's a practical solution that transforms daily security operations.</p>
        <p>Gallion sums it up this way: "Some of the aspects of Autonomous Threat Operations that'll have the biggest impact are the repeatability, the scheduling of threat hunts to happen over time, and the single pane of glass that allows analysts to research IOCs in the app without having to go into multiple tools."</p>
        <p>We saw a need for Autonomous Threat Operations, so we built it. Being Customer Zero enabled us to test it, refine it, and ensure that it’s the best possible solution to help our customers enter the era of the autonomous SOC.</p>
        <p><strong>Learn more about Autonomous Threat Operations by clicking</strong> <strong><a href="https://www.recordedfuture.com/products/autonomous-threat-operations">here</a>, or start operationalizing your threat intelligence now by booking a</strong> <strong><a href="https://go.recordedfuture.com/ato-demo.html?__utma=150831654.1091255729.1769524153.1769524153.1769524153.1&amp;__utmb=150831654.0.10.1769524153&amp;__utmc=150831654&amp;__utmx=-&amp;__utmz=150831654.1769524153.1.1.utmcsr=(direct)%7Cutmccn=(direct)%7Cutmcmd=(none)&amp;__utmv=-&amp;__utmk=14649591">custom demo</a>.</strong></p>
      ]]></content:encoded>
            <category>Blog</category>
            <enclosure length="0" type="image/jpg" url="https://www.recordedfuture.com/blog/media_1a3ded09023847b846727759f0086351655ddf92a.png?width=1200&amp;format=pjpg&amp;optimize=medium"/>
        </item>
    </channel>
</rss>